Recent years have seen a significant increase in the scale and sophistication of cyber attacks employed by, or against, states and non-state actors. This book investigates the international legal regime that applies to such attacks, and investigates how far the traditional rules of international humanitarian law can be used in these situations.Finally, it could be that the cyber operations originate from computer systems located in a certain state or from the cyber ... for not taking the necessary and reasonable measures to prevent or stop the operations (for instance, by disabling the internet access of the ... reflected in Rule 5 of the Tallinn Manual, p 26. ... 290 Shackelford, a#39;From Nuclear Wara#39;, p 208; Klimburg, a#39;Mobilising Cyber Powera#39;, p 50.
|Title||:||Cyber Operations and the Use of Force in International Law|
|Publisher||:||Oxford University Press - 2014-03|