Description |
1 online resource |
Series |
Routledge research in international law |
|
Routledge research in international law.
|
Contents |
1. Use of force : displaced twentieth-century rules, norms and standards? -- 2. Revolution in military affairs : hi-tech weaponry, low-tech legal safeguards -- 3. The fourth domain : ascendance of outer space as a war theatre -- 4. War in the fifth domain : cyberwarfare -- 5. Discarding law by analogy : old legal frameworks for new threats |
Summary |
"In recent years, threats to governmental, economic, and military interests via the information infrastructure have increased as governmental and non-governmental operations have become progressively supported by vast automated systems and electronic data. In 2007 Estonia suffered a month long cyber assault to its digital infrastructure, described in cyberspace as 'Web War I'. In 2010, a worm Stuxnet was identified as having infected and damaged Iran's uranium enrichment plant, presumably in an attempt to set back Iran's nuclear programme. This book takes a detailed look at these new theatres of war and considers their relation to international law on the use of force. Except in cases of self-defence or with the authorisation of a Security Council Resolution, the use of force is prohibited under the UN charter and customary international law. However, the law of jus ad bellum was developed in a pre-digital era where current technological capabilities could not be conceived. Jackson Maogoto asks whether the law on the use of force is able to deal with legal disputes likely to arise from modern warfare. Key queries include, how one defines an armed attack in an age of anti-satellite weaponry, whether the destruction of a State's vital digital eco-system or the "blinding" of military communication satellites constitutes a threat, and how one delimits the threshold that would enliven the right of self-defence or retaliatory action. The book argues that while technology has leapt ahead, the legal framework has failed to adapt, rendering States unable to legally defend themselves effectively. This book will be of great interest and use to researchers and students of international law, the law of armed conflict, Information Technology and the law, and counter-terrorism"-- Provided by publisher |
Bibliography |
Includes bibliographical references and index |
Notes |
Vendor-supplied metadata |
Subject |
Information warfare (International law)
|
|
War (International law)
|
|
Computer networks -- Security measures.
|
|
Cyberterrorism -- Prevention
|
|
Malware (Computer software) -- Prevention
|
|
Cyber intelligence (Computer security)
|
|
Computer security -- Law and legislation.
|
|
LAW -- International.
|
|
Computer networks -- Security measures
|
|
Computer security -- Law and legislation
|
|
Cyber intelligence (Computer security)
|
|
Cyberterrorism -- Prevention
|
|
Information warfare (International law)
|
|
War (International law)
|
Form |
Electronic book
|
ISBN |
9781134445509 |
|
1134445504 |
|
9781134445646 |
|
1134445644 |
|
9780203716052 |
|
0203716051 |
|
0415694337 |
|
9780415694339 |
|