

Gravity in the Statute of the International Criminal Court and Conduct that Constitutes, Instigates or Facilitates International Crimes Risorse «dual use» per il sistema Italia in Europa Turin Giappichelli. in: Marchisio, Sergio and Montuoro, Umberto (ed.) Lo spazio «cyber» e cosmico. Cyber sicurezza nello spazio: aspetti giuridici. 88-100Ĭyber sicurezza nello spazio: aspetti giuridici in: Gow, James, Dijxhoorn, Ernst, Kerr, Rachel and Verdirame, Guglielmo (ed.) Routledge Handbook of War, Law and Technology Routledge. Intervention in XIXth century international law and the distinction between rebellions, insurrections and civil wars.

Intervention in XIXth century international law and the distinction between rebellions, insurrections and civil wars Marco Longobardo and Marco Roscini, Review of Giulio Bartolini (ed.), A History of International Law in Italy. Marco Longobardo and Marco Roscini, Review of Giulio Bartolini (ed.), A History of International Law in Italy The Intersections Between the Arms Trade Treaty and the International Law of Foreign Intervention in Situations of Internal Unrest. The Intersections Between the Arms Trade Treaty and the International Law of Foreign Intervention in Situations of Internal Unrest in: Myjer, Eric and Marauhn, Thilo (ed.) Research Handbook on International Arms Control Law Edward Elgar. The Chapter concludes that this definition is flexible enough to apply in the cyber context without significant problems and that none of the challenges that characterize cyber attacks hinders the application of the principle of distinction.Ĭyber attacks, cyber warfare, principle of distinction, military objective, law of armed conflict, internet It first identifies when cyber attacks qualify as ‘attacks’ under the law of armed conflict and then examines the two elements of the definition of ‘military objective’ contained in Article 52(2) of the 1977 Protocol I additional to the 1949 Geneva Conventions on the Protection of Victims of War.

This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks.
