Wired Warfare: Difference between revisions

From Cybersecurity Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 5: Line 5:
Michael N. Schmitt, ''Wired Warfare: Computer Network Attack and jus in bello,'' 84 Int'l Rev. Red Cross 396, no. 846 (2002).  [http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf  ''Web'']
Michael N. Schmitt, ''Wired Warfare: Computer Network Attack and jus in bello,'' 84 Int'l Rev. Red Cross 396, no. 846 (2002).  [http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/5C5D5C/$File/365_400_Schmitt.pdf  ''Web'']


[http://cyber.law.harvard.edu/cybersecurity/edit/Special:Bibliography?view=&key=Schmitt_MN:2002&start=1&nr=1&f=wikibiblio.bib BibTeX]
[http://cyber.law.harvard.edu/cybersecurity/Special:Bibliography?view=&key=Schmitt_MN:2002&start=1&nr=1&f=wikibiblio.bib BibTeX]


==Categorization==
==Categorization==

Revision as of 14:56, 19 May 2010

Wired Warfare: Computer Network Attack and jus in bello

Full Citation

Michael N. Schmitt, Wired Warfare: Computer Network Attack and jus in bello, 84 Int'l Rev. Red Cross 396, no. 846 (2002). Web

BibTeX

Categorization

Issues: Laws of War/Cyberwar

Key Words

See the article itself for any key words as a starting point

Synopsis

Information warfare is set to revolutionize armed conflict. A computer network attack is any operation intended to disrupt, deny, degrade or destroy information held in computers or computer networks. This article examines the use of such attacks in international armed conflict, where their ramifications could be far-reaching. It starts out by analysing the applicability of international humanitarian law to computer network attacks, moving on to examine the legal effect of this body of law on the use of such attacks as a method of warfare. Certain experts are of the opinion that while humanitarian law contains no explicit rules concerning attacks on data networks, and while such attacks are not kinetic (i.e. not “armed” attacks as such), humanitarian law does apply given its underlying purpose, which is to protect civilians and their property. When an attack on a data network is intended to endanger protected persons or objects – or runs the risk of doing so – humanitarian law becomes applicable, and such attacks fall under jus in bello. In analysing the legality of computer network attacks from the perspective of humanitarian law, the author highlights the underlying (and unresolved) legal issues involved and raises important questions concerning the definition of “armed conflict” and the capability of international humanitarian law to control means and methods of warfare that are both new and – from a conceptual point of view – interesting.

Policy Relevance

Policy and Legal Implications, relevant law.

Case Examples

Additional Notes and Highlights

* Outline key points of interest

* Include quotes if relevant/useful
* Consider how these themes relate to other cases, broader thematic areas, etc