THE DUAL-USE PROBLEM
International humanitarian law permits attacks on military objectives but forbids strikes on civilian objects. Hyperscale clouds host both — Pentagon JWCC workloads sit on the same physical racks as hospital records, banking systems, and grocery logistics. The targeting question becomes whether the building inherits the protection of its weakest tenant or the vulnerability of its strongest.
WHY THE GULF
AWS, Microsoft, and Google built sovereign-cloud regions in Bahrain and the UAE through the late 2010s to serve Gulf governments that demanded data residency. The same regions now host US Central Command workloads under the Pentagon's JWCC contract. The geography that made the Gulf attractive for low-latency Pentagon access also placed the racks within Iranian missile range.
THE MARTENS CLAUSE
When the law has no rule for a new weapon or target class, the 1899 Martens Clause fills the gap: civilians remain under the protection of 'principles of humanity' and 'dictates of public conscience.' SMEx's argument is that Iran's strikes generated the first state-practice data point for what those principles mean when the target is a cloud region.
THE TALLINN MANUAL GAP
NATO's Tallinn Manual 2.0 (2017) is the closest thing to a rulebook for cyber operations under the laws of war — but it covers attacks on data, not attacks on the buildings that hold the data. Kinetic strikes on data centers fall back to the standard targeting framework: military advantage versus expected civilian harm. No one has applied that calculus to a hyperscaler before March.
WHO LIVES IN A CLOUD REGION
A single AWS region typically hosts tens of thousands of customers across every sector. The proportionality calculation an attacker must run before striking such a target is unprecedented in scale — the 'expected civilian harm' side of the ledger includes hospital systems mid-surgery, financial-settlement engines, and aviation traffic management.
THE PRECEDENT THAT STICKS
International law evolves through state practice — what countries do, and what other countries treat as acceptable. Once a category of target has been hit and the response is condemnation rather than reprisal, the legal threshold has moved. The decisions Western capitals make in the next weeks will shape whether cloud regions become protected infrastructure or normalized targets.