Danie Sharpe

22%
Flag icon
Take the case of a State that is the victim of cyber operations conducted by non-State actors using cyber infrastructure located in another State and causing major damage to the former’s critical infrastructure. The victim State has the technical ability to respond with operations to shut down the infrastructure used. If doing so would affect the essential interests of other States, the operations are prohibited despite the magnitude of the harm that the victim State is suffering or about to suffer.
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
Rate this book
Clear rating
Open Preview