BibTex RIS Cite
Year 2017, Volume: 2 Issue: 2, 46 - 53, 01.06.2017

Abstract

References

  • The White House. (2003). The national security strategy of the United States of America. Executive Office of the President Washington DC, 6.
  • US Department of Defence.(2006).National Military Strategy for Cyberspace Operations of the United States. Diane Publishing, 27.
  • Saint Petersburg Declaration. (December 1868). Declaration Renouncing the Use, in Time of War, of Explosive Projectiles Under 400 Grammes Weight.
  • Roscini, M.(2010). World Wide Warfare-'Jus Ad Bellum'and the Use of Cyber Force. Max Planck Yearbook of United Nations Law, 14, 85-130.
  • Randelzhofer, A. (2002). Article 2(4). In B. Simma, D.-E. Khan and G. P. Nolte (Eds.), The Charter of the United Nations: A Commentary. New York: Oxford University Press. pp. 781-794.
  • Dinniss, H.(2012). Cyber Warfare and the Laws of War. New York: Cambridge University Press, 265.
  • Kelsen H. (1954). Collective Security Under International Law. U.S. Naval War College: Newport. 55, 57.
  • Chien, E.(2010).Stuxnet: A Breakthrough, Symantec Blog, Retrieved from: . 19.02.2017
  • N. Schmitt M. (2011). Cyber Operations and the Jus Ad Bellum Revisited, 56 Villanova Law Review, 569–605.
  • Tikk, E., Kaska, K. and Vihul, L. (2010). International cyber incidents: Legal considerations (Vol. 112). Cooperative Cyber Defence Centre of Excellence. Tallinn, 23.
  • Moore H. and Roberts D.(2013). AP Twitter hack causes panic on Wall Street and sends Dow plunging,The Guardian, Retrieved from: . 15.02.2017
  • Schmitt, M. N.(1999). Computer network attack and the use of force in international law: thoughts on a normative framework. Columbia Journal of transnational Law, 37, 891.
  • Hollis D. B. (2007). Why States Need an International Law for Information Operations,Lewis & Clark Law Revie, 11, 1023–1061.
  • Silver D. B. (2002). Computer Network Attack as a Use of Force Under Article 2(4),76 U.S. Naval War College International Law Studies, 73–97.
  • International Court of Justice. (1986). Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v. United States of America), Judgment, I. C. J. Reports 1986, 14.
  • Koskenniemi M.(2002). The Lady Doth Protest too Much – Kosovo, and the Turn to Ethics in International Law, The Modern Law Review, 167.
  • Ziolkowski K. (2012). Ius ad bellum in Cyberspace – Some Thoughts on the Schmitt-Criteria for Use of Force, in C. Czossek, R. Ottis and K. Ziolkowski (eds),4thInternational Conference on Cyber Conflict Proceedings (NATO CCD COE Publications:Tallinn, 295–309.
  • Sharp W. G. (1999). Cyberspace and the Use of Force. Aegis Research Corporation: Falls Church,129–130.
  • Jensen E. T. (2002). Computer Network Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense, Stanford Journal of International Law. 221.
  • Valo, J.(2014). Cyber Attacks and the Use of Force in International Law. Master Thesis, University of Helsinki, Faculty of Law, Helsinki, 12.
  • Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W. and Spiegel, J. (2012). The law of cyber-attack. California Law Review, 817-885.
  • N. Schmitt M. (2013). (ed.), Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press. 10-18, 25-35, 76-105
  • Singer, P. and Friedman, A.(2014). Cybersecurity and cyberwar: What everyone needs to know. New York: Oxford University Press, 160-165.
  • Bowett, D. W.(1958). Self – Defense in International Law, New York, Praeger, 220-225.
  • Taft, W.H.(2004). Self-Defense and the Oil Platforms Decision. Yale Journal of International Law, 29, 295–306.

Prohibition of Use of Force and Cyber Operations as “Force”

Year 2017, Volume: 2 Issue: 2, 46 - 53, 01.06.2017

Abstract

Technology have become core element of the critical infrastructures that maintain communities’ vital services. While this situation facilitates the daily life of the societies, systems running online are exposed to risks from vulnerabilities based on internet and systems. Increasing cyber-attacks, especially between countries in governmental level, created a new term “cyber warfare”. As in all the evolutions of the war, the concept of cyber warfare also needs original rules due to its unique characteristics. International society has divided into two groups. First group claims that existing conflict rules should apply this new battle field and the other group says the situation requires a new consensus. The purpose of this study is to examine the scope of the prohibition and to explain exceptions, by examining the developed approaches for establishing the conditions for the use of force in cyber operations, highlighting the most appropriate evaluation criteria with emphasizing existing limitations. In the light of the data collected, the literature was searched exhaustively to achieve this aim. What characteristics cyber-operations should have and objective approaches that we can use for the assessment and we can suppose as use of force will be also discussed.

References

  • The White House. (2003). The national security strategy of the United States of America. Executive Office of the President Washington DC, 6.
  • US Department of Defence.(2006).National Military Strategy for Cyberspace Operations of the United States. Diane Publishing, 27.
  • Saint Petersburg Declaration. (December 1868). Declaration Renouncing the Use, in Time of War, of Explosive Projectiles Under 400 Grammes Weight.
  • Roscini, M.(2010). World Wide Warfare-'Jus Ad Bellum'and the Use of Cyber Force. Max Planck Yearbook of United Nations Law, 14, 85-130.
  • Randelzhofer, A. (2002). Article 2(4). In B. Simma, D.-E. Khan and G. P. Nolte (Eds.), The Charter of the United Nations: A Commentary. New York: Oxford University Press. pp. 781-794.
  • Dinniss, H.(2012). Cyber Warfare and the Laws of War. New York: Cambridge University Press, 265.
  • Kelsen H. (1954). Collective Security Under International Law. U.S. Naval War College: Newport. 55, 57.
  • Chien, E.(2010).Stuxnet: A Breakthrough, Symantec Blog, Retrieved from: . 19.02.2017
  • N. Schmitt M. (2011). Cyber Operations and the Jus Ad Bellum Revisited, 56 Villanova Law Review, 569–605.
  • Tikk, E., Kaska, K. and Vihul, L. (2010). International cyber incidents: Legal considerations (Vol. 112). Cooperative Cyber Defence Centre of Excellence. Tallinn, 23.
  • Moore H. and Roberts D.(2013). AP Twitter hack causes panic on Wall Street and sends Dow plunging,The Guardian, Retrieved from: . 15.02.2017
  • Schmitt, M. N.(1999). Computer network attack and the use of force in international law: thoughts on a normative framework. Columbia Journal of transnational Law, 37, 891.
  • Hollis D. B. (2007). Why States Need an International Law for Information Operations,Lewis & Clark Law Revie, 11, 1023–1061.
  • Silver D. B. (2002). Computer Network Attack as a Use of Force Under Article 2(4),76 U.S. Naval War College International Law Studies, 73–97.
  • International Court of Justice. (1986). Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v. United States of America), Judgment, I. C. J. Reports 1986, 14.
  • Koskenniemi M.(2002). The Lady Doth Protest too Much – Kosovo, and the Turn to Ethics in International Law, The Modern Law Review, 167.
  • Ziolkowski K. (2012). Ius ad bellum in Cyberspace – Some Thoughts on the Schmitt-Criteria for Use of Force, in C. Czossek, R. Ottis and K. Ziolkowski (eds),4thInternational Conference on Cyber Conflict Proceedings (NATO CCD COE Publications:Tallinn, 295–309.
  • Sharp W. G. (1999). Cyberspace and the Use of Force. Aegis Research Corporation: Falls Church,129–130.
  • Jensen E. T. (2002). Computer Network Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense, Stanford Journal of International Law. 221.
  • Valo, J.(2014). Cyber Attacks and the Use of Force in International Law. Master Thesis, University of Helsinki, Faculty of Law, Helsinki, 12.
  • Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W. and Spiegel, J. (2012). The law of cyber-attack. California Law Review, 817-885.
  • N. Schmitt M. (2013). (ed.), Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press. 10-18, 25-35, 76-105
  • Singer, P. and Friedman, A.(2014). Cybersecurity and cyberwar: What everyone needs to know. New York: Oxford University Press, 160-165.
  • Bowett, D. W.(1958). Self – Defense in International Law, New York, Praeger, 220-225.
  • Taft, W.H.(2004). Self-Defense and the Oil Platforms Decision. Yale Journal of International Law, 29, 295–306.
There are 25 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Huseyin Kuru This is me

Publication Date June 1, 2017
Published in Issue Year 2017 Volume: 2 Issue: 2

Cite

APA Kuru, H. (2017). Prohibition of Use of Force and Cyber Operations as “Force”. Journal of Learning and Teaching in Digital Age, 2(2), 46-53.

Journal of Learning and Teaching in Digital Age 2023. © 2023. This is an Open Access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. 19195

Journal of Learning and Teaching in Digital Age. All rights reserved, 2023. ISSN:2458-8350