Legal analysis of the use of force in response to cyber threats in the international arena
Subject Areas : Political and International Researches Quarterlymohadeseh ghavamipoursereshkeh 1 , amirreza mahmoudi 2 , ali jamshidipour 3
1 - Department of law, Lahijan Branch, Islamic Azad University, Lahijan, Iran
2 - Department of law, Lahijan Branch, Islamic Azad University, Lahijan, Iran
3 - Department of law, Lahijan Branch, Islamic Azad University, Lahijan, Iran
Keywords: cyber war, cyber-attack, international law, use of force, legitimate defense, armed attack.,
Abstract :
In today's world, cyber war is a reality and cyber-attacks are increasing. The ability of cyber-attacks to shut down computer systems of nuclear facilities, power grids and air control systems has made these attacks a serious threat to national security. Some scientists believe that cyber-attacks can be a reason to start a war. However, looking at the traditional laws of war, only a small fraction of cyber-attacks can be considered armed attacks. While the international legal system must adapt to this new battlefield, there is currently no stable and effective international law to deter cyber-attacks. In this article, how to apply the existing rules of international law regarding the "use of force" in the framework of the right to use force, against cyber-attacks. The analyzes are carried out within the framework of Article 2(4) of the United Nations Charter prohibiting the use of force, the seventh chapter of ensuring peace and security and the right to legitimate defense contained in Article 51.
1. Aslan Gündüz (1998). Milletlerarası Hukuk Temel Belgeler Örnek Kararlar (3. Baskı). Beta Yayınları.
2. Berdal Aral (1999). Uluslararası Hukukta Meşru Müdafaa Hakkı. Siyasal Kitabevi.
3. Christine Gray (2000). International Law and Use of Force. Oxford University Press.
4. Clay Wilson (2007). Boot nets, Cybercrime, and Cyber terrorism: Vulner abilities and Policy Issues for Congress. http://www.fas.org/sgp/crs/terror/RL32114.pdf
5. Daniel B. Silver (1999). Computer Network Attack as a Use of Force Under Article 2(4) of the United Nations Charter. Computer Network Attack and International Law, 73-98.
6. Declaration on Principles of International Law Concerning Friendly Relations and Cooperation Among States in Accordance with the Charter of the United Nation, G.A.Res. http://www.unhcr.org/refworld/topic,459d17822,459d17a82,3dda1f104,0.html
7. Duncan B. Hollis (1997). Why States Need an International Law for Information Operations. Lewis & Clark Law Review, 11, 1023-1061.
8. Elisabeth Bumiller ve Thom Shanker, 2012, Panetta Warns of Dire Threat of Cyber attack on U.S. The New York Times. http://www.nytimes.com/2012/10/12/world/panetta-warns-of-dire-threat-of-cyberattack.html?pagewan ted=all&_r=0
9. EurActiv (2008, 4 Nisan). NATO Agrees on Common Approach to Cyber Defense. http://www.euractiv.com/en/infosociety/nato-agrees-common-approachcyber-defence/article-171377
10. Fatma Taşdemir (2006). Uluslararası Terörizme Karşı Devletlerin Kuvvete Başvurma Yetkisi (1.Baskı). Siyasal Basın Yayın Dağıtım.
11. Funda Keskin (1998). Uluslararası Hukukta Kuvvet Kullanma: Savaş, Karışma ve Birleşmiş Milletler. Mülkiyeliler Birliği Vakfı Yayınları Tezler Dizisi: 4.
12. Jason Barkham (2001). Information Warfare and International Law on the Use of Force. New York University Journal of International Law & Policy, 34, 57-113.
13. Michael N. Schmitt (1999). Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, Research Publication 1 Information Series. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA471993
14. Matthew J. Sklerov (2009). Solving the Dilemma of State Responses to Cyberattacks: A Justification for the Use of Active Defenses against States Who Neglect their Duty to Prevent. Military Law Review, 201, 1-85. http://www.loc.gov/rr/frd/Military_Law/Military_Law_Review/pdf-files/201-fall-2009.pdf.
15. Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, & Julia Spiegel 2012, The Law of Cyber Attack. California Law Review, 100, 817-886.
16. Richard Garnett ve Paul Clarke (2004). Cyberterrorism: A New Challange for InternationalLaw. A. Bianchi (Ed.), Enforcing International Law Norms against Terrorosim, 465-487.
17. Ronald Deibert (2011). Tracking the Emerging Arms Race in Cyberspace. Bulletin of the Atomic Scientists, 1-8.
18. Ryan Singel (2010, 3 Nisan). White House Cyber Czar: There is no Cyber War. Wired. http://www.wired.com/threatlevel/2010/03/schmidt-cyberwar/
19. Sadi Çaycı (1995). Silahlı Kuvvetlerin Kullanılması. Genelkurmay Basımevi.
20. Seha L. Meray (1975). Devletler Hukukuna Giriş (İkinci Cilt), Yeniden Gözden Geçirilmiş Dördüncü Bası.
21. Sertaç H. Başeren (2003). Uluslararası Hukukta Devletlerin Münferiden Kuvvet Kullanmasının Sınırları. Ankara Üniversitesi Basımevi.
22. The White House (2003). The National Strategy to Secure Cyberspace. http://www.us-cert.gov/reading
23. The White House (2011, May). International Strategy for Cyberspace. http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
24. Thomas Rid (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 35(1), 5-32.
25. Yoram Dinstein (2002). Computer Network Attack and Self-Defense. In Computer Network Attack and International Law (Vol. 76, pp. 99-120). Naval War College International Law Studies, William S. Hein & Co., Inc. https://www.usnwc.edu/getattachment/95012329-e379-4341-bd1d-a4764c84dd4c/Vol--76----ComputerNetwork-Attack-and-Internation.aspx
26. Yoram Dinstein (2001). War, Aggression And Self-Defence. Grotius Publications Limited.