-
3
-
-
0004035026
-
-
See generally DOROTHY E. DENNING, INFORMATION WARFARE AND SECURITY (2000) (describing the common computer hacker tools employed in information warfare and possible defense strategies). A detailed description of these techniques is beyond the scope of this Article. However, a brief introduction to some standard hacker tools is valuable as a baseline for the discussion that follows. A Trojan horse is a "program that, when activated, performs some undesirable action not anticipated by the person running it. It could delete files, reformat a disk, or leak sensitive data back to its author."
-
(2000)
Information Warfare and Security
-
-
Denning, D.E.1
-
4
-
-
26044477141
-
-
Id. at 259
-
Id. at 259. A logic bomb, or time bomb, is a Trojan horse that is "triggered by some event."
-
-
-
-
5
-
-
26044459591
-
-
Id. at 259
-
Id. at 259. A virus is a fragment of code that attaches itself to other computer instructions, including software application code . . . performs some function and then turns control over to its host . . . . The resident copy watches for uninfected hosts [and] inserts a copy of itself in the host. The virus may then execute a "payload," which can do anything from displaying an amusing or political message to wiping out files on the hard drive.
-
-
-
-
6
-
-
26044442472
-
-
Id. at 269-70
-
Id. at 269-70. A worm is a program that propagates from one computer to another over a computer network by breaking into the computers in much the way that a hacker would break into them. Unlike viruses, they do not get any help from unwitting users. They must find a computer they can penetrate, carry out an attack, and transfer a replica of their code to the target host for execution. In effect, a worm completely automates the steps taken by a computer intruder who hops from one system to the next.
-
-
-
-
7
-
-
26044482639
-
-
Id. at 280
-
Id. at 280. Denial of service attacks deny legitimate users access to information sources by destroying data or disrupting operations. Id. at 231. Code breaking entails "acquiring access to the plaintext of encrypted data by some means other than the normal decryption process used by the intended recipient(s) of the data. Code breaking is achieved either by obtaining the decryption key through a special key recovery service or by finding the key through cryptanalysis."
-
-
-
-
8
-
-
26044469281
-
-
Id. at 408
-
Id. at 408;
-
-
-
-
9
-
-
84865327664
-
-
VAND. J. TRANSNAT'L L., 1100-01 (defining common hacker tools)
-
see also George K. Walker, Information Warfare and Neutrality, 33 VAND. J. TRANSNAT'L L. 1079, 1100-01 (2000) (defining common hacker tools).
-
(2000)
Information Warfare and Neutrality
, vol.33
, pp. 1079
-
-
Walker, G.K.1
-
10
-
-
84861251029
-
-
JOINT PUB. No. 3-13, Oct. 9
-
THE JOINT CHIEFS OF STAFF, JOINT PUB. No. 3-13, JOINT DOCTRINE FOR INFORMATION OPERATIONS 1-9 (Oct. 9, 1998), available at http://www.dtic.mil/doctrine/jel/new_pubs/jp3_13.pdf (defining computer network attack as "operations to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Also called CNA").
-
(1998)
Joint Doctrine for Information Operations
, vol.1
, Issue.9
-
-
-
11
-
-
26044457865
-
-
A.F. MAG, Oct.
-
As used in this Article, computer network defense will mean measures, active or passive (discussed infra), which prevent or safeguard the computer or network from the actions of computer network attack. Together, CNA and CND constitute CNO, or computer network operations. In the Pentagon's 1999 Unified Command Plan, CND was assigned to U.S. Space Command. The next year, Space Command was also given responsibility for CNA; and in April of 2001, Joint Task Force CND was changed to become Joint Task Force CNO. Michael C. Sirak, Threat to the Nets, A.F. MAG, Oct. 2001, at 24.
-
(2001)
Threat to the Nets
, pp. 24
-
-
Sirak, M.C.1
-
13
-
-
26044447986
-
Source: Custom
-
Source: Custom, 1 Hackworth DIGEST § 3, at 15-17.
-
1 Hackworth Digest
, vol.3
, pp. 15-17
-
-
-
14
-
-
26044462818
-
-
For the purposes of this Article, a "hacker" is someone who conducts a computer hack, or "gain[s] access to or break[s] into electronic systems, particularly computers and telecommunications systems" and "includes 'crackers,' who break access codes and computer locks, and 'phreakers,' who crack and exploit phone systems." DENNING, supra note 2, at 44.
-
Supra Note
, vol.2
, pp. 44
-
-
Denning1
-
18
-
-
26044431697
-
-
Source code is defined as the "[w]ritten instructions for a program in a form readable by humans. Must be translated or 'compiled' into object code in order to be executed by a computer." MARK A. LEMLEY ET AL., SOFTWARE AND INTERNET LAW 1098 (2000).
-
(2000)
Software and Internet Law
, vol.1098
-
-
Lemley, M.A.1
-
19
-
-
26044434580
-
-
Microsoft strongly disagreed with CSIS's report. Verton, supra note 8. A Microsoft spokesman further stated: [A]fter tracking the intruders and investigating their activities, there is no evidence and no basis to believe that they had any access at all to Windows or Office source code. That is, we have no reason to believe that the intruders were able to see Windows or Office source code, much less modify it. Microsoft's current and future products remain intact and secure, and customers can use them with confidence.
-
Supra Note
, vol.8
-
-
Verton1
-
22
-
-
26044482192
-
Respite follows hacker attacks; vandals pursued by law and peers
-
Feb. 11, at El
-
John Schwanz & Ariana Eunjung Cha, Respite Follows Hacker Attacks; Vandals Pursued by Law and Peers, WASH. POST, Feb. 11, 2000, at El (cataloging a number of large U.S. companies that have been the object of recent hacking).
-
(2000)
Wash. Post
-
-
Schwanz, J.1
Cha, A.E.2
-
24
-
-
26044481373
-
-
Id. at 7
-
Id. at 7.
-
-
-
-
25
-
-
26044461851
-
-
Id. at i-ii
-
Id. at i-ii.
-
-
-
-
26
-
-
26044474837
-
-
Id. at 9
-
Id. at 9;
-
-
-
-
27
-
-
0040539862
-
Hacking of pentagon computers persists
-
Aug. 9
-
see also Jim Wolf, Hacking of Pentagon Computers Persists, WASH. POST, Aug. 9, 2000, at 23 (reporting that of those 22,144 attacks, "all but 1, 000 of [1999's] reported attacks were attributed to recreational hackers"). "According to Interpol, 30,000 hacker web sites currently exist on the Internet. In the ten years between 1989 and 1999, there were only 34,000 reported global hacking incidents in aggregate, but between January and October 2000 alone, 50,000 incidents were reported . . . . So far this year, the number of attacks is up roughly 10 percent, with over 14,000 electronic attacks detected in the first seven months of the year alone."
-
(2000)
Wash. Post
, pp. 23
-
-
Wolf, J.1
-
29
-
-
26044456697
-
Israel, US leading sources of cyber attacks
-
Jan. 29
-
see also Elinor Mills Abreu, Israel, US Leading Sources of Cyber Attacks, JERUSALEM POST, Jan. 29, 2002, at 11 (Economics Section), where the author states: "The study found attacks that appeared to originate in the US - nearly 30% of the total - were nearly triple the second-ranked country. But only about 3.5 attacks were made per 10,000 US Internet users, compared with 26 attacks per 10,000 Internet users in Israel." The author also states that this rate for Israel of hacks per ten-thousand Internet users is the highest for any country, followed by Hong Kong, Thailand, South Korea, France, Turkey, Malaysia, Poland, Taiwan, and Denmark.
-
(2002)
Jerusalem Post
, pp. 11
-
-
Abreu, E.M.1
-
30
-
-
26044456697
-
Israel, US leading sources of cyber attacks
-
Elinor Mills Abreu, Israel, US Leading Sources of Cyber Attacks, JERUSALEM POST, 2002, at 11 Id.
-
(2002)
Jerusalem Post
, pp. 11
-
-
Abreu, E.M.1
-
31
-
-
0035813701
-
-
AVIATION WK. & SPACE TECH., Nov. 5
-
David A. Fulgham & Robert Wall, Global Hawk, J-STARS Head for Afghanistan, AVIATION WK. & SPACE TECH., Nov. 5, 2001, at 26. Economic damage from these attacks totaled an estimated $17 billion in 2000.
-
(2001)
Global Hawk, J-STARS Head for Afghanistan
, pp. 26
-
-
Fulgham, D.A.1
Wall, R.2
-
32
-
-
26044462817
-
Red worm' shows dangers of cyber-terrorism. Web attacks could wreak havoc
-
Aug. 13
-
Marilyn Geewax, 'Red Worm' Shows Dangers of Cyber-Terrorism. Web Attacks Could Wreak Havoc, PALM BEACH POST, Aug. 13, 2001, at A1. Further, a recent Defense Science Board report found that ninety-nine percent of the National Security Agency "red team" attacks on DOD computer networks went undetected despite the use of known hacking tools. See
-
(2001)
Palm Beach Post
-
-
Geewax, M.1
-
35
-
-
84861253566
-
st century: International terrorism must force the U.S. to adopt "carnivore" and new electronic surveillance standards
-
st Century: International Terrorism Must Force the U.S. to Adopt "Carnivore" and New Electronic Surveillance Standards, 27 BROOK. J. INT'LL. 245, 255-56 (2001) (putting the estimate of Pentagon attacks at 2.5 million).
-
(2001)
27 Brook. J. Int'll.
, vol.245
, pp. 255-256
-
-
Merl, S.R.1
-
37
-
-
26044443423
-
Keynote address: Threats to U.S. national security: Proposed partnership initiatives toward preventing cyber terrorist attacks
-
Richard Clarke, Keynote Address: Threats to U.S. National Security: Proposed Partnership Initiatives Toward Preventing Cyber Terrorist Attacks, 12 DEPAUL BUS. L.J. 33, 35 (1999).
-
(1999)
12 Depaul Bus. L.J.
, vol.33
, pp. 35
-
-
Clarke, R.1
-
38
-
-
26044466114
-
-
Id. at 36
-
Id. at 36. I can tell you that there are tonight nations around the world who are developing or have developed offensive information warfare tools and techniques and have offensive information warfare organizations. I can tell you that those nations are doing reconnaissance today on America's computer networks looking for our weaknesses, and our vulnerabilities. It is not science fiction.
-
-
-
-
39
-
-
26044483765
-
-
Id.
-
Id.
