HOME > Detail View

Detail View

Technology and the law on the use of force : new security challenges in the twenty first century

Technology and the law on the use of force : new security challenges in the twenty first century (Loan 4 times)

Material type
단행본
Personal Author
Maogoto, Jackson Nyamuya, 1975-.
Title Statement
Technology and the law on the use of force : new security challenges in the twenty first century / Jackson Maogoto.
Publication, Distribution, etc
Milton Park, Abingdon, Oxon ;   New York, NY :   Routledge,   c2015.  
Physical Medium
xviii, 111 p. ; 24 cm.
Series Statement
Routledge research in international law
ISBN
9780415694339 (hardback) 0415694337 (hardback) 9781138245228 (pbk.)
요약
"In recent years military technology and strategy have developed apace particularly in regards to cyber and space warfare. In 2007 Estonia suffered a month long cyber assault to its digital infrastructure which it is presumed came from Russia in retaliation for the removal of a World War II-era statue of a Soviet soldier from its capital. This was described as some as the first war in cyberspace Web War I. Since then there have been several more cyber attacks on a State and its digital environment, in particular in Iran in 2010 when a worm Stuxnet was identified as having infected and damaged Iran's uranium enrichment plant presumably in an attempt to set back Iran's nuclear programme. This book takes a detailed look at these new theatres of war and considers their relation to international law on the use of force. The use of force, except in cases of self-defence or with the authorisation of a Security Council Resolution, is prohibited under the UN charter and customary international law however, the law of jus ad bellum was developed in a pre-digital era where current technological capabilities could not be conceived of. This book asks whether the law on the use of force is able to deal with legal disputes likely to arise from modern warfare. Among the questions it considers are : What amounts to an armed attack in an age of anti-satellite weaponry and lasers that can cripple satellites? Does the destruction of a State's vital digital eco-system or the "blinding" or jamming of military communication satellites constitute a threat? If so what is the threshold that would enliven the right of self-defence or retaliatory action? The book argues that while technology has leapt ahead the legal framework has failed to adapt, and as a result the ability of States to legally defend themselves has been impaired"--
Content Notes
Introduction -- Use of force : displaced twentieth-century rules, norms and standards? -- Revolution in military affairs : hi-tech weaponry, low-tech legal safeguards -- The fourth domain : ascendance of outer space as a war theatre -- War in the fifth domain : cyberwarfare -- Discarding law by analogy : old legal frameworks -- Conclusion.
Bibliography, Etc. Note
Includes bibliographical references (p. 93-101) and index. Includes bibliographical references and index.
Subject Added Entry-Topical Term
Information warfare (International law). War (International law). Computer networks --Security measures. Cyberterrorism --Prevention. Malware (Computer software) --Prevention. Cyber intelligence (Computer security). Computer security --Law and legislation.
000 00000cam u2200205 a 4500
001 000045897087
005 20170302170712
008 170302s2015 enk b 001 0 eng d
010 ▼a 2014021702
020 ▼a 9780415694339 (hardback)
020 ▼a 0415694337 (hardback)
020 ▼a 9781138245228 (pbk.)
020 ▼z 9780203716052 (ebk.)
020 ▼z 0203716051 (ebk.)
035 ▼a (KERIS)REF000017659373
040 ▼a DLC ▼b eng ▼c DLC ▼e rda ▼d 211009
050 0 0 ▼a KZ6718 ▼b .M36 2015
082 0 0 ▼a 341.6/3 ▼2 23
084 ▼a 341.63 ▼2 DDCK
090 ▼a 341.63 ▼b M296t
100 1 ▼a Maogoto, Jackson Nyamuya, ▼d 1975-.
245 1 0 ▼a Technology and the law on the use of force : ▼b new security challenges in the twenty first century / ▼c Jackson Maogoto.
260 ▼a Milton Park, Abingdon, Oxon ; ▼a New York, NY : ▼b Routledge, ▼c c2015.
300 ▼a xviii, 111 p. ; ▼c 24 cm.
490 1 ▼a Routledge research in international law
504 ▼a Includes bibliographical references (p. 93-101) and index.
504 ▼a Includes bibliographical references and index.
505 1 ▼a Introduction -- Use of force : displaced twentieth-century rules, norms and standards? -- Revolution in military affairs : hi-tech weaponry, low-tech legal safeguards -- The fourth domain : ascendance of outer space as a war theatre -- War in the fifth domain : cyberwarfare -- Discarding law by analogy : old legal frameworks -- Conclusion.
