Main Article Content
States and non-State armed groups are increasingly employing cyber capabilities in their military operations in the digitalization environment today. There is a controversy about how current international legal frameworks, especially International Humanitarian Law (IHL), applies to such conduct in cyberspace, most notably in the context of armed conflict. Because one of the fundamental aims of the IHL is to protect civilians from the impact of armed conflict, it is critical to explore the norms of IHL that regulate such operations. This article will be likely to discuss about cyber warfare in the term of armed conflict. Lastly, the article will be reviewing the rules and principle that applies during the cyber warfare.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
(ICRC), I. C. of the R. C. (2011). Study on the Use of the Emblems: Operational and Commercial and Other Non-operational Issues. ICRC. http://www.scribd.com/icrc/documents%5Cnpapers3://publication/uuid/BCE6628B-FF54-4B3F-AF01-9F63B10A6058
Brown, G., & Poellet, K. (2012). The Customary International Law of Cyberspace. Strategic Studies, 6(3), 126–145. http://www.airpower.maxwell.af.mil/apjinternational/apj-s/2013/2013-1/2013_1_06_brown_s_eng.pdf
Chang, Z. (2017). Cyberwarfare and International Humanitarian Law. Creighton International and Comparative Law Journal, 9(1), 29–53. https://doi.org/10.2139/ssrn.2973182
Droege, C. (2012). Get off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians. International Review of the Red Cross, 94(886), 533–578. https://doi.org/10.1017/S1816383113000246
Geiss, R. (2013). Cyber Warfare: Implications for Non-international Armed Conflicts. International Law Studies, 89, 627–645. http://eprints.gla.ac.uk/118026/1/118026.pdf
Geiß, R., & Lahmann, H. (2012). Cyber Warfare: Applying the Principle of Distinction in an Interconnected Space. Israel Law Review, 45(3), 381–399. https://doi.org/10.1017/S0021223712000179
Geneva Convention Relative To the Protection of Civilian Persons, 163.
Henckaerts, J. M., & Doswald-Beck, L. (2005). Customary International Humanitarian Law (Vol. 1). Cambridge University Press. https://doi.org/10.1017/CBO9780511804700
Hollis, D. B. (2018). International Law and State Cyber Operations: Improving Transparency. Inter-American Judicial Committee, August, 1. https://www.wired.com/story/2017-biggest-hacks-so-far/
International Court of Justice. (1996). Legality of the Threat or Use of Nuclear Weapons. Advisory Opinion on the Legality of the Threat or Use of Nuclear Weapons.
International Criminal Court. (2009). Judgment ICC-01/05-01/08-424, 15 June 2009, Situation in the Central African Republic in the Case of The Prosecutor v. Jean-Pierre Bemba Gombo. https://www.icc-cpi.int/CourtRecords/CR2009_04528.PDF
International Criminal Tribunal for the Former Yugoslavia 1993-1998. (n.d.). Judgment IT-98-29-T, 5 December 2003, The Prosecutor v. Stanislav Galić.
International Criminal Tribunal for the Former Yugoslavia 1993-1998. (1999). Decision on Defence Motion on Hearsay. In Andre Klip. Goran Sluitter (Ed.), Prosecutor v. Tadic, Case No. IT-94-1-T, T.Ch.II, 5 August 1996, Klip/Sluiter ALC-I- (Vol. 7, Issue 6 2). Intersentia.
International Criminal Tribunal for the Former Yugoslavia 1993-1998. (2005). Judgment IT-03-66-T, 30 November 2005, The Prosecutor v. Fatmir Limaj.
Islam, M. S. (2017). Cyber Warfare and International Humanitarian Law : A Study. International Journal of Ethics in Social Sciences, 5(1), 101–111.
Jensen, E. T. (2013). Cyber Attacks: Proportionality and Precautions in Attack. International Law Studies, 89(198), 21. https://doi.org/10.2139/ssrn.2154938
Lehm, A. J. (2013). Cyber Attacks in the Context of International Humanitarian Law. Master Thesis, University of Oslo.
Melzer, N. (2011). Cyberwarfare and International Law. UNIDIR Resources. https://unidir.org/files/publications/pdfs/cyberwarfare-and-international-law-382.pdf
Pascucci, P. (2017). Distinction and Proportionality in Cyberwar: Virtual Problems with a Real Solution. Minnesota Journal of International Law, 26(2), 419–460. https://core.ac.uk/download/pdf/217210854.pdf
Pictet, J. S. (1958). Commentary Geneva Convention Relative to the Protection of Civilian Persons in Time of War: Vol. IV. International Committee of the Red Cross. https://doi.org/10.5040/9781501329227-0026803
Protocols Additional to the Geneva Conventions of 12 August 1949, 30.
Rodenhauser, T., Gisel, L., & Maybee, L. (2021). Signaling Legal Protection in a Digitalizing World: a New Era for the Distinctive Emblems? Humanitarian Law and Policy. https://blogs.icrc.org/law-and-policy/2021/09/16/legal-protection-digital-emblem/
Schmitt, M. N. (2008). Cyber Operations and the Jus in Bello: Key Issues. In Naval War College International Law Studies. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1801176
Schmitt, M. N. (2012). “Attack” as a Term of Art in International Law: The Cyber Operations Context. In K. Z. (Eds. . C. Czosseck, R. Ottis (Ed.), 2012 4th International Conference on Cyber Conflict. NATO CCD COE. https://ccdcoe.org/uploads/2012/01/5_2_Schmitt_AttackAsATermOfArt.pdf
Schmitt, M. N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (M. N. Schmitt (ed.)). Cambridge University Press.