Democracy and Security
ISSN: 1741-9166 (Print) 1555-5860 (Online) Journal homepage: https://www.tandfonline.com/loi/fdas20
The War on Cyberterrorism
Marco Marsili
To cite this article: Marco Marsili (2019) The War on Cyberterrorism, Democracy and Security,
15:2, 172-199, DOI: 10.1080/17419166.2018.1496826
To link to this article: https://doi.org/10.1080/17419166.2018.1496826
Published online: 17 Jul 2018.
Submit your article to this journal
Article views: 635
View Crossmark data
Full Terms & Conditions of access and use can be found at
https://www.tandfonline.com/action/journalInformation?journalCode=fdas20
DEMOCRACY AND SECURITY
2019, VOL. 15, NO. 2, 172–199
https://doi.org/10.1080/17419166.2018.1496826
The War on Cyberterrorism
Marco Marsili
Centro de Estudos Internacionais (CEI-IUL), Instituto Universitário de Lisboa (ISCTE-IUL), Lisboa,
Portugal; Centro de Investigação, Inovação e Desenvolvimento da Academia Militar (CINAMIL), Lisboa,
Portugal
ABSTRACT
KEYWORDS
This article addresses the problem of international law enforcement within the War on Cyberterrorism. Hybrid conflicts have
replaced the traditional ones, and new threats have emerged
in cyberspace, which has become a virtual battlefield. Cyber
threats - cybercrimes, cyberterrorism, cyberwarfare - are a
major concern for Western governments, especially for the
United States and the North Atlantic Treaty Organization. The
international community has begun to consider cyberattacks
as a form of terrorism, to which the same measures apply.
Because the term “terrorism” is ambiguous and legaly undefined, there is no consensus on a definition of the derivative
term “cyberterrorism”, which is left to the unilateral interpretations of states. Pretending to consider the cyberspace domain
as traditional domains, and claiming to apply IHL for the sole
purpose of lawfully using armed forces in contrast to cyberterrorism is a stretch. This paper addresses the question of
whether or not current laws of war and international humanitarian law apply to cyber domain, and gives some recommendations on how to tackle this issue.
Cyberterrorism;
cybersecurity; cyberdefense;
cyberspace; cybercrime
Defining Cyberterrorism
So far, it has not been possible to reach an undisputed definition of terrorism
due to major divergences on the legitimacy of the use of violence for political
purposes.1 The term is ambiguous and undefined, and at present there is no
commonly accepted definition,2 either legal nor academic. The definition of
“terrorism” is left to the unilateral interpretations of states,3 and it easily falls
prey to change that suits the interests of particular states at particular times.4
Consequently, there is no consensus on a legal or academic definition of the
derivative term “cyberterrorism,” which was introduced by Barry Collin in
1997.5 As for terrorism, there is debate over the basic definition of the scope
of cyberterrorism, depending on motivation, targets, methods, and centrality
of computer use in the act.
Cyberspace involves both military and civilian security, as governments
rely on the Internet and telecommunication systems for a wide range of
CONTACT Marco Marsili
marco_marsili@iscte-iul.pt; info@marcomarsili.it
Centro de Estudos Internacionais
(CEI-IUL), Instituto Universitário de Lisboa (ISCTE-IUL), Av. das Forças Armadas, Lisboa 1649-026, Portugal.
© 2018 Taylor & Francis Group, LLC
DEMOCRACY AND SECURITY
173
critical services.6 Security is a broad-scope concept, which involves the
protection of the state and its citizens. Cybersecurity deals with the protection of computer systems from theft, damage, or disruption.7 Cybercriminals
fall into the provisions of criminal law on cybercrime and should be prosecuted under these rules. Law enforcement agencies face cybercrime just as
they deal with terrorism. The boundary between crime and terrorism is thin,
and these offenses need an adequate setting.
According to the Federal Bureau of Investigation (FBI), cyberterrorism is
“[any] premeditated, politically motivated attack against information, computer systems or computer programs, and data which results in violence
against noncombatant targets by sub-national groups or clandestine agents.”
The North Atlantic Treaty Organization (NATO) characterizes it as “a
cyberattack using or exploiting computer or communication networks to
cause sufficient destruction or disruption to generate fear or to intimidate a
society into an ideological goal.”8
We can choose a very narrow definition of cyberterrorism, relating to
deployment by known terrorist organizations of disruption attacks against
information systems for the primary purpose of creating alarm, panic, or
physical disruption, or a broader definition, which includes cybercrime.
Matusitz9 provides a broader definition of cyberterrorism, which includes
the intentional use of computers, networks, and public Internet to cause
destruction and harm for personal objectives.
Participating in a cyberattack affects the terror threat perception, even if it
is not done with a violent approach.10 By some definitions, it might be
difficult to distinguish which instances of online activities are cyberterrorism
or cybercrime.11 Cyberterrorism may overlap considerably with cybercrime,
cyberwar, or ordinary terrorism. However, when it is done for economic
motivations rather than ideological, it is typically regarded as cybercrime.12
Some scholars have deepened these ties. Erbschloe13 explores the connections
of information warfare between economy and national defense. Conway14
wonders whether terrorist groups who operate in cyberspace are “cyberterrorists.” She concludes that the answer hinges on what constitutes cyberterrorism, considering that terrorism is a notoriously difficult concept to define.
What is the difference between terrorism and common crime? This distinction is crucial to determine under what rules fall the perpetrators of
cyberattacks.
The first distinctive character of terrorism is the instillation of fear.
The second distinctive sign is the use of violence or the threat of violence.
There can be no terrorism without the use of force, but violence is also one of
the general characteristics of criminal acts. The third distinctive sign of
terrorism is the political motivation or political purpose. An action that
instills terror cannot automatically be regarded as terrorism. Without
174
M. MARSILI
political motivation or political purpose, a cyberattack cannot be considered
a terrorist attack but must be characterized as a common crime.
Klabbers believes that the terrorist is usually “politically inspired” and has
an interest in being seen so, whereas for the state it is tempting to treat him
as a common criminal.15 Morgan thinks that terrorism is both crime and
politics and is culpable on both accounts,16 while Khan argues that the
political dimension of terrorism differentiates it from other crimes.17
Hoffman affirms that terrorism is just a form of crime,18 and Schmid simply
suggests treating acts of terrorism as “peacetime equivalents of war crimes.”19
Klaber infers that due to the problem of containing terrorism within regular
categories of criminal law, a way to treat terrorists is to consider them simply
as common criminals.20 He gathers that even though international law has
great difficulty in deciding whether terrorists should be treated as ordinary
criminals or as political actors, the limit for governments that may lawfully
characterize them as criminals is extremely flexible. Pictet concludes that
governments tend to consider non-state actors as common criminals21 just
not to apply the provisions of Article 3 of the Geneva Conventions of 1949.22
Meisels believes that whereas irregular combatants, such as terrorists or
insurgents, are not entitled to the protection accorded by the law of war, they
do not enjoy the rights granted to criminals in civil law due to their hybrid
identity.23 She considers that the combatant-civilian hybrid identity does not
constitute a prosecutable offense in itself, but that specific acts of war can be
deemed war crimes, perhaps as terrorism.24 Meisels points out that international law and practice leave irregular combatants unprotected, even if their
unlawful identity is not in itself a criminal offense.25 Brants concludes that
criminal categories are better to be applied to individuals, rather than to
groups.26
The term “terrorism” is still ambiguous and undefined due to the contradictory ideologies of the states.27 Bassiouni28 briefly concludes that “‘[t]
errorism’ has never been defined.” Rosalyn Higgins, former judge at the
International Court of Justice, considers that “[t]errorism is a term without
legal significance.”29 She deduces that “it is merely a convenient way of
alluding to activities, whether of states or of individuals, widely disapproved
of and in which either the methods used are unlawful, or the target protected
or both.”30 Klabbers argues that the language of terrorism in necessary to
justify a large-scale response.31 Saul thinks that criminalizing terrorism is
only a small part of the overall international response.32
Grove33 acknowledges that responding to cyberdefense raises legal questions. He concludes that international customary law is not yet fully formed
on this issue, but the UN Charter and the laws of armed conflict establish
certain baseline rules.
DEMOCRACY AND SECURITY
175
In my opinion the problem lies in international customary law. I think that
the customary law that is being formed recently is contrary to the principles
established by international humanitarian law, which is binding for all states.
Approaching Cyberterrorism
Many authors have documented that cyberterrorism is a real threat that must
be seriously addressed. Valeri and Knights34 stress the ties between terrorism
and information warfare, which target elements of the critical national
information infrastructure. Shimeall35 argues that defense planning has to
incorporate the virtual world to limit physical damage in the real. Brickey36
and Heffelfinger37 provide us with evidence of acts of jihadist cyberterrorism
carried out between 2008 and 2012, and they acknowledge the risks posed by
Islamist hacking activity.
Yet in 2001, Arquilla and Rondfeldt, in their seminal work Networks and
Netwars, include the term “netwar” in a list of “trendy synonyms.”38 At a first
stage, scholars took into account propaganda and online recruitment through
social media, even if they considered it a serious threat. In Terrorism in
Cyberspace, Gabriel Weimann states that the War on Terror (WoT) has not
been won, as it continues on in the cyberdomain.39 Weimann emphasizes the
use of the Web and social media for propaganda and recruitment purposes.
Blunt’s approach to the issue is different and more complete. In his
seminal work, the specialist writer and researcher on Islam, Muslims, and
cyberspace encompasses the hacking and cracking (infiltration and sabotage,
respectively) of “enemy” computer systems, which can result in “e-mail
overload, system failure, the defacement of web content, database acquisition
and dysfunctional and crashed sites”40 According to Blunt, cyberterrorism is
a real threat to US security and should be addressed seriously.41
Awan and Blakemore approach cyberterrorism in a multidisciplinary and
comprehensive way, encompassing criminology, security studies, social policy, and Internet law. In Policing Cyber Hate, Cyber Threats, and Cyber
Terrorism, the authors deal with cybercrime, terrorism, policing cyberspace,
cyber hate, and government strategies.42 This book provides a comprehensive
understanding of the range of activities that can be defined as cyber threats,
from cybercrimes to online terrorism. The editors stress the importance of
countering the cyber threat, which presents a clear and present danger.
Holt, Burruss, and Bossler analyze the responses of US law enforcement
agencies at all levels in dealing with cybercrime and cyberterror.43 The
findings demonstrate the realities of policing cybercrimes and those involving digital evidence processing relative to traditional offenses. Policing
Cybercrime and Cyberterror suggests policy changes needed to increase the
investigative response of police agencies.
176
M. MARSILI
Jarvis, MacDonald, and Chen offer a holistic approach to cyberterrorism,
including law, politics, technology, and beyond.44 Their book Terrorism
Online uses a multidisciplinary framework to provide a broader analysis of
the topic, and it explores different forms of terrorism, including hacktivists
and state-based terrorism. The discussion on the role of NATO is especially
mentionable in this context.45
In 2008 NATO opened a Cooperative Cyber Defence Centre of Excellence
(CCDCOE) in Tallinn,46 the capital of Estonia, which had joined the Alliance
four years before. In April 2007 the Baltic state was targeted by a massive
cyberattack that ultimately rendered the country offline and shut out from
services dependent on Internet. Hower and Uradnik47 argue that the dependence on information technology makes countries vulnerable to cyberattacks
and terrorism.
The Tallinn Manual,48 which links his conception to Estonian events,
addresses the issue of the international law applicable to cyberwarfare. The
manual, prepared by the International Group of Experts at the Invitation of
the CCDCOE and published in 2013, focuses on actions that qualify as selfdefense and those taking place during armed conflict. Therefore, the first
edition of the manual addresses topics including sovereignty, state responsibility, the jus ad bellum, international humanitarian law (IHL), and the law of
neutrality. An extensive commentary accompanies each rule, which sets forth
the rule’s basis in treaty and customary law, explains how the group of
experts interpreted applicable norms in the cyber context, and outlines any
disagreements within the group as to each rule’s application. The revised
version of the manual released in 2017 focuses on the analysis of how existing
international law applies to cyberspace.49 The Tallin Manual 2.0 expands its
coverage of the international law governing cyber operations to peacetime
legal regimes. The Tallin Manual reflects, on the one hand, the difficulty of
legally framing the fight against cyberattacks and, on the other, the thin
border between criminal attack and political act, whether it is conducted by
and directed against states or by non-state organizations.
The United States, which is the main partner of NATO, has perceived the
dangers of cyberthreats and has put in place a strategy to counter them. The
Presidential Policy Directive 20 (PPD-20), signed by President Barack Obama
in October 2012, provides a framework for US cybersecurity by establishing
principles and processes.50 The top-secret PPD-20 directive steps up offensive cyber capabilities to “advance US objectives around the world.”
Executive Order 13800 on Strengthening the Cybersecurity of Federal
Networks and Critical Infrastructure issued on May 11, 2017 by President
Donald J. Trump (the cybersecurity EO), recognizes the urgency of cyber
policy challenges and disposes to reinforce the integration between executive
departments and federal agencies.51 Pursuant to the cybersecurity EO, the US
Department of State drafted two documents: Recommendations to the
DEMOCRACY AND SECURITY
177
President on Protecting American Cyber Interests through International
Engagement52 and Recommendations to the President on Deterring
Adversaries and Better Protecting the American People from Cyber Threats.53
In the above-mentioned documents published on May 31, 2018, the
Department of State, acknowledging that cyberthreats must be addressed as
both domestic and foreign policy priorities, calls to strengthen international
cooperation in cyberspace, including cyber intelligence and military cyber
cooperation. Both state actors and non-state actors, including criminals and
terrorists, possess cyber capabilities that can be used to carry out malicious
acts in peacetime, in periods of increasing international tensions, in crisis
situations, and during armed conflicts.54
The State Department considers continued cyberattacks as use of force
against the United States, its partners, and allies.55 The choice among the
wide variety of cyber and non-cyber options for deterring and responding to
cyber activities that constitute a use of force lies in the hands of the
president.56 These options include the use of force provided by the
Authorization for Use of Military Force against Terrorists (AUMF),57 whose
application has led to gross and continued violations of IHL sanctioned also
by the US Supreme Court.
The cyberpolicy designed by the Office of the Coordinator for Cyber
Issues includes the promotion of international commitments regarding
what constitutes acceptable and unacceptable state behavior in cyberspace
from all states and how international law applies to cyberspace. Therefore,
the Department of State recognizes the need for an international legal framework on cyberdefense, whether the attacks come from state or non-state
actors, especially regarding the use of force.
Cybersecurity is managed primarily by the Department of Homeland
Security (DHS), through federal agencies such as the Federal Emergency
Management Agency (FEMA); the US Department of Justice, through federal
agencies such as the FBI; and the Central Intelligence Agency (CIA), part of
the broader US Intelligence Community (IC), a federation of 16 separate
agencies that work separately and together to conduct intelligence activities
to support the foreign policy and national security of the nation. Member
organizations of the IC include intelligence agencies, military intelligence,
and civilian intelligence and analysis offices within federal executive departments. The IC is overseen by the Office of the Director of National
Intelligence (ODNI), which itself is headed by the Director of National
Intelligence (DNI), who reports to the president of the United States.
Cyberdefense and counter-cyberterrorism activities are carried out by the
US armed forces. The purpose of the DoD cyberstrategy is to guide the
development of DoD’s cyber forces and strengthen the cyberdefense and
cyber deterrence posture.58 In July 2016 the US Cyber Command launched
the Joint Task Force Ares (JTF-Ares), a unity of command and effort created
178
M. MARSILI
to coordinate cyberspace operations against the Islamic State with the Global
Coalition against Daesh and with US Central Command (CENTCOM),
which is leading the military fight and working to sharpen offensive operations against ISIS in Iraq and Syria.59 Due to the expansion of the cyber
operation of ISIS and other terrorist networks, the JTF-Ares is expected to go
global in the future. In response to the changing face of warfare, in May 2018
the US Cyber Command (USCYBERCOM) was elevated to the 10th
Department of Defense unified combatant command (COCOM).60 In addition to USCYBERCOM, the DoD has a number of cyber centers: Army
Cyber Command (ARCYBER); US Fleet Cyber Command (FCC)/US 10th
Fleet (C10F); Air Forces Cyber (AFCYBER)/24th Air Force; US Marine
Corps Forces Cyberspace Command (MARFORCYBER); US Coast Guard
Office of Cyberspace Forces (CG-791); National Guard Cyber Units. The
multiplication of cybercommands, one for each armed force, can be an
overlapping and a waste of resources; it would be better to concentrate
cyber capabilities in a single inter-force structure, regardless of the coordination exercised by the IC.
The US and NATO at War with Cyberterrorism
NATO and its allies, primarily the US, are defining a new defense doctrine
on cyberwarfare. The Alliance acknowledges that “[t]hreats can come from
state and non-state actors, including terrorism and other asymmetrical
threats, cyberattacks and hybrid warfare, where the lines between conventional and unconventional forms of conflict become blurred.”61 At the
NATO Summit held in Lisbon in November 2010, the North Atlantic
Alliance claimed that terrorism poses a direct threat to security and international stability.62 At the 2014 NATO Summit in Wales, allies recognized that
international law applies in cyberspace, and that the impact of cyberattacks
could be as harmful as a conventional attack. As a result, cyberdefense was
recognized as part of NATO’s core task of collective defense.63 At the
Warsaw Summit in 2016, allies took further action to recognize cyberspace
as a domain of operations, just like air, land, and sea.64 Cyberattacks are
deemed to be a threat to national security and “vital interests” to be tackled
with international partnership capacity in cybersecurity and cyberdefense.65
Article 5 of the North Atlantic Treaty, requiring partners to come to the
aid of any member state subject to an armed attack, was invoked for the first
and only time after the September 11 attacks at the request of the US, which
gave rise to the intervention in Afghanistan.66 Article 4, which merely
invokes consultation among NATO members, has been invoked by Turkey
in 2012 over the Syrian civil war, and in 2015 after threats by the Islamic
State to the Turkish territorial integrity.67 Both articles have been invoked in
connection with hybrid conflicts,68 which involve state and non-state
DEMOCRACY AND SECURITY
179
actors.69 NATO is evolving in response to new strategic reality,70 and terrorism is among the most pressing challenges the Alliance faces.
It is not just a question of resilience. While the US adapts to the challenges
of cyberspace, this, by definition, requires international rules. So far, attempts
to reach an agreement on which law to apply in cyberspace have failed. The
US complains that the 2016–17 UN Group of Governmental Experts (GGEs)
on Developments in the Field of Information and Telecommunications in the
Context of International Security failed to reach a consensus on cyberspace
measures, including the jus ad bellum, IHL, and the law of state
responsibility.71 The right to make war (jus ad bellum) is recognized only
for states, and the right to kill (jus in bello) is recognized only for the military.
When the GGEs examined for the first time the issue of information
security in 2004/2005, the 15 members were not able to reach consensus
on state exploitation of these activities for military and national security
purposes.72 The third GGEs (2012/2013) concludes that international law,
in particular the UN Chart, applies to cyber-sphere, and that human rights
and fundamental freedoms must be respected in addressing information
security.73 The group agrees that states must not use proxies to commit
internationally unlawful acts and must ensure that their territories are not
used by non-state actors to commit such acts.
Instruments on Cybercrime and Cyberterrorism
The first attempt to adopt a convention on terrorism was made in 1937
when, following the assassination of King Alexander of Yugoslavia and
French Prime Minister Louis Barthou, the League of Nations (LN) prepared
a draft Convention for the Prevention and Punishment of Terrorism and a
draft plan for an International Criminal Court (neither of which ever entered
into force). 74 Since 1963, the international society has elaborated many
conventions for the prevention and suppression of international
terrorism,75 as well as a number of regional ones. So far, only a few regional
anti-terrorism instruments consider cyberattacks to be acts of terrorism.
Article 1 of the Treaty on Cooperation among the State Members of the
Commonwealth of Independent States in Combating Terrorism of 1999
includes cyberterrorism among acts of “technological terrorism.” Section III
(14) of the Concept of Cooperation between Member States of the Shanghai
Cooperation Organization in Combating Terrorism, Separatism, and
Extremism of 2005 adds cyberterrorism among the fundamental avenues of
cooperation between member states. The Model Anti-Terrorism Law
endorsed by the African Union (AU) in 2011 broadens the definition of
terrorist act by including computer crimes. In 2007, the Inter-American
Committee against Terrorism (CICTE) of the Organization of American
States (OAS) expressed the commitment to identify and fight cybercrime as
180
M. MARSILI
an emerging terrorist threat.76 In 2016, the Organization of Islamic
Conference (OIC) has considered adding an additional protocol on cyberspace terrorism to the Convention on Combatting International Terrorism of
1999.77 So far, cyberterrorism is not mentioned in any Islamic CT convention, while jihadist terrorism remains the main transnational threat.
The Council of Europe (CoE) adopted two (inter-)regional instruments on
cybercrime but failed to include cyberterrorism. Therefore, both the
Convention on Cybercrime of 200178 and the Additional Protocol
Concerning the Criminalisation of Acts of a Racist and Xenophobic Nature
Committed through Computer Systems of 200379 do not include cyberterrorism among proscribed acts.
The 2001 Convention on Cybercrime is the first international instrument
on crimes committed via the Internet and other computer networks, dealing
particularly with violations of network security. It has been ratified by 30
European countries and the US. The preamble of the Convention states that
its main purpose is to establish a common criminal policy aimed at the
protection of society against cybercrime. The 2013 EU Directive on attacks
against information systems80 does not go beyond the 2001 CoE Convention.
Further regional instruments on cybercrime have been inspired by the latter.
Several regional, (inter-)regional, and subregional organizations have
adopted instruments for combating cybercrime: the Models for Cyber
Legislation in ESCWA Member Countries (EMCs) endorsed by the UN
Economic and Social Commission for Western Asia in 2007; the League of
Arab States Convention on Combating Information Technology Offences of
2010; the ECOWAS Directive on Fighting Cyber Crime of 2011; the
Common Market for Eastern and Southern Africa (COMESA)
Cybersecurity Model Bill of 2011; the Electronic Crimes Bill developed by
the Organization of Eastern Caribbean States (OECS) in 2011; the Model Law
on computer crime and cybercrime adopted by the Southern African
Development Community (SADC) in 2012; the Model Law on Cybercrime/
e-Crimes, finalized in 2012 under the EU co-funded project HIPCAR
(Harmonization of ICT Policies, Legislation, and Regulatory Procedures in
the Caribbean); the Commonwealth Model Law on Computer and
Computer-related Crime of 2014; and the Convention on Cyber Security
and Personal Data Protection (AUCC) adopted by the AU in 2014.
In 2010, several UN member states called for an International Convention
on Cybercrime.81 The Commission on Crime Prevention and Criminal
Justice (CCPCJ) reiterated the need to combat cybercrime.82 In 2015, the
thirteenth UN Congress on Crime Prevention and Criminal Justice debated
whether or not a new cybercrime convention should be considered. The
Congress addressed cybercrime jointly with terrorism, without making a
distinction and without considering them as a unicum.83 Although violence
is necessary to characterize both crime acts and terrorist acts, it is not
DEMOCRACY AND SECURITY
181
sufficient to characterize the latter. The question arises of whether cybercrime is an autonomous and distinct offense from cyberterrorism. This raises
the question of which means to employ and which laws apply to the war on
cyberterrorism.
The War on Terror and International Law
Cyberattacks take place in cyberspace, which has become a virtual battlefield.
Cyberdomain goes far beyond the boundaries of a traditional conflict.
Therefore, the question arises whether international law, particularly IHL,
apply to cyberwarfare against transnational non-state entities, such as terrorist groups and terrorist organizations.
As for international law, the sources of IHL are treaties and customary
international law, which consists of rules that come from “a general practice
accepted as law” and that exist independent of treaty law. Part of these norms
are recognized as a fundamental principle of international law from which no
derogation is permitted (jus cogens).
Among the treaties that constitute the IHL, an important role is played by
the Geneva Conventions of 1949 and their Additional Protocols. The four
Geneva Conventions are a set of rules that apply only in times of armed
conflict (jus in bello) and that seek to protect people who are not or who are
no longer taking part in hostilities. The whole set is referred to as the Geneva
Conventions of 1949 or simply the Geneva Conventions.84
The 1949 Conventions have been modified with three amendment protocols: Protocol I (1977) relating to the Protection of Victims of International
Armed Conflicts; Protocol II (1977) relating to the Protection of Victims of
Non-International Armed Conflicts; and Protocol III (2005) relating to the
Adoption of an Additional Distinctive Emblem.
The Geneva Conventions apply at times of war and armed conflict to
governments who have ratified them. The Conventions apply to a signatory
nation even if the opposing nation is not a signatory, but only if the opposing
nation accepts and applies the provisions of the Conventions.85 When the
criteria of international conflict have been met, the full protections of the
Geneva Conventions are considered to apply.
Common Article 3 relating to non-international armed conflicts states that
the certain minimum rules of war apply to armed conflicts that are not of an
international character but that are contained within the boundaries of a
single country. This article refers to the territory of one of the High
Contracting Parties. The applicability of this article rests on the interpretation of the term “armed conflict.”86 For example, it would apply to conflicts
between the government and rebel forces, or between two rebel forces, or to
other conflicts that have all the characteristics of war but that are carried out
within the confines of a single country. A handful of individuals attacking a
182
M. MARSILI
police station would not be considered an armed conflict subject to this
article, but subject only to the laws of the country in question.87 The same
should be said of criminals who commit a cyberattack.
It was said that Article 3 would cover in advance all forms of insurrection,
rebellion, anarchy, and the break-up of states, and even plain brigandage and
banditry, giving to a handful of rebels or common brigands the status of
belligerents, and possibly even a certain degree of legal recognition.88 There
is also a risk that common or ordinary criminals give themselves an appearance of organization as an opportunity for requesting application of the
Geneva Conventions, representing their crimes as “acts of war” in order to
escape punishment for them.89
Sometimes insurgents are mere bandits, even if not all insurgents are
bandits. Sometimes it happens in a civil war that the rebels are true patriots
fighting for the independence of their country, and they should be considered genuine soldiers, not terrorists.90 Ruling in favor of the Kurdish people
and organizations alleged to support the Kurdistan Workers’ Party (PKK), a
left-wing organization labeled as terrorist by Turkey and Western governments, a Belgian criminal court underlined the fact that PKK undersigned the
Protocols Additional to the Geneva Conventions and other international
agreements and is not employing child soldiers.91
The other Geneva Conventions are not applicable in non-international
armed conflicts, but only the provisions contained within Article 3, and
additionally within the language of Protocol II. The rationale for the limitation is to avoid conflict with the rights of sovereign states that were not part
of the treaties. When the provisions of this article apply, it states that persons
taking no active part in the hostilities, including members of armed forces
who have laid down their arms and those placed out of action (hors de
combat) by sickness, wounds, detention, or any other cause, shall in all
circumstances be treated humanely.
For this purpose, Article 3(1) of Convention (IV) prohibits the following
acts with respect to the people mentioned above: violence to life and person,
in particular murder of all kinds, mutilation, cruel treatment, and torture;
taking of hostages; outrages upon dignity, in particular humiliating and
degrading treatment; and the passing of sentences and the carrying out of
executions without previous judgment pronounced by a regularly constituted
court, affording all the judicial guarantees that are recognized as indispensable by civilized peoples. Article 3(2) provides that the wounded and sick are
collected and cared for.
Although at the time of the drafting of the Geneva Conventions it was
thought that Common Article 3 could serve as a wildcard for all those
situations of hybrid conflict, recent conflicts demonstrate that, as interpreted
and applied, it is unsuitable to present challenges; cyberwarfare is more than
a hybrid conflict—it is an asymmetrical threat.
DEMOCRACY AND SECURITY
183
Article 1(4) of the Additional Protocol I, by extending the scope of Article
3, includes the so-called wars of national liberation, deeming them to be
international in nature. Article 1 of Additional Protocol II provides for its
scope of application “dissident armed forces or other organized armed
groups which, under responsible command, exercise such control over a
part of its territory.”92 Additional Protocol II applies only to traditional
interstate conflict, which requires control over territory by organized armed
groups.93 In the Milošević case, the International Criminal Tribunal for the
former Yugoslavia (ICTY) ruled that control over territory by insurgents was
not a requirement for the existence of a non-international armed conflict.94
Carrying out cyberattacks does not require control of a territory, but only a
computer.
The 1977 Protocols additional to the Geneva Conventions combine and
update elements of the Hague law95 and Geneva law, and they were issued in
response to non-international armed conflicts and wars of national liberation
that arose in the two decades following the adoption of the Geneva
Conventions.
Along with the Geneva Conventions, the Hague Conventions were among
the first formal statements of the laws of war and war crimes in the body of
secular international law. The Geneva Conventions define the basic rights of
wartime prisoners (civilians and military personnel), establish protections for
the wounded and sick and for the civilians in and around a war zone, and
define the rights and protections afforded to noncombatants. The Hague
Conventions, adopted at the First Hague Conference of 189996 and at
the Second Hague Conference of 1907,97 regulate the use of weapons of
war, along with the biochemical warfare Geneva Protocol.98 Cyberweapons
are not proscribed by the Hague Conventions; therefore, a cyberattack should
be considered lawful.
Even if after 1977 the Geneva Conventions offer two separate regimes for
non-international armed conflict—one covered by Common Article 3 with
low threshold, and another falling within the scope of Additional Protocol II,
whose threshold of application is high—in both cases it falls within the
concept of armed conflict as defined, that is, not an incident or an occasional
and low-intensity clash and involving military organizations.99 The Tadić
decision by the ICTY100 is widely relied on as authoritative for the meaning
of armed conflict in both international and non-international armed
conflicts.101
The UN special rapporteur on the promotion and protection of human
rights and fundamental freedoms while countering terrorism, Ben
Emmerson, wonders whether IHL applies in transnational armed conflict
against non-state groups.102 He asks whether there can exist a noninternational armed conflict that has no finite territorial boundaries with a
non-state armed group operating transnationally.103 Emmerson wonders
184
M. MARSILI
when attacks caused by transnational, non-state organizations and by their
affiliates satisfy the criteria to qualify as an armed conflict under IHL.104
The question arises whether a cyberattack committed by a transnational
terrorist organization should be considered international or noninternational conflict. Cyberwarfare, which takes place in cyberspace, is by
definition an international conflict that goes far beyond any physical boundary. Article 3 applies only to conflicts of non-international character. The
only alternative to Article 3 is Article 2, but this applies only to international
conflicts between signatory states. Pretending to consider the cyberspace
domain as a traditional domain and claiming to apply IHL for the sole
purpose of lawfully using armed forces in contrast to cyberterrorism is a
stretch.
Cyberprisoners of War
The law of war divides persons in the midst of an armed conflict into two
broad categories: combatants and civilians.105 This fundamental distinction
determines the legal status of persons participating in or affected by combat
and determines the legal protections afforded to such persons, as well as the
legal consequences of their conduct. Combatants are those persons who are
authorized by international law to fight in accordance with the law of war on
behalf of a party to the conflict.106 Civilians are not authorized to fight, but
they are protected from deliberate targeting by combatants as long as they do
not take up arms.107 In order to protect civilians, the law of war requires
combatants to conduct military operations in a manner designed to minimize
civilian casualties and to limit the amount of damage and suffering to that
which can be justified by military necessity.108
An enemy caught in the context of the war on cyberterrorism is not a
virtual prisoner but a real one. If civilians participate in hostilities, they are
not privileged under the law of war and may be prosecuted for it. At the same
time, they do not incur the full liabilities attendant to “combatants status”
(e.g., they do not enjoy the status of prisoners of war if captured) and can be
targetable. Unless civilians adopt a continuous combat function, they cannot
be targeted except for the periods they do participate in hostilities. And then
there is the case of civilians participating in hostilities without taking up
arms, but with a supporting role. Therefore, how to treat civilians carrying
out cyberattacks? We are not talking about non-regular fighters carrying
arms, but about civilians engaged in cyberwarfare.
Walzer109 and Fletcher110 agree that irregulars in civilian clothes do not
meet the rules of war and hence are not eligible for protection. In analyzing
guerrilla warfare, Walzer infers that insurgents, dressed in civilian clothes,
morally defy the most fundamental rules of war by not wearing a uniform
that distinguishes them from regular soldiers.111 Saul suggests that a narrow
DEMOCRACY AND SECURITY
185
class of terrorist acts may be excused by individual or group defenses and
considered to be “collective defense of human rights.”112 Cullen concludes
that, before World War II, three types of actors were identifiable in noninternational conflicts113: rebels, insurgents, and belligerents. The last two are
both armed fighters, but only belligerents have a privileged combatant status
under IHL.114
The question is if the provisions of the Geneva Conventions apply to all
combatants. Gill and van Sliedregt argue that the war on terror, “whatever
else it is…is not a international armed conflict in a legal sense.”115 The Dutch
scholars acknowledge that the military operations against the Taliban and alQaeda in Afghanistan do qualify as international armed conflict to which the
laws and customs of war, including the notion of combatant status, must be
applied.116
The Bush administration had contended that the laws and customs of war
did not apply to the US armed conflict with al-Qaeda fighters during the
2001 US invasion of Taliban-controlled Afghanistan. In Hamdan v.
Rumsfeld117 the US Supreme Court (SCOTUS) ruled that Common Article
3 does apply in such a situation, which requires fair trials for prisoners.118
The SCOTUS stated that the Third Geneva Convention and Article 3 of the
Fourth Geneva Convention (requiring humane treatment) apply to all detainees in the WoT. Common Article 3 applies in “wars not of an international
character” (i.e., civil wars), in a signatory to the Geneva Conventions, and the
civil war was in signatory Afghanistan.
Meisels thinks that selective application of the rules of war is not a morally
viable option, and that none of the parties can demand their protection
without assuming their burdens.119 Statman writes that conventions require
mutuality, and that groups such as al-Qaeda and Hamas do not abide by
them.120 In the commentary published in 1952, the director for General
Affairs of the International Committee of the Red Cross, Jean S. Pictet,
argues that it would be impossible to constrain provisional governments, or
political parties, or groups not yet in existence, by a convention.121
Nevertheless, as we have seen, not all proscribed organizations, e.g., the
PKK, avoid applying the laws of war. Contrariwise, it might be inferred
that if a “terrorist” group abides by the conventions, these are to be applied
to it. In fact, if we assume as true the claim that if one side violates a
convention, the other side is released from its contractual commitment to
respect it,122 then we should deduce that it is legal for one party to breach a
convention following the same violation by the counterpart. For example, if a
Western government, such as the United States, violates a convention, it is
legitimate for its opponents acting accordingly.
Article 51 of Protocol I requires states to comply anyway with their
obligation to respect civilians, even if these obligations are breached by the
counterpart.123 Someone could say that conventional laws of war are
186
M. MARSILI
updated,124 and this is probably true, but if they are not fulfilled, the
boundary between what is permissible and what is illicit would be entrusted
exclusively to moral evaluations.
In the Commentary to Geneva Convention (IV), Pictet,125 regarding
Article 4, writes:
Every person in enemy hands must have some status under international
law: he is either a prisoner of war and, as such, covered by the Third
Convention, a civilian covered by the Fourth Convention, [or] a member
of the medical personnel of the armed forces who is covered by the First
Convention. There is no intermediate status; nobody in enemy hands can fall
outside the law.
Thus if detainees are not considered prisoners of war, this would still grant
them the rights of the Fourth Geneva Convention, as opposed to the more
common Third Geneva Convention, which deals exclusively with prisoners
of war (POWs).
After the establishment of the Guantánamo Bay detention camp in
January 2002, with the purpose to detain extraordinarily dangerous people,
to interrogate detainees in an optimal setting, and to prosecute detainees for
war crimes,126 in February 2002 the White House determined that Taliban
detainees were covered under the Geneva Conventions, while al-Qaeda
terrorists were not, but that none of the detainees qualified for the POW
status under Article 4 of the Third Geneva Convention.127 The US administration deemed all of the detainees, including individuals who never were
close to a battlefield and who were captured thousands of miles from a battle
zone, to be “unlawful enemy combatants” who may be held indefinitely
without trial, depending on how long America’s war on terrorism lasts.128
These include nationals of countries that are not at war with the United
States.129
It is not clear on which basis al-Qaeda is a belligerent under the law of war,
because it does not qualify and because such a status would imply rights that
the US administration has been unwilling to concede. Another question is
how the United States can apply Article 3, which applies to non-international
conflicts, to “not POWs” who are citizens of a country, Afghanistan, which is
not at war with Washington. This is a contradiction frequently emphasized
in the rulings delivered by US courts.
The US administration argued that the non-application of POW status to
the Taliban is because they do not effectively distinguish themselves from the
civilian population—they do not wear uniforms and insignia, and they do not
carry weapons outside—and do not conduct their operations in accordance
with the laws and customs of war.130 According to the Hague Convention IV
of 1907, in order to be entitled to POW status, fighters must wear “a fixed
distinctive sign visible at a distance” and must “carry their arms openly.”131
Can you imagine a cyberterrorist carrying his laptop “openly”?
DEMOCRACY AND SECURITY
187
Even if President George W. Bush determined that the Afghan Taliban
were not entitled to POW status under Geneva Convention (III), the Taliban
fighters associated with both the Taliban and al-Qaeda are protected under
the Convention on the basis that Afghanistan was a High Contracting Party
to the Convention,132 although then Kabul government (1996–2001) was not
recognized by the US.133 The District Court for the District of Columbia
ruled that the Third Geneva Convention does not permit the determination
of POW status in such a political way, as the Convention is self-executive.134
Article 5 of Geneva Convention (III) entitles individuals detained under
Article 4, including members of militias or volunteer corps and members of
organized resistance movements, to be treated as POWs until a “competent
tribunal” determine their status. In accordance with that provision in 2004
the US administration established the Combatant Status Review Tribunals
(CSRTs), a set of tribunals coordinated through the Office for the
Administrative Review of the Detention of Enemy Combatants.135
In Hamdan v. Rumsfeld the Supreme Court holds that President Bush did
not have authority to set up the war crimes tribunals and finds the special
military commissions illegal under both military justice law and the Geneva
Conventions. Hamdan was not a member of the US military and would be
tried before a military “commission,” not a court-martial, which does not
meet the requirements of Article 21 of the Uniform Code of Military Justice
(UCMJ) or of Article 102 or the Geneva Convention (III), and therefore
violates the laws of war. Hence, the SCOTUS finds that CSRTs do not qualify
as “competent tribunals” under the provision of Article 5 of the Third
Geneva Convention.
Here arises the question whether insurgents could be legally bound by a
convention that they had not themselves signed.136 According to Pictet, if an
insurgent party does not apply Article 3, it will prove that those who regard
its actions as mere acts of anarchy or banditry are right.137
In the light of the intervention of foreign powers, it is hard to claim that
the Syrian conflict, as well as the Afghan insurgency, is a civil war.
Involvement of many national forces in military operations characterize
these conflicts as international conflicts. If the war on (cyber)terrorism is a
global conflict against non-state actors, governments should comply
with IHL.
De jure governments are afraid to increase the authority of rebels by
constituting an implicit recognition of the legal existence and belligerent
status of the party concerned through application of Article 3.138 For this
purpose, Article 3(4) makes absolutely clear that the object of the Geneva
Conventions is purely humanitarian, lacking of effect on the legal status of
the parties to the conflict; it does not confer belligerent status and, consequently, increased authority onto the adverse party.139
188
M. MARSILI
Governments are obliged to apply all the provisions embedded in domestic
and international human law. Failure to apply these provisions should be
considered a grave breach. Klabbers claims that there is no good reason for
refusing to terrorists the protection granted by IHL140; they have the right to
be treated humanely, even if the law does not provide for it in a clear
manner.141
Article 17 of the 1998 International Convention for the Suppression of
Terrorist Bombings provides the application of international law, including
IHL, to terrorists.142 Under Article 19(2) of the Convention, however, the
activities of armed forces during an armed conflict, and the activities undertaken by military forces of a state in the exercise of their official duties, are
not governed by IHL. The notion of “armed forces” appears to include nonstate armed groups that are party to an armed conflict. Klabbers concludes
that the issue of whether IHL applies to terrorism is due to political
ambivalence.143
Lieber believes that captured belligerents must be treated as prisoners of
war.144 Ipsen thinks that the fundamental distinction between lawful and
unlawful combatants is between persons who are entitled to POWs status
and those who are not.145 Thus captured enemies would fail to qualify as
POWs because they fail to meet the legal qualification of lawful belligerent.
Meisels argues that irregular combatants are legitimately considered unlawful, and thus duly denied the rights of regular soldiers, but, once captured and
disarmed, they must enjoy some minimal standard of international humanitarian treatment.146 She assumes that the distinction between lawful and
unlawful combatants lies in the difference between combatants and civilians.147
Nabulsi thinks that, as in the traditional laws of war only professional
soldiers are granted belligerent status, all civilians are considered outlaws.148
She gathers that the law of war drafted in the Hague and in the Geneva
Conventions serves the powerful and the strong.149 Nabulsi refuses the
inflexible distinctions drawn by laws of war between civilians and combatants
and the offshoot distinction between lawful and unlawful combatants.150
According to the American-born scholar, the distinction of combatants
from civilians, and the derivative difference between lawful and unlawful
combatants, are set up in an international legal system to favor states over
irregulars.151 Nabulsi concludes that the distinction between the former and
the latter was never resolved in international law,152 and hence the term
“unlawful combatant” has become controversial, and now problematic.153
If irregular combatants are not protected under the Geneva Convention
(III), as they are not considered members of regular armed forces, then they
should be considered civilians and then protected according to Geneva
Convention (IV) and Additional Protocols I and II. It is left open the
question of when “unlawful enemy combatants” have to be considered
DEMOCRACY AND SECURITY
189
terrorists, and when they rather have to be considered insurgents, rebels, or
irregular opponents, whatever one calls them.
As you can see, applying to terrorism and cyberterrorism, in particular,
international law and IHL, hides many pitfalls. One of these pitfalls, the last
we analyze in this article, is represented by the nature of cyberattacks.
(Cyber)War Is Not an Armed Conflict
Considering that in the fight against terrorism there is no clearly identifiable
enemy, the war on cyberterrorism seems to be a worldwide operation against
hostile governments and hostile nation-state actors (terrorist groups, criminal organizations), rather than a classical defensive or aggressive war against
a country or a coalition of states.
The European Commission for Democracy through Law (the Venice
Commission) established by the Council of Europe finds that “sporadic
bombings and other violent acts which terrorist networks perpetrate in
different places around the globe and the ensuing counter-terrorism measures, even if they are occasionally undertaken by military units, cannot be
said to amount to an ‘armed conflict’ in the sense that they trigger the
applicability of International Humanitarian Law.”154 The Venice
Commission holds that “organized hostilities in Afghanistan before and
after 2001 have been an ‘armed conflict’ which was at first a noninternational armed conflict, and later became an international armed conflict after the involvement of US troops”155—a real war, thus in violation of
international law. The Venice Commission considers that CT measures that
are part of the war on terror are not part of an armed conflict in the sense of
making the regime of IHL applicable to them.156 IHL is an instrument to
define a conflict, and vice versa.
Sir Christopher Greenwood, an English judge at the International Court of
Justice (ICJ), observes that “many isolated incidents, such as border clashes
and naval incidents, are not treated as armed conflicts.”157 Sir Greenwood
infers that “only when fighting reaches a level of intensity which exceeds that
of such isolated clashes will it be treated as an armed conflict to which the
rules of international humanitarian law apply.”158
The Use of Force Committee established by the International Law
Association (ILA) finds that the term “war,” while still used, has, in general,
been replaced in international law by the broader concept of armed
conflict,159 which, lacking a multilateral treaty that provides a generally
applicable definition, remains unclear and subject to customary international
law and subsidiary sources. For governments is open the road to free will.
In international law the term “war” seems to have no longer the same
significance it used to have: “a contention between two or more [s]tates
through their armed forces, for the purpose of overpowering each other
190
M. MARSILI
and imposing such conditions of peace as the victor pleases.”160 The Use of
Force Committee report concludes that “the concept of armed conflict has
largely replaced the concept of war” and that “earlier practice of states
creating a de jure state of war by a declaration is no longer recognized in
international law.”161 This practice has significant wide-ranging implications
for the discipline of international law such as treaty obligations.162
The ILA Committee considers that defining an armed conflict as fighting
between organized armed groups renders the concept applicable both to
sovereign states and non-state actors engaged in fighting of some intensity,
not just in declared wars.163 This is not a situation where governments
simply declare their policy preferences.164
The Final Report on the Meaning of Armed Conflict in International Law
was motivated by the United States’ position following the 9/11 attacks,
claiming the right to exercise belligerent privileges applicable only during
armed conflict anywhere in the world where members of terrorist groups are
found. The US position was contrary to a trend by states attempting to avoid
acknowledging involvement in wars or armed conflicts.165
The report led to the conclusion that the provisions of the Geneva
Conventions apply to any conflict, even if it is not declared or formally
termed as a war. Thus armed groups, including Islamic organizations, are
to be considered combatants to all effects, and the IHL should apply to
them. The US government, by creating a new military, political, and legal
language, in order to support the use of tools and typical methods of
conventional warfare in unconventional conflicts, finds itself in a state of
unlawfulness.
Common Article 3, which applies in non-international armed conflicts,
provides criteria to distinguish it from lesser forms of violence.166 The
intensity of the conflict167 and the organization of the parties are the sole
criteria to distinguish an armed conflict from “banditry, unorganized and
short-lived insurrections, or terrorist activities.”168 These criteria seem to be
widely accepted in international jurisprudence (see the International
Criminal Tribunal for Rwanda169 and the International Criminal Tribunal
for the former Yugoslavia).170 An exception is the Mucić case, in which the
ICTY ruled that “the existence of armed force between states is sufficient of
itself.”171
In a cyber conflict there would be no casualties, nor would it be possible to
ascertain any war crimes or crimes against humanity. And, to make a
paradox, how to consider young hackers, when recruitment of children is
prohibited under international law?172 All these issues demonstrate the
inadequacy of the current rules and the inability to apply them to asymmetrical threats and hybrid conflicts.
DEMOCRACY AND SECURITY
191
Conclusions and Recommendations
In this article, we have assessed whether human rights law and the law of war,
which are a branch of international law, apply to the war on cyberterrorism.
The threat to security is not enough to characterize an action as an act of
terrorism. If we compare cyberterrorism to cyberwarfare, or to a form of
conventional conflict, it should be noted that cyberterrorism or cyberwarfare cannot be considered a conventional conflict, a war, although the
component of violence is present in both cyberevents. Even considering
cyberwarfare as a traditional armed conflict, we must keep in mind that a
war should have a temporal, physical space: a territory where the clash
occurs and beginning and end of hostilities. The termination of hostilities is
essential for the release of prisoners of war. This is another weak point in
support of cyberwarfare’s equalization of a conventional conflict, as well as
the need to define the theater of operations, which in cyberspace is virtual
and unlimited.
Another critical issue is the difference between cyberattacks carried out
by non-state entities, such as rebel groups or terrorist organizations, and
those sponsored by governments. Therefore, I believe that non-state cyberterrorism should be treated as a form of ordinary crime, applying the tools
already available, while state-sponsored cyberattacks can apply the NATO
doctrine, which equates the cyber domain with the three traditional
domains. This doctrine needs to meet international humanitarian law and
the law of war.
Before identifying the means and strategies to tackle it, we recommend
that the international community defines what cyberterrorism is. This presupposes, upstream, the “impossible mission” to define the mother term
“terrorism.” A definition should be precise and narrow to permit the legitimate prosecution of criminal acts. A legal rule is needed to assess whether a
behavior is lawful or not. IHL can be adapted, in some way, to cyberwarfare
through customary law, but meeting the limit of jus cogens.
ORCID
Marco Marsili
http://orcid.org/0000-0003-1848-9775
Notes
1. Carlos Fernando Diaz-Paniagua, “Negotiating Terrorism: The Negotiation Dynamics
of Four UN Counter-terrorism Treaties, 1997–2005” (PhD dissertation, City
University of New York, 2008), 47.
2. Alex P. Schmid (ed.), The Routledge Handbook of Terrorism Research (London: Taylor
& Francis, 2009), 39. See also Myra Williamson, Terrorism, War and International
192
M. MARSILI
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
Law: The Legality of the Use of Force against Afghanistan in 2001 (Farnham: Ashgate,
2008), 38.
Ben Saul, Defining Terrorism in International Law (Oxford: Oxford University Press,
2006), 11.
Sami Zeidan, “Desperately Seeking Definition: The International Community’s Quest
for Identifying the Specter of Terrorism,” Cornell International Law Journal 36 (2004):
491–92.
Barry Collin, “The Future of Cyberterrorism,” Crime & Justice International Journal,
Vol. 13, no. 2 (March 1997): 15.
US Department of Defense, “The Department of Defense Cyberstrategy,” https://www.
defense.gov/Portals/1/features/2015/0415_cyberstrategy/Final_2015_DoD_CYBER_
STRATEGY_for_web.pdf (accessed July 12, 2017).
Morrie Gasser, Building a Secure Computer System (New York: Van Nostrand
Reinhold, 1988), 3.
Paul Everard, “NATO and Cyber Terrorism,” in Responses to Cyber Terrorism, ed.
Centre of Excellence Defence against Terrorism, Ankara, Turkey, NATO Science for
Peace and Security Series, E: Human and Societal Dynamics, vol. 34 (Washington, DC:
IOS Press, 2008), 119.
Jonathan Matusitz, “Cyberterrorism,” American Foreign Policy Interests 2 (2005):
137–47.
Daphna Canetti, Michael Gross, Israel Waismel-Manor, Asaf Levanon, and Hagit
Cohen, “How Cyberattacks Terrorize: Cortisol and Personal Insecurity Jump in the
Wake of Cyberattacks,” Cyberpsychology, Behavior, and Social Networking 20, no. 2
(2017): 72–77.
Sara Hower and Kathleen Uradnik, Cyberterrorism, 1st ed. (Santa Barbara, CA:
Greenwood, 2011), 140–49.
Kelly A. Gable, “Cyber-Apocalypse Now: Securing the Internet against Cyberterrorism
and Using Universal Jurisdiction as a Deterrent,” Vanderbilt Journal of Transnational
Law 43, no. 1 (2010).
Michael Erbschloe, Information Warfare: How to Survive Cyber Attacks (New York:
Osborne/McGraw-Hill, 2001).
Maura Conway, “What Is Cyberterrorism?,” Current History 101, no. 659 (2002):
436–42.
Jan Klabbers, “Rebel with a Cause? Terrorists and Humanitarian Law,” European
Journal of International Law 14, no. 2 (2003): 299–312, 310, https://doi.org/10.1093/
ejil/14.2.299.
Ed Morgan, “International Law’s Literature of Terror,” Canadian Journal of Law &
Jurisprudence 15 (2002): 217–324, 324, https://doi.org/10.1017/S0841820900003647.
Ali Khan, “A Legal Theory of International Terrorism,” Connecticut Law Review 19,
no. 945 (1987): 495.
Bruce Hoffman, Inside Terrorism, 2nd ed. (New York: Columbia University Press,
2006), 41.
Alex P. Schmid, “Terrorism: The Definitional Problem,” Case Western Reserve Journal
of International Law 36, no. 2 (2004): 375–419, 391.
Jan Klabbers, Rebel with a Cause? Terrorists and Humanitarian Law, 301.
Jean S. Pictet, Geneva Conventions of 12 August 1949: Commentary. Volume I: For the
Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field
(Geneva: International Committee of the Red Cross, 1952), 39.
Ibid., 50, 52.
DEMOCRACY AND SECURITY
193
23. Tamar Meisels, “Combatants—Lawful and Unlawful,” Law and Philosophy 26, no. 1
(2007): 31–65, 33, https://doi.org/10.1007/s10982-005-5917-2.
24. Ibid., 51.
25. Ibid.
26. Chrisje Brants, “Dealing with the Holocaust and Collaboration: The Dutch Experience
of Criminal Justice and Accountability after World War II,” Crime, Law, & Social
Change 34, no. 3 (2000): 211–36, 211, https://doi.org/10.1023/A:1008358428102.
27. Ministry of Culture and Information of Saudi Arabia (ed.), The Kingdom versus
Terrorism: Stances and Achievements, 1st ed. (Riyadh: Al-Quiman Multimedia,
2010), 20.
28. Mahmoud Cherif Bassiouni, “Terrorism: The Persistent Dilemma of Legitimacy,” Case
Western Reserve Journal of International Law 36, nos. 2–3 (2004): 299–306, 305.
29. Rosalyn Higgins, “The General International Law of Terrorism,” in International Law
and Terrorism, edited by Rosalyn Higgins and Maurice Flory (London: Routledge,
1997), 28.
30. Ibid.
31. Jan Klabbers, Rebel with a Cause? Terrorists and Humanitarian Law, 308.
32. Ben Saul, “Reasons for Defining and Criminalizing ‘Terrorism’ in International Law”
(October 29, 2008), Mexican Yearbook of International Law 6 (2006): 419–60; Sydney
Law School Research Paper no. 08/121, 220–21, https://ssrn.com/abstract=1291567.
33. Gregory D. Grove, “Cyber-attacks and International Law,” Survival 42, no. 3 (2000):
89–103.
34. Lorenzo Valeri and Michael Knights, “Affecting Trust: Terrorism, Internet, and
Offensive Information Warfare,” Terrorism and Political Violence 12, no. 1 (2000):
15–36.
35. Timothy Shimeall, “Countering Cyber War,” NATO Review 49 (2001): 16–18.
36. Jonalan Brickey, “Capturing a Broad Range of Activities in Cyberspace,” CTC Sentinel
5, no. 8 (2012): 4–6.
37. Christopher Heffelfinger, “The Risks Posed by Jihadist Hackers,” CTC Sentinel 6, no. 7
(2013): 1–5.
38. John Arquilla and David Ronfeldt (eds.), Networks and Netwars (Santa Monica, CA:
Rand Corporation, 2001), 5–7.
39. Gabriel Weimann, Terrorism in Cyberspace: The Next Generation (New York:
Columbia University Press, 2015).
40. Gary R. Blunt, Islam in the Digital Age: E-Jihad, Online Fatwas, and Cyber Islamic
Environments (London: Pluto Press, 2003), 47.
41. Ibid., 52–53.
42. Imran Awan and Brian Blakemore, Policing Cyber Hate, Cyber Threats, and Cyber
Terrorism (Farnham: Ashgate, 2012).
43. Thomas J. Holt, George W. Burruss, and Adam M. Bossler, Policing Cybercrime and
Cyberterrorism (Durham, NC: Carolina Academic Press, 2015).
44. Lee Jarvis, Stuart MacDoland, and Thomas M. Chen (eds.), Terrorism Online: Politics,
Law, and Technology (London: Routledge, 2016).
45. Ibid., 166.
46. CCDCOE, “About Us,” https://ccdcoe.org/about-us.html (accessed May 30, 2018).
47. Sara Hower and Kathleen Uradnik, Cyberterrorism, 140–49.
48. Michael N. Schmitt (ed.), Tallinn Manual on the International Law Applicable to Cyber
Warfare (New York: Cambridge University Press, 2013).
49. Michael N. Schmitt (ed.), Tallinn Manual 2.0 on the International Law Applicable to
Cyber Warfare (New York: Cambridge University Press, 2017).
194
M. MARSILI
50. Barack Obama, Presidential Policy Directive 20 (Washington, DC: The White House,
2012).
51. E.O. 13800 § 1(b)(iv).
52. Office of the Coordinator for Cyber Issues, Recommendations to the President on
Protecting American Cyber Interests through International Engagement (Washington,
DC: US State Department, 2018).
53. Office of the Coordinator for Cyber Issues “Recommendations to the President on
Deterring Adversaries and Better Protecting the American People from Cyber
Threats” (Washington, DC: US State Department, 2018).
54. Ibid.
55. Ibid.
56. Ibid.
57. Authorization for Use of Military Force (AUMF), Pub. L. 107–40, 115 Stat. 224 (50 U.
S.C. § 1541).
58. US Department of Defense, The DoD Cyber Strategy (Washington, DC: DoD, 2025).
59. Cheryl Pellerin, “Cybercom: Pace of Cyberattacks Have Consequences for Military,
Nation,” https://www.defense.gov/News/Article/Article/1192583/cybercom-pace-ofcyberattacks-have-consequences-for-military-nation (accessed April 22, 2018).
60. US Cyber Command, “US Cyber Command History,” http://www.cybercom.mil/
About/History (accessed May 22, 2018).
61. NATO, “Resilience and Article 3,” http://www.nato.int/cps/en/natohq/topics_132722.
htm?selectedLocale=en (accessed June 30, 2016).
62. NATO, “Countering Terrorism,” http://www.nato.int/cps/en/natohq/topics_77646.
htm (accessed June 30, 2016).
63. NATO, “NATO Cyber Defence Fact Sheet,” http://www.nato.int/nato_static_fl2014/
assets/pdf/pdf_2017_05/20170515_1705-factsheet-cyber-defence-en.pdf
(accessed
May 25, 2017)
64. Ibid.
65. US Department of Defense, The Department of Defense Cyberstrategy (Washington,
DC: DoD, 2015), https://www.defense.gov/Portals/1/features/2015/0415_cyberstrategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf (accessed July 12, 2017).
66. NATO, “Invocation of Article 5 Confirmed,” http://www.nato.int/docu/update/2001/
1001/e1002a.htm (accessed June 30, 2016).
67. NATO, “The Consultation Process and Article 4,” http://www.nato.int/cps/en/natol
ive/topics_49187.htm (accessed June 30, 2016).
68. For a definition of the term “hybrid conflict,” see Colin S. Gray, Another Bloody
Century: Future Warfare (London: Weidenfeld & Nicolson, 2005).
69. Paul Gilbert, New Terror, New Wars (Edinburgh: Edinburgh University Press, 2003),
7–8.
70. Cheryl Pellerin, “Mattis: NATO Is Evolving in Response to New Strategic Reality,”
DoD News, Defense Media Activity, February 16, 2017, https://www.defense.gov/
News/Article/Article/1085796/mattis-nato-is-evolving-in-response-to-new-strategicreality (accessed February 17, 2017).
71. Michele G. Markoff, “Explanation of Position at the Conclusion of the 2016–2017 UN
Group of Governmental Experts (GGE) on Developments in the Field of Information
and Telecommunications in the Context of International Security,” https://www.state.
gov/s/cyberissues/releasesandremarks/272175.htm (accessed June 27, 2017).
72. Report of the Secretary-general, “Developments in the Field of Information and
Telecommunications in the Context of International Security” (UN Doc. A/60/202,
UN, New York, NY, 2005). See also United Nations Office for Disarmament Affairs
DEMOCRACY AND SECURITY
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
195
(UNODA) “Fact Sheet July 2015,” https://s3.amazonaws.com/unoda-web/wp-content
/uploads/2017/04/Information-Security-Fact-Sheet-Apr2017.pdf (accessed June 27,
2017).
Group of Governmental Experts on Developments in the Field of Information and
Telecommunications in the Context of International Security (Report A/68/98, UN,
New York, NY, 2013).
Convention for the Prevention and Punishment of Terrorism, done at Geneva on
November 16, 1937, League of the Nations Official Journal, January 1938, Serie 1937,
vol. 10, no. C.546.M.383.1937.V, p. 22.
UN Web Services Section, Department of Public Information, “United Nations Action
to Counter Terrorism,” http://www.un.org/en/terrorism (accessed April 11, 2016).
Declaration of Panama on the Protection of Critical Infrastructure in the Hemisphere in
the Face of Terrorism, adopted at the CICTE Third Plenary Session held at Panama
City on March 1, 2007, CICTE/DEC. 1/07, OEA/Ser.L/X.2.7.
OIC, “OIC to Revisit Convention on Combating International Terrorism,” http://
www.oic-oci.org//topic/?t_id=11148&t_ref=4385&lan=en (accessed May 13 2017).
Convention on Cybercrime, done at Budapest on November 23, 2001, ETS No. 185.
Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of
acts of a racist and xenophobic nature committed through computer systems, done at
Strasbourg on January 28, 2003, ETS No. 189.
Directive 2013/40/EU of the European Parliament and of the Council of August 12,
2013 on attacks against information systems and replacing Council Framework Decision
2005/222/JHA.
UN General Assembly Resolution 65/230 (A/RES/65/230) of December 21, 2010,
adopted on the recommendation of the Economic and Social Council.
CCPCJ Res. 22/8. See also CCPCJ Res. 22/7, UNODC/CCPCJ/EG.4/2011/3 and
UNODC/CCPCJ/EG.4/2013/3.
UN, “UN Congress Plenary Debate Focuses on Innovative Tools to Fight Cybercrime,
Terrorism Recruitment, Wildlife Trafficking, among New, Emerging Threats,” https://
www.un.org/press/en/2015/soccp365.doc.htm (accessed June 10, 2017).
Final Act of the Diplomatic Conference of Geneva 1949, in UNTS vol. 75, nos.
970–973 (1950), 5 et seq.
Art. 2 of the Geneva Convention (I) of 1949.
Jean S. Pictet, Geneva Conventions of 12 August 1949: Commentary. Volume I: For the
Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field, 49.
Ibid.
Ibid., 43, 44, 49.
Ibid., 44.
Ibid.
The Public Prosecutor v. The Turkish State & Others, Decision of November 3, 2016,
the Dutch language court of first instance of Brussel - 41st Chamber (Penal Council
Chamber), Investigation Office no. 2009/0030 - 2008/0113 - 2008/0121, Federal
Prosecutor application no. FD.35.98.54/09 - FD.35.98.634/06-FD.35.98.502/07), 11.
Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the
Protection of Victims of Non-International Armed Conflicts (Protocol II), done at
Geneva on June 8, 1977.
Use of Force Committee, “Final Report on the Meaning of Armed Conflict in
International Law” (The Hague Conference, International Law Association,
May 2010), 12.
196
M. MARSILI
94. Prosecutor v. Milosević, Case No. IT-02-54-T, Decision on Motion for Judgement of
Acquittal of June 16, 2004, para. 36.
95. Convention (IV) respecting the Laws and Customs of War on Land and Its annex:
Regulations concerning the Laws and Customs of War on Land, done at The Hague on
October 18, 1907.
96. Convention (II) with Respect to the Laws and Customs of War on Land and Its Annex:
Regulations concerning the Laws and Customs of War on Land, done at The Hague on
July 29, 1899.
97. Convention (IV) respecting the Laws and Customs of War on Land and Its Annex:
Regulations concerning the Laws and Customs of War on Land, done at The Hague on
October 18, 1907.
98. Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or other
Gases, and of Bacteriological Methods of Warfare, done at Geneva on June 27, 1925.
99. Use of Force Committee, Final Report on the Meaning of Armed Conflict in
International Law, p. 13.
100. Prosecutor v. Tadić, Case No. IT-94-1-T, Decision on Defence Motion for
Interlocutory Appeal on Jurisdiction of October 2, 1995, para. 70.
101. Prosecutor v. Akayesu, Case No. ICTR-96-4-T, judgment of September 2, 1998, paras.
619–27.
102. Ben Emmerson, “Report of the Special Rapporteur on the promotion and protection
of human rights and fundamental freedoms while countering terrorism” (A/HRC/25/
59, GE.14-11949, UN, New York, NY, 2014), para. 71(g). See also the Special
Rapporteur’s interim report to the General Assembly, A/68/389, paras. 70–72; and
the report of the Special Rapporteur on extrajudicial, summary or arbitrary executions,
A/68/382, paras. 69–71.
103. Ibid., para. 71(c). See also A/68/389, paras. 62–65; A/68/382, paras. 64–66.
104. Ibid., para. 71(e). See also A/68/389, paras. 66–69; A/68/382, paras. 55–63. For a
comprehensive and up-to-date assessment of the threat of armed attack by al-Qaeda
and its various affiliate organizations, and the degree of operational coordination,
organization, and leadership among the various groups, see the fifteenth report of the
Analytical Support and Sanctions Monitoring Team established pursuant to SC
Resolution 1526 (2004), transmitted with the letter dated 22 January 2014 from the
Chair of the Security Council Committee pursuant to Resolutions 1267 (1999) and
1989 (2011) concerning Al-Qaeda and associated individuals and entities addressed to
the President of the Security Council (S/2014/41).
105. Dieter Fleck (ed.), The Handbook of Humanitarian Law in Armed Conflicts
(New York: Oxford University Press, 1995), 65.
106. Ibid., 67. See also Hilaire McCoubrey, International Humanitarian Law: Modern
Developments in the Limitation of Warfare, 2nd ed. (Dartmouth, NH: Ashgate,
1998), 133–34.
107. Ingrid Detter, The Law of War, 2nd ed. (New York: Cambridge University Press,
2000), 285–88.
108. Jean S. Pictet, Humanitarian Law and the Protection of War Victims (Geneva: Henry
Dunant Institute, 1975), 31.
109. Michael Walzer, Just and Unjust Wars (New York: Basic Books, 1977), 179–83.
110. George P. Fletcher, Romantics at War: Glory and Guilt in the Age of Terrorism
(Princeton, NJ: Princeton University Press, 2003), 108.
111. Tamar Meisels, Combatants—Lawful and Unlawful, 45–46.
112. Ben Saul, Defining Terrorism in International Law, 69.
DEMOCRACY AND SECURITY
197
113. Anthony Cullen, The Concept of Non-International Armed Conflict in International
Humanitarian Law (Cambridge: Cambridge University Press, 2010), 7–23.
114. Ibid.
115. Terry Gill and Elies van Sliedregt, “Guantánamo Bay: A Reflection on the Legal Status
and Rights of ‘Unlawful Enemy Combatants,’” Utrecht Law Review 1, no. 1 (2005):
28.54, 30–31, http://doi.org/10.18352/ulr.2.
116. Ibid.
117. Hamdan v. Rumsfeld et al. (05–184), 548 U.S. 557 (2006), decided on June 29, 2006.
118. Art. 3, para. 1(c) reads: “the passing of sentences and the carrying out of executions
without previous judgment pronounced by a regularly constituted court, affording all
the judicial guarantees which are recognized as indispensable by civilized peoples.”
119. Tamar Meisels, Combatants—Lawful and Unlawful, 50.
120. Daniel Statman, “Targeted Killing” Theoretical Inquiries in Law 5, no. 1 (2004):
179–98, 195.
121. Jean S. Pictet, Geneva Conventions of 12 August 1949: Commentary. Volume I: For the
Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field, 42.
122. Jeff McMahan, “The Ethics of Killing in War,” Philosophia, 34, no. 1 (2006), 25, 46–47,
10.1007/s11406-006-9007-y. Originally appeared in Ethics 114 (2004): 693–733.
123. Protocol (I) additional to the Geneva Conventions of August 12, 1949, and relating to
the protection of victims of international armed conflicts, adopted on June 8, 1977, Art.
51(8).
124. Jeff McMahan, The Ethics of Killing in War, 39.
125. Jean S. Pictet (ed.), Commentary on the Fourth Geneva Convention (Geneva:
International Committee of the Red Cross, 1958), 51.
126. US Department of Defense, “DoD News Briefing: Secretary Rumsfeld and Gen. Pace,”
http://archive.defense.gov/transcripts/transcript.aspx?transcriptid=2254
(accessed
July 4, 2016).
127. Lawrence Ari Fleischer, “White House Press Secretary Announcement of President
Bush’s Determination re Legal Status of Taliban and Al Qaeda Detainees,” http://www.
state.gov/s/l/38727.htm (accessed July 8, 2016).
128. In re Guantánamo Detainees Cases, Civil Action No. 02–299, decided on January 31,
2005, Memorandum Opinion by Judge Joyce Hens Green, in Federal Supplement,
vol. 335, 2nd Series, 443.
129. Rasul et al. v. Bush et al. (03–334), 542 U.S. 466, 124 S. Ct. 2686, decided on June 28,
2004.
130. Lawrence Ari Fleischer, White House Press Secretary announcement of President Bush’s
determination re legal status of Taliban and Al Qaeda detainees.
131. The Hague Convention (IV) of 1907 respecting the Laws and Customs of War on Land
and its annex: Regulations concerning the Laws and Customs of War on Land, § I, ch. I,
Art. 1; Geneva Convention relative to the Treatment of Prisoners of War of August 12,
1949, Part I, Art. 4.
132. In re Guantánamo Detainees Cases.
133. Adrian Guelke, Terrorism and Global Disorder (London: I.B. Tauris, 2006), 55.
134. In re Guantánamo Detainees Cases.
135. US Department of Defense, Combatant Status Review Tribunals, CSRT Info 26Sep06,
v3F (Washington, DC: US DoD, 2006), http://archive.defense.gov/news/Oct2006/
d20061017CSRT.pdf (accessed January 28, 2016).
136. Jean S. Pictet, Geneva Conventions of 12 August 1949: Commentary. Volume I: For the
Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field,
52.
198
137.
138.
139.
140.
141.
142.
143.
144.
145.
146.
147.
148.
149.
150.
151.
152.
153.
154.
155.
156.
157.
158.
159.
160.
161.
162.
163.
164.
165.
166.
167.
M. MARSILI
Ibid.
Ibid., 60.
Ibid., 61.
Jan Klabbers, Rebel with a Cause? Terrorists and Humanitarian Law, 311.
Ibid., 299.
International Convention for the Suppression of Terrorist Bombings, adopted by resolution A/RES/52/164 of the UN General Assembly on December 15, 1997, 2149 UNTS
284; 37 ILM 249 (1998); [2002] ATS 17.
Jan Klabbers, Rebel with a Cause? Terrorists and Humanitarian Law, 301.
Francis Lieber, Guerrilla Parties Considered with Reference to the Laws and Usages of
War (New York: D. Van Nostrand, 1862).
Knut Ipsen, “Combatants and Non-Combatants,” in The Handbook of Humanitarian
Law in Armed Conflicts, ed. Dieter Fleck, (New York, Oxford University Press, 1995),
65–66. See also Article 4 of the Third Geneva Convention.
Tamar Meisels, Combatants—Lawful and Unlawful, 34.
Ibid., 64
Karma Nabulsi, Traditions of War: Occupation, Resistance, and the Law (Oxford:
Oxford University, 1999), 16.
Ibid. 175
Ibid., 1.
Ibid.
Ibid., 15–18, 241.
Terry Gill and Elies van Sliedregt, Guantánamo Bay: A Reflection on the Legal Status
and Rights of ‘Unlawful Enemy Combatants’, 32, note 17.
Venice Commission, “Opinion on the International Legal Obligations of Council of
Europe Member States in Respect of Secret Detention Facilities and Inter-State
Transport of Prisoners” (Op. No. 363/2005, CDL-AD (2006)009, adopted at Venice
on March 17–18, 2006), para. 78.
Ibid.,
Ibid., para. 79.
Christopher Greenwood, “Scope of Application of Humanitarian Law,” in The
Handbook of Humanitarian Law in Armed Conflicts, ed. Dieter Fleck, 2nd ed.
(Oxford: Oxford University Press, 2008), 48.
Ibid.
Use of Force Committee, Final Report on the Meaning of Armed Conflict in
International Law, 1.
Lassa Oppenheim, II International Law: A Treatise, edited by Hersch Lauterpacht
(London: Longman, Greens, 1952), 202.
Use of Force Committee, Final Report on the Meaning of Armed Conflict in
International Law, 33.
Ibid.
Use of Force Committee, Final Report on the Meaning of Armed Conflict in
International Law, 1, 2.
Ibid.
Ibid.
Jean S. Pictet (ed.), Geneva Conventions of 12 August 1949: Commentary. III Geneva
Convention Relative to the Treatment of Prisoners of War: Commentary (Geneva:
International Committee of the Red Cross, 1960), 36.
Intensity does not depend on the subjective judgment of the parties, but it objective.
See UN International Criminal Tribunal for Rwanda (ICTR), Trial Chamber I,
DEMOCRACY AND SECURITY
168.
169.
170.
171.
172.
199
Prosecutor v. Akayesu, Case No. ICTR-96-4-T, judgement of September 2, 1998, para.
603. See also UN International Tribunal for the Prosecution of Persons Responsible
for Serious Violations of International Humanitarian Law Committed in the Territory
of the Former Yugoslavia since 1991 (ICTY), Trial Chamber II, Prosecutor v. Limaj
et al., Case No. IT-03-66-T, judgment of Nov. 30,2005, para. 89.
Prosecutor v. Tadić, Case No. IT-94-1-T, opinion, and judgment of May 7, 1997, para.
562.
Prosecutor v. Akayesu, para. 620.
Prosecutor v. Blagojevi and Joki, Case No. IT-02-60-T, judgment of January 17, 2005,
para. 536; Prosecutor v. Halilovi, Case No. IT-01-48-T, judgment of November 16,
2005, para. 24; Prosecutor v. Limaj et al, para. 84; Prosecutor v. Gali, Case No. IT-9829-T, judgment and opinion of December 5, 2003, para. 9; Prosecutor v. Staki, Case
No. IT-97-24-T, judgment of July 31, 2003, paras. 566–68.
Prosecutor v. Mucić et al, Case No. IT-96-21-T, judgment, November 16, 1998, para. 184.
See also Art. 50(2) of the Geneva Convention (IV) of 1949; Art. 77(2) of the Additional
Protocol I of 1977; Art. 4(3)(c) of the Additional Protocol II of 1977; Art. 38(3) of the
Convention on the Rights of the Child of 1989; Art. 4 and 8(2)(b)(xxvi)(e)(vii) of the
ICC Statute of 1998; Art. 1 of the Convention on the Worst Forms of Child Labour of
1999; Optional Protocol on the Involvement of Children in Armed Conflict of 2000.