Cyber Attacks: When Does It Become An Act Of War?

when does a cyber attack constitute use of force

The question of when a cyber attack constitutes the use of force is a complex one, with no comprehensive international consensus. The use of force is prohibited by the United Nations Charter, but this prohibition does not always equate to an armed attack. The determination of whether a cyber attack constitutes the use of force depends on the scale and effects of the operation, which considers the severity, context, nature of targeted systems, and whether the consequences are comparable to traditional kinetic operations. The consequence-based approach is gaining traction, with certain states acknowledging the potential for cyber operations to constitute a use of force, particularly when significant economic consequences are involved.

Characteristics Values
Scale and effects comparable to traditional kinetic operations Serious or extensive damage or destruction to life, injury or death, or damage to critical infrastructure
Nature and severity of consequences Substantial economic damage, loss of functionality of critical systems
Type of weapons used Crypto viruses or other forms of digital sabotage
Duration of attack
Nature of targets attacked
Location of targets attacked
Right to self-defence Response by cyber or kinetic means
Consent of the affected state Does not violate the prohibition on the use of force
Security Council authorization Authorised use of force

cycivic

The 'scale and effects' test

The "scale and effects test" is a concept that draws from the International Court of Justice's Paramilitary Activities judgment. It establishes a framework for assessing when a cyber operation constitutes a use of force and when it may justify a state's invocation of the right to self-defence. This test has been widely recognised and adopted, including by the Tallinn Manual, which provides an interactive toolkit for international cyber law.

The scale and effects test evaluates the "scale" and "effects" of a cyber operation to determine if it rises to the level of a use of force or an armed attack. The "scale" refers to the extent of the attack, encompassing factors such as the duration, nature, and location of the targets, as well as the types of weapons used. The "effects" consider the nature and severity of the consequences, including the impact on life, infrastructure, and the functioning of the targeted state.

For instance, a cyber operation that causes severe disruption to daily life, comparable to that of a traditional kinetic use of force, would constitute a use of force. Similarly, if the "effects" of a cyber operation are comparable to those resulting from conventional armed attacks, it may be deemed an armed attack, justifying a response with cyber or conventional weapons.

The consequence-based approach, which considers the specific consequences of a cyber operation, is gaining traction among states. This approach evaluates the severity, context, and nature of the targeted systems, providing a nuanced evaluation of the legal implications of cyber operations. However, there is still a lack of comprehensive international consensus, particularly regarding cyber activities with economic consequences.

While the scale and effects test provides a structured framework, the international law remains ambiguous on the precise scale and effects required for an operation to qualify as an armed attack. This ambiguity highlights the evolving nature of cyber warfare and the ongoing challenges in adapting traditional legal standards to modern conflict.

cycivic

Cyber operations vs traditional uses of force

The rise of cyber operations has complicated the application of Article 2(4) of the UN Charter, which prohibits the use of force against the territorial integrity or political independence of any state. Cyber operations differ from traditional uses of force in that they may have serious effects that are not physically destructive, such as economic damage or the loss of critical systems functionality.

The "consequence-based approach" and the "scale and effects test" have emerged as frameworks for assessing whether cyber operations constitute a use of force. The former, endorsed by the Tallinn Manual group, emphasizes the impact of a cyber operation over its technical aspects. The latter considers the extent of the attack and the nature and severity of its consequences. Factors such as the duration of the attack, the nature and location of targets, and the types of weapons used are examined under the "scale" criterion, while the "effects" criterion measures the damage caused.

Determining whether a cyber operation constitutes a use of force is done on a case-by-case basis, considering the intended or reasonably expected consequences. For instance, Norway asserts that the use of crypto viruses against a state's financial system may violate Article 2(4). Similarly, France indicates that targeting a nation's economy with cyber operations may, in certain cases, qualify as an armed attack.

While cyber operations may not cause physical damage, they can impair the functionality of critical infrastructure, which could be interpreted as a violation of a state's sovereignty. The interpretation of cyber operations as a use of force is evolving, and most states now consider the specific consequences of such operations.

cycivic

The role of the territorial state

The territorial state's assessment of the "scale and effects" of a cyber operation is central to determining whether it constitutes a use of force. This involves considering the duration of the attack, the nature and location of the targets, and the types of weapons used, as well as the resulting damage or disruption to critical infrastructure and daily life. If the cyber operation's consequences are comparable to those of a traditional kinetic use of force, it may be considered a use of force.

However, the definition of "armed attack" is limited to the use of force attributable to a state. Therefore, even if non-state actors conduct cyber operations with similar effects, they may not constitute an "armed attack". In such cases, the territorial state is expected to take measures to stop the attack and ensure accountability. If the territorial state fails to do so, it may be held internationally responsible, and the victim state may pursue remedies through peaceful means.

The territorial state's consent is also essential in authorising the use of force. If a state consents to the use of force within its territory, it does not violate the prohibition on the use of force. This highlights the importance of the territorial state's role in regulating and responding to cyber attacks, especially when they affect its own territory and infrastructure.

The evolving nature of cyber operations and their potential for significant economic consequences have prompted states to adopt various analytical frameworks, such as the "consequence-based approach" and the "scale and effects test". These frameworks help assess the legal implications of cyber operations and determine when they constitute a use of force or an armed attack, allowing states to navigate the complexities of cyber warfare and uphold their international obligations.

cycivic

Self-defence and cyberattacks

The concept of self-defence in the context of cyberattacks is a complex and evolving area of international law. While there is no universally agreed-upon definition of what constitutes a "use of force" or an "armed attack" in the cyber domain, several principles and frameworks guide the assessment of whether a cyberattack triggers a right to self-defence.

Firstly, the "scale and effects" test is widely recognised as a central factor in evaluating cyberattacks. This test considers the extent of the attack, including its duration, targets, locations, and types of weapons used, as well as the nature and severity of the consequences. If the scale and effects of a cyber operation are comparable to those of a traditional kinetic use of force, it may constitute a use of force under Article 2 (4) of the UN Charter.

The "consequence-based approach" is another emerging framework for assessing cyberattacks. This approach focuses on the specific consequences of a cyber operation, such as substantial economic damage, disruption of critical systems, or loss of life, rather than solely on the means employed. This reflects the unique nature of cyber operations, which can have significant impacts without causing physical destruction or injury.

The right to self-defence in response to a cyberattack is addressed in Article 51 of the UN Charter, which allows for individual or collective self-defence in response to an armed attack. However, there is ongoing debate about whether and when a cyberattack rises to the level of an "armed attack". France, for example, asserts that a cyberattack may constitute an armed attack under Article 51 if it is of a comparable scale and severity to those resulting from the use of physical force, causing substantial loss of life or considerable physical or economic damage.

The concept of "imminence" is also relevant to self-defence in the cyber context. Some scholars argue that anticipatory or preemptive self-defence is legitimate when there is a clear indication of an imminent cyber attack, even if the attack has not yet been triggered, as long as the potential impact is sufficiently serious. However, there is a lack of consensus on the specific criteria for evaluating imminence.

Additionally, the attribution of cyberattacks to state or non-state actors is crucial for determining the applicability of self-defence. States are generally responsible for cyberattacks perpetrated by non-state actors only if those actors are acting under their instructions, orders, or control. The extension of the right to self-defence against non-state actors is recognised in certain contexts, such as in the case of terrorist groups or quasi-state entities.

cycivic

The role of the UN Charter

The UN Charter is a foundational document of the United Nations that outlines the role and structure of the organization in maintaining international peace and security. It is a comprehensive framework that guides the relations between nations and establishes norms and principles for their conduct. The Charter is composed of several articles, with Articles 2, 40, 41, 42, 48, 49, 50, and 51 being particularly relevant in addressing cyber attacks and the use of force.

Article 2(4) of the UN Charter prohibits the use of force against the territorial integrity or political independence of any state. This article sets the foundational norm for international relations and serves as a cornerstone for maintaining peace and security. Any use of force, including in the cyber domain, that violates this prohibition is considered a breach of international law.

Article 40, while not expressly mentioned in the Charter, outlines measures to "prevent an aggravation of the situation." This includes actions such as the withdrawal of armed forces, cessation of hostilities, the implementation of a ceasefire, and facilitating the unimpeded delivery of humanitarian assistance. These measures are preventative in nature and aim to de-escalate situations that could potentially lead to the use of force.

Articles 41 and 42 provide the Security Council with a range of measures to maintain or restore international peace and security. Article 41 includes measures that do not involve the use of armed force, such as economic sanctions or diplomatic actions. Article 42, on the other hand, authorizes "such action by air, sea, or land forces as may be necessary to maintain or restore international peace and security." These articles provide the Council with a range of tools to respond to situations that pose a threat to peace, including cyber attacks.

Article 48 affirms the obligation of Member States under Article 25 to accept and carry out the binding decisions of the Security Council. This article ensures that Member States comply with the measures adopted by the Council to address threats to peace, including those posed by cyber attacks.

Article 51 recognizes the inherent right of individual or collective self-defence if an armed attack occurs against a Member State of the United Nations. This article allows states to defend themselves in response to an armed attack, including cyber attacks that reach the threshold of an armed attack. However, any measures taken in self-defence must be reported to the Security Council and discontinued once the Council takes the necessary measures to maintain international peace.

In summary, the UN Charter provides a framework for addressing cyber attacks and the use of force. It prohibits the use of force against the territorial integrity or political independence of states and provides mechanisms to prevent, respond to, and resolve situations that threaten international peace and security. The Charter also acknowledges the right of self-defence while establishing procedures to ensure accountability and maintain peace. These articles of the UN Charter are essential in guiding the international community's response to cyber attacks and their potential qualification as the use of force.

Frequently asked questions

The "'scale and effects' of the cyber attack. This includes quantitative factors such as the duration of the attack, the nature and location of the targets, and the types of weapons used, as well as qualitative factors like the severity of the consequences.

Consequences that would qualify it as the use of force include serious or extensive damage or destruction to life, injury or death, or damage to critical infrastructure and the functioning of the state.

Not every use of force constitutes an armed attack. An armed attack is limited to the use of force attributable to a state, and the definition does not include actions from non-state actors.

The use of force is lawful when the territorial state consents, when it is authorised by the Security Council under Chapter VII of the UN Charter, or when it is in self-defence in response to an armed attack.

Cyber operations may not cause physical damage but can still have serious effects, such as substantial economic damage or the loss of functionality of critical systems.

Written by
Reviewed by

Explore related products

Share this post
Print
Did this article help you?

Leave a comment