{"id":252400,"date":"2021-08-07T15:00:24","date_gmt":"2021-08-07T09:30:24","guid":{"rendered":"https:\/\/www.scconline.com\/blog\/?p=252400"},"modified":"2021-08-07T15:07:57","modified_gmt":"2021-08-07T09:37:57","slug":"cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/","title":{"rendered":"The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum"},"content":{"rendered":"<h3 style=\"text-align: justify;\"><span style=\"color: #008000;\"><strong>Introduction<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">On 12-10-2020, in the midst of India\u2019s standoff with the Chinese troops at the Line of Actual Control at the Indo-China border, a power grid failure was witnessed in Mumbai which reportedly stopped trains on tracks, affected hospitals and practically brought the city to a halt. While the problem was rectified in 2 hours, representatives of the State of Maharashtra prima facie expressed concerns of sabotage and involvement of foreign actors<a href=\"#_ftn2\" name=\"_ftnref2\">[1]<\/a>; this suspicion was further supported by a publication of <em>The New York Times<\/em><a href=\"#_ftn3\" name=\"_ftnref3\">[2]<\/a> \u00a0which was based on research conducted by Recorded Future<a href=\"#_ftn4\" name=\"_ftnref4\">[3]<\/a>, a cybersecurity firm based in the US. The report alleged that as part of a Chinese cyber campaign against India, malware had been flowing into the Indian control systems used to manage electric supply. The attack was then linked by the cybersecurity firm to a Chinese State-sponsored hacking collective known as \u201cRed Echo\u201d.\u00a0 It was reported that the extent of the cyber invasion could have been much more severe, and suspicions have arisen around the power outage being a warning, a shot across the bow to send a message to the Indian Government for pressing its claims in the armed battle. While no conclusive report was released by India against China, the allegations raise valid concerns about the increase of cyberattacks and capabilities of such attacks to inflict harm on critical infrastructure and people of the country.<\/p>\n<p style=\"text-align: justify;\">Over the past years, many countries have been subject to such attacks, ranging from allegation of interference in the US elections against Russia, cyber-attacks against Estonia<a href=\"#_ftn5\" name=\"_ftnref5\">[4]<\/a> which resulted in a shutdown of national websites, leading to violent protests and subsequent deaths<a href=\"#_ftn6\" name=\"_ftnref6\">[5]<\/a>, to the infamous \u201cStuxnet\u201d virus which was planted in an Iranian nuclear facility and targeted Iran\u2019s nuclear centrifuges, making them spin out of control and destroying nearly 1\/5th of Iran\u2019s nuclear capabilities<a href=\"#_ftn7\" name=\"_ftnref7\">[6]<\/a>.<\/p>\n<p style=\"text-align: justify;\">No international precedent exists regarding the regulation and analysis of the international cyberspace and subsequently neither does any specific international legislation which regulates and analyses the international cyberspace. Scholars often apply the existing principles of international law of jus ad bellum and jus in bello to these instances. However, this is subject to different interpretations where it has even been suggested that cyber operations could never be included in these provisions, regardless of their impact.<\/p>\n<p style=\"text-align: justify;\">Jus ad bellum is the principle which seeks to regulate use of force and aggression; it broadly refers to conditions, at the satisfaction of which States may resort to use of armed force. The general prohibition regarding use of force, and its exceptions namely, self-defence and UN authorisation which are established under the UN Charter of 1945<a href=\"#_ftn8\" name=\"_ftnref8\">[7]<\/a>, Articles 2(4) and 51 constitute the primary ingredients of jus ad bellum<em>.<\/em><\/p>\n<p style=\"text-align: justify;\">This article will analyse the position of cyberattacks within the ambit of the provisions of jus ad bellum and whether these attacks could trigger retaliation through a nation\u2019s right to self-defence.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #008000;\"><strong>Defining Cyberwarfare<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">The <em>Tallinn Manual<\/em>, which is widely considered to be the most authoritative non-binding international work on cyber force defines cyberspace as \u201cthe environment formed by physical and non-physical components to store, modify, and exchange data using computer networks.