{"id":17761,"date":"2018-08-15T16:52:22","date_gmt":"2018-08-15T11:52:22","guid":{"rendered":"http:\/\/jworldtimes.com\/old-site\/jwt2015\/?p=17761"},"modified":"2019-11-20T14:27:51","modified_gmt":"2019-11-20T09:27:51","slug":"international-law-and-cyber-warfare","status":"publish","type":"post","link":"https:\/\/www.jworldtimes.com\/old-site\/internationalaffairs\/international-law-and-cyber-warfare\/","title":{"rendered":"INTERNATIONAL LAW AND CYBER WARFARE"},"content":{"rendered":"<h3 style=\"text-align: center;\"><a href=\"http:\/\/jworldtimes.com\/old-site\/jwt2015\/wp-content\/uploads\/2018\/08\/INTERNATIONAL-LAW-APPLICABLE-TO-THE-CYBER-WARFARE.jpg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-17762\" src=\"http:\/\/jworldtimes.com\/old-site\/jwt2015\/wp-content\/uploads\/2018\/08\/INTERNATIONAL-LAW-APPLICABLE-TO-THE-CYBER-WARFARE.jpg\" alt=\"INTERNATIONAL LAW AND CYBER WARFARE\" width=\"625\" height=\"386\" srcset=\"https:\/\/www.jworldtimes.com\/old-site\/wp-content\/uploads\/2018\/08\/INTERNATIONAL-LAW-APPLICABLE-TO-THE-CYBER-WARFARE.jpg 625w, https:\/\/www.jworldtimes.com\/old-site\/wp-content\/uploads\/2018\/08\/INTERNATIONAL-LAW-APPLICABLE-TO-THE-CYBER-WARFARE-300x185.jpg 300w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/a><\/h3>\n<h3 style=\"text-align: justify;\"><span style=\"color: #ff0000;\">Conspectus <\/span><\/h3>\n<p style=\"text-align: justify;\">The toolkit of statecraft has many an item in it; war and its related concepts are but one tool in that. Over the centuries, the international law related to war has been divided into two distinct spheres: jus ad bellum (law of war) and jus in bello (law in war). The former deals with the justifications or reasons leading to war while the latter deals with the conduct of war. The practice of the two spheres is not as neat as the distinction. To this confusion of practice, we must add the emerging concept of the fifth-dimension warfare. The fifth-dimension warfare has many related concepts like information warfare, irregular warfare, cyber warfare, grey war, etc. &#8216;Fifth-dimension warfare&#8217; is preferred by the United States military. It sounds more convincing for the following reasons:<\/p>\n<p style=\"text-align: justify;\">First, the &#8216;fifth-dimension warfare&#8217; is conceptually more distinct than its related concepts: it clearly distinguishes itself from the first-dimension warfare (the land), the second-dimension warfare (the sea), the third-dimension warfare (the air) and the fourth-dimension warfare (the space).<\/p>\n<p style=\"text-align: justify;\">Secondly, its dimensional description notionally separates it from domestic and national laws.<\/p>\n<p style=\"text-align: justify;\">Thirdly, the US predominately uses the fifth-dimension warfare in its policy documents, but many other jurisdictions opt for using the term cyber warfare. In deference to the international practice, the term &#8216;cyber warfare&#8217; will be used in this write-up.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #ff0000;\">Threshold Questions<\/span><\/h3>\n<p style=\"text-align: justify;\">Building on the concept of cyber warfare and US military&#8217;s circumlocution of &#8216;the fifth-dimension warfare&#8217;, it will now be appropriate to elucidate the six threshold questions that have been central to policy debates on the subject:<!--more--><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #ff0000;\"><strong>1.<\/strong> <\/span>The first question that has been persistently asked is the definition of &#8216;cyber warfare&#8217;.<br \/>\n<span style=\"color: #ff0000;\"><strong>2.<\/strong> <\/span>Whether the extant international law related to armed conflicts in form of jus ad bellum and jus in bello is applicable to the cyber warfare?<br \/>\n<span style=\"color: #ff0000;\"><strong>3.<\/strong> <\/span>Does a cyber attack qualify to be treated as &#8216;force&#8217; in terms of article 4(2) of the UN Charter that regulates the use or threat to use of force?<br \/>\n<span style=\"color: #ff0000;\"><strong>4.<\/strong><\/span> In its interstate form, is a cyber attack an international armed conflict?<br \/>\n<span style=\"color: #ff0000;\"><strong>5.<\/strong> <\/span>In its intrastate or, in state vs. non-state form, is the cyberattack a non-international armed conflict?<br \/>\n<span style=\"color: #ff0000;\"><strong>6.<\/strong> <\/span>What is the scope of state responsibility in cyber warfare?<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #ff0000;\">International Response <\/span><\/h3>\n<p style=\"text-align: justify;\">With no straight answers to these questions, the threshold questions have excited debate amongst the academics as well as the policymakers.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #ff0000;\">A. The US Response<\/span><\/h3>\n<p style=\"text-align: justify;\">Researchers who regularly study the relationship between the international law and cyber warfare cite speech made by Harold Koh, Legal Advisor to the US State Department, at the United States Cyber Command&#8217;s (USCYBERCOM) Inter-Agency Legal Conference which was held on 18th September 2012 as an example of the US position on the subject. Salient features of his speech, ergo the US position, are:<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #ff0000;\"><strong>i.<\/strong><\/span> The established principles of international law apply to cyberspace. Note, he referred to &#8216;cyberspace&#8217; and not cyber warfare, per se;<br \/>\n<span style=\"color: #ff0000;\"><strong>ii.<\/strong> <\/span>The established regimes of jus ad bellum and jus in bello apply to cyber action;<br \/>\n<span style=\"color: #ff0000;\"><strong>iii.<\/strong><\/span> Cyber activities &#8216;that proximately result in death, injury or significant destruction would likely be viewed as a use of force&#8217; in terms of Article 2(4) of the UN Charter that regulates the use of force in the international system. He specifically mentioned three examples of cyber action qualifying as use of force:<br \/>\n<span style=\"color: #ff0000;\"><strong>a.<\/strong> <\/span>operations that trigger a nuclear plant meltdown;<br \/>\n<span style=\"color: #ff0000;\"><strong>b.<\/strong><\/span> operations that disable air traffic control, resulting in aeroplane crashes;<br \/>\n<span style=\"color: #ff0000;\"><strong>c.<\/strong> <\/span>operations that open a dam above a populated area causing destruction.<br \/>\n<span style=\"color: #ff0000;\"><strong>iv.<\/strong> <\/span>The right to self-defence under Article 51 of the UN Charter can be &#8216;triggered by computer network activities that amount to an armed attack or imminent threat thereof&#8217;. He also mentioned the US International Strategy for Cyberspace (2011) wherein the position has been institutionalized within the US military doctrine;<br \/>\n<span style=\"color: #ff0000;\"><strong>v.<\/strong><\/span> The principles of necessity and proportionality as codified in the international humanitarian law (jus in bello) will apply to means and methods of cyber warfare. He further added that there was no requirement within the law to respond cyber action with cyber action; thus, implying that the cyber action can be retaliated by non-cyber action;<br \/>\n<span style=\"color: #ff0000;\"><strong>vi.<\/strong> <\/span>The principle of distinction that is codified in the international humanitarian law will be applicable in cyber warfare. The combating parties will be under an obligation to distinguish between the military and non-military objectives;<br \/>\n<span style=\"color: #ff0000;\"><strong>vii.<\/strong><\/span> States should regularly assess their cyber weapons on the touchstone of &#8216;inherent indiscrimination&#8217;. He shared that the US applies a two-stage review. First, at the time of induction of new weapons, and second, at specific operations.<br \/>\n<span style=\"color: #ff0000;\"><strong>vii.<\/strong> <\/span>The physical infrastructure that supports internet is located in the sovereign territory; therefore, the territorial jurisdiction has to be considered in cyber warfare. The states, thus, cannot be absolved of their responsibility in preventing cyber attacks;<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #ff0000;\">B. The NATO Response<\/span><\/h3>\n<p style=\"text-align: justify;\">NATO&#8217;s response came in the form of the Tallinn Manual. NATO&#8217;s Cooperative Cyber Defence Centre of Excellence (CCDCOE), with the help of nineteen international lawyers, tried to consolidate a manual that it styled as the Tallinn Manual. Its first version (Tallinn Manual 1.0) came in 2013 and its latest version (Tallinn Manual 2.0) was published in 2017. The Tallinn Manual is non-binding and is a product of three years of academic work done by noted international lawyers. The lead expert was Michael Schmitt from the University of Exeter, the United Kingdom. Quintessentially, the Tallinn Manual has found itself in agreement with the US response. The scope of the Manual and its treatment of sub-force level cyber attacks under international law were questioned by some authors, but its overall impact and the way it stated the international cyber warfare law has been appreciated by all.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #ff0000;\">Pakistan and Cyber Warfare<\/span><\/h3>\n<p style=\"text-align: justify;\">Depending on the technological prowess of states, asymmetric power equations may be bridged by the use of cyber warfare capabilities. On the pattern of the United States, Pakistan might need a fifth-dimension warfare setup under the joint command of the armed forces. In this regard, the international law perspective may inform the policymakers in their decisions, and they may be able to integrate cyber warfare in their spectrum of capabilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conspectus The toolkit of statecraft has many an item in it; war and its related concepts are but one tool in that. Over the centuries, the international law related to war has been divided into two distinct spheres: jus ad bellum (law of war) and jus in bello (law in war). The former deals with &hellip;<\/p>\n","protected":false},"author":93,"featured_media":17762,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[10025,1],"tags":[10038,257,9668,10037,2231,613,258],"_links":{"self":[{"href":"https:\/\/www.jworldtimes.com\/old-site\/wp-json\/wp\/v2\/posts\/17761"}],"collection":[{"href":"https:\/\/www.jworldtimes.com\/old-site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jworldtimes.com\/old-site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jworldtimes.com\/old-site\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jworldtimes.com\/old-site\/wp-json\/wp\/v2\/comments?post=17761"}],"version-history":[{"count":0,"href":"https:\/\/www.jworldtimes.com\/old-site\/wp-json\/wp\/v2\/posts\/17761\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jworldtimes.com\/old-site\/wp-json\/wp\/v2\/media\/17762"}],"wp:attachment":[{"href":"https:\/\/www.jworldtimes.com\/old-site\/wp-json\/wp\/v2\/media?parent=17761"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jworldtimes.com\/old-site\/wp-json\/wp\/v2\/categories?post=17761"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jworldtimes.com\/old-site\/wp-json\/wp\/v2\/tags?post=17761"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}