Skip to main navigation menu Skip to main content Skip to site footer

Articles

No. 2 (2024): Prawo i Więź Nr 2 (49) 2024

Challenges to the Principle of Distinction in Cyber Warfare Navigating International Humanitarian Law Compliance: The Principle of Distinction in Cyber Warfare

Submitted
24 October 2023
Published
24-05-2024

Abstract

The emergence of cyberspace warfare as a dominant domain of contemporary conflict has brought forth a multitude of intricate challenges for international humanitarian law (IHL), specifically concerning the foundational principle of distinction. This principle, hailed by the International Court of Justice as a 'cardinal' and 'intransgressible' tenet, serves as a cornerstone of IHL, prohibiting deliberate attacks on civilians and civilian infrastructure. In this cyber age, where warfare transcends geographic borders and occurs within an interconnected, borderless realm, traditional IHL faces a significant adaptation challenge. This article delves into the profound challenges faced by the principle of distinction within the context of cyberspace warfare, contextualizing the nature of this emerging battlefield. Unlike conventional warfare, cyberspace warfare is characterized by its dual-use environment, intricate civilian-military interdependence, and inherent ambiguity in attributing responsibility. Distinguishing between combatants and civilians in cyberspace remains a contentious issue, compounded by the extensive civilian participation in cyber activities and the unclear concept of “direct participation in hostilities”in this context. Furthermore, the principle of distinction faces significant hurdles when applied to objects in cyberspace. The blurred lines between civilian and military networks, coupled with the unpredictability of cyberattack consequences, challenge the traditional IHL framework designed for tangible warfare. The article underscores the importance of establishing consensus on characterizing cyber operations as 'attacks,' irrespective of their physical or non-physical effects, ensuring the principle of distinction's continued relevance. It highlights the necessity for comprehensive legal frameworks tailored to the nuances of cyberspace and the urgent need to bridge the gap between traditional IHL and the distinct challenges posed by digital conflict. As technology continually redefines the boundaries of warfare, upholding these principles is crucial in safeguarding humanity amid the challenges of modern warfare. Moreover, this article addresses the compliance of Russian cyberattacks against Ukraine with the principle of distinction, highlighting the pressing need to examine the application of IHL in real-world cyber conflicts.

References

  1. Alberts David Stephen, John Garstka, Frederick P. Stein, Network Centric Warfare: Developing and Leveraging Information Superiority. CCRP Publication, 2005.
    View in Google Scholar
  2. Biggio Giacomo, „International Humanitarian Law and the Protection of the Civilian Population in Cyberspace: Towards a Human Dignity-Oriented Interpretation of the Notion of Cyber Attack under Article 49 of Additional Protocol I” The Military Law and the Law of War Review, No. 1 (2021): 114-140. https://doi.org/10.4337/mllwr.2021.01.06.
    View in Google Scholar
  3. Brantly Aaron, Max Smeets, „Military Operations in Cyberspace”, [in:] Handbook of Military Sciences. 1-16. Cham: Springer, 2020). https://doi.org/10.1007/978-3-030-02866-4_19-1.
    View in Google Scholar
  4. Cyberspace and Instability, ed. Robert Chesney, James Shires, Max Smeets. Edinburgh: Edinburgh University Presss, 2023.
    View in Google Scholar
  5. Cullen Anthony, The Concept of Non-International Armed Conflict [in:] International Humanitarian Law. Cambridge: Cambridge University Press, 2010.
    View in Google Scholar
  6. Ducheine Paul, Terry Gill, From Cyber Operations to Effects: Some Targeting Issues. Dissertation, Militair Rechtelijk Tijdschrift, 2018.
    View in Google Scholar
  7. Geist Edward, „Deterrence Stability in the Cyber Age” Strategic Studies Quarterly, No. 4 (2015): 44–61. https://doi.org/https://www.jstor.org/stable/26271277.
    View in Google Scholar
  8. Gervais Michael, „Cyberattacks and the Laws of War” SSRN Electronic Journal, (2011). https://doi.org/10.2139/ssrn.1939615.
    View in Google Scholar
  9. Government websites of Ukraine, Computer Emergency Response Team of Ukraine Cyberattack (CERT-UA), Distribution of Emails with „Instructions” on „updating the Operating System”. cert.gov.ua, 28 April 2023. https://cert.gov.ua/article/4492467.
    View in Google Scholar
  10. ICJ, Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996. https://www.icj-cij.org/case/95.
    View in Google Scholar
  11. Igakuboon Adasi Nsanawaji, „An Appraisal of the Legal Framework for the Protection of Civilians in Cyber-Warfare under International Humanitarian Law” International Journal of Research and Scientific Innovation, No. 7 (2022): 14-26. https://doi.org/10.51244/ijrsi.2022.9702.
    View in Google Scholar
  12. International Committee of the Red Cross (ICRC), Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed Conflicts (Protocol II), 8 June 1977
    View in Google Scholar
  13. International Committee of the Red Cross, International Humanitarian Law and Cyber Operations during Armed Conflicts, 27 October 2022. https://www.icrc.org/en/document/international-humanitarian-law-and-cyber-operations-during-armed-conflicts.
    View in Google Scholar
  14. Johnson James, „The AI-Cyber Nexus: Implications for Military Escalation, Deterrence and Strategic Stability” Journal of Cyber Policy, No. 3 (2019): 442-460. https://doi.org/10.1080/23738871.2019.1701693.
    View in Google Scholar
  15. Joint Inspection Unit of the United Nations System, Cybersecurity in the United Nations System Organizations (JIU/REP/2021/3)., 2021. https://www.unjiu.org/news/cybersecurity-united-nations-system-organizations-jiurep20213-0.
    View in Google Scholar
  16. Mathonet Clara, Protection of Civilians in the Era of Cyber Warfare: A Critical Analysis of International Humanitarian Law Towards a Treaty Restricting the Use of Cyber Weapons. Thesis, University of Amsterdam, 2020.
    View in Google Scholar
  17. Mavropoulou Elizabeth, „Targeting in the Cyber Domain: Legal Challenges Arising from the Application of the Principle of Distinction to Cyberattacks” Journal of Law & Cyber Warfare, No. 2 (2015): 23-93. https://doi.org/https://www.jstor.org/stable/26441253.
    View in Google Scholar
  18. McDonald Jack, „Blind Justice? The Role of Distinction in Electronic Attacks” Ethics and Policies for Cyber Operations, (2016): 17-32. https://doi.org/10.1007/978-3-319-45300-2_2.
    View in Google Scholar
  19. Melzer Nils, „The Principle of Distinction Between Civilians and Combatants”, [in:] The Oxford Handbook of International Law in Armed Conflict, ed. Andrew Clapham, Paola Gaeta. 296-331. Oxford: Oxford University Press, 2014. https://doi.org/10.1093/law/9780199559695.003.0012.
    View in Google Scholar
  20. Microsoft, An Overview of Russia’s Cyberattack Activity in Ukraine Report, 22 April 2022. https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd.
    View in Google Scholar
  21. Richmond Jeremy, „Evolving Battlefields: Does Stuxnet Demonstrate a Need for Modifications to the Law of Armed Conflict?” Fordham International Law Journal, No. 3 (2012): 842-894. https://doi.org/https://ir.lawnet.fordham.edu/ilj/vol35/iss3/1.
    View in Google Scholar
  22. Rid Thomas, Peter McBurney, „Cyber-Weapons” The RUSI Journal, No. 1 (2012): 6-13. https://doi.org/10.1080/03071847.2012.664354.
    View in Google Scholar
  23. Schmitt Michael N., „Wired Warfare 3.0: Protecting the Civilian Population During Cyber Operations” International Review of the Red Cross, No. 910 (2019): 333-355. https://doi.org/10.1017/s1816383119000018.
    View in Google Scholar
  24. Schmitt Michael N., Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, 2017.
    View in Google Scholar
  25. Shackelford Scott J., „From Nuclear War to Net War: Analogizing Cyberattacks” International Law, No. 1 (2009): 191-250. https://doi.org/https://dlc.dlib.indiana.edu/dlc/bitstream/handle/10535/10239/SSRN-id1396375.pdf.
    View in Google Scholar
  26. Sharma Amit, „Cyber Wars: A Paradigm Shift from Means to Ends” Strategic Analysis, No. 1 (2010): 62-73. https://doi.org/10.1080/09700160903354450.
    View in Google Scholar
  27. Sohail Humna, „Fault Lines in the Application of International Humanitarian Law to Cyberwarfare” Journal of Digital Forensics, Security and Law, (2022). https://doi.org/10.15394/jdfsl.2022.1761.
    View in Google Scholar

Downloads

Download data is not yet available.