Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Military, War, and Peace

U.S. Naval War College

Journal

Cyber Law

Articles 1 - 14 of 14

Full-Text Articles in Law

Cyberspace And The Jus Ad Bellum: The State Of Play, Michael N. Schmitt, Anusha S. Pakkam Apr 2024

Cyberspace And The Jus Ad Bellum: The State Of Play, Michael N. Schmitt, Anusha S. Pakkam

International Law Studies

This article examines how States are interpreting one aspect of the international law governing cyber activities, the jus ad bellum. The article focuses on two issues: (1) the prohibition on the use of force found in Article 2(4) of the UN Charter, and (2) the right of self-defense in Article 51. The critical unsettled question regarding the first issue is the threshold at which a hostile cyber operation can be characterized as a “use of force” subject to the prohibition of Article 2(4). Concerning the second issue, a number of unresolved questions plague the application of the right of …


Israel’S Perspective On Key Legal And Practical Issues Concerning The Application Of International Law To Cyber Operations, Roy Schöndorf Jan 2021

Israel’S Perspective On Key Legal And Practical Issues Concerning The Application Of International Law To Cyber Operations, Roy Schöndorf

International Law Studies

The speech given by the Israeli Deputy Attorney General (International Law) at the Naval War College’s event on “Disruptive Technologies and International Law” sets out, for the first time, Israel’s position on the application of international law to cyber operations. Consistent with the position taken by the vast majority of States thus far, Israel considers that international law applies to such operations. The speech stresses that questions pertaining to the identification and application of relevant legal rules remain, given the profound differences between the cyber domain and traditional domains of warfare—land, sea, and air. Therefore, in Israel’s view, a cautious …


Responding To Hostile Cyber Operations: The “In-Kind” Option, Michael N. Schmitt, Durward E. Johnson Jan 2021

Responding To Hostile Cyber Operations: The “In-Kind” Option, Michael N. Schmitt, Durward E. Johnson

International Law Studies

Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of engagement. One of the major challenges in doing so is that key aspects of the international law governing cyber responses are vague, unsettled or complex. Not surprisingly, therefore, international law is markedly absent from strategies and operational concepts. Rather, they tend to take on a practical “tit-for-tat” feel as policymakers logically view “in-kind” responses as “fair play.” For them, responding in-kind surely must be lawful notwithstanding any challenges in discerning the precise legal character of the initial hostile cyber operation.

Testing that sense, this article examines the …


Autonomous Cyber Weapons And Command Responsibility, Russell Buchan, Nicholas Tsagourias Dec 2020

Autonomous Cyber Weapons And Command Responsibility, Russell Buchan, Nicholas Tsagourias

International Law Studies

Autonomous cyber weapons have made their way onto the battlefield, raising the question of whether commanders can be held criminally responsible under command responsibility when war crimes are committed. The doctrine of command responsibility has a long history in international criminal law and comprises three core elements: the existence of a superior-subordinate relationship, the commander’s knowledge of the crime, and the commander’s failure to prevent or repress the subordinate’s criminal actions. This article unpacks the content of these elements and applies them to autonomous cyber weapons by treating them as being analogous to soldiers since they operate within an organized …


Autonomy And Precautions In The Law Of Armed Conflict, Eric Talbot Jensen Nov 2020

Autonomy And Precautions In The Law Of Armed Conflict, Eric Talbot Jensen

International Law Studies

Already a controversial topic, legal debate and broader discussions concerning the amount of human control required in the employment of autonomous weapons—including autonomous cyber capabilities—continues. These discussions, particularly those taking place among States that are Parties to the 1980 Certain Conventional Weapons Convention, reveal a complete lack of consensus on the requirement of human control and serve to distract from the more important question with respect to autonomy in armed conflict: under what conditions could autonomous weapons “select” and “attack” targets in a manner that complies with the law of armed conflict (LOAC).

This article analyzes the specific LOAC rules …


Autonomous Cyber Capabilities And The International Law Of Sovereignty And Intervention, Michael N. Schmitt Nov 2020

Autonomous Cyber Capabilities And The International Law Of Sovereignty And Intervention, Michael N. Schmitt

International Law Studies

This article explores the intersection of autonomous cyber capabilities and two primary rules of international law—the respect for the sovereignty of other States and the prohibition on coercive intervention into another State's internal or external affairs. Of all the rules of international law, these are the likeliest to be violated through employment of cyber capabilities, whether autonomous or not. This raises the question of whether a cyber operation that involves autonomous capabilities presents unique issues with respect to the application of the two rules. The article concludes that while there are numerous unsettled issues surrounding their application to cyber operations, …


Will Cyber Autonomy Undercut Democratic Accountability?, Ashley Deeks Oct 2020

Will Cyber Autonomy Undercut Democratic Accountability?, Ashley Deeks

International Law Studies

In recent years, legislative bodies such as the U.S. Congress and the U.K. Parliament have struggled to maintain a role for themselves in government decisions to conduct military operations against foreign adversaries. Some of these challenges arise from constitutional structures, but they are also due to the changing nature of conflict: a shift away from large-scale kinetic operations and toward smaller-scale operations—including cyber operations—that are less visible and that do not require robust legislative support. These modern operations leave legislatures to engage in ex post and sometimes ineffective efforts to hold their executive branches accountable for international uses of force …


Autonomous Cyber Capabilities Below And Above The Use Of Force Threshold: Balancing Proportionality And The Need For Speed, Peter Margulies Oct 2020

Autonomous Cyber Capabilities Below And Above The Use Of Force Threshold: Balancing Proportionality And The Need For Speed, Peter Margulies

International Law Studies

Protecting the cyber domain requires speedy responses. Mustering that speed will be a task reserved for autonomous cyber agents—software that chooses particular actions without prior human approval. Unfortunately, autonomous agents also suffer from marked deficits, including bias, unintelligibility, and a lack of contextual judgment. Those deficits pose serious challenges for compliance with international law principles such as proportionality.

In the jus ad bellum, jus in bello, and the law of countermeasures, compliance with proportionality reduces harm and the risk of escalation. Autonomous agent flaws will impair their ability to make the fine-grained decisions that proportionality entails. However, a …


Adverse Cyber Operations: Causality, Attribution, Evidence, And Due Diligence, Hans-Georg Dederer, Tassilo Singer Nov 2019

Adverse Cyber Operations: Causality, Attribution, Evidence, And Due Diligence, Hans-Georg Dederer, Tassilo Singer

International Law Studies

Adverse cyber operations against States are on the rise, and so are the legal challenges related to such incidents under public international law. This article will not delve into already intensely debated problems of classification, such as whether adverse cyber operations constitute “armed attacks” or “use of force.” Rather, the article will focus on causality and attribution with special regard to problems of evidence. In particular, the article will elaborate on the applicable standards of proof to be met by the victim State when submitting, or having to submit, evidence to justify self-defense or countermeasures against the State of origin. …


Classification Of Cyber Capabilities And Operations As Weapons, Means, Or Methods Of Warfare, Jeffrey T. Biller, Michael N. Schmitt Jul 2019

Classification Of Cyber Capabilities And Operations As Weapons, Means, Or Methods Of Warfare, Jeffrey T. Biller, Michael N. Schmitt

International Law Studies

Despite several persistent controversies regarding how international law applies to cyber operations during an armed conflict, general understanding of the law in this domain is maturing. Reasoning by analogy to non-cyber application and interpretation of international law underlies much of the progress. Yet, although preexisting normative structures and legal terminology enable legal advisors and scholars to usefully draw upon previously acquired experience and understanding, there are obstacles to definitive analogizing that result from fundamental differences between cyber and kinetic operations. The number of imperfect analogies that underlie some of the normative uncertainty in the field underscores this point.

One key …


International Humanitarian Law And The Targeting Of Data, Tim Mccormack Nov 2018

International Humanitarian Law And The Targeting Of Data, Tim Mccormack

International Law Studies

The 2013 publication of the Tallinn Manual on the International Law Applicable to Cyber Warfare confirmed the view of the majority of the international group of experts that data was not an object and therefore not subject to the rules of targeting during an armed conflict. Intuitively, a number of scholars reacted negatively to this view, and instead were drawn to the Tallinn Manual minority position that data did constitute an object. The significance of data, particularly personal data, is only increasing, and the purpose of the law of armed conflict is to reduce the deleterious impact of armed conflict …


The Dod Law Of War Manual And Its Critics: Some Observations, Charles J. Dunlap Jr. Jan 2016

The Dod Law Of War Manual And Its Critics: Some Observations, Charles J. Dunlap Jr.

International Law Studies

The U.S. Department of Defense’s (DoD) new Law of War Manual has generated serious debate about its treatment of a variety of issues including human shields, the status of journalists, cyber operations, the precautions to be taken prior to attacks and even the role of honor in war. Although this article does not purport to be a comprehensive response to every critique of the Manual and, indeed, cites opportunities for its improvement, it nevertheless concludes that on balance the Manual provides an excellent, comprehensive and much-needed statement of DoD’s view of the lex lata of the law of war.


State Opinio Juris And International Humanitarian Law Pluralism, Michael N. Schmitt, Sean Watts May 2015

State Opinio Juris And International Humanitarian Law Pluralism, Michael N. Schmitt, Sean Watts

International Law Studies

International humanitarian law has developed through a pluralistic process. Its history reveals a pattern of rough proportionality between State opinio juris and non-State expressions of law. These diverse sources have maintained a respectable yet realistic balance between humanity and military necessity. However, current IHL dialogue presents a stark contrast to the vibrant and pluralistic exchanges of the past. The substantive input of non-State actors such as non-governmental organizations, tribunals, and scholars far outpaces the work of States. Parity of input, especially in quantitative terms, is surely too much to demand and surely not necessary given the special status of State …


Chapter Iv: Reasonable Uses Of Outer Space, Carl Q. Christol Jan 1962

Chapter Iv: Reasonable Uses Of Outer Space, Carl Q. Christol

International Law Studies

No abstract provided.