Non-international armed conflict
Definition[edit | edit source]
|Non-international armed conflict|
|The law of non-international armed conflict (NIAC) applies to all armed conflicts not of an international character. As set forth by the ICTY Appeals Chamber in the Tadić case, NIACs are situations of “protracted armed violence between governmental authorities and organized armed groups or between such groups within a State”.
This definition rests on two factors—the intensity of the fighting and the organization of the non-State group. First, the hostilities between the parties must reach a certain level of intensity, which may be indicated by, among other factors, the seriousness and frequency of attacks and military engagements, the extent of destruction, or the deployment of governmental armed forces. Second, the non-State group must have some minimum level of organization, indicators of which may include the presence of a command or leadership structure, the ability to determine a unified military strategy and speak with one voice, the adherence to military discipline, as well as the capability to comply with IHL.
These same criteria of intensity and organization apply in situations involving (or even limited to) cyber operations. However, cyber operations alone will only rarely meet the requisite level of intensity to trigger a NIAC.
National positions[edit | edit source]
"43. A non-international armed conflict exists if there is ‘protracted armed violence between governmental authorities and organized armed groups or between such groups within a State’. In theory, such conflicts may be initiated by the use of cyber operations between these actors. However, in practice, the required threshold of intensity is unlikely to be reached by cyber operations alone. For example, a single cyber operation by a non-State group that disrupts, or damages critical infrastructure would normally not amount in and of itself to a non-international armed conflict and would therefore not be governed by IHL."
"International humanitarian law only applies to cyber operations when such operations are part of, or amount to, an armed conflict. Most so far known cyberattacks have not been launched in the context of an armed conflict or met the threshold of armed conflict. At the same time, when cyber means are used in the context of a pre-existing armed conflict, as has been done in many current conflicts, there is no reason to deny the need for the protections that international humanitarian law provides. This includes that cyber means and methods of warfare must be used consistently with the principles of distinction, proportionality and precautions, as well as the specific rules flowing from these principles. When assessing the capacity of cyber means and methods to cause prohibited harm, their foreseeable direct and indirect effects shall be taken into account. Constant care shall be taken to ensure the protection of civilians and civilian objects, including essential civilian infrastructure, civilian services and civilian data.
The unique characteristics of cyberspace, such as interconnectedness and anonymity, may affect how international humanitarian law is interpreted and applied with regard to certain cyber means and methods warfare. The related problems can nevertheless mostly be solved on the basis of existing rules. New technologies do not render the existing rules of international humanitarian law meaningless or necessarily require new legal regulation. Furthermore, while international humanitarian law is lex specialis in an armed conflict, it does not override other areas of international law, such as human rights law, which may continue to apply throughout the conflict."
Cyberoperations that constitute hostilities between two or more States may characterise the existence of international armed conflict (IAC). Likewise, prolonged cyberoperations by government armed forces against one or more armed groups or by several armed groups between themselves may constitute a non-international armed conflict (NIAC), where such groups show a minimum level of organisation and the effects of such operations reach a sufficient threshold of violence. They are generally military operations concurrent with conventional military operations: that is why it is not difficult to categorise an armed conflict situation. While an armed conflict consisting exclusively of digital activities cannot be ruled out in principle, it is based on the capacity of autonomous cyberoperations to reach the threshold of violence required to be categorised as such. Although virtual, cyberoperations still fall within the geographical scope of IHL, insofar as their effects must arise on the territory of the States party to the IAC and on the territory where the NIAC hostilities occur.
"Germany reiterates its view that IHL applies to cyber activities in the context of armed conflict. The fact that cyberspace as a domain of warfare was unknown at the time when the core treaties of IHL were drafted does not exempt the conduct of hostilities in cyberspace from the application of IHL. As for any other military operation, IHL applies to cyber operations conducted in the context of an armed conflict independently of its qualification as lawful or unlawful from the perspective of the ius ad bellum.
An international armed conflict – a main prerequisite for the applicability of IHL in a concrete case – is characterized by armed hostilities between States. This may also encompass hostilities that are partially or totally conducted by using cyber means. Germany holds the view that cyber operations of a non-international character, e.g. of armed groups against a State, which reach a sufficient extent, duration, or intensity (as opposed to acts of limited impact) may be considered a non-international armed conflict and thereby also trigger the application of IHL.
At the same time, cyber actions can become part of an ongoing armed conflict. In order to fall within the ambit of IHL, the cyber operation must show a sufficient nexus with the armed conflict, i.e. the cyber operation must be conducted by a party to the conflict against its opponent and must contribute to its military effort.
