Legal Challenges of Cyber Space Capabilities in Light of Article 36 of 1977 Additional Protocol I

Document Type : academic

Authors

1 Associate Professor, Islamic Azad University of Tehran Research Branch, Faculty of Law

2 Corresponding author, PhD student in International Law, Department of Law, Payame Noor University, post box. 4697-19395, Tehran, Iran.

Abstract

For more than four decades, Article 36 of the Additional Protocol to the Geneva Conventions has been considered as a norm for assessing the legality of new weapons. The criteria included in this article are based on weapons that were in existence at the time of its adoption. New technologies have brought new weapons which challenged the existing norms. Cyberspace as one of these technologies has capabilities that are used in software or malware forms for causing damages or injuries in the armed conflicts. The question posed here is whether Article 36 of the Additional Protocol I can regulate such capabilities under international humanitarian law? Due to the novelty of these capabilities and the difficulty of naming them as weapons, their legal review is faced with challenges in the light of Article 36 of the Additional Protocol. The review of Article 36, along with the nature of cyberspace capabilities shows that their legal assessment faces challenges such as the lack of rules and regulations that explicitly prohibits or allows explicitly the use of cyberspace, entrusting the definition of weapons to the member States of the Protocol, the definition of new weapons, the non-application of the object to computer data for the perceived cyber-weapons as a weapon, the lack of an international consensus on the virtual effects of the use of cybercriminals, the lack of regulation on the requirement for individuals and groups to produce cyber weapons for legal assessment, and most importantly, the interconnection of military and civilian networks and the possible use of cyber-weapons likely to infect critical civilian networks. Therefore, respecting the fundamental principles of International Humanitarian Law including distinction, proportionality, military necessity, and precautionary measures will be difficult.

Keywords


  • الف. فارسی

    • شریفی طرازکوهی، حسین؛ حقوق بشردوستانه بین‌المللی، چاپ دوم، میزان، 1395.
    • ضیایی بیگدلی، محمدرضا؛ حقوق بین‌الملل بشردوستانه، چاپ سوم، گنج دانش، 1392.
    • قربان‌نیا، ناصر؛ حقوق بشر و حقوق بشردوستانه، پژوهشگاه فرهنگ و اندیشه اسلامی، 1387.

     ب. انگلیسی

    - Books

    • Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, International Committee of the Red Cross, Geneva. 1987.
    • Green, Leslie C., The Contemporary Law of Armed Conflict, 3rd ed., UK, Juris Publishing, 2008.

     

    - Articles

    • “A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977”, (December 2006), International Committee of the Red Cross, Geneva, International Review of the Red Cross, vol. 88, no. 864.
    • Blake, Dunkan & Imburgia, Joseph S., “Bloodless Weapons? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining them as Weapons”, The Air Force Law Review, vol. 66. 2010.
    • Boothby, William H., “Where Do Cyber Hostilities Fit in the International Law Maze?” in Nasu, Hitoshi & McLaughlin, Robert (eds.), New Technologies and the Law of Armed Conflict, The Hague, ASSER Press. 2014.
    • Boulanin, Vincent,  “Implementing Article 36 Weapon Reviews in the Light of Increasing Autonomy in Weapons Systems”, SIPRI Insight on Peace and Security, No.201/1. 2015.
    • Brown, Gary D. and Metcalf, Andrew O., “Easier Said Than Done: Legal Review of Cyber Weapons”, Journal of National Security Law and Policy, vol. 7, no. 1. 2014.
    • Daoust, Isabelle, Coupland, Robin and Ishoey, Rikke, “New Wars, New Weapons? The Obligation of States to Assess the Legality of Means and Methods of Warfare”, International Review of Red Cross, vol. 84, no. 846. 2002.
    • Denning, Dorothy, “Reflections on Cyber Weapons Controls”, Computer Security Journal, vol. 16, no. 4. 2002.
    • Devai, Dora, “Proliferation of Offensive Cyber Weapons. Strategic Implications and Non-Proliferation Assumptions”, AARMS, vol. 15, no. 1. 2016.
    • Ebner, Nike, “Cyber Space, Cyber Attack and Cyber Weapons”, Institute for Peace Research and Security Policy, University of Hamburg. 2015.
    • Gervais, Michael, “Cyber Attacks and the Laws of War”, Berkley Journal of International Law, vol. 30, iss. 2, 2012.
    • Herbach, Jonathan David, “Into the Caves of Steel: Precaution Cognition and Robotic Weapon Systems under the International; Law of Armed Conflict”, Amsterdam Law Forum, VU University Amsterdam, Summer Issue, 2012.
    • Hughes, Rex, “A Treaty for Cyberspace”, The Royal Institute of International Affairs, vol. 86, no. 2. 2010.
    • Lindsay, Jon R., “Stuxnet and the Limits of Cyber Warfare”, Security Studies, vol. 22. 2013.
    • Madison, David, “Geography, Territory and Sovereignty in Cyber Warfare”, in Nasu, Hitoshi & McLaughlin, Robert (eds.), New Technologies and the Law of Armed Conflict, The Hague, ASSER Press. 2014.
    • McClelland, Justin, “The Review of Weapons in Accordance with Article 36 of Additional Protocol I”, International Review of the Red Cross, vol. 85, no. 850. 2003.
    • Mele, Stefano, “Cyber Weapons: Legal and Strategic Aspects”, Italian Institute of Strategic Studies, Rome, 2013.
    • Robin, Bradley, “Corresponding Evolution: International Law and the Emergence of Cyber Warfare”, Journal of the National Association of Administrative Law Judiciary, vol. 31, iss. 2. 2011.
    • Schmitt Michael, N., “Cyber Operations and the Jus in Bello: Key Issues”, in Pedrozo R.A., Wollschlaeger D.P. (eds.) International Law and the Changing Character of War, Newport, US Naval War College International Law Studies, vol. 87, Naval War College, 2011.
    • Schmitt, Michael N., “Rewired Warfare: Rethinking the Law of Cyber Attack”, International Review of the Red Cross, vol. 96, no. 893. 2014.
    • Streltsov, Anatoly, “Key Trends of International Law Relating to the Conflicts in Cyber Space”, in Greppi, Edoardo (ed.) Conduct of Hostilities: The Practice, The Law and The Future, International Institute of Humanitarian Law, 2015.
    • Turns, David, “Cyber War and the Concept of Attack in International Humanitarian Law”, in Saxon, Dan (ed.) International Humanitarian Law and the Changing Technology of War, Boston, Martinus Nijhoff Publishers. 2013

     

    - Documents

    • Biontino, Michael, “Lethal Autonomous Weapon Systems Expert Meeting”, Geneva, 13-16 May 2014.
    • Brose, Robert, “Cyber War, Net War and the Future of Cyber Defence”, Office of the Director of National Intelligence, United States. 2015.
    • Tallin Manual on the International Law Applicable to Cyber Warfare, NATO Cooperative Defense Centre of Excellence, Cambridge University Press, Cambridge, 2013.
    • West, Dondi S., “A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare”, Defence Conference, July 30th -August 1st, Las Vegas. 2010.
    • “Toward Stable and Effective Use of Cyberspace”, Ministry of Defence, Japan, September 2012.

     

    - Websites