The Language of Cyberattacks

This essay is a post-structuralist analysis of legal systems and terminology used in government-based high technology activities. In the pandemic contact tracing post 9-11 era of high technology global security, there is no single determinate structure for the application of basic international law...

Full description

Bibliographic Details
Main Author: Phil Cameron
Format: Article
Language:English
Published: ELE Publishing 2020-07-01
Series:International Journal of Law, Language & Discourse
Subjects:
Online Access:https://www.ijlld.com/wp-content/uploads/2020/09/8-1-Cameron.pdf
id doaj-5cd2b9ce178942ecb15039277267a94b
record_format Article
spelling doaj-5cd2b9ce178942ecb15039277267a94b2021-05-05T06:56:13ZengELE PublishingInternational Journal of Law, Language & Discourse1839-83082020-07-01817994The Language of CyberattacksPhil CameronThis essay is a post-structuralist analysis of legal systems and terminology used in government-based high technology activities. In the pandemic contact tracing post 9-11 era of high technology global security, there is no single determinate structure for the application of basic international law principles. The legal terms in practice do not point at things, persons, structures, nor even at other words with reliable predictability. The novelty of the technologies used results in referent persons, locales, situations and governing laws being subject to the broadest interpretive license. Meanwhile, the originating spirit found in international legal rules protecting civilians, such as the Geneva Conventions, has been applied to electronic attacks during times of armed conflict. This essay discusses the semantic importance of “threat, crime, attack, security” language and the referent persons conducting the activities. A linguistic deconstruction of the techniques of intelligence gathering is discussed, such as packet sniffing, FBI cybercrimes investigations, data collection, remote sensing, storage and retrieval of records. This includes an analysis of the places involved in cyberattacks and digital trespass which redefine the meaning of borders through electronic security-surveillance during border entry such as airports. These surveillance, security and cybercrime concepts are grounded in a history and culture whose new laws are based on state-of-the-art applications and re-interpretations of traditionally accepted legal principles. Post-structuralism as applied to cyberlaw argues that to understand these legal referents, it is necessary to understand both the object itself and the historical technological lineage that produced the cybersecurity laws.https://www.ijlld.com/wp-content/uploads/2020/09/8-1-Cameron.pdfpost-structuralist linguisticssurveillancesecuritycybercrimesinternational humanitarian lawinternational lawtechnologycomputerscivilians during armed conflictcyberattackscyberwarfarestate borders
collection DOAJ
language English
format Article
sources DOAJ
author Phil Cameron
spellingShingle Phil Cameron
The Language of Cyberattacks
International Journal of Law, Language & Discourse
post-structuralist linguistics
surveillance
security
cybercrimes
international humanitarian law
international law
technology
computers
civilians during armed conflict
cyberattacks
cyberwarfare
state borders
author_facet Phil Cameron
author_sort Phil Cameron
title The Language of Cyberattacks
title_short The Language of Cyberattacks
title_full The Language of Cyberattacks
title_fullStr The Language of Cyberattacks
title_full_unstemmed The Language of Cyberattacks
title_sort language of cyberattacks
publisher ELE Publishing
series International Journal of Law, Language & Discourse
issn 1839-8308
publishDate 2020-07-01
description This essay is a post-structuralist analysis of legal systems and terminology used in government-based high technology activities. In the pandemic contact tracing post 9-11 era of high technology global security, there is no single determinate structure for the application of basic international law principles. The legal terms in practice do not point at things, persons, structures, nor even at other words with reliable predictability. The novelty of the technologies used results in referent persons, locales, situations and governing laws being subject to the broadest interpretive license. Meanwhile, the originating spirit found in international legal rules protecting civilians, such as the Geneva Conventions, has been applied to electronic attacks during times of armed conflict. This essay discusses the semantic importance of “threat, crime, attack, security” language and the referent persons conducting the activities. A linguistic deconstruction of the techniques of intelligence gathering is discussed, such as packet sniffing, FBI cybercrimes investigations, data collection, remote sensing, storage and retrieval of records. This includes an analysis of the places involved in cyberattacks and digital trespass which redefine the meaning of borders through electronic security-surveillance during border entry such as airports. These surveillance, security and cybercrime concepts are grounded in a history and culture whose new laws are based on state-of-the-art applications and re-interpretations of traditionally accepted legal principles. Post-structuralism as applied to cyberlaw argues that to understand these legal referents, it is necessary to understand both the object itself and the historical technological lineage that produced the cybersecurity laws.
topic post-structuralist linguistics
surveillance
security
cybercrimes
international humanitarian law
international law
technology
computers
civilians during armed conflict
cyberattacks
cyberwarfare
state borders
url https://www.ijlld.com/wp-content/uploads/2020/09/8-1-Cameron.pdf
work_keys_str_mv AT philcameron thelanguageofcyberattacks
AT philcameron languageofcyberattacks
_version_ 1721475472041181184