1Laura J. Nicholson et al., Computer Crimes, Am. Crim. L. Rev., 2000 (37), p.207, 210.
2Ian Brownlie, International Law and the Use of Force by States, Oxford Press, 1963, p.65-366, p.362- 363, p.295.
3Paul Szaz, The Law of Economic Sanctions, U.S. Naval College Int'l L,, 2005 (7), p.71.
4James Bond, Peacetime Foreign Data Manipulation as One Aspect of Offensive Information Warfare: Questions of Legality Under the United Nations Charter Article 2 (4), 1996, p.78, p.84-85.
5Michael Schmitt, Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, Colum. J, Transnat'l L., 1999 (37), p.885, 929-932, p.269-278.
6Military and Paramilitary Activities (Niear. v. U.S.), 1986 L C. J. 14 (June 27), p.103-104.
8James Adams, The Next World War: Computers Are the Weapons and the Front Line Is Everywhere, Simon & Schuster, 1998, p.196.
9Robert Hanseman, The Realities and Legalities of Information Warfare, A. F. L. Rev., 1997 (42), p.198.
10Michael N. Schmitt, Bellum Americanum: The U.S. View of Twenty-First Century War and Its Possible Implications for the Law of Armed Conflict, Mich. J. Int'l L., 1998 (19), p.1051, 1054, 1078, 1083.