Hostname: page-component-848d4c4894-ttngx Total loading time: 0 Render date: 2024-05-16T21:13:00.328Z Has data issue: false hasContentIssue false

Cyber Operations and International Law. By François Delerue. Cambridge, UK: Cambridge University Press 2020. Pp. xxii, 513. Index.

Published online by Cambridge University Press:  15 January 2021

Ido Kilovaty*
Affiliation:
The University of Tulsa, College of Law

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Book Reviews
Copyright
Copyright © 2021 by The American Society of International Law

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 Crootof, Rebecca, Autonomous Weapon Systems and the Limits of Analogy, 9 Harv. Nat'l Sec. J. 51, 80 (2018)Google Scholar.

2 Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Michael N. Schmitt & Liis Vihul eds., 2017).

3 Brian Egan, U.S. Dep't of State Legal Adviser, Remarks on International Law and Stability in Cyberspace, Berkeley Law School, Nov. 10, 2016, at https://2009-2017.state.gov/s/l/releases/remarks/264303.htm.

4 Ellen Nakashima & Shane Harris, How the Russians Hacked the DNC and Passed Its Emails to WikiLeaks, Wash. Post (July 13, 2018), at https://www.washingtonpost.com/world/national-security/how-the-russians-hacked-the-dnc-and-passed-its-emails-to-wikileaks/2018/07/13/af19a828-86c3-11e8-8553-a3ce89036c78_story.html.

5 Int'l L. Comm'n, Draft Articles on Responsibility of States for Internationally Wrongful Acts, ch. IV.E.1, Nov. 2001, Supp. No. 10 (A/56/10), available at https://www.refworld.org/docid/3ddb8f804.html.

6 Military and Paramilitary Activities in and Against Nicaragua (Nicar. v. US), Merits, Judgment,1986 ICJ Rep. 14, 101, paras. 105–15 (June 27).

7 Prosecutor v. Duško Tadić, IT-94-1-A, Appeals Chamber Judgment, paras. 12–23 (July 15, 1999).

8 Margulies, Peter, The NSA in Global Perspective: Surveillance, Human Rights, and International Counterterrorism, 82 Ford. L. Rev. 2137 (2014)Google Scholar; Eliza Watt, The Role of International Human Rights Law in the Protection of Online Privacy in the Age of Surveillance, 9th Int'l Conference on Cyber Conflict 1, 11 (2017); Ido Kilovaty, Cybersecurity Abroad: Election Interference and the Extraterritoriality of Human Rights Treaty Obligations, in Defending Democracies: Combating Foreign Election Interference in a Digital Age (Jens Ohlin & Duncan Hollis eds., forthcoming 2021).

9 Kim Zetter, An Unprecedented Look at Stuxnet, the World's First Digital Weapon, Wired (Mar. 11, 2014), at https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet.

10 Joshua Davis, Hackers Take Down the Most Wired Country in Europe, Wired (Aug. 21, 2007), at https://www.wired.com/2007/08/ff-estonia.

11 Global Commission on the Stability of Cyberspace, at https://cyberstability.org.

12 Brad Smith, The Need for a Digital Geneva Convention, Microsoft Blog (Feb. 14, 2017), at https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention.

13 CyberPeace Institute, Who We Are, at https://cyberpeaceinstitute.org/who-we-are. (“[W]e are citizens who seek peace and justice in cyberspace. Funded and supported by those who share our vision, we are a non-profit organization based in Geneva, Switzerland, independent of any political ideology, economic interest or religion. No one—individuals, industries or state actors—is beyond scrutiny. We are a driving force for accountability in cyberspace, for everyone, everywhere.”).