author_facet Schmitt, Michael N.
Schmitt, Michael N.
author Schmitt, Michael N.
spellingShingle Schmitt, Michael N.
International Review of the Red Cross
Wired warfare 3.0: Protecting the civilian population during cyber operations
Law
Sociology and Political Science
author_sort schmitt, michael n.
spelling Schmitt, Michael N. 1816-3831 1607-5889 Cambridge University Press (CUP) Law Sociology and Political Science http://dx.doi.org/10.1017/s1816383119000018 <jats:title>Abstract</jats:title><jats:p>As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that their effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.</jats:p> Wired warfare 3.0: Protecting the civilian population during cyber operations International Review of the Red Cross
doi_str_mv 10.1017/s1816383119000018
facet_avail Online
Free
finc_class_facet Rechtswissenschaft
Soziologie
format ElectronicArticle
fullrecord blob:ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMTAxNy9zMTgxNjM4MzExOTAwMDAxOA
id ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMTAxNy9zMTgxNjM4MzExOTAwMDAxOA
institution DE-D275
DE-Bn3
DE-Brt1
DE-Zwi2
DE-D161
DE-Gla1
DE-Zi4
DE-15
DE-Pl11
DE-Rs1
DE-105
DE-14
DE-Ch1
DE-L229
imprint Cambridge University Press (CUP), 2019
imprint_str_mv Cambridge University Press (CUP), 2019
issn 1816-3831
1607-5889
issn_str_mv 1816-3831
1607-5889
language English
mega_collection Cambridge University Press (CUP) (CrossRef)
match_str schmitt2019wiredwarfare30protectingthecivilianpopulationduringcyberoperations
publishDateSort 2019
publisher Cambridge University Press (CUP)
recordtype ai
record_format ai
series International Review of the Red Cross
source_id 49
title Wired warfare 3.0: Protecting the civilian population during cyber operations
title_unstemmed Wired warfare 3.0: Protecting the civilian population during cyber operations
title_full Wired warfare 3.0: Protecting the civilian population during cyber operations
title_fullStr Wired warfare 3.0: Protecting the civilian population during cyber operations
title_full_unstemmed Wired warfare 3.0: Protecting the civilian population during cyber operations
title_short Wired warfare 3.0: Protecting the civilian population during cyber operations
title_sort wired warfare 3.0: protecting the civilian population during cyber operations
topic Law
Sociology and Political Science
url http://dx.doi.org/10.1017/s1816383119000018
publishDate 2019
physical 333-355
description <jats:title>Abstract</jats:title><jats:p>As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that their effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.</jats:p>
container_issue 910
container_start_page 333
container_title International Review of the Red Cross
container_volume 101
format_de105 Article, E-Article
format_de14 Article, E-Article
format_de15 Article, E-Article
format_de520 Article, E-Article
format_de540 Article, E-Article
format_dech1 Article, E-Article
format_ded117 Article, E-Article
format_degla1 E-Article
format_del152 Buch
format_del189 Article, E-Article
format_dezi4 Article
format_dezwi2 Article, E-Article
format_finc Article, E-Article
format_nrw Article, E-Article
_version_ 1792331103930941445
geogr_code not assigned
last_indexed 2024-03-01T13:35:39.765Z
geogr_code_person not assigned
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Wired+warfare+3.0%3A+Protecting+the+civilian+population+during+cyber+operations&rft.date=2019-04-01&genre=article&issn=1607-5889&volume=101&issue=910&spage=333&epage=355&pages=333-355&jtitle=International+Review+of+the+Red+Cross&atitle=Wired+warfare+3.0%3A+Protecting+the+civilian+population+during+cyber+operations&aulast=Schmitt&aufirst=Michael+N.&rft_id=info%3Adoi%2F10.1017%2Fs1816383119000018&rft.language%5B0%5D=eng
SOLR
_version_ 1792331103930941445
author Schmitt, Michael N.
author_facet Schmitt, Michael N., Schmitt, Michael N.
author_sort schmitt, michael n.
container_issue 910
container_start_page 333
container_title International Review of the Red Cross
container_volume 101
description <jats:title>Abstract</jats:title><jats:p>As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that their effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.</jats:p>
doi_str_mv 10.1017/s1816383119000018
facet_avail Online, Free
finc_class_facet Rechtswissenschaft, Soziologie
format ElectronicArticle
format_de105 Article, E-Article
format_de14 Article, E-Article
format_de15 Article, E-Article
format_de520 Article, E-Article
format_de540 Article, E-Article
format_dech1 Article, E-Article
format_ded117 Article, E-Article
format_degla1 E-Article
format_del152 Buch
format_del189 Article, E-Article
format_dezi4 Article
format_dezwi2 Article, E-Article
format_finc Article, E-Article
format_nrw Article, E-Article
geogr_code not assigned
geogr_code_person not assigned
id ai-49-aHR0cDovL2R4LmRvaS5vcmcvMTAuMTAxNy9zMTgxNjM4MzExOTAwMDAxOA
imprint Cambridge University Press (CUP), 2019
imprint_str_mv Cambridge University Press (CUP), 2019
institution DE-D275, DE-Bn3, DE-Brt1, DE-Zwi2, DE-D161, DE-Gla1, DE-Zi4, DE-15, DE-Pl11, DE-Rs1, DE-105, DE-14, DE-Ch1, DE-L229
issn 1816-3831, 1607-5889
issn_str_mv 1816-3831, 1607-5889
language English
last_indexed 2024-03-01T13:35:39.765Z
match_str schmitt2019wiredwarfare30protectingthecivilianpopulationduringcyberoperations
mega_collection Cambridge University Press (CUP) (CrossRef)
physical 333-355
publishDate 2019
publishDateSort 2019
publisher Cambridge University Press (CUP)
record_format ai
recordtype ai
series International Review of the Red Cross
source_id 49
spelling Schmitt, Michael N. 1816-3831 1607-5889 Cambridge University Press (CUP) Law Sociology and Political Science http://dx.doi.org/10.1017/s1816383119000018 <jats:title>Abstract</jats:title><jats:p>As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that their effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.</jats:p> Wired warfare 3.0: Protecting the civilian population during cyber operations International Review of the Red Cross
spellingShingle Schmitt, Michael N., International Review of the Red Cross, Wired warfare 3.0: Protecting the civilian population during cyber operations, Law, Sociology and Political Science
title Wired warfare 3.0: Protecting the civilian population during cyber operations
title_full Wired warfare 3.0: Protecting the civilian population during cyber operations
title_fullStr Wired warfare 3.0: Protecting the civilian population during cyber operations
title_full_unstemmed Wired warfare 3.0: Protecting the civilian population during cyber operations
title_short Wired warfare 3.0: Protecting the civilian population during cyber operations
title_sort wired warfare 3.0: protecting the civilian population during cyber operations
title_unstemmed Wired warfare 3.0: Protecting the civilian population during cyber operations
topic Law, Sociology and Political Science
url http://dx.doi.org/10.1017/s1816383119000018