Abstract
The security of cyberspace high strategic interest has been particularly intensified since the States have become aware of the possibility of extending their military operations to that virtual space, which has thus become a “fifth domain of warfare”, adding to the terrestrial, maritime, air and space domains. This raises the question of whether current conventional and customary International Humanitarian Law applies to cyber-hostilities, that is, the military operations that the parties to an armed conflict conduct against the adversaries in and through cyberspace. Although the analysis of the application of the current jus in bello to the cyber operations obviously includes many other aspects, the present chapter addresses only two basic issues. The first one focuses on the requirements that, in the absence of conventional hostilities, should concur for the applicability of International Humanitarian Law to operations conducted by cyber means. This makes it necessary to differentiate between international and non-international armed conflicts. The second one is about when cyber operations would be equivalent to “attacks” in the sense of the jus in bello: acts of violence against the adversary, whether in offence or in defence, paying particular attention to the “violence” element of the definition.
Submitted: 26.11.16; Accepted: 20.12.16.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
These are operations directed against or launched from a computer or a system with the objective of infiltrating a system to retrieve, extract, destroy, change or encrypt data up to the manipulation of an industrial infrastructure to control its performance.
References
Dörmann K (2004) Applicability of the additional protocols to computer network attacks ICRC. Retrieved from: https://www.icrc.org/eng/assets/files/other/applicabilityofihltocna.pdf
Droege C (2012) Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the Red Cross 94(886):533–578. Retrieved from: https://www.icrc.org/eng/assets/files/review/2012/irrc-886-droege.pdf
International Committee of the Red Cross (2009) Interpretive guidance on the notion of direct participation in hostilities under international humanitarian law ICRC. Retrieved from: https://www.icrc.org/eng/assets/files/other/icrc-002-0990.pdf
International Committee of the Red Cross (2011) The notion and typology of armed conflicts in international humanitarian law and the challenges of contemporary armed conflicts, 31st international red cross conference, Geneva. Retrieved from: https://app.icrc.org/e-briefing/new-tech-modern-battlefield/media/documents/4-international-humanitarian-law-and-the-challenges-of-contemporary-armed-conflicts.pdf
Langer R (2013) To kill a Centrifuge. Retrieved from: http://www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdf
Melzer N (2011) Cyberwarfare and international law. United Nations Institute for Disarmament Research (UNIDIR). Retrieved from: http://unidir.org/files/publications/pdfs/cyberwarfare-and-international-law-382.pdf
NATO (2014) Wales summit declaration. Cardiff, 5 Sept 2014. Retrieved from: http://www.nato.int/cps/en/natohq/official_texts_112964.htm
NATO (2016) Warsaw summit declaration. Warsaw, 9 July 2016. Retrieved from: http://www.nato.int/cps/en/natohq/official_texts_133169.htm
Pictet JS (1952) Commentary to the Geneva convention for the amelioration of the condition of the wounded and sick in armed forces in the field. ICRC, Geneva
Roscini M (2014) Cyber operations and the use of force in international law. Global Oup. https://global.oup.com/academic/product/cyber-operations-and-the-use-of-force-in-international-law-9780199655014?cc=es&lang=en&
Schmitt MN (2012) International law in cyberspace: the Koh speech and Tallinn manual juxtaposed. Harvard Int Law J 54. Retrieved from: http://www.harvardilj.org/wp-content/uploads/2012/12/HILJ-Online_54_Schmitt.pdf
Tallinn Manual on the International Law Applicable to Cyber Warfare (2013). Cambridge University Press
Schmitt MN (2014) The law of cyber warfare: Quo Vadis? Stanford Law Policy Rev 25:269–299. Retrieved from: https://journals.law.stanford.edu/sites/default/files/stanford-law-policy-review/print/2014/06/schmitt_25_stan._l._poly_rev._269_final.pdf
Schmitt MN (2015a) The law of cyber targeting. Tallinn Paper No 7, NATO CCDCOE. Retrieved from: https://ccdcoe.org/sites/default/files/multimedia/pdf/TP_07_2015.pdf
Schmitt MN (2015b) The notion of ‘objects’ during cyber operations: a risposte in defence of interpretive and applicative precision. Israel Law Review, pp 81–109. Retrieved from: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2557989
UN General Assembly (2015) Group of governmental experts on developments in the field of information and telecommunications in the context of international security. New York, 22 July 2015. Retrieved from: http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174
UN International Law Commission (2001) Draft articles on responsibility of states for internationally wrongful acts, with commentaries. Document A/RES/56/83. Yearbook of the International Law Commission II, Part Two. Retrieved from: http://legal.un.org/ilc/texts/instruments/english/commentaries/9_6_2001.pdf
UN International Tribunal for the Prosecution of Persons Responsible for Serious Violations of International Humanitarian Law in the Territory of the former Yugoslavia (1997) Case nr. IT-94-1-T, Prosecutor v. Tadic, 7 May 1997. Retrieved from: http://www.icty.org/x/cases/tadic/tjug/en/tad-tsj70507JT2-e.pdf
USA White House (2011) International strategy for cyberspace. Prosperity, security, and openness in a networked world. Retrieved from: https://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Domínguez-Bascoy, J., Bauzá-Abril, B. (2017). War-Like Activities in the Cyberspace: Applicability of the Law of Armed Conflicts. In: Ramírez, J., García-Segura, L. (eds) Cyberspace. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-54975-0_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-54975-0_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54974-3
Online ISBN: 978-3-319-54975-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)