-
-
-
-
40
-
-
26044437869
-
-
Id. at 37
-
Id. at 37. In February of 1998, when Saddam Hussein was defying the UN and the UN Special Commission on Iraq, the President decided to send wings of aircraft to the Persian Gulf. That was on a Friday. On Saturday, we discovered that, at over 20 of our Air Force bases, someone had taken control of the logistic systems. They had downloaded all the password files. They had put sniffers [programs designed to seek and find certain information] on the lines. They had achieved systems administrator status on the computers. We thought it was Saddam Hussein about to crash the U.S. Air Force logistics support necessary for that deployment to the Gulf. Four days later, and nine federal courts later, we discovered it was two 14 years [sic] old children in San Francisco.
-
-
-
-
41
-
-
26044442128
-
-
Id
-
Id.
-
-
-
-
42
-
-
26044449269
-
-
Id. at 38
-
Id. at 38;
-
-
-
-
43
-
-
26044472584
-
Note, considering our position: Viewing information warfare as a use of force prohibited by article 2(4) of the U.N. Charter
-
see also Todd A. Morth, Note, Considering Our Position: Viewing Information Warfare as a Use of Force Prohibited by Article 2(4) of the U.N. Charter, 30 CASE W. RES. J. INT'L L. 567, 568 (1998) (comparing information warfare capabilities to those of nuclear, chemical, and biological attacks in destructive capability but contrasting them by the ease with which they can be attained).
-
(1998)
30 Case W. Res. J. Int'l L.
, vol.567
, pp. 568
-
-
Morth, T.A.1
-
45
-
-
84861245273
-
Defense agency
-
INFOWORLD Aug. 29
-
see also Dan Verton, Defense Agency, Veridian to Pinpoint Foreign Hackers, INFOWORLD (Aug. 29, 2001), available at http://www.infoworld.com/articles/hn/xml/01/08/29/010829hndefense.xml (discussing Veridian's upcoming contract with the DOD to study computer intrusions and hacks by China against DOD computers).
-
(2001)
Veridian to Pinpoint Foreign Hackers
-
-
Verton, D.1
-
46
-
-
26044470100
-
Cyber attacks on U.S. security
-
Apr. 20
-
Darcy Noricks, Cyber Attacks on U.S. Security, WASH. TIMES, Apr. 20, 2000, at A19;
-
(2000)
Wash. Times
-
-
Noricks, D.1
-
47
-
-
26044461575
-
-
see also Verton, supra note 27 (referring to recent DIA and CIA estimates that at least twenty countries are developing information warfare strategies specifically targeting the United States).
-
Supra Note
, vol.27
-
-
Verton1
-
48
-
-
26044431696
-
Russian touts computer virus as weapon
-
May 9
-
David Hoffman, Russian Touts Computer Virus as Weapon, WASH. POST, May 9, 2000, at 21.
-
(2000)
Wash. Post
, pp. 21
-
-
Hoffman, D.1
-
49
-
-
26044450504
-
U.S. set to take warfare on-line
-
Jan. 6
-
Bill Gertz, U.S. Set to Take Warfare On-Line, WASH. TIMES, Jan. 6, 2000, at A3.
-
(2000)
Wash. Times
-
-
Gertz, B.1
-
51
-
-
26044454037
-
Virtually vulnerable: Civilian board warns pentagon of gaps in computer security
-
June 25-July 1
-
see also Frank Tiboni, Virtually Vulnerable: Civilian Board Warns Pentagon of Gaps in Computer Security, DEFENSE NEWS, June 25-July 1, 2001, at B1.
-
(2001)
Defense News
-
-
Tiboni, F.1
-
52
-
-
85023728735
-
U.S. Studies new threat: Cyber attack; hackers, simulation expose vulnerability
-
May 24
-
Bradley Graham, U.S. Studies New Threat: Cyber Attack; Hackers, Simulation Expose Vulnerability, WASH. POST, May 24, 1998, at Al (discussing operation Eligible Receiver, where a group of government employees successfully hacked into numerous government computer networks).
-
(1998)
Wash. Post
-
-
Graham, B.1
-
53
-
-
0348225147
-
Computer network attack and the use of force in international law: Thoughts on a normative framework
-
Michael N. Schmitt, Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, 37 COLUM. J. TRANSNAT'L L. 885, 892 (1999) [hereinafter Schmitt, Normative Framework].
-
(1999)
37 Colum. J. Transnat'l L.
, vol.885
, pp. 892
-
-
Schmitt, M.N.1
-
54
-
-
84861250036
-
Information operations in homeland computer-network defense
-
Oct. 1
-
Jeffrey K. Souder, Information Operations in Homeland Computer-Network Defense, J. ELECTRONIC DEF. (Oct. 1, 2001), at http://www.jedonline.com/jedonline/default.asp?journalid=4&func= articles&page=0110j12&year=2001&month=10&doct=features. Souder continues, "[t]his fact alone implies that planning for computer attack and defense must be quite different than that of physical attack and defense," and concludes that "[w]ithin the cyberspace, distance is nearly irrelevant, speed is almost instantaneous, and forces are able to 'arrive' with little or no warning, strike, and maintain the attack for as long as necessary to attain the objective without experiencing fatigue or injury."
-
(2001)
J. Electronic Def.
-
-
Souder, J.K.1
-
55
-
-
84861250036
-
Information operations in homeland computer-network defense
-
Jeffrey K. Souder, Information Operations in Homeland Computer-Network Defense, J. ELECTRONIC DEF., 2001, at http://www.jedonline.com/jedonline/default.asp?journalid=4&func= articles&page=0110j12&year=2001&month=10&doct=features Id.
-
(2001)
J. Electronic Def.
-
-
Souder, J.K.1
-
56
-
-
26044463966
-
-
note
-
The problem of identifying the perpetrator of the attack is also known as "attribution" and will be discussed below.
-
-
-
-
57
-
-
26044443425
-
-
note
-
The problem of determining the attacker's intent is also known as "characterization" and will be discussed below.
-
-
-
-
59
-
-
84861246562
-
-
The May 2000 "Love Bug" worm is a good example of this. See id. at 12-13.
-
The May 2000 "Love Bug" worm is a good example of this. See id. at 12-13.
-
-
-
-
60
-
-
26044478847
-
-
Id. at 19-20
-
Id. at 19-20.
-
-
-
-
61
-
-
26044453161
-
-
Id., Executive Summary, at i
-
Id., Executive Summary, at i;
-
-
-
-
62
-
-
84861247898
-
Angolan cyber-guerilla's raid UNITA
-
Nov. 30
-
see also Angolan Cyber-Guerilla's Raid UNITA, AFRICA ANALYSIS, Nov. 30, 2001, at 3, available at http://www.africaanalysis.com (discussing a cyber attack against UNITA by the opposition party).
-
(2001)
Africa Analysis
, pp. 3
-
-
-
63
-
-
26044480286
-
Computer czar issues warning
-
Feb. 19, (Financial News Section), LEXIS, Nexis Library, CURNWS File
-
Matthew Fordahl, Computer Czar Issues Warning, AP ONLINE, Feb. 19, 2002 (Financial News Section), LEXIS, Nexis Library, CURNWS File.
-
(2002)
AP Online
-
-
Fordahl, M.1
-
64
-
-
26044442471
-
-
note
-
Taking action in anticipation of a use of force is commonly referred to as "anticipatory self-defense" and will be discussed below.
-
-
-
-
66
-
-
26044447099
-
-
Id. at 18.
-
Id. at 18.
-
-
-
-
67
-
-
26044441558
-
-
Dietrich Schindler & Jiri Toman eds., 3d ed.
-
THE LAWS OF ARMED CONFLICTS 788 (Dietrich Schindler & Jiri Toman eds., 3d ed. 1988).
-
(1988)
The Laws of Armed Conflicts
, vol.788
-
-
-
69
-
-
26044432404
-
-
reprinted in 1 BEVANS 230. As rewritten and repromulgated on Oct. 18, 1907, Article 1 introduced language of international dispute settlement that became the basis for similar agreements over the next century: "With a view to obviating, as far as possible, recourse to force in the relations between States, the Signatory Powers agree to use their best efforts to insure the pacific settlement of international differences."
-
1 Bevans
, vol.230
-
-
-
70
-
-
26044449564
-
-
Id. at 234
-
Id. at 234. Articles 9-57 of the agreement went on to outline a voluntary system of mediation and arbitration designed to resolve disputes before nations felt it necessary to resort to the use of force.
-
-
-
-
71
-
-
26044446882
-
-
Id. at 236-43
-
Id. at 236-43.
-
-
-
-
72
-
-
26044438664
-
-
at app. f Hamilton Foley ed.
-
LEAGUE OF NATIONS COVENANT, reprinted in WOODROW WILSON'S CASE FOR THE LEAGUE OF NATIONS, at app. f (Hamilton Foley ed., 1969) (describing the intent, structure, and battle for the League of Nations). The preamble of the Covenant of the League of Nations states the intent of the framers: "In order to promote international cooperation and to achieve international peace and security by the acceptance of obligations not to resort to war . . ." LEAGUE OF NATIONS COVENANT pmbl. Though no language of the Covenant made a resort to war illegal per se, it required nations to submit "any dispute likely to lead to a rupture" to arbitration or to the League Council.
-
(1969)
Woodrow Wilson's Case for the League of Nations
-
-
-
73
-
-
26044437359
-
-
arts. 12, 15. Further, Article 16 states
-
Woodrow wilson's case for the league of nations Id. arts. 12, 15. Further, Article 16 states: Should any Member of the League resort to war in disregard of its covenants under Articles 12, 13, or 15, it shall ipso facto be deemed to have committed an act of war against all other Members of the League, which hereby undertake immediately to subject it to the severance of all trade or financial relations, the prohibition of all intercourse between their nationals and the nationals of the covenant-breaking State, and the prevention of all financial, commercial, or personal intercourse between the nationals of the covenant-breaking State and the nationals of any other State, whether a Member of the League or not. It shall be the duty of the Council in such case to recommend to the several Governments concerned what effective military, naval, or air force the Members of the League shall severally contribute to the armed forces to be used to protect the covenants of the League.
-
Woodrow Wilson's Case for the League of Nations
-
-
-
75
-
-
26044478093
-
-
Kellogg-Briand Pact (1928), reprinted in 2 BEVANS 732. Articles I and II of the Treaty state: Article I. The High Contracting Parties solemnly declare in the names of their respective peoples that they condemn recourse to war for the solution of international controversies, and renounce it as an instrument of national policy in their relations with one another. Article II. The High Contracting Parties agree that the settlement or solution of all disputes or conflicts of whatever nature or of whatever origin they may be, which may arise among them, shall never be sought except by pacific means.
-
(1928)
2 Bevans
, vol.732
-
-
Pact, K.-B.1
-
76
-
-
26044473278
-
-
Id. at 734
-
Id. at 734.
-
-
-
-
79
-
-
26044443424
-
-
U.N. CHARTER pmbl. The preamble states: We the peoples of the United Nations determined to save succeeding generations from the scourge of war, which twice in our lifetime has brought untold sorrow to mankind . . . and for these ends to practice tolerance and live together in peace with one another as good neighbors, and to unite our strength to maintain international peace and security, and to ensure, by the acceptance of principles and the institution of methods, that armed force shall not be used, save in the common interest . . . have resolved to combine our efforts to accomplish these aims. 3 Bevans Id.
-
3 Bevans
-
-
-
80
-
-
26044454038
-
-
3 Bevans Id. art 1. Article 1 states: The Purposes of the United Nations are: 1. To maintain international peace and security, and to that end: to take effective collective measures for the prevention and removal of threats to the peace, and for the suppression of acts of aggression or other breaches of the peace, and to bring about by peaceful means, and in conformity with the principles of justice and international law, adjustment or settlement of international disputes or situations which might lead to a breach of the peace . . . .
-
3 Bevans
-
-
-
82
-
-
26044457235
-
-
art. 2, para. 4
-
3 Bevans Id. art. 2, para. 4.
-
3 Bevans
-
-
-
83
-
-
26044435354
-
-
arts 33-54, 75-85
-
The composition and functions of the Security Council are covered in Chapter V of the U.N. Charter, comprising Articles 23-32. Id. arts 23-32. The Security Council has primary responsibility for international peace and security (Article 24) as described in Chapters VI, VII, VIII, and XII, comprising Articles 33-54 and 75-85. Id. arts 33-54, 75-85.
-
3 Bevans
-
-
-
84
-
-
26044457235
-
-
art. 51
-
3 Bevans Id. art. 51.
-
3 Bevans
-
-
-
85
-
-
26044457235
-
-
art. 2, para. 7
-
Article 2(7) allows for a nation to use or threaten force in "matters which are essentially within the domestic jurisdiction of any state" without U.N. intervention. 3 Bevans Id, art. 2, para. 7. Nothing continued in the present Charter shall authorize the United Nations to intervene in matters which are essentially within the domestic jurisdiction of any state or shall require the Members to submit such matters to settlement under the present Charter; but this principle shall not prejudice the application of enforcement measures under Chapter VII. U.N. CHARTER art. 2, para. 7. Some have made that claim on behalf of Serbia concerning NATO's intervening in Kosovo.
-
3 Bevans
-
-
-
86
-
-
23044517870
-
Point/counterpoint: Kosovo, war powers, and the multilateral future
-
See, e.g., John C. Yoo, Point/Counterpoint: Kosovo, War Powers, and the Multilateral Future, 148 U. PA. L. REV. 1673, 1725 (2000). However, it is important to note that this limitation on the international community's ability to intervene in domestic issues is balanced by the Security Council's right, under Chapter VII, to determine that such actions may constitute a threat to or breach of the peace affecting international peace and security.
-
(2000)
148 U. Pa. L. Rev.
, vol.1673
, pp. 1725
-
-
Yoo, J.C.1
-
88
-
-
26044484006
-
-
U.S. DEP'T OF STATE, CHARTER OF THE UNITED NATIONS: REPORT TO THE PRESIDENT ON THE RESULTS OF THE SAN FRANCISCO CONFERENCE BY THE CHAIRMAN OF THE UNITED STATES DELEGATION, THE SECRETARY OF STATE 88 (1945) (describing Chapter VII as "the teeth of the United Nations") [hereinafter REPORT TO THE PRESIDENT]. The Report continues, While the novel quality of the enforcement measures envisaged in that Chapter may attract undue public attention at the expense of other vital functions of the Organization, the fact remains that upon the confidence which member states repose in the efficacy of the measures designed to halt aggression - a confidence which may have to meet the test of successive crises - the survival of the entire Organization and of world peace itself must ultimately depend.
-
(1945)
Charter of the United Nations: Report to the President on the Results of the San Francisco Conference by the Chairman of the United States Delegation, the Secretary of State
, vol.88
-
-
-
89
-
-
84861245892
-
-
U.N. GAOR, 29th Sess., Supp. No. 31, U.N. Doc. A/RES/3314
-
"Aggression" and its usefulness as a definitional limitation on a nation's use of force have been the topic of much debate by scholars. Compare GA. Res. 3314, U.N. GAOR, 29th Sess., Supp. No. 31, U.N. Doc. A/RES/ 3314 (1974) (where the U.N. General Assembly passed a resolution without a vote containing the definition of aggression in 1974), with United Nations Press Release, U.N. Doc. L/2967 (2000), http://www.un.org/News/Press/docs/2000/20001201.12967.doc.html (stating that the definition of aggression was a contested issue in the formulation of the International Criminal Court).
-
(1974)
Compare GA. Res.
, vol.3314
-
-
-
90
-
-
26044465200
-
-
note
-
U.N. CHARTER art. 39. Article 41 states: The Security Council may decide what measures not involving the use of armed force are to be employed to give effect to its decisions, and it may call upon the Members of the United Nations to apply such measures. These may include complete or partial interruption of economic relations and of rail, sea, air, postal, telegraphic, radio, and other means of communication, and the severance of diplomatic relations.
-
-
-
-
91
-
-
26044474836
-
-
Id. art. 41. Article 42 states: Should the Security Council consider that measures provided for in Article 41 would be inadequate or have proved to be inadequate, it may take such action by air, sea, or land forces as may be necessary to maintain or restore international peace and security. Such action may include demonstrations, blockade, and other operations by air, sea, or land forces of Members of the United Nations.
-
Id. art. 41. Article 42 states: Should the Security Council consider that measures provided for in Article 41 would be inadequate or have proved to be inadequate, it may take such action by air, sea, or land forces as may be necessary to maintain or restore international peace and security. Such action may include demonstrations, blockade, and other operations by air, sea, or land forces of Members of the United Nations.
-
-
-
-
92
-
-
26044463396
-
-
Id. art. 42
-
Id. art. 42.
-
-
-
-
93
-
-
84861246559
-
-
S.C. Res. 678, U.N. SCOR, 45th Sess., 2963d mtg., U.N. Doc. S/RES/0678 (1990)
-
S.C. Res. 678, U.N. SCOR, 45th Sess., 2963d mtg., U.N. Doc. S/RES/0678 (1990), available at http://www.fas.org/news/un/iraq/sres/sres0678.htm (providing the text of the United Nations Security Council Resolution authorizing the use of all necessary means to expel Iraq).
-
-
-
-
94
-
-
26044452893
-
Report to the president
-
Article 51 was originally framed with the primary intent of incorporating regional systems from Chapter VIII into the international security system, not as a means of one nation using force to preempt or respond to an attack from another nation. See REPORT TO THE PRESIDENT, supra note 58, at 107.
-
Supra Note
, vol.58
, pp. 107
-
-
-
95
-
-
26044444899
-
-
U.N. CHARTER art. 51. Article 51 continues: Measures taken by Members in the exercise of this right of self-defense shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security.
-
U.N. CHARTER art. 51. Article 51 continues: Measures taken by Members in the exercise of this right of self-defense shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security.
-
-
-
-
96
-
-
26044451142
-
-
Id. art. 51
-
Id. art. 51.
-
-
-
-
98
-
-
26044443961
-
-
NORMAN BENTWICH & ANDREW MARTIN, A COMMENTARY ON THE CHARTER OF THE UNITED NATIONS 106 (1950) (providing the German aggression against Luxembourg and Belgium in August 1914, the Japanese aggression in Manchuria in 1931-32, and the German aggression against Poland in September 1939 as examples of the misuse of the doctrine of self-defense).
-
(1950)
A Commentary on the Charter of the United Nations
, vol.106
-
-
Bentwich, N.1
Martin, A.2
-
100
-
-
70949090133
-
The JCS standing rules of engagement: A judge advocate's primer
-
Richard J. Grunawalt, The JCS Standing Rules of Engagement: A Judge Advocate's Primer, 42 A.F. L. REV. 245, 251 (1997).
-
(1997)
42 A.F. L. Rev.
, vol.245
, pp. 251
-
-
Grunawalt, R.J.1
-
101
-
-
70949090133
-
The JCS standing rules of engagement: A judge advocate's primer
-
Richard J. Grunawalt, The JCS Standing Rules of Engagement: A Judge Advocate's Primer, 42 A.F. L. REV. 245, 251 (1997) Id.
-
(1997)
42 A.F. L. Rev.
, vol.245
, pp. 251
-
-
Grunawalt, R.J.1
-
102
-
-
26044460418
-
Military and paramilitary activities (Nicar. v. U.S.)
-
(June 27) (Merits)
-
See Military and Paramilitary Activities (Nicar. v. U.S.), 1986 I.C.J. 94 (June 27) (Merits).
-
1986 I.C.J.
, vol.94
-
-
-
103
-
-
84959955523
-
-
The quintessential statement of the right of anticipatory self-defense was espoused in 1842 by the U.S. Secretary of State, Daniel Webster, in The Caroline incident. In a letter to Henry Fox, the British Minister in Washington, D.C., Webster argued that an action by the British was not justified by anticipatory self-defense: The statement of Secretary of State Daniel Webster on The Caroline incident in 1842 has been widely accepted and was quoted approvingly by the Nuremberg Tribunal. Webster said, with reference to the invasion of U.S. territory across the Niagara River by British forces to prevent aid to Canadian revolutionaries from The Caroline, which was loaded with arms and about to depart, that such invasion was in principle illegal, but he added "while it is admitted that exceptions growing out of the great law of self-defense do exist, those exceptions should be confined to cases in which the necessity of that self-defense is instant, overwhelming, and leaving no choice of means and no moment for deliberation, and must be limited by that necessity and kept clearly within it. Self-Defense, 5 Whiteman DIGEST § 25, at 981-82 (citations omitted);
-
The Caroline Incident
-
-
Webster, D.1
-
104
-
-
26044457234
-
-
see also SHARP, supra note 57, at 43 (discussing anticipatory self-defense under the U.N. Charter).
-
Supra Note
, vol.57
, pp. 43
-
-
Sharp1
-
105
-
-
26044483224
-
Raising the caroline
-
But see Timothy Kearley, Raising the Caroline, 17 WIS. INT'L L.J. 325 (1999) for the assertion that Webster's original meaning and the original understanding of the doctrine of anticipatory self-defense applied only to actions outside a state's own territory. It is only since the Charter that this doctrine has been used to justify acts within a state's own territory.