520 ▼a "In recent years military technology and strategy have developed apace particularly in regards to cyber and space warfare. In 2007 Estonia suffered a month long cyber assault to its digital infrastructure which it is presumed came from Russia in retaliation for the removal of a World War II-era statue of a Soviet soldier from its capital. This was described as some as the first war in cyberspace Web War I. Since then there have been several more cyber attacks on a State and its digital environment, in particular in Iran in 2010 when a worm Stuxnet was identified as having infected and damaged Iran's uranium enrichment plant presumably in an attempt to set back Iran's nuclear programme. This book takes a detailed look at these new theatres of war and considers their relation to international law on the use of force. The use of force, except in cases of self-defence or with the authorisation of a Security Council Resolution, is prohibited under the UN charter and customary international law however, the law of jus ad bellum was developed in a pre-digital era where current technological capabilities could not be conceived of. This book asks whether the law on the use of force is able to deal with legal disputes likely to arise from modern warfare. Among the questions it considers are : What amounts to an armed attack in an age of anti-satellite weaponry and lasers that can cripple satellites? Does the destruction of a State's vital digital eco-system or the "blinding" or jamming of military communication satellites constitute a threat? If so what is the threshold that would enliven the right of self-defence or retaliatory action? The book argues that while technology has leapt ahead the legal framework has failed to adapt, and as a result the ability of States to legally defend themselves has been impaired"-- ▼c Provided by publisher.
520 ▼a "In recent years, threats to governmental, economic, and military interests via the information infrastructure have increased as governmental and non-governmental operations have become progressively supported by vast automated systems and electronic data. In 2007 Estonia suffered a month long cyber assault to its digital infrastructure, described in cyberspace as 'Web War I'. In 2010, a worm Stuxnet was identified as having infected and damaged Iran's uranium enrichment plant, presumably in an attempt to set back Iran's nuclear programme. This book takes a detailed look at these new theatres of war and considers their relation to international law on the use of force. Except in cases of self-defence or with the authorisation of a Security Council Resolution, the use of force is prohibited under the UN charter and customary international law. However, the law of jus ad bellum was developed in a pre-digital era where current technological capabilities could not be conceived. Jackson Maogoto asks whether the law on the use of force is able to deal with legal disputes likely to arise from modern warfare. Key queries include, how one defines an armed attack in an age of anti-satellite weaponry, whether the destruction of a State's vital digital eco-system or the "blinding" of military communication satellites constitutes a threat, and how one delimits the threshold that would enliven the right of self-defence or retaliatory action. The book argues that while technology has leapt ahead, the legal framework has failed to adapt, rendering States unable to legally defend themselves effectively. This book will be of great interest and use to researchers and students of international law, the law of armed conflict, Information Technology and the law, and counter-terrorism"-- ▼c Provided by publisher.
650 0 ▼a Information warfare (International law).
650 0 ▼a War (International law).
650 0 ▼a Computer networks ▼x Security measures.
650 0 ▼a Cyberterrorism ▼x Prevention.
650 0 ▼a Malware (Computer software) ▼x Prevention.
650 0 ▼a Cyber intelligence (Computer security).
650 0 ▼a Computer security ▼x Law and legislation.
830 0 ▼a Routledge research in international law.
945 ▼a KLPA

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Main Library/Law Library(Books/B1)/ Call Number 341.63 M296t Accession No. 111768067 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Introduction 1. Use of Force: Displaced 20th Century Rules, Norms and Standards? 2. Revolution in Military Affairs: Hi-Tech Weaponry, Low-Tech Legal Safeguards 3. The Fourth Domain?Ascendance of Space as a War Theatre 4. The Fourth Domain?Ascendance of Space as a War Theatre 5. Discarding Law by Analogy?Old Legal Frameworks for New Threats Conclusion


Information Provided By: : Aladin

New Arrivals Books in Related Fields