Skip to main content

Non-Kinetic Capabilities and the Threshold of Attack in the Law of Armed Conflict

  • Chapter
  • First Online:
Netherlands Annual Review of Military Studies 2017

Part of the book series: NL ARMS ((NLARMS))

  • 657 Accesses

Abstract

In this chapter it is argued that within the framework of the Law of Armed Conflict (LOAC), attack and kinetic operations can be used as equivalents where military operations that do not constitute attacks have a large overlap with non-kinetic operations. These topics present more than just a linguistic exercise because many (restrictive) rules in LOAC are constructed around the definition of ‘attack’, placing fewer restrictions on other military operations. Traditionally, the qualification of attack is determined by the (intended) physical consequences of a military operation. If it does not (intend to) result in physical consequences, it is not defined as attack. If this approach is applied to non-kinetic military capabilities, especially in cyberspace with its non-physical components, the question is raised whether the traditional physical consequences are still valid criteria for determining whether or not a military operation qualifies as attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 64.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    As actually happened in January 2016 when a declassified video was released by the US DoD. See: CNN 2016.

  2. 2.

    Capability is used in the sense of having the will, the knowledge and the means (capacity) to perform a certain action. Once a capability is actually used, it is referred to as an operation.

  3. 3.

    LOAC is also known as Law of War, International Humanitarian Law (IHL) or ius in bello.

  4. 4.

    Ducheine 2015, p. 208.

  5. 5.

    Ducheine 2015, p. 210.

  6. 6.

    Examples of military operations that are not attacks are jamming, psychological operations, (strategic) movements, deception (decoys) or intelligence operations. See for other examples Chap. 9 by Ducheine, Van Haaster and Van Harskamp in this volume.

  7. 7.

    Ducheine and Pouw 2012, p. 33.

  8. 8.

    The overall aim of this volume.

  9. 9.

    DIME is the acronym for Diplomacy, Information, Military and Economy as sources of power of a state.

  10. 10.

    Additional Protocol I, Article 49(1): “‘Attacks’ mean acts of violence against the adversary, whether in offence or in defence”.

  11. 11.

    The Netherlands is one of these states, see for example Parliamentary Papers (Kamerstukken) II 20032004, 29 200 X, C, p. 3 “Within NATO, including the Netherlands, it is standing policy that also in operations to which the law of armed conflict formally is not applicable, the restrictions of this body of law (like the prohibition on attacks on the civilian population as such) will be observed” (translation: BvdB).

  12. 12.

    Additional Protocol I, Article 49(1).

  13. 13.

    Henckaerts and Doswald-Beck 2005, black letter rule 1 and 7.

  14. 14.

    Additional Protocol I, Article 48.

  15. 15.

    Hays Parks 1990, p. 114.

  16. 16.

    The Collins English Dictionary 2007 defines attack as: to launch a physical assault (against): to begin hostilities.

  17. 17.

    Sandoz et al. 1987, p. 603.

  18. 18.

    Oeter 2013, p. 167.

  19. 19.

    Bothe et al. 1982, p. 289.

  20. 20.

    Sandoz et al. 1987, p. 603; Oeter 2013, p. 167.

  21. 21.

    Levie 1980, p. 61.

  22. 22.

    Additional Protocol I, Article 50(5)(b), emphasis added.

  23. 23.

    Schmitt 2013, p. 106. Although such an attack is forbidden in LOAC amongst others based upon the 1899 Hague Declaration on Asphyxiating gases, it is still an attack.

  24. 24.

    Other examples could be given such as the opening of a dam, resulting in a flood.

  25. 25.

    Bothe et al. 1982, p. 286.

  26. 26.

    Ducheine 2015, p. 221.

  27. 27.

    Kalshoven and Zegveld 2011, p. 100.

  28. 28.

    Schmitt 2013, p. 106.

  29. 29.

    Schmitt 2013, p. 110.

  30. 30.

    Sandoz et al. 1987, p. 603.

  31. 31.

