Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
Adapting The Law Of Armed Conflict To Autonomous Weapon Systems, Kenneth Anderson, Daniel Reisner, Matthew C. Waxman
Adapting The Law Of Armed Conflict To Autonomous Weapon Systems, Kenneth Anderson, Daniel Reisner, Matthew C. Waxman
Faculty Scholarship
Weapon systems are becoming increasingly automated and arguably some autonomous military systems have been deployed for years. Recent advances in automated systems and the possibilities they portend have generated interest and anxiety within some militaries and defense ministries, and a movement of non-governmental activists seeking to ban fully autonomous weapons. In May 2014, the High Contracting Parties of the UN Convention on Certain Conventional Weapons (CCW) convened an extensive discussion of the legal and ethical issues that autonomous weapons raise, while recognizing that many of these problems lie at an uncertain point in the future.
It is important that normative …
Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman
Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman
Faculty Scholarship
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …