International Committee of the Red Cross Library

  • English
  • Français
  • Home
  • Extended Search
  • Search for recent acquisitions
  • Predefined searches
    • Digitized heritage collection on the First Geneva Convention (1864)
      1949 Geneva Conventions : travaux préparatoires and final records
      1977 Additional Protocols : travaux préparatoires and final records
      Annual reports
      e-books

Cyber warfare and precautions against the effects of attacks / Eric Talbot Jensen

Save
    • Save

    Please click ob the desired format to save the file

    • PDF
    • Word
    • RTF
Document type:
Article
Title:
Cyber warfare and precautions against the effects of attacks
Author zone:
Eric Talbot Jensen
Host item entries:
  • Texas law review, Vol. 88, issue 7, June 2010, p. 1533-1569
Languages:
English, English
General Note:
Photocopies
Abstract:
Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated networks. Additionally, the government relies almost completely on civilian providers for computer software and hardware products, services, and maintenance. This near-complete intermixing of civilian and military computer infrastructure makes many of those civilian objects and providers legitimate targets under the law of armed conflict. Other civilian networks, services, and communications may suffer collateral damage from legitimate attacks on government targets. To protect those civilian objects and providers from the effects of attacks, the law of armed conflict requires a state to segregate its military assets from the civilian population and civilian objects to the maximum extent feasible. Where segregation is not feasible, the government must protect the civilian entities and communications from the effects of attacks. The current integration of U.S. government assets with civilian systems makes segregation impossible and therefore creates a responsibility for the United States to protect those civilian networks, services, and communications. The U.S. government is already taking some steps in that direction, as illustrated by a number of plans and policies initiated over the past decade. However, the current actions do not go far enough. This Article identifies six vital actions the government must take to comply with the law of armed conflict and to ensure not only the survivability of military communication capabilities during times of armed conflict, but also the protection of the civilian populace and civilian objects.
Authors:
Jensen, Eric Talbot
Keyword in English:
CYBER WARFARE
MILITARY TARGET
DISTINCTION BETWEEN CIVILIAN AND COMBATANT
PRECAUTION IN ATTACK
CIVILIAN ACCOMPANYING ARMED FORCES
Keyword in French:
CYBERGUERRE
OBJECTIF MILITAIRE
DISTINCTION CIVIL-COMBATTANT
PRECAUTION DANS L'ATTAQUE
CIVIL ACCOMPAGNANT LES FORCES ARMEES

You might be interested in this too

Call numberDisposability / Due date
348/41 (Br.)Available
List
0 entries
  • No entries found
  • Permalink for this page:

Contact details

ICRC Library
International Committee of the Red Cross
Avenue de la Paix 19, 1202 Geneva, Switzerland
+41 22 730 20 30
library@icrc.org

Opening hours

Monday - Friday

09:00 - 13:00


until 17:00 by prior appointment only

Quicklinks

https://www.icrc.org/en/library
http://blogs.icrc.org/cross-files/

NetBiblio WebOPAC 4.0.0.211 © Copyright 2009 - 2021 AlCoda GmbH Build Date: 03.07.2019