Cyber-attacks and the right of self-defense: a case study of the Netherlands

IF 3.1 Q1 PUBLIC ADMINISTRATION
Ferry Oorsprong, P. Ducheine, P. Pijpers
{"title":"Cyber-attacks and the right of self-defense: a case study of the Netherlands","authors":"Ferry Oorsprong, P. Ducheine, P. Pijpers","doi":"10.1080/25741292.2023.2179955","DOIUrl":null,"url":null,"abstract":"Abstract Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on self-defense and contribute to the jus ad bellum, more clarification as to what constitutes an armed attack in cyberspace is necessary. Therefore, policy norms—regarding when cyber-attacks reach the threshold of an armed attack—could guide State behavior. On the one hand, these policy norms could be used in the political decision-making processes for States that consider initiating cyber-attacks. On the other, they could help victim States in their decision-making processes in response to grave cyber-attacks. The aim of the paper is to propose a tangible guideline that outlines when cyber-attacks—perpetrated solely in or through cyberspace and not in conjunction with conventional military attacks—can qualify as an armed attack. By assessing the positions of States and leading academic opinions regarding the qualification of cyber-attacks as armed attacks, and applying international and interdisciplinary policy documents to transfer the legal debate into tangible options, a policy framework is deduced that can serve as a baseline for international cyber norms. This framework distinguishes three separate categories of armed attack in cyberspace, each with their own distinctive levels to determine when a cyber-attack can qualify as an armed attack. These absolute levels are tailored for the Netherlands but could also be suitable for other States when transferred to percentages of the gross national/domestic product and the population size.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":3.1000,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Policy Design and Practice","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/25741292.2023.2179955","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PUBLIC ADMINISTRATION","Score":null,"Total":0}
引用次数: 0

Abstract

Abstract Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on self-defense and contribute to the jus ad bellum, more clarification as to what constitutes an armed attack in cyberspace is necessary. Therefore, policy norms—regarding when cyber-attacks reach the threshold of an armed attack—could guide State behavior. On the one hand, these policy norms could be used in the political decision-making processes for States that consider initiating cyber-attacks. On the other, they could help victim States in their decision-making processes in response to grave cyber-attacks. The aim of the paper is to propose a tangible guideline that outlines when cyber-attacks—perpetrated solely in or through cyberspace and not in conjunction with conventional military attacks—can qualify as an armed attack. By assessing the positions of States and leading academic opinions regarding the qualification of cyber-attacks as armed attacks, and applying international and interdisciplinary policy documents to transfer the legal debate into tangible options, a policy framework is deduced that can serve as a baseline for international cyber norms. This framework distinguishes three separate categories of armed attack in cyberspace, each with their own distinctive levels to determine when a cyber-attack can qualify as an armed attack. These absolute levels are tailored for the Netherlands but could also be suitable for other States when transferred to percentages of the gross national/domestic product and the population size.
网络攻击与自卫权——以荷兰为例
摘要虽然《联合国宪章》第五十一条一般规定“武装攻击”可触发国家的自卫权,但武装攻击的实际意义仍然是一个解释和限定问题。为了完善自卫规则的概念,并有助于维护战争法,有必要进一步澄清网络空间中的武装攻击的构成。因此,政策规范——关于网络攻击何时达到武装攻击的阈值——可以指导国家行为。一方面,这些政策规范可用于考虑发起网络攻击的国家的政治决策过程。另一方面,它们可以帮助受害国在应对严重网络攻击的决策过程中发挥作用。该文件的目的是提出一个切实可行的指导方针,概述何时网络攻击——仅在网络空间或通过网络空间实施,而不与常规军事攻击相结合——可以被视为武装攻击。通过评估各国关于网络攻击为武装攻击资格的立场和主要学术意见,并应用国际和跨学科政策文件将法律辩论转化为切实可行的选择,推断出一个政策框架,可作为国际网络规范的基线。该框架将网络空间中的武装攻击区分为三种不同的类别,每种类别都有其独特的级别,以确定何时网络攻击可以被视为武装攻击。这些绝对水平是为荷兰量身定制的,但如果换算成国民生产总值/国内生产总值和人口规模的百分比,也可能适用于其他国家。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Policy Design and Practice
Policy Design and Practice PUBLIC ADMINISTRATION-
CiteScore
10.30
自引率
4.30%
发文量
19
审稿时长
13 weeks
期刊介绍:
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信