01786nas a2200121 4500000000100000008004100001260001500042100001800057245010300075856017700178520129500355022001401650 2023 d c2023-01-101 aNori Katagiri00aHackers of critical infrastructure: expectations and limits of the principle of target distinction uhttps://www.tandfonline.com/doi/pdf/10.1080/13600869.2022.2164462?casa_token=x4eRKiZuOCgAAAAA:ltblpde0i1dH4U2S6nf-DQ9g_QuQnA4me3S3uvmDLzA0uXbb_ZqOuipJb4YNabOgYrZUbOPL14aJOA3 aI explore reasons why existing defense has failed to prevent cyber attacks on critical infrastructure. I study one of the least studied notions of cyberspace behavior known as target distinction. Drawn from customary international law, the principle posits that states should tell their wartime targets between combatants and noncombatants and use force only toward military objects. States should not target critical infrastructure, like gas pipelines, because to do so harms civilian populations who use it. I investigate four issues that keeps the principle from preventing attacks on critical infrastructure. The first is its inability to capture the networked nature of critical infrastructure beyond the simple dual-use (military and cyber) purposes. The second defect is the interpretive confusion that the principle generates over the rules of engagement. The third problem is the omission from its coverage of actors other than nation states. By design, the principle condones cyber attacks by nonstate actors on infrastructure, or by those whose linkage to state sponsors cannot be legally established. Finally, the principle is prone to fail when hackers lack proper understanding of what it does and does not allow. © 2023 Informa UK Limited, trading as Taylor & Francis Group. a1360-0869