• Tidak ada hasil yang ditemukan

The regulation of cyber warfare under contemporary international humanitarian law

N/A
N/A
Protected

Academic year: 2023

Membagikan "The regulation of cyber warfare under contemporary international humanitarian law"

Copied!
106
0
0

Teks penuh

This required an in-depth analysis of the prohibition against the use of force as well as the principles of international humanitarian law. The first step was to establish the current position on the prohibition of the use of force and international humanitarian law.

Introduction

The third objective is to determine when cyber operations are prohibited under the prohibition against the use of force clause. It must be determined whether cyber operations are regarded as violence under Article 2(4) and are prohibited as such.

Cyber operations, cyber-attacks and cyber warfare

  • Introduction
  • History and timeline of cyber war
  • Tallinn Manual and Tallinn Manual 2.0
  • Cyber treats, cyber operations and cyber-attacks,
  • Problem with attribution
  • Conclusion

A cyber attack may rise to the level of a threat prohibited under Article 2(4) or not.81. The cyber attack on Tallinn, Estonia was one of the historical turning points for cyber security and gave rise to the start of the CCDCOE as well as the Tallinn Manual and Tallinn Manual 2.0.

Cyber operations/attacks and the prohibition on the use

Introduction

Historical overview on the prohibition of use of force

Peaceful international relations ended again with the outbreak of the Second World War in 1939. This charter established a framework for regulating the use of force by members of the international community151, which is still in force today.

Article 2(4) the prohibition on the use of force

A cyber operation that constitutes a threat or use of force against the territorial integrity or political independence of any country, or that is otherwise inconsistent with the goals of the United Nations, is illegal. This rule echoes what Article 2(4) of the UN Charter provides for all forms of force between states, and applies its strengths to cyber operations.

Forms of prohibited force

According to Roscini, three conditions must be met before Article 2(4) can apply to cyber operations, namely that cyber operations must be attributed to a state; cyber operations must amount to a threat or use of force and the threat or use of force must be exercised within the framework of international relations.184. This position has weight only if, first, economic coercion is seen as an unlawful intervention and, second, if the purpose of the unlawful intervention is to undermine a state's sovereignty through subordination.191 The view that economic coercion is prohibited Article 2(4) If not supported, however, it is accepted that economic coercion undermining the sovereignty of a State is not compatible with the principles of the UN Charter, unless authorized by the Security Council under of Chapter VII.

Cyber operations and the prohibition on the use of force

The question still arises as to what circumstances give rise to a cyber operation reaching the threshold to be considered as use of force. When the connection between a state and a cyber operation is closer, it is more likely that an affected state will regard the cyber operation as a form of violence.234 When a cyber operation falls into the category of presumed legality, it is less likely that the cyber operation will be regarded as a form of violence. of violence by an affected state is considered.236.

Circumstances in which force is permitted without the

The state involvement factor indicates the degree to which a state is involved in a cyber operation against another state and will influence the way in which the affected state will see the intended purpose behind the attack. The prohibited nature of international law235 allows for acts that are not called prohibited, as a result of not being mentioned in international law and are therefore considered legal acts.

Interpretation of article 51 and self-defence

A treaty must be interpreted in good faith in accordance with the ordinary meaning to be given to the terms of the treaty in their context and in the light of its object and purpose. First, he considers the ordinary meaning of the phrase "if an armed attack takes place" in his analysis, referring to the French version of Article 51 and finding that the wording suggests that armed attack is a prerequisite when exercising self-defence .256 Ruys comes to the conclusion that the authors of the UN Charter would have said explicitly that the term should be interpreted broadly, or that they would have excluded the term altogether.257 Secondly, Ruys focuses on the contextual element of Article 31, para. 258 He finds that when Article 51 is read together with Article 53, the meaning is clear that the authors wanted to create a complete prohibition against the use of force that is unilateral and that the UN Security Council is tasked with implementing this prohibition.259 Thirdly . , he interprets the concept in the light of the object and purpose element.260 He finds that the purpose of the UN Charter is to end the use of force that is unilateral and. The analysis carried out by Ruys indicates that Article 51 must be interpreted narrowly and that the phrase "if an armed attack takes place"263 limits the right of states to personal and collective self-defense to kinetic attacks as well as attacks that have already taken place.

Pre-emptive self-defence

Cyberspace consists of internet networks that span the entire globe.284 The transfer of data across the planet is instantaneous and leaves no time to consider whether a suspected cyber operation is a form of aggression or an armed attack. This instantaneous nature of cyberspace complicates the question of when self-defense can be instituted against an armed attack.285 In some cases, the perceived state has only seconds to identify the cyber-armed attack and implement self-defense, resulting in both the intent and imminent outcome of the attack is unclear.286 The only adequate way for a state to defend itself against such an attack is to act preventively, but the difference between preventive measures and prohibited prevention is very small. 287 The ICJ confirmed that preventive action and anticipatory self-defense still form part of international law by endorsing the view that maintains the customary right of self-defense in the Nicaragua case.288 But,. The destructive effects will not be physical and as such will not be considered to be in violation of section 51.290 However, a response that causes physical damage will constitute an offense in terms of section 51, and the consequences of such a response may be greater. be as necessary to repel a cyber-armed attack.291.