    See for instance Schmitt 2013, part II on the law of cyber armed conflict.

  32. 32.

    Until now there is no authorative definition of the cyber domain, or as it sometimes referred to as cyberspace. For this contribution, the definition as it is given in the Tallinn Manual will be used: The environment formed by physical and non-physical components, characterized by the use of computers and the electromagnetic spectrum, to store, modify, and exchange data using computer networks. Schmitt 2013, p. 258.

  33. 33.

    The cyber domain is regularly referred to as the fifth domain following land, sea, air and space. See for example Defensie Cyber Strategie (Defence Cyber Strategy), Kamerstukken (Parliamentary Papers) II 2011–2012, 33 321 nr 1. Declaration NATO Summit 2016 Warsaw, see the Chapter by Theo Brinkel in this Volume.

  34. 34.

    Gill and Ducheine 2013, p. 438. ILA Report 2014, p. 5.

  35. 35.

    Schmitt 2013, p. 110.

  36. 36.

    (D)DOS: (Distributed) Denial of Service, a situation in which people intentionally prevent a website from operating by sending too many requests to use it (Cambridge Business English Dictionary).

  37. 37.

    Just as with cyberspace there is no authorative definition of cyber operations. For this chapter, again the definition of the Tallinn Manual will be used: The employment of cyber capabilities with the primary purpose of achieving objectives in or by the use of cyberspace, See: Schmitt 2013, p. 258.

  38. 38.

    See for instance back letter rule 30 “definition of cyber attack” in the Tallinn manual and its following commentary (Schmitt 2013, pp. 106–110) that defining cyber attack as: a cyber attack is a cyber operation, whether offensive or defensive, that is reasonably expected to cause injury or death to persons or damage or destruction to objects.

  39. 39.

    Following the widely accepted dichotomy between humans and objects in LOAC.

  40. 40.

    Additional Protocol I, Article 51(2).

  41. 41.

    Sandoz et al. 1987, p. 618. In the Commentary to Additional Protocol I, Article 51(2) they state that breaching this provision is defined a grave breach (Article 85 Additional Protocol I) when it results in death or serious injury to body or health.

  42. 42.

    Additional Protocol I, Article 35(2).

  43. 43.

    Bothe et al. 1982, p. 196. See also Schmitt 2013, p. 108. Since terror is a psychological condition resulting in mental suffering, inclusion of such suffering in this Rule is supportable through analogy.

  44. 44.

    Like the announcement of terror attacks.

  45. 45.

    Additional Protocol I, Article 52(1).

  46. 46.

    Additional Protocol I, Article 52(2).

  47. 47.

    Sandoz et al. 1987, p. 634.

  48. 48.

    Sandoz et al. 1987, p. 633.

  49. 49.

    For this chapter the definitions of the Tallinn Manual will be used which are: Data: The basic elements that can be processed or produced by a computer (Schmitt 2013, p. 258) and Software: The non-Physical components of a computer system and of cyber infrastructure. These components include programs, applications, and related data (Schmitt 2013, p. 261). The difference will be addressed later in this chapter.

  50. 50.

    Additional Protocol I, Article 52(2).

  51. 51.

    Sandoz et al. 1987, p. 634.

  52. 52.

    Harrison Dinniss 2015, p. 43.

  53. 53.

    Additional Protocol I, Article 52(2).

  54. 54.

    Additional Protocol I, Article 52(2).

  55. 55.

    Harrison Dinniss 2012, p. 3.

  56. 56.

    Mučak 2015, p. 65.

  57. 57.

    Bothe et al. 1982, p. 321.

  58. 58.

    Schmitt 2002, p. 381.

  59. 59.

    As mentioned before, this was ‘any combat action that is aimed at, or results in, physical consequences for the adversary’.

  60. 60.

    Which is logical because “The Rules were adopted employing the principle of consensus”, see Schmitt 2013, p. 6.

  61. 61.

    Schmitt 2013, p. 6.

  62. 62.

    Schmitt 2013, black letter rule 30, p. 106.

  63. 63.

    Schmitt 2013, p. 108.

  64. 64.

    Schmitt 2013, p. 108.

  65. 65.

    Schmitt 2013, p. 109.

  66. 66.

    Schmitt 2013, p. 109.

  67. 67.

    Schmitt 2013, black letter rule 38, p. 125.

  68. 68.

    Schmitt 2013, p. 108.

  69. 69.

    Schmitt 2013, p. 127.

  70. 70.

    The environment formed by physical and non-physical components, characterized by the use of computers and the electromagnetic spectrum, to store, modify, and exchange data using computer networks, see: Schmitt 2013, p. 258.

  71. 71.

    US Department of Defense (2013), JP 3-12: Logical Network Layer and Cyber persona Layer.

  72. 72.

    Ducheine and Van Haaster 2014, p. 310. The Open System Interconnection model: datalink, network, transport, session, presentation and application layers.

  73. 73.

    Harrison Dinniss 2015, p. 41.

  74. 74.

    Harrison Dinniss 2015, p. 41.

  75. 75.

    Harrison Dinniss 2015, p. 41.

  76. 76.

    Ducheine and Van Haaster 2014, p. 310.

  77. 77.

    Harrison Dinniss 2015, p. 41.

  78. 78.

    Mučak 2015, p. 64. This dichotomy is found in many other places e.g. Sandoz et al. 1987, p. 635 and Schmitt 2013 the structure of part 4.

  79. 79.

    Additional Protocol I, Article 51(1). Emphasis added.

  80. 80.

    Additional Protocol I, Article 52(1). Emphasis added.

  81. 81.

    See the aforementioned discussion on functional disruption.

  82. 82.

    Harrison Dinniss 2015, p. 42.

  83. 83.

    A possible example is changing the blood type in the health record of an enemy wounded soldier in a hospital who, as a result, gets a blood transfusion with blood not of his type.

  84. 84.

    O’Connell 2013, p. 37.

  85. 85.

    Schmitt 2002, p. 378, makes the analogy with psychological operations against the civilian population. As long as they do not cause physical harm (and they are not intended to terrorize), they are entirely permissible.

  86. 86.

    Schmitt 2002, p. 378.

  87. 87.

    Although some writers seem to suggest that if the effects of an operation are limited to cyberspace, these operations are outside the scope of LOAC, Mačak 2015, p. 59. Also see Schmitt 2013 p. 127 where some experts argued that data per se should be regarded as object because otherwise “datasets would potentially escape the regulatory reach of the law of armed conflict” (emphasis added).

  88. 88.

    Droege 2012, p. 533.

  89. 89.

    Droege 2012, p. 555.

  90. 90.

    Think only of the economic effects because of the costs involved in an armed conflict.

  91. 91.

    Additional Protocol I, Article 51(1).

  92. 92.

    See Sect. 14.1 of this chapter.

References

  • Additional Protocol to the Geneva Conventions of 12 August 1949, and relating to the protection of victims of international armed conflicts (API) of 8 June 1977

    Google Scholar 

  • Bothe M, Partsch K, Solf W (1982) New rules for victims of armed conflicts. Martinus Nijhoff Publishers, The Hague

    Google Scholar 

  • CNN (2016) US bombs ISIS cash money. cnn.com (15 January 2016) http://edition.cnn.com/2016/01/15/politics/us-bombs-isis-cash-money-iraq. Accessed 1 March 2017

  • Defensie Cyber Strategie (2011–2012) Kamerstukken II 2011-2012, 33 321 nr. 1

    Google Scholar 

  • Droege C (2012) Get off my cloud: Cyber warfare, international humanitarian law and the protection of civilians. International Review of the Red Cross 94(886):533–578

    Google Scholar 

  • Ducheine P (2015) Non-Kinetic Capabilities: Complementing the Kinetic Prevalence to Targeting. In: Ducheine P, Schmitt M, Osinga F (eds) Targeting: Challenges of Modern Warfare. TMC Asser Press, The Hague, pp 201–220

    Google Scholar 

  • Ducheine P, Pouw E (2012) Legitimizing the use of force: legal bases for operation Enduring Freedom and ISAF. In: van den Meulen J, Vogelaar A, Beeres R, Soeters J (eds) Mission Uruzgan: collaborating in multiple coalitions for Afghanistan. Amsterdam University Press, Amsterdam, pp 33–46

    Google Scholar 

  • Ducheine P, van Haaster J (2014) Fighting Power, Targeting and Cyber Operations. In: Brangetti P, Maybaum M, Stinissen J (eds) Proceedings of the 6th International Conference on Cyber Conflict, NATO CCD COE, Tallinn, pp 303–328

    Google Scholar 

  • Gill T, Ducheine P (2013) Anticipatory self-defense in the cyber context. International Law Studies 89:438–471

    Google Scholar 

  • Harrison-Dinniss H (2012) Cyber warfare and the laws of war. Cambridge University Press, Cambridge

    Google Scholar 

  • Harrison-Dinniss H (2015) The nature of objects: Targeting networks and the challenge of defining cyber military objectives. Israel Law Review 48(1):39–54

    Google Scholar 

  • Hays Parks W (1990) Air war and the law of war. Air Force Law Review 32:1–225

    Google Scholar 

  • Henckaerts J, Doswald-Beck L (2005) Customary international humanitarian law - Volume 1: Rules. Cambridge University Press, Cambridge

    Google Scholar 

  • International Law Association Study Group (2014) The conduct of hostilities and international humanitarian law - Challenges of 21st century warfare. http://www.ila-hq.org/en/committees/study_groups.cfm/cid/1040. Accessed 1 March 2017

  • Kalshoven F, Zegveld L (2011) Constrains on the waging of war, 4th edn. Cambridge University Press, Cambridge

    Google Scholar 

  • Levie H (1980) Protection of war victims: Protocol I to the 1949 Geneva Conventions (Volume 3). Oceana Publications, New York

    Google Scholar 

  • Mučák K (2015) Military objectives 2.0: The case for interpreting computer data as objects under international humanitarian law. Israel Law Review 48(1):55–80

    Google Scholar 

  • O’Connell M (2013) Historical development and legal basis. In: Fleck D (ed) The handbook of international humanitarian law, 3rd edn. Oxford University Press, New York

    Google Scholar 

  • Oeter S (2013) Methods and means of combat. In: Fleck D (ed) The handbook of international humanitarian law, 3rd edn. Oxford University Press, New York

    Google Scholar 

  • Sandoz Y, Swinarzki C, Zimmermann B (eds) (1987) Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949. Martinus Nijhoff Publishers, Geneva

    Google Scholar 

  • Schmitt M (2002) Wired warfare: Computer network attack and jus in bello. International Review of the Red Cross. 84(846):365–399

    Google Scholar 

  • Schmitt M (ed) (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press, Cambridge UK

    Google Scholar 

  • US Department of Defense (2013) Joint Publication Cyberspace Operations (JP 3–12(R). http://www.dtic.mil/doctrine/new_pubs/jp3_12R.pdf. Accessed 1 March 2017

Download references

Acknowledgements

The author would like to thank Lieutenant Colonel (RNLAF) Guus de Koster and Jeroen van den Boogaard for their most welcome suggestions and assistance.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bart van den Bosch .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 T.M.C. Asser Press and the authors

About this chapter

Cite this chapter

van den Bosch, B. (2017). Non-Kinetic Capabilities and the Threshold of Attack in the Law of Armed Conflict. In: Ducheine, P., Osinga, F. (eds) Netherlands Annual Review of Military Studies 2017. NL ARMS. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-189-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-94-6265-189-0_14

  • Published:

  • Publisher Name: T.M.C. Asser Press, The Hague

  • Print ISBN: 978-94-6265-188-3

  • Online ISBN: 978-94-6265-189-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics