2012
DOI: 10.1017/s1816383113000246
|View full text |Cite
|
Sign up to set email alerts
|

Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians

Abstract: Cyber warfare figures prominently on the agenda of policymakers and military leaders around the world. New units to ensure cyber security are created at various levels of government, including in the armed forces. But cyber operations in armed conflict situations could have potentially very serious consequences, in particular when their effect is not limited to the data of the targeted computer system or computer. Indeed, cyber operations are usually intended to have an effect in the ‘real world’. For instance… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 81 publications
(11 citation statements)
references
References 9 publications
0
7
0
1
Order By: Relevance
“…63 Droege looks from a different perspective and states that if a cyber operation which disrupts 'the functioning of objects without physical damage or destruction, even if the disruption is temporary' should be regarded as an 'attack' since, inter alia, there is no difference whether making a civilian object useless by giving it physical damage or not. 64 Although this broader understanding seems sensible when there are some instances in which there is no difference for an attacker to gain the same advantage either by neutralizing or disrupting rather than attacking to military object, the weakness of the argument is that not every cyber operation which contributes to the military position of the belligerent party may be qualified as an attack. 65 Therefore, the determination should be based on whether the intention of the perpetrator is to conduct an attack or operation.…”
Section: From the Perspective Of Lex Ferendamentioning
confidence: 99%
“…63 Droege looks from a different perspective and states that if a cyber operation which disrupts 'the functioning of objects without physical damage or destruction, even if the disruption is temporary' should be regarded as an 'attack' since, inter alia, there is no difference whether making a civilian object useless by giving it physical damage or not. 64 Although this broader understanding seems sensible when there are some instances in which there is no difference for an attacker to gain the same advantage either by neutralizing or disrupting rather than attacking to military object, the weakness of the argument is that not every cyber operation which contributes to the military position of the belligerent party may be qualified as an attack. 65 Therefore, the determination should be based on whether the intention of the perpetrator is to conduct an attack or operation.…”
Section: From the Perspective Of Lex Ferendamentioning
confidence: 99%
“…Among the most influential pieces on IHL that we have run, we would mention Sylvain Vité's article on the typology of conflicts, 11 Marco Sassòli and Laura M. Olson's article on the relationship between IHL and human rights law, 12 and Cordula Droege's article on the applicability of IHL to cyber warfare. 13 Not only ICRC staff but also academics and other humanitarian practitioners have published articles that have driven the debate forward. These include Daniel Bar-Tal, Lily Chernyak-Hai, Noa Schori and Ayelet Gundar on perceptions of victimhood in protracted conflicts, 14 Beth Ferris on faith-based and secular humanitarian organizations, 15 and Peter Asaro on autonomous weapon systems.…”
Section: The Review and The Icrcmentioning
confidence: 99%
“…Therefore, it is still true that 'the same legal criteria apply [to the cyber domain] as with any other attribution of the conduct of private parties to a state'. 151 Thirdly, it is possible to argue that the Nicaragua test, even if correctly decided at the time, should be seen through the historical prism of its origin, which was far removed from the modern reality of cyber attacks occurring in the virtual world. Accordingly, challenges posed by operations in cyberspace could not have been foreseen by the ICJ, which had completed its deliberations three years before Tim Berners Lee laid groundwork for the future World Wide Web.…”
Section: Controlmentioning
confidence: 99%