\u201d<a href=\"#_ftn9\" name=\"_ftnref9\">[8]<\/a>. However, the definition apt for the purpose of this paper is one espoused by the US Law of War Manual<a href=\"#_ftn10\" name=\"_ftnref10\">[9]<\/a> due to its nature as expansive as well as precise.<a href=\"#_ftn11\" name=\"_ftnref11\">[10]<\/a> The Manual states that cyberspace as a doctrinal manner is recognised \u201cas an operational domain in which the armed forces must be able to defend and operate, just like land, air, sea and space\u201d. Further holding that it is a global domain consisting of interdependent infrastructure technology infrastructure networks. This definition definitively identifies cyberspace as a fifth domain of war after air, sea, land, and space.<\/p>\n<p style=\"text-align: justify;\">The definition for \u201ccomputer attack\u201d by the US Department of Defense classifies it as actions taken through computers to deny, disrupt, degrade, or destroy information residing in computers and networks. This has been widely accepted and applied by various international bodies such as the North Atlantic Treaty Organisation (NATO).\u00a0 The <em>Tallinn Manual<\/em> under Rule 30<a href=\"#_ftn12\" name=\"_ftnref12\">[11]<\/a> defines cyberattacks as \u201can offensive or defensive cyber operation which is expected to cause injury to persons and damage to property\u201d.<\/p>\n<p style=\"text-align: justify;\">Therefore, cyberattacks can simply be classified as attempts by individuals to damage computer networks or utilise computer networks to inflict damage to persons and property. The factors distinguishing it from a regular or traditional use of force or attack is that firstly, these are normally, indirect and lead to problems in ascertaining liability to a particular State. Secondly, the nature of weapons is largely intangible, which can lead to difficulty in classification as a use of force.<\/p>\n<p style=\"text-align: justify;\">These factors could assist in explaining the increased reliance on cyberattacks as an alternative to conventional methods of aggression for both State and non-State actors.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #008000;\"><strong>Application and interpretation of jus ad bellum vis-\u00e0-vis cyberattacks<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">Article 2(4) of the UN Charter<a href=\"#_ftn13\" name=\"_ftnref13\">[12]<\/a> prohibits States from threat or use of force against territorial integrity or political independence of any State and Article 51<a href=\"#_ftn14\" name=\"_ftnref14\">[13]<\/a> establishes the right of State to act in self-defence against an armed attack.<\/p>\n<p style=\"text-align: justify;\">Despite repercussions on a par with traditional forms of aggression cyberattacks are not overtly defined under international legislative provisions. A UN Report<a href=\"#_ftn15\" name=\"_ftnref15\">[14]<\/a> stated that in respect of information technology, the \u201cUN Charter is essential and applicable.\u201d Additionally, in its Nuclear Weapons Advisory Opinion<a href=\"#_ftn16\" name=\"_ftnref16\">[15]<\/a>, the International Court of Justice states that the provisions of the Charter were not meant to refer to specific weaponry and are applicable to use of force, irrespective of means employed.<\/p>\n<p style=\"text-align: justify;\">The <em>Tallinn Manual<\/em> under Rule 11<a href=\"#_ftn17\" name=\"_ftnref17\">[16]<\/a> states that a cyber operation would constitute as a use of force if scale and effects are comparable to those of conventional operations rising to such a level. \u00a0The Manual suggested that the factors mentioned, scale and effects are the ones which considered by the ICJ to determine when an armed attack has taken place and are subsequently relevant to classify an act as a use of force. Under Para 10 of Rule 11, the Manual goes on to suggest parameters such as, \u201cseverity, immediacy, directness, invasiveness, effects, military character and presumptive illegality\u201d.\u00a0 It is subsequently also suggested in the same rule that non-destructive acts which are only committed to undermine the confidence of State would not be classifies as a use of force. The \u201cStuxnet\u201d attack against Iran is possibility the best example of a cyberattack which qualified as a use of force. Additionally, if the expansionist approach is, which states that physical destruction of property is not a necessity<a href=\"#_ftn18\" name=\"_ftnref18\">[17]<\/a>, in such a situation even the Estonian hack could be qualified as a use of force as it resulted in a denial of service.