Skip to main content
Author
Abstract

I explore reasons why existing defense has failed to prevent cyber attacks on critical infrastructure. I study one of the least studied notions of cyberspace behavior known as target distinction. Drawn from customary international law, the principle posits that states should tell their wartime targets between combatants and noncombatants and use force only toward military objects. States should not target critical infrastructure, like gas pipelines, because to do so harms civilian populations who use it. I investigate four issues that keeps the principle from preventing attacks on critical infrastructure. The first is its inability to capture the networked nature of critical infrastructure beyond the simple dual-use (military and cyber) purposes. The second defect is the interpretive confusion that the principle generates over the rules of engagement. The third problem is the omission from its coverage of actors other than nation states. By design, the principle condones cyber attacks by nonstate actors on infrastructure, or by those whose linkage to state sponsors cannot be legally established. Finally, the principle is prone to fail when hackers lack proper understanding of what it does and does not allow. © 2023 Informa UK Limited, trading as Taylor & Francis Group.

Year of Publication
2023
Journal
Informa UK Limited
Date Published
2023-01-10
ISSN Number
1360-0869
URL
https://www.tandfonline.com/doi/pdf/10.1080/13600869.2022.2164462?casa_token=x4eRKiZuOCgAAAAA:ltblpde0i1dH4U2S6nf-DQ9g_QuQnA4me3S3uvmDLzA0uXbb_ZqOuipJb4YNabOgYrZUbOPL14aJOA
DOI
10.1080/13600869.2022.2164462
Download citation