This title is part of UC Press's Voices Revived program, which commemorates University of California Press's mission to seek out and cultivate the brightest minds and give them voice, reach, and impact. Drawing on a backlist dating to 1893, Voices Revived makes high-quality, peer-reviewed scholarship accessible once again using print-on-demand technology. This title was originally published in 1959
"This book examines the shape, sources and dangers of information warfare (IW) as it pertains to military, diplomatic and civilian stakeholders. Cyber warfare and information warfare are different beasts. Both concern information, but where the former does so exclusively in its digitized and operationalized form, the latter does so in a much broader sense: with IW, information itself is the weapon. The present work aims to help scholars, analysts, and policymakers understand information warfare within the context of cyber conflict. Specifically, the chapters in the volume address the shape of influence campaigns waged across digital infrastructure and in the psychology of democratic populations in recent years by belligerent state actors, from the Russian Federation to the Islamic Republic of Iran. In marshalling evidence on the shape and evolution of information warfare as a broad-scoped phenomenon aimed at societies writ large, the authors in this book present timely empirical investigations into the global landscape of influence operations, legal and strategic analyses of their role in international politics, and insightful examinations of the potential for democratic process to overcome pervasive foreign manipulation. This book will be of much interest to students of cyber-security, national security, strategic studies, defence studies and International Relations in general."--
"Cyberterrorism in the 21st century is now one of the greatest threats to global security and information. It transcends national borders (and by extension national legal systems), making it difficult for individual countries to formulate a cohesive defence plan against it. The world has yet to see any serious acts of cyberterrorism targeting multiple countries at once, but there's a need for countries to develop legal precedents to deal with this should it happen. This book investigates cyberterrorism in terms of the conventions and legislation developed in response to the growing need to protect the digital infrastructure and information of citizens, companies and governments. It looks at the challenges faced by international organisations in first defining then responding to and curbing cyberterrorism. Following this is analysis of legal provisions, with case studies of enforcement and of jurisdiction of these provisions. Unique in the way that all aspects of cyberterrorism are considered, from initial infringement to eventual prosecution, this book provides recommendations and guidance to law-based post-graduates and professionals working on digital crime, and to those interested in national and international legal legislation against it."--Publisher's website.
International humanitarian law (IHL) protects persons and property affected by armed conflicts. Focusing on the controversies that impact IHL in practice, this much-anticipated book from leading expert Marco Sassòli discusses when IHL applies, its substantive rules, how to ensure its respect and whether the traditional distinction between international and non-international armed conflicts remains relevant. Sassòli draws on a depth of practical experience to provide invaluable insight and comprehensive guidance on the rules protecting certain categories of persons (for example, civilians, wounded, etc.) during conflict and the rules governing different types of conduct (for example, occupation, naval warfare, etc.). The book examines how these rules interact with other branches of international law, such as human rights and international criminal law, and how the rules are applied to non-State armed groups. Cross-cutting issues, including terrorism, autonomous weapons, cyber warfare, gender and cultural heritage, are also addressed, providing readers with a well-rounded view of IHL and associated concerns. Structured in a clear and accessible way, this book will be the turn-to resource for scholars, lawyers, civil servants and other actors directly involved in the sphere of IHL. It will also be the essential text for forthcoming generations of students, giving them a solid understanding of both the rules relating to IHL and how they are implemented in practice