Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the Shanghai Cooperation Organisation to identify strengths and weaknesses of such international cooperation, and how Cyber Peacekeeping could fill current gaps relating to cyber conflict response.


Akatyev, N., & James, J. I. (2015). Cyber Peacekeeping. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 157, pp. 126–139). http://doi.org/10.1007/978-3-319-25512-5_10

Albert, E. (2009, March). The Shanghai Cooperation Organization. Retrieved September 15, 2016, from http://www.cfr.org/china/shanghai-cooperation-organization/p10883

Amnesty International. (2016, March). Syrian and Russian forces targeting hospitals as a strategy of war. Retrieved September 15, 2016, from https://www.amnesty.org/en/press-releases/2016/03/syrian-and-russian-forces-targeting-hospitals-as-a-strategy-of-war/

Co-Chairs’ Summary Report. (2012) (p. ASEAN Regional Forum). Hoi An, Quang Nam, Viet Nam: ASEAN Regional Forum. Retrieved from http://aseanregionalforum.asean.org/files/library/ARF Chairman%27s Statements and Reports/The Nineteenth ASEAN Regional Forum, 2011-2012/10 - Co-Chairs Summary Report - ARF Workshop on Proxy Actors in Cyberspace, Quang Nam.pdf

Das, S. K., Kant, K., & Zhang, N. (2012). Handbook on securing cyber-physical critical infrastructure. Elsevier. Retrieved from https://books.google.co.kr/books?hl=en&lr=&id=MftTeQivgA0C&oi=fnd&pg=PP1&dq=Handbook+on+Securing+Cyber-Physical+Critical+Infrastructure&ots=btXJyS5P37&sig=evhxiS3RLF4bZd5OXxvgImspQ_g

Denning, D. E. (2008). The ethics of cyber conflict. In K. E. Himma & H. T. Tavani (Eds.), The handbook of information and computer ethics (pp. 407–428). Wiley. Retrieved from https://books.google.co.kr/books?hl=en&lr=&id=ZC7SDyPZUMoC&oi=fnd&pg=PA407&dq=victims+of+cyber+conflict&ots=lcfZIdxY72&sig=FwXaBLmrMCzxTwpKGasbGhVli0k

Eom, J. H., Kim, N. U., Kim, S. H., & Chung, T. M. (2012). Cyber military strategy for cyberspace superiority in cyber warfare (pp. 295–299). http://doi.org/10.1109/CyberSec.2012.6246114

Erskine, T., & Carr, M. (2016). Beyond “Quasi-Norms”: The Challenges and Potential of Engaging with Norms in Cyberspace. In A.-M. Osula & H. Rõigas (Eds.). Tallinn: NATO CCD COE Publications.

European Council. Convention on Cybercrime, Current (2001). Budapest. Retrieved from https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185

Farrell, H. (2015). Promoting Norms for Cyberspace. Cyber Brief. Council on Foreign Relations Press.

Farwell, J. P. (2014). The Media Strategy of ISIS. Survival, 56(6), 49–55. http://doi.org/10.1080/00396338.2014.985436

Gjelten, T. (2013). FIRST STRIKE: US Cyber Warriors Seize the Offensive. World Affairs, 175(5), 33–43. Retrieved from http://www.jstor.org/stable/43554737

Godwin III, J. B., Kulpin, A., Rauscher, K. F., & Yaschenko, V. (2014). Critical Terminology Foundations 2. EastWest Institute and the Information Security Institute at the Moscow State University. Retrieved from https://www.eastwest.ngo/idea/critical-terminology-foundations-2

Goldman, D. (2016, February). Twitter goes to war against ISIS. Retrieved September 16, 2016, from http://money.cnn.com/2016/02/05/technology/twitter-terrorists-isis/index.html

Gordon, K., & Dion, M. (2008). Protection of Critical Infrastructure and the role of investment policies relating to national security. Investment Division, Directorate for Financial and Enterprise Affairs, Organisation for Economic Co-operation and Development,, Paris (Vol. 75116). Paris, France. Retrieved from https://www.oecd.org/daf/inv/investment-policy/40700392.pdf

Hua, X. (2016, May). China, U.S. discuss int’l norms of state behavior in cyberspace. Retrieved September 15, 2016, from http://news.xinhuanet.com/english/2016-05/12/c_135354264.htm

IMPACT- International Multilateral Partnership Against Cyber Threats. (2016). Retrieved September 15, 2016, from http://www.impact-alliance.org/home/index.html

Information Security Doctrine of the Russian Federation. (2000). Russian Federation. Retrieved from http://archive.mid.ru//bdomp/ns-osndoc.nsf/1e5f0de28fe77fdcc32575d900298676/2deaa9ee15ddd24bc32575d9002c442b!OpenDocument

INTERPOL. (2016). Retrieved September 15, 2016, from http://www.interpol.int/

James, J. I. (2013). An Argument for Assumed Extra-territorial Consent During Cybercrime Investigations. VFAC Review, (25), 7–8. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=

Kaljurand, M. (2015, December). International Norms in Cyberspace: A Discussion with Minister Marina Kaljurand. Center for Strategic and International Studies 1616 Rhode Island Avenue, NW Washington, DC 20036. Retrieved from https://www.csis.org/events/international-norms-cyberspace-discussion-minister-marina-kaljurand

Karatzogianni, A. (2013). A cyberconflict analysis of the 2011 Arab Spring. In G. Youngs (Ed.), Digital world: Connectivity, creativity and rights (p. 159). Routledge. Retrieved from https://www.routledge.com/Digital-World-Connectivity-Creativity-and-Rights/Youngs/p/book/9780415839082

Korzak, E. (2015, September). The 2015 GGE Report: What Next for Norms in Cyberspace? Retrieved September 15, 2016, from https://www.lawfareblog.com/2015-gge-report-what-next-norms-cyberspace

Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security Privacy, 9(3), 49–51. http://doi.org/10.1109/MSP.2011.67

Lee, B. (2016). The Impact of Cyber Capabilities in the Syrian Civil War. Small Wars Journal.

Levin, A., Goodrick, P., & Ilkina, D. (2014). Securing cyberspace: a comparative review of strategies worldwide. Montreal, Canada: Canadian IT Law Association. Retrieved from http://www.it-can.ca/wp-content/uploads/conf2014/Securing_Cyberspace-Levin.pdf

Norms of Behaviour for Cyberspace. (2014, June). Retrieved September 15, 2016, from https://www.ccdcoe.org/norms-behaviour-cyberspace

O’Connell. (2016, January). Google Joins The Fight Against ISIS. Retrieved from https://hacked.com/google-joins-fight-isis/

OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security. (2002). Organization for Economic Co-Operation and Development. Retrieved from https://www.oecd.org/sti/ieconomy/15582260.pdf

Osula, A.-M., & Rõigas, H. (2016). International cyber norms: legal, policy & industry perspectives. NATO Cooperative Cyber Defence Centre of Excellence. Retrieved from https://ccdcoe.org/sites/default/files/multimedia/pdf/InternationalCyberNorms_full_book.pdf

Principles of UN peacekeeping. (2008). Retrieved September 15, 2016, from http://www.un.org/en/peacekeeping/operations/principles.shtml

Reed, T. (2007). At the Abyss: An Insider’s History of the Cold War. Random House Publishing Group. Retrieved from https://books.google.co.kr/books?id=69Vvboox1JcC

Schmitt, M. N. (2013). Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press. Retrieved from https://books.google.co.kr/books?hl=en&lr=&id=FujYDXdOMQgC&oi=fnd&pg=PR1&dq=Tallinn+Manual+on+the+International+Law+Applicable+to+Cyber+Warfare&ots=M1uSBsT3Nu&sig=jwHYrfUIWFhlCl3iZd-q09QzAwM

Schmitt, M. N., & Vihul, L. (2014). The Nature of International Law Cyber Norms. Rochester, NY. Retrieved from http://papers.ssrn.com/abstract=2543520

Segal, A. (2011, March). Cyberspace Governance: The Next Step. Council on Foreign Relations Press. Retrieved from http://www.cfr.org/cybersecurity/cyberspace-governance-next-step/p24397

Solce, N. (2008). Battlefield of Cyberspace: The Inevitable New Military Branch-The Cyber Force, The. Alb. LJ Sci. & Tech., 18, 293. Retrieved from http://heinonlinebackup.com/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/albnyst18§ion=11

United Nations. (2008). United Nations Peacekeeping Operations Principles and Guidelines. United Nations Department of Peacekeeping Operations. Retrieved from http://www.un.org/en/peacekeeping/documents/capstone_eng.pdf

United Nations. (2015a). Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved from http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174

United Nations. (2015b, January). Letter dated 9 January 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General. Retrieved from https://ccdcoe.org/sites/default/files/documents/UN-150113-CodeOfConduct.pdf

United Nations. (2016). Digital Blue Helmets. Retrieved September 15, 2016, from https://unite.un.org/digitalbluehelmets/

United States White House. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. White House. Retrieved from https://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf

Watts, S. (2015). Cyber Law Development and the United States Law of War Manual. NATO Cooperative Cyber Defence Centre of Excellence, International Cyber Norms Development (Anna-Maria Osula Ed., Forthcoming). Retrieved from http://ssrn.com/abstract=2650784



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.