About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

88 Tex. L. Rev. 1533 (2009-2010)
Cyber Warfare and Precautions against the Effects of Attacks

handle is hein.journals/tlr88 and id is 1549 raw text is: Cyber Warfare and Precautions Against the Effects
of Attacks
Eric Talbot Jensen
Ninety-eight percent of all U.S. government communications travel over
civilian-owned-and-operated networks.   Additionally, the government relies
almost completely on civilian providers for computer software and hardware
products, services, and maintenance. This near-complete intermixing of civilian
and military computer infrastructure makes many of those civilian objects and
providers legitimate targets under the law of armed conflict. Other civilian
networks, services, and communications may suffer collateral damage from
legitimate attacks on government targets. To protect those civilian objects and
providers from the effects of attacks, the law of armed conflict requires a state to
segregate its military assets from the civilian population and civilian objects to
the maximum extent feasible. Where segregation is not feasible, the government
must protect the civilian entities and communications from the effects of attacks.
The current integration of U.S. government assets with civilian systems makes
segregation impossible and therefore creates a responsibility for the United
States to protect those civilian networks, services, and communications. The
U.S. government is already taking some steps in that direction, as illustrated by
a number of plans and policies initiated over the past decade. However, the
current actions do not go far enough. This Article identifies six vital actions the
government must take to comply with the law of armed conflict and to ensure not
only the survivability of military communication capabilities during times of
armed conflict, but also the protection of the civilian populace and civilian
objects.
I.     Introduction  ..................................................................................  1522
II.    C yber  A ttacks. .......................................................................... 1524
III.   Interconnectivity, Targeting, and Feasibility
Under Article  58(a) and  (b) .................................................. 1530
IV.    Alternative Responsibilities Under Article 58(c) ......................... 1540
V.     U.S. Practice in Protecting Civilians and
Civilian  Cyber  Objects .......................................................... 1543
V I.   R ecom m endations ........................................................................ 1551
V II.  C onclusion  ...................................................................................  1556
* Visiting Assistant Professor, Fordhan Law School. Previously Chief, International Law
Branch, Office of The Judge Advocate General, U.S. Army; Military Legal Advisor to U.S. forces
in Baghdad, Iraq and in Tuzla, Bosnia; Legal Advisor to the U.S. contingent of U.N. forces in
Macedonia. Thanks to Sean Watts for his comments on an earlier draft and SueAnn Johnson for her
invaluable research assistance.

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Contact us for annual subscription options:

Already a HeinOnline Subscriber?

profiles profiles most