Jump to Content Jump to Main Navigation
Practitioners' Guide to Human Rights Law in Armed Conflict by Murray, Daragh (17th November 2016)

Part II, 15 Cyber Operations

From: Practitioners' Guide to Human Rights Law in Armed Conflict

Daragh Murray
Edited By: Elizabeth Wilmshurst, Françoise Hampson, Charles Garraway, Noam Lubell, Dapo Akande

Subject(s):
Human rights remedies — Armed conflict, international — Armed conflict, non-international — International crimes

This chapter deals with cyber operations undertaken by States during situations of armed conflict. Cyber operations may be divided into two broad categories: cyber operations involving monitoring activities and cyber operations involving effects-based activities. Cyber operations involving monitoring activities collect or gather information but do not modify or interfere with that information in any way. They are passive operations. Effects-based cyber operations are those operations that are not restricted to passive monitoring and which produce a tangible effect, either in cyber space or in the material world. The chapter discusses cyber operations as an ‘attack’ within armed conflict; determining the applicable legal framework; relevant international human rights law requirements; cyber operations and direct participation in hostilities; and cyber operations involving non-State actors occurring in the context of armed conflict.

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.