Imagine a civilian communications system is being temporarily relied upon by an opposing military force for vital operations. If one launches a computer network attack against the communications system, the operation may disable the opposing force’s ability to function adequately and, as a result, prompt their surrender. The alternative course of action is to launch a traditional kinetic weapons attack in the hopes of inflicting enough casualties on the troops to induce surrender. Given these options, the law of war would encourage the utilization of the computer network attack because it would result in less unnecessary suffering. But is the same true if we are unsure of the collateral consequences of the computer network attack on a large...
Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics hold...
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum a...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Imagine a civilian communications system is being temporarily relied upon by an opposing military fo...
Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated n...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
This Article examines Information Warfare--that is, actions taken to affect adversary information an...
Computer networks create tremendously increased capabilities but also represent equally increased vu...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
This article presents a novel way to conceptualize the protection of data in situations of armed con...
The ever-growing interconnectivity of industry and infrastructure through cyberspace has increased t...
Since the first attempts by states to use law to regulate armed conflict, legal constraints have oft...
On February 19, 2018, United Nations Secretary-General Antonio Guterres claimed that he was “absolut...
Since the first attempts by states to use law to regulate armed conflict, legal constraints have oft...
Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics hold...
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum a...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...
Imagine a civilian communications system is being temporarily relied upon by an opposing military fo...
Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated n...
This is the author accepted manuscript. The final version is available from Cambridge University Pre...
As a general matter, international humanitarian law is up to the task of providing the legal framewo...
This Article examines Information Warfare--that is, actions taken to affect adversary information an...
Computer networks create tremendously increased capabilities but also represent equally increased vu...
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state a...
This article presents a novel way to conceptualize the protection of data in situations of armed con...
The ever-growing interconnectivity of industry and infrastructure through cyberspace has increased t...
Since the first attempts by states to use law to regulate armed conflict, legal constraints have oft...
On February 19, 2018, United Nations Secretary-General Antonio Guterres claimed that he was “absolut...
Since the first attempts by states to use law to regulate armed conflict, legal constraints have oft...
Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics hold...
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum a...
Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflic...