The law of armed conflict implications of covered or concealed cyber operations : perfidy, ruses, and the principle of passive distinction
Gary P. Corn and Peter Pascucci
The impact of emerging technologies on the law of armed conflict
Oxford : Oxford University Press, 2019
Before turning to some hypotheticals for consideration, this chapter briefly describes the operational environment of cyberspace, to include the unique operations security challenges it presents. It then turns to a summary of the relevant law of armed conflict rules most pertinent to assessing the lawfulness of conducting cyber operations by means of covered or concealed infrastructure or methods—the rules governing perfidy; the improper use of flags, signs, or symbols; ruses and other permissible deception; and the passive obligation of distinction.
By entering this website, you consent to the use of technologies, such as cookies and analytics, to customise content, advertising and provide social media features. This will be used to analyse traffic to the website, allowing us to understand visitor preferences and improving our services. Learn more