[10] Commentary on the HPCR manual on International Law Applicable to Air and Missile Warefare,
March 2010.
[11] J.A. Simpson, E.S.C. Weiner, The Oxford Compact English Dictionary, 2003.
[12] National Research Council, Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and
Use of Cyberattack Capabilities 80 (William A. Owens, Kenneth W. Dam & Herbert S. Lin eds.,
2009) [Hereinafter NRC REPORT).
[13] David D. Clark & Susan Landau, Untangling Attribution, in Proceedings of a Workshop on
Deterring Cyberattacks 25, 28 (National Research Council ed., 2010).
[14] Kim Zetter, How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History,
WIRED, July 11, 2011, http://www.wired.com/threatlevel/2011/7/howdigital-detectivesdecipheredstuxnet/All/1.
[15] William J. Broad, John Markoff & David E. Sanger, Israeli Test on Worm Called Crucial in Iran
Nuclear Delay, N.Y. TIMES, Jan. 15, 2011, www.nytimes.com/2011/1/16/world/middleeast/
16stuxnet.html.
[16] Icty the Prosecutor V. Dusko Tadic Aka (dule), decision on the defence motion for interlocutory
appeal on jurisdiction, 2 October 1995, case no. it-94-1-ar72, appeals chamber, icty, para 119.
[17] ICJ, advisory opinion on legality of the threat or use of nuclear weapons, para 95.
[18] Eric Talbot Jensen, cyber warfare and precautions against effectsof attacks, op.
[19] Van Dyke (1940) the Responsibility of States for International Cyber Attacks, 34, AM. J. INT'L L.
58. p. 79.
[20] Siobhan Gorman & Julian E. Barnes, Cyber Combat: Act of War, WALL ST. J., May 31, 2011,
available at: http://online.WSJ.COImanicle/SB10001424052702304563104576355623135782718.html.
[21] James Glanz & John Markoff, U. S. Underwrites Internet Detour Around Censors, N. Y.
[22] TIMES, June 12, 2011, available at: http://www.nytimes.com/2011/06/12/world/12internet.html?
pagewanted=1&_=1&hp.
[23] Leo Lewis, China's Blue Army of 30 Computer Experts Could Deploy Cyber Warfare on Foreign
Powers, Australian, May 27, 2011, available at: http://www.theaustralian.com, au/australianit/chinas-blue-armycouldconduct-cyber-warfare-on-foreignpowers/story-e6frgakx-1226064132826.
[24] http://www.ghazavat.com opcit. p. 8-12.
[25] Wisj.com. Retrieved on 2011-11-08. Gorman, Siobhan. (2012-06-04) WSJ: U.S. Backs Talks on
Cyber Warfare.
[26] Rose McDermott, Decision Making Under Uncertainty, in Proceedings of a Workshop on Deterring
Cyberattacks, supra note 32, at 227, 229 ("[U]unlike most military attacks, cyber attacks defy easy
assessments of perpetrator and purpose.")