Book contents
- Cyber Operations and International Law
- Cambridge Studies in International and Comparative Law: 146
- Cyber Operations and International Law
- Copyright page
- Contents
- Abbreviations
- 1 Does International Law Matter in Cyberspace?
- Part I Attribution
- Part II The Lawfulness of Cyber Operations
- 5 Internationally Wrongful Cyber Acts: Cyber Operations Breaching Norms of International Law
- 6 The Threshold of Cyber Warfare: from Use of Cyber Force to Cyber Armed Attack
- 7 Circumstances Precluding or Attenuating the Wrongfulness of Unlawful Cyber Operations
- 8 Cyber Operations and the Principle of Due Diligence
- Part II – Conclusion
- Part III Remedies against State-Sponsored Cyber Operations
- 11 Conclusion
- Appendix Table Assessing the Lawfulness of Cyber Operations and Potential Responses
- Select Bibliography
- Index
- Cambridge Studies in International and Comparative Law
6 - The Threshold of Cyber Warfare: from Use of Cyber Force to Cyber Armed Attack
from Part II - The Lawfulness of Cyber Operations
Published online by Cambridge University Press: 28 February 2020
- Cyber Operations and International Law
- Cambridge Studies in International and Comparative Law: 146
- Cyber Operations and International Law
- Copyright page
- Contents
- Abbreviations
- 1 Does International Law Matter in Cyberspace?
- Part I Attribution
- Part II The Lawfulness of Cyber Operations
- 5 Internationally Wrongful Cyber Acts: Cyber Operations Breaching Norms of International Law
- 6 The Threshold of Cyber Warfare: from Use of Cyber Force to Cyber Armed Attack
- 7 Circumstances Precluding or Attenuating the Wrongfulness of Unlawful Cyber Operations
- 8 Cyber Operations and the Principle of Due Diligence
- Part II – Conclusion
- Part III Remedies against State-Sponsored Cyber Operations
- 11 Conclusion
- Appendix Table Assessing the Lawfulness of Cyber Operations and Potential Responses
- Select Bibliography
- Index
- Cambridge Studies in International and Comparative Law
Summary
This chapter analyses the application of jus contra bellum(the law against war) to cyber operations and demonstrates that the vast majority of cyber operations fall below the threshold required for the application of jus contra bellum. It analyses whether cyber operations may reach and cross the three thresholds of jus contra bellum – namely a use of force, a threat of force and an armed attack. It has been observed that no State or international organisation has ever publicly and unequivocally qualified a cyber operation as a use of force, and a fortiori an armed attack. This chapter, however, demonstrates that in some circumstances cyber operations may amount to a use of force, a threat of force or even an armed attack. The conclusion is that most state-sponsored cyber operations fall short of the required thresholds. Hence, they should be considered beyond the legal framework of jus contra bellum.
- Type
- Chapter
- Information
- Cyber Operations and International Law , pp. 273 - 342Publisher: Cambridge University PressPrint publication year: 2020
- 2
- Cited by