2022 N2 (2)

In the era of information and communication technologies, computer networks can beused to carry out modern forms of warfare. In light of technological advances, cyberattacks arebecoming more sophisticated and control over IT infrastructure is being lost. States can use digitaltools or enlist hacker groups to launch cyberattacks against other states. Such destructive actionsdamage the defence capacity, security, stability, and economic sustainability of a country, and hinderthe activities of public and private organisations alike. The situation is further complicated due tothe lack of a common understanding of the definition of the term „cyberattack“ among internationalactors. Furthermore, the existing international legal framework does not regulate the issue ofcyberattacks. The Charter of the United Nations was adopted in the 20th century when the processof creating cyberspace could not have been foreseen. Therefore, this article aims to explore thelegal definition of a cyberattack based on the reinterpretation of existing international norms. It isimportant to examine the possibilities of the development and adoption of new norms in cyberspaceand clarify the responsible cyber behaviour of states.

Keywords: cyberattack, the use of force, armed attack
  1. Antonia Chayes. „Rethinking Warfare: The Ambiguity of Cyber Attacks“. Harvard National Security Journal, (2015).
  2. Back to Square One? The NATO Cooperative Cyber Defence Centre of Excellence, https://ccdcoe. org/back-square-one-fifth-un-gge-fails-submit-conclusivereport-un-general-assembly.html.
  3. Case Concerning Military and Paramilitary Activities in and against Nicaragua (Nicaragua v. the United States of America), 1986, http://www.icjcij.org/docket/ index.php.
  4. Charter of the United Nations, http://wwwupdate.un.org/en/documents/charter/intro.shtml.
  5. Founding Treaty – the North Atlantic Treaty, April 4, 1949, https://www.nato.int/cps/en/natohq/ topics_67656.htm.
  6. Kosmas Pipyros. Christos Thraskias. Lilian Mitrou. Dimitris Gritzalis. Theodoros Apostolopoulos. „A New Strategy for Improving Cyber Attacks Evaluation in the Context of Tallinn Manual.“ 74 Computers and Security, (2018).
  7. Matthew C. Waxman. “Cyber Attacks as Force under the U.N. Charter Article 2(4).“ 87 International Law Studies Series, the U.S. Naval War College, (2011).
  8. Michael Schmitt. “Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework.” Columbia Journal of Transnational Law, Volume 37, (1998-1999).
  9. Michael N. Schmitt. “Preemptive Strategies in International Law.” Michigan Journal of International Law, (2003).
  10. Michael N. Schmitt. “The Law of Cyber Warfare: Quo Vadis?” 25 Stanford Law & Policy Review, (Spring, 2014).
  11. René Värk. “The Use of Force in the Modern World: Recent Developments and Legal Regulation of the Use of Force.” Baltic Defence Review No. 10, Volume 2, (2003).
  12. Tallinn Manual 1.0 on the International Law Applicable to Cyber Warfare, (Michael N. Schmitt, ed.), Cambridge University Press, (2013).
  13. The Wales Summit Declaration issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Wales, September 4-5, 2014, https://www.nato.int/ cps/ic/natohq/official_texts_112964.htm.
  14. Yoram Dinstein. War, Aggression, and Self-Defence. The Fourth Edition, Cambridge University Press, (2005)