Abstract

Abstract The central concepts that make up the Law of Armed Conflict (LOAC) have not been easy to adapt to cyber operations. In addition to their kinetic history and orientation, the core LOAC principles do not in most instances anticipate the kind of cyber-specific analysis that should accompany the use of increasingly advanced cyber systems and tools in conflict. Cyber operations rarely cause physical damage, much less injury or death. More often they cause cyber harm—by corrupting, manipulating or stealing data, denying access to a website, or interfering temporarily with the functionality of information systems. Or they indirectly disrupt or damage objects that are not part of the cyber domain. Measuring the harm from a cyber incident and calculating that harm in ways that the LOAC credits remains challenging, as does defining and distinguishing civilian and military objects, and accounting for the indirect effects of cyber operations. The LOAC also has not settled on a legal status for critical national security-related components of the cyber domain, including data and dual-use infrastructure.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.