Cyber Warfare and the Laws of War.
An analysis of the status of computer network attacks in international law.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Cambridge :
Cambridge University Press,
2012.
|
Colección: | Cambridge studies in international and comparative law.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Cyber Warfare and the Laws of War; Series; Title; Copyright; Dedication; Contents; Acknowledgements; Table of cases; List of abbreviations; 1: The world in which we live and fight; 1. Computer network attacks; 2. Law and war in the internet age; 3. Societal trends generally; 3.1. The information revolution and digitisation; 3.1.1. Ubiquity; 3.1.2. Amount; 3.1.3. Societal change; 3.1.4. Organisational change; 3.2. Globalisation, interdependency and the changing world order; 3.3. The rise of the knowledge economy; 4. Military trends; 4.1. A change of purpose.
- 4.2. Network-centric warfare and effects-based operations4.3. Outsourcing and civilianisation; 5. Terminology and definitions; 5.1. New laws for old?; 5.2. Methodology; 5.3. A word about examples and hypotheticals; 6. Conclusion; PART I: Jus ad bellum; 2 Computer network attacks as a use of force in international law; 1. Force defined as armed force; The Charter wording; Travaux préparatoires and historical background; Subsequent iterations of the rule; 2. Definition of armed force; 2.1. State actions; 2.2. Theories of force
- scholastic writings; 3. Computer network attacks as a use of force.
- 3.1. Characteristics of computer network attacks3.1.1. Indirectness; 3.1.2. Intangibility; Target intangibility; Weapons intangibility; 3.1.3. Locus; 3.1.4. Result; 4. Conclusion; 3 Armed attack and response in the digital age; 1. Armed attack; 1.1. Anticipatory self-defence; 1.1.1. Doctrinal debate and imminent attacks; 1.1.2. State practice; 1.1.3. Computer network attacks and anticipatory self-defence; 1.1.4. The 'Bush doctrine' of pre-emptive self-defence65; 1.2. Pinprick attacks or accumulation of events theory; 2. Self-defence against non-state actors; 3. Attribution.
- 4. Necessity and proportionality5. Countermeasures against unlawful acts; 6. Security Council authorisation and collective measures; 7. Conclusion; PART II: Jus in bello; 4 The applicability of the laws of armed conflict to computer network attacks; 1. Armed conflict; 1.1. The requirement of armed force; 1.2. Intervention of the armed forces; 2. Application to computer network attacks; 2.1. Application during conventional armed conflict; 2.2. Computer network attack on its own; 2.2.1. Armed force; 2.2.2. Humanitarian principles; 2.3. Computer network attacks in support of conventional attacks.
- 3. Territory4. Conclusion; 5 Participants in conflict: combatant status, direct participation and computer network attack; 1. Combatant status; 1.1. Requirements of combatant status; 1.1.1. Responsible command; 1.1.2. Distinction; 1.1.3. Compliance, organisation, belonging and allegiance; 1.2. Saboteurs and spies; 1.2.1. Sabotage; 1.2.2. Espionage; 2. Direct participation by civilians; 2.1. Requirements of direct participation; 2.1.1. Earlier scholarship; 2.1.2. The ICRC interpretive guidance; 2.2. Offensive computer network attack; 2.3. Computer network attack system support.