Scenario 15: Cyber deception in time of armed conflict
This page is under construction.
International armed conflict, international humanitarian law, perfidy, protective indicators, ruses of war
[F1] IAC between States A and B
[F2] State A is preparing for a major offensive against State B in region R and needs to sow confusion and weaken the enemy prior to the launching the offensive
[F2 bis] Wild card (if we have enough space): the whole time State A runs an elaborate deception like in this article so that State B’s cyber command is wholly preoccupied trying to get into A’s systems and fails to deal with the other issues (kinda #7 – it’s a honeypot of sorts)
[F3] State A hacks into the pacemaker of the commander of State B forces in region R and kills him/her (#2 below)
[F4] State A gets State B forces in R to fight among themselves by hacking into State B’s force tracking system (#6)
[F5] State A gets civilians to block an important road by falsely suggesting humanitarian aid will be distributed there by the ICRC (#3 below)
For a general overview of the structure of analysis in this section, see Note on the structure of articles.
Characterization as an international armed conflict
|International armed conflict|
| No matter how short-lived or minor, any hostilities between the armed forces of two States constitute an international armed conflict, even if one or both states deny the existence of armed conflict. Some scholars have suggested that the fighting must be of a certain intensity before international humanitarian law (IHL) comes into effect, but the prevailing view is that any “resort to armed force between States”, however brief or intense, triggers the application of IHL. Furthermore, the law does not prescribe any specific form for the resort to force, so hostilities between the belligerent States may involve any combination of kinetic and cyber operations, or cyber operations alone.
It is unclear what effect cyber operations unaccompanied by any use of kinetic force would have to have in order for IHL to apply. Although it is generally accepted that if cyber operations have similar effects to classic kinetic operations and two or more State actors are involved, the resulting situation would qualify as an IAC, the law is unsettled on whether cyber operations that merely disrupt the operation of military or civilian infrastructure amount to a resort to armed force for the purposes of IHL.
In the cyber context, States often act through non-State intermediaries and proxies. In such situations at the outset of an armed confrontation, the relevant State must exercise a sufficient degree of control over the non-State entity that commences hostilities against another State for the situation to qualify as an IAC. However, the correct legal test to use in this regard is the subject of an ongoing controversy. The prevailing standard for the characterization of an international armed conflict is that of “overall control”, which requires that the State provides some support and that it participates in the organization, co-ordination, or planning of the relevant operations. A separate standard, the “effective control” test, requires that the State must exercise control over the entire course of the operations in question. While there is still disagreement as to whether the “effective control” test is the controlling test for the purposes of attribution under the law of State responsibility, there is consensus that the “overall control” test is the correct one for conflict qualification under IHL. The latter is also confirmed by decades of consistent practice by international criminal tribunals including the ICTY, the ECCC, and the ICC.
[L1] Analysis (very short: yes there is an IAC)
Perfidy and ruses
- Box on perfidy vs. ruses
[L#] Analysis (incident-by-incident)
- Box on improper use
[L#] Analysis (incident-by-incident)
- Military objectives
- Scenario 10: Cyber weapons review
- Scenario 12: Cyber operations against computer data
- Scenario 13: Cyber operations as a trigger of the law of armed conflict
Notes and references
- Common Article 2 GC I (stipulating that the Conventions “shall apply to all cases of declared war or of any other armed conflict which may arise between two or more of the High Contracting Parties”).
- JS Pictet (ed), Geneva Convention III relative to the Treatment of Prisoners of War: Commentary (ICRC 1960) 23.
- See, eg, Jan K Kleffner, ‘Scope of Application of Humanitarian Law’ in D Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013) 45; ILA Use of Force Committee, Final Report on the Meaning of Armed Conflict in International Law (2010) 32; Gary D. Solis, The Law of Armed Conflict: International Humanitarian Law in War (2nd edn, CUP 2016) 162.
- Prosecutor v Tadić (Decision on Jurisdiction) IT-94-1-AR72 (2 October 1995) .
- See, eg, Jean S. Pictet (ed) Geneva Convention IV relative to the Protection of Civilian Persons in Time of War: Commentary (ICRC 1958) 20–21; Yves Sandoz, Christophe Swinarski, and Bruno Zimmermann (eds), Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949 (ICRC 1987) 40; René Provost, International Human Rights and Humanitarian Law (CUP 2002) 250; Jann K Kleffner, ‘Scope of Application of International Humanitarian Law’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013) 45; Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015) 16 ; Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016) 79 ; Noam Zamir, Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars (Edward Elgar 2017) 53–55; Kubo Mačák, Internationalized Armed Conflicts in International Law (OUP 2018) 15–16.
- Cf. Legality of the Threat or Use of Nuclear Weapons Case (Advisory Opinion)  ICJ Rep 226, para 89 (holding that the relevant rules of IHL apply “to all international armed conflict, whatever type of weapons might be used”) (emphasis added).
- Tallinn Manual 2.0, commentary to rule 82, para 11.
- Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016) 92, para 255.
- Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016) 92, para 256.
- See further Kubo Mačák, Internationalized Armed Conflicts in International Law (OUP 2018) 39–47.
- Prosecutor v Prlić et al (Trial Judgment) IT-04-74-T (29 May 2013), vol 1, para. 86(a).
- See Military and Paramilitary Activities in and against Nicaragua (Nicaragua v US) (Merits)  ICJ Rep 14, paras 112–15; see further Kubo Mačák, ‘Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors’ (2016) 21 JCSL 405, 421.
- Case Concerning the Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosnia and Herzegovina v Serbia and Montenegro) (Judgment)  ICJ Rep 43, para 405; ; but see Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’, in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016) 99  (arguing that overall control is the controlling test in both contexts).
- See Prosecutor v Tadić (Appeal Judgment) IT-94-1-A (15 July 1999) –; Prosecutor v Lubanga (Pre-Trial Chamber 1) ICC-01/04-01/06 (29 January 2007) –; Case No 001/18-07-2007/ECCC/TC (26 July 2010) .
Bibliography and further reading
- Gary P Corn and Peter P Pascucci, ‘The Law of Armed Conflict Implications of Covered or Concealed Cyber Operations: Perfidy, Ruses, and the Principle of Passive Distinction’ in Ronald TP Alcala, Eric T Jensen, The Impact of Emerging Technologies on the Law of Armed Conflict (OUP 2019).
- Cordula Droege, ‘Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians’ (2012) 94 IRRC 533.
- Yves Sandoz, Christophe Swinarski, and Bruno Zimmermann (eds), Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949 (ICRC 1987).
- Michael N Schmitt (ed), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (CUP 2017).
- Scenario by: Jonathan Horowitz & Kubo Mačák
- Analysis by: [TBC]
- Reviewed by: [TBC]
|Previous: Scenario 13: Armed conflict|