The Shadowy Existence of the Weapons Review and Its Impact on Disarmament*
Table of contents
Bibliographic information

S&F Sicherheit und Frieden
Volume 36 (2018), Edition 3
- Authors:
- | | | | | | | | |
- Publisher
- Nomos, Baden-Baden
- Copyright year
- 2018
- ISSN-Online
- 0175-274x
- ISSN-Print
- 0175-274X
Chapter information
Volume 36 (2018), Edition 3
The Shadowy Existence of the Weapons Review and Its Impact on Disarmament*
- Authors:
- ISSN-Print
- 0175-274X
- ISSN-Online
- 0175-274x
- Preview:
The laws of armed conflict as well as arms control and disarmament law are often treated as two distinct fields of public international law. Nevertheless, the laws of armed conflict impact arms control and disarmament. In particular, the weapons review of the Additional Protocol I to the Geneva Conventions links the laws of armed conflict with arms control and disarmament law and goes even beyond by including other fields of international law. This contribution intends to explore the weapons review and its impact on arms control and disarmament by investigating the drafting history of Art. 36 of the Additional Protocol I to the Geneva Conventions as well as the legal background against which the review is to be conducted.
Bibliography
No match found. Try another term.
- Borawski J (1986) Confidence-Building Measures: Rescuing Arms Control. The Fletcher Forum of World Affairs 10(1): 111-131. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Çayirci E and Marinčič D (2009) Computer assisted exercises & training: A reference guide. Hoboken, N.J: John Wiley & Sons. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- German Federal Foreign Office Treaty on Conventional Armed Forces in Europe (CFE Treaty). Available at: https://www.auswaertiges-amt.de/en/aussenpolitik/themen/abruestung/uebersicht-konvalles-node/ruestungskontrolle/kse-vertrag-node (accessed 22 February 2018). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Goldblat J (2002) Arms control: The new guide to negotiations and agreements. London, Thousand Oaks, Calif: Sage Publications. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Grand C (2009) European Security and Conventional Arms Control: An Agenda for the 21st Century. In: Zellner W, Schmidt H-J and Neuneck G (eds) Die Zukunft konventioneller Rüstungskontrolle in Europa: The future of conventional arms control in Europe. Baden-Baden: Nomos, 144-151. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Kapanadze S, Kühn U, Richter W and Zellner W (2017) Status-Neutral Security, Confidence-Building and Arms Control Measures in the Georgian Context. Hamburg. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Koivula T (2017) Conventional Arms Control in Europe and its Current Challenges. In: Koivula T and Simonen K (eds) Arms control in Europe: Regimes, trends and threats. Helsinki: National Defence University, 113-132. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Mearsheimer JJ (1990) Back to the Future: Instability in Europe after the Cold War. International Security 15(1): 5-56. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- NATO (1984) NATO and Warsaw Pact: Force Comparisons. Available at: https://www.nato.int/cps/en/natohq/declassified_138256.htm (accessed 22 February 2018). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Neuneck G (2017) The US Missile Defense Systems, Europe and Russia. In: Koivula T and Simonen K (eds) Arms control in Europe: Regimes, trends and threats. Helsinki: National Defence University, pp. 35-55. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- OSCE – Ministerial Council (2016) From Lisbon to Hamburg: Declaration on the Twentieth Anniversary of the OSCE Framework for Arms Control. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- OSCE Lisbon Summit (1996) Lisbon Document 1996. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Rittberger V, Efinger M and Mendler M (1990) Toward an East-West Security Regime: The Case of Confidence- and Security-Building Measures. Journal of Peace Research 27(1): 55-74. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Schmidt H-J (2004) Der Wandel in der konventionellen Rüstungskontrolle 1989-1996. Frankfurt am Main, New York: Campus. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Schmidt H-J (2013) Verified transparency: New conceptual ideas for conventional arms control in Europe. Frankfurt am Main, Germany. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Schultz T (2017) NATO voices skepticism over size of Russia’s Zapad military exercise. Deutsche Welle, 14 September. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Spitzer H (2009) News from Open Skies: A co-operative treaty maintaining military transparency. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Sutyagin I (2017) Zapad-2017: Why Do the Numbers Matter? Available at: https://rusi.org/commentary/zapad-2017-why-do-numbers-matter (accessed 23 January 2018). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Tiilikainen T (2015) Reviving co-operative security in Europe through the OSCE. Helsinki: The Finnish Institute of International Affairs. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Vuorio M (2017) INF Treaty – Present State and Way Forward. In: Koivula T and Simonen K (eds) Arms control in Europe: Regimes, trends and threats. Helsinki: National Defence University, pp. 97-111. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Williams I (2017) The Russia – NATO A2AD Environment. Available at: https://missilethreat.csis.org/russia-nato-a2ad-environment/ (accessed 25 February 2018). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-115
- Boothby, Weapons and the Law of Armed Conflict, OUP (2009). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Bothe et al. (eds), New Rules for Victims of Armed Conflicts Commentary on the two 1977 Protocols Additional to the Geneva Conventions of 1949, Martinus Nijhoff Publishers (2013). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Boulanin/Verbruggen, SIPRI Compendium on Article 36 Reviews SIPRI Background Paper (2017), 1. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Casey-Maslen (ed), Weapons under International Human Rights Law, CUP (2014). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Coupland, Review of the legality of weapons: a new approach- The SIrUS Project, 835 IRRC (1999). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Daoust et al., New Wars, New Weapons? The Obligation of States to Assess the Legality of Means and Methods of Warfare, 84 IRRC (2002), 345. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- d’Aspremont, Articulating International Human Rights and International Humanitarian Law: Conciliatory Interpretation Under the Guise of Conflict of Norms-Resolution, in: Malgosia Fitzmaurice (ed), The European Convention on Human Rights and the UK Human Rights Act, Brill, Martinus Nijhoff Publishers (2011). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Diplomatic Conference on the/Development of International Humanitarian Law Applicable in Armed Conflicts, Protection of war victims : Protocol 1 to the 1949 Geneva conventions, Protection of war victims : Protocol 1 to the 1949 Geneva conventions. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Droege, The Interplay Between International Humanitarian Law and International Human Rights Law in Situations of Armed Conflict, 40 Isr. L. Rev. (2007), 310. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Fleck/Bothe, Handbook of International Humanitarian Law, OUP (2013). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Germany Defence, Law of Armed Conflict Manual – Joint Service Regulation (ZDv) 15/2, May 2013, available at https://bit.ly/2Kl6U30 (last visited 25 March 2018). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Henckaerts/Doswald-Beck, Customary International Humanitarian Law, CUP (2005). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- ICRC, A Guide to the legal review of new weapons, means and methods of warfare – Measures to implement Article 36 of Additional Protocol I of 1977, 2006, available at (last visited 25 March 2018). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- ILC, Draft Articles on the Effects of Armed Conflicts on Treaties with Commentaries, Yearbook of the IILC, 2011, Vol. II, Part Two, UN Doc A/66/10 from 2011, available at https://bit.ly/2MnTdNx (last visited 25 March 2018). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Ipsen/Menzel (eds), Völkerrecht, C.H. Beck (2014). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Kalshoven, Reaffirmation and development of international humanitarian law applicable in armed conflicts: the Diplomatic Conference, Geneva, 1974–1977, 9 Netherlands Yearbook of International Law (1978). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Lubell, Challenges in Applying Human Rights Law to Armed Conflict, 87 IRRC (2005), 737. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- McClelland, The review of weapons in accordance with Article 36 of Additional Protocol I, 85 IRRC (2003), 397. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Parks, Conventional Weapons and Weapons Reviews, 8 Yearbook of International Humanitarian Law (2007). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Pilloud et al. (eds), Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, Martinus Nijhoff Publishers (1987). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Pilloud, Commentary on the additional protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, International Committee of the Red Cross ; M. Nijhoff (1987). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Vöneky, Die Fortgeltung des Umweltvölkerrechts in Internationalen Bewaffneten Konflikten, Springer (2001). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Wolfrum (ed), Max Planck Encyclopedia of Public International Law, OUP (2013). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Wolfrum, Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations, Looking to the Future, Brill (2010). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-126
- Altmann, J. & Gubrud, M. (2013): Compliance Measures for an Autonomous Weapon Convention. ICRAC Working Paper #2. 05/2013. https://www.icrac.net/wp-content/uploads/2018/04/Gubrud-Altmann_Compliance-Measures-AWC_ICRAC-WP2.pdf [08.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Alwardt, C. & Krüger, M. (2016): Autonomy of Weapon Systems. IFAR Food for Fought Paper. Februar 2016. https://ifsh.de/file-IFAR/pdf_english/IFAR_FFT_1_final.pdf [08.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Arkin, R. C. (2009): Governing Lethal Behavior in Autonomous Robots. Boca Raton: CRC Press. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Asaro, P. (2018): Why the world needs to regulate autonomous weapons, and soon. Bulletin of the Atomic Scientists. 27. April 2018. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Beard, Jack M.B. (2014): Autonomous Weapons and Human Responsibilities. Georgetown Journal of International Law 45. https://thebulletin.org/military-applications-artificial-intelligence/why-world-needs-regulate-autonomous-weapons-and-soon [24.05.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Bekey, G. (2008): Autonomous Military Robotics: Risk, Ethics, and Design. Lin, P., Bekey, G. & Abney, K. (eds.). 2008. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Boulanin, V. (2016): Mapping the Development of Autonomy in Weapons Systems – A Primer on Autonomy. SIPRI. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Brundage, M. (2016): Limitations and Risks of Machine Ethics. In: Müller, V. C. (ed.), Risks of artificial intelligence. Boca Raton, FL London New York: CRC Press. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Campaign to Stop Killer Robots (CtSKR) (2015): Artificial intelligence experts call for ban. stopkillerrobots.org Webseite. 28.07.2015. http://www.stopkillerrobots.org/2015/07/aicall/ [20.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- CCW (2014): Report of the 2014 informal Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS). Meeting of the High Contracting Parties to the Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects. Genf 2014 CCW/MSP/2014/3. 11.06.2014. https://documents-dds-ny.un.org/doc/UNDOC/GEN/G14/048/96/pdf/G1404896.pdf?OpenElement [20.02.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- CCW (2015): Report of the 2015 Informal Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS). Meeting of the High Contracting Parties to the Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects. CCW/MSP/2015/3. 02.06.2015. https://documents-dds-ny.un.org/doc/UNDOC/GEN/G15/111/60/pdf/G1511160.pdf?OpenElement [20.02.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- CCW (2016a): Report of the 2016 Informal Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS). 2016. https://documents-dds-ny.un.org/doc/UNDOC/GEN/G16/117/16/pdf/G1611716.pdf?OpenElement [20.02.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- CCW (2016b): Recommendations to the 2016 Review Conference. Advanced Version. 2016. https://www.unog.ch/80256EDD006B8954/(httpAssets)/6BB8A498B0A12A03C1257FDB00382863/$file/Recommendations_LAWS_2016_AdvancedVersion+(4+paras)+.pdf [04.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- CCW (2017): Report of the 2017 Group of Governmental Expert on Lethal Autonomous Weapons Systems (LAWS). Advanced Version. 2017. https://www.unog.ch/80256EDD006B8954/(httpAssets)/B5B99A4D2F8BADF4C12581DF0048E7D0/$file/2017_CCW_GGE.1_2017_CRP.1_Advanced_+corrected.pdf [24.05.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- CCW (2018a): Chair’summary of the discussion […]. Zusammenfassung des Vorsitzenden der GGE-Diskussion zu LAWS vom 10-13. April 2018. Genf. https://www.unog.ch/80256EDD006B8954/(httpAssets)/DF486EE2B556C8A6C125827A00488B9E/$file/Summary+of+the+discussions+during+GGE+on+LAWS+April+2018.pdf [24.05.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- CCW (2018b): Humanitarian benefits of emerging technologies in the area of lethal autonomous weapon systems, submitted by the United States of America, Group of Governmental Experts of the High Contracting Parties to the Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects. Genf 2018 CCW/GGE.1/2018/WP.4. https://www.unog.ch/80256EDD006B8954/(httpAssets)/7C177AE5BC10B588C125825F004B06BE/$file/CCW_GGE.1_2018_WP.4.pdf [25.05.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Center for a New American Security (CNAS) (2017): Drone Proliferation: Policy Choices for the Trump Administration. Juni 2017. http://drones.cnas.org/wp-content/uploads/2017/06/CNASReport-DroneProliferation-Final.pdf [25.04.17]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Dickow, M., Dahlmann, A., Alwardt, C., Sauer, F. & Schörnig, N. (Dickow et al.) (2015): First Steps towards a Multidimensional Autonomy Risk Assessment (MARA) in Weapons Systems. IFAR Working Paper No. 20. Dezember 2015. Abrufbar unter: https://ifsh.de/file-IFAR/pdf_deutsch/IFAR-WP20.pdf [08.03.18] Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Dickow, M. (2015): Robotik: ein Game-Changer für Militär und Sicherheitspolitik?. SWP-Studie 14/2015. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Dickow, M., Hansel, M. & Mutschler, M.M. (2015): Präventive Rüstungskontrolle – Möglichkeiten und Grenzen mit Blick auf die Digitalisierung und Automatisierung des Krieges. Sicherheit und Frieden (S+F). 33. Jg. 2/2015 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Geiss, R. (2015): Die völkerrechtliche Dimension autonomer Waffensysteme, Friedrich-Ebert-Stiftung Studie. http://library.fes.de/pdf-files/id/ipa/11444-20150619.pdf [26.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Gibbs, S. (2017): Elon Musk leads 116 experts calling for outright ban of killer robots. The Guardian. 20.08.2017. https://www.theguardian.com/technology/2017/aug/20/elon-musk-killer-robots-experts-outright-ban-lethal-autonomous-weapons-war [27.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Guarini, M. (2011): Computational neural modeling and the philosophy of ethics. In: Anderson, M. & S. L. Anderson (eds.), Machine ethics. New York, NY: Cambridge Univ. Press. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Henckaerts, J.-M. & Doswald-Beck, L. (2005): Customary International Humanitarian Law. Volume I: Rules, International Committee of the Red Cross. Cambridge: Cambridge Univ. Press. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Heyns, C. (2013): Report of the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions. UN General Assembly. A/HRC/23/47. New York: United Nations. 09.04.2013. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Human Rights Watch (HRW) (2012): Losing Humanity: The Case against Killer Robots. Human Rights Watch, International Human Rights Council, International Human Rights Clinic. 11/2012. https://www.hrw.org/sites/default/files/reports/arms1112_ForUpload.pdf [21.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Human Rights Watch (HRW) (2015): Mind the Gap: The Lack of Accountability for Killer Robots. Human Rights Watch, International Human Rights Clinic. 04/2015. https://www.hrw.org/sites/default/files/reports/arms0415_ForUpload_0.pdf [21.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- ICRC (2014): ICRC Statement to Concluding Session CCW Expert Meeting on ”Lethal Autonomous Weapon Systems”. Genf 2014. 16.05.2014. https://www.unog.ch/80256EDD006B8954/(httpAssets)/8E6FED84C1D0308CC1257D1500522314/$file/ICRC_LAWS_FinalStatement_2014.pdf [04.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Jenks, C. (2016): The Distraction of Full Autonomy and the Need to Refocus the CCW/LAWS Discussion on Critical Functions. In: Geiß, R. & Lahmann, H. (2016): Lethal Autonomous Weapon Systems: Technology, Definition, Ethics, Law & Security. Expert opinions delivered at the CCW informal meeting of experts on lethal autonomous weapons systems. Division Conventional Arms Control (OR10). Auswärtiges Amt 2016. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Kurz, C. (2017): Interview: Die UN-Waffenkonvention und die „Killer-Roboter“. Netzpolitik.org, 04.12.2017. Aktualisiert 05.12.2017. https://netzpolitik.org/2017/interview-die-un-waffenkonvention-und-die-killer-roboter/ [21.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Lewis, J. (2015): The Case for Regulating Fully Autonomous Weapons. Yale Law Journal 124(4). Jan.-Feb. 2015. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Mackworth, A. (2011). Architectures and Ethics for Robots, in: M. Anderson & S. Anderson (eds.), Machine Ethics. Cambridge: Cambridge University Press. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Open Letter to the United Nations Convention on Certain Conventional Weapons (2017), Future of Life Institute, 21.08.2017. https://futureoflife.org/autonomous-weapons-open-letter-2017/ [13.02.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Richter, W. (2013): Rüstungskontrolle für Kampfdrohnen. SWP-Aktuell 29/2013. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Schörnig, N. (2015): From Quantitative to Qualitative Arms Control: The Challenges of Modern Weapons Development. In: Global Trends 2015. Prospects for World Society. Stiftung Entwicklung und Frieden, Bonn. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Sharkey, N. (2016): Staying in the loop: human supervisory control of weapons. In: Bhuta, N. et. al. (ed.) (2016): Autonomous Weapons Systems: Law, Ethics, Policy, Cambridge Univ. Press. Cambridge 2016. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Sparrow, R. (2007): Killer Robots. Journal of Applied Philosophy 24(1). 2007. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- U.S. Army (2017): The U.S. Army Robotic and Autonomous Systems Strategy. Maneuver, Aviation, and Soldier Division Army Capabilities Integration Center. 03/2017. http://www.tradoc.army.mil/FrontPageContent/Docs/RAS_Strategy.pdf [25.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- U.S. Department of Defense (2012): Directive 3000.09, Subject: Autonomy in Weapon Systems. U.S. DoD, 21.11.2012. Aktualisiert: 08.05.2017. http://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodd/300009p.pdf [06.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- U.S. Department of the Navy & U.S. Marine Corps (2016): Naval Aviation Vision 2016-2025. 06/2016. http://www.navy.mil/strategic/Naval_Aviation_Vision.pdf [23.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- UK Ministry of Defence (2012): Joint Concept Note 3/2012 Future Air and Space Operating Concept, 09/2012. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- UNA-UK (2018): Minority of states block progress on regulating killer robots, 04.09.2018, https://www.una.org.uk/news/minority-states-block-progress-regulating-killer-robots [09.10.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- UN Office at Geneva (2018): Background on Lethal Autonomous Weapons Systems. https://www.unog.ch/80256EE600585943/(httpPages)/8FA3C2562A60FF81C1257CE600393DF6?OpenDocument [20.02.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- UN Office for Disarmament Affairs: Convention on Prohibitions or Restrictions on the Use of Certain Conventional Weapons Which May Be Deemed to Be Excessively Injurious or to Have Indiscriminate Effects. http://disarmament.un.org/treaties/t/ccwc 16.10.2018. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Vignard, K. (2018): Manifestos and open letters: Back to the future? Bulletin of the Atomic Scientists, 26.04.2018. https://thebulletin.org/military-applications-artificial-intelligence/manifestos-and-open-letters-back-future [25.05.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Work, R. (2016): Remarks by Deputy Secretary Work on Third Offset Strategy. Rede gehalten in Brüssel, Belgien. U.S. Department of Defense. 28.04.2016. https://www.defense.gov/News/Speeches/Speech-View/Article/ 753482/remarks-by-deputy-secretary-work-on-third-offset-strategy/ [19.03.18]. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-133
- Ablon, L., & Bogart, T. (2017) Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits. RAND Corporation. Retrieved from https://www.rand.org/pubs/research_reports/RR1751.html Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier. pp.4-33. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Arkin, W. M. (1999, March 29). Sunrise, Sunset. Washington Post. Retrieved June 2, 2018, from https://www.washingtonpost.com/wp-srv/national/dotmil/arkin032999.htm Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Avgerinos, T., Cha, S. K., Rebert, A., Schwartz, E. J., Woo, M., & Brumley, D. (2014). Automatic exploit generation. Communications of the ACM, 57(2), 74-84. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Bull, H. (1966). The control of the arms race: Disarmament and arms control in the missile age. New York: Praeger. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Bumiller, E., & Shanker, T. (2012, October 11). Panetta Warns That U.S. Is Vulnerable to Cyber-Pearl Harbor. The New York Times. Retrieved February 26, 2018, from http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Burgers, T. & Robinson, D.R.S. (2016), Networked Authoritarianism Is on the Rise, in Sicherheit und Frieden/Security and Peace, 34(4), 248–252. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Borghard, E. D., & Lonergan, S. W. (2018, January 16). Why Are There No Cyber Arms Control Agreements?, Retrieved March 1, 2018, from https://www.cfr.org/blog/why-are-there-no-cyber-arms-control-agreements Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Boulanin, V. (2013, May 30). Arms production goes cyber: a challenge for arms control Stockholm International Peace Research Institute. Retrieved from https://www.sipri.org/node/361 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Bronk, C., & Wallach, D. (2013, March 26). Opinion: Cyber arms control? Forget about it. Retrieved June 2, 2018, from https://edition.cnn.com/2013/03/26/opinion/bronk-wallach-cyberwar/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Cavelty, M. D. (2013). From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse, International Studies Review 15(1),105-122. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Craig, A., & Valeriano, B. (2016). Conceptualising Cyber Arms Races. In 2016 8th International Conference on Cyber Conflict Cyber Power, Pissanidis, N., Rõigas, H. & Veenendaal M. (Eds.),141-158, Tallinn: NATO CCD COE Publications. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Dittrich, P., & Boening, B. (2017). More security in cyberspace: The case for arms control. Security Policy Working Paper, (9), 1-5, BAKS Federal Academy for Security Policy, Berlin, Germany. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Freedom House. (2017). Freedom on the Net 2017. Retrieved from https://freedomhouse.org/report/freedom-net/freedom-net-2017 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Floridi, L. (2007). A Look into the Future Impact of ICT on Our Lives. The Information Society,23(1), 59-64. doi:10.1080/01972240601059094 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Galeotti, M. (2018, January 31). Size Doesn’t Matter for Spies Anymore. Retrieved March 01, 2018, from https://foreignpolicy.com/2018/01/31/size-doesnt-matter-for-spies-anymore/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Galinec, D., Možnik, D., & Guberina, B. (2017). Cybersecurity and cyber defence: National level strategic approach. Automatika, 58(3), 273-286. doi:10.1080/00051144.2017.1407022 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Glenny, M. (2011, October 12). The Cyber Arms Race Has Begun. Retrieved February 26, 2018, from https://www.thenation.com/article/cyber arms-race-has-begun/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Goodin, D. (2008, July 21). Researcher’s hypothesis may expose uber-secret DNS flaw. The Register. Retrieved from https://www.theregister.co.uk/2008/07/21/dns_flaw_speculation/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Healey, J. (2013a). A fierce domain: Conflict in cyberspace, 1986 to 2012. Vienna, VA: Cyber Conflict Studies Association. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Healey, J. (2013b). The Lessons of Cyber Conflict History, So Far…. Atlantic Council. Excerpted from the introduction of A Fierce Domain: Cyber Conflict 1986 to 2012. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Healey, J. (2016, November 1). The U.S. Government and Zero-Day Vulnerabilities: From Pre-Heartbleed to Shadow Brokers. Columbia University, School of International and Public Affairs, Journal of International Affairs. Retrieved from https://jia.sipa.columbia.edu/online-articles/healey_vulnerability_equities_process Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Hurwitz, R. (1999). Who Needs Politics? Who Needs People? The Ironies of Democracy in Cyberspace. Contemporary Sociology,28(6), 655-661. Retrieved from http://www.jstor.org/stable/2655536 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- International Data Corporation. (2017, March 29). Worldwide Spending on Security Technology Forecast to Reach $81.7 Billion in 2017, According to New IDC Spending Guide. Retrieved June 1, 2018, from https://www.idc.com/getdoc.jsp?containerId=prUS42425417 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Jellenc, E. (2012). Explaining Politico-Strategic Cyber Security: The Feasibility of Applying Arms Race Theory. In 11th European Conference on Information warfare and security: ECIW2012, (20), 151-162). Reading: Academic Publishing. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Jenkins, H., Thorburn, D. (2003). Introduction: Digital Revolution, Informed Citizen and the Culture of Democracy, in Democracy and new media, 1-17, Jenkins, H and Thorburn, D. (eds.). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Jervis, R. (1976). Perception and misperception in international politics. New Jersey: Princeton University Press. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Kaspersky, E. (2012, July 3). What Are The Top IT Security Threats? Retrieved March 01, 2018, from https://eugene.kaspersky.com/2012/07/03/worse-than-cheese-five-main-issues-of-it-security/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Kehler, C. R., Lin, H., & Sulmeyer, M. (2017). Rules of engagement for cyberspace operations: A view from the USA. Journal of Cybersecurity, 3(1), 69-80. doi:0.1093/cybsec/tyx003 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Kung, L., Kröll, A., Ripken, B., & Walker, M. (1999). Impact of the Digital Revolution on the Media and Communications Industries. Javnost – The Public Journal of the European Institute for Communication and Culture, 6, 29-47. doi: https://doi.org/10.1080/13183222.1999.11008717 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Kydd, A. (2000). Arms Races and Arms Control: Modeling the Hawk Perspective. American Journal of Political Science, 44(2), 228-244. doi:10.2307/2669307 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Levy, S. (2001). Crypto: How the code rebels beat the government--saving privacy in the digital age. Penguin Press. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Limnéll, J. (2016). The cyber arms race is accelerating – what are the consequences? Journal of Cyber Policy, 1(1), 50-60. doi:10.1080/23738871.2016.1158304 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Litwak, R., & King, M. (2015). Arms Control in Cyberspace? (Wilson Briefs, pp. 1-8, Issue brief). Washington, DC: Woodrow Wilson International Center for Scholars. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Macak, K. (2017, July 18). From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers | Leiden Journal of International Law. Retrieved February 26, 2018, from https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/from-cyber-norms-to-cyber-rules-reengaging-states-as-lawmakers/63A45029B685C11BBD9512AC0459FAE5 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Maybaum, M., & Tölle, J. (2016). Arms control in cyberspace – architecture for a trust-based implementation framework based on conventional arms control methods. Cyber Conflict (CyCon), 2016 8th International Conference on, 159-174. doi:10.1109/CYCON.2016.7529433 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- McAfee. (2012, January 30). 57% Believe a Cyber Arms Race is Currently Taking Place, Reveals McAfee-Sponsored Cyber Defense Report. Retrieved March 01, 2018, from https://www.mcafee.com/us/about/news/2012/q1/20120130-02.aspx Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Metz, C. (2016, June 03). Will Humans or Bots Rule Cybersecurity? The Answer Is Yes. Retrieved February 27, 2018, from https://www.wired.com/2016/08/will-humans-bots-rule-cybersecurity-answer-yes/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Meyer, P. (2012) Diplomatic Alternatives to Cyber-Warfare, The RUSI Journal, 157(1), 14-19, DOI: 10.1080/03071847.2012.664357 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Mimran, D. (2017). The cyberspace arms race: artificial intelligence & cyber security (Issue brief). The Forum Network (OECD). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Modderkolk, H. (2018, January 25). Dutch agencies provide crucial intel about Russia’s interference in US-elections. De Volkskrant. Retrieved from https://www.volkskrant.nl/tech/dutch-agencies-provide-crucial-intel-about-russia-s-interference-in-us-elections~a4561913/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Nakashima, E. (2017, November 15). Trump administration pulls back curtain on secretive cybersecurity process. The Washington Post. Retrieved from https://www.washingtonpost.com/world/national-security/trump-administration-pulls-back-curtain-on-secretive-cybersecurity-process/2017/11/15/f9a2e3ec-ca16-11e7-aa96-54417592cf72_story.html Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Netanyahu,, B. (2017, June 26). PM Netanyahu addresses TAU Cyber-Tech conference. Retrieved from http://mfa.gov.il/MFA/PressRoom/2017/Pages/PM-Netanyahu-addresses-TAU-Cyber-Tech-conference-26-June-2017.aspx Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Noor, E. (2015). Strategic Governance of Cyber Security: Implications for East Asia. In Navigating Change: ASEAN-Japan Strategic Partnership in East Asia and in Global Governance, 150-163, Rizal Sukma and Yoshihide Soeya (eds), Japan Center for International Exchange, Tokyo, Japan. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Nye Jr., J. S. (2011a). Nuclear Lessons for Cyber Security? Strategic Studies Quarterly, 5(4), 18-38. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Nye Jr., J. S. (2011b). The Future of Power, Public Affairs, NYC, New York Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Nye Jr., J. S. (2015, October 01). The world needs new norms on cyberwarfare. Retrieved February 26, 2018, from https://www.washingtonpost.com/opinions/the-world-needs-an-arms-control-treaty-for-cybersecurity/2015/10/01/20c3e970-66dd-11e5-9223-70cb36460919_story.html?utm_term=.0492eca3e247 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Poulsen, K. (2001, June 15). Solar Sunrise hacker ‘Analyzer’ escapes jail. Retrieved from https://www.theregister.co.uk/2001/06/15/solar_sunrise_hacker_analyzer_escapes/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Rid, T. & Buchanan, B. (2014) Attributing Cyber Attacks, In Journal of Strategic Studies, 38(1-2) Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Rid, T., & McBurney, P. (February/March 2012). Cyber-Weapons. RUSI Journal, 157(1) 6–13.doi: 10.1080/03071847.2012.664354 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Robinson, N., Gribbon, L., Horvath, V., & Robertson, K. (2013). Cyber-security threat characterisation A rapid comparative analysis (pp. 1-86, Rep.). Santa Monica, CA: RAND. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Rosenzweig, P. (2015, February 26). Problems with Cyber Arms Control. Retrieved June 01, 2018, from https://lawfareblog.com/problems-cyber-arms-control Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Science and Technology Facilities Council. (2018). A BRIEF HISTORY OF THE DIGITAL REVOLUTION. Retrieved February 24, 2018, from https://www.stfc.ac.uk/files/digital-revolution-infographic/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Schelling, T. C., & Halperin, M. H. (1961). Strategy and arms control. New York: The twentieth century fund. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Schwartz, A. & Knake, R. (2016) Government’s role in vulnerability disclosure: Creating a permanent and accountable vulnerability equities process, discussion paper 04, Belfer Center for International Affair Harvard Kennedy School. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Singer, P. W., & Friedman, A. (2014). Cybersecurity and cyberwar: what everyone needs to know. New York: Oxford University Press. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Slayton, R. (2017). What Is the Cyber Offense-Defense Balance? Conceptions, Causes, and Assessment. International Security, 41(3), 72-109. doi:10.1162/isec_a_00267https://doi.org/10.1162/ISEC_a_00267 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Smith, B. (2017, March 09). The need for a Digital Geneva Convention. Retrieved March 01, 2018, from https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Stavridis, J. (2017, May 15). The United States Is Not Ready for a Cyber-Pearl Harbor. Retrieved February 26, 2018, from http://foreignpolicy.com/2017/05/15/the-united-states-is-not-ready-for-cyber-pearl-harbor-ransomware-hackers-wannacry/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Stecklow, S., & Fassihi, F. (2009, December 11). Thousands Flee Iran as Noose Tightens. Wall Street Journal. Retrieved from https://www.wsj.com/articles/SB126049484505086861 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Stein, J. (2013). Threat Perception in International Relations. In the Oxford Handbook of Political Psychology.: Oxford University Press. Retrieved 26 Feb. 2018, from http://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780199760107.001.0001/oxfordhb-9780199760107-e-012. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Tsipori, T. (2016, April 4). Israeli cybersecurity grabs 8% global market share. Retrieved May 31, 2018, from https://www.globes.co.il/en/article-israeli-cyber-industry-hits-the-big-time-1001114669 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Tynkkynen, M. (2016). NEW TECHNOLOGIES – Risks and opportunities: Overview of the challenges and opportunities arising from new and developing technologies in risk management and workers’ compensation insurance., for The Finnish Workers’ Compensation Center, Analyses No 7E Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Ullrich, J. (2004). The Disappearing Patch Window. Observations from the Internet Storm Center, SANS. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- U.N. General Assembly, 50th Session. Verification in all its aspects, including the role of the United Nations in the field of verification (A/50/37). 22 September 1995. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- U.N. General Assembly, 79th Plenary Meeting. General and complete disarmament (A/RES/51/45). 10 December 1996. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- UN General Assembly (2013, June 24th) Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, A/68/98. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Valeriano, B., & Maness, R. C. (2015). Cyber war versus cyber realities: cyber conflict in the international system. New York: Oxford University Press. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Vacca, J. R. (2012). Computer and information security handbook. Newnes. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Walt, S. (1985). Alliance Formation and the Balance of World Power. International Security, 9(4), 3-43. doi:10.2307/253854 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Ward, D., & Morgus, R. (2016). Professor Cy Burr’s Graphic Guide to: International Cyber Norms, 1-26, New America. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- White House (2017) Vulnerabilities equities policy and process for the United States government, White House Report. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Wirth, A. (2016) ‘The Cyber Arms Race Is On’: Lessons from the U.S. Presidential Election. Biomedical Instrumentation & Technology: 50 (6), 463-465. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Wirtz, J. J. (2017). The Cyber Pearl Harbor. Intelligence and National Security, 32(6), 758-767. Doi: https://doi.org/10.1080/02684527.2017.1294379 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Wolter, D. (2013, September). The UN Takes a Big Step Forward on Cybersecurity. Retrieved June 2, 2018, from https://www.armscontrol.org/act/2013_09/The-UN-Takes-a-Big-Step-Forward-on-Cybersecurity#source Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Zetter, K. (2015, May 15). Feds says that banned researcher commandeered a plane. Retrieved February 26, 2018, from https://www.wired.com/2015/05/feds-say-banned-researcher-commandeered-plane/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-140
- Anthony, Ian; Hart, John (2018): Strengthening the ban on chemical weapons: The case of Syria. Stockholm International Peace Research Institute (SIPRI). https://www.sipri.org/commentary/essay/2018/strengthening-ban-chemical-weapons-case-syria Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Barmet, Céline; Thränert, Oliver (2016): Syria and the Chemical Weapons Ban. ETH Zürich: Center for Security Studies (CSS) Policy Perspectives. Vol. 4 (8), S. 2. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Barmet, Céline; Thränert, Oliver (2017): The Chemical Weapons Ban in Troubled Waters. ETH Zürich: Center for Security Studies (CSS) Analysis in Security Policy. Nr. 207. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Becker-Jakob, Una (2013): Balanced minimalism: The biological weapons convention after its 7th review conference. Report, Peace Research Institute Frankfurt (PRIF). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Bennett, Bruce W. (2013): The Challenge of North Korean Biological Weapons. Testimony presented before the United States House of Representatives; Committee on Armed Services, Subcommittee on Intelligence, Emerging Threats and Capabilities; October 11, 2013; RAND Cooperation, Santa Monica, USA. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Biosecure Ltd. (2017): Genome Editing and biosecurity. Background paper. URL: http://nas-sites.org/dels/files/2017/05/Biosecure-GeneEditingBiosecurity-Report-170925.pdf Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Callaway, Ewen (2017): US defence agencies grapple with gene drives. Nature, 547(7664):388– 389. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Chemical Abstract Service (CAS). Abgerufen am 26.02.2018. URL: http://support.cas.org Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Clapper, James R. (2016): Worldwide Threat Assessment of the U.S. Intelligence Community. Statement for the Record by James R. Clapper, Director of National Intelligence. Senate Armed Service Committee. https://www.dni.gov/files/documents/SASC_Unclassified_2016_ATA_SFR_FINAL.pdf. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Clingendael report; van Ham, Peter; van der Meer, Sico; Ellahi, Maki (2017): Chemical Weapons Challenges Ahead: The Past and Future of the OPCW. Den Haag: Niederländisches Institut für Internationale Beziehungen Clingendael. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Crowley, Michael (2016): Chemical Control. Palgrave Macmillan UK. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Crowley, Michael; Dando, Malcolm (2015): The use of incapacitating chemical agent weapons in law enforcement. The International Journal of Human Rights, 19(4):465–487. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Geissler, Erhard; Moon, John E. v. C. (1999): Biological and toxin weapons: research, development, and use from the Middle Ages to 1945. SIPRI. Oxford University Press, Oxford. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Guillemin, Jeanne (2006): Scientists and the history of biological weapons. EMBO Reports. S. S45-49. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Hammond, Andrew M. and Galizi, Roberto (2018): Gene drives to fight malaria: current state and future directions. Pathogens and Global Health, S. 1–12. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Higgins, Andrew; New York Times vom 27.09.2017: Russia Destroys Chemical Weapons, and Faults U.S. for Not Doing So. https://www.nytimes.com/2017/09/27/world/europe/russia-putin-chemical-weapons.html Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Himmel, Mirko (2016): Das Biowaffenübereinkommen. Wissenschaft & Frieden. 3:42-45. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Himmel, Mirko; Rempp, Gesine; Vill, Volkmar (2017): Eine Welt ohne Chemiewaffen? Wissenschaft & Frieden. 2:52-55. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Holmes, Oliver; Phillips, Tom. The Guardian vom 24.02.2017: Kim Jong-nam killed by VX nerve agent, say Malaysian police. https://www.theguardian.com/world/2017/feb/24/kim-jong-nam-north-korea-killed-chemical-weapon-nerve-agent-mass-destruction-malaysian-police Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Leitenberg, Milton; Kuhn, Jens H.; Zilinskas, Raymond A. (2012): The Soviet Biological Weapons Program: A History. Harvard Univ. Press, Cambridge, Massachusetts. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Lentzos, Filippa (2016a): Increasing transparency in biodefence: A 2016 visit to a German military medical biodefence facility. EU Non-Proliferation Papers, Nr. 52. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Lentzos, Filippa [Hrg.] (2016b): Biological Threats in the 21st Century: The Politics, People, Science and Historical Roots. Imperial College Press, London. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Martinetz, Dieter (1996): Vom Giftpfeil zum Chemiewaffenverbot. Frankfurt am Main: Harri Deutsch Thun. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Meier, Oliver (2017): Nichtverbreitung in Räumen begrenzter Staatlichkeit. SWP Studie S9. Stiftung für Wissenschaft und Politik, Berlin. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Meier, Oliver; Trapp, Ralf (2016): Russia’s Chemical Terrorism Proposal: Red Herring or Useful Tool? Bulletin of the Atomic Scientists, 7. Juni. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Mirzayanov, Vil S. (2009): State Secrets: An Insider’s Chronicle of the Russian Chemical Weapons Program. Outskirts Press, Inc., Denver, Colorado. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Müller-Färber, Thomas; Hiemann, Roland (2010): Das Verbot von Chemiewaffen: Fünf Hürden auf dem Weg zu einer chemiewaffenfreien Welt. Sicherheit und Frieden (S+F) / Security and Peace. 28. Jg., Nr. 1, S. 48-54. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Revill, James (2013): A peer-review mechanism for the Biological and Toxin Weapons Convention. United Nations Institute for Disarmament Research (UNIDIR), New York and Geneva. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Riches, James R.; Read, Robert W.; Black, Robin M.; Cooper, Nicholas J.; Timperley, Christopher M. (2012): Analysis of Clothing and Urine from Moscow Theatre Siege Casualties Reveals Carfentanil and Remifentanil Use. J Anal Toxicol, 36(9):647–56. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Santoro, David (2017): Myanmar – A nonproliferation success story. Australian Strategic Policy Institute. URL: https://www.aspi.org.au/report/myanmar-nonproliferation-success-story Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Shaheen, Kareem. The Guardian vom 14. März 2016: ‘Almost 1,500 killed in chemical weapons attacks’ in Syria. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Trapp, Ralf (2015): Lessons Learned from the OPCW Missions in Syria. https://www.opcw.org/fileadmin/OPCW/PDF/Lessons_learned_from_the_OPCW_Mission_in_Syria.pdf Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Tucker, Jonathan B. (2006): War of Nerves. New York. Anchor Books, Random House. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- VEREX (1993): Ad Hoc Group of Governmental Experts to Identify and Examine Potential Verification Measures from a Scientific and Technical Standpoint. Bericht der VEREX-Expertengruppe. Genf, 23. September 1993. https://www.unog.ch/bwcdocuments/1993-09-VEREX4/BWC_CONF.III_VEREX_09.pdf Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Warrick, John. Washington Post vom 10. Dezember 2017: Microbes by the ton: Officials see weapons threat as North Korea gains biotech expertise. https://www.washingtonpost.com/world/national-security/microbes-by-the-ton-officials-see-weapons-threat-as-north-korea-gains-biotech-expertise/2017/12/10/9b9d5f9e-d5f0-11e7-95bf-df7c19270879_story.html Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Zanders, Jean Pascal [Hrg.] (2013): The Future of the CWC in the Post-Destruction Phase. European Union Institute for Security Studies (EUISS), Report Nr. 15. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-146
- Achilli, L., & Sanchez, G. (2017): What Does It Mean to Disrupt the Business Models of People Smugglers?, Retrieved May 25, 2018, from: http://cadmus.eui.eu/bitstream/handle/1814/46165/PB_2017_09_MPC.pdf?sequence=1 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Bigo, D. (2006): Protection: Security, Territory and Population, in: J. Huysmans, A. Dobson, & R. Prokhovrik, The Politics of Protection: Sites of Insecurity and Political Agency. Routledge, pp. 84-100 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Bob, C. (2010): The market for human rights, in: A. Prakash, & M. Gugerty, Advocacy Organizations and Collective Action (pp. 133-154). Cambridge: Cambridge University Press. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Campana, P. (2016): Explaining Criminal Networks: Strategies and Potential Pitfalls, in: Methodological Innovations, 9, pp. 1-10. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Carbone, M. (2015): Beyond the Telemachus complex: courses, discourses and the 2014 Italian Presidency of the Council of the European Union, in: Journal of Common Market Studies, 53, pp. 83-92. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Cuttita, P. (2017): Repoliticization Through Search and Rescue? Humanitarian NGOs and Migration Management in the Central Mediterranean, in: Geopolitics, 22. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- efe (2018): Italy to accept 41 migrants rescued by US ship Trenton, Retrieved June 28, 2018, from: https://www.efe.com/efe/english/portada/italy-to-accept-41-migrants-rescued-by-us-ship-trenton/50000260-3651975 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Euractiv (2018): Afrikanische Union lehnt EU-Migrationszentren in Afrika ab, Retrieved October 20, 2018, from: https://www.euractiv.de/section/eu-aussenpolitik/news/afrikanische-union-lehnt-eu-migrationszentren-in-afrika-ab/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- European Political Strategy Centre (2017): EPSC Strategic Notes – Irregular Migration via the Central Mediterranean. From Emergency Responses to Systemic Solut, Retrieved May 25, 2018, from: https://ec.europa.eu/ epsc/sites/epsc/files/strategic_note_issue_22_0.pdf Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Fernández, F. V. (2016): The European operations in the Mediterranean Sea to deal with migration as a symptom. From the Italian operation Mare Nostrum to Frontex operations Triton and Posseidon, EUNAVFOR-MED and NATO’s assistance in the Aegean Sea, in: Spanish Yearbook of International Law (pp. 93-117). Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Giovinazzo, D. (2017): La Guardia costiera: “Le Ong non sono un fattore di attrazione per i migranti”, Retrieved May 25, 2018, from: http://www.eunews.it/2017/05/03/migranti-guardia-costiera-ong-non-sono-un-fattore-di-attrazione-per-i-migranti/84403 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Guardia Costiera (2016): Search And Rescue Activity and Migratory flows in Central Mediterranean sea, Retrieved May 25, 2018, from: www.guardiacostiera.gov.it/en/Documents/search-and-rescue-activity/search-and-rescue-activity-and-migratory-flows-in-central-mediterranean-sea.pdf Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Guardia Costiera (2017): Report on Search And Rescue Activity and Migratory flows in Central Mediterranean sea, Retrieved May 23, 2018, from: www.guardiacostiera.gov.it/attivita/Documents/attivita-sar-immigrazione-2017/Rapporto_annuale_2017_ENG.pdf Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Harlan, C. (2018): The retreat of rescue ships from the Mediterranean is a sign of changing odds for migrants, Retrieved June 28, 2018, from: https://www.washingtonpost.com/world/europe/the-retreat-of-rescue-ships-from-the-mediterranean-is-a-sign-of-changing-odds-for-migrants/2018/06/15 /099b74f0-6e61-11e8-b4d8-eaf78d4c544c_story.html?noredirect=on&utm_ term=.fb2b0f8ca0ab Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Heller, C., & Pezzani, L. (2016): Death by Rescue: The Lethal Effects of the EU’s Policies of Non-Assistance, Retrieved May 8, 2018, from: https://deathbyrescue.org/report/narrative/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Heller, C., & Pezzani, L. (2018): The Iuventa Case, Retrieved June 20, 2018, from: https://blamingtherescuers.org/iuventa/ Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Human Rights Watch (2017): EU: Draft Code for Sea Rescues Threatens Lives. Leaked Document Would Tie Nongovernmental Groups’ Hands, Retrieved May 26, 2018, from: https://www.hrw.org/news/2017/07/12/eu-draft-code-sea-rescues-threatens-lives Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- IMO, ICS, & UNHCR (2015): Rescue at Sea. A guide to principles and practice as applied to refugees and migrants. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- IOM (2017): New Study Concludes Europe’s Mediterranean Border Remains ‘World’s Deadliest’, Retrieved May 2, 2018, from: https://www.iom.int/news/new-study-concludes-europes-mediterranean -border-remains-worlds-deadliest Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- IOM (2018): missingmigrants Dataset, Retrieved 05 30, 2018, from: https://missingmigrants.iom.int/global-figures/all/xls Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Irrera, D. (2016): Migrants, the EU and NGOs: The ‘Practice’ of Non-Governmental SAR Operations, in: Romanian Journal of European Affairs, 16(3), pp. 20-35. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Jünemann, A. (2002): From the Bottom to the Top: Civil Society and Transnational Non-Governmental Organizations in the Euro-Mediterranean Partnership, in: Democratization, 9, pp. 86-105. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- NY Times (2017): Doctors Without Borders Suspends Migrant Rescue Patrols Off Libyan Coast, Retrieved May 22, 2018, from: https://www.nytimes.com/2017/08/12/world/europe/doctors-without-borders-suspends-migrant-rescue-patrols-off-libyan-coast.html Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Pallister-Wilkins, P. (2015): The Humanitarian Politics of European Border Policing: Frontex and Border Police in Evros, in: International Political Sociology, 9(1), pp. 53-69. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Pallister-Wilkins, P. (2017): Médecins Avec Frontières and the making of a humanitarian borderscape, in: Environment and Planning D: Society and Space, 36(1/2018), pp. 114-138. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Panebianco, S. (2016): The Mare Nostrum Operation and the SAR approach: the Italian response to address the Mediterranean migration crisis, EUMedEA Online Working Paper Series, Retrieved 04 25, 2018, from: http://www.dsps.unict.it/sites/default/files/files/panbianco_EUMedEA_JMWP_03_2016__.pdf Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Rah, S. (2009): Asylsuchende und Migranten auf See. Staatliche Rechte und Pflichten aus völkerrechtlicher Sicht, Berlin/Heidelberg: Springer-Verlag. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Refai, A. (2017): When humanity is washed ashore of Europe: SAR operations in the Mediterranean, their challenges and roles in the context of the Refugee crisis, CERAH working paper, 48, Retrieved May 31, 2018, from: https://www.cerahgeneve.ch/files/4915/0841/8071/WP48-When-Humanity-Is-Washed-Ashore-Of-Europe.pdf Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Roos, C., & Orsini, G. (2015): How to reconcile the EU border paradox? The concurrence of refugee reception and deterrence, Retrieved June 5, 2018, from: https://www.ies.be/files/4:2015%20Policy%20Brief.pdf Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Schneider, P. (2016): Migranten und Flüchtlinge als Herausforderung für Deutschland und Europa, in: S+F Sicherheit und Frieden, 34(1), pp. 1-19. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Schultz, T. (2017): EU backs Italy in stand-off with NGOs over refugee rescue, Retrieved June 6, 2018, from: http://www.dw.com/en/eu-backs-italy-in-stand-off-with-ngos-over-refugee-rescue/a-39546570 Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Seehase, J. (2013): Die Grenzschutzagentur FRONTEX. Chance oder Bedrohung für den Europäischen Flüchtlingsschutz, Baden-Baden: NOMOS Verlagsgesellschaft. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Tagesschau.de (2018): Containerschiff darf nach Italien, Retrieved June 28, 2018, from: http://www.tagesschau.de/ausland/alexander-maersk-101.html Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Tazzioli, M. (2016): Border displacements: Challenging the politics of rescue between Mare Nostrum and Triton, in: Migration Studies, 4(1), pp. 1-19. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- UNHCR (2012): Mediterranean takes record as most deadly stretch of water for refugees and migrants in 2011, Retrieved Mai 7, 2018, from: http://www.unhcr.org/news/briefing/2012/1/4f27e01f9/mediterranean-takes-record-deadly-stretch-water-refugees-migrants-2011.html Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- UNHCR (2013): Lampedusa boat tragedy – update, Retrieved May 23, 2018, from: http://www.unhcr.org/news/briefing/2013/10/524e8d2d9/lampedusa-boat-tragedy-update.html Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Vasta, E., & Vuddamalay, V. (2006): International Migration and the Social Sciences. Confronting National Experiences in Australia, France and Germany, New York: Palgrave Macmillan. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159
- Watson, S. (2009): The Securitization of Humanitarian Migration. Digging moats and sinking boats, Abingdon: Routledge. Open Google Scholar doi.org/10.5771/0175-274X-2018-3-159