![]() They must distinguish between military targets and civilians and be proportionate and justified by military gain. Under IHL such attacks must not be indiscriminate. So much so that the discussion about its potential impact is often speculative.Ĭyber warfare has been defined as any hostile measures against an enemy designed “to discover, alter, destroy, disrupt or transfer data stored in a computer, manipulated by a computer or transmitted through a computer.” Examples of hostile use include computer attacks on air traffic control systems, on oil pipeline flow systems and nuclear plants. ![]() The idea of cyber warfare or computer network attack in armed conflict is very new. In particular IW’s potential to threaten and harm civilians and their means of survival during armed conflict brings it directly into the realm of IHL. There can be no doubt, therefore, that international humanitarian law covers cyber warfare. ![]() IHL clearly anticipated advances in weapons’ technology and the development of new means and methods of waging war. But the principles and rules in these treaties governing the means and methods of warfare are not restricted to situations that existed at the time of their adoption. There is no specific mention of cyber warfare or computer network attacks in the Geneva Conventions or their Additional Protocols.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |