TY - JOUR AU - Robin Geiß AU - Henning Lahmann AB - While the rules of the jus in bello are generally operative in cyberspace, it appears to be problematic to apply the fundamental principle of distinction because of the systemic interconnection of military and civilian infrastructure in the cyber realm. In this regard, the application of the accepted legal definition of military objectives will make various components of the civilian cyber infrastructure a legitimate military objective. In order to avoid serious repercussions for the civilian population that might follow from this inherent interconnectedness, different concepts are analysed that could provide potential solutions for a clearer separation of legitimate military targets and protected civilian installations and networks. BT - Cambridge University Press (CUP) DA - 2012-10-30 DO - 10.1017/S0021223712000179 N1 - the approaches discussed range from the exemption of central cyber infrastructure components that serve important civilian functions, to the creation of ‘digital safe havens’ and possible precautionary obligations regarding the segregation of military and civilian networks. As a solution, the authors propose a dynamic interpretation of the wording ‘damage to civilian objects’ within the principle of proportionality of Article 51(5)(b) of Additional Protocol I, an interpretation that would comprise the degradation of the functionality of systems that serve important civilian functions. N2 - While the rules of the jus in bello are generally operative in cyberspace, it appears to be problematic to apply the fundamental principle of distinction because of the systemic interconnection of military and civilian infrastructure in the cyber realm. In this regard, the application of the accepted legal definition of military objectives will make various components of the civilian cyber infrastructure a legitimate military objective. In order to avoid serious repercussions for the civilian population that might follow from this inherent interconnectedness, different concepts are analysed that could provide potential solutions for a clearer separation of legitimate military targets and protected civilian installations and networks. PY - 2012 T2 - Cambridge University Press (CUP) TI - Cyber Warfare: Applying the Principle of Distinction in an Interconnected Space UR - https://www.cambridge.org/core/journals/israel-law-review/article/abs/cyber-warfare-applying-the-principle-of-distinction-in-an-interconnected-space/62FD230E8D5EDB2D6F7226B5F4EDD261 SN - 0021-2237 ER -