25 research outputs found

    Nuclear Weapons Law

    Get PDF
    This book explains in non-technical terms the law applying to the threat or use of nuclear weapons before and during an armed conflict. The rules and implications for nuclear command and control are explained, which will be relevant for politicians, lawyers, military commanders, policy staff, academics and post-graduate students. This book is also available as open access

    Commentary: Part III

    Full text link

    When is a cyberattack a use of force or an armed attack?

    Get PDF
    News reports and public discussion about cyberattacks appear daily in traditional and social media. Cyberattacks used in the commission of crimes, such as stealing customer credit card information, defacing websites, distributing child pornography via file-sharing sites, and creating and leasing out botnets, have become commonplace. Moreover, cyberattacks that once were considered extraordinary - in particular, those carried out as part of state-sponsored military or intelligence operations - will likely increase in frequency and severity
    corecore