Cyber Primer
AEWhbF
AEWhbF
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Fundamentals of cyber<br />
achieve the complete or partial submission of the enemy at the<br />
earliest possible moment with the minimum expenditure of life and<br />
resources.<br />
b. Distinction. Attacks must only be directed against military<br />
objectives; civilians and civilian objects must not be attacked.<br />
Military objectives are those objects that by their nature, location,<br />
purpose or use make an effective contribution to military action<br />
and whose total or partial destruction, capture or neutralisation,<br />
in the circumstances ruling at the time, offers a definite military<br />
advantage. 15<br />
c. Proportionality. An action is proportionate when it does not<br />
cause incidental civilian harm which is excessive in relation to the<br />
concrete and direct military advantage anticipated.<br />
d. Humanity. The infliction of superfluous injury or unnecessary<br />
suffering is prohibited.<br />
1A.8. Methods of war and protections. The laws governing means and<br />
methods of war and protections apply equally to cyber activity, as they<br />
would traditional methods of warfare. Two examples are listed below but<br />
they are not intended to be definitive of the applicable rules.<br />
a. Acts or threats of violence with a primary purpose to spread<br />
terror among the civilian population are prohibited.<br />
b. Attacks against installations containing dangerous forces,<br />
namely dams, dykes and nuclear electrical generating stations are<br />
prohibited if attacks may cause the release of dangerous forces and<br />
consequent severe losses among the civilian population. Other<br />
military objectives located at, or in the vicinity of, these works or<br />
installations shall not be made the object of attack if such an attack<br />
may cause the release of dangerous forces.<br />
15 Targeting can be challenging in cyber operations due to the potential dual use nature<br />
of some targets, such as infrastructure.<br />
16<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)