Read more
Recent years have seen a significant increase in the scale and sophistication of cyber attacks employed by, or against, states and non-state actors. This book investigates the international legal regime that applies to such attacks, and investigates how far the traditional rules of international humanitarian law can be used in these situations.
List of contents
- 1: Identifying the Problem and the Applicable Law
- 2: Cyber Operations and the jus ad bellum
- 3: The Applicability of the jus in bello to Cyber Operations
- 4: Cyber Operations and the Conduct of Hostilities
- 5: Cyber Operations and the Law of Neutrality
- General Conclusions
About the author
Marco Roscini is Professor of International Law at the University of Westminster Law School. Prof. Roscini has a PhD from the University of Rome 'La Sapienza' and was previously a Research Fellow in International Law at the University of Verona School of Law. He lectured in international security law at University College London (UCL), King's College London, Queen Mary University of London, and the Ecole des Relations Internationales in Paris. He has published a monograph on nuclear-weapon-free zones and is the co-editor of Non-Proliferation Law as a Special Regime . Prof. Roscini is a member of the International Law Association (ILA)'s Committee on Nuclear Weapons, Non-proliferation and Contemporary International Law, of the Academic Network (AN) Programme on International Cyber Security, and of the EU Non-proliferation Consortium. In 2012, he was awarded a Leverhulme Research Fellowship for the academic year 2012-2013 to conduct his research on cyber operations.
Summary
Recent years have seen a significant increase in the scale and sophistication of cyber attacks employed by, or against, states and non-state actors. This book investigates the international legal regime that applies to such attacks, and investigates how far the traditional rules of international humanitarian law can be used in these situations.
Additional text
Roscinis volume is a welcome addition to existing literature in the field. The way in which the author uses concrete cases of cyber operations as practical, real-world examples of the types of attacks which have taken place and his subsequent legal assessment make this volume a much valued navigation tool, useful to appraise the current state of legal development in the area. The detail and breadth of information found in all of the chapters is remarkable, and the book will quickly become a required reading for anyone who wishes to contribute in a qualified manner to the debate on cyber warfare.