Abstract
Cyberspace is a vital part of the modern world with much of our current economic prosperity relying on continued access to the internet. Cyberspace is also a place where conflict can occur, but where international law could be applied to control that conflict. Unlike other domains cyberspace is not exclusively physical and it does not have the same tangible properties of geography as land, sea and air. These differences lead to some difficulties in the application of the law of armed conflict to cyberspace. However, a pragmatic approach to interpretation allows the law of armed conflict to be applied to the ethereal geography of cyberspace. In particular, laws, such as neutrality and those controlling the use of force, that place geographic limits on international and non-international armed conflicts can be applied to limit the extent of these conflicts in cyberspace. Likewise, laws that govern naval blockade can, in some circumstances, usefully guide application of international law to a ‘cyber blockade’. These laws can be applied because, while cyberspace is not an entirely physical domain, actions within cyberspace will still have effects on people, places and objects that do exist in the physical world.
The author is a serving Legal Officer in the Royal Australian Navy. The views expressed are the author’s own and do not necessarily reflect the official policy or position of the Australian Government, the Department of Defence or the Royal Australian Navy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Buchan and Tsagourias 2012, p. 183.
- 2.
Buchan and Tsagourias 2012, p. 183.
- 3.
Applegate 2012.
- 4.
Applegate 2012.
- 5.
Schmitt 2012, p. 246.
- 6.
Kobrin 2001.
- 7.
Agnew 2005, p. 446.
- 8.
Picciotto 1984.
- 9.
Dinniss 2012, p. 135.
- 10.
Nielsen 2012, p. 337.
- 11.
- 12.
Herrera 2007, p. 5.
- 13.
Herrera 2007, p. 5.
- 14.
Antolin-Jenkins 2005.
- 15.
Herrera 2007.
- 16.
Trachtman 1998, p. 568.
- 17.
Barney 2001.
- 18.
Nielsen 2012, p. 337.
- 19.
Barney 2001.
- 20.
For discussion, see, Kobrin 2001, pp. 688–689.
- 21.
Kobrin 2001, p. 690.
- 22.
- 23.
Watson 2011, p. 16.
- 24.
- 25.
Schmitt (ed) 2013, r. 1.
- 26.
Kanuck 2010, p. 1573.
- 27.
Kanuck 2010, p. 1576.
- 28.
See, Trachtman 1998 for further arguments.
- 29.
Wu 1997, pp. 650–651.
- 30.
For further information on the Chinese Firewall, see, Jyh-An and Ching Yi 2012, p. 125.
- 31.
Jyh-An and Ching Yi 2012, p. 125.
- 32.
Shackelford 2009, p. 210.
- 33.
Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I), 8 June 1977, 1125 UNTS 3 (entered into force 7 December 1978) (‘Additional Protocol I’).
- 34.
Geneva Convention for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field, 12 August 1949, 75 UNTS 31 (entered into force 21 October 1950); Geneva Convention for the Amelioration of the Condition of Wounded, Sick and Shipwrecked Members of Armed Forces at Sea, 12 August 1949, 75 UNTS 85 (entered into force 21 October 1950); Geneva Convention Relative to the Treatment of Prisoners of War, 12 August 1949 75 UNTS 135 (entered into force 21 October 1950) (‘Geneva Convetion III’); Geneva Convention Relative to the Protection of Civilian Persons in Time of War, 12 August 1949, 75 UNTS 287 (entered into force 21 October 1950) (‘Geneva Convention IV’).
- 35.
Common Article 2 further states that ‘the Convention shall also apply to all cases of partial or total occupation of the territory of a High Contracting Party, even if the said occupation meets with no armed resistance’.
- 36.
Schmitt 2012, p. 249.
- 37.
Additional Protocol I, Article 1(4).
- 38.
- 39.
Duffy 2005, p. 223.
- 40.
Jensen 2012, p. 818.
- 41.
Specifically, Hague Convention (V) Respecting the Rights and Duties of Neutral Powers and Persons in the Case of War on Land, 18 October 1907, 105 CTS 305 (entered into force 26 January 1910) (‘Hague Convention V’) and the Hague Convention (XIII) Concerning the Rights and Duties of Neutral Powers in Naval War, 18 October 1907, 205 CTS 395 (entered into force 26 January 1910). See also, Jensen 2012, p. 819.
- 42.
Jensen 2012, p. 821.
- 43.
Bridgeman 2010, p. 1188.
- 44.
See, for example, Geneva Convention IV, Articles 3, 13, 15 and 16.
- 45.
Geneva Convention III; Bridgeman 2010, p. 1207.
- 46.
Schmitt (ed) 2013, r. 21.
- 47.
Doswald-Beck 2002, p. 173.
- 48.
Jessup 1936, p. 156.
- 49.
Blank 2010, p. 9.
- 50.
Doswald-Beck 2002, p. 173.
- 51.
Hague Convention V, Article 1. See also, Article 5 for the duties of the neutral state.
- 52.
Blank 2010, pp. 10, 22.
- 53.
Schmitt (ed) 2013, r. 91.
- 54.
Schmitt (ed) 2013, r. 92.
- 55.
- 56.
Kanuck 2010, p. 1593.
- 57.
Kanuck 2010, p. 1593.
- 58.
Jensen 2012, p. 825.
- 59.
Jensen 2012, p. 825.
- 60.
Jensen 2012, p. 825.
- 61.
Hague Convention V, Articles 3, 8 and 9.
- 62.
See, Chap. 5 by Boothby in this volume.
- 63.
Schmitt (ed) 2013, r. 51 commentary 12.
- 64.
Holtzoff 1916, p. 53.
- 65.
Holtzoff 1916, p. 53.
- 66.
Holtzoff 1916, p. 53.
- 67.
- 68.
Doswald-Beck et al. 1995, cl. 99, 100 and 104.
- 69.
Doswald-Beck et al. 1995, cl. 102.
- 70.
Toth 2011, p. 10.
- 71.
Toth 2011, p. 11.
- 72.
Benatar and Gombeer 2011, p. 8.
- 73.
Lin 2010.
- 74.
Antolin-Jenkins 2005, p. 135.
- 75.
For information relating to the exclusion of economic pressure from the prohibition on the use of force, see Randelzhofer 2002, pp. 118–120.
- 76.
Interestingly, on the assurance of access, the use of a cyber-blockade may fall foul of an emerging right within international human rights law for people to have access to the internet: Benatar and Gombeer 2011, p. 20.
- 77.
Doswald-Beck et al. 1995, s. II.
- 78.
Holtzoff 1916.
- 79.
Vite 2009.
- 80.
- 81.
Jensen 2012, p. 834. Both Additional Protocol II, Article 1 and Geneva Conventions, common Article 3 limit their scope of application to conflicts not of an international character occurring within the territory of a High-Contracting Party, but this does not limit the extent of non-international armed conflict, but merely affects the application of those laws. Additionally, Additional Protocol II, Article 3 specifically references state sovereignty and the principle against intervention as continuing to apply in non-international armed conflict.
- 82.
Daskal 2013.
- 83.
See, Prosecutor v Tadic (Jurisdiction of the Tribunal), International Criminal Tribunal for the Former Yugoslavia, Appeals Chamber, Case No. IT-94-1-AR72, 2 October 1995, para 67.
- 84.
Milokević 2000, pp. 432–433. See also, Charter of the United Nations, 26 June 1945, 1 UNTS XVI (entered into force 24 October 1945) (‘UN Charter’), Article 2(4).
- 85.
O’Connell 2012.
- 86.
Buchan 2012, p. 221.
- 87.
GA Res 36/103 (9 December 1981).
- 88.
GA Res 36/103 (9 December 1981), principle 1.
- 89.
GA Res 36/103 (9 December 1981), principle 2, II, (o).
- 90.
See, GA Res 36/103 (9 December 1981), principles 5 and 6.
- 91.
Buchan 2012, p. 222.
- 92.
Milokević 2000.
- 93.
Buchan 2012, p. 222.
- 94.
Buchan 2012, p. 222.
- 95.
Buchan 2012, p. 223.
- 96.
Buchan 2012, p. 223.
- 97.
Applegate 2012.
- 98.
Koh 2012.
- 99.
Daskal 2013.
- 100.
Schmitt (ed) 2013, r. 21, commentary 3.
- 101.
Daskal 2013, p. 1175.
- 102.
Daskal 2013, p. 1175.
- 103.
Daskal 2013, pp. 1181–1182.
- 104.
- 105.
Daskal 2013.
References
Agnew J (2005) Sovereignty regimes: territoriality and state authority in contemporary world politics. Ann Assoc Am Geogr 95(2):437–461
Antolin-Jenkins V (2005) Defining the parameters of cyberwar operations: looking for law in all the wrong places? Naval Law Rev 51:132–174
Applegate S (2012) The Principle of manoeuvrer in cyber operations. Paper presented at the 4th International Conference on Cyber Conflict, Tallinn, Estonia. http://www.academia.edu/1436096/The_Principle_of_Maneuver_in_Cyber_Operations. Accessed 30 April 2013
Barney S (2001) Innocent packets? Applying navigational regimes from the Law of the Sea Convention by analogy to the realm of cyberspace. Naval Law Rev 48:56–83
Benatar M, Gombeer K (2011) Cyber sanctions: exploring a blind spot in the current legal debate. European Society of International Law: Conference Paper Series 9. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1989786. Accessed 30 April 2013
Blank L (2010) Defining the battlefield in contemporary conflict and counterterrorism: understanding the parameters of the zone of combat. Ga J Int Comp Law 39:1–38
Blum G, Heymann P (2010) Law and policy of targeted killing. Harv Natl Secur J 1:145–170
Bridgeman T (2010) The law of neutrality and the conflict with Al Qaeda. N Y Univ Law Rev 85:1186–1224
Buchan R (2012) Cyber attacks: unlawful uses of force or prohibited interventions? J Confl Secur Law 17(2):212–227
Buchan R, Tsagourias N (2012) Editorial—cyber war and international law. J Confl Secur Law 17(2):183–186
Daskal J (2013) The geography of the battlefield: a framework for detention and targeting outside the ‘hot’ conflict zone. Univ Pa Law Rev 161:1165–1234
Dinniss HH (2012) Cyber warfare and the laws of war. Cambridge University Press, Cambridge
Doswald-Beck L (2002) Some thoughts on computer network attack and the international law of armed conflict. In: Schmitt M, O’Donnell B (eds) Computer network attack and international law. US Naval War College International Law Studies, vol 76. Naval War College, Newport, pp 163–186
Doswald-Beck L et al (1995) San Remo Manual on international law applicable to armed conflicts at sea. Cambridge University Press/International Institute of Humanitarian Law, Cambridge
Duffy H (2005) The ‘war on terror’ and the framework of international law. Cambridge University Press, Cambridge
Herrera G (2007) Cyberspace and sovereignty: thoughts on physical space and digital space. In: Cavelty M, Mauer V, Krishna-Hensel S (eds) Power and security in the information age: investigating the role of the state in cyberspace. Ashgate, Surrey, pp 67–94
Holtzoff A (1916) Some phases of the law of blockade. Am J Int Law 10(1):53–64
Jensen E (2012) Sovereignty and neutrality in cyber conflict. Fordham Int Law J 35:815–841
Jessup P (1936) Neutrality, today and tomorrow (Volume 4). Columbia University Press, New York
Johnson D, Post D (1996) Law and borders: the rise of law in cyberspace. Stanf Law Rev 48:1367–1402
Jyh-An L, Ching-Yi L (2012) Forbidden City enclosed by the great firewall: the law and power of internet filtering in China. Minn J Law Sci Technol 13(1):125–151
Kanuck S (2010) Sovereign discourse on cyber conflict. Tex Law Rev 88:1571–1598
Kobrin S (2001) Territoriality and the governance of cyberspace. J Int Bus Stud 32(4):687–704
Koh H (2012) International law in cyberspace. Paper presented at the United States Cyber Command Inter-Agency Legal Conference on the applicability of international law to cyberspace, Fort Meade. http://www.state.gov/s/l/releases/remarks/197924.htm. Accessed 30 April 2013
Lin H (2010) Offensive cyber operations and the use of force. J Natl Secur Law Policy 4:63–86
Milokević M (2000) The principle of non-interference in the internal affairs of states. Law Politics 1(4):427–447
Nielsen S (2012) Pursuing security in cyberspace: strategic and organizational challenges. Orbis 56(3):336–356
O’Connell M (2012) Cyber security without cyber war. J Confl Secur Law 17(2):187–209
Paulus A, Vashakmadze M (2009) Asymmetrical war and the notion of armed conflict—a tentative conceptualization. Int Rev Red Cross 91:95–111
Picciotto S (1984) Jurisdictional conflicts, international law and the international state system. In: Massey D, Allen J (eds) Geography matters!: a reader. Press Syndicate of the University of Cambridge, Cambridge
Randelzhofer A (2002) Article 2(4). In: Simma B (ed) The Charter of the United Nations: a commentary, 2nd edn. Oxford University Press, Oxford, pp 112–136
Schilling J (2010) Defining our national cyberspace boundaries. US Army War College, Pennsylvania
Schmitt MN (2012) Classification of cyber conflict. J Confl Secur Law 17(2):245–260
Schmitt MN (ed) (2013) Tallinn manual on the international law applicable to cyber warfare. International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence/Cambridge University Press, Cambridge
Shackelford S (2009) From nuclear war to net war: analogizing cyber attacks in international law. Berkely J Int Law 27(1):192–252
Toth M (2011) Maritime trade warfare in the 21st century. Naval War College, Rhode Island
Trachtman J (1998) Cyberspace, sovereignty, jurisdiction and modernism. Indiana J Global Legal Stud 5(2):561–581
Vite S (2009) Typology of armed conflicts in international humanitarian law: legal concepts and actual situations. Int Rev Red Cross 91:89–93
Walker G (2002) Neutrality and information warfare. In: Schmitt M, O’Donnell B (eds) Computer network attack and international law. US Naval War College International Law studies, vol 76. Naval War College, Newport, pp 233–264
Watson K (2011) The new geography: the map, the satellite and the computer. US Army War College, Pennsylvania
Wu T (1997) Cyberspace sovereignty?—the internet and the international system. Harv J Law Technol 10(3):647–666
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 T.M.C. Asser Press and the authors
About this chapter
Cite this chapter
Midson, D. (2014). Geography, Territory and Sovereignty in Cyber Warfare. In: Nasu, H., McLaughlin, R. (eds) New Technologies and the Law of Armed Conflict. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-90-6704-933-7_6
Download citation
DOI: https://doi.org/10.1007/978-90-6704-933-7_6
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-90-6704-932-0
Online ISBN: 978-90-6704-933-7
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)