Show simple item record

dc.contributor.authorSchmitt, M
dc.date.accessioned2017-05-17T15:06:46Z
dc.date.accessioned2017-06-26T09:19:53Z
dc.date.issued2017-05-30
dc.description.abstractTallinn Manual 2.0 on the International Law Applicable to Cyber Operations examines the application of extant international law principles and rules to cyber activities occurring during both peacetime and armed conflict. It was intended by the two International Groups of Experts that drafted it to be a useful tool for analysis of cyber operations. The manual comprises 154 Rules, together with commentary explaining the source and application of the Rules. However, as a compendium of rules and commentary, the manual merely sets forth the law. In this article, the director of the Tallinn Manual Project offers a roadmap for thinking through cyber operations from the perspective of international law. Two flowcharts are provided, one addressing state responses to peacetime cyber operations, the other analyzing cyber attacks that take place during armed conflicts. The text explains each step in the analytical process. Together, they serve as a vade mecum designed to guide government legal advisers and others through the analytical process that applies in these two situations, which tend to be the focus of great state concern. Readers are cautioned that the article represents but a skeleton of the requisite analysis and therefore should be used in conjunction with the more robust and granular examination of the subjects set forth in Tallinn Manual 2.0.en_GB
dc.identifier.citationVol. 8, pp. 239 - 282
dc.identifier.urihttp://hdl.handle.net/10871/28179
dc.language.isoenen_GB
dc.publisherHarvard University, Harvard Law Schoolen_GB
dc.relation.urlhttp://harvardnsj.org/2017/05/volume-8-issue-2/
dc.rights© 2017 by the President and Fellows of Harvard College and Michael N. Schmitt.
dc.titlePeacetime Cyber Responses and Wartime Cyber Operations Under International Law: An Analytical Vade Mecumen_GB
dc.typeArticleen_GB
dc.identifier.issn2153-1358
dc.descriptionThis is the final version of the article. Available from Harvard University Law School via the link in this record.
dc.identifier.journalHarvard National Security Journalen_GB


Files in this item

This item appears in the following Collection(s)

Show simple item record