Computer network attack: the normative software

Full text not archived in this repository.

Please see our End User Agreement.

It is advisable to refer to the publisher's version if you intend to cite from this work. See Guidance on citing.

Add to AnyAdd to TwitterAdd to FacebookAdd to LinkedinAdd to PinterestAdd to Email

Schmitt, M. N. orcid id iconORCID: https://orcid.org/0000-0002-7373-9557 (2001) Computer network attack: the normative software. Yearbook of International Humanitarian Law, 4. pp. 53-86. ISSN 1574-096X doi: 10.1017/S1389135900000829

Abstract/Summary

As the United States, assisted by a number of its allies, continues to mount asymmetrical attacks against terrorists and their supporters, the centrality of technology to ‘future war’ is becoming increasingly apparent. In a matter of months, US Forces successfully routed, with almost no hostile fire casualties, a battle-hardened and ruthless adversary in a combat environment that frustrated the potent Soviet army for a decade. Operation ENDURING FREEDOM follows close on the heels of Operation ALLIED FORCE, the 1999 NATO campaign that defeated, without friendly casualties, the Yugoslav military. In that conflict, as in the most recent one, exploitation of technological wherewithal proved a decisive factor in determining the victor.

Altmetric Badge

Item Type Article
URI https://reading-clone.eprints-hosting.org/id/eprint/90532
Identification Number/DOI 10.1017/S1389135900000829
Refereed Yes
Divisions No Reading authors. Back catalogue items
Arts, Humanities and Social Science > School of Law
Publisher Cambridge University Press
Download/View statistics View download statistics for this item

University Staff: Request a correction | Centaur Editors: Update this record

Search Google Scholar