Skip to main content

Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis

  • Conference paper
  • First Online:
  • 1517 Accesses

Abstract

Article 2(4) of the UN Charter provides that nation-states will refrain from the threat or use of force against the territorial integrity or political independence of any state. It is doubtful whether it will deter states from waging war in cyberspace. Cyber warfare is a perplexing and contentious issue within the ambit of international law. Discussions have focused on whether the existing rules and principles may be extended to cyberspace or whether new treaty law on cyber warfare must be drafted. Against this background the International Group of Experts drafted the Tallinn Manual on the International Law Applicable to Cyber Warfare at the invitation of the NATO Cooperative Cyber Defense Centre of Excellence. The Tallinn Manual provides rules in respect of cyber warfare. In the absence of a multilateral treaty it may be asked whether the Tallinn Manual will achieve acceptance on a global level as rules governing cyber warfare.

This article is based on research supported in part by the National Research Foundation of South Africa (UID 85384). Opinions expressed are those of the author and not the NRF.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Schmitt, M.N.: Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, Cambridge (2013)

    Google Scholar 

  2. Rauscher, K.F., Korotkov, A.: Russia-U.S. Bilateral on Critical Infrastructure Protection: Working towards Rules for Governing Cyber Conflict Rendering the Geneva and Hague Conventions in Cyberspace, p. 8, 11, 14, 18. EastWest Institute, New York (2011)

    Google Scholar 

  3. Zetter, K.: Legal experts: Stuxnet attack on Iran was illegal ‘act of force’ (2013). http://www.wired.com/threatlevel/2013/03/stuxnet-act-for

  4. National Cybersecurity Policy Framework for South Africa (2013). http://www.cyanre.co.za/national-cybersecurity-policy.pdf

  5. Clarke, R.A., Knake, R.K.: Cyber War, p. 6, 11–14, 278–279, 290–296. HarperCollins Publishers, New York (2012)

    Google Scholar 

  6. Kirchner, S.: Distributed Denial-of-Service Attacks Under Public International Law: State Responsibility in Cyberwar. In: The Icfai University Journal of Cyber law, p. 13. Icfai University Press, Hyderabad (2009)

    Google Scholar 

  7. Bowcott, V.: Rules of cyberwar: don’t target nuclear plants or hospitals says NATO manual (2013). http://www.guardian.co.uk/world/2013/mar/18/rules-cyberw

  8. Leyden, J.: Cyberwarfare playbook says Stuxnet may have been ‘armed’ attack (2013). http://www.theregister.co.uk/2013/03/27/stuxnet_cyverwar_r

  9. Into the Intro: The Tallinn Manual on the International Law Applicable to Cyber Warfare (2013). http://www.cambridgeblog.org/2013/04/into-the-intro-the-tal

  10. Melzer, N.: Cyberwarfare and International Law (2011). http://www.unidir.org/files/publications/pdfs/cyberwarfare-and-international-law-382.pdf

  11. Vihul, L.: The Tallinn Manual on the International Law applicable to cyber Warfare. http://www.ejiltalk.org/the-tallinn-manual-on-the-internation

  12. Fidler, D.P.: Was Stuxnet an act of war? decoding a cyberattack. In: IEEE Computer and Reliability Societies, pp. 56–59 (July/August 2001)

    Google Scholar 

  13. Dugard, J.: International Law: A South African Perspective. Juta, Cape Town (2011). Chapter 24 (pp. 495–513) and chapter 25 (pp. 519–525)

    Google Scholar 

  14. Dan Joyner, D.: Stuxnet an “Act of Force” Against Iran”. http://armscontrollaw.com/2013/03/25stuxnet-an-act-of-force-agains

  15. Chaulie, S.: Cyber Warfare is the new threat to the global order (2013). http://www.nationmultimedia.com/opinion/Cyber-warfare-is

  16. Watney, M.M.: The way forward in addressing cybercrime regulation on a global level. J. Internet Technol. Secur. Trans. 1(1/2) (2012)

    Google Scholar 

  17. United Nations General Assembly, ‘66th session developments in the field of information and telecommunications in the context of international security’. http://www.chinadaily.com.cn/cndy/201109/14/content_13680896.htm. Accessed Feb 2012

  18. Watney, M.M.: A South African legal perspective on State Governance of Cybersecurity within an African and global context. In: Lex Informatica, South Africa (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Murdoch Watney .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Watney, M. (2014). Determining When Conduct in Cyberspace Constitutes Cyber Warfare in Terms of the International Law and Tallinn Manual on the International Law Applicable to Cyber Warfare: A Synopsis. In: Gladyshev, P., Marrington, A., Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 132. Springer, Cham. https://doi.org/10.1007/978-3-319-14289-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14289-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14288-3

  • Online ISBN: 978-3-319-14289-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics