CYBER WARFARE AND INTERNATIONAL CYBER LAW: WHITHER?
Author/s: Miodrag N. Simović, PhD,
Pages: 23-37
UDK: 341.48
343.43/.45:004.738.5
DOI: doi.org/10.47152/rkkp.58.3.2
Abstract: This paper analyses historical, sociological and normative aspects of the cyber violence in international relations and international law, aiming to assess the adequacy of the extant international norms for its regulation. It results with the knowledge on the lack of international cooperation and a universal approach, the instrumentalisation of the internet as a means of warfare, lacunae in the relevant legal framework, and the peril of compromisation of the international law. Since the social jeopardy of activities in the cyberspace is hardly measurable and subjected to highly arbitrary interpretations, the problem of the uncertain peacetime or belligerent legal qualification of cyber activities is exposed. The other serios problem is a high risk from potentially disproportional responses of states to the cyber violence. Especially due to the lack of universal international institutions in the field of cyber, it must be concluded that the international lege lata applicable to the cyber violence is not adequate and sustainable. The progressive development of international cyber law is thus suggested, through the pacification of the internet and the international criminalisation of cyber violence.
Keywords: Internet / Cyber warfare / Cyber law / Lawfare
References:
– Carlson, J., Yeomans, N. (1975) Whither Goeth the Law – Humanity and Barbarity. U: Smith, M. & Crossley, D. (ur.) The Way Out – Radical Alternatives in Australia. Melbourne: Landsdowne Press, pp. 5.
– Dabović, D. (2007) Globalizacija prava. Beograd: Pravni fakultet i Službeni glasnik.
– Dunlap, C. J. Jr. (2002) Law and Military Interventions: Preserving Humanitarian Values in 21st Conflicts. Humanitarian Challenges in Military Interventions Conference. Washington D.C: Kennedy School of Government, Harvard University.
– Edlinger, K. (2016) Typology and categorization of armed conflicts under IHL. U: Marchand, C. & Beruto, G. L. (ur.) The Distinction between International and Non-International Armed Conflicts: Challenges for IHL?. Sanremo: The International Institute of Humanitarian Law & Franco Angeli, pp. 39-45.
– Geers, K. (2010) Cyber Weapons Convention. Computer Law & Security Review, 26(5), pp. 547-551, https://doi.org/10.1016/j.clsr.2010.07.005.
– Gervais, M. (2012) Cyber Attacks and Laws of War. Berkeley Journal of International Law, 30(2), pp. 525-579, doi: 10.15779/Z38R66C.
– Henckaerts, J-M., Doswald-Beck, L. (2005) Običajno međunarodno humanitarno pravo. Cambridge: Cambridge University Press, https://doi.org/10.1017/CBO9780511804700.
– ICRC (2013) Handbook of International Rules Governing Military Operations. Geneva: ICRC.
– Kelsen, H. (1944) Peace through Law. Chapel Hill: The University of North Carolina Press.
– Libicki, M. C. (2009) Cyberdeterrence and Cyberwar. Santa Monica: RAND.
– Mosquera, A. B. M., Bachmann, S. D. (2016) Lawfare in Hybrid Wars: The 21st Century Warfare. Journal of International Humanitarian Legal Studies, 7(1), pp. 63–87, https://doi.org/10.1163/18781527-00701008.
– Rašević, Ž. (2017) OTP 1-04 Pravna podrška operacijama. Sarajevo: Zajednički štab Oružanih snaga BiH.
– Rašević, Ž., Vlajnić, J. (2020) Kriminalizacija agresije u savremenom međunarodnom pravu. U: Simović, M. (ur.) Krivično zakonodavstvo i prevencija kriminaliteta. Trebinje: Srpsko udruženje za međunarodnopravnu teoriju i praksu i Ministarstvo pravde RS.
– Roscini, M. (2014) Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press, doi:10.1093/acprof:oso/9780199655014.001.0001.
– Sanders, C. M. (2018) The Battlefield of Tomorrow, Today: Can a Cyber Attack Ever Rise to an “Act of War?”. Utah Law Review, 2018(2).
– Schmitt, M. N. (2017) Tallinn Manual 2.0. on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, https://doi.org/10.1017/9781316822524.
– Schmitt, M. N., Garraway, C., Dinstein, Y. (2006) The Manual on the Law of Non-International Armed Conflict. Sanremo: International Institute of Humanitarian Law.
– Spalević, Ž., Ilić, M. (2017) The Use of Dark Web for the Purpose of Illegal Activity Spreading. Ekonomika, 63(1), doi:10.5937/ekonomika1701073S.
– Tikk, E., Kaska K., Vihul, L. (2010) International Cyber Incidents: Legal Considerations. Talinn: CCDCOE.
– Volzer, M. (2010) Pravedni i nepravedni ratovi. Belgrade: Službeni glasnik.
– Wither, J. K. (2020) Defining Hybrid Warfare. Per Concordiam: Journal of European Security and Defense Issues, 10(1), pp. 7-9.
Other sources:
– Council of Europe (2001) Convention on Cybercrime.
– Council of Europe (2003) Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature
committed through computer systems.
– ICRC (1949) Geneva Conventions.
– ICRC (1977) Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed
Conflicts (Protocol II).
– UN (2000) Convention against Transnational Organized Crime.
– UN General Assembly (2001) GA Res. 56/83: The Articles on State Responsibility UN Doc. A/RES/ 56/83, 12 December 2001.
Online sources:
– Kharpal, A. (2020, May 7th) New cybersecurity report says China-based group is hacking Asia-Pacific governments, CNBC, available at: https://www.cnbc.
com/2020/05/07/chinese-hacking-group-naikon-reportedly-spyingon-asiagovernments.html accessed on 05.06.2020.
– Live Cyber Threat Map, available at: https://threatmap.checkpoint.com/ accessed on 04.06.2020.
– Sanger, D. E., Perlroth, N. (2019, June 15th) U.S. Escalates Online Attacks on Russia’s Power Grid, The New York Times, available at: https://www.
nytimes.com/2019/06/15/us/politics/trump-cyber-russia-grid.html accessed on 05.06.2020.