CONTEMPORARY TRENDS IN CYBER WARFARE AND THE USE OF FORCE IN INTERNATIONAL LAW: DEMYSTIFYING ARTICLE 2 (4) OF THE UN CHARTER
DOI:
https://doi.org/10.53704/fulaj.v1i2.553Abstract
Abstract
The proscription of the use of force under article 2 (4) of the United Nations (UN) Charter is generally accepted as having the effect of a treaty provision as well as customary principle in international law. Interestingly, the scope and effect of article 2 (4) is still being debated. Emerging trends on the use of cyber space creates a new dimension to the argument on the scope of article 2 (4). In 2017, North Korea allegedly hacked South Korean Defence systems stealing terabytes of sensitive defence data, and was also suspected of masterminding the hacking of a US filmmakers’ data base resulting in losses of millions of dollars. In response, the US allegedly engineered a devastating attack on the North Korean cyber space, and sanctioned North Korea for the hacking of Sony Pictures. Again, the US accused Russia of meddling in its electoral process largely using the cyber space, thus, imposed several sanctions on Russia. Russia also retaliated by expelling some US diplomatic staff from Moscow. Using doctrinal research methodology, this paper examines how these activities relates to the international legal regime on the use of force. It aims to establish how the occurrences of cyber warfare have influenced an emerging reinterpretation of article 2 (4). The paper relied on wide literature relating to the use of force and cyber warfare to achieve the objective of interpreting article 2 (4) in line with contemporary happenings. It argues that cyber warfare could amount to an armed attack capable of activating the right of other states to self-defence. The paper finds that states and publicists have equally treated cyber warfare as an armed attack, though determining the proportionality or necessary retaliatory actions may be a complex issue.
Keywords: Use of Force, Cyberspace, Cyber-warfare, UN Charter, International Law.
References
Michael Wood, ‘The Law on the Use of Force: Current Challenges’, Singapore Year Book of International Law and Contributors {2007} (Vol. 11): 1–14.
Case Concerning Military and Paramilitary Activities in and Against Nicaragua (Merits), ICJ Reports (1986). 14, para. 190. (the Nicaragua case).
See Evan J. Criddle and Evan Fox-Decent, ‘A Fiduciary Theory of Jus Cogens’, Yale Journal of International Law, {2009} (vol. 34) (No. 2) 331–87, 331. See also, ibid.
Case Concerning Military and Paramilitary Activities in and Against Nicaragua (Merits), ICJ Reports (1986). 14, para. 176. (the Nicaragua case).
C. Demchak, ‘Resilience, Disruption, and a Cyber Westphalia: Options for National Security in a Cybered Conflict World’, in N. Burns and J. Price (eds), Securing Cyberspace: A New Domain for National Security, 2012; J.S. Nye Jr., Normative Restraints on Cyber Conflict, (Belfer Center for Science and International Affairs, 2018).
Russia accused of unleashing cyberwar to disable Estonia, The Guardian, Thursday 17 May 2007. https://www.theguardian.com/international. Accessed 12/13/2017.
Miroslav Mareš & Veronika Netolická, Georgia 2008: Conflict Dynamics in the Cyber Domain, Strategic Analysis, {2020)} 44:3, 224-240, DOI: 10.1080/09700161.2020.1778278. see also, UK says Russia's GRU behind massive Georgia cyber-attack, https://www.bbc.com/news/technology-51576445, Accessed 11/25/2020.
Jonathan Fildes, 'Stuxnet Worm ‘Targeted High-Value Iranian Assets', BBC News, 23 September, 2010, www.bbc.com/news .
BBC, 'The Interview: A Guide to the Cyber Attack on Hollywood', BBC News, 29 December, 2014, www.bbc.com/news .
