Accessibility navigation


Computer network attack: the normative software

Schmitt, M. N. (2001) Computer network attack: the normative software. Yearbook of International Humanitarian Law, 4. pp. 53-86. ISSN 1574-096X

Full text not archived in this repository.

It is advisable to refer to the publisher's version if you intend to cite from this work. See Guidance on citing.

To link to this item DOI: 10.1017/S1389135900000829

Abstract/Summary

As the United States, assisted by a number of its allies, continues to mount asymmetrical attacks against terrorists and their supporters, the centrality of technology to ‘future war’ is becoming increasingly apparent. In a matter of months, US Forces successfully routed, with almost no hostile fire casualties, a battle-hardened and ruthless adversary in a combat environment that frustrated the potent Soviet army for a decade. Operation ENDURING FREEDOM follows close on the heels of Operation ALLIED FORCE, the 1999 NATO campaign that defeated, without friendly casualties, the Yugoslav military. In that conflict, as in the most recent one, exploitation of technological wherewithal proved a decisive factor in determining the victor.

Item Type:Article
Refereed:Yes
Divisions:No Reading authors. Back catalogue items
Faculty of Arts, Humanities and Social Science > School of Law
ID Code:90532
Publisher:Cambridge University Press

University Staff: Request a correction | Centaur Editors: Update this record

Page navigation