Search GSSD

A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict

Abstract: 
Examines the tension between the needs of military forces in information warfare and the need to safeguard non-participants in information warfare. Includes Revolutions in Military Affairs (RMAs) and Law of Armed Conflict (LOAC) applied to information warfare. Memorializing international rules of cyber warfare is important within itself. Participating countries that will be governed by the laws themselves should generate rules as a separate instrument when conventional laws of war are difficult to apply. Memorializing the rules would help military leaders make decisions to use information warfare while knowing what is and what is not a violation of the rules. An information warfare attack should be committed by a lawful combatant that does not harm civilians but only legitimate military or government targets. This Principle of Distinction should be applied to physical damage, economic damage, and malicious code that has the potential to also harm civilians. Attacks targeting military systems that advance a military strategy should be legitimized, as opposed to attacks that purely strike civilian systems.
Author: 
Davis Brown
Institution: 
George Washington University Law School
Year: 
2006
Input By: 
Russell Kooistra
Affiliation: 
MIT
Region(s): 
Industry Focus: 
Information & Telecommunication
Internet & Cyberspace
Datatype(s): 
Bibliographies & Reports