Scenario 10: Legal review of cyber weapons
Jump to navigation
Jump to search
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
fill this in!
=== Bibliography === * Steven Bellovin, Susan Landau and Herbert Lin, ‘[https://academic.oup.com/cybersecurity/article/3/1/59/3097802 Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications]’ (2017) 3(1) Journal of Cybersecurity 59. * Jeffrey T Biller and Michael N Schmitt, ‘[https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=2462&context=ils Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare]’ (2019) 95 Int’l L Stud 179. * Duncan Blake and Joseph Imburgia, ‘[https://ssrn.com/abstract=1850831 “Bloodless Weapons”? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining Them as “Weapons”]’, (2010) 66 Air Force Law Review 157. * William H Boothby, ''Weapons and the Law of Armed Conflict'' (OUP 2016). * Vincent Boulanin and Maaike Verbruggen, [https://www.sipri.org/sites/default/files/2017-12/article_36_report_1712.pdf <i>Article 36 Reviews: Dealing with the Challenges Posed by Emerging Technologies</i>] (SIPRI 2017). * Gary Brown and Andrew Metcalf, ‘[http://jnslp.com/wp-content/uploads/2014/02/Easier-Said-than-Done.pdf Easier Said Than Done: Legal Reviews of Cyber Weapons]’ (2014) 7 Journal of National Security Law & Policy 115. * Robin Geiss, ‘The Obligation to Respect and to Ensure Respect for the Conventions’ in Andrew Clapham, Paola Gaeta and Marco Sassòli (eds), ''The 1949 Geneva Conventions: A Commentary'' (OUP 2015). * ICRC, [https://e-brief.icrc.org/wp-content/uploads/2016/09/12-A-Guide-to-the-Legal-Review-of-New-Weapons.pdf ''A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977''] (Kathleen Lawand ed.) (ICRC 2006). * Michael N Schmitt (ed), ''[https://doi.org/10.1017/9781316822524 Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations]'' (CUP 2017). * David Wallace, ‘[https://ccdcoe.org/sites/default/files/multimedia/pdf/TP%2011_2018.pdf Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis]’ (2018) Tallinn Paper No. 11. <!-- NOTES ON FURTHER SOURCES/BACKGROUND === Further reading === Articles giving background on automated applications in the military – i.e. devices/processes that may be hacked: *A Lowne, ‘[http://archive.cotsjournalonline.com/articles/view/103828 Automated Test Solves Maintenance Issues for Military Vehicles]’ COTS Journal (January 2014) *Association for Advancing Automation, ‘[https://www.a3automate.org/how-automation-for-military-impacts-industrial-automation/ How Automation for Military Impacts Industrial Automation]’ (undated) -->
Please note that all contributions to International cyber law: interactive toolkit are considered to be released under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) (see
International cyber law: interactive toolkit:Copyrights
for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource.
Do not submit copyrighted work without permission!
(opens in new window)
Retrieved from "
Not logged in
What links here
Get shortened URL