<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article         dtd-version="1.4">
            <front>

                <journal-meta>
                                                                <journal-id>jnse</journal-id>
            <journal-title-group>
                                                                                    <journal-title>Journal of Naval Sciences and Engineering</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">1304-2025</issn>
                                                                                                        <publisher>
                    <publisher-name>Millî Savunma Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id/>
                                                                                                                                                                                            <title-group>
                                                                                                                        <article-title>PROHIBITION AGAINST THE USE OF FORCE AND THE COERCIVE USES OF THE CYBERSPACE</article-title>
                                                                                                                                        </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                <name>
                                    <surname>Canca</surname>
                                    <given-names>Hakan Selim</given-names>
                                </name>
                                                                    <aff>National Defence University Turkish Naval Academy</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20170428">
                    <day>04</day>
                    <month>28</month>
                    <year>2017</year>
                </pub-date>
                                        <volume>13</volume>
                                        <issue>1</issue>
                                        <fpage>60</fpage>
                                        <lpage>72</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20170516">
                        <day>05</day>
                        <month>16</month>
                        <year>2017</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20170319">
                        <day>03</day>
                        <month>19</month>
                        <year>2017</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2003, Journal of Naval Sciences and Engineering</copyright-statement>
                    <copyright-year>2003</copyright-year>
                    <copyright-holder>Journal of Naval Sciences and Engineering</copyright-holder>
                </permissions>
            
                                                                                                <abstract><p>The use offorce is resorted by States as a form of dispute settlement generally as a lastresort. But Article 2(3) of the United Nations (UN) Charter states that allmembers shall settle their international disputes by peaceful means. Article2(4) bans the unilateral use or threat of force by States. In the customaryinternational law, Article 2(4) is interpreted as a prohibition against the useof force focusing on restricting the use of military instruments. Thisinstrument-based interpretation of the use of force causes the responsibilityof States which deploys cyber instruments to cause physical damage in thetarget States’ critical infrastructures, remain outside the scope of Article2(4).&amp;nbsp; There aredoctrinal difficulties in examining current international law on use of forceand self-defense in cyberspace, while the legal frameworks for defining theparameters of operations in cyberspace are not clear. As being unforseen untilthis age of information and cyber technology, the prohibition of the use offorce interpreted from Article 2(4) should be evolved to cover coercive uses ofcyber instruments being used to have destructive effects in the enemy’sphysical infrastructures such as telecommunications, transportation, powersystems, finance and emergency services.&amp;nbsp;Categorizingthe cyber attacks as having physical effects to critical infrastructure and nothaving any physical effects can be the first step to solve the problem ofevolving the article to cover cyber attacks within the concept of use of force.Then the efforts may be concentrated on the cyber attacks having physicaleffects on the enemy’s infrastructures to be considered as a use of force. Themain problem is that there would be an unwillingness of the powerful Stateswhich are likely to use the opportunities of cyberspace in Inter-State coercionto evolve the interpretation of the article, while the technology-dependent orpowerless States would have a volition to evolve the Article.</p></abstract>
                                                                                    
            
                                                            <kwd-group>
                                                    <kwd>Use of Force</kwd>
                                                    <kwd>  Self Defence</kwd>
                                                    <kwd>  Cyberspace</kwd>
                                                    <kwd>  Cyber Attacks</kwd>
                                                    <kwd>  Cyberspace Operations</kwd>
                                                    <kwd>  Act of Aggression</kwd>
                                            </kwd-group>
                                                        
                                                                                                                                                    </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">[1] Andrew Moore, “Stuxnet and Article 2(4)’s Prohibition Against the Use of Force: Customary Law and Potential Models”, Naval Law Review, Vol.64, 2015, p.1-25.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">[2] Jack M. Beard, “Legal Phantoms in Cyberspace: The Problematic Status of Information as a Weapon and a Target Under International Humanitarian Law”, Vanderbilt Journal of Transnational Law, Vol.47, 2014, p.131.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">[3] Kelly A. Gable, “Cyber-Apocalypse Now: Securing the Internet Against Cyberterrorism and Using Universal Jurisdiction as a Deterrent”, Vanderbilt Journal of Transnational Law, Vol.43, 2010, p.61.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">[4] Michael N. Schmitt, “Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework”, Columbia Journal of Transnational Law, Vol.37, 1999, p.885.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">[5] Todd C. Huntley, “Controllıng the Use of Force in Cyberspace: The Application of the Law of Armed Conflict During a Time of Fundamental Change in the Nature of Warfare”,  Naval Law Review, Vol.60, 2010, p.1-40.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">[6] Vida M. Antolin-Jenkins, Defining the Parameters of Cyberwar Operations: Looking for Law in all the Wrong Places?”, Naval Law Review, Vol.51, 2005, p.9.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">[7] An Assessment of International Legal Issues in Information Operations , http://www.au.af.mil / au / awc / awcgate / dod-io-legal / dod-io-legal.pdf; last visited April 17, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">[8] David Kushner, “The Real Story of Stuxnet; How Kaspersky Lab tracked down the malware that stymied Iran’s nuclear-fuel enrichment program”; http:// spectrum.ieee.org / telecom / security / the-real-story-of-stuxnet, erişim tarihi: 13.04.2016.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">[9] U.S. Department of Defense Dictionary of Military and Associated Terms, Joint Publication 1-02, 8 November 2010 (As Amended Through 15 February 2016), p.57-58, http://www.dtic.mil / doctrine / new_pubs / jp1_02.pdf, last visited April 17, 2016.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
