<node id="61279">
  <nid>61279</nid>
  <type>news</type>
  <uid>
    <user id="27184"><![CDATA[27184]]></user>
  </uid>
  <created>1282262400</created>
  <changed>1475896051</changed>
  <title><![CDATA[Tony Rutkowski's article, "Is Cyberwar Lawful?"]]></title>
  <body><![CDATA[<p></p><p>"Is Cyberwar Lawful?" - a column by A. M. Rutkowski, a well-known expert in international telecommunication law. He currently serves as the international cybersecurity rapporteur in the Geneva-based ITU-T and is a senior fellow in the Georgia Tech's Sam Nunn School.</p>
<p>The answer is probably not -- at least an unprovoked attack -- based on extensive new legal research appearing in an upcoming issue of the British journal INFO. The research describes a 150-year-old series of Geneva Conventions relating to cyberwar. However, a precise answer to the question is impossible because no one has actually defined the term "cyberwar" and reaching broad agreement on a definition seems problematic at best. . . .So it appears that cyberspace is emulating the real world, and countries are finding common ground in taking steps to implement existing treaty provisions and avoiding the escalation of cyber conflict even if they cannot define cyberwar.
</p>
<p>Read full <a href="http://www.computerworld.com/s/article/9180469/Is_cyberwar_lawful_">Computerworld Article</a>.</p>
<p>Anthony (Tony) Rutkowski is currently the Vice-President for Regulatory Affairs within the Communication Services Division at VeriSign, Inc.- the leading global provider of trusted infrastructure and identity services for the Internet, telecommunications, and e-commerce sectors. He is also a Distinguished Senior Research Fellow of the Center for International Strategy, Technology, and Policy at Georgia Tech. In his 40 year of work, he has been employed by: General Magic, Sprint International, Horizon House, Pan American Engineering, General Electric, the Evening News Association, the Federal Communications Commission, the International Telecommunication Union, Cape Canaveral City Council, the Internet Society, MIT, and NY Law School, as well as consultancy with NGI Associates.
</p>
<p>He is an engineer-lawyer who extensively uses and innovates with many of these technologies. He developed a career from following strategically important developments and turning them into business opportunities. He currently serves President of the Global LI Industry Forum and participates in numerous Lawful Access and Interception forums. He also participates on the advisory boards for Telecommunications Policy and Info magazines.</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[Computerworld - August 9, 2010]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2010-08-20T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Column by Tony Rutkowski (CISTP Distinguished Senior Research Fe]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA["Is Cyberwar Lawful?" - a column by A. M. Rutkowski, a well-known expert in international telecommunication law. He currently serves as the international cybersecurity rapporteur in the Geneva-based ITU-T and is a senior fellow in the Georgia Tech's Sam Nunn School.]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="61280">
            <nid>61280</nid>
            <type>image</type>
            <title><![CDATA[Anthony Rutkowski]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>191312</fid>
                  <filename><![CDATA[tms24167.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/tms24167_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/tms24167_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Anthony Rutkowski]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[Angela.Levin@inta.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<strong>Angela Levin</strong><br />CISTP<br /><a href="http://www.gatech.edu/contact/index.html?id=al101">Contact Angela Levin</a><br /><strong>404-894-3199</strong>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1285</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Institute and Campus]]>
      </item>
          <item>
        <![CDATA[Student and Faculty]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Military Technology]]>
      </item>
          <item>
        <![CDATA[Research]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>129</tid>
        <value><![CDATA[Institute and Campus]]></value>
      </item>
          <item>
        <tid>134</tid>
        <value><![CDATA[Student and Faculty]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>147</tid>
        <value><![CDATA[Military Technology]]></value>
      </item>
          <item>
        <tid>135</tid>
        <value><![CDATA[Research]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>http://www.computerworld.com/s/article/9180469/Is_cyberwar_lawful_</url>
      <title></title>
      </link>
          <link>
      <url>http://www.cistp.gatech.edu/people/profile.html?name=Anthony.Rutkowski</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1285</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Sam Nunn School of International Affairs]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>795</tid>
        <value><![CDATA[CISTP]]></value>
      </item>
          <item>
        <tid>10765</tid>
        <value><![CDATA[Computerworld]]></value>
      </item>
          <item>
        <tid>10766</tid>
        <value><![CDATA[cyberwar]]></value>
      </item>
          <item>
        <tid>851</tid>
        <value><![CDATA[INTA]]></value>
      </item>
          <item>
        <tid>10767</tid>
        <value><![CDATA[lawful]]></value>
      </item>
          <item>
        <tid>10764</tid>
        <value><![CDATA[Rutkowski]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
