Skip to main content

War-Like Activities in the Cyberspace: Applicability of the Law of Armed Conflicts

  • Chapter
  • First Online:
Cyberspace

Abstract

The security of cyberspace high strategic interest has been particularly intensified since the States have become aware of the possibility of extending their military operations to that virtual space, which has thus become a “fifth domain of warfare”, adding to the terrestrial, maritime, air and space domains. This raises the question of whether current conventional and customary International Humanitarian Law applies to cyber-hostilities, that is, the military operations that the parties to an armed conflict conduct against the adversaries in and through cyberspace. Although the analysis of the application of the current jus in bello to the cyber operations obviously includes many other aspects, the present chapter addresses only two basic issues. The first one focuses on the requirements that, in the absence of conventional hostilities, should concur for the applicability of International Humanitarian Law to operations conducted by cyber means. This makes it necessary to differentiate between international and non-international armed conflicts. The second one is about when cyber operations would be equivalent to “attacks” in the sense of the jus in bello: acts of violence against the adversary, whether in offence or in defence, paying particular attention to the “violence” element of the definition.

Submitted: 26.11.16; Accepted: 20.12.16.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    These are operations directed against or launched from a computer or a system with the objective of infiltrating a system to retrieve, extract, destroy, change or encrypt data up to the manipulation of an industrial infrastructure to control its performance.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jerónimo Domínguez-Bascoy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

Domínguez-Bascoy, J., Bauzá-Abril, B. (2017). War-Like Activities in the Cyberspace: Applicability of the Law of Armed Conflicts. In: Ramírez, J., García-Segura, L. (eds) Cyberspace. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-54975-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54975-0_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54974-3

  • Online ISBN: 978-3-319-54975-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics