Skip to main content

Currently Skimming:

Appendix D: Views on the Use of Force in Cyberspace
Pages 356-359

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 356...
... to death (e.g., shutting down power to a hospital with no backup generators) ." Thus, for example, Schmitt argued that "CNA specifically intended to directly cause physical damage to tangible property or injury or death to human beings is reasonably characterized as a use of armed force," and so "pipeline destruction and the shutting of power to the hospital are examples of CNA which the actor knows can, and intends to, directly cause destruction and serious injury." He further noted that "armed coercion  Michael Schmitt, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law 37:885937, 1999.
From page 357...
... • Responsibility. If a state takes visible responsibility for any destructive act, it is more likely to be characterized as a traditional military operation; ambiguous responsibility militates for a non-military label.
From page 358...
... New Tools, New Rules: International Law and Information Operations Another more recent analysis by Duncan Hollis argued against extending traditional laws of armed conflict (LOAC) to apply to cyberattack and other information operations. Though Hollis accepts the fundamental underlying rationale and intent of traditional LOAC (e.g., to minimize human suffering, to support reciprocity between states, to prevent morally reprehensible behavior)
From page 359...
... Hollis concluded from his analysis that the translation difficulties and the insufficiency of traditional LOAC with respect to subnational actors call for a new legal framework for governing cyberattack and other information operations.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.