Cyber warfare and the laws of war
In: Cambridge studies in international and comparative law
131592 Ergebnisse
Sortierung:
In: Cambridge studies in international and comparative law
Shipping list no.: 2004-0041-P. ; Includes bibliographical references and index. ; CNE and CNA in the network-centric battlespace : challenges for operators and lawyers / Arthur K. Cebrowski -- Technology and law : the evolution of digital warfare / David Tubbs, Perry G. Luzwick, Walter Gary Sharp, Sr.-- A different kettle of fish : computer network attack / Roger W. Barnett -- Information operations, information warfare, and computer network attack : their relationship to national security in the information age / Daniel T. Kuehl -- International law, cybernetics, and cyberspace / Anthony D'Amato -- Computer network attack as a use of force under Article 2(4) of the United Nations Charter / Daniel B. Silver -- Computer network attacks and self-defense / Yoram Dinstein -- Self-defense against computer network attack under international law / Horace B. Robertson, Jr.-- Computer networks, proportionality, and military operations / James H. Doyle, Jr.-- Some thoughts on computer network attack and the international law of armed conflict / Louise Doswald-Beck -- Wired warfare : computer network attack and the jus in bello / Michael N. Schmitt -- Proportionality, cyberwar, and the law of war / Ruth G. Wedgwood -- Neutrality and information warfare / George K. Walker -- Information operations in the space law arena : science fiction becomes reality / Douglas S. Anderson and Christopher R. Dooley -- Fourth dimensional intelligence : thoughts on espionage, law, and cyberspace / David M. Crane -- Computer network attacks by terrorists : some legal dimensions / John F. Murphy -- Meeting the challenge of cyberterrorism : defining the military role in a democracy / Charles J. Dunlap, Jr.-- "Weapons like to lightning" US information operations and US treaty obligations / Jeffrey H. Smith and Gordon N. Lederman -- International law of armed conflict and computer network attack : developing the rules of engagement / Brian T. O'Donnell and James C. Kraska .-- Responding to attacks on critical computer infrastructure : what targets? what rules of engagement? / James P. Terry -- Is it time for a treaty on information warfare? / Phillip A. Johnson. ; Mode of access: Internet.
BASE
Defence date: 9 November 2016 ; Examining Board: Professor Nehal Bhuta, European University Institute (EUI Supervisor); Professor Jean d'Aspremont, University of Manchester; Professor Marco Roscini, University of Westminster; Professor Joseph H. H. Weiler, European University Institute & New York University ; This doctoral dissertation investigates the wide range of conceptualizations and categorizations that are applicable to state-sponsored cyber operations. State-sponsored cyber operations, namely recourse to cyber means by one State against another, are generally labelled 'cyber warfare'. This is neither a legal nor a prescriptive term; it reflects, however, a disproportionate focus on the realm of warfare. Avoiding hasty or overly simplistic characterizations of situations as cyber warfare is important to avoid further deterioration of their relations leading potentially to military escalation. This dissertation defines state-sponsored cyber operations according to international law and demonstrates that the majority of these incidents fall outside of the realm of (cyber) warfare and, therefore, need to be addressed separately and approached differently. Most state-sponsored cyber operations do not actually violate the prohibition of the use of force or the law of armed conflict, but rather they impinge the territorial sovereignty of the targeted States, the principle of nonintervention, or human rights. Cyber warfare is only the tip of the iceberg. An entire world lies submerged: cyber operations below the threshold of cyber warfare. While the emerged part concerning cyber warfare is well-studied and widely known, this thesis endeavours to shed light on the submerged, and arguably bigger, part that has been understudied and is less known. Parts I and II map the circumstances in which state-sponsored cyber operations violate international law. They demonstrate inter alia that most cyber operations remain under the threshold of cyber warfare, while they may constitute a breach of territorial sovereignty, the principle of non-intervention or even human rights law in most cases. Part I also analyzes the duty of diligence of third States. Part III deals with the attribution of cyber operations, analysing the attribution to the machine, to the human perpetrator, and focusing more specifically on the attribution to the sponsoring State. Part IV focuses on the consequences of an internationally wrongful cyber operation, mainly the obligations deriving from the law of State responsibility, and the remedies to address it, notably the recourse to self-defence, retorsion and countermeasures.
BASE
In: New York University journal of international law & politics, Band 34, Heft 1, S. 57-113
ISSN: 0028-7873
In: Oxford scholarship online
Fifteen years into the era of 'cyber warfare,' are we any closer to understanding the role a major cyberattack would play in international relations - or to preventing one? Uniquely spanning disciplines and enriched by the insights of a leading practitioner, Rethinking Cyber Warfare provides a fresh understanding of the role that digital disruption plays in contemporary international security.
In: International law studies series 87
Tallinn Manual 2.0 expands on the highly influential first edition by extending its coverage of the international law governing cyber operations to peacetime legal regimes. The product of a three-year follow-on project by a new group of twenty renowned international law experts, it addresses such topics as sovereignty, state responsibility, human rights, and the law of air, space, and the sea. Tallinn Manual 2.0 identifies 154 'black letter' rules governing cyber operations and provides extensive commentary on each rule. Although Tallinn Manual 2.0 represents the views of the experts in their personal capacity, the project benefitted from the unofficial input of many states and over fifty peer reviewers.
In: Politische Studien: Orientierung durch Information und Dialog, Band 54, Heft 391, S. 84-92
ISSN: 0032-3462
Vor dem Hintergrund der Tatsache, dass Information Warfare in den letzten Jahren, vor allem durch das Internet, zu einem globalen Problem von sicherheitspolitischer Bedeutung geworden ist, behandelt der Beitrag verschiedene Möglichkeiten und Methoden von Information Warfare, angefangen von Computerviren über Spionagetechniken bis hin zum Einsatz von Computer-Mäusen oder Computer-Küchenschaben. Thematisiert werden auch die diversen Internet-Aktivitäten terroristischer Vereinigungen und die Frage, inwiefern Information Warfare, d.h. ein Krieg mit elektronischen Mitteln, nach dem heutigen Kriegsrecht überhaupt als Krieg zu werten ist. Darüber gibt es gegenwärtig zwar eine internationale Debatte, aber keine einheitliche Auffassung. Ausgehend von der in vielen Staaten unterschätzten, jedoch realen Gefahr von Information Warfare wird im weiteren Verlauf ein Überblick über die bisher in der Vergangenheit stattgefundenen Angriffe auf Computersysteme und elektronische Spionageversuche auf internationaler Ebene gegeben. Abschließende Überlegungen befassen sich mit Möglichkeiten, wie man sich gegen Gefahren und Viren aus dem Internet schützen kann. (ICH)
In: Aus Politik und Zeitgeschichte: APuZ, Heft 30/31, S. 24-32
ISSN: 2194-3621
"Das Internet als globales Kommunikationsnetzwerk ist diversen Gefährdungen ausgesetzt. Nichtstaatliche Akteure wie experimentierfreudige Programmierer, aber auch Terroristen und Kriminelle, in erster Linie jedoch Staaten beteiligen sich an der so genannten Information Warfare, die sich modernster Technik bedient und in militärischen Konflikten zu Tod und Zerstörung führen kann. Völkerrecht und Abrüstungspolitik stehen vor neuen Fragen." (Autorenreferat)
SSRN
Working paper
In: Revue internationale de la Croix-Rouge: débat humanitaire, droit, politiques, action = International Review of the Red Cross, Band 82, Heft 837, S. 205-216
ISSN: 1607-5889
Depuis quelques années, une nouvelle notion est appame dans le
vocabulaire des personnes s'intéressant aux affaires militaires et de
sécurité internationale: la guerre des systèmes d'information ou, en
anglais, Information Warfare. Cette méthode de
guerre permet à un belligérant d'affecter et de perturber les programmes
informatiques de l'adversaire, par exemple en modifiant les données qui
devraient guider un missile dit «intelligent» vers son objectif. L'auteur en
examine différents aspects, notamment sous l'angle du droit international
humanitaire en vigueur. Il conclue que la récente décision des Nations Unies
de s'intéresser à ce sujet est fondée et nécessaire.
In: International studies: journal of the School of International Studies, Jawaharlal Nehru University, Band 9, S. 103-127
ISSN: 0020-8817