Cyber Warfare: Military Cross-Border Computer Network Operations under International Law. By Johann-Christoph Woltag. Cambridge, Antwerp, Portland: Intersentia Publisher, 2014. Pp. xviii, 314. ISBN: 978-1780682266. €86.00; US$103.00.

2016 ◽  
Vol 44 (1) ◽  
pp. 61-62
Author(s):  
Jenny Gesley
2015 ◽  
Vol 48 (1) ◽  
pp. 39-54 ◽  
Author(s):  
Heather A Harrison Dinniss

Cyber warfare and the advent of computer network operations have forced us to look again at the concept of the military objective. The definition set out in Article 52(2) of Additional Protocol I – that an object must by its nature, location, purpose or use, make an effective contribution to military action – is accepted as customary international law; its application in the cyber context, however, raises a number of issues which are examined in this article. First, the question of whether data may constitute a military objective is discussed. In particular, the issue of whether the requirement that the definition applies to ‘objects’ requires that the purported target must have tangible or material form. The article argues on the basis of both textual and contextual analysis that this is not required, but it contends that it may prove to be useful to differentiate between operational- and content-level data. The article then examines the qualifying contribution of military objectives such as their nature, location, purpose or use, and questions whether network location rather than geographical location may be used as a qualifying criterion in the cyber context. The final part of the article addresses the question of whether the particular ability of cyber operations to effect results at increasingly precise levels of specificity places an obligation on a party to an armed conflict to define military objectives at their smallest possible formulation – that is, a small piece of code or component rather than the computer or system itself. Such a requirement would have significant implications for the cyber context where much of the infrastructure is dual use, but the distinction between civilian objects and military objectives is a binary classification.


Author(s):  
James W. Gualtieri ◽  
William C. Elm

There has been a growing need for military decision-makers to maintain the integrity of the information contained within their computer network. Tools to support Information Assurance and Computer Network Defense (IA-CND) are needed to defend their information infrastructure and conduct Computer Network Operations with a new level of insight and understanding. This paper describes one effort to develop visualizations to aid these decision-makers in the highly abstract, complex and dynamic mission of IA-CND. This paper describes the development of a IA-CND Communications Display. Using a Cognitive Systems Engineering methodology, this project transitioned from a broad description of a work domain, to the development of decision aiding concepts for a particular portion of that domain. This methodology also provided a means to develop breakthrough support for a decision difficult domain.


2007 ◽  
Vol 30 (13) ◽  
pp. 2649-2660 ◽  
Author(s):  
Azzedine Boukerche ◽  
Renato B. Machado ◽  
Kathia R.L. Jucá ◽  
João Bosco M. Sobral ◽  
Mirela S.M.A. Notare

2017 ◽  
Vol 6 (1) ◽  
Author(s):  
Adam Molnar ◽  
Christopher Parsons ◽  
Erik Zouave

Sign in / Sign up

Export Citation Format

Share Document