<\/p>\n<p style=\"text-align: justify;\">The intent of Article 2(4) is to be prohibitory in nature and the permitted responses include sanctions and actions through the UN Security Council. However, only the classification as a use of force is not enough to sustain the self-defence justification for retaliation. As per Article 51, self-defence may be exercised if the use of force crosses the threshold of an armed attack<a href=\"#_ftn19\" name=\"_ftnref19\">[18]<\/a>. The rationale of the International Court of Justice in <em>Nicaragua<\/em> case was that for an act of force to qualify as armed attack it must achieve a certain level of severity which differentiates it from a \u201cmere frontier attack\u201d.<a href=\"#_ftn20\" name=\"_ftnref20\">[19]<\/a><\/p>\n<p style=\"text-align: justify;\">Primarily three approaches have been proposed by scholars to determine when a cyberattack transcends the level of use of force into armed attack, namely, (<em>i<\/em>) instrument based; (<em>ii<\/em>) target based (strict liability); and (<em>iii<\/em>) effects based.<a href=\"#_ftn21\" name=\"_ftnref21\">[20]<\/a><\/p>\n<p style=\"text-align: justify;\"><em>Instrument based<\/em>.\u2014 According to this approach, the force is assessed in relation to the type of weapon used. This approach is derived from a bare reading of the provisions of the Charter and under this, the more a weapon is analogous to conventional military weapons the more likely it is to be classified as an armed attack. While placing reliance on the principles of ejusdem generis (of the same kind) and noscitur a sociis (a word is known by the company it keeps)<a href=\"#_ftn22\" name=\"_ftnref22\">[21]<\/a> an armed attack which is carried out through a computer could never be classified as an act of aggression. It is presented that this method is a rather regressive method which oversimplifies the process. If this method is utilised, then even aggressive attacks such as those which destroy nuclear centrifuges or bring down entire power grids could never be held to be an attack merely because the approach is limited to conventional weapons.<\/p>\n<p style=\"text-align: justify;\"><em>Target based<\/em>.\u2014 Unlike the previous theory, this focuses on the target of the attack and suggests that any attack against a nation\u2019s critical infrastructure, would qualify as an armed attack sufficient under Article 51 to trigger self-defence<a href=\"#_ftn23\" name=\"_ftnref23\">[22]<\/a>. According to the US Congress, critical infrastructure encompasses a wide range of sectors from agriculture to transport. However, the author feels that this approach is in complete contrast to the previous theory and if the widely accepted definition of critical infrastructure is utilised, nearly every attack would be qualified as an armed attack. Utilising this theory would have granted Iran retaliatory action against the US, or India against China if the power grid failure is considered.<\/p>\n<p style=\"text-align: justify;\"><em>Effects based.<\/em>\u2014 This approach relies on overall consequences of an attack on the victim State and states that a cyberattack which produces damage comparable to that of a kinetic attack<a href=\"#_ftn24\" name=\"_ftnref24\">[23]<\/a> is more likely to qualify the threshold than an attack which is comparable to political or economic sanctions. Out of the 3 this is the most widely accepted theory<a href=\"#_ftn25\" name=\"_ftnref25\">[24]<\/a>.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #008000;\"><strong>Problems in application of jus ad bellum<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">While cyberattacks may be interpreted under jus ad bellum to include offensive cyber operations, the laws are still meant for traditional methods of warfare and do not cater to distinct characteristics of cyberattacks such as: (<em>i<\/em>) attribution of State responsibility; and (<em>ii<\/em>) the impossibility of anticipatory defence.<\/p>\n<p style=\"text-align: justify;\">(<em>i<\/em>) While it is not a requirement under Article 51 that the act must be performed by a State, it has been held by the International Court of Justice that only acts of States could trigger self-defence<a href=\"#_ftn26\" name=\"_ftnref26\">[25]<\/a>. In <em>Oil Platforms<\/em> (<em>Islamic Republic of Iran<\/em> v. <em>United States of America<\/em>)<a href=\"#_ftn27\" name=\"_ftnref27\">[26]<\/a> it was opined that to invoke the right, it must be proved that not only was an armed attack present, but it was also an act of another State. In regard to this, if an attack is done by a non-State actor, the \u201ceffective control test\u201d mentioned in <em>Nicaragua <\/em><em>case<\/em><a href=\"#_ftn28\" name=\"_ftnref28\">[27]<\/a> may be utilised, which states that if the insurgent group is so reliant on the State that the State has effective control over it, then it can be classified as an actor of the State. However, the biggest problem with regard to cyberattacks is responsibility attribution<a href=\"#_ftn29\" name=\"_ftnref29\">[28]<\/a>, and even if said link is established with a non-State actor, the link to the State is nearly impossible. In all the examples of cyberattacks mentioned this in paper, from Estonia to Iran, no defence could be invoked since no reliable link was effectively established.