
Technology and the Law on the Use of Force
New Security Challenges in the Twenty-First Century
- 112 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Technology and the Law on the Use of Force
New Security Challenges in the Twenty-First Century
About this book
As governmental and non-governmental operations become progressively supported by vast automated systems and electronic data flows, attacks of government information infrastructure, operations and processes pose a serious threat to economic and military interests. In 2007 Estonia suffered a month long cyber assault to its digital infrastructure, described in cyberspace as 'Web War I'. In 2010, a wormāStuxnetāwas identified as supervisory control and data acquisition systems at Iran's uranium enrichment plant, presumably in an attempt to set back Iran's nuclear programme. The dependence upon telecommunications and information infrastructures puts at risk Critical National Infrastructure, and is now at the core of national security interests.
This book takes a detailed look at these new theatres of war and considers their relation to international law on the use of force. Except in cases of self-defence or with the authorisation of a Security Council Resolution, the use of force is prohibited under the UN charter and customary international law. However, the law of jus ad bellum was developed in a pre-digital era where current technological capabilities could not be conceived. Jackson Maogoto asks whether the law on the use of force is able to deal with legal disputes likely to arise from modern warfare. Key queries include how one defines an armed attack in an age of anti-satellite weaponry, whether the destruction of a State's vital digital eco-system or the "blinding" of military communication satellites constitutes a threat, and how one delimits the threshold that would enliven the right of self-defence or retaliatory action. The book argues that while technology has leapt ahead, the legal framework has failed to adapt, rendering States unable to legally defend themselves effectively.
The book will be of great interest and use to researchers and students of international law, the law of armed conflict, Information Technology and the law, and counter-terrorism.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
1 Use of force Displaced twentieth-century rules, norms and standards?
Introduction
An armed attack involves the use of armed force and not mere economic damage. Economic damage, for example, by way of trade suspension, or by use of a computer virus designed to paralyse the financial operations of a State's stock exchange or to disable the technology . . . may have a devastating impact on the victim State but the principles governing the right to use force in self-defence are confined to a military attack. 1
The concept of armed attack
Traditionally, the concept of an āarmed attackā was understood to involve a cross-border use of military force by one State against another . . . In other words, the UN Charter was designed to prevent or forestall or confront a repeat of the last war, the Second World War. This may account for its lack of precision and guidance in relation to unconventional uses of force since then. 8
the Charter's preamble sets out the goal that āarmed force . . . not be used save in the common interest.ā . . . Article 51 speaks of self-defense against āarmedā attacks. There are textual counter-arguments, such as that Article 51's more specific limit to āarmed attacksā suggests that drafters envisioned prohibited āforceā as a broader category not limited to particular methods. However, the discussions of means throughout the Charter and the document's negotiating history strongly suggest the draftersā intention to regulate armed force differently and more strictly than other coercive instruments. 9
Article 51: the State's right to respond in self-defence
The restrictionist approach
[r]eading Article 2(4)'s prohibition of force to include such intrusion into another sovereign's domain would lead to the conclusion that . . . like past efforts to define Article 2(4) āforceā as coercion, efforts to expand its coverage beyond armed force so as to include violations of sovereign domain such as propaganda or political subversion never gained significant traction. 22
The counter-restrictionist approach
Table of contents
- Cover Page
- Half Title Page
- Frontmatter
- Title Page
- Copyright Page
- Table of Contents
- Dedication
- Acknowledgements
- List of acronyms
- Table of cases
- Table of statutes
- Introduction
- 1 Use of force: displaced twentieth-century rules, norms and standards?
- 2 Revolution in military affairs: hi-tech weaponry, low-tech legal safeguards
- 3 The fourth domain: ascendance of outer space as a war theatre
- 4 War in the fifth domain: cyberwarfare
- 5 Discarding law by analogy: old legal frameworks for new threats
- Conclusion
- Bibliography
- Index