The Legal Limits of Targeting the Cyber Capabilities of a Neutral State

Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Williams,Ja Rai A
Format: Report
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Williams,Ja Rai A
description Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With its focus on defensive operations, the U.S. military appears to be less prepared to act offensively. In Cyber War, Richard A. Clarke and Robert K. Knake wrote there is no conventional military force in the world superior to that of the U.S., assuming that the U.S. military is not blinded or disconnected by a cyber attack.
format Report
fullrecord <record><control><sourceid>dtic_1RU</sourceid><recordid>TN_cdi_dtic_stinet_AD1031399</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>AD1031399</sourcerecordid><originalsourceid>FETCH-dtic_stinet_AD10313993</originalsourceid><addsrcrecordid>eNrjZHAPyUhV8ElNT8xR8MnMzSwpVshPUwhJLEpPLcnMS1coAco6VyalFik4JxYkJmXmZJZkpoLVJCr4pZaWFAH1BZcklqTyMLCmJeYUp_JCaW4GGTfXEGcP3ZSSzOT4YqBhqSXxji6GBsaGxpaWxgSkAcHCL6A</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>report</recordtype></control><display><type>report</type><title>The Legal Limits of Targeting the Cyber Capabilities of a Neutral State</title><source>DTIC Technical Reports</source><creator>Williams,Ja Rai A</creator><creatorcontrib>Williams,Ja Rai A ; Air Command and Staff College, Air University Maxwell Air Force Base United States</creatorcontrib><description>Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With its focus on defensive operations, the U.S. military appears to be less prepared to act offensively. In Cyber War, Richard A. Clarke and Robert K. Knake wrote there is no conventional military force in the world superior to that of the U.S., assuming that the U.S. military is not blinded or disconnected by a cyber attack.</description><language>eng</language><subject>civilian population ; collateral damage ; computer networks ; Computer Systems Management and Standards ; Cyber Capabilities ; cyberattacks ; data acquisition ; denial of service attack ; department of defense ; electrical grids ; global positioning systems ; infrastructure ; international law ; Sociology and Law</subject><creationdate>2015</creationdate><rights>Approved For Public Release</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,27567,27568</link.rule.ids><linktorsrc>$$Uhttps://apps.dtic.mil/sti/citations/AD1031399$$EView_record_in_DTIC$$FView_record_in_$$GDTIC$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Williams,Ja Rai A</creatorcontrib><creatorcontrib>Air Command and Staff College, Air University Maxwell Air Force Base United States</creatorcontrib><title>The Legal Limits of Targeting the Cyber Capabilities of a Neutral State</title><description>Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With its focus on defensive operations, the U.S. military appears to be less prepared to act offensively. In Cyber War, Richard A. Clarke and Robert K. Knake wrote there is no conventional military force in the world superior to that of the U.S., assuming that the U.S. military is not blinded or disconnected by a cyber attack.</description><subject>civilian population</subject><subject>collateral damage</subject><subject>computer networks</subject><subject>Computer Systems Management and Standards</subject><subject>Cyber Capabilities</subject><subject>cyberattacks</subject><subject>data acquisition</subject><subject>denial of service attack</subject><subject>department of defense</subject><subject>electrical grids</subject><subject>global positioning systems</subject><subject>infrastructure</subject><subject>international law</subject><subject>Sociology and Law</subject><fulltext>true</fulltext><rsrctype>report</rsrctype><creationdate>2015</creationdate><recordtype>report</recordtype><sourceid>1RU</sourceid><recordid>eNrjZHAPyUhV8ElNT8xR8MnMzSwpVshPUwhJLEpPLcnMS1coAco6VyalFik4JxYkJmXmZJZkpoLVJCr4pZaWFAH1BZcklqTyMLCmJeYUp_JCaW4GGTfXEGcP3ZSSzOT4YqBhqSXxji6GBsaGxpaWxgSkAcHCL6A</recordid><startdate>20151001</startdate><enddate>20151001</enddate><creator>Williams,Ja Rai A</creator><scope>1RU</scope><scope>BHM</scope></search><sort><creationdate>20151001</creationdate><title>The Legal Limits of Targeting the Cyber Capabilities of a Neutral State</title><author>Williams,Ja Rai A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-dtic_stinet_AD10313993</frbrgroupid><rsrctype>reports</rsrctype><prefilter>reports</prefilter><language>eng</language><creationdate>2015</creationdate><topic>civilian population</topic><topic>collateral damage</topic><topic>computer networks</topic><topic>Computer Systems Management and Standards</topic><topic>Cyber Capabilities</topic><topic>cyberattacks</topic><topic>data acquisition</topic><topic>denial of service attack</topic><topic>department of defense</topic><topic>electrical grids</topic><topic>global positioning systems</topic><topic>infrastructure</topic><topic>international law</topic><topic>Sociology and Law</topic><toplevel>online_resources</toplevel><creatorcontrib>Williams,Ja Rai A</creatorcontrib><creatorcontrib>Air Command and Staff College, Air University Maxwell Air Force Base United States</creatorcontrib><collection>DTIC Technical Reports</collection><collection>DTIC STINET</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Williams,Ja Rai A</au><aucorp>Air Command and Staff College, Air University Maxwell Air Force Base United States</aucorp><format>book</format><genre>unknown</genre><ristype>RPRT</ristype><btitle>The Legal Limits of Targeting the Cyber Capabilities of a Neutral State</btitle><date>2015-10-01</date><risdate>2015</risdate><abstract>Legal practitioners must rely on current international law and norms to address the legalities of injurious cyber operations conducted by one State against another State.1 Cyber operations can be surprising and debilitating especially if States conduct such operations against U.S. armed forces. With its focus on defensive operations, the U.S. military appears to be less prepared to act offensively. In Cyber War, Richard A. Clarke and Robert K. Knake wrote there is no conventional military force in the world superior to that of the U.S., assuming that the U.S. military is not blinded or disconnected by a cyber attack.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_dtic_stinet_AD1031399
source DTIC Technical Reports
subjects civilian population
collateral damage
computer networks
Computer Systems Management and Standards
Cyber Capabilities
cyberattacks
data acquisition
denial of service attack
department of defense
electrical grids
global positioning systems
infrastructure
international law
Sociology and Law
title The Legal Limits of Targeting the Cyber Capabilities of a Neutral State
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T17%3A36%3A13IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-dtic_1RU&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=unknown&rft.btitle=The%20Legal%20Limits%20of%20Targeting%20the%20Cyber%20Capabilities%20of%20a%20Neutral%20State&rft.au=Williams,Ja%20Rai%20A&rft.aucorp=Air%20Command%20and%20Staff%20College,%20Air%20University%20Maxwell%20Air%20Force%20Base%20United%20States&rft.date=2015-10-01&rft_id=info:doi/&rft_dat=%3Cdtic_1RU%3EAD1031399%3C/dtic_1RU%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true