Author: Mateusz Piątkowski
Institution: University of Łódź (Poland)
Year of publication: 2017
Source: Show
Pages: 271-280
DOI Address:
PDF: ppsy/46-1/ppsy2017117.pdf

The paper is presenting the examination of the cyberwarfare phenomenon in its legal context. The cyberattacks are increasingly effective measures of modern combat and would probably become the most crucial dimension of forthcoming armed conflict. The role of the international humanitarian law is to determine whenever the cyberattack is reaching the threshold of an armed conflict. The aim of the article is to present the existing framework of ius in bello in terms of its temporal scope of applicability, especially in the light of the Tallinn Manual on the International Law Applicable to Cyber Warfare. It supported conclusion that the international law requires an revision of the armed conflict definition to sufficiently addressed the challenges arising from growing cyber activity. 


  • Alder, M. C. (2012). The Inherent Right of Self-Defence in International Law. Dorodrecht: Springer.
  • Asada, M. (2012). “The Concept of 'Armed Conflict' in International Armed Conflict: Non - International Armed Conflict”. In M. E. O`Connell (Eds.), What Is War?: An Investigation in the Wake of 9/11 (pp. 51-69). Leiden: Martinus Nijhoff Publishers.
  • Blank, L. (2014). “Cyberwar/Cyber Attack: The Role of Rhetoric in the Application of Law to Activities in Cyberspace. Cyberwar: Law & Ethics for Virtual Conflicts”. Emory Legal Studies Research Paper, 14, pp. 1-34.
  • Boot, M. (2002). Genocide, Crimes Against Humanity, War Crimes: Nullum crimen sine lege and the Subject Matter Jurisdiction of the International Criminal Court. Antwerpen: Intersentia.
  • Convention (IV) relative to the Protection of Civilian Persons in Time of War. Geneva, 12 August 1949.
  • Convention (IV) respecting the Laws and Customs of War on Land and its annex: Regulations concerning the Laws and Customs of War on Land. The Hague, 18 October 1907.
  • Denning, D. E. (2012).” Stuntex: What Has Changed”. Future Internet, 4, pp. 672-687.
  • Dinstein, Y. (2011). War, Agression and Self - Defence. Cambridge: Cambridge University Press.
  • Dunlap, C. J. (2008). “Lawfare Today: A Perspective”. Yale Journal of International Affairs, 3(1), pp. 146-154.
  • Dunlap, C. J. (2011). “Perspectives for Cyber Strategists on Law for Cyberwar”. Strategic Studies Quarterly, 5, pp. 81-99.
  • Kodar, E. (2012). “Applying The Law of Armed Conflict to Cyber Attacks: From the Martens Clause to I Additional Protocol”. ENDC Proceedings, 12, pp. 107-132.
  • Geiss. R. (2013). “Cyber Warfare: Implications for Non-international Armed Conflicts”. International Law Studies, 62, pp. 627-645.
  • Gervais, M. (2012). “Cyber Attacks and the Laws of War”. Berkeley Journal of International Law, (30)525, pp. 525-575.
  • Hiroshe Kawaguchi, K. (2003). A Social Theory of International Law. Leiden: Martinus Nijhoff Publishers.
  • “International Commitee of the Red Cross. (2008). How is the Term Armed Conflict Defined in International Humanitarian Law?”. International Committee of the Red Cross (ICRC) Opinion Paper.
  • “International Commitee of the Red Cross. What limits does the law of war impose on cyberattacks?” (2013). International Committee of the Red Cross. Retrieved from:
  • International Law Assosication. (2010). “The Hague Conference”. Use of Force - Final Report on the Meaning of Armed Conflict in International Law.
  • Kelsen, H. (2003). Principles of International Law. New Jersey: The Law Book Exchange.
  • Liivoja, R., & Leins, R,. & McCormack, T. (2016). “Emerging Technologies of Warfare”. In. R. Liivoja et al. (Eds). Routledge Handbook of International Law of Armed Conflict. New York: Routledge.
  • Lin, H. (2012). “Cyber conflict and international humanitarian law”. International Review of the Red Cross, 94(886), pp. 515-531.
  • Luban, D. (2011). “Carl Schmitt and the Critique of Lawfare”. Georgetown Public Law and Legal Theory Research Paper, 11, pp. 1-14.
  • Melzer, N. (2011). Cyberwarfare and International Law. Geneva: UNIDIR Resources.
  • Mrazek, J. (2010). Armed Conflicts and the Use of Force. Czech Yearbook of International Law, 1, pp. 97-109.
  • Norris, M.J. (2013). “The Law of Attack in Cyberspace: Considering the Tallinn Manual's Definition of 'Attack' in the Digital Battlespace”. Inquiries Journal/Student Pulse, 5(10). Retrieved from:
  • Kittichaisaree K. (2017). Public International Law of Cyberspace. Cham: Springer.
  • Peagler, J. (2014). “The Stuntex Attack: A New Form of Warfare and the (In)Applicability of Current International Law”. Arizona Journal of International & Comparative Law, 31(2), pp. 399-432.
  • Perna, L. (2006). The Formation of the Treaty Rules Applicable in Non-international Armed Conflicts. Leiden: Martinus Nijhoff Publishers.
  • Pictet, J. (1952). Commentary, Geneva Convenion of 12 August 1949. Geneva: International Red Cross Committee.
  • Prosecutor v. Dusko Tadic aka "Dule" (Decision on the Defence Motion for Interlocutory Appeal on Jurisdiction), IT-94-1, International Criminal Tribunal for the former Yugoslavia (ICTY), 2 October 1995.
  • Radziwill, Y. (2015). Cyber-Attacks and the Exploitable Imperfections of International Law. Leiden: Brill.
  • “Eritrea-Ethiopia Claims Commission (2006): Partial Award-Jus ad Bellum, Ethiopia's Claims 1-8”. International Legal Materials, 45(2), pp. 430-435
  • Richardson, J. (2011). “Stuxnet as Cyberwarfare: Applying the Law of War to the Virtual Battlefield”. J. Marshall Journal of Computer & Info Law, 29(1), pp. 1-29.
  • Roscini, M. (2014). Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press.
  • Schmitt, M. N. (2008). “Cyber Operations and the Ius In Bello Key Issues”. International Law Studies, 87, pp. 90-110.
  • Schmitt, M. N. (2012). “Attack as a Term of Art in International Law: The Cyber Operations Context”. Proceedings of the 4th International Conference on Cyber Conflict, pp. 283-293.
  • Schmitt, M. N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press.
  • Schmitt, M. N. (2017). Tallin Manual 2. 0 on International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press
  • Simmons, N. (2014). “A Brave New World: Applying International Law of War to Cyber Attack”. Journal of Law and Cyber Warfare, 4(1), pp. 53-61.
  • Simon, Fan. C. (2016). Culture, Institution, and Development in China: The Economics of National Character. Oxon: Routledge.
  • Tabansky. L. (2011). “Basic Concepts in Cyber Warfare”. Military and Strategic Affairs, 3(1), pp. 75-92.
  • Watkin, K. (2016). Fighting at the Legal Boundaries: Controlling the Use of Force in Contemporary Conflict. Oxford: Oxford University Press.
  • Waxmann, M.C. (2011). “Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4)”. The Yale Journal of International Law, 36, pp. 421-459.


Wiadomość do:



© 2017 Adam Marszałek Publishing House. All rights reserved.

Projekt i wykonanie Pollyart