Scenario 18: Legal status of cyber operators during armed conflict
Jump to navigation
Jump to search
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
fill this in!
==Checklist == * Conflict qualification ** Does the situation qualify as either an [[international armed conflict]] or a [[non-international armed conflict]]? * [[Combatancy]] ** Is the State in question a State party to Additional Protocol I? ** Is the State in question a State party to Additional Protocol II? ** Is the person in question assigned to, integrated in or elsewhere affiliated with the military of a State? ** Is the person subject to a hierarchical command structure? ** Does the person wear a uniform or have any other distinctive sign which clearly distinguishes him or her from civilians? ** Does the person qualify as a civilian? * [[Direct participation in hostilities]] ** Does the action by the person support the conduct of hostilities by one party to the conflict? ** Is this support equivalent to conventional military support to the conduct of hostilities? * [[Attacks against persons]] ** If the person in question is located within an object such as a building, does that object qualify as a military objective? ** If the said object is normally dedicated to civilian purposes, is it presently being used to make an effective contribution to military action? ** Would attacking the said object offer a definite military advantage ? ** Would the incidental civilian harm expected to be caused by the attack be excessive in relation to the concrete and direct military advantage anticipated? ** Have all feasible precautions been taken before and during the attack?
Please note that all contributions to International cyber law: interactive toolkit are considered to be released under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) (see
International cyber law: interactive toolkit:Copyrights
for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource.
Do not submit copyrighted work without permission!
(opens in new window)
Retrieved from "
Not logged in
What links here
Get shortened URL