Main Article Content

Amalia Zuhra
Laila Almira


States and non-State armed groups are increasingly employing cyber capabilities in their military operations in the digitalization environment today. There is a controversy about how current international legal frameworks, especially International Humanitarian Law (IHL), applies to such conduct in cyberspace, most notably in the context of armed conflict. Because one of the fundamental aims of the IHL is to protect civilians from the impact of armed conflict, it is critical to explore the norms of IHL that regulate such operations. This article will be likely to discuss about cyber warfare in the term of armed conflict. Lastly, the article will be reviewing the rules and principle that applies during the cyber warfare.




Download data is not yet available.

Plum Analytics

Article Details



(ICRC), I. C. of the R. C. (2011). Study on the Use of the Emblems: Operational and Commercial and Other Non-operational Issues. ICRC.

Brown, G., & Poellet, K. (2012). The Customary International Law of Cyberspace. Strategic Studies, 6(3), 126–145.

Chang, Z. (2017). Cyberwarfare and International Humanitarian Law. Creighton International and Comparative Law Journal, 9(1), 29–53.

Droege, C. (2012). Get off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians. International Review of the Red Cross, 94(886), 533–578.

Geiss, R. (2013). Cyber Warfare: Implications for Non-international Armed Conflicts. International Law Studies, 89, 627–645.

Geiß, R., & Lahmann, H. (2012). Cyber Warfare: Applying the Principle of Distinction in an Interconnected Space. Israel Law Review, 45(3), 381–399.

Geneva Convention Relative To the Protection of Civilian Persons, 163.

Henckaerts, J. M., & Doswald-Beck, L. (2005). Customary International Humanitarian Law (Vol. 1). Cambridge University Press.

Hollis, D. B. (2018). International Law and State Cyber Operations: Improving Transparency. Inter-American Judicial Committee, August, 1.

International Court of Justice. (1996). Legality of the Threat or Use of Nuclear Weapons. Advisory Opinion on the Legality of the Threat or Use of Nuclear Weapons.

International Criminal Court. (2009). Judgment ICC-01/05-01/08-424, 15 June 2009, Situation in the Central African Republic in the Case of The Prosecutor v. Jean-Pierre Bemba Gombo.

International Criminal Tribunal for the Former Yugoslavia 1993-1998. (n.d.). Judgment IT-98-29-T, 5 December 2003, The Prosecutor v. Stanislav Galić.

International Criminal Tribunal for the Former Yugoslavia 1993-1998. (1999). Decision on Defence Motion on Hearsay. In Andre Klip. Goran Sluitter (Ed.), Prosecutor v. Tadic, Case No. IT-94-1-T, T.Ch.II, 5 August 1996, Klip/Sluiter ALC-I- (Vol. 7, Issue 6 2). Intersentia.

International Criminal Tribunal for the Former Yugoslavia 1993-1998. (2005). Judgment IT-03-66-T, 30 November 2005, The Prosecutor v. Fatmir Limaj.

Islam, M. S. (2017). Cyber Warfare and International Humanitarian Law : A Study. International Journal of Ethics in Social Sciences, 5(1), 101–111.

Jensen, E. T. (2013). Cyber Attacks: Proportionality and Precautions in Attack. International Law Studies, 89(198), 21.

Lehm, A. J. (2013). Cyber Attacks in the Context of International Humanitarian Law. Master Thesis, University of Oslo.

Melzer, N. (2011). Cyberwarfare and International Law. UNIDIR Resources.

Pascucci, P. (2017). Distinction and Proportionality in Cyberwar: Virtual Problems with a Real Solution. Minnesota Journal of International Law, 26(2), 419–460.

Pictet, J. S. (1958). Commentary Geneva Convention Relative to the Protection of Civilian Persons in Time of War: Vol. IV. International Committee of the Red Cross.

Protocols Additional to the Geneva Conventions of 12 August 1949, 30.

Rodenhauser, T., Gisel, L., & Maybee, L. (2021). Signaling Legal Protection in a Digitalizing World: a New Era for the Distinctive Emblems? Humanitarian Law and Policy.

Schmitt, M. N. (2008). Cyber Operations and the Jus in Bello: Key Issues. In Naval War College International Law Studies.

Schmitt, M. N. (2012). “Attack” as a Term of Art in International Law: The Cyber Operations Context. In K. Z. (Eds. . C. Czosseck, R. Ottis (Ed.), 2012 4th International Conference on Cyber Conflict. NATO CCD COE.

Schmitt, M. N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (M. N. Schmitt (ed.)). Cambridge University Press.