-
(1999)
17 Wis. Int'l L.J.
, vol.325
-
-
Kearley, T.1
-
106
-
-
26044483224
-
Raising the caroline
-
Timothy Kearley, Raising the Caroline, 17 WIS. INT'L L.J. 325 (1999) Id.
-
(1999)
17 Wis. Int'l L.J.
, vol.325
-
-
Kearley, T.1
-
113
-
-
26044433999
-
-
2d ed.
-
YORAM DINSTEIN, WAR, AGREESION AND SELF-DEFENCE 182-91 (2d ed. 1994) (arguing that a standard of "interceptive" self-defense is legitimate under Article 51 of the U.N. Charter. Interceptive self-defense refers to actions taken after the other side has committed itself to an armed attack.).
-
(1994)
War, Agreesion and Self-defence
, vol.182
, Issue.91
-
-
Dinstein, Y.1
-
115
-
-
26044439629
-
-
Simma, supra note 72, at 675-76;
-
Supra Note
, vol.72
, pp. 675-676
-
-
Simma1
-
117
-
-
84861245889
-
Permissible and impermissible uses of force
-
Permissible and Impermissible Uses of Force, 12 Whiteman DIGEST § 1, at 48.
-
12 Whiteman Digest §
, vol.1
, pp. 48
-
-
-
118
-
-
26044447650
-
-
The Permanent Court of International Justice, formed in 1921 at The Hague, was succeeded by the ICJ in 1946.
-
The Permanent Court of International Justice, formed in 1921 at The Hague, was succeeded by the ICJ in 1946.
-
-
-
-
120
-
-
26044474152
-
-
Article 38(1), STAT. OF THE INT'L CT. OF J., June 26, 1945, 59 Stat. 1031 (entered into force Oct. 24, 1945)
-
Article 38(1), STAT. OF THE INT'L CT. OF J., June 26, 1945, 59 Stat. 1031 (entered into force Oct. 24, 1945).
-
-
-
-
121
-
-
26044467835
-
-
Military and Paramilitary Activities (Nicar. v. U.S.), 1986 I.C.J. 94 (June 27) (Merits)
-
Military and Paramilitary Activities (Nicar. v. U.S.), 1986 I.C.J. 94 (June 27) (Merits).
-
-
-
-
122
-
-
26044451385
-
-
Id. at 101 (Merits)
-
Id. at 101 (Merits).
-
-
-
-
123
-
-
26044454302
-
-
Id. at 119 (Merits)
-
Id. at 119 (Merits).
-
-
-
-
124
-
-
26044441557
-
-
Id. at 103 (Merits)
-
Id. at 103 (Merits).
-
-
-
-
125
-
-
26044460134
-
-
Id. But see id. at 347 (Schwebel, dissenting).
-
Id. But see id. at 347 (Schwebel, dissenting).
-
-
-
-
127
-
-
26044465199
-
-
Id. at 161
-
Id. at 161.
-
-
-
-
130
-
-
26044478364
-
-
(June 27) (Merits)
-
Military and Paramilitary Activities (Nicar. v. U.S.), 1986 I.C.J. 94, 127 (June 27) (Merits). The Court does not describe or further explain what these proportional countermeasures might include. It merely states that such measures would be permissible in response to a use of force short of armed attack.
-
1986 I.C.J.
, vol.94
, pp. 127
-
-
-
131
-
-
26044478364
-
-
1986 I.C.J. 94, 127 Id.
-
1986 I.C.J.
, vol.94
, pp. 127
-
-
-
132
-
-
26044435353
-
-
(Sep. 25) (Merits)
-
Gabcikovo-Nagymaros Project (Hung. v. Slovk.), 1997 I.C.J. 7, 55-56 (Sep. 25) (Merits).
-
1997 I.C.J.
, vol.7
, pp. 55-56
-
-
-
133
-
-
26044435353
-
-
(Hung. v. Slovk.), 1997 I.C.J. 7, 55-56 Id.;
-
1997 I.C.J.
, vol.7
, pp. 55-56
-
-
-
134
-
-
33846949660
-
The "nicaragua " judgment and the future of the law of force and self-defense
-
see also John Lawrence Hargrove, The "Nicaragua " Judgment and the Future of the Law of Force and Self-Defense, 81 AM. J. INT'LL. 135, 138 (1987) (arguing that, though it did not specifically say so, the Court in that case strongly suggested that a victim of an illegal act involving the use of force could legally respond with forceful countermeasures);
-
(1987)
81 Am. J. Int'll.
, vol.135
, pp. 138
-
-
Hargrove, J.L.1
-
135
-
-
84882714117
-
The impact of the 1982 law of the sea convention on the conduct of peacetime naval/military operations
-
D.G Stephens, The Impact of the 1982 Law of the Sea Convention on the Conduct of Peacetime Naval/Military Operations, 29 CAL. W. INT'L L.J. 283, 303-04 (1999) (stating that the right to use force as a countermeasure was implicit in the ICJ's opinion in the Nicaragua case).
-
(1999)
29 Cal. W. Int'll.J.
, vol.283
, pp. 303-304
-
-
Stephens, D.G.1
-
136
-
-
26044482924
-
Compare oscar schachter, UNited NAtions law
-
Compare Oscar Schachter, United Nations Law, 88 AM. J. INT'L L. 1, 15 (1994), where the author states: The term "countermeasures" has come to be used for self-help action in place of the older terms "reprisal" and "retorsion." But it is still relevant to distinguish between countermeasures that would be illegal if not for the prior illegal act of the state against which they are directed (i.e., reprisals) and countermeasures that a state could legally take against any state irrespective of that state's conduct (retorsion). Both may be regarded as sanctions against violations. Reprisals are generally permitted if they do not involve use of force contrary to the Charter and if they are directed to obtaining redress for the wrong committed.
-
(1994)
88 Am. J. Int'l L.
, vol.1
, pp. 15
-
-
-
137
-
-
26044482924
-
Compare oscar schachter, UNited NAtions law
-
Compare Oscar Schachter, United Nations Law, 88 AM. J. INT'L L. 1, 15 (1994) Id.
-
(1994)
88 Am. J. Int'l L.
, vol.1
, pp. 15
-
-
-
138
-
-
26044450503
-
-
(June 27) (Merits)
-
Military and Paramilitary Activities (Nicar. v. U.S.), 1986 I.C.J. 94, 96-97 (June 27) (Merits) (discussing the Court's decision to apply customary international law rather than multilateral treaties such as the U.N. Charter, based on objections by the United States).
-
1986 I.C.J.
, vol.94
, pp. 96-97
-
-
-
139
-
-
26044481372
-
-
Id. at 94 (Merits)
-
Id. at 94 (Merits).
-
-
-
-
140
-
-
26044437078
-
No man's land: International legal regulations of coercive responses to protracted and low level conflict
-
Michael Reisman, No Man's Land: International Legal Regulations of Coercive Responses to Protracted and Low Level Conflict, 11 HOUS. J. INT'L L. 317, 319 (1989). Both the Charter and customary conceptions of international law with regard to use of the military instrument rested on a set of inherited assumptions about how military conflict is conducted: conflict is territorial, between organized communities; conducted by certain types of specialists in violence or "regular forces" who are clearly identified; they concentrate their efforts against each other in a war zone; the conflict itself is preceded by formal notification; suspended by some formal arrangement, and terminated in an explicit and often ceremonialized fashion.
-
(1989)
11 Hous. J. Int'l L.
, vol.317
, pp. 319
-
-
Reisman, M.1
-
141
-
-
26044437078
-
No man's land: International legal regulations of coercive responses to protracted and low level conflict
-
Michael Reisman, No Man's Land: International Legal Regulations of Coercive Responses to Protracted and Low Level Conflict, 11 HOUS. J. INT'L L. 317, 319 (1989) Id.
-
(1989)
11 Hous. J. Int'l L.
, vol.317
, pp. 319
-
-
Reisman, M.1
-
142
-
-
26044474426
-
How do you know you are at war in the information age?
-
quoted in Richard W. Aldrich, How Do You Know You Are at War in the Information Age?, 22 HOUS. J. INT'L L. 223, 234 (2000) (arguing that the underlying assumptions that were the basis for the rules on the use of force may not be sufficient to fit the technological warfare possible today).
-
(2000)
22 Hous. J. Int'l l.
, vol.223
, pp. 234
-
-
Aldrich, R.W.1
-
143
-
-
26044435633
-
Normative framework
-
Schmitt, Normative Framework, supra note 33, at 912.
-
Supra Note
, vol.33
, pp. 912
-
-
Schmitt1
-
144
-
-
84861251021
-
Source: Custom
-
State practice is one of the ways customary international law is established. For example, in the statute of the Permanent Court of International Justice, the court is allowed to look at the practice of states. See Source: Custom, 1 Whiteman DIGEST § 6, at 75. It is not possible for the Court to apply a custom; instead, it can observe the general practice of States, and if it finds that such practice is due to a conception that the law requires it, it may declare that a rule of law exists and proceed to apply it. The elements necessary are the concordant and recurring action of numerous States in the domain of international relations, the conception in each case that such action was enjoined by law, and the failure of other States to challenge that conception at the time.
-
1 Whiteman Digest §
, vol.6
, pp. 75
-
-
-
145
-
-
84861251021
-
Source: Custom
-
Source: Custom, 1 Whiteman DIGEST § 6, at 75 Id.
-
1 Whiteman Digest §
, vol.6
, pp. 75
-
-
-
146
-
-
84861237277
-
International law: General nature
-
Statements of scholars can also provide a basis for international law, particularly when the specific area of law is not developed enough to evidence much state practice and few, if any, international agreements exist in the area. See International Law: General Nature, 1 Hackworth DIGEST § 1, at 1. When doubt arises as to the existence or nonexistence of a rule of international law, or as to the application of a rule to a given situation, resort is usually had to such sources as pertinent treaties, pronouncements of foreign offices, statements by writers, and decisions of international tribunals and those of prize courts and other domestic courts purporting to be expressive of the law of nations.
-
1 Hackworth Digest §
, vol.1
, pp. 1
-
-
-
148
-
-
26044447649
-
-
Id. at 92.
-
Id. at 92.
