The Legal Limits of Targeting the Cyber Capabilities of a Neutral State
Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Report |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Williams,Ja Rai A |
description | Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With its focus on defensive operations, the U.S. military appears to be less prepared to act offensively. In Cyber War, Richard A. Clarke and Robert K. Knake wrote there is no conventional military force in the world superior to that of the U.S., assuming that the U.S. military is not blinded or disconnected by a cyber attack. |
format | Report |
fullrecord | <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_AD1031399</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>AD1031399</sourcerecordid><originalsourceid>FETCH-dtic_stinet_AD10313993</originalsourceid><addsrcrecordid>eNrjZHAPyUhV8ElNT8xR8MnMzSwpVshPUwhJLEpPLcnMS1coAco6VyalFik4JxYkJmXmZJZkpoLVJCr4pZaWFAH1BZcklqTyMLCmJeYUp_JCaW4GGTfXEGcP3ZSSzOT4YqBhqSXxji6GBsaGxpaWxgSkAcHCL6A</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>The Legal Limits of Targeting the Cyber Capabilities of a Neutral State</title><source>DTIC Technical Reports</source><creator>Williams,Ja Rai A</creator><creatorcontrib>Williams,Ja Rai A ; Air Command and Staff College, Air University Maxwell Air Force Base United States</creatorcontrib><description>Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With its focus on defensive operations, the U.S. military appears to be less prepared to act offensively. In Cyber War, Richard A. Clarke and Robert K. Knake wrote there is no conventional military force in the world superior to that of the U.S., assuming that the U.S. military is not blinded or disconnected by a cyber attack.</description><language>eng</language><subject>civilian population ; collateral damage ; computer networks ; Computer Systems Management and Standards ; Cyber Capabilities ; cyberattacks ; data acquisition ; denial of service attack ; department of defense ; electrical grids ; global positioning systems ; infrastructure ; international law ; Sociology and Law</subject><creationdate>2015</creationdate><rights>Approved For Public Release</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27567,27568</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/AD1031399$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Williams,Ja Rai A</creatorcontrib><creatorcontrib>Air Command and Staff College, Air University Maxwell Air Force Base United States</creatorcontrib><title>The Legal Limits of Targeting the Cyber Capabilities of a Neutral State</title><description>Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With its focus on defensive operations, the U.S. military appears to be less prepared to act offensively. In Cyber War, Richard A. Clarke and Robert K. Knake wrote there is no conventional military force in the world superior to that of the U.S., assuming that the U.S. military is not blinded or disconnected by a cyber attack.</description><subject>civilian population</subject><subject>collateral damage</subject><subject>computer networks</subject><subject>Computer Systems Management and Standards</subject><subject>Cyber Capabilities</subject><subject>cyberattacks</subject><subject>data acquisition</subject><subject>denial of service attack</subject><subject>department of defense</subject><subject>electrical grids</subject><subject>global positioning systems</subject><subject>infrastructure</subject><subject>international law</subject><subject>Sociology and Law</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2015</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZHAPyUhV8ElNT8xR8MnMzSwpVshPUwhJLEpPLcnMS1coAco6VyalFik4JxYkJmXmZJZkpoLVJCr4pZaWFAH1BZcklqTyMLCmJeYUp_JCaW4GGTfXEGcP3ZSSzOT4YqBhqSXxji6GBsaGxpaWxgSkAcHCL6A</recordid><startdate>20151001</startdate><enddate>20151001</enddate><creator>Williams,Ja Rai A</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>20151001</creationdate><title>The Legal Limits of Targeting the Cyber Capabilities of a Neutral State</title><author>Williams,Ja Rai A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_AD10313993</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2015</creationdate><topic>civilian population</topic><topic>collateral damage</topic><topic>computer networks</topic><topic>Computer Systems Management and Standards</topic><topic>Cyber Capabilities</topic><topic>cyberattacks</topic><topic>data acquisition</topic><topic>denial of service attack</topic><topic>department of defense</topic><topic>electrical grids</topic><topic>global positioning systems</topic><topic>infrastructure</topic><topic>international law</topic><topic>Sociology and Law</topic><toplevel>online_resources</toplevel><creatorcontrib>Williams,Ja Rai A</creatorcontrib><creatorcontrib>Air Command and Staff College, Air University Maxwell Air Force Base United States</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Williams,Ja Rai A</au><aucorp>Air Command and Staff College, Air University Maxwell Air Force Base United States</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>The Legal Limits of Targeting the Cyber Capabilities of a Neutral State</btitle><date>2015-10-01</date><risdate>2015</risdate><abstract>Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With its focus on defensive operations, the U.S. military appears to be less prepared to act offensively. In Cyber War, Richard A. Clarke and Robert K. Knake wrote there is no conventional military force in the world superior to that of the U.S., assuming that the U.S. military is not blinded or disconnected by a cyber attack.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_dtic_stinet_AD1031399 |
source | DTIC Technical Reports |
subjects | civilian population collateral damage computer networks Computer Systems Management and Standards Cyber Capabilities cyberattacks data acquisition denial of service attack department of defense electrical grids global positioning systems infrastructure international law Sociology and Law |
title | The Legal Limits of Targeting the Cyber Capabilities of a Neutral State |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T17%3A36%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=The%20Legal%20Limits%20of%20Targeting%20the%20Cyber%20Capabilities%20of%20a%20Neutral%20State&rft.au=Williams,Ja%20Rai%20A&rft.aucorp=Air%20Command%20and%20Staff%20College,%20Air%20University%20Maxwell%20Air%20Force%20Base%20United%20States&rft.date=2015-10-01&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EAD1031399%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |