TITLE

CYBER WARFARE OPERATIONS: DEVELOPMENT AND USE UNDER INTERNATIONAL LAW

AUTHOR(S)
SCHAAP, ARIE J.
PUB. DATE
June 2009
SOURCE
Air Force Law Review;2009, Vol. 64, p121
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The article presents a discussion of the development and use of cyber warfare operations under international law. The U.S. Strategic Command(USSTRATCOM) ensures freedom of action in cyberspace and delivers integrated kinetic and non-kinetic effects in support of Joint Force Commander operations. Deleting military files and inserting malicious code in military communications networks are examples of cyber warfare operations that cause permanent damage.
ACCESSION #
45162334

 

Related Articles

  • War and Ethics in Cyberspace: Cyber-Conflict and Just War Theory. Liaropoulos, Andrew // Proceedings of the European Conference on Information Warfare & ;2010, p177 

    Over the last two decades there is a growing body of literature over exploiting cyberspace for offensive and defensive purposes. Cyber-conflict is after all the newest mode of warfare and cyber-weapons have been described as weapons of mass disruption. Although the attention on the technical and...

  • Cyber Center of Excellence generates new doctrine. Fairbank, Edie M. // Army Communicator;Spring2014, Vol. 39 Issue 1, p11 

    The article focuses on the necessity of new military doctrine following the transition of the Signal Center of Excellence to the Cyber Center of Excellence of the U.S. Army. Noted is the consolidation of the force modernization proponent responsibilities for signal and communications information...

  • CYBERWARFARE AND THE USE OF FORCE GIVING RISE TO THE RIGHT OF SELF-DEFENSE. HOISINGTON, MATTHEW // Boston College International & Comparative Law Review;3/1/2009, Vol. 32 Issue 2, p439 

    Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via cyberspace strains traditional definitions...

  • EPLRS: Backbone of the tactical network. Auletta, John // Army Communicator;Summer97, Vol. 22 Issue 3, p28 

    Focuses on the use of data-capable radios in linking computer systems to create a wide-area network or `tactical Internet' at the Task Force XXI experiment of the US Army. Background on the enhanced position-location reporting system (ELPRS); Network control station (NCS) requirement of the...

  • Letters.  // Army Magazine;Dec2014, Vol. 64 Issue 12, p4 

    Several letters to editor are presented in response to articles in previous issues on topics including "No Boots on the Ground' is a Mantra, Not a Strategy" in the September 2014 issue, one on the attributes of cyberspace, and one on the article "Schlieffen's Perfect Plan" in the August 2014 issue.

  • CYBER WARS: APPLYING CONVENTIONAL LAWS OF WAR TO CYBER WARFARE AND NON-STATE ACTORS. Roberts, Shaun // Northern Kentucky Law Review;2014, Vol. 41 Issue 3, p535 

    The article focuses on the role of conventional laws of warfare in the regulation of cyber warfare. Topics discussed include laws for the regulation of damages caused due to cyber warfare and cyber attacks, the role of the cyber attacks in hampering the communication thus causing destruction,...

  • COTS versus GOTS: Risk management is the key. Peeples, Don; Rimpo, April // Journal of Electronic Defense;Jan99, Vol. 22 Issue 1, p51 

    Provides information pertaining to cryptography. Commercial-off-the-Shelf (COTS) versus Government-Off-The Shelf (GOTS); Evolution of cryptography; Difference between COTS and GOTS software; Risk management; Factors to consider in applying COTS or GOTS solutions; Information security...

  • Sly Fox. Nunn, Matthew J. // Military Intelligence Professional Bulletin;Oct/Dec2003, Vol. 29 Issue 4, p71 

    Focuses on the training of the All-Source Analysis System Master Analyst in Communications Architecture. Factors to be considered by the master analyst in building Communications Architecture in the U.S.; Elements of the Communications Architecture; Protocols that are important to the master...

  • Signal unit provides eyes and ears in `Triple Strike.' Hicks-Callaway, Vanessa // Army Communicator;Spring98, Vol. 23 Issue 2, p44 

    Reports that Company A, 57th Signal Battalion convoyed to Fort Bliss, Texas, to provide communication support to 31st Air Defense Artillery Battalion in an exercise called `Triple Strike.' Mission of the Company A; Role of 313th Tactical Satellite Company (TACSAT) for Triple Strike; Details on...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics