French Application of International Rules to Cyberwarfare

Cyber attackers and associated developers of software are “legitimate targets of military engagement.”

The following example of combatants involved in a conflict are specifically listed as constituting legitimate targets of military engagement:

  • hacking of a military system of a party to armed conflict for intelligence purpose,
  • directly useful in the conflict,
  • installing malicious code,
  • building a botnet to launch a denial of service attacks,
  • developing software for the specific use in later hostile acts (cyberattacks).

 

via French application of international rules to cyberwarfare

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.