French Application of International Rules to Cyberwarfare

Cyber attackers and associated developers of software are “legitimate targets of military engagement.”

The following example of combatants involved in a conflict are specifically listed as constituting legitimate targets of military engagement:

  • hacking of a military system of a party to armed conflict for intelligence purpose,
  • directly useful in the conflict,
  • installing malicious code,
  • building a botnet to launch a denial of service attacks,
  • developing software for the specific use in later hostile acts (cyberattacks).


via French application of international rules to cyberwarfare


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.