Abstract
Threats in the digital domain is one of the, if not the most significant risks facing the individual, societies, and nation states worldwide. We are raising the question of whether the legal regulation of the digitally connected worldwide network is adequate to meet the challenges of harmful behavior to critical infrastructure. The general assumption among technical and security experts, as well as in the ongoing public debate, is that it is not. We look into the status of the current Nordic legislation, identify the main challenges, and point out future work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
- 17.
- 18.
- 19.
- 20.
- 21.
- 22.
- 23.
- 24.
- 25.
- 26.
- 27.
- 28.
- 29.
- 30.
- 31.
- 32.
- 33.
- 34.
- 35.
- 36.
- 37.
The Norwegian Supreme Court`s ruling in Rt. 2003/1770 where a Swedish citizen was charged with fraud committed abroad but also with Norwegian victims. Whereas in Rt.2004/1619 the opposite was the case, when two Norwegian citizens were convicted for data breaches in several hundred of servers located outside of Norway.
- 38.
- 39.
- 40.
- 41.
References
Corn, G.P.: Cyber national security: navigating gray-zone challenges in and through cyberspace. In: Williams, W.S., Ford, C.M. (eds.) Complex Battlespaces: The Law of Armed Conflict and the Dynamics of Modern Warfare. Oxford Academic (2019)
ENISA: Threat Landscape 2022 (2022)
Soesanto, S.: The IT Army of Ukraine - Structure, Tasking, and Ecosystem. Center for Security Studies (CSS), ETH Zürich (2022)
Cisco Talos: Threat advisory: Cybercriminals compromise users with malware disguised as pro-Ukraine cyber tools. Talos Intelligence, vol. 2023. Talos (2022)
Bateman, J.: Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications. Carnegie (2022)
Sheahan, M., Steitz, C., Rinke, A.: Satellite outage knocks out thousands of Enercon’s wind turbines. Reuters. Reuters (2022)
Microsoft: An overview of Russia’s cyberattack activity in Ukraine (2022)
Bîzgă, A.: Bitdefender Labs Sees Increased Malicious and Scam Activity Exploiting the War in Ukraine. Bitdefender (2022)
Sklerov, M.J.: Solving the dilemma of state response to cyberattacks: a justification for the use of active defenses against states who neglect their duty to prevent. Mil. Law Rev. 201, 1–85 (2009)
Utenriksdepartementet: Internasjonal cyberstrategi for Norge (2017)
Fjellvikås, S.B.: Grensene for en stats selvforsvarsrett etter FN-pakten artikkel 51 ved digitale angrep fra en annen stat. Det juridiske fakultet, vol. Master. University of Oslo (2018)
Schmitt, M.N.: Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press (2017)
Columbia University Mailman School of Public Health. https://www.publichealth.columbia.edu/research/population-health-methods/content-analysis
Krippendorff, K.: Content Analysis - An Introduction to Its Methodology. SAGE (2013)
Kaminska, M., Shires, J., Smeets, M.: Cyber Operations During the 2022 Russian invasion of Ukraine: Lessons Learned (so far). European Cyber Conflict Research Initiative (2022)
Beecroft, N.: Evaluating the International Support to Ukrainian Cyber Defense. Carnegie (2022)
Lachow, I.: The Private Sector Role in Offensive Cyber Operations: Benefits, Issues and Challenges. SSRN (2016)
Smeets, M.: Integrating offensive cyber capabilities: meaning, dilemmas, and assessment. Def. Stud. 18, 395–410 (2018)
Pattison, J.: From defence to offence: the ethics of private cybersecurity. Eur. J. Int. Secur. 5, 233–254 (2020)
Broeders, D.: Private active cyber defense and (international) cyber security—pushing the line? J. Cybersecur. 7 (2021)
Kyberselvityshankkeen työryhmä: Valtioneuvoston julkaisuja 2023:31. Selvitys viranomaisten toimintaedellytyksistä kyberturvallisuudessa. Valtioneuvosto (2023)
Lång, J., Haavikko, T.: Data Security and Cybercrime in Finland. Lexology (2019)
Justis- og beredskapsdepartementet: Norge får sin første lov om digital sikkerhet (2023)
Spiegel: Britain’s GCHQ Hacked Belgian Telecoms Firm. Spiegel International (2013)
Baumgärtner, V.M., Knobbe, M., Schindler, J.: German Intelligence Also Snooped on White House. Spiegel International (2017)
Justis- og beredskapsdepartementet: Meld. St. 9 (2022–2023): Nasjonal kontroll og digital motstandskraft for å ivareta nasjonal sikkerhet—Så åpent som mulig, så sikkert som nødvendig (2022)
Etterretningstjenesten: Fokus 2023 Trusselvurdering (2023)
White House: Findings from Select Federal Reports: The National Security Implications of a Changing Climate. The White House (2015)
Jones, K.: Legal loopholes and the risk of foreign interference (2023)
Committee on Foreign Relations: Putin’s Asymmetric Assault on Democracy in Russia and Europe: Implications for U.S. National Security. Senate Committee Print (2018)
Ministery of Defence: Allied Joint Publication-3.20, Allied Joint Doctrine for Cyberspace Operations. In: NATO (ed.) (2020)
Helkala, K., Cook, J., Lucas, G., Pasquale, F., Reichberg, G., Syse, H.: AI in cyber operations: ethical and legal considerations for end-users. In: Sipola, T., Kokkonen, T., Karjalainen, M. (eds.) Artificial Intelligence and Cybersecurity, pp. 185–206. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-15030-2_9
Forsvaret: Forsvarets fellesoperative doktrine (2019)
Forsvarsdepartementet: NOU 2023:14 Forsvaskomisjonen av 2021 - Forsvar for fred og frihet (2023)
Forsvardepartementet, Justis- og beredskapsdepartementet: Støtte og samarbeid - En beskrivelse av totalforsvaret i dag (2015)
NATO: Cyber Defence Pledge (2016)
Brent, L.: NATO’s role in cyberspace. NATO Review (2019)
Nasjonal sikkerhetsmyndighet: Rammeverk for håndtering av IKT-hendelser (2017)
National Institute of Standards and Technology: Framework for Improving Critical Infrastructure Cybersecurity Version 1.1 (2018)
Sunde, I.M.: Cyber crime law. In: Årnes, A. (ed.) Digital Forensics. Wiley (2017)
Sunde, I.M.: Cyber investigation law. In: Årnes, A. (ed.) Cyber Investigations. Wiley (2022)
https://www.fbi.gov/wanted/cyber/russian-interference-in-2016-u-s-elections
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Berg, L., Helkala, K., Årnes, A. (2024). Legal Considerations on Gray Zone Operations – From a Norwegian Perspective. In: Fritsch, L., Hassan, I., Paintsil, E. (eds) Secure IT Systems. NordSec 2023. Lecture Notes in Computer Science, vol 14324. Springer, Cham. https://doi.org/10.1007/978-3-031-47748-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-47748-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47747-8
Online ISBN: 978-3-031-47748-5
eBook Packages: Computer ScienceComputer Science (R0)