<\/p>\n<p style=\"text-align: justify;\">(<em>ii<\/em>) According to Article 51, right to self-defence can only be triggered when an act has occurred and not as a pre-emptive measure. Self-defence can effectively not be used before the attack has been committed and when the Bush administration tried to make an argument against this to sustain the invasion of Iraq, the UN disregarded it<a href=\"#_ftn30\" name=\"_ftnref30\">[29]<\/a>.<\/p>\n<p style=\"text-align: justify;\">The issue with this with regard to cyberattacks is that they can very often not be predicted either due to the seconds it takes to implement the act or due to the presence of malware which may lay dormant inside systems for a long time before they are activated. Even if the State is able to intercept the attack and is able to identify the attacker State and launch a counter-attack, such an evaluation may well turn out to be inaccurate which would result in the State becoming an aggressor.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #008000;\"><strong>\u00a0<\/strong><strong>Conclusion <\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">Over the years, many such attacks have been alleged to be cyberattacks but as of today, none have ever been conclusively classified as one. The theories regarding application of laws to cyberattacks have various disputed views and the laws at present do not adequately address the distinctive attributes of cyberattacks. Subsequently, the laws of jus ad bellum can be manipulated by States to justify their actions such as has been pointed out regarding pre-emptive self-defence and there can be innumerable problems in ascertaining liability even if the perpetrator is found.<\/p>\n<p style=\"text-align: justify;\">With the evolution of technology and increased dependence on such technology, there has been an increase on cybercrimes as well. And this is bound to increase in the coming future. Therefore, if international law has to interpret cyberattacks in a proper manner it must be subject to further legislative and judicial development where the present and possibly future technologies are adequately accounted for. The<em> Tallinn Manual<\/em> could be good starting point for the creation of such a binding legislative provision.<\/p>\n<hr \/>\n<p style=\"text-align: justify;\"><span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"#_ftnref1\" name=\"_ftn1\">\u2020<\/a> BBA LLB 3rd year student at Jindal Global Law School. Author can be reached at 18jgls-aryan.d@jgu.edu.in.<\/span><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref2\" name=\"_ftn2\">[1]<\/a> Maharashtra Cyber Police Suspects Cyber-Attack Behind Mumbai Power Outage (2-3-2021). Retrieved from &lt;<a href=\"https:\/\/www.hindustantimes.com\/cities\/mumbai-news\/maharashtra-cyber-police-suspects-cyber-attack-behind-mumbai-power-outage-101614654439868.html\">https:\/\/www.hindustantimes.com\/cities\/mumbai-news\/maharashtra-cyber-police-suspects-cyber-attack-behind-mumbai-power-outage-101614654439868.html<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref3\" name=\"_ftn3\">[2]<\/a> Sanger, D., and Schmall, E., China Appears to Warn India: Push too Hard and the Lights Could Go Out (28-2-2021).\u00a0 Retrieved from &lt;<a href=\"https:\/\/www.nytimes.com\/2021\/02\/28\/us\/politics\/china-india-hacking-electricity.html\">https:\/\/www.nytimes.com\/2021\/02\/28\/us\/politics\/china-india-hacking-electricity.html<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref4\" name=\"_ftn4\">[3]<\/a> China-Linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions (24-3-2021). Retrieved from &lt;<a href=\"https:\/\/www.recordedfuture.com\/redecho-targeting-indian-power-sector\/\">https:\/\/www.recordedfuture.com\/redecho-targeting-indian-power-sector\/<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref5\" name=\"_ftn5\">[4]<\/a> Fake News and Botnets: How Russia Weaponised the Web (2-12-2017). Retrieved on 13-4-2021 from&lt;<a href=\"https:\/\/www.theguardian.com\/technology\/2017\/dec\/02\/fake-news-botnets-how-russia-weaponised-the-web-cyber-attack-estonia\">https:\/\/www.theguardian.com\/technology\/2017\/dec\/02\/fake-news-botnets-how-russia-weaponised-the-web-cyber-attack-estonia<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref6\" name=\"_ftn6\">[5]<\/a> Fake News and Botnets: How Russia Weaponised the Web (2-12-2017).