
NATO technical experts were unable to find credible 
evidence  (Herzog2011,  p.51).  Furthermore,  the 
attempts to apply international law to cyber warfare 
relied  on  doctrine  that  doesn’t  fit  cyber  threats 
(Schmitt, 2013). 
In  jus  in  Bello  perspective,  armed conflicts are 
normally  governed  by  Geneva  conventions  and  its 
protocols  (Geneva  Conventions  1949,  article  48). 
All the principles of Geneva conventions applicable 
to war are there to avoid unnecessary sufferings that 
can  affect  civilians  and other  persons  who  are not 
taking  part  into  hostilities.  However,  one  may 
wonder if it is the case for cyber-attacks since they 
are  indiscriminate  in  attack  as  they  are  launched 
electronically  even  if  effects  may  be  physical 
depending  on  the  nature  and  the  purpose  of  the 
malware launched. 
Although International Humanitarian Law (IHL) 
does  not  apply  in  cyber-attacks,  states  have 
obligation  to  avoid  or  at  least  minimize  incidental 
civilian  casualties  and  damage  to  civilian 
infrastructure  because  the  rules  and  limits  of  wars 
apply just as much to the use of cyber warfare as to 
the use of rifles, artillery and missiles (ICRC, 2013). 
Despite the suggestions of some scholars that jus 
in  Bello  principles  (such  as  military  objective, 
distinction,  proportionality,  and  unnecessary 
suffering) should be applied within cyber-attacks, it 
raises  question  of  how  and  against  whom  cyber-
attacks may be lawfully conducted and by who they 
may be lawfully executed (Watts, 2009). It remains 
an  issue  as  to  how  jus  in  Bello  principles  will  be 
respected,  because  one  may  assert  that  cyber 
weapons are indiscriminate in attacks. 
Although cyber operations are not conducted in a 
legal  vacuum,  cautious  approach  should  be 
adoptedto avoid unnecessarily prejudge legal issues 
in  cyber  warfare  (Melzer2011,  p.4).  Attributability 
of state responsibility for cyber-attacks will continue 
to  be  a  challenge  detrimental  to  states  sovereignty 
since  there  is  no  single  international  treaty  to 
regulate  cyber  warfare.  In  addition  to  that,  cyber-
attacks  pose  interpretative  difficulties  and  with 
respect  to  UN  Charter,it  does  not  delineate  cyber-
attacks  as  to  whether  such  operations  constitute 
prohibited “force”  or  an  “armed attack”  that would 
justify  military  force in  self-defence (Article 51 of 
UN charter). 
5  CONCLUSION 
Sovereign  state is  protected from any  use  of force 
under international law and enjoys inherent right of 
self-defence  in  case  attacked  as  contemplated  in 
article  51  of  UN  Charter.  Nevertheless,  the  term 
threat  or  use  of  force  contemplated  in  article  2(4) 
UN Charter creates ambiguity because it elaborates 
when the threat or use of force is prohibited but it 
failed  to  delineate  whether  use  of  force  includes 
non-military force  for example  cyber-attacks that a 
state  may  launch  against  another  state  yet  these 
attacks are not within the scope of the UN Charter. 
In this regard, the Charter should have  enumerated 
elements that constitute “force” when it was adopted 
or the drafters should consider adjusting the Charter 
to  the  now  cyber  world.  State  sovereignty  is 
jeopardized and one can assert that there is no single 
adopted  instrument  that  regulates  cyber  warfare  in 
international arena. Thanks to  the  incessant  efforts 
made  by  international  legal  scholars  and  military 
experts  whose  writings  such  as  Tallinn manual  on 
the  law  applicable  to  cyber  warfare,  though  non-
binding, are gaining momentum in unravelling cyber 
warfare related issues. 
The  unique  characteristic,  unpredictability  and 
rapid  evolution  of  cyber-attacks  are  posing  fresh 
challenges which prompt some scholars and policy 
experts  to  emphasize  the  need  for  clarity  in 
interpreting the application of article 2(4) and 51 to 
cyber-attacks (Maxman,  2011). To suggest, United 
Nations  or  states  in  general  should  embark  on 
international  legal  experts  and  military  experts’ 
views  to  adopt  a  treaty  regulating  cyber  warfare 
which  is  a  new  challenge  that  deserves  a  new 
solution. 
REFERENCES 
Brownlie I,. 1963. International law and the use of force 
by states, Oxford, Clarendon.P .230. 
Clarke, R and Knake R, 2010.Cyber war: the next threat 
to  National  Security  and  What  to  Do  about  it.  New 
York, HarperCollins Publisher. P.14 
Geneva Conventions of 12 August 1949, article 48) and its 
Additional  protocols.  Available  at 
www.icrc.org/en/war-and-law-traeties-customary-
law/geneva-conventions 
Hathaway,  O.  A.,  Crootof,  R.,  2012.  The  law  of  cyber-
attack,  Faculty  Scholarship 
Series.385.[Online]available 
at:http://digitalcommons.law.yale.edu/fss_papers/3852
accessed on 24th June 2018. 
Heinegg.  H,2012.  Legal  Implications  of  Territorial 
Sovereignty  in  Cyberspace,  NATO  CCD  COE 
Publications,  Tallinn.P.7  [Online].Available 
athttps://ccdcoe.org/publications/2012proceedings/1_1
_von_Heinegg_LegalImplicationsOfTerritorialSoverei
gntyInCyberspace.pdf.  Accessed on 25th June 2018 
ICPS 2018 - 2nd International Conference Postgraduate School
670