Cyber military operations are part of today’s armed conflicts. While some States have acknowledged publicly that they have used cyber means in support of their military operations, others have developed—or are developing—cyber military capacities. Amidst this buzz around cyber operations and warfare, key questions around the applicability and application of IHL are often left unclear. What kind of cyber operations are likely to cause physical destruction and harm to humans? Can cyber operations be targeted at specific objects? How does malware spread from the targeted computer system to others, and is it possible to avoid the spreading of malware? Why is it so difficult to attribute a cyber attack to its author? What challenges does the use of cyber means and methods of warfare pose to fundamental IHL principles, such as the principles of distinction, proportionality and precaution?
This blog series presents expert views on some of these questions.Stay tuned for the upcoming posts:
- Malware: A selection of essential cyber notions and concepts, Lukasz Olejnik & Tilman Rodenhäuser
- Potential human costs of cyber operations—Key ICRC takeaways from discussion with tech experts, Laurent Gisel, Lukasz Olejnik
- The potential human costs of eschewing cyber operations, Col. Gary Corn
- Know your enemy and know yourself: Attribution in the cyber domain, Vitaly Kamluk
- Digital risks for populations in armed conflict: Five key gaps the humanitarian sector should address, Delphine van Solinge