<div class="gmail_quote">On Sat, Mar 23, 2013 at 3:40 AM, Ian Peter <span dir="ltr"><<a href="mailto:ian.peter@ianpeter.com" target="_blank">ian.peter@ianpeter.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div dir="ltr">
<div dir="ltr">
<div style="font-size:12pt;font-family:'Calibri'">
<div><span><font color="#333333"><font face="Helvetica"><span><font style="FONT-SIZE:10.5pt">As Samuel Morse might have remarked, “What God hath
wrought”.</font></span></font></font></span></div>
<div><span><font color="#333333"><font face="Helvetica"><span><font style="FONT-SIZE:10.5pt"></font></span></font></font></span> </div>
<div><span><font color="#333333"><font face="Helvetica"><span><font style="FONT-SIZE:10.5pt">A </font></span><font style="FONT-SIZE:10.5pt">landmark document created at the request of NATO has
proposed a set of rules for how international cyberwarfare should be conducted.
Written by 20 experts in conjunction with the International Committee of the Red
Cross and the US Cyber Command, the</font></font></font></span><font style="FONT-SIZE:10.5pt"><a href="http://issuu.com/nato_ccd_coe/docs/tallinnmanual?mode=embed&layout=http%3A%2F%2Fskin.issuu.com%2Fv%2Flight%2Flayout.xml&showFlipBtn=true" target="_blank"><i><font color="#fb4834"><font style="TEXT-DECORATION:none" face="Helvetica">Tallinn Manual on the International Law Applicable to Cyber
Warfare</font></font></i></a></font><span><font face="Helvetica"><font style="FONT-SIZE:10.5pt"><font color="#333333"><span> </span>analyzes the rules of conventional war
and applies them to state-sponsored
cyberattacks.</font></font></font></span></div>
<div> </div>
<div><a title="http://www.theverge.com/2013/3/21/4130740/tallin-manual-on-the-international-law-applicable-to-cyber-warfare" href="http://www.theverge.com/2013/3/21/4130740/tallin-manual-on-the-international-law-applicable-to-cyber-warfare" target="_blank">http://www.theverge.com/2013/3/21/4130740/tallin-manual-on-the-international-law-applicable-to-cyber-warfare</a></div>
<div> </div>
</div></div></div>
- - -<br></blockquote><div> </div><div>Thanks Ian for precious links. It seems that time is coming for legal definitions of cyberwarfare, in which we are living already. Initiatives belong to the powers that be, the only ones with the capacity to follow or violate the rules. CS doesn't have much influence, except through occasional media power.<br>
<br>Some more frightening documents on real war:<br><br><a href="http://www.salon.com/2013/02/19/latin_america_territorio_libre_from_the_cia_partner/?source=newsletter&utm_source=contactology&utm_medium=email&utm_campaign=Salon_Daily%20Newsletter%20%28Premium%29_7_30_110">http://www.salon.com/2013/02/19/latin_america_territorio_libre_from_the_cia_partner/?source=newsletter&utm_source=contactology&utm_medium=email&utm_campaign=Salon_Daily%20Newsletter%20%28Premium%29_7_30_110</a><br>
<br><a href="http://www.opensocietyfoundations.org/projects/globalizing-torture">http://www.opensocietyfoundations.org/projects/globalizing-torture</a><br><br>One may observe that oppressive regimes resort to coded sanitized language to mean illegal and criminal activities. This was anticipated by Orwell (newspeak), and turned real with soviet labor camp (concentration), nazism special treatment (gas chamber), maoism reeducation (deportation), bushism and obamism extraordinary rendition (torture), inter alia.<br>
<br>Louis<br><br> </div></div><br>