메뉴 건너뛰기




Volumn 106, Issue 7, 2008, Pages 1427-1452

Hacking into international humanitarian law: The principles of distinction and neutrality in the age of cyber warfare

(1)  Kelsey, Jeffrey T G a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 44949208439     PISSN: 00262234     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Review
Times cited : (49)

References (174)
  • 1
    • 34249748993 scopus 로고    scopus 로고
    • Economist, May 26, at, 63
    • Newly nasty, Economist, May 26, 2007, at 63, 63.
    • (2007) Newly nasty , pp. 63
  • 2
    • 44949193492 scopus 로고    scopus 로고
    • Id
    • Id.
  • 3
    • 44949107871 scopus 로고    scopus 로고
    • Id. (quoting Linnar Viik, who is described as Estonia's top internet guru).
    • Id. (quoting Linnar Viik, who is described as "Estonia's top internet guru").
  • 4
    • 44949197395 scopus 로고    scopus 로고
    • Id
    • Id.
  • 5
    • 44949229867 scopus 로고    scopus 로고
    • Id
    • Id.
  • 6
    • 44949110761 scopus 로고    scopus 로고
    • Id
    • Id.
  • 7
    • 44949223167 scopus 로고    scopus 로고
    • See U.N. Charter art. 51; The mouse that roared: Is cyberwarfare a serious threat?, Economist.com, Sept. 5, 2007, http://www.economist.com/daily/news/displaystory.cfm?story_id=9752625&fsrc= nwl [hereinafter The mouse that roared].
    • See U.N. Charter art. 51; The mouse that roared: Is cyberwarfare a serious threat?, Economist.com, Sept. 5, 2007, http://www.economist.com/daily/news/displaystory.cfm?story_id=9752625&fsrc= nwl [hereinafter The mouse that roared].
  • 9
    • 44949155058 scopus 로고    scopus 로고
    • The mouse that roared, supra note 7
    • The mouse that roared, supra note 7.
  • 10
    • 44949209185 scopus 로고    scopus 로고
    • Latin for justice to war. It is the international legal framework that governs a state's decision to use force. E.g., INTERNATIONAL COMMITTEE OF THE RED CROSS, INTERNATIONAL HUMANITARIAN LAW: ANSWERS TO YOUR QUESTIONS 15 (2002) [hereinafter ICRC, Answers].
    • Latin for "justice to war." It is the international legal framework that governs a state's decision to use force. E.g., INTERNATIONAL COMMITTEE OF THE RED CROSS, INTERNATIONAL HUMANITARIAN LAW: ANSWERS TO YOUR QUESTIONS 15 (2002) [hereinafter ICRC, Answers].
  • 11
    • 26044472171 scopus 로고    scopus 로고
    • Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense, 38 Stan
    • See, e.g
    • See, e.g., Eric Talbot Jensen, Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense, 38 Stan. J. Int'l L. 207 (2002).
    • (2002) J. Int , vol.50 , Issue.L , pp. 207
    • Talbot Jensen, E.1
  • 12
    • 44949094070 scopus 로고    scopus 로고
    • This is the law governing the conduct of war. ICRC, ANSWERS, supra note 10, at 16
    • This is the law governing the conduct of war. ICRC, ANSWERS, supra note 10, at 16.
  • 14
    • 44949253718 scopus 로고    scopus 로고
    • See, e.g., Robert G. Hanseman, The Realities and Legalities of Information Warfare, 42 A.F.L. REV. 173, 187 (1997);
    • See, e.g., Robert G. Hanseman, The Realities and Legalities of Information Warfare, 42 A.F.L. REV. 173, 187 (1997);
  • 15
    • 44949186155 scopus 로고    scopus 로고
    • Bruce Smith, An Eye for an Eye, a Byte for a Byte, Fed. L., Oct. 1995, at 12.
    • Bruce Smith, An Eye for an Eye, a Byte for a Byte, Fed. L., Oct. 1995, at 12.
  • 16
    • 44949178102 scopus 로고    scopus 로고
    • See, e.g., Jeffrey K. Walker, The Demise of the Nation-State, The Dawn of New Paradigm Warfare, and a Future for the Profession of Arms, 51 A.F. L. REV. 323, 337-38 (2001);
    • See, e.g., Jeffrey K. Walker, The Demise of the Nation-State, The Dawn of New Paradigm Warfare, and a Future for the Profession of Arms, 51 A.F. L. REV. 323, 337-38 (2001);
  • 17
    • 44949152245 scopus 로고    scopus 로고
    • Bradley Graham, Military Grappling With Guidelines For Cyber Warfare; Questions Prevented Use on Yugoslavia, WASH. POST, Nov. 8, 1999, at A1 (Russia warned that information operations 'might lead to an escalation of the arms race.' It said 'contemporary international law has virtually no means of regulating the development and application of such a weapon.' ).
    • Bradley Graham, Military Grappling With Guidelines For Cyber Warfare; Questions Prevented Use on Yugoslavia, WASH. POST, Nov. 8, 1999, at A1 ("Russia warned that information operations 'might lead to an escalation of the arms race.' It said 'contemporary international law has virtually no means of regulating the development and application of such a weapon.' ").
  • 18
    • 33645134706 scopus 로고    scopus 로고
    • See Davis Brown, A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict, 47 HARV. INT'L L.J. 179 (2006).
    • See Davis Brown, A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict, 47 HARV. INT'L L.J. 179 (2006).
  • 19
    • 44949160791 scopus 로고    scopus 로고
    • Graham, supra note 15
    • Graham, supra note 15.
  • 20
    • 44949251452 scopus 로고    scopus 로고
    • See, e.g., DEPT. OF DEFENSE OFFICE OF GEN. COUNSEL, AN ASSESSMENT OF INTERNATIONAL LEGAL ISSUES IN INFORMATION OPERATIONS 11 (1999), http://www.maxwell.af.mil/ au/awc/awcgate/dod-io-legal/dod-io-legal.pdf [hereinafter DOD, Assessment] (There are novel features of information operations that will require expansion and interpretation of the established principles of the law of war. Nevertheless, the outcome of this process of extrapolation appears to be reasonably predictable.);
    • See, e.g., DEPT. OF DEFENSE OFFICE OF GEN. COUNSEL, AN ASSESSMENT OF INTERNATIONAL LEGAL ISSUES IN INFORMATION OPERATIONS 11 (1999), http://www.maxwell.af.mil/ au/awc/awcgate/dod-io-legal/dod-io-legal.pdf [hereinafter DOD, Assessment] ("There are novel features of information operations that will require expansion and interpretation of the established principles of the law of war. Nevertheless, the outcome of this process of extrapolation appears to be reasonably predictable.");
  • 21
    • 44949136972 scopus 로고    scopus 로고
    • Roger D. Scott, Legal Aspects of Information Warfare: Military Disruption of Telecommunications, 45 NAVAL L. REV. 57, 59 (1998) (Anyone with an understanding of the fundamental principles of the law of war will not need specific, 'no-brainer' precedents to assess the legality of proposals for information attack.).
    • Roger D. Scott, Legal Aspects of Information Warfare: Military Disruption of Telecommunications, 45 NAVAL L. REV. 57, 59 (1998) ("Anyone with an understanding of the fundamental principles of the law of war will not need specific, 'no-brainer' precedents to assess the legality of proposals for information attack.").
  • 22
    • 44949184210 scopus 로고    scopus 로고
    • George K. Walker, Information Warfare and Neutrality, 33 VAND. J. TRANSNAT'L L. 1079, 1200 (2000) (footnotes omitted). Walker notes that the first internet began in 1969 when the primary concern was maintaining communication in the face of nuclear attack. Id. at 1094.
    • George K. Walker, Information Warfare and Neutrality, 33 VAND. J. TRANSNAT'L L. 1079, 1200 (2000) (footnotes omitted). Walker notes that the first "internet" began in 1969 when the primary concern was maintaining communication in the face of nuclear attack. Id. at 1094.
  • 23
    • 44949162596 scopus 로고    scopus 로고
    • Bush Orders Guidelines for Cyber-Warfare: Rules for Attacking Enemy Computers Prepared as U.S. Weighs Iraq Options
    • Feb. 7, at
    • Bradley Graham, Bush Orders Guidelines for Cyber-Warfare: Rules for Attacking Enemy Computers Prepared as U.S. Weighs Iraq Options, WASH. POST, Feb. 7, 2003, at A1.
    • (2003) WASH. POST
    • Graham, B.1
  • 24
    • 44949197394 scopus 로고    scopus 로고
    • Id
    • Id.
  • 25
    • 44949166173 scopus 로고    scopus 로고
    • This Note will focus only on these two principles of IHL. Other scholars have focused on the problems of defining combatants, the application of perfidy, and the principle of proportionality in cyber warfare. See, e.g, Brown, supra note 16, at 198-203
    • This Note will focus only on these two principles of IHL. Other scholars have focused on the problems of defining combatants, the application of perfidy, and the principle of proportionality in cyber warfare. See, e.g., Brown, supra note 16, at 198-203.
  • 26
    • 44949101967 scopus 로고    scopus 로고
    • The principle of distinction requires belligerents to distinguish between civilian and military objects in attacks. For a detailed discussion of the principle, see infra Section II.A. Distinction is a technical term and is a central tenet of IHL. Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226, 257 (July 8, Heike Spieker, Civilian Immunity, in Crimes of War 84, 84 Roy Gutman & David Rieff eds. 1999
    • The principle of distinction requires belligerents to distinguish between civilian and military objects in attacks. For a detailed discussion of the principle, see infra Section II.A. "Distinction" is a technical term and is a central tenet of IHL. Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226, 257 (July 8); Heike Spieker, Civilian Immunity, in Crimes of War 84, 84 (Roy Gutman & David Rieff eds. 1999).
  • 27
    • 44949203251 scopus 로고    scopus 로고
    • The principle of neutrality provides that the territory of a neutral state is inviolable and imposes rights and duties on belligerent and neutral states to maintain that neutrality. See generally Convention Respecting the Rights and Duties of Neutral Powers and Persons In Case of War on Land, Oct. 18, 1907, 36 Stat. 2310, T.S. 540 [hereinafter 1907 Hague Convention V]; Convention Concerning the Rights and Duties of Neutral Powers in Naval War, Oct. 18, 1907, 36 Stat. 2415, T.S. 545 [hereinafter 1907 Hague Convention XIII].
    • The principle of neutrality provides that the territory of a neutral state is inviolable and imposes rights and duties on belligerent and neutral states to maintain that neutrality. See generally Convention Respecting the Rights and Duties of Neutral Powers and Persons In Case of War on Land, Oct. 18, 1907, 36 Stat. 2310, T.S. 540 [hereinafter 1907 Hague Convention V]; Convention Concerning the Rights and Duties of Neutral Powers in Naval War, Oct. 18, 1907, 36 Stat. 2415, T.S. 545 [hereinafter 1907 Hague Convention XIII].
  • 28
    • 44949239194 scopus 로고    scopus 로고
    • The cyberwar against the United States
    • noting that each year, more and more industries connect to the Internet to take advantage of the efficiencies offered, See, Aug. 19, at
    • See Jim Melnick, Op-Ed., The cyberwar against the United States, BOSTON GLOBE, Aug. 19, 2007, at E9 (noting that each year, more and more industries connect to the Internet to take advantage of the efficiencies offered).
    • (2007) BOSTON GLOBE
    • Jim Melnick, O.-E.1
  • 29
    • 44949130395 scopus 로고    scopus 로고
    • Vida M. Antolin-Jenkins, Defining the Parameters of Cyberwar Operations: Looking for Law in All The Wrong Places?, 51 NAVAL L. REV. 132, 132 (2005).
    • Vida M. Antolin-Jenkins, Defining the Parameters of Cyberwar Operations: Looking for Law in All The Wrong Places?, 51 NAVAL L. REV. 132, 132 (2005).
  • 30
    • 44949095012 scopus 로고    scopus 로고
    • Id. at 137-38
    • Id. at 137-38.
  • 31
    • 44949164212 scopus 로고    scopus 로고
    • Gregory F. Intoccia & Joe Wesley Moore, Communications Technology, Warfare, and the Law: Is the Network A Weapon System?, 28 HOUS. J. INT'L L. 467, 473 (2006) (quoting LAWRENCE T. GREENBERG ET AL., INFORMATION WARFARE AND INTERNATIONAL LAW 12 (1998), http://www.dodccrp.org/files/Greenberg_Law.pdf).
    • Gregory F. Intoccia & Joe Wesley Moore, Communications Technology, Warfare, and the Law: Is the Network A Weapon System?, 28 HOUS. J. INT'L L. 467, 473 (2006) (quoting LAWRENCE T. GREENBERG ET AL., INFORMATION WARFARE AND INTERNATIONAL LAW 12 (1998), http://www.dodccrp.org/files/Greenberg_Law.pdf).
  • 32
    • 44949245564 scopus 로고    scopus 로고
    • Walker, supra note 19, at 1094
    • Walker, supra note 19, at 1094.
  • 33
    • 44949174632 scopus 로고    scopus 로고
    • SecurityFocus Glossary of Terms, http://www.securityfocus.com/glossary/I (last visited Mar. 8, 2008) ([The Internet backbone is t]he largest network making up the Internet, connecting the many smaller networks that make up the Internet.).
    • SecurityFocus Glossary of Terms, http://www.securityfocus.com/glossary/I (last visited Mar. 8, 2008) ("[The Internet backbone is t]he largest network making up the Internet, connecting the many smaller networks that make up the Internet.").
  • 34
    • 44949193489 scopus 로고    scopus 로고
    • See Walker, supra note 19, at 1094 (The Internet is an international network of interconnected computers.).
    • See Walker, supra note 19, at 1094 ("The Internet is an international network of interconnected computers.").
  • 35
    • 44949103828 scopus 로고    scopus 로고
    • See Jeff Grabmeier, Loss of Major Hub Cities Could Cripple Internet, Study Suggests; A More Decentralized Internet Is Best Solution, OHIO ST. UNIV. RES. NEWS, NOV. 26, 2002, http://researchnews.osu.edu/archive/intsurv.htm.
    • See Jeff Grabmeier, Loss of Major Hub Cities Could Cripple Internet, Study Suggests; A More Decentralized Internet Is Best Solution, OHIO ST. UNIV. RES. NEWS, NOV. 26, 2002, http://researchnews.osu.edu/archive/intsurv.htm.
  • 36
    • 44949157520 scopus 로고    scopus 로고
    • Id
    • Id.
  • 37
    • 44949162597 scopus 로고    scopus 로고
    • Id
    • Id.
  • 38
    • 44949167282 scopus 로고    scopus 로고
    • See Microsoft Technet Glossary of Terms, http://www.microsoft.com/ technet/prodtechnol/Visio/visio2002/plan/glossary.mspx#E2TAE (defining Packet Switching) (last visited Mar. 8, 2008).
    • See Microsoft Technet Glossary of Terms, http://www.microsoft.com/ technet/prodtechnol/Visio/visio2002/plan/glossary.mspx#E2TAE (defining "Packet Switching") (last visited Mar. 8, 2008).
  • 39
    • 44949204196 scopus 로고    scopus 로고
    • Id, see also Walker, supra note 19, at 1095-96
    • Id.; see also Walker, supra note 19, at 1095-96.
  • 40
    • 44949158514 scopus 로고    scopus 로고
    • See Walker, supra note 19, at 1095-96
    • See Walker, supra note 19, at 1095-96.
  • 41
    • 44949229866 scopus 로고    scopus 로고
    • Id
    • Id.
  • 42
    • 44949090175 scopus 로고    scopus 로고
    • Loss Of Major Hub Cities Could Cripple Internet, NOV. 26, 2002
    • Loss Of Major Hub Cities Could Cripple Internet, Study Suggests, SCIENCEDAILY, NOV. 26, 2002, http://www.sciencedaily.com/ releases/2002/11/021126072153.htm.
    • Study Suggests, SCIENCEDAILY
  • 43
    • 44949264966 scopus 로고    scopus 로고
    • RAND Corporation, Paul Baran and the Origins of the Internet, available at http://rand.org/about/history/baran.html (last visited Mar. 17, 2008).
    • RAND Corporation, Paul Baran and the Origins of the Internet, available at http://rand.org/about/history/baran.html (last visited Mar. 17, 2008).
  • 44
    • 44949216331 scopus 로고    scopus 로고
    • Id
    • Id.
  • 45
    • 44949089161 scopus 로고    scopus 로고
    • See Microsoft Technet, supra note 35
    • See Microsoft Technet, supra note 35.
  • 46
    • 44949244630 scopus 로고    scopus 로고
    • See Walker, supra note 19, at 1096
    • See Walker, supra note 19, at 1096.
  • 47
    • 44949224749 scopus 로고    scopus 로고
    • The United States Defense Advanced Research Projects Agency (DARPA) is developing a next-generation Internet that may allow the user more control and perhaps allow the user to avoid routes that are undesirable. Linktionary.com, Active Networks, http://www.linktionary.com/a/ active_network.html (last visited Mar. 8, 2008) (noting that under the DARPA proposal users can 'program' the network by supplying their own programs to perform these computations).
    • The United States Defense Advanced Research Projects Agency ("DARPA") is developing a next-generation Internet that may allow the user more control and perhaps allow the user to avoid routes that are undesirable. Linktionary.com, Active Networks, http://www.linktionary.com/a/ active_network.html (last visited Mar. 8, 2008) (noting that under the DARPA proposal "users can 'program' the network by supplying their own programs to perform these computations").
  • 48
    • 35648996853 scopus 로고    scopus 로고
    • See note 26, at, noting that military communications use public interfaces
    • See Antolin-Jenkins, supra note 26, at 137-38 (noting that military communications use public interfaces).
    • supra , pp. 137-138
    • Jenkins, A.1
  • 49
    • 44949196430 scopus 로고    scopus 로고
    • See Melnick, supra note 25
    • See Melnick, supra note 25.
  • 50
    • 44949200816 scopus 로고    scopus 로고
    • The situation easily could have been life threatening. Newly nasty, supra note 1, at 63
    • The situation easily could have been life threatening. Newly nasty, supra note 1, at 63.
  • 51
    • 44949154132 scopus 로고    scopus 로고
    • See Brian T. O'Donnell & James C. Kraska, Humanitarian Law: Developing International Rules for the Digital Battlefield, 8 J. CONFLICT & SECURITY L. 133, 149 (2003).
    • See Brian T. O'Donnell & James C. Kraska, Humanitarian Law: Developing International Rules for the Digital Battlefield, 8 J. CONFLICT & SECURITY L. 133, 149 (2003).
  • 52
    • 44949228930 scopus 로고    scopus 로고
    • See id
    • See id.
  • 53
    • 44949154134 scopus 로고    scopus 로고
    • See id
    • See id.
  • 54
    • 79960435425 scopus 로고    scopus 로고
    • Cyberwar: A New Weapon Awaits a Set of Rules; Military, Spy Agencies Struggle to Define Computers' Place in U.S. Arsenal
    • July 8, at
    • Bradley Graham, Cyberwar: A New Weapon Awaits a Set of Rules; Military, Spy Agencies Struggle to Define Computers' Place in U.S. Arsenal, WASH. POST, July 8, 1998, at A1.
    • (1998) WASH. POST
    • Graham, B.1
  • 55
    • 44949196429 scopus 로고    scopus 로고
    • William M. Arkin, The Cyber Bomb in Yugoslavia, WASHINGTONPOST.COM, Oct. 25, 1999, http://www.washingtonpost.com/wp- srv/national/dotmil/arkin.htm (last visited Mar. 8, 2008). A Top Secret U.S.-only operation . . . was approved soon after the bombing began . . . . Id.
    • William M. Arkin, The Cyber Bomb in Yugoslavia, WASHINGTONPOST.COM, Oct. 25, 1999, http://www.washingtonpost.com/wp- srv/national/dotmil/arkin.htm (last visited Mar. 8, 2008). "A Top Secret U.S.-only operation . . . was approved soon after the bombing began . . . ." Id.
  • 56
    • 44949095010 scopus 로고    scopus 로고
    • Such a balancing act may violate IHL, since the risk to civilian lives is to be balanced against the expected military advantage to be gained, not the reduction in risk to military forces. See infra Section II.A.
    • Such a balancing act may violate IHL, since the risk to civilian lives is to be balanced against the expected military advantage to be gained, not the reduction in risk to military forces. See infra Section II.A.
  • 57
    • 44949139320 scopus 로고    scopus 로고
    • These are called dual-use targets and strikes on them remain controversial under IHL due to the possible impact on civilian public health and safety. See DOD, ASSESSMENT, supra note 18, at 8-9.
    • These are called "dual-use" targets and strikes on them remain controversial under IHL due to the possible impact on civilian public health and safety. See DOD, ASSESSMENT, supra note 18, at 8-9.
  • 58
    • 44949120105 scopus 로고    scopus 로고
    • As James Fallows reported: Despite the precision of the [American] bombing campaign, by mid-April [2003] wartime damage and immediate postwar looting had reduced Baghdad's power supply to one fifth its pre-war level, according to an internal Pentagon study. In mid-July the grid would be back to only half its pre-war level, working on a three-hours-on, three-hours-off schedule. James Fallows, Blind Into Baghdad, THE ATLANTIC, Jan.-Feb. 2004, at 52, 70.
    • As James Fallows reported: Despite the precision of the [American] bombing campaign, by mid-April [2003] wartime damage and immediate postwar looting had reduced Baghdad's power supply to one fifth its pre-war level, according to an internal Pentagon study. In mid-July the grid would be back to only half its pre-war level, working on a three-hours-on, three-hours-off schedule. James Fallows, Blind Into Baghdad, THE ATLANTIC, Jan.-Feb. 2004, at 52, 70.
  • 59
    • 44949151301 scopus 로고    scopus 로고
    • DOD, ASSESSMENT, note 18, at, discussing the war crime allegations surrounding the coalition bombing of the electrical power system in Baghdad
    • DOD, ASSESSMENT, supra note 18, at 8-9 (discussing the war crime allegations surrounding the coalition bombing of the electrical power system in Baghdad).
    • supra , pp. 8-9
  • 60
    • 44949237670 scopus 로고    scopus 로고
    • On April 23, 1999, NATO bombed the headquarters and studios of the Serbian state radio and television station (RTS). Eric David, Respect for the Principle of Distinction in the Kosovo War, 3 Y.B. INT'L HUMANITARIAN LAW 81, 86 (H. Fischer & Avril McDonald eds., 2000). Although cyber warfare offers several possible nonlethal alternatives for future military campaigns, this Note will discuss the legal implications of this strike. See infra Part II.
    • On April 23, 1999, NATO bombed the headquarters and studios of the Serbian state radio and television station (RTS). Eric David, Respect for the Principle of Distinction in the Kosovo War, 3 Y.B. INT'L HUMANITARIAN LAW 81, 86 (H. Fischer & Avril McDonald eds., 2000). Although cyber warfare offers several possible nonlethal alternatives for future military campaigns, this Note will discuss the legal implications of this strike. See infra Part II.
  • 61
    • 44949114769 scopus 로고    scopus 로고
    • DOD, ASSESSMENT, note 18, at
    • DOD, ASSESSMENT, supra note 18, at 9.
    • supra , pp. 9
  • 62
    • 44949252719 scopus 로고    scopus 로고
    • This is a form of so-called psychological operations
    • This is a form of so-called psychological operations.
  • 63
    • 44949135534 scopus 로고    scopus 로고
    • The U.S. DOD has stated that such an action would violate the ban on perfidy and constitute a war crime. DOD, ASSESSMENT, supra note 18, at 10.
    • The U.S. DOD has stated that such an action would violate the ban on perfidy and constitute a war crime. DOD, ASSESSMENT, supra note 18, at 10.
  • 64
    • 44949136971 scopus 로고    scopus 로고
    • supra note 23, at 84. While not every state has adopted the provisions of Additional Protocol I, the principle of distinction is accepted as customary law
    • Spieker, supra note 23, at 84. While not every state has adopted the provisions of Additional Protocol I, the principle of distinction is accepted as customary law. Id.
    • Id
    • Spieker1
  • 65
    • 44949110756 scopus 로고    scopus 로고
    • Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I) arts. 51(2), 51(1), June 8, 1977, 1125 U.N.T.S. 3 [hereinafter Additional Protocol I].
    • Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I) arts. 51(2), 51(1), June 8, 1977, 1125 U.N.T.S. 3 [hereinafter Additional Protocol I].
  • 66
    • 44949122258 scopus 로고    scopus 로고
    • Id. art. 54(2).
    • Id. art. 54(2).
  • 67
    • 44949149786 scopus 로고    scopus 로고
    • Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226, 257 (July 8).
    • Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226, 257 (July 8).
  • 68
    • 44949099081 scopus 로고    scopus 로고
    • Additional Protocol I, supra note 62, art. 57.
    • Additional Protocol I, supra note 62, art. 57.
  • 69
    • 44949126149 scopus 로고    scopus 로고
    • Id. art. 52(2) (emphasis added).
    • Id. art. 52(2) (emphasis added).
  • 70
    • 44949183220 scopus 로고    scopus 로고
    • Id. art. 55
    • Id. art. 55.
  • 71
    • 44949245567 scopus 로고    scopus 로고
    • Id. art. 56
    • Id. art. 56.
  • 72
    • 44949141187 scopus 로고    scopus 로고
    • Id. art. 51(2).
    • Id. art. 51(2).
  • 73
    • 44949132755 scopus 로고    scopus 로고
    • MARCO SASSÒLI, LEGITIMATE TARGETS OF ATTACKS UNDER INTERNATIONAL HUMANITARIAN LAW 7 (2003).
    • MARCO SASSÒLI, LEGITIMATE TARGETS OF ATTACKS UNDER INTERNATIONAL HUMANITARIAN LAW 7 (2003).
  • 74
    • 44949240179 scopus 로고    scopus 로고
    • O'Donnell & Kraska, supra note 48, at 157
    • O'Donnell & Kraska, supra note 48, at 157.
  • 75
    • 44949166177 scopus 로고    scopus 로고
    • Sassòli, supra note 70, at 7
    • Sassòli, supra note 70, at 7.
  • 76
    • 44949165233 scopus 로고    scopus 로고
    • Id
    • Id.
  • 77
    • 44949172240 scopus 로고    scopus 로고
    • DOD, ASSESSMENT, note 18, at, discussing the controversy surrounding the bombing of Baghdad power plants in Gulf War I
    • DOD, ASSESSMENT, supra note 18, at 8-9 (discussing the controversy surrounding the bombing of Baghdad power plants in Gulf War I).
