Abstract
In this chapter it is argued that within the framework of the Law of Armed Conflict (LOAC), attack and kinetic operations can be used as equivalents where military operations that do not constitute attacks have a large overlap with non-kinetic operations. These topics present more than just a linguistic exercise because many (restrictive) rules in LOAC are constructed around the definition of ‘attack’, placing fewer restrictions on other military operations. Traditionally, the qualification of attack is determined by the (intended) physical consequences of a military operation. If it does not (intend to) result in physical consequences, it is not defined as attack. If this approach is applied to non-kinetic military capabilities, especially in cyberspace with its non-physical components, the question is raised whether the traditional physical consequences are still valid criteria for determining whether or not a military operation qualifies as attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
As actually happened in January 2016 when a declassified video was released by the US DoD. See: CNN 2016.
- 2.
Capability is used in the sense of having the will, the knowledge and the means (capacity) to perform a certain action. Once a capability is actually used, it is referred to as an operation.
- 3.
LOAC is also known as Law of War, International Humanitarian Law (IHL) or ius in bello.
- 4.
Ducheine 2015, p. 208.
- 5.
Ducheine 2015, p. 210.
- 6.
Examples of military operations that are not attacks are jamming, psychological operations, (strategic) movements, deception (decoys) or intelligence operations. See for other examples Chap. 9 by Ducheine, Van Haaster and Van Harskamp in this volume.
- 7.
Ducheine and Pouw 2012, p. 33.
- 8.
The overall aim of this volume.
- 9.
DIME is the acronym for Diplomacy, Information, Military and Economy as sources of power of a state.
- 10.
Additional Protocol I, Article 49(1): “‘Attacks’ mean acts of violence against the adversary, whether in offence or in defence”.
- 11.
The Netherlands is one of these states, see for example Parliamentary Papers (Kamerstukken) II 2003–2004, 29 200 X, C, p. 3 “Within NATO, including the Netherlands, it is standing policy that also in operations to which the law of armed conflict formally is not applicable, the restrictions of this body of law (like the prohibition on attacks on the civilian population as such) will be observed” (translation: BvdB).
- 12.
Additional Protocol I, Article 49(1).
- 13.
Henckaerts and Doswald-Beck 2005, black letter rule 1 and 7.
- 14.
Additional Protocol I, Article 48.
- 15.
Hays Parks 1990, p. 114.
- 16.
The Collins English Dictionary 2007 defines attack as: to launch a physical assault (against): to begin hostilities.
- 17.
Sandoz et al. 1987, p. 603.
- 18.
Oeter 2013, p. 167.
- 19.
Bothe et al. 1982, p. 289.
- 20.
- 21.
Levie 1980, p. 61.
- 22.
Additional Protocol I, Article 50(5)(b), emphasis added.
- 23.
Schmitt 2013, p. 106. Although such an attack is forbidden in LOAC amongst others based upon the 1899 Hague Declaration on Asphyxiating gases, it is still an attack.
- 24.
Other examples could be given such as the opening of a dam, resulting in a flood.
- 25.
Bothe et al. 1982, p. 286.
- 26.
Ducheine 2015, p. 221.
- 27.
Kalshoven and Zegveld 2011, p. 100.
- 28.
Schmitt 2013, p. 106.
- 29.
Schmitt 2013, p. 110.
- 30.
Sandoz et al. 1987, p. 603.
- 31.
See for instance Schmitt 2013, part II on the law of cyber armed conflict.
- 32.
Until now there is no authorative definition of the cyber domain, or as it sometimes referred to as cyberspace. For this contribution, the definition as it is given in the Tallinn Manual will be used: The environment formed by physical and non-physical components, characterized by the use of computers and the electromagnetic spectrum, to store, modify, and exchange data using computer networks. Schmitt 2013, p. 258.
- 33.
The cyber domain is regularly referred to as the fifth domain following land, sea, air and space. See for example Defensie Cyber Strategie (Defence Cyber Strategy), Kamerstukken (Parliamentary Papers) II 2011–2012, 33 321 nr 1. Declaration NATO Summit 2016 Warsaw, see the Chapter by Theo Brinkel in this Volume.
- 34.
Gill and Ducheine 2013, p. 438. ILA Report 2014, p. 5.
- 35.
Schmitt 2013, p. 110.
- 36.
(D)DOS: (Distributed) Denial of Service, a situation in which people intentionally prevent a website from operating by sending too many requests to use it (Cambridge Business English Dictionary).
- 37.
Just as with cyberspace there is no authorative definition of cyber operations. For this chapter, again the definition of the Tallinn Manual will be used: The employment of cyber capabilities with the primary purpose of achieving objectives in or by the use of cyberspace, See: Schmitt 2013, p. 258.
- 38.
See for instance back letter rule 30 “definition of cyber attack” in the Tallinn manual and its following commentary (Schmitt 2013, pp. 106–110) that defining cyber attack as: a cyber attack is a cyber operation, whether offensive or defensive, that is reasonably expected to cause injury or death to persons or damage or destruction to objects.
- 39.
Following the widely accepted dichotomy between humans and objects in LOAC.
- 40.
Additional Protocol I, Article 51(2).
- 41.
Sandoz et al. 1987, p. 618. In the Commentary to Additional Protocol I, Article 51(2) they state that breaching this provision is defined a grave breach (Article 85 Additional Protocol I) when it results in death or serious injury to body or health.
- 42.
Additional Protocol I, Article 35(2).
- 43.
- 44.
Like the announcement of terror attacks.
- 45.
Additional Protocol I, Article 52(1).
- 46.
Additional Protocol I, Article 52(2).
- 47.
Sandoz et al. 1987, p. 634.
- 48.
Sandoz et al. 1987, p. 633.
- 49.
For this chapter the definitions of the Tallinn Manual will be used which are: Data: The basic elements that can be processed or produced by a computer (Schmitt 2013, p. 258) and Software: The non-Physical components of a computer system and of cyber infrastructure. These components include programs, applications, and related data (Schmitt 2013, p. 261). The difference will be addressed later in this chapter.
- 50.
Additional Protocol I, Article 52(2).
- 51.
Sandoz et al. 1987, p. 634.
- 52.
Harrison Dinniss 2015, p. 43.
- 53.
Additional Protocol I, Article 52(2).
- 54.
Additional Protocol I, Article 52(2).
- 55.
Harrison Dinniss 2012, p. 3.
- 56.
Mučak 2015, p. 65.
- 57.
Bothe et al. 1982, p. 321.
- 58.
Schmitt 2002, p. 381.
- 59.
As mentioned before, this was ‘any combat action that is aimed at, or results in, physical consequences for the adversary’.
- 60.
Which is logical because “The Rules were adopted employing the principle of consensus”, see Schmitt 2013, p. 6.
- 61.
Schmitt 2013, p. 6.
- 62.
Schmitt 2013, black letter rule 30, p. 106.
- 63.
Schmitt 2013, p. 108.
- 64.
Schmitt 2013, p. 108.
- 65.
Schmitt 2013, p. 109.
- 66.
Schmitt 2013, p. 109.
- 67.
Schmitt 2013, black letter rule 38, p. 125.
- 68.
Schmitt 2013, p. 108.
- 69.
Schmitt 2013, p. 127.
- 70.
The environment formed by physical and non-physical components, characterized by the use of computers and the electromagnetic spectrum, to store, modify, and exchange data using computer networks, see: Schmitt 2013, p. 258.
- 71.
US Department of Defense (2013), JP 3-12: Logical Network Layer and Cyber persona Layer.
- 72.
Ducheine and Van Haaster 2014, p. 310. The Open System Interconnection model: datalink, network, transport, session, presentation and application layers.
- 73.
Harrison Dinniss 2015, p. 41.
- 74.
Harrison Dinniss 2015, p. 41.
- 75.
Harrison Dinniss 2015, p. 41.
- 76.
Ducheine and Van Haaster 2014, p. 310.
- 77.
Harrison Dinniss 2015, p. 41.
- 78.
- 79.
Additional Protocol I, Article 51(1). Emphasis added.
- 80.
Additional Protocol I, Article 52(1). Emphasis added.
- 81.
See the aforementioned discussion on functional disruption.
- 82.
Harrison Dinniss 2015, p. 42.
- 83.
A possible example is changing the blood type in the health record of an enemy wounded soldier in a hospital who, as a result, gets a blood transfusion with blood not of his type.
- 84.
O’Connell 2013, p. 37.
- 85.
Schmitt 2002, p. 378, makes the analogy with psychological operations against the civilian population. As long as they do not cause physical harm (and they are not intended to terrorize), they are entirely permissible.
- 86.
Schmitt 2002, p. 378.
- 87.
Although some writers seem to suggest that if the effects of an operation are limited to cyberspace, these operations are outside the scope of LOAC, Mačak 2015, p. 59. Also see Schmitt 2013 p. 127 where some experts argued that data per se should be regarded as object because otherwise “datasets would potentially escape the regulatory reach of the law of armed conflict” (emphasis added).
- 88.
Droege 2012, p. 533.
- 89.
Droege 2012, p. 555.
- 90.
Think only of the economic effects because of the costs involved in an armed conflict.
- 91.
Additional Protocol I, Article 51(1).
- 92.
See Sect. 14.1 of this chapter.
References
Additional Protocol to the Geneva Conventions of 12 August 1949, and relating to the protection of victims of international armed conflicts (API) of 8 June 1977
Bothe M, Partsch K, Solf W (1982) New rules for victims of armed conflicts. Martinus Nijhoff Publishers, The Hague
CNN (2016) US bombs ISIS cash money. cnn.com (15 January 2016) http://edition.cnn.com/2016/01/15/politics/us-bombs-isis-cash-money-iraq. Accessed 1 March 2017
Defensie Cyber Strategie (2011–2012) Kamerstukken II 2011-2012, 33 321 nr. 1
Droege C (2012) Get off my cloud: Cyber warfare, international humanitarian law and the protection of civilians. International Review of the Red Cross 94(886):533–578
Ducheine P (2015) Non-Kinetic Capabilities: Complementing the Kinetic Prevalence to Targeting. In: Ducheine P, Schmitt M, Osinga F (eds) Targeting: Challenges of Modern Warfare. TMC Asser Press, The Hague, pp 201–220
Ducheine P, Pouw E (2012) Legitimizing the use of force: legal bases for operation Enduring Freedom and ISAF. In: van den Meulen J, Vogelaar A, Beeres R, Soeters J (eds) Mission Uruzgan: collaborating in multiple coalitions for Afghanistan. Amsterdam University Press, Amsterdam, pp 33–46
Ducheine P, van Haaster J (2014) Fighting Power, Targeting and Cyber Operations. In: Brangetti P, Maybaum M, Stinissen J (eds) Proceedings of the 6th International Conference on Cyber Conflict, NATO CCD COE, Tallinn, pp 303–328
Gill T, Ducheine P (2013) Anticipatory self-defense in the cyber context. International Law Studies 89:438–471
Harrison-Dinniss H (2012) Cyber warfare and the laws of war. Cambridge University Press, Cambridge
Harrison-Dinniss H (2015) The nature of objects: Targeting networks and the challenge of defining cyber military objectives. Israel Law Review 48(1):39–54
Hays Parks W (1990) Air war and the law of war. Air Force Law Review 32:1–225
Henckaerts J, Doswald-Beck L (2005) Customary international humanitarian law - Volume 1: Rules. Cambridge University Press, Cambridge
International Law Association Study Group (2014) The conduct of hostilities and international humanitarian law - Challenges of 21st century warfare. http://www.ila-hq.org/en/committees/study_groups.cfm/cid/1040. Accessed 1 March 2017
Kalshoven F, Zegveld L (2011) Constrains on the waging of war, 4th edn. Cambridge University Press, Cambridge
Levie H (1980) Protection of war victims: Protocol I to the 1949 Geneva Conventions (Volume 3). Oceana Publications, New York
Mučák K (2015) Military objectives 2.0: The case for interpreting computer data as objects under international humanitarian law. Israel Law Review 48(1):55–80
O’Connell M (2013) Historical development and legal basis. In: Fleck D (ed) The handbook of international humanitarian law, 3rd edn. Oxford University Press, New York
Oeter S (2013) Methods and means of combat. In: Fleck D (ed) The handbook of international humanitarian law, 3rd edn. Oxford University Press, New York
Sandoz Y, Swinarzki C, Zimmermann B (eds) (1987) Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949. Martinus Nijhoff Publishers, Geneva
Schmitt M (2002) Wired warfare: Computer network attack and jus in bello. International Review of the Red Cross. 84(846):365–399
Schmitt M (ed) (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press, Cambridge UK
US Department of Defense (2013) Joint Publication Cyberspace Operations (JP 3–12(R). http://www.dtic.mil/doctrine/new_pubs/jp3_12R.pdf. Accessed 1 March 2017
Acknowledgements
The author would like to thank Lieutenant Colonel (RNLAF) Guus de Koster and Jeroen van den Boogaard for their most welcome suggestions and assistance.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 T.M.C. Asser Press and the authors
About this chapter
Cite this chapter
van den Bosch, B. (2017). Non-Kinetic Capabilities and the Threshold of Attack in the Law of Armed Conflict. In: Ducheine, P., Osinga, F. (eds) Netherlands Annual Review of Military Studies 2017. NL ARMS. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-189-0_14
Download citation
DOI: https://doi.org/10.1007/978-94-6265-189-0_14
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-188-3
Online ISBN: 978-94-6265-189-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)