29.07.2016 Views

Cyber Primer

AEWhbF

AEWhbF

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Fundamentals of cyber<br />

achieve the complete or partial submission of the enemy at the<br />

earliest possible moment with the minimum expenditure of life and<br />

resources.<br />

b. Distinction. Attacks must only be directed against military<br />

objectives; civilians and civilian objects must not be attacked.<br />

Military objectives are those objects that by their nature, location,<br />

purpose or use make an effective contribution to military action<br />

and whose total or partial destruction, capture or neutralisation,<br />

in the circumstances ruling at the time, offers a definite military<br />

advantage. 15<br />

c. Proportionality. An action is proportionate when it does not<br />

cause incidental civilian harm which is excessive in relation to the<br />

concrete and direct military advantage anticipated.<br />

d. Humanity. The infliction of superfluous injury or unnecessary<br />

suffering is prohibited.<br />

1A.8. Methods of war and protections. The laws governing means and<br />

methods of war and protections apply equally to cyber activity, as they<br />

would traditional methods of warfare. Two examples are listed below but<br />

they are not intended to be definitive of the applicable rules.<br />

a. Acts or threats of violence with a primary purpose to spread<br />

terror among the civilian population are prohibited.<br />

b. Attacks against installations containing dangerous forces,<br />

namely dams, dykes and nuclear electrical generating stations are<br />

prohibited if attacks may cause the release of dangerous forces and<br />

consequent severe losses among the civilian population. Other<br />

military objectives located at, or in the vicinity of, these works or<br />

installations shall not be made the object of attack if such an attack<br />

may cause the release of dangerous forces.<br />

15 Targeting can be challenging in cyber operations due to the potential dual use nature<br />

of some targets, such as infrastructure.<br />

16<br />

<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!