Office of the Director of National Intelligence, 'Background to ‘Assessing Russian Activities and Intentions in Recent US Elections’: The Analytic Process and Cyber Incident Attribution,' 2017, https://www.dni.gov/files/documents/ICA_2017_01.pdf%0A
See for example, Jozef Valuch, Tomáš Gábriš, and Ondrej Hamu?ák, 'Cyber Attacks, Information Attacks, and Postmodern Warfare,' Baltic Journal of Law & Politics, [2017] (10) (1) 63–89, 207.; See also United Nations, 'Charter Of The United Nations' (San Francisco, 1945), doi:ISBN: 9789210020251, preamble, para 7.; Albrecht Randelzhofer and Oliver Dorr, ‘Article 2 (4),’ in Bruno Simma and others (eds), ‘The Charter of the United Nations’, (3rd edn , Oxford: Oxford University Press, 2012), 209.; James A. Delanis, ‘Force under Article 2(4) of the United Nations Charter: The Question of Economic and Political Coercion’ V and. J. Transnat’l L, {1979}, (vol. 12), (no. 101) 132.; (n 2, p 73).
United Nations, ibid.
For argument along the same line, See (n 2), 73.
(n 11).
Albrecht Randelzhofer and Oliver Dorr, Article 2 (4): in The Charter of the United Nations, Bruno Simma and others (eds), (3rd ed. Oxford University Press, 2012). 40.
Valuch, Gábriš, and Hamu?ák, (n 11).”
Marco Roscini, Cyber Operations and the Use of Force in International Law (Oxford University Press, 2014). 77.
Valuch, Gábriš, and Hamu?ák, (n 11) 33.
Valuch, Gábriš, and Hamu?ák, (n 11) 33.
James J Wirtz, Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy, in Kenneth Geers, (ed) Cyber War in Perspective: Russian Aggression Against Ukraine, (vol. 3, NATO CCD COE Publications, 2015), 29–37. 67.
(n 20).
Ian Traynor, 'Russia Accused of Unleashing Cyberwar to Disable Estonia,' The Guardian, 17 May, 2007, https://www.theguardian.com/international. .
Ibid.
(n 11).
(n 22).
Jonathan Fildes, 'Stuxnet Worm ‘Targeted High-Value Iranian Assets', BBC News, 23 September, 2010, www.bbc.com/news .
Veronika Mackova, 'Cyber War of The States: Stuxnet and Flame Virus Opens New Era of War', Policy Papers 2 (Bratislava, Slovakia, 2013), http://cenaa.org/wp-content/uploads/2014/05/Veronika-Mackova.pdf ; 5.
David E. Sanger, 'Obama Order Sped Up Wave of Cyberattacks Against Iran', The New York Times, June 1, 2012, https://www.nytimes.com/pages/world/middleeast/index.html .
BBC, 'The Interview: A Guide to the Cyber Attack on Hollywood', BBC News, 29 December, 2014, www.bbc.com/news .
ibid.
David E. Sanger, Michael S. Schmidt, and Nicole Perlroth, 'Obama Vows a Response to Cyberattack on Sony', New York Times, December 19, 2014, https://www.nytimes.com/pages/world/asia/index/html .
Nick Allen, 'North Korea Internet ‘Totally Down’ as US Cyber Attack Suspected' The Telegraph, 22 December, 2014, www.telegraph.co.uk. .
Ibid.
CHOE SANG-HUNOCT, 'North Korean Hackers Stole U.S.-South Korean Military Plans, Lawmaker Says, The New York Times, October 10, 2017, www.nytimes.com .
See (n 30).
(n 10).
Olivia Solon and Sabrina Siddiqui, 'Russia-Backed Facebook Posts ‘Reached 126m Americans’ during US Election', The Guardian, 31st October, 2017. https://www.theguardian.com › Technology › Facebook
(n 10).
(n 10).
Evan Perez and Daniella Diaz, 'White House Announces Retaliation against Russia: Sanctions, Ejecting Diplomats', CNN, January 3, 2017, edition.cnn.com/2016/12/29/.../russia-sanctions-announced-by-white-house/index.html. .
Zack Beauchamp, 'Russia Is Retaliating against New US Sanctions in a Big Way', Vox, July 30, 2017, https://www.vox.com/world/2017/7/30/.../putin-russia-755-diplomats-us-embassy .
CSIS | Center for Strategic and International Studies, Significant Cyber Incidents | Strategic Technologies Program, https://www.csis.org › progr https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents#main-content; Accessed 01/05/2024.
Ibid.
Ibid.
Ibid.
Ibid.
Ibid.
Ibid.
Ibid.
O’Connell, Mary Ellen. ‘The Prohibition of the Use of Force’ In Research Handbook on International Conflict and Security Law. (Edward Elgar Publishing, 2013).
Edward Gordon, 'Article 2 (4) in Historical Context', Yale Journal of International Law, [1985], (10) (2) 271–78. 271.
Some of these efforts include the League of Nations, The Kellogg-Briand Pact signed on August 27, 1928.
(n 15): see also ICJ Reports, Armed Activities on the Territory of the Congo (DRC v Uganda) (Merits) (2005).; The Nicaragua Case, n 2.
Mohammed Barakat, 'The Legality of the Use of Force against Iraq in 2003' (City University London, 2007). 14.
United Nations, '(n 11)'.
M. Goodrich L and E Hambro, Charter of the United Nations; Commentary and Documents, (2nd ed, Stevens & Sons, 1949,). 6-7.
Ian Brownlie, 'International Law and the Use of Force by States - Revisited', in A Europaeum Lecture Delivered at the Graduate Institute of International Studies, Geneva, on February 1st, 2001, 1–26.
Helmersen, Sondre Torp. "The Prohibition of the Use of Force as Jus Cogens: Explaining Apparent Derogations.’Netherlands International Law Review’ {2014} (vol. 61),( no. 2): 167-193.
Yoram Dinstein, War, Aggression and Self-Defence, (Cambridge University Press, 2005, 4th ed). 175.
Yoram Dinstein, 'International Law as a Primitive Legal System', NYUJ Int’l L. & Pol. [1986] (19) (1) 12.
(n 15)1398. 1399.
(n 15), 1401.
See for instance, Ruys, Tom. 'Armed Attack' and Article 51 of the UN Charter: Evolutions in Customary Law and Practice. (Cambridge University Press, 2010), Todd, Graham H. "Armed attack in cyberspace: deterring asymmetric warfare with an asymmetric definition. ‘AFL Rev’ 64 {2009}: 65., Feder, Norman Menachem. "Reading the UN Charter Connotatively: Toward a New Definition of Armed Attack." NYUJ Int'l L. & Pol. 19. (1986): 395. See also, the Nicaragua Case; (n 2),14. 103 paras 194-98.
The Nicaragua Case; (n 2),14. 103 paras 195.
Claus Kreß, 'Armed Attack’ and Article 51 of the UN Charter. Evolutions in Customary Law and Practice', [2014] (83) (1) Bybil; 145–60, doi:10.1093/bybil/brt010.
Tom Ruys, "Armed Attack”and Article 51 of the UN Charter: Evolutions in Customary Law and Practice (Cambridge University Press, 2010). 3.
ibid.
On this, (n 15), 1401-2.
(n 2). 94.
Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, I.C.J. Reports, (1996). 245.
Oil Platforms (Islamic Republic of Iran v United States of America), ICJ Reports 161 (2003). 1361
( n 15), 1426.
( n 51). 209.
William H. IV Taft, 'Self-Defense and the Oil Platforms Decision', Yale J. Int’l L, [2004], (29), 295. 302.
Oscar Schachter, 'The Right of States to Use Armed Force', Mich. L. Rev, [1984] (82) (1), 620–46. 1635.
(n 51) 210.
Case Concerning Oil Platforms (Islamic Republic of Iran v. United States of America, ICJ Reports (2003). 37, Para 76.
(n 15), 1426.
(n 66).
Stephenie Gosnell Handler, 'The New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare', Stanford Journal of International Law [2012] (48) (1); 209–37. 210: Jozef Valuch, Cyber Attacks, Information Attacks, and Postmodern Warfare, Baltic Journal of Law & Politics (2017) (10:1) 910:1: 63–89 http://www.degruyter.com/view/j/bjlp DOI: 10.1515/bjlp-2017-0003, 72: Michael N. Schmitt, Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, Colum. J. Transnat'l L. (1999) (37) 885, 938.
Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, I.C.J. Reports (1996). 226, para 39.
(n 58), 515.
(n 15), 1419.
(n 72).
( n 11) 78.
NATO, 'Press Conference by NATO Secretary General Anders Fogh Rasmussen Following the Meeting of the North Atlantic Council at the Level of Heads of State and Government during the NATO Wales Summit', 05 September, 2014, https://www.nato.int/cps/ic/natohq/opinions_112871.htm%0A.
(n 31).
Michael N Schmitt, Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge University Press, 2013). 26.
(n 31).
For more on this, see Malcolm N Shaw, International Law, (8th ed. Cambridge University Press, 2017). 1178-9.
(n 34).
( n 10).”
See S Chesterman, 'The Spy Who Came in from the Cold War: Intelligence and International Law', Michigan Journal of International Law; [2006] (27) (4) 1071–1130.
(n 10).
( n 80).
See United Nations, n 11 art. 2 (1) & (4); Kawser Ahmed, 'The Domestic Jurisdiction Clause in the United Nations Charter: A Historical View', Singapore Yearbook of International Law: [2006] (10)175–97.
(n 46); 14-15.
Pascal Brangetto, Tomáš Minárik, and Jan Stinissen, 'From Active Cyber Defence to Responsive Cyber Defence: A Way for States to Defend Themselves – Legal Implications', in Dr Petra Ochmannova (ed) Legal Issues Related to Cyber, (35th ed, Monte DeBoer, 2014), www.nato.int . 20.
For general discussion on this, see Heinegg Von and Wolff Heintschel., 'Legal Implications of Territorial Sovereignty in C. Czosseck, R. Ottis, and K. Ziolkowski ed. Cyberspace', in Cyber Conflict (CYCON), 2012 4th International Conference, (Tallinn: NATO CCD COE Publications, 2012), 1–13.
(n 90); 20.
See The Nicaragua Case (Merits), (n 2) . 103 paras 195.
Georg Nolte and A. Randelzhofer. "Article 51 in Bruno Simma and others (eds.), The Charter of the United Nations: A Commentary (vol. II.OUP 2012), 1420.
Sarah Left, 'Iraq War ‘Waged on False Intelligence', The Guardian, 9 July, 2004. https://www.theguardian.com › World › Iraq .
Marco Roscini, 'World Wide Warfare - Jus Ad Bellum and the Use of Cyber Force', in Armin Von bogdandy and R Wolfrum (eds) Max Planck Yearbook of United Nations Law, (vol. 14, Koninklijke Brill N.V, 2010); 85–130. 96.
(n 69).161, Para 57.
See for example, BBC NEWS, 'Cyber-Attack: US and UK Blame North Korea for WannaCry', 19 December, 2017, www.bbc.com/news/world-us-canada-42407488 .
(n 94); 1420.
( n 80). Rule 9.
Christine Gray, International Law and the Use of Force, (3rd ed, Oxford University Press, 2008). 148.
Case Concerning Oil Platforms, (n 69) 161. Para 143; Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996. 226 para 141.
Matthew Waxman, 'Cyber Attacks as Force under UN Charter Article 2(4)', International Law Studies; [2010] (87) (4) 43–57. 48.
(n 90); 17.
ibid.

Downloads
Published
Issue
Section
License
Copyright (c) 2024 Suleiman Usman Santuraki

This work is licensed under a Creative Commons Attribution 4.0 International License.