Analyzing of the concept of self-defense in light of cyber attack (With an emphasis on Stuxnet attack on Iran's nuclear facilities)

Document Type : Research Paper

Authors

1 Master of science in International Law, University of Qom

2 Judge in Tehran Province Courts

3 Associate Professor of International Law, Faculty of Law, University of Qom, Qom, Iran

Abstract

One of the modern methods of conflict on the international stage is an attack that occurs in headstock of cyber space which can create widespread fatalities and vast damages. But fast changes in this area have caused international law not to legislate new rules fit for the protection of the cyber space. The concept of self-defense has been challenged under the attacks and in this area the possibility of exercising this right according to Article 51 of the UN Charter or customary international law, is an important question that has remained unanswered. It seems, if cyber-attacks penetrate into a country's vital infrastructure and potentially be destructive as an armed attack they will be assumed to be an act of aggression and the victim will have the right to self-defense. This essay will examine whether the right to self-defense is verifiable with regard to the particular case of Stuxnet.

Keywords

Main Subjects


الف. فارسی
اصلانی، جبار؛ رنجبریان، امیرحسین (1394)، «بررسی تطبیقی و تحلیل تعریف حمله سایبری از منظر دکترین، رویه کشورها و سازمان‌های بین‌المللی در حقوق بین‌الملل»، تهران، فصلنامه تحقیقات حقوقی، شماره 71، 257-278.
خلف رضایی، حسین(1392)، «حملات سایبری از منظر حقوق بین‌الملل(مطالعه موردی استاکس­نت)»، تهران، فصلنامه مجلس و راهبرد، سال بیستم، شماره 73، 125- 154.
ضیایی بیگدلی، محمدرضا(1388)، حقوق معاهدات بین‌المللی، تهران: انتشارات گنج دانش.
قاسمی علی، چهار بخش ویکتور بارین (1390)،«رویه قضایی دیوان بین‌المللی دادگستری در خصوص دفاع مشروع پس از رویداد یازدهم سپتامبر 2001» ، تهران، مجله حقوقی بین المللی، شماره 45  ;175 – 194.
قاسمی علی، چهار بخش ویکتور بارین(1391)،«حملات سایبری و حقوق بین‌الملل»، تهران: مجله حقوقی دادگستری ، دور 76، شماره 78؛ 115 – 146.
موسوی، سید فضل­اله(1391)، اندیشه‌های حقوقی 7 (حقوق بین‌الملل)، تهران: انتشارات مجد.
نیاورانی، صابر(1386)، تحول قاعده دفاع مشروع در حقوق بین‌الملل، تهران: دانشگاه شهید بهشتی، دانشکده حقوق.
وحید، هادی(1385)، «مسئله مشروعیت توسل به زور علیه عراق توسط ایالات‌متحده امریکا»، تهران، مجله حقوقی، شماره 35؛ 251 – 266.
 
ب. انگلیسی
Alexandrov, A. Stanimir, (1996), Self-Defense against the Use of Force in International Law, The Hague, Kluwer Law International Publication.
Aust, Anthony, (2005), Handbook of International Law, New York, Cambridge University Press.
Blank, R. Laurie, (2013), “International Law and Cyber Threats from Non-State Actors”. International Law Studies, U.S. Naval War College,Vol.89.
Cassese, Antonio, (2005), International Law, New York, Oxford University Press.
Clarke, A. Richard, Knake, K. Robert, (2010), Cyber War, New York, Harper Collins Publisher.
 ColI, R. Alberto, (1995), “Unconventional Warfare, liberal Democracies, and International Order”, International Law Studies, U.S. Naval War College,Vol.67.
Constantinou, Avra, (2007), The Right of Self-defense under Customary International Law and Article 51 of the United Nations Charter, University of Nottingham press.
Conway W. Henderson, (2010), Understanding International Law, West Sussex, a john Wiley & sons ltd. Publication.
Department of Defense & Office of General Counsel, (MAY 1999), an Assessment of International Legal Issues in Information Operations, available at http://www.au.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf.
Dinstein, Yoram, (2002),” Computer Network Attacks and Self-Defense”, International Law Studies, U.S. Naval War College,Vol.76.
Dinstein, Yoram, (2005), War, Aggression and Self-Defence, New York, Cambridge University Press.
Duffy, Helen, (2005), the ‘War on Terror’ and the Framework of International Law, New York, Cambridge University Press.
Fidler, P. David, (2011),” Was Stuxnet an Act of War? Decoding a Cyberattack”, IEEE Security & Privacy, vol. 9.
Gill, D. Terry, Ducheine, A. L. Paul, (2013), “Anticipatory Self-Defense in the Cyber Context”, International Law Studies, U.S. Naval War College,Vol.89.
Gray, Christine, (2008), International Law and the Use of Force, New York, Oxford University Press.
Hathaway, A. Oona et al., (2012), “The Law of Cyber-Attack”, California Law Review, Vol. 100,
Hollis, B. Duncan, (2007), “Why states need an international law for information operation”, Lewis & Clark Law Review, Vol. 11.
ICJ Reports )2005(, The Armed Activities on the Territory of the Congo Case (Democratic Republic of the Congo v. Uganda)
ICJ Reports, (1986), Case concerning the military and paramilitary activities in and against Nicaragua (Nicaragua v. United States of America).
ICJ Reports, (2003), Case concerning Oil Platforms (Islamic Republic of Iran v. United States of America).
Joyner, C. Christopher, Lotrionte, Catherine, (2001), “Information warfare as international coercion: Elements of a legal framework?” European Journal of international law, Vol.12.
Kulesza, Joanna, (13 September 2010), “State responsibility for acts of cyber‐terrorism”, University of Lodz, available at http://www.wpia.uni.lodz.pl
Owens, A. William et al., (2009), Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyber-attack Capabilities,Washington, D.C., The National Academies Press, available at http://www.3.nd.edu/~cpence/eewt/owens2009.pdf.
Raab, Dominic, (December 2004),” ‘Armed Attack’ after the Oil Platforms Case”, Leiden Journal of International Law, Volume 17.
Rid, Thomas, (2013), Cyber War Will Not Take Place, New York, Oxford university press.
Ruys, Tom, (2010), “Armed Attack” and Article 51 of the UN Charter: Evolutions in Customary Law and Practice, New York, Cambridge University Press.
Schmitt, N. Michael et al., (2013), Tallinn Manual on the International Law Applicable to Cyber Warfare, New York, Cambridge university press.
Schmitt, N. Michael, (1999),” Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework”, Columbia Journal of Transnational Law, Vol. 37.
Sharp, G. Walter, (1999), Cyberspace and Use of Force, Virginia, Aegis Research Corporation.
Shaw N. Malcolm, International Law, Sixth edition, (New York: Cambridge University Press, 2008) Shaw, N. Malcolm, (2008), International Law, New York, Cambridge University Press.
Silver, B. Daniel, (2002),”Computer Network Attack as a Use of Force under Article 2(4) of the United Nations Charter“, International Law Studies, U.S. Naval War College,Vol.76.
Sklerov, J. Matthew, (April 2009), Solving the Dilemma of State Responses to Cyberattacks: A Justification for the Use of Active Defenses Against State who Neglect their to Prevent, United States Army,
The White House, (February 2003), the National Strategy to Secure Cyberspace, available at: www.us-cert.gov/site/default/files/publications/cyberspace_strategy.pdf.
UN General Assembly Resolution, (14 December 1974), Definition of Aggression, A/RES/29/3314, available at http://www.un-documents.net/a29r3314.htm