Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Air gaps (1)
- Attribution (1)
- Causation (1)
- Critical infrastructure (1)
- Cyber attack (1)
-
- Cyberattack (1)
- Cybersecurity (1)
- Cyberwar (1)
- Cyberwarfare (1)
- Cyberweapons (1)
- Digital warfare (1)
- Geneva Convention (1)
- Independent Group of Experts (IGE) (1)
- International humanitarian law (1)
- Jus ad bellum (1)
- Jus in bello (1)
- Kill switches (1)
- Law of armed conflict (1)
- Law of war (1)
- Laws of war (1)
- National security (1)
- Proximate cause (1)
- Regulatory regimes (1)
- Unrestricted Warfare (1)
Articles 1 - 2 of 2
Full-Text Articles in International Relations
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
All Faculty Scholarship
Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …