Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter
In this study, we delve into the connection between cyber-attacks and Article 2(4) of the UN Charter, which forbids the use of force. We investigate warfare's historical backdrop, the shift from traditional to nontraditional tactics, and cyber warfare's emergence. We classify various cyber-attack forms and showcase pivotal case studies that underscore their effects on national and global security. The paper delves into a comprehensive analysis of the UN Charter, particularly Article 2(4), discussing its intent, history, and interpretation. Our research tackles difficulties in applying Article 2(4) to nontraditional warfare like cyber-attacks. We scrutinize legal viewpoints and academic arguments regarding whether such attacks fall under force as per Article 2(4) while contemplating the potential consequences of interpreting it so. We explore how these findings may influence prospective cyber conflicts while offering suggestions for managing hurdles presented by such situations within international law's framework. This study deepens our comprehension of the interplay between cyber-attacks and the UN Charter's Article 2(4), enriching policy debates and promoting continued examination in this rapidly evolving domain.
-
Cyber Warfare, International Law, UN Charter Article 2(4), Use of Force, Cyber Attacks
-
(1) Hazrat Usman
Lecturer, Department of Law, Mohi Ud Din Islamic University Nerian Sharif, AJ&K, Pakistan.
(2) Showkat Ahmad Mir
Assistant Professor, Department of Law, Mohi Ud Din Islamic University Nerian Sharif, AJ&K, Pakistan.
(3) Attiq-Ur-Rehman
Lecturer, Department of Law, Ibadat International University Islamabad, Pakistan.
- Andress, J., & Winterfeld, S. (2011). Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. https://ci.nii.ac.jp/ncid/BB12613653
- Cohen, E. A., Arquilla, J., & Ronfeldt, D. F. (2001). Networks and Netwars: The Future of Terror, Crime, and Militancy. Foreign Affairs, 81(2), 182. https://doi.org/10.2307/20033106
- Black, J. (1992). A Military Revolution? Military Change and European Society, 1550-1800. The Journal of Military History, 56(1), 126. https://doi.org/10.2307/1985717
- Brenner, J. I. (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. http://ci.nii.ac.jp/ncid/BB1226299X
- Bronk, C. (2015). Cybersecurity and Cyberwar: What Everyone Needs to Know. 52(09), 52–4806. https://doi.org/10.5860/choice.188472
- Buchanan, B. (2017). The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations. http://cds.cern.ch/record/2263995
- Shaw, M. N. (1977). International Law. https://openlibrary.org/books/OL1662187M/Int ernational_law
- Chowdhary, A., Huang, D., Mahendran, J. S., Romo, D., Deng, Y., & Sabur, A. (2020). Autonomous Security Analysis and Penetration Testing. https://doi.org/10.1109/msn50589.2020.00086
- The Law Against War: The Prohibition on the Use of Force in Contemporary International Law by Olivier Corten. Hart Publishing: Oxford, 2010. 569 pp. ISBN 9781841139425. (2014). In Hart Publishing eBooks. https://doi.org/10.5040/9781472566263.ch-017
- Council, N. R. (2010). Proceedings of a workshop on deterring cyberattacks: informing strategies and developing options for US policy. National Academies Press.
- Mann, F. A. (1988). War, aggression and self-defence. International Affairs, 65(1), 140–141. https://doi.org/10.2307/2621018
- Droege, C. (2012). Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the Red Cross, 94(886), 533–578. https://doi.org/10.1017/s1816383113000246
- Fidler, D. P., Pregent, R., & Vandurme, A. (2016). NATO, Cyber Defense, and International Law. Int’l & Comp, 4(1), 1. https://paperity.org/p/81552305/nato-cyber-defense-and-international-law
- Finnemore, M., & Sikkink, K. (1998). International Norm Dynamics and Political Change. International Organization, 52(4), 887–917. https://doi.org/10.1162/002081898550789
- Pierre, A. J., & Freedman, L. (1982). The Evolution of Nuclear Strategy. Foreign Affairs, 60(4), 957. https://doi.org/10.2307/20041193
- Clapham, A., Gaeta, P., Haeck, T., & Priddy, A. (2014). The Oxford Handbook of International Law in Armed Conflict. In Oxford University Press eBooks. https://doi.org/10.1093/law/9780199559695.001.0001
- Gray, C. (2008). International Law and the Use of Force. In Routledge eBooks (pp. 111–128). https://doi.org/10.4324/9780203926598-14
- Hathaway, O. A., Crootof, R., Perdue, W. C., & Levitz, P. (2012). The Law of Cyber-Attack. California Law Review, 100(4), 817. https://doi.org/10.15779/z38cr6n
- Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49–60. https://doi.org/10.5038/1944-0472.4.2.3
- Joque, J., & Haque, S. M. T. (2020). Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity. https://doi.org/10.1145/3442167.3442170
- Gat, A. (2006). War in Human Civilization. http://kb.osu.edu/dspace/handle/1811/31976
- Kello, L. (2013). The Meaning of the Cyber Revolution: Perils to Theory and Statecraft. International Security, 38(2), 7–40. https://doi.org/10.1162/isec_a_00138
- Kelsen, H. (2000). The law of the United Nations : a critical analysis of its fundamental problems : with supplement. In Lawbook Exchange. https://ci.nii.ac.jp/ncid/BA54061603
- Mohurle, S., & Patil, M. C. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938–1940. https://doi.org/10.26483/ijarcs.v8i5.4021
- Clarke, R. H., & Knake, R. K. (2011). Cyber war: the next threat to national security and what to do about it. Choice Reviews Online, 48(05), 48–2963. https://doi.org/10.5860/choice.48-2963
- Rid, D. T. (2019). Active Measures. The Secret History of Disinformation and Political Warfare, 146
- Roscini, M. (2010). World Wide Warfare-'Jus Ad Bellum'and the Use of Cyber Force. Max Planck Yearbook of United Nations Law, 14, 85-130.
- Schmitt, M. (2011). Cyber Operations and the Jus in Bello: Key Issues. In Brill | Nijhoff eBooks (pp. 113–135). https://doi.org/10.1163/9789004226449_006
- Schmitt, M. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. In Cambridge University Press eBooks. https://doi.org/10.1017/cbo9781139169288
- Schmitt, M. (2014). Rewired warfare: rethinking the law of cyber-attack. International Review of the Red Cross. https://doi.org/10.1017/s1816383114000381
- Schmitt, M. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. In Cambridge University Press eBooks. https://doi.org/10.1017/9781316822524
- Segal, A. (2016). The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age. https://www.amazon.com/Hacked-World- Order-Maneuver-Manipulate/dp/1610398726
- Shackelford, S. (2009). From Nuclear War to Net War: Analogizing Cyber Attacks in International Law. Berkeley Journal of International Law, 27(1), 192. https://doi.org/10.15779/z38ks9b
- Shackelford, S. (2014). Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace. http://ci.nii.ac.jp/ncid/BB1670865X
- Shakarian, P., Shakarian, J., & Ruef, A. (2013). Introduction to Cyber-Warfare: A Multidisciplinary Approach. https://www.amazon.com/Introduction-Cyber-Warfare-Multidisciplinary-Paulo-Shakarian/dp/0124078141
- Sony cyber-attack: North Korea faces new US sanctions. (2015, 3 January 2015). BBC News. https://www.bbc.com/news/world-us-canada-30661973
- Tsagourias, N. (2012). Cyber attacks, self-defence and the problem of attribution. Journal of Conflict and Security Law, 17(2), 229–244. https://doi.org/10.1093/jcsl/krs019
- Valeriano, B., Jensen, B. a. H., & Maness, R. C. (2018). Cyber Strategy: The Evolving Character of Power and Coercion. https://connections-qj.org/article/cyber-strategy-evolving-character-power-and-coercion
- Crilley, R. (2019). Deconstruction machines: writing in the age of cyberwar. International Affairs. https://doi.org/10.1093/ia/iiy247
- Votel, J. L., Cleveland, C. T., Connett, C. T., & Irwin, W. (2016). Unconventional warfare in the gray zone. Joint Forces Quarterly, 80(1), 101-109.
- Wolfgang, S., & Mathieu, P. (2018). The state of industrial cybersecurity 2018. Kaspersky.
- Yost, J. R. (2016). Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace by Scott J. Shackelford. Technology and Culture, 57(1), 280-281. http://ci.nii.ac.jp/ncid/BB1670865X
- Zetter, K. (2014). Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. https://ci.nii.ac.jp/ncid/BB19363361
Cite this article
-
APA : Usman, H., Mir, S. A., & Attiq-Ur-Rehman. (2023). Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter. Global Legal Studies Review, VIII(II), 16-26. https://doi.org/10.31703/glsr.2023(VIII-II).03
-
CHICAGO : Usman, Hazrat, Showkat Ahmad Mir, and Attiq-Ur-Rehman. 2023. "Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter." Global Legal Studies Review, VIII (II): 16-26 doi: 10.31703/glsr.2023(VIII-II).03
-
HARVARD : USMAN, H., MIR, S. A. & ATTIQ-UR-REHMAN. 2023. Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter. Global Legal Studies Review, VIII, 16-26.
-
MHRA : Usman, Hazrat, Showkat Ahmad Mir, and Attiq-Ur-Rehman. 2023. "Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter." Global Legal Studies Review, VIII: 16-26
-
MLA : Usman, Hazrat, Showkat Ahmad Mir, and Attiq-Ur-Rehman. "Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter." Global Legal Studies Review, VIII.II (2023): 16-26 Print.
-
OXFORD : Usman, Hazrat, Mir, Showkat Ahmad, and Attiq-Ur-Rehman, (2023), "Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter", Global Legal Studies Review, VIII (II), 16-26
-
TURABIAN : Usman, Hazrat, Showkat Ahmad Mir, and Attiq-Ur-Rehman. "Beyond Conventional War: Cyber Attacks and the Interpretation of Article 2(4) of the UN Charter." Global Legal Studies Review VIII, no. II (2023): 16-26. https://doi.org/10.31703/glsr.2023(VIII-II).03