Means and methods of cyber warfare: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(created text without hyperlinks)
 
(added footnotes)
Line 6: Line 6:
! scope="col" style="background-color:#ffffaa;" | [[Means and methods of cyber warfare]]
! scope="col" style="background-color:#ffffaa;" | [[Means and methods of cyber warfare]]
|-
|-
|[[International humanitarian law (IHL) regulates the conduct of hostilities through principles and rules concerning weapons, means, and methods of warfare. A bedrock principle of modern IHL is that the right of the parties to the conflict to choose methods and means of warfare is not unlimited. This principle reflects customary international law and is one of the most widely recognized and accepted principles in IHL. It binds all States and other parties in both international and non-international armed conflicts. Central to understanding and applying this principle and the rules that operationalize it are the terms weapons, means, and methods of warfare. As a threshold matter, it is crucial to recognize that, despite these terms’ foundational nature in IHL, divergent views and approaches exist concerning their definitions in treaties, State regulations, and unofficial publications.
|[[International humanitarian law (IHL) regulates the conduct of hostilities through principles and rules concerning weapons, means, and methods of warfare.<ref>See ICRC CIHL Study, vol I, parts III–IV; see also United States, FM 6-27, MCTP 11-10C, ''The Commander’s Handbook on the Law of Land Warfare'' (August 2019) 2-1.</ref> A bedrock principle of modern IHL is that the right of the parties to the conflict to choose methods and means of warfare is not unlimited.<ref>See Article 22 [https://ihl-databases.icrc.org/applic/ihl/ihl.nsf/Article.xsp?action=openDocument&documentId=56AA246EA8CFF07AC12563CD0051675A Hague Regulations]; [https://ihl-databases.icrc.org/applic/ihl/ihl.nsf/Comment.xsp?action=openDocument&documentId=2F157A9C651F8B1DC12563CD0043256C Article 35 AP I].</ref> This principle reflects customary international law and is one of the most widely recognized and accepted principles in IHL.<ref>[1] See UN GA, Resolution 2444 (1968), UN Doc A/7218 (adopted unanimously), para. 1(a); ICTY, ''Prosecutor v Tadić'', Decision on the Defence Motion for Interlocutory Appeal on Jurisdiction, Appeals Chamber, Case No. IT-94-1, 2 October 1995, paras. 110 and 112 (holding that principles enshrined in Resolution 2444 reflected customary international law at the time); ''Nuclear Weapons Advisory Opinion'', paras. 78–79 (affirming that the principle that ‘States do not have unlimited freedom of choice of means in the weapons they use’ is one of ‘intransgressible principles of international customary law’); San Remo Manual, Rule 38 (‘In any armed conflict the right of the parties to the conflict to choose methods or means of warfare is not unlimited.’); AMW Manual, Rule 4 (‘The fundamental principle is that, in any armed conflict, the right of the Belligerent Parties to choose methods or means of warfare is not unlimited.’).</ref> It binds all States and other parties in both international and non-international armed conflicts.<ref>See William H Boothby, ''The Law of Targeting'' (OUP 2012) 58.</ref> Central to understanding and applying this principle and the rules that operationalize it are the terms weapons, means, and methods of warfare. As a threshold matter, it is crucial to recognize that, despite these terms’ foundational nature in IHL, divergent views and approaches exist concerning their definitions in treaties, State regulations, and unofficial publications.<ref>See Jeffrey T Biller and Michael N Schmitt, ‘[https://digital-commons.usnwc.edu/ils/vol95/iss1/6/ Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare]’ (2019) 95 Int’l L Stud 179, 202.</ref>
Methods of warfare are tactics or strategies to weaken the enemy or gain an advantage during military operations, while means of warfare refer to the weapons or devices used in combat. For instance, the use of ruses in armed conflicts is a lawful and commonly accepted method of warfare. Ruses include using decoys or dummy materials, feigning activity or inactivity, and using camouflage, among many other tactics and techniques. Human shields, misuse of protected emblems , or perfidy are examples of methods of warfare that are prohibited.
By contrast, means of warfare include weapons or devices such as machine guns, tanks, airplanes, submarines, missiles, drones, rifles, and many others. A weapon is “generally understood as that aspect of the system used to cause damage or destruction to objects or injury or death to persons,” and characterizes both weapons and weapon systems as means of warfare. Various rules of IHL operationalize the terms weapons, methods, and means. These include, but are not limited to, the weapons review requirement and process, the prohibition on unnecessary suffering, precautions in the attack, and the law of neutrality.
Tallinn Manual 2.0 outlines a definitional framework for the terms means and methods of warfare in the cyber context. According to the Manual, “[c]yber means of warfare” includes both cyber weapons and related systems and includes cyber devices, material, instrument, mechanisms, equipment, or software used, designed, or intended to be used to conduct a cyber-attack. Cyber weapons are means of warfare used, designed, or intended to cause injury to, or death of, persons or damage to, or destruction of, objects. Finally, Tallinn Manual 2.0 states that “methods of cyber warfare are the cyber tactics, techniques, and procedures by which hostilities are conducted”. Hacking, phishing, distributed denial of service, and the use of so-called honeypots and watering holes are typical examples of methods of cyber warfare.
|}<section end=Definition />


