Hostname: page-component-7bb8b95d7b-lvwk9 Total loading time: 0 Render date: 2024-09-18T02:03:00.635Z Has data issue: false hasContentIssue false

The Conduct of Hostilities in and via Cyberspace

Published online by Cambridge University Press:  28 February 2017

Robin Geitβ*
Affiliation:
Legal Division of the International Committee of the Red Cross (ICRC)

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
War and Law in Cyberspace
Copyright
Copyright © American Society of International Law 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 U.S. Quadrennial Defence Review Report, at 37 (Feb. 2010), available at http://www.defense.gov/qdr/images/QDR_as_of_12FeblO_1000.pdf.

2 Int’l Comm. Red Cross, Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, at 427 (1987).

3 Legality of the Threat or use of Nuclear Weapons, Advisory Opinion, 1996 ICJ Rep. 226.

4 Shulman, Mark R., Discrimination in the Laws of Information Warfare, 37 Colum. J. Transnat’l L. 939, 963-64 (1999)Google Scholar.

5 Schmitt, Michael N., Wired Warfare: Computer Network Attacks and Jus in Bello, 84 Int’l Rev. Red Cross 365, 374 (2002)CrossRefGoogle Scholar.

6 Knut Dörmann, Applicability of the Additional Protocols to Computer Network Attacks at 4 (2004), available at http://www.icrc.org/eng/resources/documents/misc/681g92.htm; Michael Bothe, Karl Josef Partsch & Wal Demar A. Solf, New Rules for Victims of Armed Conflicts: Commentary on the Two 1977 Protocols Additional to the Geneva Conventions of 1949, at 289 (1982).