Cyber Warfare
- LAST REVIEWED: 27 March 2014
- LAST MODIFIED: 27 March 2014
- DOI: 10.1093/obo/9780199796953-0087
- LAST REVIEWED: 27 March 2014
- LAST MODIFIED: 27 March 2014
- DOI: 10.1093/obo/9780199796953-0087
Introduction
The advent of the Internet, and interconnected computer networks more generally, has impacted society in innumerable ways. Yet this new form of interconnectivity is a double-edged sword, turning dependency into vulnerability. As recent cyber attacks in past years have shown, the ability to cause havoc with far-reaching ramifications is a valid concern commanding worldwide attention. Countries from all regions have responded with increased development of their cyber capabilities, opening up a new military domain alongside land, sea, air, and space. Cyber warfare is not a legal term based on authoritative sources. Rather the concept is used loosely to describe an array of harmful actions carried out by states in cyberspace, through government instrumentalities or groups whose conduct can be attributed to said states, targeting computer networks in the context of an armed conflict or during peacetime. The latter term has also been employed to describe attacks by nonstate actors without state involvement. Cyber warfare should be distinguished from germane phenomena, namely, cyber crime, which constitutes domestic legislation prohibiting private persons from engaging in certain conduct and international tools outlining judicial cooperation, and cyber espionage, which may be state-sponsored activity but is centered on the gathering of sensitive information. Understood in this broad sense, cyber warfare can conceivably fall within the purview of several areas of international law. Determining the international legal implications of a computer network operation fundamentally rests on two preconditions: the first is whether an international obligation has been breached, for instance, the principle of nonintervention in the internal affairs of states; the second is whether the attack can be attributed to a state, which is difficult to prove because of the technical design of the Internet. Certain egregious cyber attacks can trigger the application of the law governing the use of force and/or the law of armed conflict. With respect to both normative frameworks, a lively debate is ongoing as to the relevant thresholds of harm to life and property and how to ensure respect for cardinal principles, such as distinction and proportionality. Other branches of international law have also been singled out either because they concurrently apply to cyber operations (e.g., telecommunications and space law) or because they have potential relevance as models for future cyber security norms (e.g., law of the sea, international environmental law, and international criminal law). Faced with lacunae in contemporary international law or unsatisfactory outcomes, the international community and jurists have voiced many proposals for reform ranging from treaties to soft law guidelines.
General Overviews
General in-depth examinations of cyber warfare from a legal perspective have grown in number since the proceedings of the first major conference on the topic—Schmitt and O’Donnell 2002—were published just over a decade ago. While some contributions offer a useful, succinct overview of the key legal issues, such as Woltag 2010, a small number of monographs have also been authored recently, including Harrison Dinniss 2012 and Kerschischnig 2012. Increased scholarly interest in computer network attacks and their regulation under international law has prompted the appearance of special editions of journals, for instance Air Force Law Review (Stevens 2009) and Journal of Conflict & Security Law (Buchan and Tsagourias 2012), that explore this theme. At least two major trends can be observed among general overviews. Whereas some publications focus on applying contemporary rules and principles of international law to the conduct of cyber military operations, such as Schmitt 2013, other contributions, such as Hathaway, et al. 2012 treat law reform, identifying shortcomings coupled with regulatory recommendations.
Buchan, Russell, and Nicholas Tsagourias, eds. Special Issue: Cyber War and International Law. Journal of Conflict & Security Law 17.2 (2012).
A special edition of the influential Journal of Conflict & Security Law featuring the outcome of a workshop held at the University of Glasgow in October 2011. A capita selecta of topics touching upon general international law, jus contra bellum, and jus in bello.
Harrison Dinniss, Heather. Cyber Warfare and the Laws of War. Cambridge, UK: Cambridge University Press, 2012.
A thoroughly researched monograph based on the author’s PhD dissertation that focuses on the use of force and the law of armed conflict. The book also serves as a useful source of information, thanks to a listing of significant computer network attacks spanning more than two decades and a sizable bibliography.
Hathaway, Oona A., Rebecca Crootof, Philip Levitz, et al. “The Law of Cyber-attack.” California Law Review 100 (2012): 817–885.
Presents a well-developed definition of the concept of “cyberattack,” which forms the cornerstone for legal analysis. Having found shortcomings in the current framework, the authors suggest a new regime based on domestic cybercrime statutes with increased extraterritorial application, multilateral agreements, and enhanced international cooperation.
Kerschischnig, Georg. Cyberthreats and International Law. The Hague: Eleven International, 2012.
Includes a helpful chapter on “cyber threats” that details the actors involved, categories of cyberattacks, and inherent weaknesses in critical infrastructure. The focal point is cyber warfare; however, attention is paid equally to cyber espionage, crime/terrorism, and human rights. The author formulates recommendations aimed at adequately managing dangers in cyberspace.