    • supra , pp. 8-9
  • 78
    • 44949156056 scopus 로고    scopus 로고
    • Id. at 8
    • Id. at 8.
  • 79
    • 44949143645 scopus 로고    scopus 로고
    • See Graham, supra note 15
    • See Graham, supra note 15.
  • 80
    • 44949227980 scopus 로고    scopus 로고
    • As Dörman notes: For example, certain attacks against objects indispensable to the survival of the civilian population, such as drinking water installations and irrigation works, or attacks against installations containing dangerous forces, namely dams, dykes and nuclear electrical generating stations are prohibited. These prohibitions are independent of the type of weapons or methods of warfare used. Dörmann, supra note 13, at para. 16; see also Additional Protocol I, supra note 62, arts. 55-56.
    • As Dörman notes: For example, certain attacks against objects indispensable to the survival of the civilian population, such as drinking water installations and irrigation works, or attacks against installations containing dangerous forces, namely dams, dykes and nuclear electrical generating stations are prohibited. These prohibitions are independent of the type of weapons or methods of warfare used. Dörmann, supra note 13, at para. 16; see also Additional Protocol I, supra note 62, arts. 55-56.
  • 81
    • 44949131370 scopus 로고    scopus 로고
    • See supra Section I.B.
    • See supra Section I.B.
  • 82
    • 44949096107 scopus 로고    scopus 로고
    • See O'Donnell & Kraska, supra note 48, at 149-50
    • See O'Donnell & Kraska, supra note 48, at 149-50.
  • 83
    • 44949121341 scopus 로고    scopus 로고
    • Scott, supra note 18, at 59
    • Scott, supra note 18, at 59.
  • 84
    • 44949171275 scopus 로고    scopus 로고
    • See supra Section I.B.
    • See supra Section I.B.
  • 85
    • 44949181468 scopus 로고    scopus 로고
    • Graham, supra note 15. [C]omplicating large-scale computer attacks is the need for an extraordinary amount of detailed intelligence about a target's hardware and software systems. Id.
    • Graham, supra note 15. "[C]omplicating large-scale computer attacks is the need for an extraordinary amount of detailed intelligence about a target's hardware and software systems." Id.
  • 86
    • 44949135533 scopus 로고    scopus 로고
    • See GREENBERG ET AL, supra note 28, at 11
    • See GREENBERG ET AL., supra note 28, at 11.
  • 87
    • 44949247952 scopus 로고    scopus 로고
    • Id. at 11-12
    • Id. at 11-12.
  • 88
    • 44949232838 scopus 로고    scopus 로고
    • See Additional Protocol I, note 62, arts
    • See Additional Protocol I, supra note 62, arts. 54-56.
    • supra , pp. 54-56
  • 89
    • 44949242131 scopus 로고    scopus 로고
    • See Dörmann, supra note 13
    • See Dörmann, supra note 13.
  • 90
    • 44949123267 scopus 로고    scopus 로고
    • Cf. Hays Parks, The Protection of Civilians from Air Warfare, 27 Isr. Y.B. on Hum. Rts. 65, 87-90 (1997) (discussing how the development of smart bombs has resulted in a similar effect on the utility of the principle of distinction).
    • Cf. Hays Parks, The Protection of Civilians from Air Warfare, 27 Isr. Y.B. on Hum. Rts. 65, 87-90 (1997) (discussing how the development of smart bombs has resulted in a similar effect on the utility of the principle of distinction).
  • 91
    • 44949161704 scopus 로고    scopus 로고
    • GREENBERG ET AL., supra note 28, at 12. One military leader has noted, '[t]here is no logical distinction . . . between military or civil systems or technologies. [Therefore] there is also no technical distinction between exploitation, attack or defense of the information warfare target set.' Id. (quoting Vice Admiral Arthur Cebrowski) (alteration in original); see also O'Donnell & Kraska, supra note 48, at 148 ([N]et-war . . . tends to defy and cut across standard boundaries, jurisdictions, and distinctions between state and society, public and private, war and peace, war and crime, civilian and military . . . legal and illegal.).
    • GREENBERG ET AL., supra note 28, at 12. One military leader has noted, " '[t]here is no logical distinction . . . between military or civil systems or technologies. [Therefore] there is also no technical distinction between exploitation, attack or defense of the information warfare target set.' " Id. (quoting Vice Admiral Arthur Cebrowski) (alteration in original); see also O'Donnell & Kraska, supra note 48, at 148 ("[N]et-war . . . tends to defy and cut across standard boundaries, jurisdictions, and distinctions between state and society, public and private, war and peace, war and crime, civilian and military . . . legal and illegal.").
  • 92
    • 44949206195 scopus 로고    scopus 로고
    • Brown, supra note 16, at 193; see also MICHAEL IGNATIEFF, THE WARRIOR'S HONOR 126 (1998) (stating that the purpose of war now seems to include terrorizing, deporting, and even exterminating the other side's civilian populations); O'Donnell & Kraska, supra note 48, at 155 (In the fog of modern war, in which a state's entire society becomes vested in warfare, it is especially difficult to distinguish between lawful and unlawful targets . . . .).
    • Brown, supra note 16, at 193; see also MICHAEL IGNATIEFF, THE WARRIOR'S HONOR 126 (1998) (stating that the purpose of war now seems to include "terrorizing, deporting, and even exterminating the other side's civilian populations"); O'Donnell & Kraska, supra note 48, at 155 ("In the fog of modern war, in which a state's entire society becomes vested in warfare, it is especially difficult to distinguish between lawful and unlawful targets . . . .").
  • 93
    • 44949123266 scopus 로고    scopus 로고
    • See supra Section I.B. The United States has maintained that the legality of an attack on a civilian radio station used by a belligerent for purely psychological operations is an issue that has yet to be addressed authoritatively by the international community. DOD, ASSESSMENT, supra note 18, at 9; see also Michael N. Schmitt, Wired warfare: Computer network attack and jus in bello, 84 INT'L REV. RED CROSS, 365, 381 (2002) ([I]f the operation were designed to cause, for example, mere inconvenience, it would not rise to the level of an attack and would thus be permissible regardless of the target's nexus, or lack thereof, to military operations.).
    • See supra Section I.B. The United States has maintained that the legality of an attack on a civilian radio station used by a belligerent for purely psychological operations "is an issue that has yet to be addressed authoritatively by the international community." DOD, ASSESSMENT, supra note 18, at 9; see also Michael N. Schmitt, Wired warfare: Computer network attack and jus in bello, 84 INT'L REV. RED CROSS, 365, 381 (2002) ("[I]f the operation were designed to cause, for example, mere inconvenience, it would not rise to the level of an attack and would thus be permissible regardless of the target's nexus, or lack thereof, to military operations.").
  • 94
    • 44949170328 scopus 로고    scopus 로고
    • supra note 57, at 88-89. It should be noted that NATO made no allegations that RTS had incited the population to commit war crimes
    • See
    • See David, supra note 57, at 88-89. It should be noted that NATO made no allegations that RTS had incited the population to commit war crimes. Id.
    • Id
    • David1
  • 95
    • 44949119165 scopus 로고    scopus 로고
    • W.J. Fenrick, The Law Applicable to Targeting and Proportionality after Operation Allied Force: A View from the Outside, 3 Y.B. INT'L HUMANITARIAN L. 53, 72 (2000) (NATO's strategic objectives included 'Damaging Serbia's capacity to wage war against Kosovo in the future or spread the war to neighbours [sic] by diminishing or degrading its ability to wage military operations . . . .' (omission in original)).
    • W.J. Fenrick, The Law Applicable to Targeting and Proportionality after Operation Allied Force: A View from the Outside, 3 Y.B. INT'L HUMANITARIAN L. 53, 72 (2000) ("NATO's strategic objectives included 'Damaging Serbia's capacity to wage war against Kosovo in the future or spread the war to neighbours [sic] by diminishing or degrading its ability to wage military operations . . . .' " (omission in original)).
  • 96
    • 44949118221 scopus 로고    scopus 로고
    • See, e.g, David, supra note 57, at 107
    • See, e.g., David, supra note 57, at 107.
  • 97
    • 44949261720 scopus 로고    scopus 로고
    • See Schmitt, supra note 90, at 381-82
    • See Schmitt, supra note 90, at 381-82.
  • 98
    • 44949247003 scopus 로고    scopus 로고
    • See Additional Protocol I, note 62, art. 52. Banks and stock exchanges are two examples of civilian objects
    • See Additional Protocol I, supra note 62, art. 52. Banks and stock exchanges are two examples of civilian objects.
    • supra
  • 99
    • 44949159443 scopus 로고    scopus 로고
    • Brown, supra note 16, at 194
    • Brown, supra note 16, at 194.
  • 100
    • 44949187152 scopus 로고    scopus 로고
    • See Antolin-Jenkins, supra note 26, at 145 (A direct attack on financial markets, particularly a mixed attack, which would both change economic data and target financial programs created to respond to that data, has huge long term destructive potential.). But see Brown, supra note 16, at 194 (stating that attacks on banks or telephone networks would likely be condemned as violating IHL since attacks on these targets seem to serve no legitimate military purpose).
    • See Antolin-Jenkins, supra note 26, at 145 ("A direct attack on financial markets, particularly a mixed attack, which would both change economic data and target financial programs created to respond to that data, has huge long term destructive potential."). But see Brown, supra note 16, at 194 (stating that attacks on banks or telephone networks would likely be condemned as violating IHL since attacks on these targets seem to serve no legitimate military purpose).
  • 101
    • 44949185133 scopus 로고    scopus 로고
    • GREENBERG ET AL, supra note 28, at 12
    • GREENBERG ET AL., supra note 28, at 12.
  • 102
    • 44949230890 scopus 로고    scopus 로고
    • See O'Donnell & Kraska, supra note 48, at 156 (As we enter the computer warfare age, nations will attempt to further exploit [the] seam between the protected status of the civilian and the belligerent actions of the state.).
    • See O'Donnell & Kraska, supra note 48, at 156 ("As we enter the computer warfare age, nations will attempt to further exploit [the] seam between the protected status of the civilian and the belligerent actions of the state.").
  • 103
    • 44949086266 scopus 로고    scopus 로고
    • See supra Section I.A.
    • See supra Section I.A.
  • 104
    • 44949172253 scopus 로고    scopus 로고
    • See id
    • See id.
  • 105
    • 44949146844 scopus 로고    scopus 로고
    • See 1907 Hague Convention V, supra note 24, art. 8.
    • See 1907 Hague Convention V, supra note 24, art. 8.
  • 106
    • 44949120364 scopus 로고    scopus 로고
    • STEPHEN C. NEFF, THE RIGHTS AND DUTIES OF NEUTRALS 1 (2000).
    • STEPHEN C. NEFF, THE RIGHTS AND DUTIES OF NEUTRALS 1 (2000).
  • 107
    • 44949130394 scopus 로고    scopus 로고
    • See generally 1907 Hague Convention XIII, supra note 24.
    • See generally 1907 Hague Convention XIII, supra note 24.
  • 108
    • 44949202222 scopus 로고    scopus 로고
    • 1907 Hague Convention V, note 24, art. 1
    • 1907 Hague Convention V, supra note 24, art. 1.
    • supra
  • 109
    • 44949260665 scopus 로고    scopus 로고
    • Id. art. 2
    • Id. art. 2.
  • 110
    • 44949259678 scopus 로고    scopus 로고
    • Jurists Commission, General Report on Rules for the Control of Radio in War and Aerial Warfare, 17 AM. J. INT'L L. (SUPP.) 242, 258 (1923). Article 40 of the Rules of Aerial Warfare was written at the 1923 Hague Conventions, and while never signed into law, many legal commentators believe these rules may restate custom. See Walker, supra note 19, at 1135 n.222.
    • Jurists Commission, General Report on Rules for the Control of Radio in War and Aerial Warfare, 17 AM. J. INT'L L. (SUPP.) 242, 258 (1923). Article 40 of the Rules of Aerial Warfare was written at the 1923 Hague Conventions, and while never signed into law, many legal commentators believe these rules may restate custom. See Walker, supra note 19, at 1135 n.222.
  • 111
    • 44949250541 scopus 로고    scopus 로고
    • See 1907 Hague Convention V, supra note 24, art. 5.
    • See 1907 Hague Convention V, supra note 24, art. 5.
  • 112
    • 44949256913 scopus 로고    scopus 로고
    • 1907 Hague Convention XIII, supra note 24, art. I.
    • 1907 Hague Convention XIII, supra note 24, art. I.
  • 113
    • 44949092060 scopus 로고    scopus 로고
    • Id. art. II
    • Id. art. II.
  • 114
    • 44949089143 scopus 로고    scopus 로고
    • DOD, ASSESSMENT, note 18, at
    • DOD, ASSESSMENT, supra note 18, at 10.
    • supra , pp. 10
  • 115
    • 44949099080 scopus 로고    scopus 로고
    • 1907 Hague Convention V, note 24, art. 8
    • 1907 Hague Convention V, supra note 24, art. 8.
    • supra
  • 116
    • 44949179054 scopus 로고    scopus 로고
    • Id. art. 9
    • Id. art. 9.
  • 117
    • 44949109783 scopus 로고    scopus 로고
    • DOD, ASSESSMENT, supra note 18, at 10 (The plain language of this agreement would appear to apply to communication satellites as well as to ground-based facilities.).
    • DOD, ASSESSMENT, supra note 18, at 10 ("The plain language of this agreement would appear to apply to communication satellites as well as to ground-based facilities.").