<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref7\" name=\"_ftn7\">[6]<\/a> Shubert A., Cyber Warfare: A Different Way to Attack Iran\u2019s Reactors,\u00a0<em>CNN.com.<\/em><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref8\" name=\"_ftn8\">[7]<\/a> Charter of the United Nations, 24-10-1945.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref9\" name=\"_ftn9\">[8]<\/a> <em>Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations<\/em> (Michael N. Schmitt ed., 2013) (prepared by the International Group of Experts) (Member of the International Group of Experts).<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref10\" name=\"_ftn10\">[9]<\/a> Department of Defense, Law of War Manual, United States of America, June 2015.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref11\" name=\"_ftn11\">[10]<\/a> Vaibhav Chaurasia (2017), Cyber Warfare and Laws of War, (LLM dissertation NLU Delhi).<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref12\" name=\"_ftn12\">[11]<\/a> Charter of the United Nations.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref13\" name=\"_ftn13\">[12]<\/a> UN Charter, Art. 2, para 4.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref14\" name=\"_ftn14\">[13]<\/a> UN Charter , Art. 51.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref15\" name=\"_ftn15\">[14]<\/a> UNGA, Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, UN Doc. A\/68\/98.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref16\" name=\"_ftn16\">[15]<\/a> <em>Legality of the Threat or Use of Nuclear Weapons<\/em>, 1996 ICJ Rep 226.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref17\" name=\"_ftn17\">[16]<\/a> Charter of the United Nations.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref18\" name=\"_ftn18\">[17]<\/a> Titiriga, Remus, Cyber-Attacks and International Law of Armed Conflicts; a \u201cJus Ad Bellum\u201d Perspective (19-10-2011), Journal of International Commercial Law and Technology, Vol. 8 No. 3 (July 2013), pp. 179-189, Milton Campos, 2014, v. 27.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref19\" name=\"_ftn19\">[18]<\/a> Holmberg E.J., (2015) Armed Attacks in Cyberspace: Do They Exist and Can They Trigger the Right to Self-Defence? (Thesis in International Law, Faculty of Law, Stockholm University).<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref20\" name=\"_ftn20\">[19]<\/a> <em>Military and Paramilitary Activities in and against Nicaragua<\/em> (<em>Nicaragua<\/em> v. <em>United States of America<\/em>), 1986 ICJ 14.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref21\" name=\"_ftn21\">[20]<\/a> Hollis, D.B. (2007), Why States Need an International Law for Information Operations, Lewis &amp; Clark \u00a0Law Review, 11.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref22\" name=\"_ftn22\">[21]<\/a> Nguyen, R. (2013), Navigating &#8220;Jus Ad Bellum&#8221; in the Age of Cyber Warfare,\u00a0California Law Review,\u00a0101(4), 1079-1129.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref23\" name=\"_ftn23\">[22]<\/a> Nguyen, R. (2013), Navigating &#8220;Jus Ad Bellum&#8221; in the Age of Cyber Warfare, California Law Review, 101(4), 1079-1129.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref24\" name=\"_ftn24\">[23]<\/a> Ta\u015fdemir, Fatma and Albayrak, G\u00f6khan, The Law of Cyber Warfare in Terms of Jus Ad Bellum and Jus in Bello: Application of International Law to the Unknown? (23-12-2017) E-Journal of Law, Forthcoming.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref25\" name=\"_ftn25\">[24]<\/a> Hollis, D.B. (2007), Why States Need an International Law for Information Operations, Lewis &amp; Clark Law Review, 11.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref26\" name=\"_ftn26\">[25]<\/a> Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory, Advisory Opinion, 2004 ICJ Rep 126;\u00a0 Military and Paramilitary Activities in and against Nicaragua (<em>Nicaragua<\/em> v. <em>United States of America<\/em>),1986 ICJ 14; Barnett, S. (2-9-2016), Applying Jus Ad Bellum in Cyberspace. Retrieved from &lt;<a href=\"https:\/\/www.e-ir.info\/2016\/09\/01\/applying-jus-ad-bellum-in-cyberspace\/\">https:\/\/www.e-ir.info\/2016\/09\/01\/applying-jus-ad-bellum-in-cyberspace\/<\/a>&gt;.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref27\" name=\"_ftn27\">[26]<\/a> 2003 ICJ Rep 4.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref28\" name=\"_ftn28\">[27]<\/a> Military and Paramilitary Activities in and against Nicaragua (<em>Nicaragua<\/em> v. <em>United States of America<\/em>), 1986 ICJ 14.<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref29\" name=\"_ftn29\">[28]<\/a> Holmberg E.J., (2015) Armed Attacks in Cyberspace: Do They Exist and Can They Trigger the Right to Self-Defence? (Thesis in International Law, Faculty of Law, Stockholm University).<\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ftnref30\" name=\"_ftn30\">[29]<\/a> UN Doc. A\/59\/565.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>by Aryan Dhingra\u2020<\/p>\n","protected":false},"author":67011,"featured_media":252430,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[42503,1191],"tags":[46685,46684,46687,29785,46686],"class_list":["post-252400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-legal-analysis","category-op-ed","tag-cyber-attack","tag-cyberwarfare","tag-jus-ad-bellum","tag-law","tag-nato"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum | SCC Times<\/title>\n<meta name=\"description\" content=\"Cyber Attacks\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum\" \/>\n<meta property=\"og:description\" content=\"Cyber Attacks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"SCC Times\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/scc.online\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-07T09:30:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-07T09:37:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/08\/Cyberattack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1331\" \/>\n\t<meta property=\"og:image:height\" content=\"888\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/\"},\"author\":{\"name\":\"Editor\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/#\\\/schema\\\/person\\\/84e42bab48238baf12c7e33b3d9761fe\"},\"headline\":\"The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum\",\"datePublished\":\"2021-08-07T09:30:24+00:00\",\"dateModified\":\"2021-08-07T09:37:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/\"},\"wordCount\":2673,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Cyberattack.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyberwarfare\",\"Jus Ad Bellum\",\"law\",\"NATO\"],\"articleSection\":[\"Op Eds\",\"OP. ED.\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/\",\"url\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/\",\"name\":\"The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum | SCC Times\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Cyberattack.jpg\",\"datePublished\":\"2021-08-07T09:30:24+00:00\",\"dateModified\":\"2021-08-07T09:37:57+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/#\\\/schema\\\/person\\\/84e42bab48238baf12c7e33b3d9761fe\"},\"description\":\"Cyber Attacks\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Cyberattack.jpg\",\"contentUrl\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Cyberattack.jpg\",\"width\":1331,\"height\":888},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/2021\\\/08\\\/07\\\/cyber-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/\",\"name\":\"SCC Times\",\"description\":\"Bringing you the Best Analytical Legal News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/#\\\/schema\\\/person\\\/84e42bab48238baf12c7e33b3d9761fe\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\\\/\\\/www.scconline.com\\\/blog\\\/post\\\/author\\\/editor_4\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum | SCC Times","description":"Cyber Attacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum","og_description":"Cyber Attacks","og_url":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/","og_site_name":"SCC Times","article_publisher":"https:\/\/www.facebook.com\/scc.online\/","article_published_time":"2021-08-07T09:30:24+00:00","article_modified_time":"2021-08-07T09:37:57+00:00","og_image":[{"width":1331,"height":888,"url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/08\/Cyberattack.jpg","type":"image\/jpeg"}],"author":"Editor","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Editor","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/"},"author":{"name":"Editor","@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe"},"headline":"The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum","datePublished":"2021-08-07T09:30:24+00:00","dateModified":"2021-08-07T09:37:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/"},"wordCount":2673,"commentCount":0,"image":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/08\/Cyberattack.jpg","keywords":["Cyber Attack","Cyberwarfare","Jus Ad Bellum","law","NATO"],"articleSection":["Op Eds","OP. ED."],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/","url":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/","name":"The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum | SCC Times","isPartOf":{"@id":"https:\/\/www.scconline.