A treaty for cyberspace / Rex Hughes.
Material type: TextPublication details: 2010Subject(s): In: International Affairs Vol 86 No 2, March 2010, pp.523-541 (32)Summary: Computer communication networks are now being seen as one of the settings for conflict in the 21st century. Cyber-warfare may be in its infancy but the speed with which governments are pursuing e-everything opens a vast new field of opportunity for enemy action whether by nation states, non-state groups or individuals. Several countries have already established formal command and control (C2) over military assets in the cyber-domain. This article considers the evolution of cyberspace, some vectors of cyber-attack, leading debates about the application of international law to cyber-warfare, and finally outlines some elements that might be contained in an international cyber treaty.Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Journal Article | Mindef Library & Info Centre Journals | INFORMATION WARFARE (Browse shelf(Opens below)) | 1 | Not for loan | 31932-1001 |
Browsing Mindef Library & Info Centre shelves, Shelving location: Journals Close shelf browser (Hides shelf browser)
INFORMATION TECHNOLOGY Next exit joint information environment/ | INFORMATION WARFARE War and PC/ | INFORMATION WARFARE Breaching protocol : the threat of cyberespionage / | INFORMATION WARFARE A treaty for cyberspace / | INFORMATION WARFARE War in the fifth domain. | INFORMATION WARFARE Warfighting in the Information Age: the Marine Corps Intelligence, Surveillance, and Reconnaissance Enterprise (MCISRE) / | INFORMATION WARFARE Information warfare in an information age/ |
Computer communication networks are now being seen as one of the settings for conflict in the 21st century. Cyber-warfare may be in its infancy but the speed with which governments are pursuing e-everything opens a vast new field of opportunity for enemy action whether by nation states, non-state groups or individuals. Several countries have already established formal command and control (C2) over military assets in the cyber-domain. This article considers the evolution of cyberspace, some vectors of cyber-attack, leading debates about the application of international law to cyber-warfare, and finally outlines some elements that might be contained in an international cyber treaty.
There are no comments on this title.