IDEAS home Printed from https://ideas.repec.org/h/elg/eechap/15436_11.html
   My bibliography  Save this book chapter

Cyber operations as a use of force

In: Research Handbook on International Law and Cyberspace

Author

Listed:
  • Marco Roscini

Abstract

The provisions on the use of force contained in the UN Charter apply to cyber operations conducted by states against other states even though the rules were adopted well before the advent of cyber technologies. This chapter argues that a cyber operation is a use of armed force when it entails the use of a ‘weapon’ accompanied by a coercive intention. This occurs not only in the case of cyber attacks designed to cause physical damage to property, loss of life or injury of persons, but also of cyber attacks employing capabilities that render ineffective or unusable critical infrastructures so to cause significant disruption of essential services, even when they do not materially damage those infrastructures. Indeed, the increasing digitalization of today’s societies has made it possible to cause considerable harm to states through non-destructive means: physical infrastructures can be incapacitated by affecting their operating systems, with consequent disruption of services but without the need to destroy them. An evolutive interpretation of Article 2(4) should take this into account. On the other hand, cyber exploitation carried out to collect information may be a violation of the sovereignty of the targeted state when it entails an unauthorized intrusion into the cyber infrastructure located on its territory, but not intervention and even less a use of force, as it lacks the coercive element and does not involve the use of a destructive payload capable of resulting in physical damage to property, loss of life, injury of persons, or malfunction of infrastructure.

Suggested Citation

  • Marco Roscini, 2015. "Cyber operations as a use of force," Chapters, in: Research Handbook on International Law and Cyberspace, chapter 11, pages 233-254, Edward Elgar Publishing.
  • Handle: RePEc:elg:eechap:15436_11
    as

    Download full text from publisher

    File URL: https://www.elgaronline.com/view/9781782547389.00022.xml
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    Law - Academic;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:elg:eechap:15436_11. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Darrel McCalla (email available below). General contact details of provider: http://www.e-elgar.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.