Other forms of self-defence

Where the act of self-defense is used to disable an intruding Internet system, is non-destructive to the physical world and only prevents an online system from attacking a state. Actions carried out on non-state actors cannot be considered consistent with state practice.310 The ICJ goes further by stating that an act of self-defense against terrorists requires punitive actions against terrorist bases or the state that harbors them, and that this goes beyond anticipatory self-defense.311 Accordingly, self-defense against terrorism should only be used to prevent future terrorist actions or be sanctioned by the Security Council.312. Humanitarian intervention has been part of international law since before the drafting of the UN Charter in 1945,313 but with the drafting of the Charter, humanitarian intervention was not included as a form of self-defense.314 This form of intervention takes place where states seize into a case to protect non-citizens where they are treated in such a way as to "shock the conscience of mankind".315 Only the Security Council under Chapter VII of the Charter can sanction any form of intervention in this regard.

Conclusion

These differing opinions are relevant to the discussion of how the right to self-defense is implemented against a cyber operation that rises to the level of destruction to be considered violence. Due to the nature of cyber operations, the most effective way for a state to exercise its right to self-defense is to act preemptively. This gives way to the problem of an act of self-defense that is greater than intended to repel an attack on a state.

Cyber warfare and international humanitarian law

Introduction

This has the effect that there is no international element to this type of armed conflict. The purpose of this chapter is to establish the extent to which IHL regulates situations of armed conflict in order to test its applicability in situations where armed conflict is cyber attacks. This chapter starts by analyzing the sources of IHL and their functions in order to provide a basis for the discussion on the regulation of armed conflict.

Sources of IHL

  • Treaties

In 1925, the Geneva Protocol was adopted and with it prohibitive measures against the use of poisonous gases and bacteriological weapons used in warfare.347 This was supplemented in 1972 and 1993 by the Convention on the Prohibition of the Production and Stockpiling of Bacteriological Weapons and the Convention on the Prohibition of the Use chemical weapons.348 The Hague regulations and conventions from 1972 and 1993 are still in force. The 1949 Geneva Conventions are generally seen as a regulatory treaty that protects different categories of people.357 The protections provided by the Geneva Conventions apply only in ICA circumstances, while Common Article 3 protects people in NIAC cases.358 The Geneva Conventions constitute I. and II. Conventions that guarantee the protection of shipwrecked, sick and wounded persons,359 III. the convention guarantees the protection of prisoners of war360, IV. the convention protects civilians of all warring parties.361 Additional protocols are attached to the Geneva Conventions. conventions and are considered international treaties, to which only countries and parties to the Geneva Conventions can become members.365 These additional protocols are considered to be an extension of the Geneva Conventions, which are enforceable only in the member states.366 Additional protocols, however, are largely included in customary law, which is enforceable in all countries.367.

Armed conflicts and IHL (the scope of application)

  • IACs and Common Article 2
  • Common Article 3 and NIACs
  • In the context of cyber space

This definition supports the implication, mentioned above, that the authors of the Geneva Conventions intended the interpretation of armed conflicts to be broad. An impartial humanitarian body, such as the International Committee of the Red Cross, can offer its services to the parties to the conflict. The application of the above provisions will not affect the legal status of the Parties to the conflict.

Principles of IHL

  • Distinction
  • Military necessity
  • Unnecessary suffering
  • Proportionality

Military necessity does not appear in the Geneva Conventions or Additional Protocols,500 but Article 23(g) of the Hague Regulations of 1907501 states the following: It is thus clear that military necessity is an exception to the general rules of Article 35 of Additional Protocols I that may attack or damage civilians and civilian facilities if the outcome of the attack is necessary to achieve a military objective. . The question of whether cyber weapons can be modified can be answered by the continuous testing of cyber weapons by states, as provided for in Article 36 of Additional Protocols I.

Conclusion

Article 44(3) is not always complied with, as can be seen in the example in the book, Black Hawk Down, and as such, actions by perceived civilians can also change their status to that of combatants in relation to Article 51(3) of the Additional Protocols I. Military Necessity is considered an exception to the general rule of Article 35 of Additional Protocols I in that it allows for the death or injury of civilians and/or the destruction of civilian objects when necessary to achieve an intended military objective. The commentary to the Additional Protocols of 8 June 1977, section 1979, states that excessive in relation to proportionality would mean that the damage to civilian objects and/or the death/injury of civilians would be disproportionate to the benefits obtained by engaging the military . objective.

Conclusion

In light of the dominant interpretation of Article 2, para. 4, a note was made by the ICJ in the Nicaragua case that the scale and effect of an attack, rather than the weapon itself, must be examined to determine whether the act of force is prohibited under Article 2(4). This assumption is based on the lack of literature and its application, together with the discussion on protection of the natural environment found in the Tallinn Manual 1.0. In Section 4.4.3, a discussion was conducted on the applicability of the principle of unnecessary suffering to cyberspace.

Referensi

Dokumen terkait

5, 2014 ラン藻の代謝改変によるバイオプラスチック増産 ラン藻代謝工学の新展開 ラン藻は,酸素発生型の光合成を行う細菌である(図 1).淡水,海水,土壌から深海や温泉に至るまで,あら ゆる環境に生育していることが知られている.光合成を 行うことで,光エネルギーと大気中の二酸化炭素の利用 が可能であることから,ラン藻を用いたバイオエネル