Narrow your search

Library

KU Leuven (12)

ULiège (8)

Odisee (5)

Thomas More Mechelen (5)

VDIC (5)

VIVES (5)

NATO Library (4)

Thomas More Kempen (4)

UCLL (4)

UGent (4)

More...

Resource type

book (23)

periodical (2)


Language

English (23)

French (1)

German (1)


Year
From To Submit

2015 (25)

Listing 1 - 10 of 25 << page
of 3
>>
Sort by

Book
Cyber-Attacks and the Exploitable Imperfections of International Law
Author:
ISBN: 9789004298330 Year: 2015

Loading...
Export citation

Choose an application

Bookmark

Abstract

At its current rate, technological development has outpaced corresponding changes in international law. Proposals to remedy this deficiency have been made, in part, by members of the Shanghai Cooperation Organization (led by the Russian Federation), but the United States and select allies have rejected these proposals, arguing that existing international law already provides a suitable comprehensive framework necessary to tackle cyber-warfare. This book does not contest (and, in fact, supports) the idea that contemporary jus ad bellum and jus in bello, in general, can accommodate cyber-warfare. However, this analysis argues that existing international law contains significant imperfections that can be exploited; gaps, not yet filled, that fail to address future risks posed by cyber-attacks.


Book
A communication protocol for CyAMS and the Cyber Fighter Associate interface
Authors: ---
Year: 2015 Publisher: Aberdeen Proving Ground, MD : US Army Research Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
A communication protocol for CyAMS and the Cyber Fighter Associate interface
Authors: ---
Year: 2015 Publisher: Aberdeen Proving Ground, MD : US Army Research Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cyberwar : law and ethics for virtual conflicts
Authors: --- --- ---
ISBN: 9780198717508 0198717504 9780198717492 0198717490 Year: 2015 Publisher: Oxford [etc.] Oxford University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber warfare is fast becoming the greatest threat to national security advanced nations face. Cyberattacks can destroy economic, political, and military systems in a single act, making them dangerous across multiple dimensions. Yet the law of armed conflict applies uneasily to this unchartered territory in the area of national security, supplying few answers to questions that are answered easily for traditional military conflict. Under what conditions does a cyberattack amount to an act of war ? What is a proportional response to a cyberattack ? is it permissible to pre-empt a cyberattack with the use of kinetic force ? If so, when would the use of pre-emptive force violate third party sovereignty ? This collection of essays, written by a group of interdisciplinary scholars and practitioners, addresses the ethical and legal issues that surround cyber warfare. It considers whether the Laws of Armed Conflict apply to cyberspace, as well as the ethical position of cyber warfare against the background of generally recognized moral traditions in armed conflict.


Book
Military Communications and Information Systems (ICMCIS), 2015 International Conference on : date 18-19 May 2015
Author:
ISBN: 8393484855 1467368156 8393484812 Year: 2015 Publisher: Piscataway, New Jersey : IEEE,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Military command and control depends on the rapid and accurate transmission and receipt of trusted information up and down the chain of command At each level in the hierarchy, different aspects of the information must be analysed and the appropriate knowledge extracted as the basis for decision making The conference aims to bring together the military, scientific and industrial communities from around the world that are working to solve these challenges The conferences provide useful fora for exchanging ideas on the development and application of new technologies to the provision of military CIS services They also create a unique opportunity to discuss these issues from different points of view and share experiences amongst European Union and NATO CIS professionals and to create multinational professional networks useful to further discuss issues and identify solutions The previous name of the conference was Military Communications and Information Systems Conference MCC.


Book
Technology and the law on the use of force
Author:
ISBN: 9780415694339 9780203716052 9781134445509 9781134445646 9781134445714 9781138245228 Year: 2015 Publisher: London ;New York Routledge

Loading...
Export citation

Choose an application

Bookmark

Abstract

In recent years military technology and strategy have developed apace particularly in regards to cyber and space warfare. In 2007 Estonia suffered a month long cyber assault to its digital infrastructure which it is presumed came from Russia in retaliation for the removal of a World War II-era statue of a Soviet soldier from its capital. This was described as some as the first war in cyberspace Web War I. Since then there have been several more cyber attacks on a State and its digital environment, in particular in Iran in 2010 when a worm Stuxnet was identified as having infected and damaged Iran's uranium enrichment plant presumably in an attempt to set back Iran's nuclear programme. This book takes a detailed look at these new theatres of war and considers their relation to international law on the use of force. The use of force, except in cases of self-defence or with the authorisation of a Security Council Resolution, is prohibited under the UN charter and customary international law however, the law of jus ad bellum was developed in a pre-digital era where current technological capabilities could not be conceived of. This book asks whether the law on the use of force is able to deal with legal disputes likely to arise from modern warfare. Among the questions it considers are : What amounts to an armed attack in an age of anti-satellite weaponry and lasers that can cripple satellites ? Does the destruction of a State's vital digital eco-system or the 'blinding' or jamming of military communication satellites constitute a threat ? If so what is the threshold that would enliven the right of self-defence or retaliatory action ? The book argues that while technology has leapt ahead the legal framework has failed to adapt, and as a result the ability of States to legally defend themselves has been impaired.


Book
The Evolution of Cyber War: International Norms for Emerging-Technology Weapons
Author:
ISBN: 9781612347639 Year: 2015

Loading...
Export citation

Choose an application

Bookmark

Abstract

In January 2014 Pope Francis called the Internet a 'gift from God'. Months later former Secretary of Defense, Leon Panetta, described cyber warfare as 'the most serious threat in the 21st century', capable of destroying our entire infrastructure and crippling the nation. Already, cyber warfare has impacted countries around the world : Estonia in 2007, Georgia in 2008, and Iran in 2010; and, as with other methods of war, cyber technology has the ability to be used not only on military forces and facilities, but on civilian targets. Our computers have become spies and tools for terrorism, and a have allowed for a new, unchecked method of war. And yet, cyber warfare is still in its infancy, with innumerable possibilities and contingencies for how such a war may play out in the coming decades. This book examines the international development of constraining norms for cyber warfare and and predicts how those norms will unfold in the future. Using case studies for other emerging-technology weapons - chemical and biological weapons, strategic bombing, and nuclear weapons - the author expands previous definitions of norm evolution theory and offers recommendations for citizens and U.S. policymakers and as they grapple with the impending reality of cyber war.


Periodical
Strategic plan.
Author:
Year: 2015 Publisher: [Fort George G. Meade, Md.] : U.S. Fleet Cyber Command/Tenth Fleet,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Informationsoperationen Weltweit
Author:
ISBN: 383826763X 9783838267630 Year: 2015 Publisher: Stuttgart Ibidem Sachbuch

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cyber-attacks and the exploitable imperfection of international law
Author:
ISBN: 9004298304 Year: 2015 Publisher: Leiden, Netherlands ; Boston, Massachusetts : Koninklijke Brill,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cyber-Attacks and the Exploitable Imperfections of International Law reveals elements of existing jus ad bellum and jus in bello regimes that are unable to accommodate the threats posed by cyber-attacks. It maps out legal gaps, deficiencies, and uncertainties, which international actors may seek to exploit to their political benefit.

Listing 1 - 10 of 25 << page
of 3
>>
Sort by