Abstract
This Article argues that the military’s decision to conduct action against the CIA and Saudi-monitored website was well within the norms of traditional military activity. Because the action occurred during the course of an armed conflict against al Qaeda, there would also be no need to acknowledge such an action when it was directed by a military commander. This Article explores the array of traditional military activities that may occur in the Internet and other information environments without triggering covert action reporting requirements through the prism of a historical examination of two types of military activity that contribute to the accomplishment of strategic surprise: positioning of forces and deception operations.
Recommended Citation
Walker, Paul A.
(2010)
"Traditional Military Activities in Cyberspace: Preparing for "Netwar","
Florida Journal of International Law: Vol. 22:
Iss.
3, Article 1.
Available at:
https://scholarship.law.ufl.edu/fjil/vol22/iss3/1