Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-5nwft Total loading time: 0 Render date: 2024-05-24T19:34:29.448Z Has data issue: false hasContentIssue false

Introduction

Published online by Cambridge University Press:  28 November 2017

Get access

Summary

‘The mission of the United States Air Force is to fly, fight and

win … in air, space and cyberspace

United States Air Force Mission Statement

RESEARCH QUESTION

The last two decades have witnessed the spread of the Internet into manifold fields of daily life, both obvious and unnoticed. On the one hand the growing pervasiveness of networked information and communications technology has been a driving force of global economic growth and as a result Internet access is today seen as an enabling factor for human development. On the other hand the ability of any networked device to receive communications requests has introduced in many fields new vulnerabilities and possibilities for the exploitation of those vulnerabilities.

By adopting methods initially created by individual hackers, militaries now regard the Internet as a new domain of warfare and devices linked therewith as potential military objectives. The ability to also project military strength via the Internet has therefore become a goal for most militaries and led ever more States to establish special units within their armed forces tasked with defensive and offensive computer network operations.

From the outset it is clear that the relevant rules of international law applicable both during armed conflict and in peacetime could not anticipate the emergence of this novel form of operation. This holds true both for the Charter of the United Nations as well as for the most recent noteworthy codifications of humanitarian law – the 1977 Additional Protocols I and II to the Geneva Conventions of 1949. The main question of this study is therefore whether these frameworks also apply to military computer network operations and if so, whether they provide a sufficient basis to regulate and limit these operations in order to safeguard the rules’ protective purposes. It might even be the case that there have already been rules on this established under customary international law.

Both the literature and governmental statements or media reports reflect a high level of uncertainty when confronted with a legal appraisal of the novelty of computer network operations. Many share the view that the UN Charter is an outdated instrument unable to cope with this new type of military operation, claiming that these operations take place in a legal vacuum, and thereby calling for a complete ban thereof or at least the drafting of a specific cyber warfare convention.

Type
Chapter
Information
Cyber Warfare
Military Cross-Border Computer Network Operations under International Law
, pp. 1 - 6
Publisher: Intersentia
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×