Difference between revisions of "Scenario 15: Cyber deception in time of armed conflict"

From International cyber law: interactive toolkit
Jump to navigation Jump to search
m (Kubomacak moved page Scenario 15: Perfidy and ruses of war to Scenario 15: Cyber deception in time of armed conflict: Name change to reflect broader scope)
(Replaced content with "''This page is under construction.''")
Tag: Replaced
(3 intermediate revisions by 2 users not shown)
Line 1: Line 1:
''This page is under construction.''
''This page is under construction.''
[[File:Cyberwar2.jpg|thumb|"Cyber attacks", photo by [https://www.flickr.com/photos/christiaancolen/21205579608/in/photostream/ Christiaan Colen].]]
[Executive summary]
== Scenario ==
=== Keywords ===
International armed conflict, international humanitarian law, perfidy, protective indicators, ruses of war
=== Facts ===
'''[F1]''' IAC between States A and B
'''[F2]''' State A is preparing for a major offensive against State B in region R and needs to sow confusion and weaken the enemy prior to the launching the offensive
'''[F2 bis]''' Wild card (if we have enough space): the whole time State A runs an elaborate deception like in [https://verdict-encrypt.nridigital.com/verdict_encrypt_spring19/beyond_the_honeypot_how_military-inspired_deception_tactics_are_snaring_cybercriminals this article] so that State B’s cyber command is wholly preoccupied trying to get into A’s systems and fails to deal with the other issues (kinda #7 – it’s a honeypot of sorts)
'''[F3]''' State A hacks into the pacemaker of the commander of State B forces in region R and kills him/her (#2 below)
'''[F4]''' State A gets State B forces in R to fight among themselves by hacking into State B’s force tracking system (#6)
'''[F5]''' State A gets civilians to block an important road by falsely suggesting humanitarian aid will be distributed there by the ICRC (#3 below)
=== Examples ===
* [TBC]
== Legal analysis ==
''For a general overview of the structure of analysis in this section, see [[Note on the structure of articles]].''
=== Characterization as an international armed conflict ===
{{#lst:International armed conflict|Definition}}
'''[L1]''' Analysis (very short: yes there is an IAC)
=== Perfidy and ruses ===
- Box on perfidy vs. ruses
'''[L#]''' Analysis (incident-by-incident)
=== Improper use ===
- Box on improper use
'''[L#]''' Analysis (incident-by-incident)
== Checklist ==
* [TBC]
== Appendixes ==
=== See also ===
* [[Military objectives]]
* [[Scenario 10: Cyber weapons review]]
* [[Scenario 12: Cyber operations against computer data]]
* [[Scenario 13: Cyber operations as a trigger of the law of armed conflict]]
=== Notes and references ===
<references />
=== Bibliography and further reading ===
* Gary P Corn and Peter P Pascucci, ‘The Law of Armed Conflict Implications of Covered or Concealed Cyber Operations: Perfidy, Ruses, and the Principle of Passive Distinction’ in Ronald TP Alcala, Eric T Jensen, ''[https://www.oxfordscholarship.com/view/10.1093/oso/9780190915322.001.0001/oso-9780190915322 The Impact of Emerging Technologies on the Law of Armed Conflict]'' (OUP 2019).
*Cordula Droege, ‘[https://www.icrc.org/en/download/file/13738/irrc-886-droege.pdf Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians]’ (2012) 94 IRRC 533.
*Yves Sandoz, Christophe Swinarski, and Bruno Zimmermann (eds), ''[http://www.loc.gov/rr/frd/Military_Law/pdf/Commentary_GC_Protocols.pdf Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949]'' (ICRC 1987).
*Michael N Schmitt (ed), ''[https://doi.org/10.1017/9781316822524 Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations]'' (CUP 2017).
=== Contributions ===
* Scenario by: Jonathan Horowitz & Kubo Mačák
* Analysis by: [TBC]
* Reviewed by: [TBC]
{| class="wikitable"
|Previous: [[Scenario 13: Cyber operations as a trigger of the law of armed conflict|Scenario 13: Armed conflict]]
[[Category:International armed conflict]]
[[Category:International humanitarian law]]
[[Category:Protective indicators]]
[[Category:Ruses of war]]

Latest revision as of 10:27, 26 June 2020

This page is under construction.