NATO technical experts were unable to find credible
evidence (Herzog2011, p.51). Furthermore, the
attempts to apply international law to cyber warfare
relied on doctrine that doesn’t fit cyber threats
(Schmitt, 2013).
In jus in Bello perspective, armed conflicts are
normally governed by Geneva conventions and its
protocols (Geneva Conventions 1949, article 48).
All the principles of Geneva conventions applicable
to war are there to avoid unnecessary sufferings that
can affect civilians and other persons who are not
taking part into hostilities. However, one may
wonder if it is the case for cyber-attacks since they
are indiscriminate in attack as they are launched
electronically even if effects may be physical
depending on the nature and the purpose of the
malware launched.
Although International Humanitarian Law (IHL)
does not apply in cyber-attacks, states have
obligation to avoid or at least minimize incidental
civilian casualties and damage to civilian
infrastructure because the rules and limits of wars
apply just as much to the use of cyber warfare as to
the use of rifles, artillery and missiles (ICRC, 2013).
Despite the suggestions of some scholars that jus
in Bello principles (such as military objective,
distinction, proportionality, and unnecessary
suffering) should be applied within cyber-attacks, it
raises question of how and against whom cyber-
attacks may be lawfully conducted and by who they
may be lawfully executed (Watts, 2009). It remains
an issue as to how jus in Bello principles will be
respected, because one may assert that cyber
weapons are indiscriminate in attacks.
Although cyber operations are not conducted in a
legal vacuum, cautious approach should be
adoptedto avoid unnecessarily prejudge legal issues
in cyber warfare (Melzer2011, p.4). Attributability
of state responsibility for cyber-attacks will continue
to be a challenge detrimental to states sovereignty
since there is no single international treaty to
regulate cyber warfare. In addition to that, cyber-
attacks pose interpretative difficulties and with
respect to UN Charter,it does not delineate cyber-
attacks as to whether such operations constitute
prohibited “force” or an “armed attack” that would
justify military force in self-defence (Article 51 of
UN charter).
5 CONCLUSION
Sovereign state is protected from any use of force
under international law and enjoys inherent right of
self-defence in case attacked as contemplated in
article 51 of UN Charter. Nevertheless, the term
threat or use of force contemplated in article 2(4)
UN Charter creates ambiguity because it elaborates
when the threat or use of force is prohibited but it
failed to delineate whether use of force includes
non-military force for example cyber-attacks that a
state may launch against another state yet these
attacks are not within the scope of the UN Charter.
In this regard, the Charter should have enumerated
elements that constitute “force” when it was adopted
or the drafters should consider adjusting the Charter
to the now cyber world. State sovereignty is
jeopardized and one can assert that there is no single
adopted instrument that regulates cyber warfare in
international arena. Thanks to the incessant efforts
made by international legal scholars and military
experts whose writings such as Tallinn manual on
the law applicable to cyber warfare, though non-
binding, are gaining momentum in unravelling cyber
warfare related issues.
The unique characteristic, unpredictability and
rapid evolution of cyber-attacks are posing fresh
challenges which prompt some scholars and policy
experts to emphasize the need for clarity in
interpreting the application of article 2(4) and 51 to
cyber-attacks (Maxman, 2011). To suggest, United
Nations or states in general should embark on
international legal experts and military experts’
views to adopt a treaty regulating cyber warfare
which is a new challenge that deserves a new
solution.
REFERENCES
Brownlie I,. 1963. International law and the use of force
by states, Oxford, Clarendon.P .230.
Clarke, R and Knake R, 2010.Cyber war: the next threat
to National Security and What to Do about it. New
York, HarperCollins Publisher. P.14
Geneva Conventions of 12 August 1949, article 48) and its
Additional protocols. Available at
www.icrc.org/en/war-and-law-traeties-customary-
law/geneva-conventions
Hathaway, O. A., Crootof, R., 2012. The law of cyber-
attack, Faculty Scholarship
Series.385.[Online]available
at:http://digitalcommons.law.yale.edu/fss_papers/3852
accessed on 24th June 2018.
Heinegg. H,2012. Legal Implications of Territorial
Sovereignty in Cyberspace, NATO CCD COE
Publications, Tallinn.P.7 [Online].Available
athttps://ccdcoe.org/publications/2012proceedings/1_1
_von_Heinegg_LegalImplicationsOfTerritorialSoverei
gntyInCyberspace.pdf. Accessed on 25th June 2018
ICPS 2018 - 2nd International Conference Postgraduate School
670