The Right of Legitimate Defense Against Cyberattac
The Right of Legitimate Defense Against Cyberattac
Abstract
The emergence of this unusual occurrence necessitated the intervention of international
law, which looked for to regulate it through the prohibition or discouragement of its
employment through force, as expressed in Article 4/2 of the United Nations Charter,
Additionally, international law aimed to govern the permissible usage of technology in
the civil and military fields. This action was undertaken as a reaction to the recent
increase in cyberattacks and the growing reliance in all fields This paper aims to analyse
the legal criteria surrounding the classification of cyberattacks as acts of military
aggression, specifically focusing on the circumstances requiring the use of the right to
justified defence against governments and other powerful bodies.
1- Introduction
In accordance with the conditions outlined in the fourth paragraph of Article 2 of the UN
Charter, the prohibition of using force or the mere threat thereof in matters relating to
international relations is absolute, allowing for no exceptions. The aforementioned
legislation has created a multitude of factors and criteria to determine the circumstances
in which the use of force is considered permissible. The aforementioned statement aligns
with the rules outlined in Chapter VII of the Charter, which indicate two situations in
which the use of force is considered acceptable: self-defense conducted in good faith and
the adoption of collective security measures by the Security Council in response to a
perceived danger to international peace or security.
The concept of legitimate defence, which is both ancient and significant, has been an
integral component of legal systems at the local, national, and international levels
throughout history. Despite the existence of several legal frameworks that recognise it as
an essential and instinctive entitlement, considerable discord and contention persist
regarding this matter. The aforementioned factors, including the circumstances
surrounding it, various expressions, evolving perceptions, and its intersection with other
rights, contribute to the current debate on the validity and existence of this right. These
elements have led to discussions focused around reaching consensus and establishing
common ground. One of the foremost challenges that need thorough examination and
analysis within the realm of international relations is the increasing use of technology and
the emergence of new manifestations of violence.
1
Police Science Academy-Sharjah, Department of Law and criminal sciences, United Arab Emirates,
dr.amr.elhow.police@gmail,com, ORCD.NO.0009-0000-1254-2323
955 The Right of Legitimate Defense Against Cyberattacks in Public International Law
2- Method
2-1-The concept of legitimate defense in the U.N.Charter
Although Article 51 of the Charter of the UN was drafted in a broad manner, eliminating
specific identification of the perpetrator of an attack and asserting the right to etamitigel-
defense in the case of an armed assault, it can be argued that a victim state possesses the
right to use legitimate defence when electronic attacks meet the criteria of armed attacks
as outlined in the Charter.
Amr Ezzat Mahmoud Elhaw 956
Migration Letters
957 The Right of Legitimate Defense Against Cyberattacks in Public International Law
evidence substantiating the prosecution's claims, while also evaluating the level of
American control exerted on the "Contras."
It is important that several agreements specifically recognise the right to a legitimate
defence against non-state actors. According to Article 4/5 of the 2006 Great Lakes
Protocol on Non-Aggression and Common Defence, it stipulates that member nations are
obligated to address instances of aggression. States and non-state entities possess the
same ability to participate in acts of armed aggression. The prohibition of armed
organisations using their territory for acts of aggression against armed organisations has
been specifically stated by Member States. This prohibition is guided by the criteria
outlined in Articles 6 and 8, as well as Article 2/8 of the Protocol (Talbot Jensen , Eric
,2017)
However, it is not possible to make this conclusion based on existing documents,
including General Assembly Resolution No. 3314. Consequently, it can be believed that
the exercise of the right to legitimate defence against cyberattacks carried out by non-
state actors necessitates the fulfilment of two prerequisites: firstly, the conduct ascribed to
this collective must qualify as an act of armed attack, and secondly, these actions must be
attributable to a state, as previously articulated.
In instances when the armed forces of a state or any of its related organisations, agencies,
or institutions are guilty for an act, the state may be held accountable. However, this
principle does not apply when the crime is perpetrated by independent groups that lack
formal affiliation. Furthermore, it is important to note that Article 8 of the drafted articles
formulated by the International Law Commission pertaining to the issue of state
responsibility for wrongful acts clearly asserts that the actions carried out by an
individual or a collective entity may be attributed to a state.
In contrast, it is essential under international law that nations take measures to guarantee
that individuals under their jurisdiction do not inflict damage upon other states, and that
they duly hold accountable those individuals who are found accountable for such
activities. This principle has been reinforced by the International Court of Justice in
notable instances such as the Corfu Strait and kidnapping crimes (Reinhard Fabin , 2020)
If the committing of such acts is not attributed to a particular state, the state being
victimised lacks a legal justification but retains the freedom to use law enforcement
measures, both domestic and international, as well as collaborate with the violating state
to request an end of such activities originating from their jurisdiction, or alternatively.
restrict access to the internet as a means of reducing the cyberattack's impact.
In the event that the country from which this cyber assault originated is either unwilling
or incapable of providing a response, maybe due to insufficient financial or technical
resources, it becomes crucial for the targeted state to take action. In cases when armed
attacks are exclusively perpetrated by non-state actors, it is essential that the defensive
reaction be largely focused on these individuals rather than the state that harbours them.
According to the laws of both countries, it is imperative for states to exercise due
diligence in order to avoid the use of their territory by other states or non-state actors for
the purpose of engaging in military operations, including but not limited to planning,
threatening, executing, or providing funding for armed actions against other countries or
specifically Russia. It is vital to adhere to all essential measures in order avoid any
infringements of the planned information security agreement. The agreement stipulates
the need to combat any malicious activities conducted in the digital realm and effectively
impede such cyberattacks (Natalino Ronzitti , 2006)
Based on the results of the UN Group of Governmental Experts in 2013, it was
determined that the Union had established a set of principles for cyber peace, one of
which emphasises the need for states to make efforts in preventing non-state actors from
using their territory for illicit activities.
Amr Ezzat Mahmoud Elhaw 958
Migration Letters
959 The Right of Legitimate Defense Against Cyberattacks in Public International Law
Migration Letters
961 The Right of Legitimate Defense Against Cyberattacks in Public International Law
already begun may be seen as a kind of pre-emptive justified defence. This defensive
measure aims to counteract an impending attack that is in the process of being started.
Consequently, the state engaging in aggression forfeits its entitlement to a legitimate
defence at the conclusion of the attack (J. F. R. Boddens Hosang and P. A. L. Ducheine ,
2020)
3-1-D-the temporary nature of legitimate defense.
The temporary nature of defensive actions is essential to enable the Security Council
return to its original authority and implement the necessary measures to cease the
ongoing attack. The implementation of security measures is of utmost importance in the
preservation of global peace and security. Once the Security Council takes responsibility
and implements the necessary actions to protect global peace and security, the nation that
has been wronged must give up its entitlement to legitimate -defense.
Therefore, there's a contention positing that the state's right to a valid form of legitimate -
defense persists from the onset of an assault until the Security Council takes action in
accordance with Article 51. However, worries have been raised over the potential
forfeiture of the right to a justifiable defence as soon as the Security Council intervenes.
If the Security Council is considered ineffectual or fails to fulfil its designated mission,
does the state recover its right to legal defence, or is it only (Amer, Karim and Jehane
Noujaim , 2019)
The dominant legal perspective was that, in the absence of Security Council engagement,
the state was devoid of authority to use coercive measures. However, the entity possesses
the legitimate authority to safeguard itself, even if an opposing party argues that its
defensive actions are momentarily ineffective. In the event that the Security Council is
unable to protect its interests in such a scenario, it becomes crucial, though essential, to
clearly highlight the Council's incapacity by revealing the aggressor's refusal to comply
with Security Council resolutions.
In the case of cyber attacks, nevertheless, the offending nation may initiate a military
offensive for a restricted duration while awaiting a determination from the Security
Council about further offensives (Heather Harrison Dinnis , 2012).
According to Article 51 of the United Nations Charter, it is mandated that governments
promptly notify the United Nations Security Council of any actions undertaken in the
pursuit of justifiable self-defense, whether on an individual or collective basis. Executing
this specific stipulation might provide challenges in some circumstances owing to its
clandestine nature and expeditiousness, including the legal guarding against cyber
assaults. Therefore, the potential lack of sufficient time for preparation or notification of
the Security Council may result in the rendered ineffectiveness of authorised defence
measures. Does this indicate that failure to promptly inform the Security Council would
render a lawful defence against a cyber attack invalid?
In the case concerning military and paramilitary activities in Nicaragua, the Court
determined that the duty to report was not deemed customary international law, at least as
of the time of the ruling. However, it could serve as one of the indicators to assess
whether the state in question was confident in its adherence to its right to legal defence.
However, the legality of exercising the right to legal defence remains unaffected, since
Judge Schubel's separate judgement in the same case indicates that it would be contrary to
the normal course of events if the necessity to adhere to this reporting condition enabled
the perpetrators to act covertly. While it is true that individuals who engage in self-
defense should not be penalised, it is important to acknowledge that a state has an
inherent right to engage in individual or collective legitimate defence. This right should
not be disregarded by failing to inform the Security Council about the measures taken in
exercising this right (Banaszewska , Dorota Marianna , Lex Specialis , 2020)
Amr Ezzat Mahmoud Elhaw 962
In accordance with Article 51 of the United Nations Charter, which states that the use of
legitimate self-defense requires certain conditions, it might be argued that defensive cyber
operations are not intrinsically prohibited. In this particular scenario, it is important to
note that the obligation of notice does not extend to technical information, including the
techniques used, as well as the actions and policies of the aggressor state in a broader
context (James A Green , 2009)
Migration Letters
963 The Right of Legitimate Defense Against Cyberattacks in Public International Law
III. A cyber attack or electronic operation that does not meet the requirements for an
armed assault in isolation, and thus cannot justify the application of the right to legitimate
defence on an individual level. However, it is essential to note that such attacks are part of
a series of electronic strikes that together constitute an armed assault. The adoption of the
"event track theory" in the context of periodic, small-scale attacks carried out by armed
groups is now gaining recognition within legal circles (Eddy Melissa / Perlroth Nicole ,
2020)
Kenya, as an illustrative case, seems to have used the concept of event accumulation in its
identification of nine incidents spanning from 2009 to 2011. These incidents included
various events, such as the incursion of the Al-Shabaab movement into Kenyan territory
from Somalia. However, the position of Kenya over this subject encountered opposition.
The behaviour and outcomes of the youth movement's invasions, which are likewise a
subject of controversy, do not exhibit any discernible pattern. Additionally, Despite
potential instability in the border region and potential financial losses resulting from
attacks on tourists, significant material damage did not occur as a result of these raids or
assaults. However, it is important to note that criticism aimed mainly at this aspect.
Instead of concentrating just on the concept itself, it is important to examine whether the
necessary conditions for the application of the theory of cumulative occurrences are
satisfied (Dorr , Oliver , 2019)
Although the International Court of Justice has so far refrained from taking a firm stance
on this issue, the court declined to issue a ruling based on the cumulative theory of events
in the Cameroon v. Nigeria case on the grounds that "neither side sufficiently proves the
facts he claims or attributes them to the other party
5- Conclusion
Based on the foregoing, we conclude that only online assaults that meet the legal
definition of "armed assault" are permissible against the right to effective defense.
Cyberattacks without the use of military forces may still result in a reaction, just as other
assaults without the use of armed forces can be met with retaliation, non-coercive
countermeasures, or a referral to the UN Security Council.
The International Court of Justice determined in the case of military and paramilitary
actions in Nicaragua that the court has the right to apply exceptional criteria in each
instance independently and not always in the same way, as long as it stays within the
parameters of its law and regulations. One could argue that no universally accepted level
of proof is required to establish globally unlawful activities under the purview of
international law.
The legitimate defense only applies to armed aggression committed by a state or a group
of states; however, an attack originating from gangs, armed groups, irregular forces, or
mercenaries sent by a state can be considered an armed attack, provided that the
designation of an act as an armed attack committed by the state itself in this situation is
dependent on the requirement that this act be attributed to a state.
The Tallinn Directory did not address the standards of proof required in the context of
cyberspace. The seventh rule said that just starting an electronic operation or getting it
started in some other way through a government's electronic infrastructure is not enough
proof to link the operation to that country. Rules (7) and (8) are the only rules that talk
about proof.
- The state that invokes the defense must demonstrate, on the one hand, that the
cyberattack occurred or is about to occur and that it caused enough significant injury or is
reasonably expected to inflict enough damage to constitute an armed assault.
Migration Letters
965 The Right of Legitimate Defense Against Cyberattacks in Public International Law
On the other hand, it is assigned to a certain state, either directly or via a group whose
activities are attributed to a specific state.
- As a result, given the availability of clear and convincing evidence on allegations related
to the use of force in international relations and given that the legitimate defense is an
exception to the prohibition on the use of force, the standard of evidence must be higher
to prevent violations of this rule.
- When a state invokes its right to legal defense against armed attack, charges of
violations of the Law on the Legality of Force need "clear and convincing evidence" to
justify the military action performed by the state that claimed its right to legal defense.
4: It should be noted that current international circumstances make it inappropriate to
limit the right to legitimate defense against armed assault from sources other than the
state or the organisations or troops it dispatches. Perhaps the inclusion of this criterion in
United Nations General Assembly Resolution No. 3314 of 1974 reflects the lack of
foresight at the time that armed groups would be able to cause harm on a par with state
military forcible entry.
References
Amer, Karim and Jehane Noujaim (2019). In "The Great Hack."Video of a Netflix Original
Documentary.Via Google Scholar
Banaszewska, Dorota Marianna , Lex Specialis (2020) , Max Planck Encyclopedia of public
international law
Christian J Tams (2009) The Use of force against terrorists , European journal of international law
Dorr, Oliver (2019) Use of force , probibition of , Max Planck Encyclopedia of public internationl
law
Eddy Melissa / Perlroth Nicole (2020) Cyber Attack Suspected in German Woman’s Death , The
New York Times
Elaine M Grossman (2009) U.S. General Reserves Right to use Force , Even Nuclear , in Reponse
to Cyber Attack , Global Security Newswire
Gray Chiristin (2018) , internationl law and the use of force , 4th ed . ( Oxford : Oxford
University)
Governo italiano (2012), La posizione italiana sui principi fondamentali di internet
Hamadoun l Toure (2011) the international response to cyberwar , in the quest for cyber peace
edited by Hamadoun l Toure et al , ITU
James A Green (2009) Fluctuating evidentiary standards for self-defense in the international and
comparative law quarterly
Heather Harrison Dinnis. (2012). Cyber Warfare and the Laws of War.Cambridge University Press,
New York, NY.
J. F. R. Boddens Hosang and P. A. L. Ducheine (2020) "Implementing Article 42.7 of the Treaty on
European Union: Legal Foundations for Mutual Defense in the Face of Modern Threats."No.,
Amsterdam Law School Research Papers.
Karl Zenabek (2012) Armed attack , Max planck Encyclopedia of public international law ,
Volume1
Kimberley N Trapp (2011) State Responsibility for international Terrorism , Oxford University
Kimberly Amadeo (2020) How Today's Economy Is Affected by the 9/11 Attacks.
Mare Ellen O’connell (2002), lawful self-defense to terrorism , univesity of pittsburgh law review
Amr Ezzat Mahmoud Elhaw 966
Michael N Schmitt(2011/2012) cyber operations and the revisited , villanova law review
Natalino Ronzitti (2006) The Expanding Law of Self-Defense , journal of conflict and secruity law
Reinhard Fabin (2020) Der digitale Gegenangriff ist Keine brauchbare Strategie fur die Cyber-
Vertei-digung , NZZ
Talbot Jensen , Eric (2017) The Tallinn Mannual 2.0 : Highlights and insights , Georgetown
journal of internationl law , vol . 48 , 2017
Wanger , Markus (2013) Non -State Actors , Max Planck Encyclopedia of public international law,
Woltag christopher C./ Lotrionte Catherine (2001) information Warfare as international coercion:
Elements of a Legal Framework , 12/5 European journal of internationl law
Ziolkowsky, Katharina , Stuxnet (2012) Legal considerations , The NATO cooperative Cyber
Defense centre of Excellence
Migration Letters