J. van Haaster
- Fighting power, targeting and cyber operations
- Number of pages
- Amsterdam: Amsterdam Center for International Law, University of Amsterdam
- Amsterdam Law School Legal Studies Research Paper
- Volume | Edition (Serie)
- Document type
- Working paper
- Faculty of Law (FdR)
- Amsterdam Center for International Law (ACIL)
This article aims to contribute to the operationalisation of military cyber operations in general, and for targeting purposes (either in defence or offence) in particular. The position of cyber operations in military doctrine will be clarified, their contribution to fighting power conceptualised and the ramifications on targeting processes discussed.
Cyberspace poses unique challenges and opportunities; we distinguish new elements that may be utilized for ‘targeting’, namely: cyber objects and cyber identities. Constructive or disruptive cyber operations aimed at these non-physical elements provide new ways of attaining effects. Assessing the outcome of these cyber operations is, however, challenging for (military) planners. Intertwined network infrastructure and the global nature of cyberspace add to the complexity, but these difficulties can be overcome.
In principle, the targeting cycle is suitable for cyber operations, yet, with an eye to (a) effectiveness of offensive and defensive operations, and (b) legal obligations, special attention will be required regarding effects in general, and collateral damage assessment in particular.
- go to publisher's site
- ACIL Research Paper 2014-04
If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library, or send a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible.