Controlling Cyberwarfare: International Laws of Armed Conflict and Human Rights in the Cyber Realm

dc.contributor.advisorDoucet, Mathieu
dc.contributor.authorJordan, W. Jim
dc.date.accessioned2021-06-04T13:21:10Z
dc.date.available2021-06-04T13:21:10Z
dc.date.issued2021-06-04
dc.date.submitted2021-06-01
dc.description.abstractCyberwarfare, military activities in cyberspace conducted by a state against another state and intended to disrupt or destroy computing or communica­tion systems or data, is a recent addition to the warfaring arsenal. The in­ternational laws of armed conflict set out an obligation for states at war to protect civilians from the effects of the conflict. As societies continue to ex­pand their activities in the cyber realm, the risk of cyberwarfare negatively affecting the civilian population increases. The international community, recognizing this risk, is engaged in a political dance trying to identify the constraints that international law already places on cyberwarfare while stak­ing out ground to preserve its effectiveness as a means of influencing other states’ policies. This dissertation project addresses some of the problems posed by the use of computing and network technology as weapons and tar­gets in the context of international armed conflict. It brings together mate­rial drawn from computing technology, military handbooks, policy research, international standards for records preservation, non­government organiza­tions, international humanitarian law, international human rights law, the international laws of armed conflict, and real­-world examples to reveal the complexity and nuances of using operations in cyberspace to produce ef­fects in meatspace, the physical world of humans, buildings, equipment, and artefacts. First, I argue that since there is no significant difference between using cyber means of war and conventional means of war, it is appropriate to treat developments in cyberwarfare under the existing international laws of armed conflict. Then I introduce the Tallinn Manual, a handbook on the international law applicable to cyber operations, and the events that led to its development. I examine how well the Tallinn Manual documents the pro­tections, prohibitions, and permissions extended under the laws of armed conflict, concluding that it is a faithful interpretation of international law. The application of international law to warfare is always messy and im­precise. Its application to cyberwarfare is no different. This does not mean that the constraints of international law are without value or purpose. On the assumption that no state wants to start an international armed conflict, but is prepared to respond to uses of force, I apply some of the principles expressed in the Tallinn Manual to establish qualitative assessments of the severity of initial aggressive cyberoperations against a state, classifying them as moderate or flagrant attacks depending on the harm they produced. This helps the target state determine whether there is just cause for a use of force, either cyber or conventional, in response, and the constraints that apply to any response that may be permissible under international law. International law also affords protections for human rights, both in peace­ time and during times of conflict. I argue that cyberwarfare exposes more civilian objects, including objects of cultural significance and records needed to safeguard human rights, to harm through both conventional and cyber at­tacks. If human rights are to be protected, the records (digital or otherwise) that serve as evidence in support of rights claims must be protected as well. I conclude that international law already sets out the obligation for these protections, but the interpretation of international law must make explicit the expectation that all parties in an armed conflict will make efforts to iden­tify and preserve these objects for the well­being of persons in a post­conflict society. Finally, I demonstrate the breadth and applicability of further work in this area. I point out some other problems that branch off from this partic­ular project: the separation of information content from its representation in different media, human rights in the cyber domain, the use of comput­ing and communication technology to produce social or economic disrup­tion, the status of privately­-owned satellites under the multiple international treaties and conventions during times of armed conflict, and the assignment of peacetime responsibility for safeguarding data essential for the protection and provision of human rights.en
dc.identifier.urihttp://hdl.handle.net/10012/17090
dc.language.isoenen
dc.pendingfalse
dc.publisherUniversity of Waterlooen
dc.subjectcyberwaren
dc.subjectinternational lawen
dc.subjectinternational humanitarian lawen
dc.subjecthuman rightsen
dc.subjectTallinn Manualen
dc.titleControlling Cyberwarfare: International Laws of Armed Conflict and Human Rights in the Cyber Realmen
dc.typeDoctoral Thesisen
uws-etd.degreeDoctor of Philosophyen
uws-etd.degree.departmentPhilosophyen
uws-etd.degree.disciplinePhilosophyen
uws-etd.degree.grantorUniversity of Waterlooen
uws-etd.embargo.terms0en
uws.comment.hiddenDissertation was produced using LaTeX, which cannot produce accessible PDFs.en
uws.contributor.advisorDoucet, Mathieu
uws.contributor.affiliation1Faculty of Artsen
uws.peerReviewStatusUnrevieweden
uws.published.cityWaterlooen
uws.published.countryCanadaen
uws.published.provinceOntarioen
uws.scholarLevelGraduateen
uws.typeOfResourceTexten

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Jordan_Jim.pdf
Size:
2.65 MB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
6.4 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections