![]() This Article identifies six vital actions the government must take to comply with the law of armed conflict and to ensure not only the survivability of military communication capabilities during times of armed conflict, but also the protection of the civilian populace and civilian objects. However, the current actions do not go far enough. government is already taking some steps in that direction, as illustrated by a number of plans and policies initiated over the past decade. One of the greatest challenges of the law is keeping up with the advancement of technology. government assets with civilian systems makes segregation impossible and therefore creates a responsibility for the United States to protect those civilian networks, services, and communications. The Challenges of Cyber Warfare to the Laws of Armed Conflicts: Humanitarian Impact and Regulation Attempts. Where segregation is not feasible, the government must protect the civilian entities and communications from the effects of attacks. To protect those civilian objects and providers from the effects of attacks, the law of armed conflict requires a state to segregate its military assets from the civilian population and civilian objects to the maximum extent feasible. Other civilian networks, services, and communications may suffer collateral damage from legitimate attacks on government targets. This near-complete intermixing of civilian and military computer infrastructure makes many of those civilian objects and providers legitimate targets under the law of armed conflict. Additionally, the government relies almost completely on civilian providers for computer software and hardware products, services, and maintenance. government communications travel over civilian-owned-and-operated networks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |