No CrossRef data available.
Article contents
Cyber Operations and International Law. By François Delerue. Cambridge, UK: Cambridge University Press 2020. Pp. xxii, 513. Index.
Published online by Cambridge University Press: 15 January 2021
Abstract
- Type
- Book Reviews
- Information
- Copyright
- Copyright © 2021 by The American Society of International Law
References
1 Crootof, Rebecca, Autonomous Weapon Systems and the Limits of Analogy, 9 Harv. Nat'l Sec. J. 51, 80 (2018)Google Scholar.
2 Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Michael N. Schmitt & Liis Vihul eds., 2017).
3 Brian Egan, U.S. Dep't of State Legal Adviser, Remarks on International Law and Stability in Cyberspace, Berkeley Law School, Nov. 10, 2016, at https://2009-2017.state.gov/s/l/releases/remarks/264303.htm.
4 Ellen Nakashima & Shane Harris, How the Russians Hacked the DNC and Passed Its Emails to WikiLeaks, Wash. Post (July 13, 2018), at https://www.washingtonpost.com/world/national-security/how-the-russians-hacked-the-dnc-and-passed-its-emails-to-wikileaks/2018/07/13/af19a828-86c3-11e8-8553-a3ce89036c78_story.html.
5 Int'l L. Comm'n, Draft Articles on Responsibility of States for Internationally Wrongful Acts, ch. IV.E.1, Nov. 2001, Supp. No. 10 (A/56/10), available at https://www.refworld.org/docid/3ddb8f804.html.
6 Military and Paramilitary Activities in and Against Nicaragua (Nicar. v. US), Merits, Judgment,1986 ICJ Rep. 14, 101, paras. 105–15 (June 27).
7 Prosecutor v. Duško Tadić, IT-94-1-A, Appeals Chamber Judgment, paras. 12–23 (July 15, 1999).
8 Margulies, Peter, The NSA in Global Perspective: Surveillance, Human Rights, and International Counterterrorism, 82 Ford. L. Rev. 2137 (2014)Google Scholar; Eliza Watt, The Role of International Human Rights Law in the Protection of Online Privacy in the Age of Surveillance, 9th Int'l Conference on Cyber Conflict 1, 11 (2017); Ido Kilovaty, Cybersecurity Abroad: Election Interference and the Extraterritoriality of Human Rights Treaty Obligations, in Defending Democracies: Combating Foreign Election Interference in a Digital Age (Jens Ohlin & Duncan Hollis eds., forthcoming 2021).
9 Kim Zetter, An Unprecedented Look at Stuxnet, the World's First Digital Weapon, Wired (Mar. 11, 2014), at https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet.
10 Joshua Davis, Hackers Take Down the Most Wired Country in Europe, Wired (Aug. 21, 2007), at https://www.wired.com/2007/08/ff-estonia.
11 Global Commission on the Stability of Cyberspace, at https://cyberstability.org.
12 Brad Smith, The Need for a Digital Geneva Convention, Microsoft Blog (Feb. 14, 2017), at https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention.
13 CyberPeace Institute, Who We Are, at https://cyberpeaceinstitute.org/who-we-are. (“[W]e are citizens who seek peace and justice in cyberspace. Funded and supported by those who share our vision, we are a non-profit organization based in Geneva, Switzerland, independent of any political ideology, economic interest or religion. No one—individuals, industries or state actors—is beyond scrutiny. We are a driving force for accountability in cyberspace, for everyone, everywhere.”).