CPU and Keyboard: Weapons of Mass Disruption?
In a well-known paper on legal issues of computers and war Schmitt and others reminded their readers of the very basic fact that the “warriors” in computer wars would simply be “individuals armed with CPUs and keyboards”. However, a few years later during a press conference in May 2009 U.S. President Barack Obama referred to instruments of cyber warfare as “weapons of mass disruption”, obviously paraphrasing the well-known term of weapons of mass destruction (WMD) and having in mind the catastrophic consequences a coordinated attack on critical infrastructure could trigger. This paper primarily seeks to give an overview of the legal issues raised and investigate whether and to which extent cyber warfare operations fall in line with a trend of dehumanisation of warfare in the sense of reducing the human role or component in warfare. Given the limited size many basic legal questions of cyber warfare will be touched upon but not discussed in detail.
- Hathaway OA, Crootof R, Levitz P, Nix H, Nowlan A, Perdue W, Spiegel J (2012) The law of cyber-attack. Calif Law Rev 100:817Google Scholar
- Schmitt MN, Harrison Dinniss H, Wingfield T (2004) Computers and war: the legal battlespace. Background paper prepared for informal high-level expert meeting on current challenges to international humanitarian law, Cambridge, 25–27 June 2004Google Scholar
- Schmitt MN (2011) Cyber operations and the Ius ad Bellum revisited. Villanova Law Rev 56:576Google Scholar
- Schmitt MN (ed) (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press, CambridgeGoogle Scholar
- Watts S (2010) Combatant status and computer network attack. Va J Int Law 50:392Google Scholar
- Ziolkowski K (2012) Ius ad bellum in cyberspace – some thoughts on the “Schmitt Criteria” fort the use of force. In: Czosseck C, Ottis R, Ziolkowski K (eds) 4th international conference on cyber conflict, Tallinn. See https://ccdcoe.org/publications/2012proceedings/5_3_Ziolkowski_IusAdBellumInCyberspace.pdf