-
-
-
-
149
-
-
26044438973
-
-
Id. at 226 (quoting CHAIRMAN, THE JOINT CHIEFS OF STAFF INSTRUCTION 3121.01, STANDING RULES OF ENGAGEMENT FOR U.S. FORCES, encl. A, paras. 5e, 5f (Oct. 1, 1994, amended Dec. 22, 1994) (discussing the U.S. military's definitions of hostile intent and hostile act)). These 1994 rules were replaced on Jan. 15, 2000 by CHAIRMAN, JOINT CHIEFS OF STAFF INSTRUCTION 3121.01A, STANDING RULES OF ENGAGEMENT FOR U.S. FORCES (2000) [hereinafter INSTRUCTION 3121.01A]
-
Id. at 226 (quoting CHAIRMAN, THE JOINT CHIEFS OF STAFF INSTRUCTION 3121.01, STANDING RULES OF ENGAGEMENT FOR U.S. FORCES, encl. A, paras. 5e, 5f (Oct. 1, 1994, amended Dec. 22, 1994) (discussing the U.S. military's definitions of hostile intent and hostile act)). These 1994 rules were replaced on Jan. 15, 2000 by CHAIRMAN, JOINT CHIEFS OF STAFF INSTRUCTION 3121.01A, STANDING RULES OF ENGAGEMENT FOR U.S. FORCES (2000) [hereinafter INSTRUCTION 3121.01A].
-
-
-
-
151
-
-
26044435352
-
-
Id. at 101
-
Id. at 101.
-
-
-
-
152
-
-
26044453159
-
-
Id.
-
Id.
-
-
-
-
153
-
-
26044466661
-
-
(quoting Simma, supra note 72, at 113) (listing "cross frontier expulsion of populations, the diversion of a river by an up-stream state, the release of large quantities of water down a valley, and the spreading of fire across a frontier" as examples of nonmilitary physical force that would amount to a use of force).
-
Supra Note
, vol.72
, pp. 113
-
-
Simma1
-
154
-
-
26044470099
-
-
Id. at 133
-
Id. at 133.
-
-
-
-
155
-
-
26044450502
-
-
Id. at 126
-
Id. at 126.
-
-
-
-
156
-
-
26044432402
-
-
Id. at 127-28
-
Id. at 127-28.
-
-
-
-
157
-
-
26044433700
-
-
Id. at 148
-
Id. at 148
-
-
-
-
158
-
-
26044452892
-
-
quoting THE JOINT CHIEFS OF STAFF, JOINT PUB. No. 1-02
-
(quoting THE JOINT CHIEFS OF STAFF, JOINT PUB. No. 1-02, DICTIONARY OF MILITARY AND ASSOCIATED TERMS 174 (1998) [hereinafter JOINT PUB. 1-02] (defining espionage as "[t]he act of obtaining, delivering, transmitting, communicating, or receiving information about the national defense of a state with an intent, or reason to believe, that the information may be used to the injury of that state or to the advantage of any foreign nation")).
-
(1998)
Dictionary of Military and Associated Terms
, vol.174
-
-
-
160
-
-
26044458153
-
-
Id. at 131 referring to Exec. Order No. 13,010, 61 Fed. Reg. 37,347 (1996)
-
Id. at 131 (referring to Exec. Order No. 13,010, 61 Fed. Reg. 37,347 (1996),
-
-
-
-
161
-
-
84861251020
-
-
reprinted as amended in 42 U.S.C. § 5195 (2000) [hereinafter Exec. Order 13,010] (defining which systems are sensitive and vital)).
-
(2000)
42 U.S.C. §
, vol.5195
-
-
-
162
-
-
26044445451
-
-
Id. at 129
-
Id. at 129.
-
-
-
-
163
-
-
26044447646
-
-
Id. at 132
-
Id. at 132.
-
-
-
-
164
-
-
26044448999
-
-
note
-
For example, though a CNA that causes a single train crash within a victim state would constitute an unlawful use of force, only a series of incidents or one major incident such as causing the nation's stock exchange to crash would rise to the level of an armed attack.
-
-
-
-
165
-
-
26044475814
-
-
Id. at 117
-
Id. at 117.
-
-
-
-
166
-
-
26044447647
-
Bellum americanum
-
Michael N. Schmitt is a retired U.S. Air Force Lieutenant Colonel and currently a professor of international law at the George C. Marshall European Center for Strategic Studies in Garmisch-Partenkirchen, Germany. He has written several important articles on this issue, including Schmitt, Bellum Americanum, infra note 115,
-
Infra Note
, vol.115
-
-
Schmitt1
-
167
-
-
26044435633
-
Normative framework
-
Schmitt, Normative Framework, supra note 33,
-
Supra Note
, vol.33
-
-
Schmitt1
-
168
-
-
1642551422
-
The principle of discrimination in 21st century warfare
-
and Michael N. Schmitt, The Principle of Discrimination in 21st Century Warfare, 2 YALE HUM. RTS. & DEV. L.J. 143 (1999).
-
2 Yale Hum. Rts. & Dev. L.J.
, vol.143
, pp. 1999
-
-
Schmitt, M.N.1
-
169
-
-
26044435633
-
Normative framework
-
Schmitt, Normative Framework, supra note 33, at 908.
-
Supra Note
, vol.33
, pp. 908
-
-
Schmitt1
-
170
-
-
26044435633
-
Normative framework
-
Schmitt, Normative Framework, supra note 33, at 908 Id.
-
Supra Note
, vol.33
, pp. 908
-
-
Schmitt1
-
171
-
-
26044456696
-
-
Id. at 886
-
Id. at 886.
-
-
-
-
172
-
-
26044438663
-
-
Id. at 911
-
Id. at 911;
-
-
-
-
173
-
-
26044479607
-
-
see also DOD OGC, supra note 85, at 14 (stating that the consequences of a CNA are likely more important than the methods used);
-
Supra Note
, vol.85
, pp. 14
-
-
-
174
-
-
0005532469
-
Bellum americanum: The U.S. view of twenty-first century war and its possible implications for the law of armed conflict
-
Michael N. Schmitt, Bellum Americanum: The U.S. View of Twenty-First Century War and Its Possible Implications for the Law of Armed Conflict, 19 MICH. J. INT'L L. 1051, 1071-72 (1998) [hereinafter Schmitt, Bellum Americanum] (discussing the difference in consequence between a devastating economic embargo which would not be considered a use of force or armed attack and a minor border incursion that may be considered a use of force and possibly an armed attack).
-
(1998)
19 Mich. J. Int'l L.
, vol.1051
, pp. 1071-1072
-
-
Schmitt, M.N.1
-
175
-
-
26044435633
-
Normative framework
-
Schmitt, Normative Framework, supra note 33, at 934.
-
Supra Note
, vol.33
, pp. 934
-
-
Schmitt1
-
176
-
-
26044465003
-
-
Id. at 935
-
Id. at 935. Schmitt's analysis proceeds as follows: 2) If it is not armed force, is the CNA nevertheless a use of force as contemplated in the U.N. Charter? It is if the nature of its consequences track those consequence commonalities which characterize armed force. 3) If the CNA is a use of force (armed or otherwise), is that force applied consistent with Chapter VII, the principle of self-defense, or operational code norms permitting its use in the attendant circumstances? a) If so, the operation is likely to be judged legitimate. b) If not and the operation constitutes a use of armed force, the CNA will violate Article 2(4), as well as the customary international law prohibition on the use of force. c) If not and the operation constitutes a use of force, but not armed force, the CNA will violate Article 2(4). 4) If the CNA does not rise to the level of the use of force, is there another prohibition in international law that would preclude its use? The most likely candidate, albeit not the only one, would be the prohibition on intervening in the affairs of other States. Id. Schmitt uses the term "operational code" to refer to actions that do not fall within the prescribed limitations of the Charter, but that are accepted nonetheless.
-
-
-
-
177
-
-
26044465991
-
-
Id. at 902-03.
-
Id. at 902-03.
-
-
-
-
178
-
-
26044436447
-
-
Id. at 932-33
-
Id. at 932-33.
-
-
-
-
179
-
-
26044475815
-
-
Id. at 933
-
"Note that it is not the CNA that is actually being defended against, but instead the overall armed attack, complete with its information operation component." Id. at 933.
-
-
-
-
180
-
-
26044448803
-
-
DOD OGC, supra note 85.
-
Supra Note
, vol.85
-
-
-
181
-
-
26044478363
-
-
Id. at 16
-
Id. at 16.
-
-
-
-
182
-
-
26044442999
-
-
Exec. Order No. 13,010
-
Exec. Order No. 13,010, supra note 107.
-
Supra Note
, vol.107
-
-
-
183
-
-
26044451671
-
-
supra note 107 Id.
-
Supra Note
, vol.107
-
-
-
184
-
-
26044462134
-
-
supra note 107 Id.
-
Supra Note
, vol.107
-
-
-
185
-
-
84861246558
-
-
Exec. Order No. 13,231, 66 Fed. Reg. 53,063 (Oct. 18, 2001), available at http://www.nara.gov/fedreg/eo2001b.html.
-
(2001)
-
-
-
186
-
-
84861246557
-
-
2001, http://www.nara.gov/fedreg/eo2001b.html Id.
-
(2001)
-
-
-
187
-
-
26044438662
-
-
Id. at 53,064
-
Id. at 53,064.
-
-
-
-
188
-
-
26044468359
-
-
Id. at 53,069
-
Id. at 53,069. As mentioned previously, President Bush has also appointed Richard Clarke,
-
-
-
-
189
-
-
26044478633
-
-
see supra notes 23-26 and accompanying text (quoting Clarke on computer security), as his special advisor on cyberspace security.
-
Supra Notes
, vol.23
, Issue.26
-
-
-
190
-
-
26044431851
-
Officials named for anti-terrorism fight
-
(Baton Rouge, La.), Oct. 1
-
Scott Lindlaw, Officials Named for Anti-Terrorism Fight, THE ADVOCATE (Baton Rouge, La.), Oct. 1, 2001, at 11-A. The White House Office of Cyberspace Security has made the creation of "an analysis center that would help government target the most vulnerable points in the nation's critical infrastructure" one of its top priorities.
-
(2001)
The Advocate
-
-
Lindlaw, S.1
-
191
-
-
84861247599
-
Cybersecurity chief pushes early-warning system
-
Nov. 26
-
Bara Vaida, Cybersecurity Chief Pushes Early-Warning System, NAT'L JOURNAL'S TECH DAILY, Nov. 26, 2001, available at http://www.govexec.com/dailyfed/1101/112601td2.htm. Mr. Clarke has identified ten goals on which the Office of Cyberspace Security is currently working: (1) He and his team in late spring or early summer will release a national cybersecurity strategy worked out with the private sector, "not a table-top book" but one "in Internet time, living in cyberspace, " that will be updated as needed. (2) The FY 2003 budget proposes 8% of IT funds be used for security, although Clarke admitted "we cannot cure many problems in computer networks in one year." (3) Clarke will continue to encourage Internet leaders such as Microsoft's Bill Gates, Oracle's Larry Ellison and Cisco System's John Chambers to focus on security, as those individuals have promised. (4) His team will work with Tier One ISPs to improve Internet security. (5) Scholarships for IT security will be funded in exchange for commitments to work for the federal govt. (6) The govt. and the private sector will work to develop a cyberintelligence warning network "to share information in real time." (7) The possibility of a separate network such as GovNet will continue to be examined, an effort Clarke said was being researched now by 167 companies. (8) A national infrastructure modeling center would be developed to predict and cope with future attacks. (9) Homes and small businesses would be encouraged to increase cybersecurity. (10) The Commerce Dept.'s critical infrastructure efforts would work hand-in-hand with the FBI's National Infrastructure Protection Center (NIPC). Terrorists May Have Penetrated Internet System Already,
-
(2001)
Nat'l Journal's Tech Daily
-
-
Vaida, B.1
-
192
-
-
26044450841
-
-
Feb. 14, LEXIS, Nexis Library, CURNWS File
-
Clarke Warns, WASH. INTERNET DAILY, Feb. 14, 2002, LEXIS, Nexis Library, CURNWS File.
-
(2002)
Wash. Internet Daily
-
-
Warns, C.1
-
193
-
-
26044437356
-
Ashcroft warns about cyberattacks; attorney general calls for more protection of critical infrastructure
-
Feb. 13
-
See Alan Goldstein, Ashcroft Warns About Cyberattacks; Attorney General Calls For More Protection of Critical Infrastructure, DALLAS MORNING NEWS, Feb. 13, 2002, at 1D (Business Section) ("U.S. Attorney General John Ashcroft warned Tuesday that potential terrorist invasions of computer networks could be just as dangerous as attacks on physical places, saying that more needs to be done to protect the nation's so-called critical infrastructure.").
-
(2002)
Dallas Morning News
-
-
Goldstein, A.1
-
194
-
-
26044482385
-
Winkler says gov't ignored cyberattack wake-up calls
-
Mar. 1, LEXIS, Nexis Library, CURNWS File
-
But see Winkler Says Gov't Ignored Cyberattack Wake-up Calls, COMM. DAILY, Mar. 1, 2002, LEXIS, Nexis Library, CURNWS File (quoting Ira Winkler, chief security strategist for Hewlett-Packard, who condemns the government's inaction and lack of real response to warnings over the past five years saying, "[t]here have been no lessons learned or applied by government . . . any of the practical lessons learned would have prevented a lot of these problems").
-
(2002)
Comm. Daily
-
-
-
195
-
-
26044461574
-
-
Simma, supra note 72, at 112 (arguing that Articles 2(4) and 51 were not intended to proscribe political or economic coercion);
-
Supra Note
, vol.72
, pp. 112
-
-
Simma1
-
196
-
-
26044450501
-
-
see also SHARP, supra note 57, at 99-109.
-
Supra Note
, vol.57
, pp. 99-109
-
-
Sharp1
-
197
-
-
26044433300
-
-
DOD OGC, supra note 85, at 23.
-
Supra Note
, vol.85
, pp. 23
-
-
-
198
-
-
26044470097
-
-
Id. Though a detailed interpretation on the current state of the law, the DOD OGC paper makes no attempt to put forward any theory on how to handle this difficult area, or even put potential offenders on notice that the United States views certain acts as violations of its sovereignty and potential uses of force.
-
Supra Note
, vol.85
, pp. 23
-
-
-
199
-
-
26044447098
-
-
note
-
The USA Patriot Act of 2001, passed in response to the September 11, 2001 terrorist acts, expands domestic legal options in the area of CND, but does not go far enough, particularly to protect critical national infrastructure. USA Patriot Act of 2001, Pub. L. No. 107-56, 115 Stat. 1394 (2001). Pertinent provisions of the Act include: § 202, which adds felony violations of the Computer Fraud and Abuse Act to the list of offenses that support a voice wiretap; § 203b, which encourages sharing of information between all federal agencies; § 210, which expands the coverage of a subpoena for electronic evidence; § 211, which brings internet services within the ECPA trap and trace rules; § 214, which modifies the FISA pen register, trap and trace requirements to replace "agent of a foreign power" with a showing that the register or trap and trace is relevant to an investigation to protect against international terrorism; § 216, which expands generally pen register, trap and trace authority; § 217, which allows victims of computer attacks to authorize system monitoring; § 218, which makes obtaining foreign intelligence "a significant purpose" rather than "the purpose" of the search for obtaining a warrant; § 219, which authorizes single-jurisdiction search warrants in any district where terrorist acts may have occurred; § 220 which allows nationwide search warrants for email; § 377 which provides extraterritorial jurisdiction for certain computer data theft cases; and § 1016, which creates the National Infrastructure Simulation and Analysis Center (NISAC) and authorizes $20 million for the Defense Threat Reduction Agency.
-
-
-
-
200
-
-
26044468988
-
-
Id
-
Id.
-
-
-
-
201
-
-
26044465472
-
-
note
-
This Article will consider only responses that amount to a use of force and can be accomplished in a relatively quick amount of time. It will not discuss other potential responses such as diplomatic measures or sanctions, extradition of the perpetrator, and other proposed and current remedies. As discussed above, in the case of critical national infrastructure protection, these remedies take too long and will not provide sufficient protection for critical systems.
-
-
-
-
203
-
-
0347595394
-
Discrimination in the laws of information warfare
-
Mark R. Shulman, Discrimination in the Laws of Information Warfare, 37 COLUM. J. TRANSNAT'L L. 939, 955-56 (1999). Shulman states: In [information warfare, the attacker] would be a combatant and subject to proportional response. In fact, if the target of her attack did not have the means [sic] respond with his own [information warfare] measures, he could reasonably bomb the building in which she is believed to be sitting - again a proportional response but one that returns kinetic destruction for that created by electronic means.
-
(1999)
37 Colum. J. Transnat'l L.
, vol.939
, pp. 955-956
-
-
Shulman, M.R.1
-
205
-
-
26044451141
-
-
"CND is the mission to defend computer systems and networks from unauthorized activity and other activity, which degrade mission performance and adversely impact survivability (e.g., disruption, denial, degradation, destruction, or exploitation)." CHAIRMAN, THE JOINT CHIEFS OF STAFF INSTRUCTION 6510.01C, INFORMATION ASSURANCE AND COMPUTER NETWORK DEFENSE, encl. A, para. 1(a) (May 1, 2001). This mission is to be accomplished by "employing communications, law enforcement, counterintelligence, and Intelligence Community capabilities in response to specific or potential threats" (emphasis added).
-
Chairman, The Joint Chiefs of Staff Instruction 6510.01C, Information Assurance and Computer Network Defense
-
-
-
207
-
-
26044481922
-
Denning
-
Encryption is the process of producing a scrambled ciphertext that can only be unscrambled by someone who has the secret key or decryption. DENNING, supra note 2, at 286.
-
Supra Note
, vol.2
, pp. 286
-
-
-
208
-
-
26044467833
-
-
Id. at 353
-
"A firewall is a network monitor or collection of monitors placed between an organization's internal network and the Internet or between two local area networks . . . . A firewall is essentially a guarded gateway between two networks." Id. at 353.
-
-
-
-
209
-
-
26044440126
-
-
Id. at 361
-
Automated detection is the process of programming computers to "scan computer records or on-line computer activity for patterns that indicate or suggest the presence of unauthorized activity." Id. at 361.
-
-
-
-
210
-
-
84861247596
-
Advertising tighter measures 'essential,'
-
Nov. 5, § 2
-
Advertising Tighter Measures 'Essential,' INFOTECH WEEKLY, Nov. 5, 2001, § 2, at 27.
-
(2001)
Infotech Weekly
, pp. 27
-
-
-
211
-
-
26044481371
-
Forescout technologies ships activeScout product, unique perimeter defense system accurately blocks network attacks in real time; activeScout automatically stops attacks before they reach the firewall
-
Feb. 4, LEXIS, News Library, CURNWS File
-
ForeScout Technologies Ships ActiveScout Product, Unique Perimeter Defense System Accurately Blocks Network Attacks in Real Time; ActiveScout Automatically Stops Attacks Before They Reach the Firewall, INTERNET WIRE, Feb. 4, 2002, LEXIS, News Library, CURNWS File.
-
(2002)
Internet Wire
-
-
-
212
-
-
26044437358
-
-
DOD OGC, supra note 85, at 18.
-
Supra Note
, vol.85
, pp. 18
-
-
-
213
-
-
26044477694
-
-
Aldrich, supra note 92, 258-60 (stating that the Department of Justice is opposed to an active computer network defense system because of potential difficulties inherent in controlling such a response and because it believes such a system would violate the Computer Fraud and Abuse Act; and, urging national security exemptions to these laws to facilitate an adequate defense against information warfare).
-
Supra Note
, vol.92
, pp. 258-260
-
-
Aldrich1
-
216
-
-
26044455589
-
Denning
-
DENNING, supra note 2, at 392.
-
Supra Note
, vol.2
, pp. 392
-
-
-
217
-
-
26044468987
-
Newark security still the 'wild west,'
-
Feb. 26
-
William B. Scott, Newark Security Still the 'Wild West,' AVIATION WK. & SPACE TECH., Feb. 26, 2001, at 62 (quoting a high-level Pentagon official as saying the government has an "immediate kill" tactic already in place to protect national "crown jewels" against network intrusions).
-
(2001)
Aviation WK. & Space Tech.
, pp. 62
-
-
Scott, W.B.1
-
218
-
-
26044439876
-
Denning
-
DENNING, supra note 2, at 393.
-
Supra Note
, vol.2
, pp. 393
-
-
-
219
-
-
26044466927
-
Tactics to combat cyber-attacks
-
Jan. 9
-
Prem Kumar, Tactics to Combat Cyber-Attacks, Bus. LINE, Jan. 9, 2002, LEXIS, Nexis Library, CURNWS File, where the author states: With the rapid rise in the attacks on military computers, the guardians of the Pentagon information system want to look beyond the passive set-up of firewalls, sensors and computer experts. According to the journal Defense News, there is a proposal to deploy Active Network Defense, which "will track down hackers with techniques that trace the origin of the attack."
-
(2002)
Bus. Line
-
-
Kumar, P.1
-
220
-
-
26044466927
-
Tactics to combat cyber-attacks
-
Prem Kumar, Tactics to Combat Cyber-Attacks, Bus. LINE 2002 Id.
-
(2002)
Bus. Line
-
-
Kumar, P.1
-
222
-
-
84923803532
-
Note, resolving the legal issues concerning the use of information warfare in the international forum: The reach of the existing legal framework, and the creation of a new paradigm
-
paras. 63-67
-
Michael J. Robbat, Note, Resolving the Legal Issues Concerning the Use of Information Warfare in the International Forum: The Reach of the Existing Legal Framework, and the Creation of a New Paradigm, 6 B.U. J. SCI. & TECH. L. 10, paras. 63-67 (2000) (proposing an international convention with the intent to proclaim CNA and other forms of information warfare as an "armed use of force" and provide for universal cooperation and extradition).