  • 118
    • 44949242129 scopus 로고    scopus 로고
    • Id. at 10. 1907 Hague Convention V explicitly mentions only cables and communications apparatus, not devices that generate information. 1907 Hague Convention V, supra note 24, art. 8.
    • Id. at 10. 1907 Hague Convention V explicitly mentions only cables and communications apparatus, not devices that generate information. 1907 Hague Convention V, supra note 24, art. 8.
  • 119
    • 44949263606 scopus 로고    scopus 로고
    • See DOD, ASSESSMENT, supra note 18, at 10 (For example, if a belligerent nation demanded that the U.S. government deny GPS navigation services to its enemy, and if the U.S. were unable or unwilling to comply, the belligerent may have the right to take necessary and proportional acts in self-defense, such as jamming the GPS signal in the combat area.).
    • See DOD, ASSESSMENT, supra note 18, at 10 ("For example, if a belligerent nation demanded that the U.S. government deny GPS navigation services to its enemy, and if the U.S. were unable or unwilling to comply, the belligerent may have the right to take necessary and proportional acts in self-defense, such as jamming the GPS signal in the combat area.").
  • 120
    • 44949241134 scopus 로고    scopus 로고
    • Id. at, GREENBERG ET AL, note 28, at
    • Id. at 10; GREENBERG ET AL., supra note 28, at 10.
    • supra
  • 121
    • 44949210106 scopus 로고    scopus 로고
    • But see GREENBERG ET AL., supra note 28, at 10 (The encroachments beyond a nation's borders that may violate its neutrality have, in the past, been physical intrusions by troops, ships, or planes.).
    • But see GREENBERG ET AL., supra note 28, at 10 ("The encroachments beyond a nation's borders that may violate its neutrality have, in the past, been physical intrusions by troops, ships, or planes.").
  • 122
    • 44949209126 scopus 로고    scopus 로고
    • 1907 Hague Convention V, note 24, art. 8
    • 1907 Hague Convention V, supra note 24, art. 8.
    • supra
  • 123
    • 44949085163 scopus 로고    scopus 로고
    • See DOD, ASSESSMENT, note 18, at
    • See DOD, ASSESSMENT, supra note 18, at 10.
    • supra , pp. 10
  • 124
    • 44949094067 scopus 로고    scopus 로고
    • 1907 Hague Convention V, note 24, art. 2 emphasis added
    • 1907 Hague Convention V, supra note 24, art. 2 (emphasis added).
    • supra
  • 125
    • 44949165231 scopus 로고    scopus 로고
    • Brown, supra note 16, at 184 (In the information age, armed forces need not always deploy bombers and artillery to accomplish these objectives. In other words, the use of computer technology to wage war necessitates a reevaluation of the definition of the term 'weapon.' ).
    • Brown, supra note 16, at 184 ("In the information age, armed forces need not always deploy bombers and artillery to accomplish these objectives. In other words, the use of computer technology to wage war necessitates a reevaluation of the definition of the term 'weapon.' ").
  • 126
    • 44949249538 scopus 로고    scopus 로고
    • DEPT. OF THE AIR FORCE, POLICY DIRECTIVE 51-4, Compliance with the Law of Armed Conflict para. 6.5 (1993).
    • DEPT. OF THE AIR FORCE, POLICY DIRECTIVE 51-4, Compliance with the Law of Armed Conflict para. 6.5 (1993).
  • 127
    • 84898313133 scopus 로고    scopus 로고
    • The Ethics of Computer Network Attack
    • Spring, at
    • William J. Bayles, The Ethics of Computer Network Attack, PARAMETERS, Spring 2001, at 44, 45.
    • (2001) PARAMETERS
    • Bayles, W.J.1
  • 128
    • 44949159442 scopus 로고    scopus 로고
    • Brown, supra note 16, at 210
    • Brown, supra note 16, at 210.
  • 129
    • 44949087251 scopus 로고    scopus 로고
    • See 1907 Hague Convention V, supra note 24, art. 2.
    • See 1907 Hague Convention V, supra note 24, art. 2.
  • 130
    • 44949097902 scopus 로고    scopus 로고
    • See Brown, supra note 16, at 210. Whether the belligerent will actually choose to launch such an attack will depend on the scale and nature of the cyber attack.
    • See Brown, supra note 16, at 210. Whether the belligerent will actually choose to launch such an attack will depend on the scale and nature of the cyber attack.
  • 131
    • 44949118222 scopus 로고    scopus 로고
    • See NEFF, supra note 103, at 1
    • See NEFF, supra note 103, at 1.
  • 132
    • 44949218927 scopus 로고    scopus 로고
    • Compare 1907 Hague Convention V, supra note 24, art. 5, with Walker, supra note 19, at 1199 (A neutral's duty to repel [belligerent] incursions varies with the modality of incursion.).
    • Compare 1907 Hague Convention V, supra note 24, art. 5, with Walker, supra note 19, at 1199 ("A neutral's duty to repel [belligerent] incursions varies with the modality of incursion.").
  • 133
    • 44949254647 scopus 로고    scopus 로고
    • See 1907 Hague Convention V, supra note 24, art. 5.
    • See 1907 Hague Convention V, supra note 24, art. 5.
  • 134
    • 44949213539 scopus 로고    scopus 로고
    • See Newly nasty, supra note 1
    • See Newly nasty, supra note 1.
  • 135
    • 44949132330 scopus 로고    scopus 로고
    • Brown, supra note 16, at 210
    • Brown, supra note 16, at 210.
  • 136
    • 44949259680 scopus 로고    scopus 로고
    • Id
    • Id.
  • 137
    • 44949239195 scopus 로고    scopus 로고
    • Walker, supra note 19, at 1199
    • Walker, supra note 19, at 1199.
  • 138
    • 44949261719 scopus 로고    scopus 로고
    • Id
    • Id.
  • 139
    • 44949222238 scopus 로고    scopus 로고
    • Id
    • Id.
  • 140
    • 44949091105 scopus 로고    scopus 로고
    • Id. at 1183
    • Id. at 1183.
  • 141
    • 44949128689 scopus 로고    scopus 로고
    • Id
    • Id.
  • 142
    • 44949229864 scopus 로고    scopus 로고
    • Id. at 1108
    • Id. at 1108.
  • 143
    • 44949155056 scopus 로고    scopus 로고
    • Unless, of course, Belligerent A moved its forces through neutral territory
    • Unless, of course, Belligerent A moved its forces through neutral territory.
  • 144
    • 44949209184 scopus 로고    scopus 로고
    • Cf. DOD, ASSESSMENT, supra note 18, at 8 (The long-distance and anonymous nature of computer network attacks may make detection and prosecution unlikely, but it is the firmly established policy of the United States that U.S. forces will fight in full compliance with the law of war.).
