scholarly journals International Humanitarian Law: Attack of the Binary Bullet?

2016 ◽  
Vol 9 (4) ◽  
pp. 110
Author(s):  
Helen Wilson ◽  
Patrick van Esch

<p>Cyberspace has emerged as the 5th domain combat zone from which large scale cyber-attacks are launched at an adversary anonymously in milliseconds, by a single stroke on a computer keyboard or mobile device. Such cyber-warfare operations deliberately seek to deceive, degrade, destroy or disrupt computer systems and networks in a battle-space that transcends borders, under the shroud of secrecy to the attacker’s identity or source (Herbert, 2012). Unlike past armed conflicts between nations, conventional weaponry, warring combatants and military objectives were readily identifiable features of the conflict. Cyber-warfare, is asymmetric and can be deceptively and expeditiously instigated by States, Non-State actors, organised groups or sole operators targeting computer networks (e.g. Estonian attack in 2007, Stuxnet attack in 2010).</p>

2020 ◽  
Vol 37 (2) ◽  
pp. 119-141
Author(s):  
국제인도법상 무력충돌의 분류를 위한 사이버 공격의 귀속 연구 Shin

Author(s):  
Laurent Gisel ◽  
Tilman Rodenhäuser ◽  
Knut Dörmann

Abstract The use of cyber operations during armed conflicts and the question of how international humanitarian law (IHL) applies to such operations have developed significantly over the past two decades. In their different roles in the Legal Division of the International Committee of the Red Cross (ICRC), the authors of this article have followed these developments closely and have engaged in governmental and non-governmental expert discussions on the subject. In this article, we analyze pertinent humanitarian, legal and policy questions. We first show that the use of cyber operations during armed conflict has become a reality of armed conflicts and is likely to be more prominent in the future. This development raises a number of concerns in today's increasingly cyber-reliant societies, in which malicious cyber operations risk causing significant disruption and harm to humans. Secondly, we present a brief overview of multilateral discussions on the legal and normative framework regulating cyber operations during armed conflicts, looking in particular at various arguments around the applicability of IHL to cyber operations during armed conflict and the relationship between IHL and the UN Charter. We emphasize that in our view, there is no question that cyber operations during armed conflicts, or cyber warfare, are regulated by IHL – just as is any weapon, means or methods of warfare used by a belligerent in a conflict, whether new or old. Thirdly, we focus the main part of this article on how IHL applies to cyber operations. Analyzing the most recent legal positions of States and experts, we revisit some of the most salient debates of the past decade, such as which cyber operations amount to an “attack” as defined in IHL and whether civilian data enjoys similar protection to “civilian objects”. We also explore the IHL rules applicable to cyber operations other than attacks and the special protection regimes for certain actors and infrastructure, such as medical facilities and humanitarian organizations.


2018 ◽  
Vol 3 (1) ◽  
pp. 49-72
Author(s):  
Christopher Rosana Nyabuto

The military capabilities that the world witnesses in modern day armed conflicts are a sort of science fiction brought to life. Most of the techniques in cyber warfare were never thought possible, let alone anticipated in times past especially during the framing of key International Humanitarian Law (IHL) instruments. This paper analyses the challenges that cyber warfare poses to state responsibility. The analysis also discusses how the anonymity of parties in cyber warfare presents challenges to the application of existing law. The rationale for this study is the fact that cyberspace as a domain of warfare is still in its early days despite the many ambiguities and puzzles it has sparked in various circles of discussion. The study relies on literature reviews and case studies to make its salient points. Ultimately, the study argues that cyber warfare is subject to IHL; however, it breeds new possibilities that may require greater adherence to consistent legal review of weapons and greater willingness of the international community to apply IHL to this domain of warfare.


2020 ◽  
Vol 102 (913) ◽  
pp. 481-492

Executive summary•Cyber operations have become a reality in contemporary armed conflict. The International Committee of the Red Cross (ICRC) is concerned by the potential human cost arising from the increasing use of cyber operations during armed conflicts.•In the ICRC's view, international humanitarian law (IHL) limits cyber operations during armed conflicts just as it limits the use of any other weapon, means or method of warfare in an armed conflict, whether new or old.•Affirming the applicability of IHL does not legitimize cyber warfare, just as it does not legitimize any other form of warfare. Any use of force by States – cyber or kinetic – remains governed by the Charter of the United Nations and the relevant rules of customary international law, in particular the prohibition against the use of force. International disputes must be settled by peaceful means, in cyberspace as in all other domains.•It is now critical for the international community to affirm the applicability of international humanitarian law to the use of cyber operations during armed conflicts. The ICRC also calls for discussions among governmental and other experts on how existing IHL rules apply and whether the existing law is adequate and sufficient. In this respect, the ICRC welcomes the intergovernmental discussions currently taking place in the framework of two United Nations General Assembly mandated processes.•Events of recent years have shown that cyber operations, whether during or outside armed conflict, can disrupt the operation of critical civilian infrastructure and hamper the delivery of essential services to the population. In the context of armed conflicts, civilian infrastructure is protected against cyber attacks by existing IHL principles and rules, in particular the principles of distinction, proportionality and precautions in attack. IHL also affords special protection to hospitals and objects indispensable to the survival of the civilian population, among others.•During armed conflicts, the employment of cyber tools that spread and cause damage indiscriminately is prohibited. From a technological perspective, some cyber tools can be designed and used to target and harm only specific objects and to not spread or cause harm indiscriminately. However, the interconnectivity that characterizes cyberspace means that whatever has an interface with the Internet can be targeted from anywhere in the world and that a cyber attack on a specific system may have repercussions on various other systems. As a result, there is a real risk that cyber tools are not designed or used – either deliberately or by mistake – in compliance with IHL.•States’ interpretation of existing IHL rules will determine the extent to which IHL protects against the effects of cyber operations. In particular, States should take clear positions about their commitment to interpret IHL so as to preserve civilian infrastructure from significant disruption and to protect civilian data. The availability of such positions will also influence the assessment of whether the existing rules are adequate or whether new rules may be needed. If States see a need to develop new rules, they should build on and strengthen the existing legal framework – including IHL.


2021 ◽  
Vol 8 (3) ◽  
pp. 73-90
Author(s):  
Sergei Yu. Garkusha-Bozhko

Information technology development in the modern world affects all spheres of human activity on a global scale, including the sphere of military activities of States. The current level of military information technologies development allows us to talk about a possible new theater of military operations, namely, cyberspace. In this regard, it is necessary to analyze the problem of applying the principles of international humanitarian law (IHL), in particular the principles of distinction, proportionality, and precaution, to armed conflicts in cyberspace, which is the subject of this article. However, the application of the basic principles of this branch of international law in cyberspace raises a number of problematic issues that require in-depth research, specifically the application of principles of IHL to cyberspace. The research of such issues is the purpose of this article. Based on the results of this research, the author came to the following conclusions: 1) the application of the principle of distinction in cyberspace is unlikely to ensure the protection of dual-use objects. More important for the protection of such objects in cyberspace is the principle of proportionality; 2) whether IT companies that supply technical equipment and software for military needs qualify as a military facility depends on how much such a company is involved in procurement activities; 3) objects in cyberspace that support the military potential of a state are not military objects; 4) social networks are not military targets; 5) in the context of an armed conflict in cyberspace, the parties to such conflicts have a duty to carefully check the cyber means used in a cyber-attack for compliance with the prohibition of attacks of an indiscriminate nature; 6) the issue of taking precautionary measures against cyber-attacks and their consequences is at the stage of developing state practices. However, it should be assumed that this fact does not negate the obligation of States to take such measures in the event of cyber-attacksthis obligation lies with the States due to the application of the principles of IHL to cyberspace.


2021 ◽  
Vol 11 (2) ◽  
pp. 1-11
Author(s):  
Steven Kleemann

Cyber warfare is a timely and relevant issue and one of the most controversial in international humanitarian law (IHL). The aim of IHL is to set rules and limits in terms of means and methods of warfare. In this context, a key question arises: Has digital warfare rules or limits, and if so, how are these applicable? Traditional principles, developed over a long period, are facing a new dimension of challenges due to the rise of cyber warfare. This paper argues that to overcome this new issue, it is critical that new humanity-oriented approaches is developed with regard to cyber warfare. The challenge is to establish a legal regime for cyber-attacks, successfully addressing human rights norms and standards. While clarifying this from a legal perspective, the authors can redesign the sensitive equilibrium between humanity and military necessity, weighing the humanitarian aims of IHL and the protection of civilians—in combination with international human rights law and other relevant legal regimes—in a different manner than before.


