6209884
P5E6V9MP
1
chicago-author-date
50
creator
asc
428
https://legalreviewportal.org/wp-content/plugins/zotpress/
%7B%22status%22%3A%22success%22%2C%22updateneeded%22%3Afalse%2C%22instance%22%3Afalse%2C%22meta%22%3A%7B%22request_last%22%3A0%2C%22request_next%22%3A0%2C%22used_cache%22%3Atrue%7D%2C%22data%22%3A%5B%7B%22key%22%3A%22L7XZZR6G%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Kajander%20et%20al.%22%2C%22parsedDate%22%3A%222025%22%2C%22numChildren%22%3A2%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BKajander%2C%20Aleksi%2C%20Rain%20Liivoja%2C%20and%20Maarja%20Naagel.%202025.%20%26%23x201C%3BCybersecurity%20of%20Weapon%20Systems%3A%20International%20Law%20Requirements%20and%20Technical%20Standards.%26%23x201D%3B%20%26lt%3Bi%26gt%3BJournal%20of%20Cybersecurity%26lt%3B%5C%2Fi%26gt%3B%2011%20%281%29.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fcybsec%5C%2Ftyaf017%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fcybsec%5C%2Ftyaf017%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22journalArticle%22%2C%22title%22%3A%22Cybersecurity%20of%20Weapon%20Systems%3A%20International%20Law%20Requirements%20and%20Technical%20Standards%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Aleksi%22%2C%22lastName%22%3A%22Kajander%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rain%22%2C%22lastName%22%3A%22Liivoja%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Maarja%22%2C%22lastName%22%3A%22Naagel%22%7D%5D%2C%22abstractNote%22%3A%22Many%20weapons%20operate%20within%20complex%20computerized%20systems%2C%20and%20are%20integrated%20with%20sensors%20and%20platforms.%20Armed%20forces%20rely%20extensively%20on%20digital%20battlefield%20management%20and%20decision%20support%20systems.%20Exploitation%20of%20vulnerabilities%20in%20such%20systems%20can%20render%20them%20unreliable%20or%20unusable%2C%20which%20can%20adversely%20affect%20national%20security%20and%20lead%20to%20losses%20of%20human%20life.%20This%20paper%20seeks%20to%20establish%2C%20first%2C%20whether%20states%20have%20an%20obligation%20under%20international%20law%20to%20take%20cybersecurity%20measures%20with%20respect%20to%20weapon%20systems.%20Second%2C%20the%20paper%20examines%20whether%20states%20have%2C%20to%20comply%20with%20their%20legal%20obligations%20or%20otherwise%2C%20set%20cybersecurity%20requirements%2C%20standards%2C%20or%20guidelines%20that%20apply%20to%20weapon%20systems%2C%20either%20by%20articulating%20them%20or%20referring%20to%20previously%20existing%20standards%20that%20apply%20to%20cyber%5Cu2013physical%20systems.%22%2C%22date%22%3A%222025%22%2C%22language%22%3A%22%22%2C%22DOI%22%3A%2210.1093%5C%2Fcybsec%5C%2Ftyaf017%22%2C%22ISSN%22%3A%222057-2085%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdoi.org%5C%2F10.1093%5C%2Fcybsec%5C%2Ftyaf017%22%2C%22collections%22%3A%5B%22P5E6V9MP%22%5D%2C%22dateModified%22%3A%222025-10-02T05%3A30%3A08Z%22%7D%7D%2C%7B%22key%22%3A%22AYEDCWAU%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Mimran%20and%20Shany%22%2C%22parsedDate%22%3A%222022%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BMimran%2C%20Tal%2C%20and%20Yuval%20Shany.%202022.%20%26%23x201C%3BIntegrating%20Privacy%20Concerns%20in%20the%20Development%20and%20Introduction%20of%20New%20Military%20or%20Dual-Use%20Technologies.