A colleague of mine today raised an interesting question to which I don't know the answer. He wondered if anyone was writing on the parallels between cyber-terrorism and the laws of war. He was thinking specifically about situations where a remote cyber-attack effectively brings down the infrastructure in a target country (eg hospitals, schools etc). Does anyone know of any work that brings together the fields of, say, International Humanitarian Law on the one hand, and Cybercrime on the other?
I've just finished an article on Law of War Combatant Status and Computer Network Attacks. While I focused on a narrow aspect of IHL, I tried to showcase, and respond to, a broad survey of existing scholarship on IHL and Computer Network Warfare/Terrorism/Crime.
SSRN: http://ssrn.com/abstract=1460680
Posted by: Sean Watts | August 24, 2009 at 09:49 AM
I have an article forthcoming (location TBD) regarding cyberterrorism and universal jurisdiction. Although it does not specifically address international humanitarian law, it does discuss infrastructure attacks such as those mentioned and how to prevent/deter them. See http://ssrn.com/abstract_id=1452803
Posted by: Kelly Gable | August 24, 2009 at 02:12 PM
Thanks, Sean and Kelly, for sharing your research. I have brought it to the attention of the colleague who asked me the query.
Posted by: Jacqueline Lipton | August 24, 2009 at 05:40 PM
Along with Sean Watt's excellent piece, Sean Condron also wrote a good article at 20 Harv. J. Law & Tec 404. I have also written two articles on the topic at http://ssrn.com/abstract=987553 dealing with the laws of war and their applicabiilty to the use of computer network operations and http://ssrn.com/abstract=987046 dealing with protecting critical national infrasturcture from attack, whether by state or non-state actors.
Posted by: Eric Jensen | August 26, 2009 at 11:14 AM
Thanks for that also, Eric. Sounds like interesting work.
Posted by: Jacqueline Lipton | August 26, 2009 at 03:44 PM
See too:
Computer Network Attack and International Law (Naval War College International Law Studies, vol. 76), Michael N. Schmitt & Brian T. O’Donnell, eds., 2002 (568 pp.)
Michael N. Schmitt, with Heather A. Harrison Dinniss & Thomas C. Winfield, Computers and War: The Legal Battlespace, Harvard Program on Humanitarian Policy and Conflict Research, International Humanitarian Law Research Initiative Briefing Paper (June 2004), reprinted in 3 Journal of the Xi'an (China) Politics Institute (2007)
Michael N. Schmitt, CNA and the Jus in Bello: An Introduction, in Computer Network Attacks and the Applicability of International Humanitarian Law (Stockholm: Swedish NDC, Karin Bystrom, ed., 2004): 101-125.
[The Brian T. O'Donnell above is no relation, although I do have a brother named Brian S. O'Donnell]
Posted by: Patrick S. O'Donnell | September 02, 2009 at 06:10 PM
A sensible approach to terrorism involving weapons of mass destruction
No security measures can not completely eliminate the activities of Arab terrorists. This is evident in Israel: a tiny country whose population is very concerned about security, can not prevent every terrorist attack. Enhanced security measures at airports, only transferred the attention of Arab terrorists on the other weaknesses, such as night clubs and bus. When was closed border with Gaza, Arab terrorists penetrated the West Bank. Arab terrorists, as tax evaders, always find ways to deceive the society. The attack is always one step ahead of protection, which only reacts. The only good protection - proactive, preventive: Attack of the Arab terrorists before they attack you.
Posted by: generic viagra | March 19, 2010 at 11:02 AM