Schmitt, Michael N., ed. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge, UK: Cambridge University Press, 2013.
A large project carried out by an international group of experts at the invitation of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCE). Contains ninety-five black-letter rules on security law (general international law and use of force) and the law of armed conflict (writ large), referencing treaty law, customary rules, case law, and state practice.
Schmitt, Michael N., and Brian T. O’Donnell, eds. “Computer Network Attack and International Law.” US Naval War College International Law Studies 76 (2002): 1–568.
From the annual “Blue Book” series of the US Naval War College. A lengthy collection of articles addressing a rather wide range of legal questions relevant to the conduct of military operations in cyberspace. Noted for being one of the earliest in-depth treatments in the (then embryonic) field.
Stevens, Graham E., ed. Special Issue: Cyberlaw Edition. Air Force Law Review 64 (2009).
A special edition of the flagship journal of the US Air Force Judge Advocate General’s Corps, comprising contributions from military lawyers. The authors tackle not only problems of international law but also US criminal and administrative law.
Woltag, Johann-Christoph. “Cyber Warfare.” In Max Planck Encyclopedia of Public International Law. Edited by Rüdiger Wolfrum. May 2010.
A handy primer on the various legal problems to which cyber warfare may give rise. The section on defining and differentiating cyber warfare (vis-à-vis related notions) is particularly instructive.
Users without a subscription are not able to see the full content on this page. Please subscribe or login.
How to Subscribe
Oxford Bibliographies Online is available by subscription and perpetual access to institutions. For more information or to contact an Oxford Sales Representative click here.
Article
- Act of State Doctrine
- Africa and Intellectual Property Rights for Plant Varietie...
- African Approaches to International Law
- African Commission on Human and Peoples' Rights and the Af...
- Africa’s International Intellectual Property Law Regimes
- Africa’s International Investment Law Regimes
- Agreements, Bilateral and Regional Trade
- Agreements, Multilateral Environmental
- Aliens
- Applicable Law in Investment Agreements
- Archipelagic States
- Arctic Region
- Armed Opposition Groups
- Aut Dedere Aut Judicare
- Balance of Power
- Bandung Conference, The
- Boundaries
- British Mandate of Palestine and International Law, The
- Children's Rights
- China, Judicial Application of International Law in
- China, Law of the Sea in
- Civil Service, International
- Civil-Military Relations
- Codification
- Cold War International Law
- Collective Security
- Command Responsibility
- Common Heritage of Mankind
- Complementarity Principle
- Compliance in International Law
- Conspiracy/Joint Criminal Enterprise
- Constitutional Law, International
- Consular Relations
- Contemporary Catholic Approaches
- Continental Shelf, Idea and Limits of the
- Cooperation in Criminal Matters, Cross-Border
- Countermeasures
- Courts, International
- Crimes against Humanity
- Criminal Law, International
- Cultural Rights
- Cyber Espionage
- Cyber Warfare
- Debt, Sovereign
- Decolonization in International Law
- Democracy
- Development Law, International
- Disarmament in International Law
- Discrimination
- Disputes, Peaceful Settlement of
- Drugs, International Regulation, and Criminal Liability
- Early 19th Century, 1789-1870
- Ecological Restoration and International Law
- Economic Law, International
- Effectiveness and Evolution in Treaty Interpretation
- Enforced Disappearances in International Law
- Enforcement of Human Rights
- Environmental Compliance Mechanisms
- Environmental Institutions, International
- Environmental Law, International
- Estoppel
- European Arrest Warrant
- Exclusive Economic Zone
- Extraterritorial Application of Human Rights Treaties
- Fascism and International Law
- Feminist Approaches to International Law
- Financial Law, International
- Forceful Intervention for Protection of Human Rights in Af...
- Foreign Investment
- Fragmentation
- Freedom of Expression
- French Revolution
- Gender and International Law, Theoretical and Methodologic...
- Gender and International Security
- General Customary Law
- General Principles of Law
- Genocide
- Georgia and International Law
- Grotius, Hugo
- Habeas Corpus
- Hijaz and International Law, The
- History of International Law, 1550–1700
- Hostilities, Direct Participation in
- Human Rights
- Human Rights and Regional Protection, Relativism and Unive...
- Human Rights, China's Practices in
- Human Rights, European Court of
- Human Rights, Foundations of
- Human Rights Law, History of
- Human Trafficking
- Hybrid International Criminal Tribunals
- Immunities
- Immunity, Sovereign
- in Latin America and the Caribbean, International Legal Pr...
- Indigenous Peoples
- Individual Criminal Responsibility
- Institutional Law
- Inter-American Commission on Human Rights (IACHR) and Inte...
- International and Non-International Armed Conflict, Detent...
- International Committee of the Red Cross
- International Community
- International Court of Justice
- International Criminal Court, The
- International Criminal Law, Complicity in
- International Criminal Tribunal for Rwanda (ICTR)
- International Criminal Tribunal for the Former Yugoslavia ...
- International Fisheries Law
- International Humanitarian Law
- International Humanitarian Law, China and
- International Humanitarian Law, Targeting in
- International Intellectual Property Law, China and
- International Investment Agreements, Fair and Equitable Tr...
- International Investment Arbitration
- International Investment Law, China and
- International Investment Law, Expropriation in
- International Law, Aggression in
- International Law, Amnesty and
- International Law and Economic Development
- International Law, Anthropology and
- International Law, Big Data and
- International Law, Climate Change and
- International Law, Derogations and Reservations in
- International Law, Dispute Settlement in
- International Law, Ecofeminism and
- International Law, Economic Analysis and
- International Law, Espionage in
- International Law, Hegemony in
- International Law in Cyberspace, China and
- International Law in Greek
- International Law in Italian
- International Law in Northeast Asia
- International Law in Portuguese
- International Law in Turkish
- International Law, Legitimacy in
- International Law, Marxist Approaches to
- International Law, Military Intervention in
- International Law, Money Laundering in
- International Law, Monism and Dualism in
- International Law, Peacekeeping in
- International Law, Proportionality in
- International Law, Reasonableness in
- International Law, Recognition in
- International Law, Self-Determination in
- International Law, State Responsibility in
- International Law, State Succession in
- International Law, the State in
- International Law, The Turkish-Greek Population Exchange a...
- International Law, the Turn to History in
- International Law, The United States and
- International Law, Trade and Development in
- International Law, Unequal Treaties in
- International Law, Use of Force in
- International Legal Personality
- International Regulation of the Internet
- International Relations Study in China, International Law ...
- International Rule of Law, An
- International Territorial Administration
- International Trade and Human Rights
- Intervention, Humanitarian
- Investment Protection Treaties
- Investor-State Conciliation and Mediation
- Iran and International Law
- Iraq War, Britain and the
- Islamic Cooperation, International Law and the Organizatio...
- Islamic International Law
- Islamic Law and Human Rights
- Islands
- Jerusalem
- Jurisdiction
- Jurisprudence (Judicial Law-Making)
- Jus Cogens
- Just War
- Landlocked Countries and the Law of the Sea
- Law of the Sea
- Law of Treaties, The
- Law-Making by Non-State Actors
- League of Nations, The
- Lebanon, Special Tribunal for
- Legal Pluralism
- Legal Status of Military Forces Abroad
- Liability for International Environmental Harm
- Liberation and Resistance Movements
- Mandates in International Law
- Maritime Delimitation
- Martens Clause
- Medieval International Law
- Mens Rea, International Crimes
- Middle East Boundaries and State Formation
- Migration
- Military Necessity
- Military Occupation
- Minorities
- Modes of Participation
- Most-Favored-Nation Clauses
- Multinational Corporations in International Law
- Nationality and Statelessness
- Natural Law
- Neutrality
- New Approaches to International Law
- New Haven School of International Law, The
- Non liquet
- Noninternational Armed Conflict (“Civil War”)
- Nonstate Actors
- Nuclear Non-Proliferation
- Nuremberg Trials
- Organizations, International
- Pacifism in International Law
- Palestine (and the Israel Question)
- Peace Treaties
- Piracy
- Political Science, International Law and
- Positivism
- Private Military and Security Companies
- Protection, Diplomatic
- Public Interest, Human Rights, and Foreign Investment
- Queering International Law
- Rational Choice Theory
- Recognition of Foreign Penal Judgments
- Refugee Law, China and
- Refugees
- Rendition, Extraterritorial Abduction, and Extraordinary R...
- Reparations
- Russian Approaches to International Law
- Sanctions, International
- Sanctions, International
- Secession
- Self-Defense
- Slavery
- Soft Law
- Space Law
- Spanish School of International Law (c. 16th and 17th Cent...
- Sports Law, International
- State of Necessity
- Superior Orders
- Taba Arbitration, The
- Teaching International Law
- Territorial Title
- Terrorism
- The 1948 Arab-Israeli Conflict and International Law
- The Ottoman Empire and International Law
- Theory, Critical International Legal
- Tibet
- Tokyo Trials, The
- Torture
- Transnational Constitutionalism, Africa and
- Transnational Corruption
- Treaty Interpretation
- Ukrainian Approaches
- UN Partition Plan for Palestine and International Law, The
- UN Security Council, Women and the
- Underwater Cultural Heritage
- Unilateral Acts
- United Nations and its Principal Organs, The
- Universal Jurisdiction
- Uti Possidetis Iuris
- Vatican and the Holy See
- Victims’ Rights, International Criminal Law, and Proceedin...
- War Crimes
- Watercourses, International
- Western Sahara
- World Trade Organization Law, China and