Oxford Scholarship Online 2018
DOI: 10.1093/oso/9780198790501.003.0045
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Capabilities

Abstract: This chapter investigates the development of industrial and technological capabilities for cyber defence in Europe up to 2016. It assesses (a) the relevant policies, as well as (b) the institutional and (c) the industrial and technologies resources of Western Europe’s major powers (France, Germany, and the United Kingdom), and then of a selection of representative examples of medium and lesser powers (Italy, Spain, and Sweden).’ It establishes that since the mid-2000s developing cyber-security and cyber-defenc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…87 Of direct relevance to military AI and autonomous systems, DoD Directive 3000.09 imposes a requirement to exercise 'appropriate care and in accordance with the law of war, applicable treaties, weapon system safety rules, and applicable rules of engagement', 88 and that such systems 'must be reviewed and approved by the Under Secretary of Defense for Policy, the Under Secretary of Defense for Research and Engineering, and the Vice-Chairman of the Joint Chiefs of Staff before they are formally developed, and again before they are fielded'. 89 Within this policy framework, each service branch adopts its own approach to conducting legal reviews. In the case of the U.S. Army, a single lawyer is assigned to undertake the review, although they have broad authority to request support or information.…”
Section: United Statesmentioning
confidence: 99%
“…87 Of direct relevance to military AI and autonomous systems, DoD Directive 3000.09 imposes a requirement to exercise 'appropriate care and in accordance with the law of war, applicable treaties, weapon system safety rules, and applicable rules of engagement', 88 and that such systems 'must be reviewed and approved by the Under Secretary of Defense for Policy, the Under Secretary of Defense for Research and Engineering, and the Vice-Chairman of the Joint Chiefs of Staff before they are formally developed, and again before they are fielded'. 89 Within this policy framework, each service branch adopts its own approach to conducting legal reviews. In the case of the U.S. Army, a single lawyer is assigned to undertake the review, although they have broad authority to request support or information.…”
Section: United Statesmentioning
confidence: 99%
“…At the same time, none of them imposed an obligation to review weapons. The control of legality in the perspective of the customary norm could originate in the Martens Clause, which would permit the use of weapons under the principle of humanity and the requirements of human conscience 18 .…”
Section: The Purpose Of Military Reviewmentioning
confidence: 99%
“…Consideration should focus on the potential consequences of a cyber-attack . Those responsible for conducting the review should weigh, whether a possible cyber-attack could cause harm to civilians (damage visible in the physical world such as the loss of health or death), but also, whether it could lead to the physical loss or destruction of data (by which all and any data necessary for the proper functioning of civilian facilities that facilitate the protection of civilians are meant) 27 . Given the growing interest in environmental protection, including in the context of an armed conflict, military review should verify that a cyber-attack would not cause widespread, long-term and severe damage to the environment 28 .…”
Section: Cyber Military Reviewmentioning
confidence: 99%
“…While some have argued it may be possible 142 , others argue that translating the requirements of proportionality into an algorithmic form is a significant challenge, and may never be possible. 143 Adding to this complexity, is that the AWS will also need to show its compliance with this core principle during the weapon's review.…”
Section: (B) Proportionalitymentioning
confidence: 99%
“…335 The targets of AWS could be restricted, such that AWS could only be used to attack non-human targets. 336 Alternatively, for human targets, there could be a requirement that AWS only be equipped with non-lethal capabilities (such as pepper sprays, optical dazzlers or active denial systems). 337 There could also be requirements on the quantity of AWS being used, to ensure no command or control is lost (this links to corresponding capacities for human in-the-loop operation of those weapons).…”
mentioning
confidence: 99%