Hostname: page-component-cd9895bd7-fscjk Total loading time: 0 Render date: 2024-12-27T06:12:18.711Z Has data issue: false hasContentIssue false

Chapter 2: The Tallinn Manual on the International Law Applicable to Cyber Warfare: A Commentary on Chapter II—The Use of Force

Published online by Cambridge University Press:  20 December 2013

Get access

Extract

Cyberspace and cyber technology are increasingly used by states and individuals for peaceful purposes, but they are also employed maliciously. Cyber attacks—that is, the use of cyber technology to attack a state's infrastructure—are perhaps one of the most serious threats currently facing states. Although not all cyber attacks are warlike, some of them may indeed be so, which immediately gives rise to the question of whether the current legal regulation of the use of force (jus ad bellum) applies to such attacks. The ‘Tallinn Manual’ on the International Law Applicable to Cyber Warfare responds to this question by mapping out the jus ad bellum and jus in bello rules that apply in such circumstances. The statement of the Rules is accompanied by a Commentary which clarifies the content of those rules, and explains their application in the specific context of cyber war.

In the following, I will present and critically comment on the jus ad bellum rules found in Chapter II of the Tallinn Manual: that is, Rules 10–19. The aim of this commentary is to draw attention to certain important but contested issues, identify jurisprudential ambiguities, and where possible offer alternative views.

According to Rule 10, ‘A cyber operation that constitutes a threat or use of force against the territorial integrity or political independence of any state, or that is in any other manner inconsistent with the purposes of the United Nations, is unlawful.’

Type
Part I: The Tallinn Manual on the International Law Applicable to Cyber Warfare
Copyright
Copyright © T.M.C. Asser Instituut and the Authors 2012 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)