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/08\/Cyberattack.jpg","datePublished":"2021-08-07T09:30:24+00:00","dateModified":"2021-08-07T09:37:57+00:00","author":{"@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe"},"description":"Cyber Attacks","breadcrumb":{"@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/#primaryimage","url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/08\/Cyberattack.jpg","contentUrl":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/08\/Cyberattack.jpg","width":1331,"height":888},{"@type":"BreadcrumbList","@id":"https:\/\/www.scconline.com\/blog\/post\/2021\/08\/07\/cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.scconline.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Fifth Domain of Warfare: An Assessment of the Evolving Threat of Cyberattacks under Jus Ad Bellum"}]},{"@type":"WebSite","@id":"https:\/\/www.scconline.com\/blog\/#website","url":"https:\/\/www.scconline.com\/blog\/","name":"SCC Times","description":"Bringing you the Best Analytical Legal News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.scconline.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.scconline.com\/blog\/#\/schema\/person\/84e42bab48238baf12c7e33b3d9761fe","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/34e366be721c41333586de05faa13743195f5b142dcd7a015c6fabd2389521d0?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.scconline.com\/blog\/post\/author\/editor_4\/"}]}},"jetpack_featured_media_url":"https:\/\/www.scconline.com\/blog\/wp-content\/uploads\/2021\/08\/Cyberattack.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":329921,"url":"https:\/\/www.scconline.com\/blog\/post\/2024\/09\/03\/offline-event-at-amity-law-school-noida-on-16th-and-17th-september-2024\/","url_meta":{"origin":252400,"position":0},"title":"Amity Law School Noida AUUP | Verbum Bellum 4.0","author":"Bhumika Indulia","date":"September 3, 2024","format":false,"excerpt":"It is better to debate a question without settling it than to settle a question without debating it.","rel":"","context":"In &quot;Law School News&quot;","block_context":{"text":"Law School News","link":"https:\/\/www.scconline.com\/blog\/post\/category\/lawschoolnews\/"},"img":{"alt_text":"Amity Law School Noida","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/09\/Amity-Law-School-Noida.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/09\/Amity-Law-School-Noida.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/09\/Amity-Law-School-Noida.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/09\/Amity-Law-School-Noida.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":308921,"url":"https:\/\/www.scconline.com\/blog\/post\/2023\/12\/11\/constitutional-moot-court-competition-jus-amicus-5th-edition-1st-to-3rd-february-2024\/","url_meta":{"origin":252400,"position":1},"title":"5th Jus Amicus National Moot Court Competition [1st-3rd February, 2024]","author":"Bhumika Indulia","date":"December 11, 2023","format":false,"excerpt":"About the Organizers : Saveetha School of Law established in 2009 aims to strive for Quality Legal Education and maintains higher standards of Legal Research and Training. With its academic autonomy together with flexibility for innovation in teaching in pursuant to excellence, the school is striving to emerge as one\u2026","rel":"","context":"In &quot;Law School News&quot;","block_context":{"text":"Law School News","link":"https:\/\/www.scconline.com\/blog\/post\/category\/lawschoolnews\/"},"img":{"alt_text":"JUS AMICUS","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/12\/moot-court-1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/12\/moot-court-1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/12\/moot-court-1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2023\/12\/moot-court-1.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":231854,"url":"https:\/\/www.scconline.com\/blog\/post\/2020\/07\/06\/call-for-papers-indian-journal-of-law-and-international-affairs-vol-4-issue-2-submit-by-july-31st\/","url_meta":{"origin":252400,"position":2},"title":"Call for Papers | Indian Journal of Law and International Affairs [Vol 4, Issue 2]: Submit by July 31st","author":"Bhumika Indulia","date":"July 6, 2020","format":false,"excerpt":"Reported by Syed Haroon","rel":"","context":"In &quot;Call For Papers&quot;","block_context":{"text":"Call For Papers","link":"https:\/\/www.scconline.com\/blog\/post\/category\/lawschoolnews\/callforpapers\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2020\/07\/IJLIA.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2020\/07\/IJLIA.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2020\/07\/IJLIA.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":339406,"url":"https:\/\/www.scconline.com\/blog\/post\/2025\/01\/20\/saveetha-school-of-law-jus-lex-trial-advocacy-competition-iii-edition\/","url_meta":{"origin":252400,"position":3},"title":"Saveetha School of Law | Jus Lex Trial Advocacy Competition-III Edition","author":"Bhumika Indulia","date":"January 20, 2025","format":false,"excerpt":"Registrations are invited for a \u201cJus Lex Trial Advocacy Competition-III Edition\u201d Organized Saveetha School of Law, Sponsored by SCC Online [Mar.28&29, Rewards worth of upto Rs.1L for Winners], Register by Feb.10, 2025!","rel":"","context":"In &quot;Law School News&quot;","block_context":{"text":"Law School News","link":"https:\/\/www.scconline.com\/blog\/post\/category\/lawschoolnews\/"},"img":{"alt_text":"Saveetha School of Law","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/01\/Saveetha-School-of-Law.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/01\/Saveetha-School-of-Law.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/01\/Saveetha-School-of-Law.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2025\/01\/Saveetha-School-of-Law.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":320886,"url":"https:\/\/www.scconline.com\/blog\/post\/2024\/04\/27\/chhattisgarh-hc-registers-suo-motu-pil-regarding-lack-of-staff-and-experts-at-cyber-police-stations-scctimes\/","url_meta":{"origin":252400,"position":4},"title":"Chhattisgarh HC registers suo motu PIL based on news report highlighting lack of sufficient staff and experts at Cyber Police Stations","author":"Arushi","date":"April 27, 2024","format":false,"excerpt":"The Court opined that it is highly disturbing and a matter of great concern that the people are being misled, allured and deceived by the persons using digital technology and electronic devices which come under the category of cybercrime.","rel":"","context":"In &quot;Case Briefs&quot;","block_context":{"text":"Case Briefs","link":"https:\/\/www.scconline.com\/blog\/post\/category\/casebriefs\/"},"img":{"alt_text":"Chhattisgarh High Court","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Chhattisgarh-High-Court.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Chhattisgarh-High-Court.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Chhattisgarh-High-Court.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2024\/02\/Chhattisgarh-High-Court.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":380367,"url":"https:\/\/www.scconline.com\/blog\/post\/2026\/04\/07\/4th-cnlu-cyber-law-moot-court-competition-2026-results\/","url_meta":{"origin":252400,"position":5},"title":"4th CNLU-Cyber Law National Moot Court Competition, 2026","author":"Editor","date":"April 7, 2026","format":false,"excerpt":"Chanakya National Law University hosts the 4th Cyber Law National Moot Court Competition 2026, with University of Delhi emerging as winners.","rel":"","context":"In &quot;Law School News&quot;","block_context":{"text":"Law School News","link":"https:\/\/www.scconline.com\/blog\/post\/category\/lawschoolnews\/"},"img":{"alt_text":"CNLU Cyber Law Moot 2026","src":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2026\/04\/CNLU-Cyber-Law-Moot-2026.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2026\/04\/CNLU-Cyber-Law-Moot-2026.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2026\/04\/CNLU-Cyber-Law-Moot-2026.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/www.scconline.com\/blog\/wp-content\/uploads\/2026\/04\/CNLU-Cyber-Law-Moot-2026.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts\/252400","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/users\/67011"}],"replies":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/comments?post=252400"}],"version-history":[{"count":0,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/posts\/252400\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/media\/252430"}],"wp:attachment":[{"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/media?parent=252400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/categories?post=252400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.scconline.com\/blog\/wp-json\/wp\/v2\/tags?post=252400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}