Evolving battlefields : does Stuxnet demonstrate a need for modifications to the law of armed conflict ?
Host item entries:
Fordham international law journal, Vol. 35, issue 3, 2012, p. 842-894
This Note analyzes the facts surrounding one of the few publicly known cyber attacks, Stuxnet, but assumes a hypothetical situation in which the LOAC applies. This Note thus addresses whether the deployment of Stuxnet conforms to the LOAC. Part I presents the facts of Stuxnet’s development and deployment. Part II briefly discusses the history of the LOAC and then describes LOAC principles relevant to Stuxnet. Part III then applies the current LOAC to Stuxnet, identifying possible violations. This Note concludes that, with the possible exception of certain “knock-on” effects, current LOAC rules adequately address Stuxnet and that Stuxnet therefore demonstrates the LOAC’s capability of regulating cyber war.
By entering this website, you consent to the use of technologies, such as cookies and analytics, to customise content, advertising and provide social media features. This will be used to analyse traffic to the website, allowing us to understand visitor preferences and improving our services. Learn more