Skip to main content Accessibility help
×
Hostname: page-component-7bb8b95d7b-2h6rp Total loading time: 0 Render date: 2024-09-28T14:12:57.450Z Has data issue: false hasContentIssue false

Computer Network Operations Restrained

from PART III - CONCLUSION

Published online by Cambridge University Press:  28 November 2017

Get access

Summary

The goal of this study was to show that both general international law as well as international humanitarian law provide a framework to adequately constrain States in their application of military computer network operations during and outside of international armed conflict. The emergence of the technical infrastructure referred to as the Internet, or a social sphere considered as cyberspace, has not led actions performed in connection therewith to take place in a legal vacuum. On the contrary, the existing rules governing State conduct on the international level and during warfare are applicable thereto just as in other fields. This proves the assertions voiced both in legal scholarship and in the media, but also by several States, arguing for a requirement of an international cyber warfare convention or code of conduct, to have been made prematurely.

The inherent flexibility of international law allows it to regulate this novel instrument, as shown initially by demonstrating that the jurisdiction of States also extends over all activities performed via the Internet. For this purpose the Internet has been identified as a physical infrastructure territorialised along State boundaries. Further, it has been shown how States implicitly assert jurisdiction with respect to actions performed via the Internet. Since it is imbedded within all national jurisdictions it was also shown that the Internet cannot qualify as an international commons, and never has been. On the one hand this reveals that the Internet is not devoid of the exercise of State sovereignty. On the other hand the limitation of a potentially infinite jurisdiction granted by the effects principle through the requirement of a genuine link simultaneously illustrates that States are vested with governing power primarily only over those systems located within their territory and the operations running thereon. Operations on foreign systems only under special circumstances may be subject to the jurisdiction of a third State, thereby showing that State sovereignty and their sovereign equality is also to be respected in cyberspace. From this the concept of a territorial fragmentation of the Internet can be deduced.

Drawing upon this concept, the study developed the idea that even outside of armed conflict States can incur international responsibility for cross-border computer network operations.

Type
Chapter
Information
Cyber Warfare
Military Cross-Border Computer Network Operations under International Law
, pp. 273 - 278
Publisher: Intersentia
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×