2016 ◽  
Vol 24 (1) ◽  
pp. 38-52 ◽  
Author(s):  
Kosmas Pipyros ◽  
Lilian Mitrou ◽  
Dimitris Gritzalis ◽  
Theodoros Apostolopoulos

Purpose – The increasing number of cyber attacks has transformed the “cyberspace” into a “battlefield”, bringing out “cyber warfare” as the “fifth dimension of war” and emphasizing the States’ need to effectively protect themselves against these attacks. The existing legal framework seem inadequate to deal effectively with cyber operations and, from a strictly legal standpoint, it indicates that addressing cyber attacks does not fall within the jurisdiction of just one legal branch. This is mainly because of the fact that the concept of cyber warfare itself is open to many different interpretations, ranging from cyber operations performed by the States within the context of armed conflict, under International Humanitarian Law, to illicit activities of all kinds performed by non-State actors including cybercriminals and terrorist groups. The paper initially presents major cyber-attack incidents and their impact on the States. On this basis, it examines the existing legal framework at the European and international levels. Furthermore, it approaches “cyber warfare” from the perspective of international law and focuses on two major issues relating to cyber operations, i.e. “jurisdiction” and “attribution”. The multi-layered process of attribution in combination with a variety of jurisdictional bases in international law makes the successful tackling of cyber attacks difficult. The paper aims to identify technical, legal and, last but not least, political difficulties and emphasize the complexity in applying international law rules in cyber operations. Design/methodology/approach – The paper focuses on the globalization of the “cyber warfare phenomenon” by observing its evolutionary process from the early stages of its appearance until today. It examines the scope, duration and intensity of major cyber-attacks throughout the years in relation to the reactions of the States that were the victims. Having this as the base of discussion, it expands further by exemplifying “cyber warfare” from the perspective of the existing European and International legal framework. The main aim of this part is to identify and analyze major obstacles that arise, for instance in terms of “jurisdiction” and “attribution” in applying international law rules to “cyber warfare”. Findings – The absence of a widely accepted legal framework to regulate jurisdictional issues of cyber warfare and the technical difficulties in identifying, with absolute certainty, the perpetrators of an attack, make the successful tackling of cyber attacks difficult. Originality/value – The paper fulfills the need to identify difficulties in applying international law rules in cyber warfare and constitutes the basis for the creation of a method that will attempt to categorize and rank cyber operations in terms of their intensity and seriousness.


2017 ◽  
Vol 10 (1) ◽  
pp. 1-34 ◽  
Author(s):  
Hemen Philip Faga

AbstractThis paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL) with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.


Author(s):  
Tilman Rodenhäuser

Chapter 2 examines international humanitarian law treaties. Using classical treaty interpretation methods, it establishes what degree of organization is required from a non-state armed group to become ‘Party to the conflict’ under article 3 common to the four Geneva Conventions, or an ‘organized armed group’ under article 1(1) of the Additional Protocol II or under the ICC Statute. Chapter 2 also analyses the travaux préparatoires of the different treaties, subsequent practice, and engages with the main doctrinal debates surrounding these questions. By subjecting the three treaties to thorough analysis, the chapter presents concise interpretations of the relevant organizational requirements, and compares the different thresholds. It also identifies and addresses under-researched questions, such as whether the organization criterion under international humanitarian law requires the capacity to implement the entirety of the applicable law.


1978 ◽  
Vol 18 (206) ◽  
pp. 274-284 ◽  
Author(s):  
Yves Sandoz

The events in Lebanon and the despatch of a UN armed force to keep the peace there brings into focus a problem which cannot be ignored, the application of international humanitarian law in armed conflicts. This problem has two aspects:— What is the nature of the armed forces which the UN commits or can commit at the present time?— To what extent are these armed forces obliged to apply humanitarian law?


Sign in / Sign up

Export Citation Format

Share Document