Difference between revisions of "Wired Warfare"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 9: Line 9:
 
==Categorization==
 
==Categorization==
  
Issues: [[Laws of War/Cyberwar]]
+
* Issues: [[Laws of War/Cyberwar]]
  
 
==Key Words==  
 
==Key Words==  
  
''See the article itself for any key words as a starting point''
 
  
 
==Synopsis==
 
==Synopsis==
  
 
Information warfare is set to revolutionize armed conflict. A computer network attack is any operation intended to disrupt, deny, degrade or destroy information held in computers or computer networks. This article examines the use of such attacks in international armed conflict, where their ramifications could be far-reaching. It starts out by analysing the applicability of international humanitarian law to computer network attacks, moving on to examine the legal effect of this body of law on the use of such attacks as a method of warfare. Certain experts are of the opinion that while humanitarian law contains no explicit rules concerning attacks on data networks, and while such attacks are not kinetic (i.e. not “armed” attacks as such), humanitarian law does apply given its underlying purpose, which is to protect civilians and their property. When an attack on a data network is intended to endanger protected persons or objects – or runs the risk of doing so – humanitarian law becomes applicable, and such attacks fall under jus in bello. In analysing the legality of computer network attacks from the perspective of humanitarian law, the author highlights the underlying (and unresolved) legal issues involved and raises important questions concerning the definition of “armed conflict” and the capability of international humanitarian law to control means and methods of warfare that are both new and – from a conceptual point of view – interesting.
 
Information warfare is set to revolutionize armed conflict. A computer network attack is any operation intended to disrupt, deny, degrade or destroy information held in computers or computer networks. This article examines the use of such attacks in international armed conflict, where their ramifications could be far-reaching. It starts out by analysing the applicability of international humanitarian law to computer network attacks, moving on to examine the legal effect of this body of law on the use of such attacks as a method of warfare. Certain experts are of the opinion that while humanitarian law contains no explicit rules concerning attacks on data networks, and while such attacks are not kinetic (i.e. not “armed” attacks as such), humanitarian law does apply given its underlying purpose, which is to protect civilians and their property. When an attack on a data network is intended to endanger protected persons or objects – or runs the risk of doing so – humanitarian law becomes applicable, and such attacks fall under jus in bello. In analysing the legality of computer network attacks from the perspective of humanitarian law, the author highlights the underlying (and unresolved) legal issues involved and raises important questions concerning the definition of “armed conflict” and the capability of international humanitarian law to control means and methods of warfare that are both new and – from a conceptual point of view – interesting.
 
==Policy Relevance==
 
 
''Policy and Legal Implications, relevant law.
 
 
==Case Examples==
 
  
 
==Additional Notes and Highlights==
 
==Additional Notes and Highlights==
 
'' * Outline key points of interest
 
* Include quotes if relevant/useful
 
* Consider how these themes relate to other cases, broader thematic areas, etc''
 

Revision as of 20:34, 21 May 2010

Wired Warfare: Computer Network Attack and jus in bello

Full Citation

Michael N. Schmitt, Wired Warfare: Computer Network Attack and jus in bello, 84 Int'l Rev. Red Cross 396, no. 846 (2002). Web

BibTeX

Categorization

Key Words

Synopsis

Information warfare is set to revolutionize armed conflict. A computer network attack is any operation intended to disrupt, deny, degrade or destroy information held in computers or computer networks. This article examines the use of such attacks in international armed conflict, where their ramifications could be far-reaching. It starts out by analysing the applicability of international humanitarian law to computer network attacks, moving on to examine the legal effect of this body of law on the use of such attacks as a method of warfare. Certain experts are of the opinion that while humanitarian law contains no explicit rules concerning attacks on data networks, and while such attacks are not kinetic (i.e. not “armed” attacks as such), humanitarian law does apply given its underlying purpose, which is to protect civilians and their property. When an attack on a data network is intended to endanger protected persons or objects – or runs the risk of doing so – humanitarian law becomes applicable, and such attacks fall under jus in bello. In analysing the legality of computer network attacks from the perspective of humanitarian law, the author highlights the underlying (and unresolved) legal issues involved and raises important questions concerning the definition of “armed conflict” and the capability of international humanitarian law to control means and methods of warfare that are both new and – from a conceptual point of view – interesting.

Additional Notes and Highlights