Untangling Threaths Humanitarian Law’s Adaptation to Determine Cyber Operations in Armed Conflict

Gabriela Meinar Regina, Davilla Prawidya Azaria

Abstract


This discussion highlights the need to evaluate international legal systems to effectively deal with the complex challenges posed by cyber attacks in armed conflicts. The Tallinn Manual, created by a group of legal experts, serves as a comprehensive guide for navigating this constantly changing landscape, offering a common language and framework for addressing cyber threats worldwide. Following its recommendations has significant legal and political implications, offering important clarification on how existing legal rules apply to cyberspace. At the same time, it shows a commitment to upholding the rule of law in this rapidly changing environment. However, ongoing challenges like evolving technology and issues with attribution emphasize the importance of international cooperation and flexible legal approaches in creating norms and principles for governing cyber operations.

Keywords


Armed conflict, Conduct of war, Cyber attack, International humanitarian law.

Full Text:

PDF

References


Crumbaugh, B.S., Jennifer A. (2008). The Morality of A U.S. Preemptive Strike on Iran’s Nuclear Program: A Just War Analysis. Georgetown University Washington, D.C.

European Commission. (2010, August 26). Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions: A Digital Agenda for Europe. accessed August 28, 2023, http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52010DC0245R(01)&from=EN.

ICJ. (1996, July 8). The legality of the Threat or Use of Nuclear Weapons, Advisory Opinion. ICJ Rep. The Netherlands: The Hague.

Garrie, D. (2012). “Cyber Warfare, What Are the Rules?” Source: Journal of Law & Cyber Warfare 1 (1).

Gechlik, Mei. n.d. “Appropriate Norms of State Behavior in Cyberspace: Governance in China and Opportunities for US Businesses. A Hoover Institution Aegis Series Paper No. 1706.

Geneva Conventions (1949).

Haaretz, Israel Suffered Massive Cyber Attack During Gaza Offensive, accessed August 28, 2023, https://www.haaretz.com/1.5065382.

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security 4(2), 49-60.

Kovács, L (2018). Cyber Security Policy and Strategy in the European Union and Nato. Land Forces Academy Review 23 (1): 16–24.

Kumar, A. (2019). Placing Cyber Warfare Within The Rome Statute Framework. A Reflection Journal, Vol.70.

Lancelot, J.F. (2020). Cyber-Diplomacy: Cyberwarfare and the Rules of Engagement. Journal of Cyber Security Technology, 1–15.

Lewis, J. (2002). Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. Center for Strategic and International Studies.

Maskun, M., and Azhar, R. (2021). Cyber Warfare: National Security in Dealing with a Changing Method of War. Kanun Jurnal Ilmu Hukum 23 (3), 477–90.

Menski, W (2006). Comparative Law in a Global Context, The Legal Systems of Asia and Africa. Cambridge: Cambridge University Press.

Michael N.S., (2017) Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, Cambridge University Press.

Nguyen, NK. (2014). The International Humanitarian Law Implications of the ‘Tallinn Manual. E-International Relations, 1-9.

NYTimes, Obama Order Sped Up Wave of Cyberattacks Against Iran. accessed August 28 2023, The New York Times: Middle East, http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave- of-Cyber attacks-against iran.html?_r=2&.

Simović, M., Živorad R., and Simović, V. (2020). Cyber Warfare and International Cyber Law: Whither.? Journal of Criminology and Criminal Law 58 (3): 23–37.

Priyono, U. (2022). Cyber Warfare as Part of Russia and Ukraine Conflict. Jurnal Diplomasi Pertahanan 8 (2): 44.

Protocol Additionals to The Geneva Conventions (1977).

Robinson, M., Jones, K., and Janicke H. (2015). Cyber Warfare: Issues and Challenges. Computers & Security 49 (March), 70–94.

Schmitt, M. (2012). International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed. Harvard International Law Journal, Volume 54.

Suharto, M. A. (2015) “Analisis Yuridis Mengenai Cyber Attack Dalam Cyber Warfare Berdasarkan Hukum Humaniter Internasional (Studi Kasus Cyber Attack Negara Amerika Serikat Terhadap Program Pengembangan Nuklir Negara Iran Pada Tahun 2009).” Brawijaya Law Student Journal (3).

Tabansky, L. (2011). Basic Concepts in Cyber Warfare. Military and Strategic Affairs Volume 3.

ThreatMap, Live Cyber Threat Map, accessed August 30 2023, https://threatmap.checkpoint.com/.

Vatis, Michael A. (2010). Proceedings of a Workshop on Deterring CyberAttacks: Informing Strategies and Developing Options for U.S. Policy. National Research Council.

Wang, G. (2021). Are There International Rules Governing Cyberspace.? Journal of International and Comparative Law 8:2, 357-384.

Werner, W. G., & Kessler, O. (2013). Expertise, uncertainty and international law, a study of the Tallinn manual on cyberwarfare. Leiden Journal of International law, 26(04), 793-810.




DOI: https://doi.org/10.24815/sklj.v8i1.37452

Article Metrics

Abstract view : 0 times
PDF - 0 times

Copyright (c) 2024 Syiah Kuala Law Journal

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

 

Creative Commons License

Syiah Kuala Law Journal published by Magister Ilmu Hukum Fakultas Hukum Universitas Syiah Kuala is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at http://jurnal.usk.ac.id/SKLJ.