Difference between revisions of "Scenario 10: Legal review of cyber weapons"

Jump to navigation Jump to search
m (category added)
(__NUMBEREDHEADINGS__)
__NUMBEREDHEADINGS__
[[File:Cyberweapon.jpg|thumb|© Reeh. Licensed from Shutterstock.]]<!-- Photo free for commercial use, no attribution required, CC0 creative commons source: https://pixabay.com/en/hacker-theft-security-computer-3641937/ -->
[[File:Cyberweapon.jpg|thumb|© Reeh. Licensed from Shutterstock.]]
State A develops new malware capable of physical destruction of enemy military equipment. However, if released, it is also expected to result in the temporary impairment of the use of civilian cyber infrastructure through which it may spread in order to reach its target. This scenario considers State obligations to conduct a weapons review with respect to cyber capabilities of this kind potentially already in peacetime, well before they may actually be deployed in time of armed conflict. In particular, it examines whether such malware constitutes a weapon that is inherently indiscriminate and therefore prohibited by IHL.