Show simple item record

Files in this item

Cover for Conflict in Cyberspace and International Law
dc.creator
dc.date.accessioned2020-09-21T20:29:54Z
dc.date.available2020-09-21T20:29:54Z
dc.date.created2017
dc.date.issued
dc.identifier.uri
dc.description.abstractIn this dissertation, through four separately published articles, I address several contentious questions with regard to offensive cyberspace capabilities and the role of international law in the digital era. Offensive cyberspace capabilities, which for clarity purposes I refer to as “cyberattacks,” are operations in cyberspace that target the confidentiality, integrity, and availability (colloquially known as the CIA triad) of information technology systems.1 Throughout these four articles, I explore contemporary international law as it applies to cyber conflict. I argue interntional law, at present, is not always well-suited to fully address the full breadth of challenges presented by the increasing use of cyber-attacks by states. Moreover, cyber-attacks are not used exclusively by states. For example, civilians and certain organized groups are finding this domain appealing for achieving their ends. In Doxfare, I challenge the prevalent view that the prohibition on intervention, in order to be triggered, should be accompanied with a coercive act. The context of this paper is the 2016 U.S. election interference, allegedly orchestrated by the Russian government, carried out primarily through cyberspace. This interference, in the form of hacking the Democratic National Committee and John Podesta’s e-mail accounts, as well as publishing these e-mails through WikiLeaks (“doxing”), challenges the very basic notions of wrongful interference under contemporary international law. The crux of the difficulty is in international law’s inability in delegitimizing transnational hacking for political purposes, because these acts are often non-coercive, a constitutive element of the norm on non-intervention. This paper argues, that in order to address transnational election interferences, international law should adapt by redefining the boundaries of the norm on non-intervention, given that interventions could be in the form of non-coercive hacking and doxing. World Wide Web provides a new theory to address cyber espionage through international law. Traditionally, while most domestic legal systems make foreign espionage illegal, international law does not explicitly prohibit inter-state espionage, neither does it condemn this well-established practice. This article argues that changes in surveillance technology enable some serious threats to international peace and security, and should therefore be treated in a more nuanced manner under international law – that is, an evaluation of the nature of espionage, the data collected, and the possible nature of future use of that data. This approach rejects the blanket legitimization of espionage provided by international law, considering how cyber espionage could potentially threaten human rights, such as the right to privacy.2 Virtual Violence considers the extent to which international humanitarian law protects civilians, in an armed conflict, from cyber-attacks that are not kinetic in nature. Intuitively, direct effects resulting from cyber-attacks may vary from minor inconvenience, to disruption and interruption, and more rarely – to kinetic effects. Translating into the international humanitarian law taxonomy – whether disruptive cyber-attacks qualify as “attacks,” therefore requiring that the adversary using them comply with the rules on conduct of hostilities – distinction, military necessity, proportionality, and humanity.3 By analyzing current cases of disruptive cyber-attacks the article argues that scope of “attacks” should be adapted to afford better civilian protection from serious disruptive effects caused by cyber-attacks. In Hacktivites, I argue that the concept of direct participation in hostilities (DPH) does not consider the full breadth of cyber activities that civilians could be engaged in, potentially externalizing these civilians to being classified as civilians who directly participate in hostilities, thus losing their protected status under international humanitarian law. Such classification could mean the difference between life and death – since civilians who have taken arms and joined the hostilities are forfeiting their protection from direct attacks. Junaid Hussein, an ISIS-affiliated hacker, was the first known case of a civilian who was targeted with lethal force, in relation to his allegedly hostile cyberspace activities – including the spread of personal information about U.S. soldiers in active duty. This raises a host of questions about how the DPH’s framework constitutive elements apply in cyberspace, for example – threshold of harm. The paper concludes that there is no uniform interpretation of the DPH framework (comparing U.S., ICRC, and the Tallinn Manual), and that most of these interpretations, when applied to cyber-attacks, adopt overly broad views on what constitutes direct participation in hacktivities. I have also contributed some of my findings on specialized media platforms – such as Just Security and Wired. These op-eds are also part of my dissertation, as they demonstrate my research endeavors in a more informal context. They also illustrate my approach to legal scholarship, that outsourcing it to the broader public in a more manageable and succinct manner.en_US
dc.format1 PDFen_US
dc.language.isoen_USen_US
dc.titleConflict in Cyberspace and International Lawen_US
dc.typeDissertationen_US


This item appears in the following Collection(s)

Show simple item record