

Next, the triggering effects of certain activities rising to the level of use of force or armed attack are considered considered. First, offensive cyber operations hereafter referred to as cyber operations are discussed generically as they pertain to military operations. The focus is offensive cyber operations and the efficacy of existing international law in governing the use of cyber capabilities.

It does not address the full spectrum of cyber operations, namely, defensive cyber operations and cyber exploitation espionage activities. This article discusses the basics of how the Law of Armed Conflict LOAC affects cyber operations. Understanding what law applies within the cyber domain is critical for all operational planners, whether or not they are directly involved in cyber operations. Abstract: The term cyberwar is common in today s discussions of the national security challenges facing the United States and its allies.
