Amazon Price: N/A (as of April 24, 2017 11:53 –
The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.
Amazon Price: $42.50 $32.68 You save: $9.82 (23%). (as of April 23, 2017 15:47 –
The internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And does a state have a right to self-defence when cyber attacked? With the range and sophistication of cyber attacks against states showing a dramatic increase in recent times, this book investigates the traditional concepts of 'use of force', 'armed attack', and 'armed conflict' and asks whether existing laws created for analogue technologies can be applied to new digital developments.
The book provides a comprehensive analysis of primary documents and surrounding literature, to investigate whether and how existing rules on the use of force in international law apply to a relatively new phenomenon such as cyberspace operations. It assesses the rules of jus ad bellum and jus in bello, whether based on treaty or custom, and analyses why each rule applies or does not apply to cyber operations. Those rules which can be seen to apply are then discussed in the context of each specific type of cyber operation. The book addresses the key questions of whether a cyber operation amounts to the use of force and, if so, whether the victim state can exercise its right of self-defence; whether cyber operations trigger the application of international humanitarian law when they are not accompanied by traditional hostilities; what rules must be followed in the conduct of cyber hostilities; how neutrality is affected by cyber operations; whether those conducting cyber operations are combatants, civilians, or civilians taking direct part in hostilities. The book is essential reading for everyone wanting a better understanding of how international law regulates cyber combat.
Amazon Price: N/A (as of April 23, 2017 16:19 –
In 2011, Nasser Al-Awlaki, a terrorist on the US 'kill list' in Yemen, was targeted by the CIA. A week later, a military strike killed his son. The following year, the US Ambassador to Pakistan resigned, undermined by CIA-conducted drone strikes of which he had no knowledge or control. The demands of the new, borderless 'gray area' conflict have cast civilians and military into unaccustomed roles with inadequate legal underpinning. As the Department of Homeland Security defends against cyber threats and civilian contractors work in paramilitary roles abroad, the legal boundaries of war demand to be outlined. In this book, former Under Secretary of the Air Force Antonia Chayes examines these new 'gray areas' in counterinsurgency, counter-terrorism and cyber warfare. Her innovative solutions for role definition and transparency will establish new guidelines in a rapidly evolving military-legal environment.
Amazon Price: $255.00 $174.33 You save: $80.67 (32%). (as of April 24, 2017 01:23 –
This timely Research Handbook contains an analysis by leading scholars and practitioners of various legal questions concerning cyberspace and cyber activities. Comprehensive and thorough, it succeeds in mapping out the range of international rules that apply to cyberspace and to specific cyber activities, assesses their regulatory efficacy and offers insightful suggestions, where necessary, for revised standards.
Contributors examine the application of fundamental international law principles to cyberspace such as the principle of sovereignty, jurisdiction, state responsibility, individual criminal responsibility, human rights and intellectual property rights. They explore the application of international rules to cyber terrorism, cyber espionage, cyber crime, cyber attacks and to cyber war. They deal with the meaning of cyber operations, the ethics of cyber operations as well as with cyber deterrence. Finally, they comment on the cyber security policies of international and regional institutions such as those of the United Nations, the European Union, NATO and of Asian-Pacific institutions.