-
(2000)
6 B.U. J. Sci. & Tech. L.
, vol.10
-
-
Robbat, M.J.1
-
223
-
-
26044476561
-
-
BORCHGRAVE ET AL., supra note 1, at 3. Understanding the distinctions between attacks and motives, and improving our nation's ability to provide fast and accurate assessments of the nature of both the attacks and their perpetrators, are a core part of the problem at hand. [B]oth the likely criminal entities and the damage they seek to inflict become more difficult to identify, quantify, and warn against. It is increasingly complicated to distinguish between a national security threat, criminal activity, and malicious but low-level disruption.
-
Supra Note
, vol.1
, pp. 3
-
-
Borchgrave1
-
225
-
-
26044442470
-
Responding to attacks on critical computer infrastructure: What targets? What rules of engagement?
-
USMC (ret.)
-
James P. Terry, USMC (ret.), Responding to Attacks on Critical Computer Infrastructure: What Targets? What Rules of Engagement?, 46 NAVAL. L. REV. 170, 177 (1999) (arguing that any time lapse should not preclude a military response). The Article notes that: [I]t would be unreasonable to preclude the victim of techno-violence from redress, based upon a doctrinaire determination that the threat of further destructive intrusions into a critical system is no longer imminent, when the perpetrator's own actions have precluded immediate identification.
-
(1999)
46 Naval. L. Rev.
, vol.170
, pp. 177
-
-
Terry, J.P.1
-
226
-
-
26044442470
-
Responding to attacks on critical computer infrastructure: What targets? What rules of engagement?
-
James P. Terry, Responding to Attacks on Critical Computer Infrastructure: What Targets? What Rules of Engagement?, 46 NAVAL. L. REV. 170, 177 (1999) Id.
-
(1999)
46 Naval. L. Rev.
, vol.170
, pp. 177
-
-
Terry, J.P.1
-
227
-
-
26044438121
-
-
Souder, supra note 34. "[I]t is possible to predict that, in many cases, attribution for the attack will not be possible."
-
Supra Note
, vol.34
-
-
Souder1
-
229
-
-
26044456104
-
-
BORCHGRAVE ET AL., supra note 1, at 46 (arguing that a passive response "undermines efforts geared at identifying attackers and adopting deterrent measures toward future hostile acts").
-
Supra Note
, vol.1
, pp. 46
-
-
Borchgrave1
-
230
-
-
33745445718
-
Declaration on principles of international law concerning friendly relations and cooperation among states in accordance with the charter of the United Nations
-
U.N. GAOR, 25th Sess., Supp. No. 28, at 122, U.N. Doc. A/RES/2625
-
Declaration on Principles of International Law Concerning Friendly Relations and Cooperation Among States in Accordance with the Charter of the United Nations, G.A. Res. 2625, U.N. GAOR, 25th Sess., Supp. No. 28, at 122, U.N. Doc. A/RES/2625 (1970).
-
(1970)
G.A. Res.
, vol.2625
-
-
-
231
-
-
26044460418
-
Military and paramilitary activities (Nicar. v. U.S.)
-
(June 27) (Merits)
-
Military and Paramilitary Activities (Nicar. v. U.S.), 1986 I.C.J. 94 (June 27) (Merits).
-
1986 I.C.J.
, vol.94
-
-
-
233
-
-
26044458813
-
-
DOD OGC, supra note 85, at 2 (noting that exceptions to this include war crimes, genocide, crimes against humanity, and crimes against peace);
-
Supra Note
, vol.85
, pp. 2
-
-
-
234
-
-
84861237047
-
Computer crime against the army doesn't pay
-
Dec. 3
-
see also Ann Roosevelt, Computer Crime Against the Army Doesn't Pay, DEF. WK., Dec. 3, 2001, available at www.kingpublishing.com (password required) (copy on file with the author) (stating that between March 1, 2000 and October
-
(2001)
Def. Wk.
-
-
Roosevelt, A.1
-
235
-
-
26044446120
-
The laws of armed conflicts
-
During armed conflict, the law of war prohibits targeting attacks on civilians unless specific criteria are met. As stated in the preamble to the 1868 Declaration of St. Petersburg, "the only legitimate object which States should endeavour to accomplish during war is to weaken the military forces of the enemy." THE LAWS OF ARMED CONFLICTS, supra note 45, at 102. Therefore, civilian populations, as well as civilian objects, are not to be the object of attack unless they somehow lose their protected status.
-
Supra Note
, vol.45
, pp. 102
-
-
-
236
-
-
23944491390
-
Protocol additional to the geneva conventions of 12 August 1949, and relating to the protection of victims of international armed conflicts, Dec. 12, 1977
-
See Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts, Dec. 12, 1977, 16 I.L.M. 1391, 1442 (1977) [hereinafter Protocol Additional]. The United States recognizes portions of the Protocol Additional as customary international law.
-
(1977)
16 I.L.M.
, vol.1391
, pp. 1442
-
-
-
237
-
-
0040104322
-
The united slates position on the relation of customary law to the 1977 protocols additional to the 1949 geneva conventions
-
Michael J. Matheson, The United Slates Position on the Relation of Customary Law to the 1977 Protocols Additional to the 1949 Geneva Conventions, 2 AM. U. J. INT'LL. & POL'Y 419, 421 (1987). The general rule regarding distinction during an armed conflict is found in Article 48, which states: "In order to ensure respect for and protection of the civilian population and civilian objects, the Parties to the conflict shall at all times distinguish between the civilian population and combatants and between civilian objects and military objectives and accordingly shall direct their operations only against military objectives."
-
(1987)
2 Am. U. J. Int'll. & Pol'y
, vol.419
, pp. 421
-
-
Matheson, M.J.1
-
238
-
-
26044465471
-
Protocol additional
-
art. 48
-
Protocol Additional, supra, art. 48. The United States accepts Article 48 as customary international law
-
Supra
-
-
-
239
-
-
77950384391
-
-
. Matheson, supra, at 426. Several articles that follow this provision expand on these terms and how this protection is to be applied. Article 51 pronounces rules intended to protect civilians from the dangers arising from military operations. Not only does it preclude making civilians the "object of attack" unless they take a "direct part" in hostilities, but it also precludes attacks that are unable to discriminate or be directed at a particular military object. The Protocol specifically identifies "an attack which may be expected to cause incidental loss of civilian life, injury to civilians, damage to civilian objects, or a combination thereof, which would be excessive in relation to the concrete and direct military advantage anticipated."
-
Supra
, pp. 426
-
-
Matheson1
-
240
-
-
26044465471
-
Protocol additional
-
art. 51
-
Protocol Additional, supra, art. 51. The United States accepts much of Article 51 as customary international law.
-
Supra
-
-
-
242
-
-
84861254983
-
Cyberforce threatens Taiwan
-
Mar. 8
-
Oliver August, Cyberforce Threatens Taiwan, LONDON TIMES, Mar. 8, 2000, available at http://ebird.dtic.mil/Mar2000/e20000308cyberforce.htm (discussing anticipated attacks on Taiwan from China during the upcoming elections);
-
(2000)
London Times
-
-
-
243
-
-
26044463965
-
Rules of cyber war baffle U.S. government agencies
-
Feb.
-
John J. Stanton, Rules of Cyber War Baffle U.S. Government Agencies, NAT'L DEF., Feb. 2000, at 29 (discussing the cyber attack on Taiwan causing a nationwide blackout and subsequent crash of bank teller machines thought to have been caused by Chinese state-sponsored computer hacks);
-
(2000)
Nat'l Def.
, pp. 29
-
-
Stanton, J.J.1
-
244
-
-
26044466378
-
A glimpse of cyberwarfare
-
Mar. 13
-
Warren P. Strobel et al., A Glimpse of Cyberwarfare, U.S. NEWS & WORLD REPORT, Mar. 13, 2000, at 32;
-
(2000)
U.S. News & World Report
, pp. 32
-
-
Strobel, W.P.1
-
245
-
-
26044437867
-
Crippling cyberattack in 10 years: CSIS: Russia, China, India, Cuba actively advancing cyberwar capability
-
July 18
-
see also Jim Bronskill, Crippling Cyberattack in 10 years: CSIS: Russia, China, India, Cuba Actively Advancing Cyberwar Capability, OTTAWA CITIZEN, July 18, 2001, at A3 (putting the time frame for a cyber attack at within ten years);
-
(2001)
Ottawa Citizen
-
-
Bronskill, J.1
-
246
-
-
26044432676
-
Secrecy shrouds computer war threat
-
Feb. 26
-
cf. Robert Wall & David A. Fulghum, Secrecy Shrouds Computer War Threat, AVIATION WK. & SPACE TECH., Feb. 26, 2001, at 56 (quoting an Air Force general who states, "[b]eginning in 2005, the probability of a cyber attack using state-sponsored capability gets very high"). The most noted potentially state-sponsored attack that the government has divulged originates from Russia and has been termed Moonlight Maze. The attack started in 1998 and has been traced to seven Russian internet addresses. James Adams, writing in the May/June 2001 issue of Foreign Affairs, states "[d]espite all the investigative effort, the United States still does not know who is behind the attacks, what additional information has been taken and why, to what extent the public and private sectors have been penetrated, and what else has been left behind that could still damage the vulnerable networks."
-
(2001)
Aviation WK. & Space Tech.
, pp. 56
-
-
Wall, R.1
Fulghum, D.A.2
-
247
-
-
6244245533
-
Virtual defense
-
May/June
-
James Adams, Virtual Defense, FOREIGN AFFAIRS, May/June 2001, at 100.
-
(2001)
Foreign Affairs
, pp. 100
-
-
Adams, J.1
-
249
-
-
26044437868
-
-
SHARP, supra note 57, at 22. It is also important to note that President Clinton determined that all such intrusions, even into critical national infrastructure, should initially be considered a law enforcement issue.
-
Supra Note
, vol.57
, pp. 22
-
-
Sharp1
-
250
-
-
84861246552
-
-
Critical Infrastructure Protection, at Annex A May 22
-
Presidential Decision Directive 63, Critical Infrastructure Protection, at Annex A (May 22, 1998), available at http://www.fas.org/irp/offdocs/pdd/pdd-63.htm.
