The Resource Tallinn Manual on the International Law Applicable to Cyber Warfare

Tallinn Manual on the International Law Applicable to Cyber Warfare

Label
Tallinn Manual on the International Law Applicable to Cyber Warfare
Title
Tallinn Manual on the International Law Applicable to Cyber Warfare
Creator
Subject
Genre
Language
eng
Summary
The result of a three-year project, this manual addresses the entire spectrum of international legal issues raised by cyber warfare
Cataloging source
MiAaPQ
http://library.link/vocab/creatorName
Schmitt, Michael N
Dewey number
341.63
LC call number
KZ6718 .T35 2013
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/subjectName
  • Cyberspace operations (Military science)
  • Information warfare (International law)
Label
Tallinn Manual on the International Law Applicable to Cyber Warfare
Link
https://ebookcentral.proquest.com/lib/oulaw/detail.action?docID=1113076
Instantiates
Publication
Copyright
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro -- Contents -- The International Group of Experts and Participants1 -- International Group of Experts -- Director -- Editorial Committee -- Legal Group Facilitators -- Legal Experts -- Technical Experts -- Observers -- Peer Reviewers -- Project Coordinator -- Project Manager -- Rapporteurs -- Legal Research -- Creighton University Law School -- Emory University Law School -- Chatham House -- Short form citations -- Treaties -- Case law -- Other sources -- Introduction -- Scope -- The Rules -- The Commentary -- Significance of sources, citations, and evidence in support of the Rules -- The International Group of Experts -- Drafting process -- Authority of the Manual -- Part I International cyber security law -- 1 States and cyberspace -- Section 1: Sovereignty, jurisdiction, and control -- Rule 1 - Sovereignty -- Rule 2 - Jurisdiction -- Rule 3 - Jurisdiction of flag States and States of registration -- Rule 4 - Sovereign immunity and inviolability -- Rule 5 - Control of cyber infrastructure -- Section 2: State responsibility -- Rule 6 - Legal responsibility of States -- Rule 7 - Cyber operations launched from governmental cyber infrastructure -- Rule 8 - Cyber operations routed through a State -- Rule 9 - Countermeasures -- 2 The use of force -- Section 1: Prohibition of the use of force -- Rule 10 - Prohibition of threat or use of force -- Rule 11 - Definition of use of force -- Rule 12 - Definition of threat of force -- Section 2: Self-defence -- Rule 13 - Self-defence against armed attack -- Rule 14 - Necessity and proportionality -- Rule 15 - Imminence and immediacy -- Rule 16 - Collective self-defence -- Rule 17 - Reporting measures of self-defence -- Section 3: Actions of international governmental organizations -- Rule 18 - United Nations Security Council -- Rule 19 - Regional organizations
  • Part II The law of cyber armed conflict -- 3 The law of armed conflict generally -- Rule 20 - Applicability of the law of armed conflict -- Rule 21 - Geographical limitations -- Rule 22 - Characterization as international armed conflict -- Rule 23 - Characterization as non-international armed conflict -- Rule 24 - Criminal responsibility of commanders and superiors -- 4 Conduct of hostilities -- Section 1: Participation in armed conflict -- Rule 25 - Participation generally -- Rule 26 - Members of the armed forces -- Rule 27 - Levée en masse -- Rule 28 - Mercenaries -- Rule 29 - Civilians -- Section 2: Attacks generally -- Rule 30 - Definition of cyber attack -- Rule 31 - Distinction -- Section 3: Attacks against persons -- Rule 32 - Prohibition on attacking civilians -- Rule 33 - Doubt as to status of persons -- Rule 34 - Persons as lawful objects of attack -- Rule 35 - Civilian direct participants in hostilities -- Rule 36 - Terror attacks -- Section 4: Attacks against objects -- Rule 37 - Prohibition on attacking civilian objects -- Rule 38 - Civilian objects and military objectives -- Rule 39 - Objects used for civilian and military purposes -- Rule 40 - Doubt as to status of objects -- Section 5: Means and methods of warfare -- Rule 41 - Definitions of means and methods of warfare -- Rule 42 - Superfluous injury or unnecessary suffering -- Rule 43 - Indiscriminate means or methods -- Rule 44 - Cyber booby traps -- Rule 45 - Starvation -- Rule 46 - Belligerent reprisals -- Rule 47 - Reprisals under Additional Protocol I -- Rule 48 - Weapons review -- Section 6: Conduct of attacks -- Rule 49 - Indiscriminate attacks -- Rule 50 - Clearly separated and distinct military objectives -- Rule 51 - Proportionality -- Section 7: Precautions -- Rule 52 - Constant care -- Rule 53 - Verification of targets -- Rule 54 - Choice of means or methods
  • Rule 55 - Precautions as to proportionality -- Rule 56 - Choice of targets -- Rule 57 - Cancellation or suspension of attack -- Rule 58 - Warnings -- Rule 59 - Precautions against the effects of cyber attacks -- Section 8: Perfidy, improper use, and espionage -- Rule 60 - Perfidy -- Rule 61 - Ruses -- Rule 62 - Improper use of the protective indicators -- Rule 63 - Improper use of United Nations emblem -- Rule 64 - Improper use of enemy indicators -- Rule 65 - Improper use of neutral indicators -- Rule 66 - Cyber espionage -- Section 9: Blockade and zones -- Rule 67 - Maintenance and enforcement of blockade -- Rule 68 - Effect of blockade on neutral activities -- Rule 69 - Zones -- A. Blockades -- B. Zones -- 5 Certain persons, objects, and activities -- Section 1: Medical and religious personnel and medical units, transports, and material -- Rule 70 - Medical and religious personnel, medical units and transports -- Rule 71 - Medical computers, computer networks, and data -- Rule 72 - Identification -- Rule 73 - Loss of protection and warnings -- Section 2: United Nations personnel, installations, materiel, units, and vehicles -- Rule 74 - United Nations personnel, installations, materiel, units, and vehicles -- Section 3: Detained persons -- Rule 75 - Protection of detained persons -- Rule 76 - Correspondence of detained persons -- Rule 77 - Compelled participation in military activities -- Section 4: Children -- Rule 78 - Protection of children -- Section 5: Journalists -- Rule 79 - Protection of journalists -- Section 6: Installations containing dangerous forces -- Rule 80 - Duty of care during attacks on dams, dykes, and nuclear electrical generating stations -- Section 7: Objects indispensable to the survival of the civilian population -- Rule 81 - Protection of objects indispensable to survival -- Section 8: Cultural property
  • Rule 82 - Respect and protection of cultural property -- Section 9: The natural environment -- Rule 83 - Protection of the natural environment -- Section 10: Diplomatic archives and communications -- Rule 84 - Protection of diplomatic archives and communications -- Section 11: Collective punishment -- Rule 85 - Collective punishment -- Section 12: Humanitarian assistance -- Rule 86 - Humanitarian assistance -- 6 Occupation -- Rule 87 - Respect for protected persons in occupied territory -- Rule 88 - Public order and safety in occupied territory -- Rule 89 - Security of the Occupying Power -- Rule 90 - Confiscation and requisition of property -- 7 Neutrality -- Rule 91 - Protection of neutral cyber infrastructure -- Rule 92 - Cyber operations in neutral territory -- Rule 93 - Neutral obligations -- Rule 94 - Response by parties to the conflict to violations -- Rule 95 - Neutrality and Security Council actions -- Glossary -- Index
Dimensions
unknown
Extent
1 online resource (304 pages)
Form of item
online
Isbn
9781107306622
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Sound
unknown sound
Specific material designation
remote
System control number
  • (MiAaPQ)EBC1113076
  • (Au-PeEL)EBL1113076
  • (CaPaEBR)ebr10661197
  • (CaONFJC)MIL456979
  • (OCoLC)828302517
Label
Tallinn Manual on the International Law Applicable to Cyber Warfare
Link
https://ebookcentral.proquest.com/lib/oulaw/detail.action?docID=1113076
Publication
Copyright
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Intro -- Contents -- The International Group of Experts and Participants1 -- International Group of Experts -- Director -- Editorial Committee -- Legal Group Facilitators -- Legal Experts -- Technical Experts -- Observers -- Peer Reviewers -- Project Coordinator -- Project Manager -- Rapporteurs -- Legal Research -- Creighton University Law School -- Emory University Law School -- Chatham House -- Short form citations -- Treaties -- Case law -- Other sources -- Introduction -- Scope -- The Rules -- The Commentary -- Significance of sources, citations, and evidence in support of the Rules -- The International Group of Experts -- Drafting process -- Authority of the Manual -- Part I International cyber security law -- 1 States and cyberspace -- Section 1: Sovereignty, jurisdiction, and control -- Rule 1 - Sovereignty -- Rule 2 - Jurisdiction -- Rule 3 - Jurisdiction of flag States and States of registration -- Rule 4 - Sovereign immunity and inviolability -- Rule 5 - Control of cyber infrastructure -- Section 2: State responsibility -- Rule 6 - Legal responsibility of States -- Rule 7 - Cyber operations launched from governmental cyber infrastructure -- Rule 8 - Cyber operations routed through a State -- Rule 9 - Countermeasures -- 2 The use of force -- Section 1: Prohibition of the use of force -- Rule 10 - Prohibition of threat or use of force -- Rule 11 - Definition of use of force -- Rule 12 - Definition of threat of force -- Section 2: Self-defence -- Rule 13 - Self-defence against armed attack -- Rule 14 - Necessity and proportionality -- Rule 15 - Imminence and immediacy -- Rule 16 - Collective self-defence -- Rule 17 - Reporting measures of self-defence -- Section 3: Actions of international governmental organizations -- Rule 18 - United Nations Security Council -- Rule 19 - Regional organizations
