Have a personal or library account? Click to login
Contemplating a Cyber Weapons Convention: An Exploration of Good Practice and Necessary Preconditions Cover

Contemplating a Cyber Weapons Convention: An Exploration of Good Practice and Necessary Preconditions

Open Access
|Oct 2020

References

  1. 1. Andemichael, Berhanykun, and John Mathiason. Eliminating Weapons of Mass Destruction: Prospects for Effective International Verification. London and New York: Palgrave Macmillan, 2005.10.1057/9780230005549
  2. 2. Applegate, Scott D. “Cybermilitias and Political Hackers – Use of Irregular Forces in Cyber Warfare.” Security & Privacy 9 (2011): 16-22.10.1109/MSP.2011.46
  3. 3. Applegate, Scott D. “The Dawn of Kinetic Cyber”: 163-178. In: Karlis Podins, Jan Stinissen, and Markus Maybaum, eds. Proceedings of the 5th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2013.
  4. 4. Arimatsu, Louise. “A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations”: 91-110. In: Christian Czosseck, Rain Ottis, and Katharina Ziolkowski, eds. Proceedings of the 2012 4th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2012.
  5. 5. Arms Control Association. “Chemical and Biological Weapons Status at a Glance” (February 2014) // https://www.armscontrol.org/factsheets/cbwprolif.
  6. 6. Baglione, Lisa. To Agree or Not to Agree: Leadership, Bargaining, and Arms Control. University of Michigan Press, 1999.10.3998/mpub.23149
  7. 7. Baylis, John. “The Control of Weapons of Mass Destruction”: 212-230. In: John Baylis, J.J. Wirtz, and Colin S. Gray, eds. Strategy in the Contemporary World. Oxford and New York: Oxford University Press, 2016.
  8. 8. Blacker, Coit D., and Gloria Duffy. International Arms Control: Issues and Agreements. Stanford: Stanford University Press, 1984.
  9. 9. Boulanin, Vincent. “Cybersecurity and the Arms Industry”: 218-226. In: SIPRI Yearbook 2013: Armaments, Disarmament and International Security. Oxford and New York: Oxford University Press, 2013.
  10. 10. Brunée, Jutta. “Compliance Control”: 373-390. In: Geir Ulfstein, ed. Making Treaties Work: Human Rights, Environment and Arms Control. Cambridge and New York: Cambridge University Press, 2007.10.1017/CBO9780511494345.017
  11. 11. Charron, Andrea. UN Sanctions and Conflict: Responding to Peace and Security Threats. London and New York: Routledge, 2011.10.4324/9780203807569
  12. 12. Claessen, Eva. “Reshaping the Internet – the Impact of the Securitisation of Internet Infrastructure on Approaches to Internet Governance: The Case of Russia and the EU.” Journal of Cyber Policy (2020) // DOI: 10.1080/23738871.2020.1728356.10.1080/23738871.2020.1728356
  13. 13. Cutts, Andrew. “Warfare and the Continuum of Cyber Risks: A Policy Perspective”: 66-76. In: Christian Czosseck and Kenneth Geers, eds. The Virtual Battlefield: Perspectives on Cyber Warfare. Amsterdam: IOS Press 2009.
  14. 14. Dahlitz, Julie. “The Role of Customary Law in Arms Limitation”: 157-178. In: Julie Dahlitz and Detlev Dicke, eds., The International Law of Arms Control and Disarmament.UN 1991.
  15. 15. Den Dekker, Guido. “The Effectiveness of International Supervision in Arms Control Law.” Journal of Conflict and Security Law 9 (2004): 315-330.10.1093/jcsl/9.3.315
  16. 16. Dunn Cavelty, Myriam. “The Militarisation of Cyberspace: Why Less May Be Better”: 141-154. In: Christian Czosseck, Rain Ottis, and Katharina Ziolkowski, eds. Proceedings of the 2012 4th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2012.
  17. 17. Eggenschwiller, Jacqueline, and Jantje Silomon. “Challenges and Opportunities in Cyber Weapon Norm Construction.” Computer Fraud & Security 12 (2018): 11-18.10.1016/S1361-3723(18)30120-9
  18. 18. Eilstrup-Sangiovanni, Mette. “Why the World Needs an International Cyberwar Convention.” Philosophy & Technology 31 (2018): 379-407.10.1007/s13347-017-0271-5
  19. 19. Elsig, Manfred. “Who is in Love with Multilateralism? Treaty Commitment in the Post-Cold War Era.” European Union Politics 12 (2011): 529-550.10.1177/1465116511419869
  20. 20. Enia, Jason, and Geffrey Fields. “The Relative Efficacy of the Biological and Chemical Weapons Regimes.” The Nonproliferation Review 21 (2014): 43-6410.1080/10736700.2014.880560
  21. 21. Franklin, Alexi. “An International Cyber Warfare Treaty: Historical Analysis and Future Prospects.” Journal of Law and Cyber Warfare 7 (2018): 379-407.
  22. 22. Geers, Kenneth. Strategic Cyber Security. Tallinn: NATO CCD COE Publications 2011.
  23. 23. Goldblat, Jozef. Arms Control: The New Guide to Negotiations and Agreements. London and Thousand Oaks: SAGE Publications, 2002.10.4135/9781446214947
  24. 24. Hare, Forrest. “Borders in Cyberspace: Can Sovereignty Adapt to the Challenges of Cyber Security?”: 88-105. In: Christian Czosseck and Kenneth Geers, eds. The Virtual Battlefield: Perspectives on Cyber Warfare. Amsterdam: IOS Press 2009.
  25. 25. Hatch, Benjamin B. “Defining a Class of Cyber Weapons as WMD: An Examination of the Merits.” Journal of Strategic Security 11 (2018): 43-61.10.5038/1944-0472.11.1.1657
  26. 26. Jensen, Eric Talbot. “Cyber Warfare and Precautions against the Effects of Attacks.” Texas Law Review 88 (2010): 1533-1569.
  27. 27. Jeutner, Valentin. “The Digital Geneva Convention.” Journal of International Humanitarian Legal Studies 10 (2019): 158-170.10.1163/18781527-01001009
  28. 28. Joyner, Daniel H. “Jus ad Bellum in the age of WMD Proliferation.” George Washington International Law Review 40 (2008): 233-288.
  29. 29. Kirsch, Cassandra M. “Science Fiction No More: Cyber Warfare and the United States.” Denver Journal of International Law & Policy 40 (2012): 620-647.
  30. 30. Knake, Robert K. Internet Governance in an Age of Cyber Insecurity. New York: Council on Foreign Relations 2010.
  31. 31. Levi, Michael A., and Michael E. O’Hanlon. The Future of Arms Control. Baltimore: The Brookings Institution Press, 2005.
  32. 32. Leuprecht, Christian, Joseph Szeman, and David B. Skillcorn. “The Damoclean Sword of Offensive Cyber: Policy Uncertainty and Collective Insecurity.” Contemporary Security Policy 40 (2019): 382-407.10.1080/13523260.2019.1590960
  33. 33. Lynn III, William J. “Defending a New Domain: The Pentagon’s Cyberstrategy.” Foreign Affairs 89 (2010): 97-108.
  34. 34. Manley, Ron G. “Restricting Non-State Actors’ Access to Chemical Weapons and Related Materials: Implications of UNSCR 1540”: 73-85. In: Olivia Bosch and Peter van Ham, eds. Global Non-Proliferation and Arms Control: The Impact of UNSCR 1540. Baltimore: The Brookings Institution Press, 2007.
  35. 35. Marauhn, Thilo. “Dispute Resolution, Compliance Control and Enforcement of International Arms Control Law”: 243-272. In: Geir Ulfstein, ed. Making Treaties Work: Human Rights, Environment and Arms Control. Cambridge and New York: Cambridge University Press, 2007.10.1017/CBO9780511494345.012
  36. 36. O’Connell, Mary Ellen. “Cyber Security without Cyber War,” Journal of Conflict and Security Law 17 (2012): 187-209.10.1093/jcsl/krs017
  37. 37. Meyer, Paul. “Cyber Security through Arms Control: An Approach to International Co-operation.” The RUSI Journal 156 (2011): 22-27.10.1080/03071847.2011.576471
  38. 38. Ophardt, Jonathan A. “Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield.” Duke Law & Technology Review 9 (2010): 1-28.
  39. 39. Posner, Eric A., and Alan O. Sykes. Economic Foundations of International Law. Cambridge (MA): Harvard University Press, 2013.10.2307/j.ctt2jbtsp
  40. 40. Rid, Thomas, and Peter McBurney. “Cyber-Weapons.” The RUSI Journal 157 (2012): 6-13.10.1080/03071847.2012.664354
  41. 41. Roscini, Marco. “World Wide Warfare – Jus ad Bellum and the Use of Cyber Force.” Max Planck Yearbook of International Law 14 (2010): 85-130.10.1163/18757413-90000050
  42. 42. Schaap, Arie J. “Cyber Warfare Operations: Development and Use under International Law.” Air Force Law Review 64 (2009): 121-174.
  43. 43. Schmitt, Michael N., ed. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge and New York: Cambridge University Press, 2013.10.1017/CBO9781139169288
  44. 44. Sheldon, John B. “The Rise of Cyberpower”: 303-320. In: John Baylis, James J Wirtz, and Colin S Gray, eds. Strategy in Contemporary World. Oxford and New York: Oxford University Press, 2013.
  45. 45. Sitaraman, Srini. State Participation in International Treaty Regimes. London and New York: Routledge 2009.
  46. 46. Smeets, Max. “A Matter of Time: On the Transitory Nature of Cyberweapons.” Journal of Strategic Studies 41 (2018): 6-32.10.1080/01402390.2017.1288107
  47. 47. Stevens, Tim. “Cyberweapons: An Emerging Global Governance Architecture.” Palgrave Communications 3 (2017): 1-6.10.1057/palcomms.2016.102
  48. 48. Tabassi, Lisa. “The Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on their Destruction (Chemical Weapons Convention)”: 273-300. In: Geir Ulftein, ed. Making Treaties Work: Human Rights, Environment and Arms Control. Cambridge and New York: Cambridge University Press, 2007.10.1017/CBO9780511494345.013
  49. 49. Taddeo, Mariarosaria. “An Analysis for a Just Cyber Warfare”: 209-218. In: Christian Czosseck, Rain Ottis, and Katharina Ziolkowski, eds. Proceedings of the 2012 4th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2012.
  50. 50. Thakur, Ramesh. “Chemical Weapons and the Challenge of Weapons of Mass Destruction”: 1-14. In: Ramesh Thakur and Ere Haru, eds. Chemical Weapons Convention: Implementation, Challenges and Opportunities. Tokyo: United Nations University Press, 2006.
  51. 51. United States Department of Defense. “The National Military Strategy for Cyberspace Operations” (December 2006) // http://www.dod.mil/pubs/foi/joint_staff/jointStaff_jointOperations/07-F-2105doc1.pdf
  52. 52. Vagts, Detlev F. “The Hague Convention and Arms Control.” American Journal of International Law 94 (2000): 31-41.10.2307/2555229
  53. 53. Von Heinegg, Heintschel Wolff. “Legal Implications of Territorial Sovereignty in Cyberspace”: 7-20. In: Christian Czosseck, Rain Ottis, and Katharina Ziolkowski, eds. Proceedings of the 2012 4th International Conference on Cyber Conflict. Tallinn: NATO CCD COE Publications, 2012.
  54. 54. Yihdego, Zeray. The Arms Trade and International Law. Portland: Hart Publishing, 2007.10.4337/mllwr.2008.02.26
  55. 55. Zhifeng, Jiang. “Regulating the Use and Conduct of Cyber Operations through International Law: Challenges and Fact-Finding Body Proposal.” LSE Law Review 5 (2020): 59-88.10.61315/lselr.42
  56. 1. Charter of the United Nations (Signed 26 June 1945). 1 UNTS XVI.
  57. 2. Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May be Deemed to be Excessively Injurious or to Have Indiscriminate Effects (and Protocols) (As Amended on 21 December 2001). 10 October 1980, 1342 UNTS 137.
  58. 3. Corfu Channel Case (UK v Albania). (Merits) [1949] ICJ Rep 4.
  59. 4. eDate Advertising GmbH v X and Olivier Martinez and Robert Martinez v MGN Limited. Joined Cases C-509/09 and C-161/10 [2011] OJ C370/9, Opinion of AG.
  60. 5. Hague Convention (II) with Respect to the Laws and Customs of War on Land and Its Annex: Regulation Concerning the Laws and Customs of War on Land (Adopted 29 July 1899, entered into force 4 September 1900). (1899) 187 CTS 429.
  61. 6. Military and Paramilitary Activities (Nicaragua v United States). (Merits) [1986] ICJ Rep 14.
  62. 7. Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflict (Protocol I) (Entered into force 7 December 1978). 1125 UNTS 3.
  63. 8. Tadic Case (Judgment). ICTY-94-1-A (15 July 1999).10.1108/eb018841
  64. 9. The Legality of the Threat or Use of Nuclear Weapons (Advisory Opinion). 1996 ICJ Rep 226.
  65. 10. UNGA Res 56/83 (28 January 2002). UN Doc A/RES/56/83.10.1006/jmva.2001.2038
  66. 11. UNSC Res 1540 (28 April 2004). UN Doc S/RES/1540
Language: English
Page range: 51 - 80
Submitted on: Apr 16, 2020
Accepted on: Jul 14, 2020
Published on: Oct 23, 2020
Published by: Faculty of Political Science and Diplomacy and the Faculty of Law of Vytautas Magnus University (Lithuania)
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2020 Julija Kalpokienė, Ignas Kalpokas, published by Faculty of Political Science and Diplomacy and the Faculty of Law of Vytautas Magnus University (Lithuania)
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.