%26%23x201D%3B%20In%20%26lt%3Bi%26gt%3BThe%20Right%20to%20Privacy%20and%20Data%20Protection%20in%20Times%20of%20Armed%20Conflict%26lt%3B%5C%2Fi%26gt%3B%2C%20edited%20by%20Russell%20Buchan%20and%20Asaf%20Lubin.%20NATO%20CCDCOE.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fccdcoe.org%5C%2Flibrary%5C%2Fpublications%5C%2Fthe-rights-to-privacy-and-data-protection-in-times-of-armed-conflict%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fccdcoe.org%5C%2Flibrary%5C%2Fpublications%5C%2Fthe-rights-to-privacy-and-data-protection-in-times-of-armed-conflict%5C%2F%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22bookSection%22%2C%22title%22%3A%22Integrating%20Privacy%20Concerns%20in%20the%20Development%20and%20Introduction%20of%20New%20Military%20or%20Dual-Use%20Technologies%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Russell%22%2C%22lastName%22%3A%22Buchan%22%7D%2C%7B%22creatorType%22%3A%22editor%22%2C%22firstName%22%3A%22Asaf%22%2C%22lastName%22%3A%22Lubin%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tal%22%2C%22lastName%22%3A%22Mimran%22%7D%2C%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Yuval%22%2C%22lastName%22%3A%22Shany%22%7D%5D%2C%22abstractNote%22%3A%22%22%2C%22bookTitle%22%3A%22The%20Right%20to%20Privacy%20and%20Data%20Protection%20in%20Times%20of%20Armed%20Conflict%22%2C%22date%22%3A%222022%22%2C%22language%22%3A%22eng%22%2C%22ISBN%22%3A%22978-9916-9565-6-4%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fccdcoe.org%5C%2Flibrary%5C%2Fpublications%5C%2Fthe-rights-to-privacy-and-data-protection-in-times-of-armed-conflict%5C%2F%22%2C%22collections%22%3A%5B%22P5E6V9MP%22%5D%2C%22dateModified%22%3A%222025-10-02T06%3A38%3A39Z%22%7D%7D%2C%7B%22key%22%3A%225IK7DTCJ%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Sparrow%22%2C%22parsedDate%22%3A%222017-11-14%22%2C%22numChildren%22%3A1%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BSparrow%2C%20Rob.%202017.%20%26%23x201C%3BEthics%20as%20a%20Source%20of%20Law%3A%20The%20Martens%20Clause%20and%20Autonomous%20Weapons.%26%23x201D%3B%20%26lt%3Bi%26gt%3BHumanitarian%20Law%20%26amp%3B%20Policy%20Blog%26lt%3B%5C%2Fi%26gt%3B%2C%20November%2014.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Fblogs.icrc.org%5C%2Flaw-and-policy%5C%2F2017%5C%2F11%5C%2F14%5C%2Fethics-source-law-martens-clause-autonomous-weapons%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Fblogs.icrc.org%5C%2Flaw-and-policy%5C%2F2017%5C%2F11%5C%2F14%5C%2Fethics-source-law-martens-clause-autonomous-weapons%5C%2F%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22blogPost%22%2C%22title%22%3A%22Ethics%20as%20a%20Source%20of%20Law%3A%20The%20Martens%20Clause%20and%20Autonomous%20Weapons%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Rob%22%2C%22lastName%22%3A%22Sparrow%22%7D%5D%2C%22abstractNote%22%3A%22Ethics%20evolves%2C%20the%20law%20changes.%20In%20this%20way%2C%20moral%20progress%20may%20occur.%20Yet%20the%20relation%20between%20these%20processes%20is%20controversial%20and%20poorly%20understood.%20Regardless%2C%20both%20those%20who%20make%20and%20who%20rely%20on%20the%20law%20must%5Cu2014if%20they%20want%20to%20reduce%20the%20risk%20that%20those%20the%20law%20governs%20will%20come%20to%20see%20it%20as%20outdated%20and%20irrelevant%5Cu2014allow...