Armed with a keyboard : presidential directive 20, cyber-warfare, and the international laws of war
Author zone:
Matthew Rinear
Host item entries:
Capital University law review, Vol. 43, no. 3, Summer 2015, p. 679-720
Languages:
English
General Note:
Photocopies
Abstract:
This comment examines America’s growing dependency on the cyberworld and the significance of international cyber-operations. Additionally, this comment analyzes the complex intricacies of this relatively new form of combat and how Presidential Policy Directive 20’s execution may sufficiently comply with the current laws of war. Part II examines how the government and the private sector’s ever increasing interconnectivity with cyberspace and the Internet open the door to cyber intrusions. Part III scrutinizes the technical details of cyberattacks —definitional issues, types of attacks, and general tactics used. Part IV analyzes the laws of armed conflict and its application to offensive and defensive cyber-actions, as well as the Directive itself. Finally, taking into account the background and analyses contained within Parts II–IV, Part V supports the proposition that a swift and effective implementation of the Directive is essential to ensure sufficient protection of America’s security interests.
By entering this website, you consent to the use of technologies, such as cookies and analytics, to customise content, advertising and provide social media features. This will be used to analyse traffic to the website, allowing us to understand visitor preferences and improving our services. Learn more