-
(1998)
Presidential Decision Directive
, vol.63
-
-
-
251
-
-
26044459372
-
-
On the other hand, once the origin of the attack becomes known, much more severe measures could be appropriate. See DOD OGC, supra note 85, at 15 (arguing that though the response must be proportional, it need not use the same means as the attacker). [T]here is no requirement that an act of self-defense use the same means as the provocation, that the object of the attack be either a similar type target or the means used in the offending attacks, or that the action taken be contemporaneous with the provocation, particularly if the attacker is responding to a continuing course of conduct.
-
Supra Note
, vol.85
, pp. 15
-
-
-
252
-
-
26044447918
-
-
supra note 85, at 15 Id. Scholarly writings reflect this same attitude on the subject.
-
Supra Note
, vol.85
, pp. 15
-
-
-
253
-
-
26044480034
-
-
See Shulman, supra note 137, at 956 (suggesting that if the victim of a CNA did not have the capability to respond with CNA or CND, it could legally proportionally respond with kinetic destruction of the computer system).
-
Supra Note
, vol.137
, pp. 956
-
-
Shulman1
-
254
-
-
26044433568
-
Normative frammork
-
Schmitt, Normative Frammork, supra note 33, at 892.
-
Supra Note
, vol.33
, pp. 892
-
-
Schmitt1
-
256
-
-
26044462135
-
-
See, e.g., Shulman, supra note 137, at 955-56 (arguing that during armed conflict, even a protected person conducting a lethal CNA would lose her status and become the legitimate target of a response). Shulman states: The person launching a computer virus to attack an American military communications system, for example, might be sitting in the basement of a publicly traded telephone company wearing a nun's habit. Instead of a military uniform, she would be wearing the symbol of clergy - a protected group [under the law of war], and she would be sitting in a privately owned building also doubly protected by being private and vital to the well-being of society. Even assuming she is indeed a nun and not an impostor, she would nonetheless also be a combatant subject to a proportional response, such as the destruction of her own computer or the local area network.
-
Supra Note
, vol.137
, pp. 955-956
-
-
Shulman1
-
257
-
-
26044462135
-
-
Id.
-
Supra Note
, vol.137
, pp. 955-956
-
-
-
258
-
-
26044447647
-
Bellum americanum
-
Schmitt, Bellum Americanum, supra note 115, at 1073-74.
-
Supra Note
, vol.115
, pp. 1073-1074
-
-
Schmitt1
-
259
-
-
26044451140
-
-
INSTRUCTION 3121.01A
-
INSTRUCTION 3121.01A, supra note 98.
-
Supra Note
, vol.98
-
-
-
260
-
-
84861251379
-
Information age state security: New threats to old boundaries
-
Nov.
-
Uri Fisher, Information Age State Security: New Threats to Old Boundaries, J. HOMELAND SECURITY, Nov. 2001, at http://www.homelandsecurity.org/journal/Anicles/fisher.htm (stating that cyber attacks represent a greater attack on a nation's geographic territorial sovereignty than even nuclear weapons with their long distance capability).
-
(2001)
J. Homeland Security
-
-
Fisher, U.1
-
261
-
-
26044468097
-
-
note
-
As mentioned previously, it is only after the passive defenses have been penetrated that the active defenses or "hack-back" would occur. Thus, there would be time prior to the penetration of the passive defenses to take intermediate steps.
-
-
-
-
263
-
-
26044477419
-
-
1?3 It is insufficient in such a case to simply turn off the computer or sever the connection with the attacker. Not only does this allow the attacker to control the situation by forcing a continuing interruption in the ability of a nation to use its own computer systems, but it also provides no deterrent against the continuing invasion of the system. Further, as in the case of an air traffic control computer system, shutting the system down may itself create the conditions for lethal consequences. For self-defense to have any real meaning, it must not only deflect the lethal attacks of the aggressor, but must also allow for degradation of the aggressor's ability to continue to commit those lethal acts. See Sirak, supra note 4, at 28;
-
Supra Note
, vol.4
, pp. 28
-
-
Sirak1
-
266
-
-
26044468358
-
-
JOINT PUB. 1-02
-
(quoting JOINT PUB. 1-02, supra note 105, at 398). Joint Pub. 1-02 defines rules of engagement (ROE) as [directives issued by competent military authority to delineate the circumstances and limitations under which its own naval, ground, and air forces will initiate and/or continue combat engagement with other forces encountered. They are the means by which the National Command Authority (NCA) and operational commanders regulate the use of armed force in the context of applicable political and military policy and domestic and international law.
-
Supra Note
, vol.105
, pp. 398
-
-
-
267
-
-
26044468358
-
-
supra note 105, at 398 Id.
-
Supra Note
, vol.105
, pp. 398
-
-
-
268
-
-
26044481099
-
-
SHARP, supra note 57, at 149. Hostile intent is defined as "[t]he threat of imminent use of force against the United States, U.S. forces, and in certain circumstances, U.S. nationals, their property, U.S. commercial assets, and/or other designated non-US forces, foreign nationals and their property."
-
Supra Note
, vol.57
, pp. 149
-
-
Sharp1
-
269
-
-
26044481099
-
-
SHARP, supra note 57, at 149 Id. Hostile act is defined as "[a]n attack or other use of force against the United States, U.S. forces, and, in certain circumstances, U.S. nationals, their property, U.S. commercial assets, and/or other designated non-US forces, foreign nationals and their property."
-
Supra Note
, vol.57
, pp. 149
-
-
Sharp1
-
270
-
-
26044481099
-
-
SHARP, supra note 57, at 149 Id.
-
Supra Note
, vol.57
, pp. 149
-
-
Sharp1
-
271
-
-
26044481099
-
-
SHARP, supra note 57, at 149 Id. The definitions of hostile act and hostile intent are significant because service members and their commanders have not only the authority, but also the obligation to respond to them. "A unit commander has the authority and obligation to use all necessary means available and take all appropriate actions to defend the unit, including elements and personnel, or other U.S. forces in the vicinity, against a hostile act or demonstrated hostile intent."
-
Supra Note
, vol.57
, pp. 149
-
-
Sharp1
-
272
-
-
26044481099
-
-
SHARP, supra note 57, at 149 Id.
-
Supra Note
, vol.57
, pp. 149
-
-
Sharp1
-
273
-
-
26044438972
-
-
note
-
This could be accomplished through a combination of warning banners on critical national infrastructure websites, policy statements, and inclusion in government publications.
-
-
-
-
274
-
-
26044443148
-
Self-defense
-
Whiteman, Self-Defense, supra note 70, at 982;
-
Supra Note
, vol.70
, pp. 982
-
-
Whiteman1
-
275
-
-
26044435633
-
Normative framework
-
see also Schmitt, Normative Framework, supra note 33, at 931 (discussing the fact that the window of opportunity to respond in self-defense is different under different methods of attack). "Hence, the appropriate question relates more to the correct timing of the preemptive strike than to the imminence of the attack that animates it."
-
Supra Note
, vol.33
, pp. 931
-
-
Schmitt1
-
276
-
-
26044435633
-
Normative framework
-
Schmitt, Normative Framework, supra note 33, at 931 Id.
-
Supra Note
, vol.33
, pp. 931
-
-
Schmitt1
-
277
-
-
26044477418
-
Note, comparing the 1993 U.S. airstrike on Iraq to the 1986 bombing of libya: The new interpretation of article 51
-
On April 14, 1986, in response to recent bombings in Europe involving U.S. soldiers, the United States conducted a bombing strike on various terrorist and military targets in Libya. President Reagan justified these actions as within the U.S.'s right of self-defense under Article 51 of the U.N. Charter. Stuart G Baker, Note, Comparing the 1993 U.S. Airstrike on Iraq to the 1986 Bombing of Libya: The New Interpretation of Article 51, 24 GA. J. INT'L & COMP. L. 99, 106 (1994). In preparation for this strike, France denied the U.S. request to fly over its airspace in furtherance of its military operation and Spain stated after the fact that it would have denied permission had it been asked.
-
(1994)
24 Ga. J. int'l & Comp. L.
, vol.99
, pp. 106
-
-
Baker, S.G.1
-
278
-
-
26044473876
-
-
Id. at 106 n.36
-
Id. at 106 n.36. Though France and Spain may have acted out of a belief that this was not justifiable self-defense, the interaction highlights the question of the use of neutral territory in the exercise of self-defense. Even if transiting a nation's airspace might be a violation of that nation's territorial sovereignty, the DOD OGC has concluded that "use of a nation's communications networks as a conduit for an electronic attack would not be a violation of its sovereignty in the same way that would be a flight through its airspace by a military aircraft."
-
-
-
-
279
-
-
26044459589
-
-
DOD OGC, supra note 85, at 21. For an excellent discussion of neutrality in information warfare,
-
Supra Note
, vol.85
, pp. 21
-
-
-
282
-
-
26044444364
-
The laws of armed conflicts
-
THE LAWS OF ARMED CONFLICTS, supra note 45, at 941.
-
Supra Note
, vol.45
, pp. 941
-
-
-
283
-
-
26044482191
-
-
Id. at 943
-
Id. at 943. Article 8. A neutral Power is not called upon to forbid or restrict the use on behalf of the belligerents of telegraph or telephone cables or of wireless telegraphy apparatus belonging to it or to companies or private individuals. Article 9. Every measure of restriction or prohibition taken by a neutral power in regard to the matters referred to in Article 7 and 8 must be impartially applied by it to both belligerents. A neutral Power must see to the same obligation being observed by companies or private individuals owning telegraph or telephone cables or wireless telegraphy apparatus.
-
-
-
-
284
-
-
26044476825
-
-
Id
-
Id.
-
-
-
-
285
-
-
26044455343
-
-
Id. at 943
-
Id. at 943.
-
-
-
-
286
-
-
26044456973
-
-
DOD OGC, supra note 85, at 6.
-
Supra Note
, vol.85
, pp. 6
-
-
-
287
-
-
26044434579
-
-
In the case of Moonlight Maze, the Russian government has been contacted and has made no efforts to stop the computer intrusions. Adams, supra note 162, at 98,100. According to James Adams, "[L]ast year, Washington issued a demarche to the Russian government and provided Russian officials with the telephone numbers from which the attacks appeared to be originating. Moscow said the numbers were in-operative and denied any prior knowledge of the attacks."
-
Supra Note
, vol.162
, pp. 98
-
-
Adams1
-
288
-
-
26044463395
-
-
Id. at 100
-
Id. at 100.
-
-
-
-
289
-
-
26044436446
-
-
at para. 11
-
Robbat, supra note 152, at para. 11.
-
Supra Note
, vol.152
-
-
Robbat1
-
290
-
-
26044436192
-
-
DOD OGC, supra note 85, at 21.
-
Supra Note
, vol.85
, pp. 21
-
-
|