Abstract
The use of cyber force can be as severe and disruptive as traditional armed attacks are. Cyber attacks may neither provoke physical injuries nor cause property damages and still, they can affect essential functions of today’s societies, such as governmental services, business processes or communication systems that progressively depend on information as a vital resource. Whereas several scholars claim that an international treaty, much as new forms of international cooperation, are necessary, a further challenge should be stressed: authors of cyber attacks can be non-state actors, and identifying the party responsible for such a use of force, whether non-state actors or national sovereign states, is often impossible. Accordingly, several programmes on online security and national defence have been developed by sovereign states to tackle this menace and yet, the endurance of Western democracies and their aim to protect basic rights have already been tested by such programmes over the past years. The new scenarios of cyber force do not only concern the field of international law, since they may represent the main threat in the fields of national and constitutional law as well.
Similar content being viewed by others
Notes
Besides the traditional distinction between causes (jus ad bellum) and conditions (jus belli) of just wars, lawmakers have added a third scenario, that is the provisions for the aftermath of warfare, or jus post bellum. In this paper, the classical bifurcation between jus ad bellum and jus belli suffices to describe basic tenets of today’s legal framework that may be affected by a new generation of informational attacks.
In addition to the UN Charter and customary law, LOW and IHL refer to the 1907 Hague Convention, the four Geneva Conventions from 1949, and the two 1977 additional Protocols.
By examining causes and conditions of just war through the lens of the moral laws of information ethics, you may wonder what role the fourth law plays in this context, namely the aim to promote “the flourishing of informational entities as well as the whole infosphere… by preserving, cultivating, enhancing and enriching their properties” (Floridi 2008). This moral law is very important for the laws of war, particularly in the field which scholars traditionally sum up as jus post bellum. This paper only deals with the challenges of jus ad bellum and jus in bello, and so I have skipped this part of the analysis on jus post bellum, on which see chapter 7 of Schmidt and Cohen (2013).
Theoretically speaking, we can imagine a cyber attack by non-state actors that does not rise to the level of an armed attack and still, does not constitute a cybercrime. However, authors of The Law of Cyber-Attack admit that “it is unlikely for a private actor to purposefully undermine the function of a computer network without also violating the law” (op. cit., p. 835).
See John Lanchester, The Snowden files: why the British public should be worried about GCHQ, The Guardian, 3 October 2013, at http://www.theguardian.com/world/2013/oct/03/edward-snowden-files-john-lanchester (last accessed 29 August 2014).
See Janan Ganesh, Cynicism is no match for the mortal threat posed by Isis, Financial Times, 26 August 2014, p. 9.
References
Alston, P. (2010) Report of the special rapporteur on extrajudicial, summary and arbitrary executions, UN General Assembly, Human Rights Council, A/HRC/14/24/Add.6, 28 May
Clarke, R. A., & Knake, R. K. (2010). Cyber war: the next threat to national security and what to do about it. New York: Harper Collins.
Cullet, P. (1999). Differential treatment in international law: towards a new paradigm of inter-state relations. European Journal of International Law, 10(3), 549–582.
Etzioni, A. (2007). Security first: for a muscular, moral foreign policy. New Haven: Yale University Press.
Floridi, L. (2008). Information ethics, its nature and scope. In J. van den Hoven & J. Weckert (Eds.), Moral philosophy and information technology (pp. 40–65). Cambridge: Cambridge University Press.
Floridi, L. (2013). The ethics of information. Oxford: Oxford University Press.
Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spengel, J. (2012). The law of cyber-attack. Southern California Law Review, 100, 817–885.
Hobbes, Th. (1999) Leviathan, R. Tuck (ed.). Cambridge University Press, Cambridge.
Hollis, D. B. (2007). Why states need an international law for information operations. Lewis and Clark Law Review, 11, 1023–1062.
ICJ (1986) Military and Paramilitary Activities in and against Nicaragua (Nicaragua v. United States of America), Judgment of the International Court of Justice from 26 November 1984, available at http://www.icjcij.org/docket/index.php?p1=3&p2=3&case=70&p3=4. Accessed 15 Oct 2014.
Kelsen, H. (1967). The pure theory of law, M. Knight (trans.). Los Angeles: University of California Press.
Libicki, M. C. (1995). What is information warfare? Washington: National Defense University.
Lin, P., Bekey, G., & Abney, K. (2007). Autonomous military robotics: risk, ethics, and design. Report for US Department of Navy. San Luis Obispo, CA: Office of Naval Research. Ethics + Emerging Sciences Group at California Polytechnic State University.
Pagallo, U. (2013a). The laws of robots: crimes, contracts, and torts. Dordrecht: Springer.
Pagallo, U. (2013b). Online security and the protection of civil rights: a legal overview. Philosophy and Technology, 26(4), 381–395.
Pagallo, U., & Durante, M. (2009). Three roads to P2P systems and their impact on business ethics. Journal of Business Ethics, 90(4), 551–564.
Roscini, M. (2010). World Wide warfare—the jus ad bellum and the use of cyber force. Max Planck Yearbook of United Nations Law, 14, 85–130.
Schmidt, E., & Cohen, J. (2013). The new digital age. London: John Murray.
Schmitt, M. N. (2011). Cyber operations and the jus ad bellum revisited. Villanova Law Review, 6, 569–606.
Schmitt, M. N. (2013). Tallinn manual on the international law applicable to cyber warfare. New York: Cambridge University Press.
Schmitt, M. N. (2014). The law of cyber warfare: quo vadis? Stanford Law and Policy Review, 25, 269–299.
Schreuer, C. (1993). The waning of the sovereign state: towards a new paradigm for international law? European Journal of International Law, 4(1), 447–471.
Sharp, W. G., Sr. (1999). Cyber space and the use of force. Falls Church: Aegis.
Silver, D. B. (2001). Computer network attack as a use of force under Article 2(4) of the United Nations Charter. In M. N. Schmitt & B. T. O-Donnell (Eds.), Computer Network Attack and International Law (pp. 73–97). Newport: Naval War College.
Singer, P. W. (2008). Corporate warriors: the rise of the privatized military industry. Ithaca and London: Cornell University Press.
Sklerov, M. J. (2009). Solving the dilemma of state responses to cyberattacks: a justification for the use of active defenses against states who neglect their duty to prevent. Military Law Review, 201, 1–85.
Waxman, M. C. (2011). Cyber-attacks and the use of force: back to the future of Article 2 (4). Yale Journal of International Law, 26, 421–459.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Pagallo, U. Cyber Force and the Role of Sovereign States in Informational Warfare. Philos. Technol. 28, 407–425 (2015). https://doi.org/10.1007/s13347-014-0177-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13347-014-0177-4