Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2009

Military, War, and Peace

Brigham Young University Law School

Articles 1 - 1 of 1

Full-Text Articles in Law

Cyber Warfare And Precautions Against The Effects Of Attacks, Eric Talbot Jensen Dec 2009

Cyber Warfare And Precautions Against The Effects Of Attacks, Eric Talbot Jensen

Faculty Scholarship

Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated networks. Additionally, the government relies almost completely on civilian providers for computer software and hardware products, services, and maintenance. This near-complete intermixing of civilian and military computer infrastructure makes many of those civilian objects and providers legitimate targets under the law of armed conflict. Other civilian networks, services, and communications may suffer collateral damage from legitimate attacks on government targets. To protect those civilian objects and providers from the effects of attacks, the law of armed conflict requires a state to segregate its military assets from the civilian population and …