Cyber Operations and the Use of Force in International Law
Home > Law > International law > Public international law > Humanitarian law > Cyber Operations and the Use of Force in International Law
Cyber Operations and the Use of Force in International Law

Cyber Operations and the Use of Force in International Law


     0     
5
4
3
2
1



International Edition


X
About the Book

The internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And does a state have a right to self-defence when cyber attacked? With the range and sophistication of cyber attacks against states showing a dramatic increase in recent times, this book investigates the traditional concepts of 'use of force', 'armed attack', and 'armed conflict' and asks whether existing laws created for analogue technologies can be applied to new digital developments. The book provides a comprehensive analysis of primary documents and surrounding literature, to investigate whether and how existing rules on the use of force in international law apply to a relatively new phenomenon such as cyberspace operations. It assesses the rules of jus ad bellum and jus in bello, whether based on treaty or custom, and analyses why each rule applies or does not apply to cyber operations. Those rules which can be seen to apply are then discussed in the context of each specific type of cyber operation. The book addresses the key questions of whether a cyber operation amounts to the use of force and, if so, whether the victim state can exercise its right of self-defence; whether cyber operations trigger the application of international humanitarian law when they are not accompanied by traditional hostilities; what rules must be followed in the conduct of cyber hostilities; how neutrality is affected by cyber operations; whether those conducting cyber operations are combatants, civilians, or civilians taking direct part in hostilities. The book is essential reading for everyone wanting a better understanding of how international law regulates cyber combat.

Table of Contents:
1. Identifying the Problem and the Applicable Law ; 2. Cyber Operations and the jus ad bellum ; 3. The Applicability of the jus in bello to Cyber Operations ; 4. Cyber Operations and the Conduct of Hostilities ; 5. Cyber Operations and the Law of Neutrality ; General Conclusions

About the Author :
Marco Roscini is Professor of International Law at the University of Westminster Law School. Prof. Roscini has a PhD from the University of Rome 'La Sapienza' and was previously a Research Fellow in International Law at the University of Verona School of Law. He lectured in international security law at University College London (UCL), King's College London, Queen Mary University of London, and the Ecole des Relations Internationales in Paris. He has published a monograph on nuclear-weapon-free zones and is the co-editor of Non-Proliferation Law as a Special Regime. Prof. Roscini is a member of the International Law Association (ILA)'s Committee on Nuclear Weapons, Non-proliferation and Contemporary International Law, of the Academic Network (AN) Programme on International Cyber Security, and of the EU Non-proliferation Consortium. In 2012, he was awarded a Leverhulme Research Fellowship for the academic year 2012-2013 to conduct his research on cyber operations.

Review :
[Cyber Operations and the Use of Force in International Law] offers a precise, detailed and up-to-date analysis of cyber operations and the use of force in international law... [Roscini's] book is an extremely valuable and recommended tool in the quest of understanding the current legal regulation of cyberspace and cyberwarfare. Cyber Operations provides an excellent overview of the international laws applicable to cyber attacks (a term of art) and will make its readers think twice about how they use cyber terminology. It is meticulously researched with a whopping 1,807 footnotes and cites leading authorities on the law of armed conflict, as well as on international law. In todays interconnected world, completely dependent on computers and the internet (where economic security is national security), it will stimulate both lawyers (military, government, private sector, etc.) and laypersons to think about how much more we should all be doing to protect our networks, data, intellectual property and critical infrastructure. Mr. Roscini should be praised for writing a book that goes beyond existing analysis of the law of armed conflict applied to cyber. Earlier legal monographs on cyber warfare restated the principles of laws and attempted to awkwardly apply them to cyber, with varying degrees of success. Many lacked an understanding of the technical aspects of cyber. Mr. Roscini, on the other hand, has clearly spent time studying the legal but also the technical aspects of cyber. The result is a monograph that does not merely repeat legal principles in an abstract manner but rather presents the legal rules with a technical hindsight, highlighting their potential flaws and gaps in the cyber area. The sections of Roscinis book on the jus ad bellum cyber aspects are well-written, engaging, and thoroughly researched. They will also be accessible to non-lawyers, which makes this book particularly appealing. It is not easy to pick apart rules that were designed and adopted in a different era before the prospect of cyber attacks were even conceivable, and accurately apply them at a time before cyber uses of force have become a concrete reality, and overall Roscini has done a commendable job. Roscinis volume is a welcome addition to existing literature in the field. The way in which the author uses concrete cases of cyber operations as practical, real-world examples of the types of attacks which have taken place and his subsequent legal assessment make this volume a much valued navigation tool, useful to appraise the current state of legal development in the area. The detail and breadth of information found in all of the chapters is remarkable, and the book will quickly become a required reading for anyone who wishes to contribute in a qualified manner to the debate on cyber warfare. [Roscini's] book is an extremely valuable and recommended tool in the quest of understanding the current legal regulation of cyberspace and cyberwarfare. It will come as no surprise to anyone who has read any of Roscinis previous work to hear that Cyber Operations and the Use of Force in International Law is a very well written book. It is engaging to read, focused and clear throughout. There are helpful touches, like the bullet point summaries at the end of each chapter listing the key points made therein, or the handy tables setting out the analysis in a different form for quick reference... the book is extremely well researched and provides detailed analysis on virtually any question that one might raise on the application of the jus ad bellum or jus in bello to cyber warfare. Roscini is now one of the leading legal experts in the world on cyber operations and Cyber Operations and [this book] forms one-third of a recent holy trinity of major works on the topic. It is essential reading for anyone interested in cyber war and international law. Marco Roscini's book engages in a detailed, rigorous and well informed doctrinal analysis of the application of this legal framework to cyber operations, which singles it out as a highly significant resource in the field... [T]his book is an exhibition of excellent legal scholarship. In chapter 1 Roscini explains that the book's 'overall goal is to provide a systematic and coherent analysis of the international law applicable to military cyber operations that will be of use to anyone who wants or needs to understand the basic issues of the rules of international law on the use of force and the law of armed conflict'. Incontrovertibly, this book successfully and impressively achieves this objective. The increasing amount of cyber attacks and cyber exploitation operations by States and non-State actors calls for a comprehensive review of the current legal framework and its loopholes. Marco Roscini's admirable study of pertinent rules of international law, whether based on treaty or custom, underlines the applicability of existing law to new technological developments. His convincing examination of relevant rules of the jus ad bellum, the jus in bello and the law of neutrality will facilitate implementation of the law in a particularly complex environment and may also help to inform peacetime cooperation on cyber security for which sustainable efforts and effective new regulation are urgently required. The present volume by Dr. Marco Roscini ... is a systematic, up-to-date and well-informed analysis of the legal discourse that has taken place thus far. The author identifies the issues that have given rise to much discussion, marshals the evidence and provides a clear picture of where cyber operations stand in the overall scheme of the international law of armed conflict. This gives him an opportunity to delve into many controversial aspects of that law, irrespective of their kinetic/cyber application. ... The book surely sets the stage for the future encounter between law and reality. Land, sea and air are no more the only domains where hostilities are conducted. Cyberspace has now become the fourth dimension. Marco Roscini's book on Cyber Operations and the Use of Force in International Law explores this new and challenging subject. Taking into account recent State practice, the author relies on traditional customary and treaty law to construe rules applicable to cyber operations. He examines all the main chapters of the law of armed conflict: jus ad bellum, jus in bello and the law of neutrality. A sound knowledge of the law of armed conflict allows the author to formulate a complete set of rules for cyber operations in a clear and realistic mode. Dr. Roscini's book is to be recommended to the attention of scholars, legal advisors and to all concerned with planning defence operations.


Best Sellers


Product Details
  • ISBN-13: 9780199655014
  • Publisher: Oxford University Press
  • Publisher Imprint: Oxford University Press
  • Height: 240 mm
  • No of Pages: 336
  • Weight: 646 gr
  • ISBN-10: 0199655014
  • Publisher Date: 13 Mar 2014
  • Binding: Hardback
  • Language: English
  • Spine Width: 26 mm
  • Width: 162 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Cyber Operations and the Use of Force in International Law
Oxford University Press -
Cyber Operations and the Use of Force in International Law
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Cyber Operations and the Use of Force in International Law

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!