Right To National Self-Defense, The: In Information Warfare O
49,96 €
Tellimisel
Tarneaeg:
2-4 nädalat
Tootekood
9780955605512
Description:
This ambitious work which took the better part of a decade to produce will be essential reading for all serious defence study students, and of absorbing interest to military professionals and lay people concerned with the future of warfare and all aspects of response to military attack. Its ultimate aim is to demonstrate that the advent of Cyberwarfare has pushed traditional l...
This ambitious work which took the better part of a decade to produce will be essential reading for all serious defence study students, and of absorbing interest to military professionals and lay people concerned with the future of warfare and all aspects of response to military attack. Its ultimate aim is to demonstrate that the advent of Cyberwarfare has pushed traditional l...
Description:
This ambitious work which took the better part of a decade to produce will be essential reading for all serious defence study students, and of absorbing interest to military professionals and lay people concerned with the future of warfare and all aspects of response to military attack. Its ultimate aim is to demonstrate that the advent of Cyberwarfare has pushed traditional legal thinking regarding the regulation of forcible action beyond traditional boundaries. It attempts to do so by critically analyzing specific characteristics which are inherent to Cyberwarfare such as stealth, speed, untraceability, the availability to State as well as Non-State sponsored agents, their defiance of traditional borders, and an unprecedented potential for destruction, all of which have played a major role in making obsolescent traditional legal norms relied upon for the effective regulation of the use of force. It follows from the above that no defence system can be effectively regulated, especially one as new and unconventional as Information Warfare, unless all its specific aspects are explored as deeply as possible.The best means to achieve such a purpose have been deemed to be through the inclusion as well as the careful analysis of as many real life examples of Information Warfare operations as possible in order to illustrate the special nature of Information Warfare and its various individual features. The examples compiled for inclusion have been selected not on the basis of being the most recent, but on the basis of their factual background being as fully known as possible. Consequently, this book has been constructed around the concept of legality, starting with a section outlining currently existing legal norms of individual self-defense, then applying those norms to Information Warfare Operations including a presentation of existing international legal instruments with provisions applicable to Information Warfare which could serve as additional essential guidelines for a future legal framework specifically crafted to regulate the use of force in cyberspace. Last but not least this book sets a paradigm with regard to Cyberwarfare as well as with other methods of warfare which escape the boundaries of the traditional State monopoly of the use of force.It ultimately shows the extent to which traditional legal thinking, which is shaped around the premise of regulating typical forms of State forcible action, when faced with such methods of warfare is totally obsolete.
Table of Contents:
Chapter 1; INTRODUCTION; A. The Revolution of the World Wide; Web; B. Information Warfare: The Ideal Weapon for Potential Aggressors; Worldwide; C. International Law and the Regulation of Armed Force: A Search for; Answers; FIRST PART; Chapter 2; I. INFORMATION WARFARE: AS OLD AS HUMAN HISTORY; A. Information Warfare in the past; B. Modern Information Warfare Operations; C. The Future of Information Warfare; Chapter 3; II. KEY PLAYERS OF THE MODERN INFORMATION WARFARE BATTLEFIELD; A. States and State Sponsored Agents; B. Non State Sponsored Agents; Chapter 4; III. OFFENSIVE AND DEFENSIVE INFORMATION WARFARE; A. Offensive Information Warfare; B. Defensive Information Warfare. SECOND PART; Chapter 5; I. THE LEGAL NORMS ON THE USE OF INTERSTATE FORCE AND INDIVIDUAL SELF-DEFENSE; A. Traditional Legal Norms on the Use of Interstate Force: The Historical Origins; B. International Customary Legal Norms on the Use of Interstate Force; C. The Emergence of Modern Legal Norms and the Prohibition of the Use of Interstate Force; a) The Period before World War II; b) The UN Paradigm; Chapter 6; D. The Concept of Self-Defense; a) The Right to Self-Defense; b) The Concept of Armed Attack; c) The Three Conditions Precedent to the Lawful Exercise of the Right to; Self-Defense; d) The Role of the United Nations Security Council; Chapter 7; E. The Optional Modes of Individual Self-Defense; a) Self-Defense in Response to an Armed Attack by a State; b) Self-Defense in Response to an Armed Attack from a State; Chapter 8; F. Anticipatory and Interceptive Self-Defense: an Exercise in Perplexity. Chapter 9; G. State Responsibility and Inter-State Force; a) General Rules: Application; b) State Responsibility and Aggression; Chapter 10; II. THE RIGHT OF STATES TO USE FORCE IN CYBERSPACE FOR INDIVIDUAL SELF-DEFENSE PURPOSES; A. The Legal Foundations; a) Information Warfare Operations within the Concept of Self-Defense; b) Information Warfare Operations within Customary Legal Norms of Self-Defense; c) The Role of the United Nations Security Council; Chapter 11; B. Information Warfare Operations within the Optional Modes of Individual Self-Defense; a) The Unique Nature of Information Warfare Operations within the Modality of Individual Self-Defense; b) Information Warfare Operations in Response to an Armed Attack by a State; c) Information Warfare Operations in Response to an Armed Attack from a State; Chapter 12; C. Additional International Legal Instruments Supporting the Right of States to Self-Defense in Information Warfare Operations; a) The Jus in Bello; b) The Law of Space; c) Oceans Law; d) Communications Law; e) The Law of International Agreements. Chapter 13; D. Information Warfare Operations and State Responsibility; a) Information Warfare operations and the Need for Attribution; b) Application of the Rules on State Responsibility to Information Warfare operations; E. Information Warfare Operations and Current Norms of Individual Self-Defense: The Weakness of the Existing Regulatory Regime; THIRD PART; Chapter 14; I. REGULATING INFORMATION WARFARE OPERATIONS: THE NEED FOR 'A JUS NOVUM'; A. A Search for Possible Ways to Strengthen International Co-operation on the Issue; B. An International Convention Regulating State Use of Force in Cyberspace: An Exercise in Futility or a Real Possibility; C. Factors, which May Play a Role in Shaping the World's Future Attitude towards State Uses of Force in Cyberspace; Chapter 15; II. CONCLUSIONS; BIBLIOGRAPHY & OTHER SOURCES; LIST OF ABBREVIATIONS.
Author Biography:
Dr. Dimitrios Delibasis is a member of the Counsel for International Security Affairs and holds an officer's commission in the Greek Army Reserve. His higher education includes degrees from the University of Athens, Georgetown University and the University of Westminster. Since 2001 he has been a visiting lecturer at the University of Westminster. His ambitious book presents a new paradigm by showing that Cyberwarfare, along with other methods of warfare defy the traditional State regulatory monopoly with regard to the use of force, and tend to make obsolete accepted ways of legal thinking as understood in the past. The book begins with a careful in-depth analysis of Cyberwarfare's special features, such as stealth, speed, untraceability, the availability to State as well as Non-State sponsored agents; the defiance of traditional borders, and the resulting unprecedented potential for destruction. All of this is shown as typical of modern methods of warfare. The ultimate aim is to demonstrate that we have exceeded the boundaries of traditional legal thinking, based on the concept of regulating types of forcible action traditionally available to the State.
This ambitious work which took the better part of a decade to produce will be essential reading for all serious defence study students, and of absorbing interest to military professionals and lay people concerned with the future of warfare and all aspects of response to military attack. Its ultimate aim is to demonstrate that the advent of Cyberwarfare has pushed traditional legal thinking regarding the regulation of forcible action beyond traditional boundaries. It attempts to do so by critically analyzing specific characteristics which are inherent to Cyberwarfare such as stealth, speed, untraceability, the availability to State as well as Non-State sponsored agents, their defiance of traditional borders, and an unprecedented potential for destruction, all of which have played a major role in making obsolescent traditional legal norms relied upon for the effective regulation of the use of force. It follows from the above that no defence system can be effectively regulated, especially one as new and unconventional as Information Warfare, unless all its specific aspects are explored as deeply as possible.The best means to achieve such a purpose have been deemed to be through the inclusion as well as the careful analysis of as many real life examples of Information Warfare operations as possible in order to illustrate the special nature of Information Warfare and its various individual features. The examples compiled for inclusion have been selected not on the basis of being the most recent, but on the basis of their factual background being as fully known as possible. Consequently, this book has been constructed around the concept of legality, starting with a section outlining currently existing legal norms of individual self-defense, then applying those norms to Information Warfare Operations including a presentation of existing international legal instruments with provisions applicable to Information Warfare which could serve as additional essential guidelines for a future legal framework specifically crafted to regulate the use of force in cyberspace. Last but not least this book sets a paradigm with regard to Cyberwarfare as well as with other methods of warfare which escape the boundaries of the traditional State monopoly of the use of force.It ultimately shows the extent to which traditional legal thinking, which is shaped around the premise of regulating typical forms of State forcible action, when faced with such methods of warfare is totally obsolete.
Table of Contents:
Chapter 1; INTRODUCTION; A. The Revolution of the World Wide; Web; B. Information Warfare: The Ideal Weapon for Potential Aggressors; Worldwide; C. International Law and the Regulation of Armed Force: A Search for; Answers; FIRST PART; Chapter 2; I. INFORMATION WARFARE: AS OLD AS HUMAN HISTORY; A. Information Warfare in the past; B. Modern Information Warfare Operations; C. The Future of Information Warfare; Chapter 3; II. KEY PLAYERS OF THE MODERN INFORMATION WARFARE BATTLEFIELD; A. States and State Sponsored Agents; B. Non State Sponsored Agents; Chapter 4; III. OFFENSIVE AND DEFENSIVE INFORMATION WARFARE; A. Offensive Information Warfare; B. Defensive Information Warfare. SECOND PART; Chapter 5; I. THE LEGAL NORMS ON THE USE OF INTERSTATE FORCE AND INDIVIDUAL SELF-DEFENSE; A. Traditional Legal Norms on the Use of Interstate Force: The Historical Origins; B. International Customary Legal Norms on the Use of Interstate Force; C. The Emergence of Modern Legal Norms and the Prohibition of the Use of Interstate Force; a) The Period before World War II; b) The UN Paradigm; Chapter 6; D. The Concept of Self-Defense; a) The Right to Self-Defense; b) The Concept of Armed Attack; c) The Three Conditions Precedent to the Lawful Exercise of the Right to; Self-Defense; d) The Role of the United Nations Security Council; Chapter 7; E. The Optional Modes of Individual Self-Defense; a) Self-Defense in Response to an Armed Attack by a State; b) Self-Defense in Response to an Armed Attack from a State; Chapter 8; F. Anticipatory and Interceptive Self-Defense: an Exercise in Perplexity. Chapter 9; G. State Responsibility and Inter-State Force; a) General Rules: Application; b) State Responsibility and Aggression; Chapter 10; II. THE RIGHT OF STATES TO USE FORCE IN CYBERSPACE FOR INDIVIDUAL SELF-DEFENSE PURPOSES; A. The Legal Foundations; a) Information Warfare Operations within the Concept of Self-Defense; b) Information Warfare Operations within Customary Legal Norms of Self-Defense; c) The Role of the United Nations Security Council; Chapter 11; B. Information Warfare Operations within the Optional Modes of Individual Self-Defense; a) The Unique Nature of Information Warfare Operations within the Modality of Individual Self-Defense; b) Information Warfare Operations in Response to an Armed Attack by a State; c) Information Warfare Operations in Response to an Armed Attack from a State; Chapter 12; C. Additional International Legal Instruments Supporting the Right of States to Self-Defense in Information Warfare Operations; a) The Jus in Bello; b) The Law of Space; c) Oceans Law; d) Communications Law; e) The Law of International Agreements. Chapter 13; D. Information Warfare Operations and State Responsibility; a) Information Warfare operations and the Need for Attribution; b) Application of the Rules on State Responsibility to Information Warfare operations; E. Information Warfare Operations and Current Norms of Individual Self-Defense: The Weakness of the Existing Regulatory Regime; THIRD PART; Chapter 14; I. REGULATING INFORMATION WARFARE OPERATIONS: THE NEED FOR 'A JUS NOVUM'; A. A Search for Possible Ways to Strengthen International Co-operation on the Issue; B. An International Convention Regulating State Use of Force in Cyberspace: An Exercise in Futility or a Real Possibility; C. Factors, which May Play a Role in Shaping the World's Future Attitude towards State Uses of Force in Cyberspace; Chapter 15; II. CONCLUSIONS; BIBLIOGRAPHY & OTHER SOURCES; LIST OF ABBREVIATIONS.
Author Biography:
Dr. Dimitrios Delibasis is a member of the Counsel for International Security Affairs and holds an officer's commission in the Greek Army Reserve. His higher education includes degrees from the University of Athens, Georgetown University and the University of Westminster. Since 2001 he has been a visiting lecturer at the University of Westminster. His ambitious book presents a new paradigm by showing that Cyberwarfare, along with other methods of warfare defy the traditional State regulatory monopoly with regard to the use of force, and tend to make obsolete accepted ways of legal thinking as understood in the past. The book begins with a careful in-depth analysis of Cyberwarfare's special features, such as stealth, speed, untraceability, the availability to State as well as Non-State sponsored agents; the defiance of traditional borders, and the resulting unprecedented potential for destruction. All of this is shown as typical of modern methods of warfare. The ultimate aim is to demonstrate that we have exceeded the boundaries of traditional legal thinking, based on the concept of regulating types of forcible action traditionally available to the State.
Autor | Delibasis, Dimitrios |
---|---|
Ilmumisaeg | 2007 |
Kirjastus | Arena Books |
Köide | Pehmekaaneline |
Bestseller | Ei |
Lehekülgede arv | 428 |
Pikkus | 234 |
Laius | 234 |
Keel | English |
Anna oma hinnang