  • Part II The law of cyber armed conflict -- 3 The law of armed conflict generally -- Rule 20 - Applicability of the law of armed conflict -- Rule 21 - Geographical limitations -- Rule 22 - Characterization as international armed conflict -- Rule 23 - Characterization as non-international armed conflict -- Rule 24 - Criminal responsibility of commanders and superiors -- 4 Conduct of hostilities -- Section 1: Participation in armed conflict -- Rule 25 - Participation generally -- Rule 26 - Members of the armed forces -- Rule 27 - Levée en masse -- Rule 28 - Mercenaries -- Rule 29 - Civilians -- Section 2: Attacks generally -- Rule 30 - Definition of cyber attack -- Rule 31 - Distinction -- Section 3: Attacks against persons -- Rule 32 - Prohibition on attacking civilians -- Rule 33 - Doubt as to status of persons -- Rule 34 - Persons as lawful objects of attack -- Rule 35 - Civilian direct participants in hostilities -- Rule 36 - Terror attacks -- Section 4: Attacks against objects -- Rule 37 - Prohibition on attacking civilian objects -- Rule 38 - Civilian objects and military objectives -- Rule 39 - Objects used for civilian and military purposes -- Rule 40 - Doubt as to status of objects -- Section 5: Means and methods of warfare -- Rule 41 - Definitions of means and methods of warfare -- Rule 42 - Superfluous injury or unnecessary suffering -- Rule 43 - Indiscriminate means or methods -- Rule 44 - Cyber booby traps -- Rule 45 - Starvation -- Rule 46 - Belligerent reprisals -- Rule 47 - Reprisals under Additional Protocol I -- Rule 48 - Weapons review -- Section 6: Conduct of attacks -- Rule 49 - Indiscriminate attacks -- Rule 50 - Clearly separated and distinct military objectives -- Rule 51 - Proportionality -- Section 7: Precautions -- Rule 52 - Constant care -- Rule 53 - Verification of targets -- Rule 54 - Choice of means or methods
  • Rule 55 - Precautions as to proportionality -- Rule 56 - Choice of targets -- Rule 57 - Cancellation or suspension of attack -- Rule 58 - Warnings -- Rule 59 - Precautions against the effects of cyber attacks -- Section 8: Perfidy, improper use, and espionage -- Rule 60 - Perfidy -- Rule 61 - Ruses -- Rule 62 - Improper use of the protective indicators -- Rule 63 - Improper use of United Nations emblem -- Rule 64 - Improper use of enemy indicators -- Rule 65 - Improper use of neutral indicators -- Rule 66 - Cyber espionage -- Section 9: Blockade and zones -- Rule 67 - Maintenance and enforcement of blockade -- Rule 68 - Effect of blockade on neutral activities -- Rule 69 - Zones -- A. Blockades -- B. Zones -- 5 Certain persons, objects, and activities -- Section 1: Medical and religious personnel and medical units, transports, and material -- Rule 70 - Medical and religious personnel, medical units and transports -- Rule 71 - Medical computers, computer networks, and data -- Rule 72 - Identification -- Rule 73 - Loss of protection and warnings -- Section 2: United Nations personnel, installations, materiel, units, and vehicles -- Rule 74 - United Nations personnel, installations, materiel, units, and vehicles -- Section 3: Detained persons -- Rule 75 - Protection of detained persons -- Rule 76 - Correspondence of detained persons -- Rule 77 - Compelled participation in military activities -- Section 4: Children -- Rule 78 - Protection of children -- Section 5: Journalists -- Rule 79 - Protection of journalists -- Section 6: Installations containing dangerous forces -- Rule 80 - Duty of care during attacks on dams, dykes, and nuclear electrical generating stations -- Section 7: Objects indispensable to the survival of the civilian population -- Rule 81 - Protection of objects indispensable to survival -- Section 8: Cultural property
  • Rule 82 - Respect and protection of cultural property -- Section 9: The natural environment -- Rule 83 - Protection of the natural environment -- Section 10: Diplomatic archives and communications -- Rule 84 - Protection of diplomatic archives and communications -- Section 11: Collective punishment -- Rule 85 - Collective punishment -- Section 12: Humanitarian assistance -- Rule 86 - Humanitarian assistance -- 6 Occupation -- Rule 87 - Respect for protected persons in occupied territory -- Rule 88 - Public order and safety in occupied territory -- Rule 89 - Security of the Occupying Power -- Rule 90 - Confiscation and requisition of property -- 7 Neutrality -- Rule 91 - Protection of neutral cyber infrastructure -- Rule 92 - Cyber operations in neutral territory -- Rule 93 - Neutral obligations -- Rule 94 - Response by parties to the conflict to violations -- Rule 95 - Neutrality and Security Council actions -- Glossary -- Index
Dimensions
unknown
Extent
1 online resource (304 pages)
Form of item
online
Isbn
9781107306622
Media category
computer
Media MARC source
rdamedia
Media type code
c
Note
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2019. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Sound
unknown sound
Specific material designation
remote
System control number
  • (MiAaPQ)EBC1113076
  • (Au-PeEL)EBL1113076
  • (CaPaEBR)ebr10661197
  • (CaONFJC)MIL456979
  • (OCoLC)828302517

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...