    • Cf. DOD, ASSESSMENT, supra note 18, at 8 ("The long-distance and anonymous nature of computer network attacks may make detection and prosecution unlikely, but it is the firmly established policy of the United States that U.S. forces will fight in full compliance with the law of war.").
  • 146
    • 44949180466 scopus 로고    scopus 로고
    • Id
    • Id.
  • 147
    • 44949253715 scopus 로고    scopus 로고
    • The DARPA-proposed active network likely would affect this analysis, since the belligerent would be able to reconfigure the Internet nodes and possibly circumvent neutral parties entirely. See supra note 44
    • The DARPA-proposed active network likely would affect this analysis, since the belligerent would be able to reconfigure the Internet nodes and possibly circumvent neutral parties entirely. See supra note 44.
  • 148
    • 44949186153 scopus 로고    scopus 로고
    • See supra Section II.B.
    • See supra Section II.B.
  • 149
    • 44949219881 scopus 로고    scopus 로고
    • See R.B. Brandt, Utilitarianism and the Rules of War, 1 PHIL. & PUB. AFF. 145, 154 (1972) ([N]either side will consent to or follow rules of war which seriously impair the possibility of bringing the war to a victorious conclusion.).
    • See R.B. Brandt, Utilitarianism and the Rules of War, 1 PHIL. & PUB. AFF. 145, 154 (1972) ("[N]either side will consent to or follow rules of war which seriously impair the possibility of bringing the war to a victorious conclusion.").
  • 150
    • 44949112943 scopus 로고    scopus 로고
    • See O'Donnell & Kraska, supra note 48, at 155
    • See O'Donnell & Kraska, supra note 48, at 155.
  • 151
    • 44949116723 scopus 로고    scopus 로고
    • SASSÒLI, supra note 70, at 3
    • SASSÒLI, supra note 70, at 3.
  • 152
    • 44949213540 scopus 로고    scopus 로고
    • Final Report to the Prosecutor by the Committee Established to Review the NATO Bombing Campaign Against the Federal Republic of Yugoslavia, para. 40, June 8, 2000, 39 I.L.M. 1257
    • Final Report to the Prosecutor by the Committee Established to Review the NATO Bombing Campaign Against the Federal Republic of Yugoslavia, para. 40, June 8, 2000, 39 I.L.M. 1257.
  • 153
    • 44949191050 scopus 로고    scopus 로고
    • See O'Donnell & Kraska, supra note 48, at 156
    • See O'Donnell & Kraska, supra note 48, at 156.
  • 154
    • 44949163546 scopus 로고    scopus 로고
    • Id
    • Id.
  • 155
    • 44949237672 scopus 로고    scopus 로고
    • See Schmitt, supra note 90, at 396-98
    • See Schmitt, supra note 90, at 396-98.
  • 156
    • 44949101969 scopus 로고    scopus 로고
    • See id
    • See id.
  • 157
    • 44949112942 scopus 로고    scopus 로고
    • See supra Part III.
    • See supra Part III.
  • 158
    • 44949250540 scopus 로고    scopus 로고
    • Brown, supra note 16, at 210
    • Brown, supra note 16, at 210.
  • 159
    • 44949178100 scopus 로고    scopus 로고
    • Id. at 210-11
    • Id. at 210-11.
  • 160
    • 44949099079 scopus 로고    scopus 로고
    • See id
    • See id.
  • 161
    • 44949212513 scopus 로고    scopus 로고
    • See id
    • See id.
  • 162
    • 44949246058 scopus 로고    scopus 로고
    • Id. at 211
    • Id. at 211.
  • 163
    • 44949193491 scopus 로고    scopus 로고
    • See supra Section III.B.
    • See supra Section III.B.
  • 164
    • 44949253716 scopus 로고    scopus 로고
    • Indeed, some scholars have already attempted these extensions. See, e.g., Brown, supra note 16, at 201-02.
    • Indeed, some scholars have already attempted these extensions. See, e.g., Brown, supra note 16, at 201-02.
  • 165
    • 44949180465 scopus 로고    scopus 로고
    • BRYAN W. ELLIS, THE INTERNATIONAL LEGAL IMPLICATIONS AND LIMITATIONS OF INFORMATION WARFARE: WHAT ARE OUR OPTIONS? 14 (2001).
    • BRYAN W. ELLIS, THE INTERNATIONAL LEGAL IMPLICATIONS AND LIMITATIONS OF INFORMATION WARFARE: WHAT ARE OUR OPTIONS? 14 (2001).
  • 166
    • 44949102908 scopus 로고    scopus 로고
    • Id
    • Id.
  • 167
    • 44949090177 scopus 로고    scopus 로고
    • Id
    • Id.
  • 168
    • 44949191049 scopus 로고    scopus 로고
    • See Conventions on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects Protocol II, Oct. 10, 1980, 1342 U.N.T.S. 168, 19 I.L.M. 1529.
    • See Conventions on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects Protocol II, Oct. 10, 1980, 1342 U.N.T.S. 168, 19 I.L.M. 1529.
  • 169
    • 44949232851 scopus 로고    scopus 로고
    • Wealthy states may be far more vulnerable to cyber weapons given the increased level of technological sophistication of their infrastructure. See Ellis, supra note 162, at 14 (An outright ban on IW or placing strict controls on the weapons of IW appears sensible from the U.S. perspective, particularly if we find our vulnerabilities outweigh our technological advantages.).
    • Wealthy states may be far more vulnerable to cyber weapons given the increased level of technological sophistication of their infrastructure. See Ellis, supra note 162, at 14 ("An outright ban on IW or placing strict controls on the weapons of IW appears sensible from the U.S. perspective, particularly if we find our vulnerabilities outweigh our technological advantages.").
  • 170
    • 44949192532 scopus 로고    scopus 로고
    • One proposed convention extends the authority of the ICJ as its enforcement mechanism. See Brown, supra note 16, at 213-14
    • One proposed convention extends the authority of the ICJ as its enforcement mechanism. See Brown, supra note 16, at 213-14.
  • 171
    • 57149112498 scopus 로고    scopus 로고
    • note 162, at, Other approaches to creating new norms similarly may fail to obtain the compliance of non-state actors
    • ELLIS, supra note 162, at 14. Other approaches to creating new norms similarly may fail to obtain the compliance of non-state actors.
    • supra , pp. 14
    • ELLIS1
  • 172
    • 44949255971 scopus 로고    scopus 로고
    • Walker, supra note 19, at 1200-01 (citation omitted).
    • Walker, supra note 19, at 1200-01 (citation omitted).
  • 173
    • 44949107870 scopus 로고    scopus 로고
    • See O'Donnell & Kraska, supra note 48, at 159
    • See O'Donnell & Kraska, supra note 48, at 159.
  • 174
    • 44949101968 scopus 로고    scopus 로고
    • See id
    • See id.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.