Professional Documents
Culture Documents
First, cyberwarfare immediate targets are computer systems and networks and most
cyberattacks are conducted through computers and computer networks. Nonetheless,
computer systems and networks may be used to target physical systems and produce physical
damages, death and injury. Second, cyberwarfare attacks may be planned to be executed in a
1
http://www.nyulawglobal.org/globalex/Cyberwarfare_Collateral_Damages.html
2
Richard A. Clarke, Robert K. Knake, Cyberwar, Harper Collins, 2010.
3
Nils Melzer, Cyberwarfare and the International Law, 2011.
very short lapse of time. Third, cyberwarfare activities, given how computer networks and
particularly the Internet are designed, may be routed through many territories, hence complex
problems regarding law of neutrality arise. Fourth, some cyberwarfare activities, aimed at
creating kinetic attacks, may use the hardware and weapons of the enemy in order to execute
the attack by remote controlling them. Fifth, most cyberwarfare attacks may be launched in
stealth mode, i.e. without identification of the attackers. And finally, many cyberwarfare
activities may require the use of many computer techniques and technologies and malware or
the exploitation of vulnerabilities in the targeted computer systems, as well as social
engineering techniques in order to gain access to computer systems and networks.
Sometimes such activity requires an extensive study and design, a lot of programming and a
multidisciplinary approach. A lot of investments and preparation may be needed for attacks
that rarely may be launched more than once or replicated.
Analysis of the phenomenon and definitions of the concept are important in order to deal with
important international law issues, particularly with the ius ad bellum and the ius in
bello norms.
For what ius ad bellum is concerned, primary problems are whether cyberwarfare is to be
considered use of the force according art. 2(4) UN Charter, whether it is to be considered an
armed attack under article 51 of the UN Charter and whether and under what conditions
cyberwarfare gives the right to self-defense.]
With regard to ius in bello cyberwarfare raises interesting problems regarding the possibility
to apply existing international humanitarian law (IHL) norms. As a matter of fact, at the time
of UN Charter drafting cyberwarfare or cyberspace did not exist and so the question whether
current international norms apply or whether new international norms are needed assumes a
great relevance.
On a regional scale, another key question is whether article 5 of the NATO treaty is to be
applied to cyberwarfare activities. Regarding international law, a very precious initiative was
undertaken by a group of experts invited by an international organization, the NATO
Cooperative Cyber Defense Centre of Excellence (NATO CCD COE), in order to create a
manual governing cyberwarfare. Even if the manual (so called “Tallinn Manual” is not an
official NATO document and expresses the view of the experts and not the views of NATO
CCD COE, its sponsoring nations, or NATO, it is a very important attempt to study
cyberwarfare based on customary and conventional international law and to propose some
clear rules of conduct.
The norms formulated by the experts consist in numbered rules and each rule is accompanied
by a short commentary. Comments to each rule indicate the relevant existing international
law norms and the interpretation process. The manual itself is written in a concise and clear
manner and allows following transparently the reasoning behind each interpretation and
formulation of rules.
Review of literature
6
http://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=4844&context=fss_papers
7
http://unidir.org/files/publications/pdfs/cyberwarfare-and-international-law-382.pdf
1) Cyberwarfare and collateral damages by- Edoardo E. Artese and valentin
vitkov
Where this article basically gave an introduction to the cyberwarfare and
the kinds of cyber weapons when and this basically deals with the
international issues where ever the attack has been initiated and where the
attack took place, where international law plays a major role.
Major example here stated was stuxnet.
This is basically the law of cyber attacks what it is basically and existing
conceptions. Where the international legal regimes that indirectly regulate
cyber attacks such as telecommunications aviation space and sea. New
laws and other legal frame works involved.