Law Of War 16.5
16.5 CYBER OPERATIONS AND JUS IN BELLO
This section addresses jus in bello rules and cyber operations.
Law Of War 16.5
16.5 CYBER OPERATIONS AND JUS IN BELLO
This section addresses jus in bello rules and cyber operations.
But how, exactly, are the jus in bello rules to be implemented in cyberspace? Parties to an armed
conflict will need to assess the potential effects of a cyber attack on computers that are not military objectives, such
as private, civilian computers that hold no military significance, but may be networked to computers that are valid
military objectives. Parties will also need to consider the harm to the civilian uses of such infrastructure in
performing the necessary proportionality review. Any number of factual scenarios could arise, however, which will
require a careful, fact-intensive legal analysis in each situation.”).