== Appendixes ==


Methods of warfare are tactics or strategies to weaken the enemy or gain an advantage during military operations, while means of warfare refer to the weapons or devices used in combat.<ref>See Geoffrey S Corn and others, ''The Law of Armed Conflict: An Operational Approach'' (2nd ed., Wolters Kluwer 2019) 288.  See also United States, FM 6-27, MCTP 11-10C, ''The Commander’s Handbook on the Law of Land Warfare'' (August 2019) 2-1.</ref> For instance, the use of [[Perfidy and ruses of war|ruses]] in armed conflicts is a lawful and commonly accepted method of warfare. Ruses include using decoys or dummy materials, feigning activity or inactivity, and using camouflage, among many other tactics and techniques.<ref>See Gary D Solis, ''The Law of Armed Conflict: International Humanitarian Law in War'' (2nd ed., CUP 2016) 464-467.</ref> Human shields, [[Misuse of established indicators|misuse of protected emblems]], or [[Perfidy and ruses of war|perfidy]] are examples of methods of warfare that are prohibited.
=== See also ===
* [[Scenario 22: Cyber methods of warfare]]



=== Notes and references ===
By contrast, means of warfare include weapons or devices such as machine guns, tanks, airplanes, submarines, missiles, drones, rifles, and many others.<ref>Dave Wallace and Shane R Reeves, ‘Modern Weapons and the Law of Armed Conflict’ in Geoffrey S Corn, Rachel E VanLandingham, and Shane R. Reeves (eds), ''U.S. Military Operations: Law, Policy, and Practice'' (OUP 2016) 41.</ref> A weapon is “generally understood as that aspect of the system used to cause damage or destruction to objects or injury or death to persons,” and characterizes both weapons and weapon systems as means of warfare.<ref>See [https://doi.org/10.1017/9781316822524 Tallinn Manual 2.0], commentary to rule 103.</ref> Various rules of IHL operationalize the terms weapons, methods, and means. These include, but are not limited to, the [[Legal review of cyber weapons, means and methods of warfare|weapons review]] requirement and process,<ref>[https://ihl-databases.icrc.org/applic/ihl/ihl.nsf/ART/470-750045?OpenDocument Article 36 AP I].</ref> the prohibition on unnecessary suffering,<ref>[https://ihl-databases.icrc.org/applic/ihl/ihl.nsf/Article.xsp?action=openDocument&documentId=61CDD9E446504870C12563CD00516768 Article 23 (e) Hague Regulations]; [https://ihl-databases.icrc.org/applic/ihl/ihl.nsf/Article.xsp?action=openDocument&documentId=0DF4B935977689E8C12563CD0051DAE4 Art. 35(2) AP I].</ref> precautions in the attack,<ref>[https://ihl-databases.icrc.org/applic/ihl/ihl.nsf/Article.xsp?action=openDocument&documentId=50FB5579FB098FAAC12563CD0051DD7C Article 57 AP I].</ref> and the law of neutrality.<ref>See Hague Conventions V and XIII.</ref>


''Tallinn Manual 2.0'' outlines a definitional framework for the terms means and methods of warfare in the cyber context. According to the Manual, “[c]yber means of warfare” includes both cyber weapons and related systems and includes cyber devices, material, instrument, mechanisms, equipment, or software used, designed, or intended to be used to conduct a cyber-attack.<ref>[https://doi.org/10.1017/9781316822524 Tallinn Manual 2.0], commentary to rule 103.</ref> Cyber weapons are means of warfare used, designed, or intended to cause injury to, or death of, persons or damage to, or destruction of, objects.<ref>[https://doi.org/10.1017/9781316822524 Tallinn Manual 2.0], commentary to rule 103.</ref> Finally, ''Tallinn Manual 2.0'' states that “methods of cyber warfare are the cyber tactics, techniques, and procedures by which hostilities are conducted”.<ref>[https://doi.org/10.1017/9781316822524 Tallinn Manual 2.0], rule 103.</ref> Hacking, phishing, distributed denial of service, and the use of so-called honeypots and watering holes are typical examples of methods of cyber warfare.<ref>See Jeffrey T Biller and Michael N Schmitt, ‘[https://digital-commons.usnwc.edu/ils/vol95/iss1/6/ Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare]’ (2019) 95 Int’l L Stud 179, 219.</ref>
|}<section end="Definition" />

==Appendixes==

===See also===
*[[Scenario 22: Cyber methods of warfare]]

===Notes and references===
<references />
<references />


=== Bibliography and further reading ===
===Bibliography and further reading===
<!--
<!--
* MN Schmitt (ed), ''Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations'' (CUP 2017)
* MN Schmitt (ed), ''Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations'' (CUP 2017)

Revision as of 06:11, 7 August 2021

Definition

Means and methods of cyber warfare
[[International humanitarian law (IHL) regulates the conduct of hostilities through principles and rules concerning weapons, means, and methods of warfare.[1] A bedrock principle of modern IHL is that the right of the parties to the conflict to choose methods and means of warfare is not unlimited.[2] This principle reflects customary international law and is one of the most widely recognized and accepted principles in IHL.[3] It binds all States and other parties in both international and non-international armed conflicts.[4] Central to understanding and applying this principle and the rules that operationalize it are the terms weapons, means, and methods of warfare. As a threshold matter, it is crucial to recognize that, despite these terms’ foundational nature in IHL, divergent views and approaches exist concerning their definitions in treaties, State regulations, and unofficial publications.[5]


Methods of warfare are tactics or strategies to weaken the enemy or gain an advantage during military operations, while means of warfare refer to the weapons or devices used in combat.[6] For instance, the use of ruses in armed conflicts is a lawful and commonly accepted method of warfare. Ruses include using decoys or dummy materials, feigning activity or inactivity, and using camouflage, among many other tactics and techniques.[7] Human shields, misuse of protected emblems, or perfidy are examples of methods of warfare that are prohibited.


By contrast, means of warfare include weapons or devices such as machine guns, tanks, airplanes, submarines, missiles, drones, rifles, and many others.[8] A weapon is “generally understood as that aspect of the system used to cause damage or destruction to objects or injury or death to persons,” and characterizes both weapons and weapon systems as means of warfare.[9] Various rules of IHL operationalize the terms weapons, methods, and means. These include, but are not limited to, the weapons review requirement and process,[10] the prohibition on unnecessary suffering,[11] precautions in the attack,[12] and the law of neutrality.[13]


Tallinn Manual 2.0 outlines a definitional framework for the terms means and methods of warfare in the cyber context. According to the Manual, “[c]yber means of warfare” includes both cyber weapons and related systems and includes cyber devices, material, instrument, mechanisms, equipment, or software used, designed, or intended to be used to conduct a cyber-attack.[14] Cyber weapons are means of warfare used, designed, or intended to cause injury to, or death of, persons or damage to, or destruction of, objects.[15] Finally, Tallinn Manual 2.0 states that “methods of cyber warfare are the cyber tactics, techniques, and procedures by which hostilities are conducted”.[16] Hacking, phishing, distributed denial of service, and the use of so-called honeypots and watering holes are typical examples of methods of cyber warfare.[17]

Appendixes

See also

Notes and references

  1. See ICRC CIHL Study, vol I, parts III–IV; see also United States, FM 6-27, MCTP 11-10C, The Commander’s Handbook on the Law of Land Warfare (August 2019) 2-1.
  2. See Article 22 Hague Regulations; Article 35 AP I.
  3. [1] See UN GA, Resolution 2444 (1968), UN Doc A/7218 (adopted unanimously), para. 1(a); ICTY, Prosecutor v Tadić, Decision on the Defence Motion for Interlocutory Appeal on Jurisdiction, Appeals Chamber, Case No. IT-94-1, 2 October 1995, paras. 110 and 112 (holding that principles enshrined in Resolution 2444 reflected customary international law at the time); Nuclear Weapons Advisory Opinion, paras. 78–79 (affirming that the principle that ‘States do not have unlimited freedom of choice of means in the weapons they use’ is one of ‘intransgressible principles of international customary law’); San Remo Manual, Rule 38 (‘In any armed conflict the right of the parties to the conflict to choose methods or means of warfare is not unlimited.’); AMW Manual, Rule 4 (‘The fundamental principle is that, in any armed conflict, the right of the Belligerent Parties to choose methods or means of warfare is not unlimited.’).
  4. See William H Boothby, The Law of Targeting (OUP 2012) 58.
  5. See Jeffrey T Biller and Michael N Schmitt, ‘Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare’ (2019) 95 Int’l L Stud 179, 202.
  6. See Geoffrey S Corn and others, The Law of Armed Conflict: An Operational Approach (2nd ed., Wolters Kluwer 2019) 288.  See also United States, FM 6-27, MCTP 11-10C, The Commander’s Handbook on the Law of Land Warfare (August 2019) 2-1.
  7. See Gary D Solis, The Law of Armed Conflict: International Humanitarian Law in War (2nd ed., CUP 2016) 464-467.
  8. Dave Wallace and Shane R Reeves, ‘Modern Weapons and the Law of Armed Conflict’ in Geoffrey S Corn, Rachel E VanLandingham, and Shane R. Reeves (eds), U.S. Military Operations: Law, Policy, and Practice (OUP 2016) 41.
  9. See Tallinn Manual 2.0, commentary to rule 103.
  10. Article 36 AP I.
  11. Article 23 (e) Hague Regulations; Art. 35(2) AP I.
  12. Article 57 AP I.
  13. See Hague Conventions V and XIII.
  14. Tallinn Manual 2.0, commentary to rule 103.
  15. Tallinn Manual 2.0, commentary to rule 103.
  16. Tallinn Manual 2.0, rule 103.
  17. See Jeffrey T Biller and Michael N Schmitt, ‘Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare’ (2019) 95 Int’l L Stud 179, 219.

Bibliography and further reading