%22%2C%22blogTitle%22%3A%22Humanitarian%20Law%20%26%20Policy%20Blog%22%2C%22date%22%3A%222017-11-14T13%3A38%3A19%2B00%3A00%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fblogs.icrc.org%5C%2Flaw-and-policy%5C%2F2017%5C%2F11%5C%2F14%5C%2Fethics-source-law-martens-clause-autonomous-weapons%5C%2F%22%2C%22language%22%3A%22en-US%22%2C%22collections%22%3A%5B%22P5E6V9MP%22%2C%22TFK7WZKA%22%5D%2C%22dateModified%22%3A%222025-10-02T06%3A32%3A21Z%22%7D%7D%2C%7B%22key%22%3A%22PEJEU9RP%22%2C%22library%22%3A%7B%22id%22%3A6209884%7D%2C%22meta%22%3A%7B%22creatorSummary%22%3A%22Wood%22%2C%22parsedDate%22%3A%222024-03-12%22%2C%22numChildren%22%3A0%7D%2C%22bib%22%3A%22%26lt%3Bdiv%20class%3D%26quot%3Bcsl-bib-body%26quot%3B%20style%3D%26quot%3Bline-height%3A%201.35%3B%20padding-left%3A%201em%3B%20text-indent%3A-1em%3B%26quot%3B%26gt%3B%5Cn%20%20%26lt%3Bdiv%20class%3D%26quot%3Bcsl-entry%26quot%3B%26gt%3BWood%2C%20Tim.%202024.%20%26%23x201C%3BAWS%20Legal%20Review%20Series%26%23x2014%3BInclusion%20of%20Quasi-Legal%20Considerations.%26%23x201D%3B%20%26lt%3Bi%26gt%3BArticles%20of%20War%26lt%3B%5C%2Fi%26gt%3B%2C%20March%2012.%20%26lt%3Ba%20class%3D%26%23039%3Bzp-ItemURL%26%23039%3B%20href%3D%26%23039%3Bhttps%3A%5C%2F%5C%2Flieber.westpoint.edu%5C%2Finclusion-quasi-legal-considerations%5C%2F%26%23039%3B%26gt%3Bhttps%3A%5C%2F%5C%2Flieber.westpoint.edu%5C%2Finclusion-quasi-legal-considerations%5C%2F%26lt%3B%5C%2Fa%26gt%3B.%26lt%3B%5C%2Fdiv%26gt%3B%5Cn%26lt%3B%5C%2Fdiv%26gt%3B%22%2C%22data%22%3A%7B%22itemType%22%3A%22blogPost%22%2C%22title%22%3A%22AWS%20Legal%20Review%20Series%5Cu2014Inclusion%20of%20Quasi-Legal%20Considerations%22%2C%22creators%22%3A%5B%7B%22creatorType%22%3A%22author%22%2C%22firstName%22%3A%22Tim%22%2C%22lastName%22%3A%22Wood%22%7D%5D%2C%22abstractNote%22%3A%22New%20Zealand%5Cu2019s%20approach%20to%20legal%20weapon%20reviews%20links%20to%20the%20Martens%20Clause%20and%20takes%20into%20account%20the%20public%20conscience.%22%2C%22blogTitle%22%3A%22Articles%20of%20War%22%2C%22date%22%3A%222024-03-12%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Flieber.westpoint.edu%5C%2Finclusion-quasi-legal-considerations%5C%2F%22%2C%22language%22%3A%22en-US%22%2C%22collections%22%3A%5B%22CVB8K6N5%22%2C%22P5E6V9MP%22%5D%2C%22dateModified%22%3A%222025-10-02T06%3A08%3A29Z%22%7D%7D%5D%7D
Kajander, Aleksi, Rain Liivoja, and Maarja Naagel. 2025. “Cybersecurity of Weapon Systems: International Law Requirements and Technical Standards.” Journal of Cybersecurity 11 (1). https://doi.org/10.1093/cybsec/tyaf017.
Mimran, Tal, and Yuval Shany. 2022. “Integrating Privacy Concerns in the Development and Introduction of New Military or Dual-Use Technologies.” In The Right to Privacy and Data Protection in Times of Armed Conflict, edited by Russell Buchan and Asaf Lubin. NATO CCDCOE. https://ccdcoe.org/library/publications/the-rights-to-privacy-and-data-protection-in-times-of-armed-conflict/.
Sparrow, Rob. 2017. “Ethics as a Source of Law: The Martens Clause and Autonomous Weapons.” Humanitarian Law & Policy Blog, November 14. https://blogs.icrc.org/law-and-policy/2017/11/14/ethics-source-law-martens-clause-autonomous-weapons/.
Wood, Tim. 2024. “AWS Legal Review Series—Inclusion of Quasi-Legal Considerations.” Articles of War, March 12. https://lieber.westpoint.edu/inclusion-quasi-legal-considerations/.