Cyber operations between a non-State actor and a State alone may provoke a non-international armed conflict. However, this will only seldom be the case due to the level of intensity, impact and extent of hostilities required. Thus, activities such as a large-scale intrusion into foreign cyber systems, significant data theft, the blocking of internet services and the defacing of governmental channels or websites will usually not singularly and in themselves bring about a non-international armed conflict."
"The basic principles governing the conduct of hostilities, including by cyber means, such as the principles of distinction, proportionality, precautions in attack and the prohibition of unnecessary suffering and superfluous injury, apply to cyber attacks in international as well as in non-international armed conflicts."
"30. Cyber operations that have similar effects to physical military operations constituting armed force will bring into existence an international armed conflict if conducted between states, and can bring into existence a non-international armed conflict if the usual criteria are satisfied, namely that the violence has reached the requisite level of intensity and that it is between at least two organised parties."
"International humanitarian law is also applicable to cyber operations.
In situations of armed conflict, the methods and means of warfare used by the parties to the conflict are subject to regulations under international humanitarian law. This extends to cyber operations implemented by the parties to the conflict. Several principles under international humanitarian law, including the principle of humanity, necessity, proportionality and distinction, are also applicable to acts in cyberspace. In paragraph 28(d) of the 2015 GGE report, those principles are referred to as "established international legal principles." This reference, considered together with the fact that this report affirms the applicability of existing international law, can be interpreted to affirm the applicability of those principles.
[..] In principle, the existence of an "armed conflict" is a prerequisite for the application of international humanitarian law. Under the Geneva Conventions, there is no particular definition of an "armed conflict," and therefore, whether or not a certain incident constitutes an "armed conflict" needs to be decided on a case-by-case basis, taking into account a number of elements, such as the manner of the actual attack and the intent of each party to the incident, in a comprehensive manner. If the effects of cyber operations are taken into consideration, the conduct of cyber operations alone may reach the threshold of an "armed conflict."
As affirming the applicability of international humanitarian law to cyber operations contributes to the regulation of methods and means of warfare, the argument that doing so will lead to the militarization of cyberspace is groundless.[...] On the other hand, modes of combat in cyberspace are different from those in traditional domains. Therefore, how international humanitarian law regarding, for example, the scope of combatants applies to cyberspace should be further discussed."
Appendixes[edit | edit source]
See also[edit | edit source]
- International armed conflict
- International humanitarian law (jus in bello)
- Scenario 13: Cyber operations as a trigger of the law of armed conflict
- Scenario 18: Legal status of cyber operators during armed conflict
- Scenario 19: Hate speech
Notes and references[edit | edit source]
- Common Article 3 GCs.
- Prosecutor v Tadić (Decision on Jurisdiction) IT-94-1-AR72 (2 October 1995) .
- See also Prosecutor v Tadić (Trial Judgment) IT-94-1-T (7 May 1997)  (noting that the two criteria distinguish “an armed conflict from banditry, unorganized and short-lived insurrections, or terrorist activities, which are not subject to international humanitarian law”).
- Prosecutor v Boškoski and Tarčulovski (Trial Judgment) IT-04-82-T (10 July 2008) .
- Prosecutor v Limaj, Bala and Musliu (Trial Judgment) IT-03-66-T (30 November 2005) ; Prosecutor v Boškoski and Tarčulovski (Trial Judgment) IT-04-82-T (10 July 2008) –.
- Cf. L Cameron et al, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016) 158  (“In order to determine the existence of a non-international armed conflict involving cyber operations, the same criteria apply as with regard to kinetic violence.”).
- Tallinn Manual 2.0, commentary to rule 83, para 7; Yoram Dinstein, Non-International Armed Conflicts in International Law (CUP 2014) 35. For State views affirming this position, see, eg, French Ministry of the Armies, ‘International Law Applied to Operations in Cyberspace’, 9 September 2019, 12; Germany, ‘On the Application of International Law in Cyberspace: Position Paper’ (March 2021), 7.
- Ministry of Foreign Affairs of Costa Rica, "Costa Rica's Position on the Application of International Law in Cyberspace" (21 July 2023) 12 (footnotes omitted).
- International law and cyberspace - Finland's national position
- Ministry of Defense of France, International Law Applied to Operations in Cyberspace, 9 September 2019, 12.
- Federal Government of Germany, ‘On the Application of International Law in Cyberspace’, Position Paper (March 2021) 7.
- Federal Government of Germany, ‘On the Application of International Law in Cyberspace’, Position Paper (March 2021) 8.
- Irish Department of Foreign Affairs, Position Paper on the Application of International Law in Cyberspace (6 July 2023) 7.
- Ministry of Foreign Affairs of Japan, Basic Position of the Government of Japan on International Law Applicable to Cyber Operations, 16 June 2021, 6-7