Cyber-Attacks in Accordance with International Humanitarian Law

Authors

DOI:

https://doi.org/10.35516/law.v51i1.786

Keywords:

Cyber-attacks, International Humanitarian Law, armed conflicts

Abstract

Objectives: This study aims to demonstrate the applicability of the rules of international humanitarian law to cyber-attacks, as international humanitarian law aims to regulate the exceptional right to use force to resolve disputes, as such use of force is internationally prohibited under the UN Charter.

Methods: Two approaches were employed in this research. The first is a descriptive-analytical approach, which starts from the description of the phenomenon under question, the legal approach that is taught in political and international system institutions, and the relationship between them. The second is a historical approach, which traces the historical events surrounding the emergence of the term ‘cyber-attacks’.

Results: There are two different approaches regarding the issue of the subordination or non-subordination of cyber-attacks to the provisions of international law, the most likely approach is that cyber-attacks are subject to the provisions of international law. This approach is encouraged so as to avoid falling into the problem of evasion of international responsibility which could then lead to committing more massacres against civilians as a result of the use of cyber-attacks as a weapon.

Conclusions:  The study recommends the necessity of adapting the rules of international humanitarian law to align with the unique nature of cyber attacks and applying them as weapons and methods of warfare in armed conflicts. Efforts should continue to amend these legal rules to achieve explicit international legal regulation for cyber attacks.

Downloads

Download data is not yet available.

References

Jeffrey, T. (2008). Hacking in to international humanitarian law: The principles of distinction and neutrality in the age of cyber warfare, Michigan law review, 106(7), Available at: https://repository.law.umich.edu/mlr/vol106/iss7/6.

Micheal S. Fuertes, (2013). Cyber warfare, Unjust Actins in a just War, Florida International University.

Moreno-Ocampo, L. (2010). The role of the international community in assisting the International Criminal Court to secure justice and accountability. In Confronting genocide (pp. 279-289). Dordrecht: Springer Netherlands.

Moreno-Ocampo, L. (2010). The role of the international community in assisting the International Criminal Court to secure justice and accountability. In Confronting genocide (pp. 279-289). Dordrecht: Springer Netherlands.

Reydams, L., Wouters, J., & Ryngaert, C. (Eds.). (2012). International prosecutors. Oxford University Press, 5, 926-944.

Saalbach,K. (2014). Cyber War, Methods and Practice", Version 9.0, University of Osnabruck-

Schmidt, M. (2002). War through Communication Networks Attack on computer networks, International Journal of the Red Cross. 1(1): 17-41.

Shin. B. (2011). The Cyber Warfare and the Right of Self –Defense: Legal Perspectives and the Case of the United States, IFANS,19(1).

Thomas, F. (2005). Legitimacy after Kosovo and Iraq in international law, The American Journal of International Law, 100(1): 88-106.

Tomar, S. (2014). Proxy Warfare", Journal of Defense Studies,8(2).

Legislation, documents and international agreements:

Charter of the United Nations

The four Geneva Conventions of 1949

The Hague Conventions of 1899-1907

The Tallinn Guide on the Subjecting of Cyber Attacks to the Provisions of International Humanitarian Law 2015-2017

The two Additional Protocols to the Geneva Conventions of 1977.

Published

2024-03-15

How to Cite

Daraji, M. H., & AL-Okour, O. S. . (2024). Cyber-Attacks in Accordance with International Humanitarian Law. Dirasat: Shari’a and Law Sciences, 51(1), 1–12. https://doi.org/10.35516/law.v51i1.786

Issue

Section

Law
Received 2022-03-09
Accepted 2022-09-22
Published 2024-03-15