When Bits strike in cyberwarfare: Kinetic effects on Ius ad Bellum and Ius in Bello
DOI:
https://doi.org/10.33936/nullius.v6i1.7619Keywords:
Artificial Intelligence; Cyberconflict, International Humanitarian Law;Abstract
The digitalization of armed conflict has overwhelmed the traditional frameworks of international law, requiring a critical reassessment of the normative foundations governing the use of force. This article investigates the impact of cyberattacks with kinetic consequences physical damage caused by digital operations on the contemporary redefinition of jus ad bellum and international humanitarian law. Using an analytical-interpretative methodology and a case study approach (Stuxnet, NotPetya, Colonial Pipeline), the paper explores how cyberspace, as an emerging domain of warfare, erodes the notions of territoriality, distinction, and proportionality. The research proposes a legal reconstruction of the concept of “armed conflict zone” within transnational digitalized environments and problematizes attribution and the legitimacy of state countermeasures. Far from being a merely technical evolution, the study contends that this represents a structural mutation of modern conflict, demanding an urgent normative revision grounded in principles of humanity, transparency, and international accountability.
Downloads
References
Ambos, K. (2021). La parte general del derecho penal internacional: Bases de la responsabilidad individual en derecho penal internacional. Tirant lo Blanch. https://editorial.tirant.com/es/libro/la-parte-general-del-derecho-penal-internacional-kai-ambos-9788413784879
Aparicio, J. F. (2023). Ciberguerra y cibercrimen global, cuando lo virtual transciende a lo real. bie3: Boletín IEEE, (31), 44-71. https://dialnet.unirioja.es/servlet/articulo?codigo=8781086
Ávila, F.(2015). Evolución e impacto del ransomware en américa latina desde el Año 2015. [Proyecto de grado, Universidad Nacional Abierta y a distancia UNAD] Repository Unad. https://repository.unad.edu.co/bitstream/handle/10596/42667/fyavilan.pdf?sequence=3isAllowed=y
Cassese, A. (2005). International Law (2nd ed.). Oxford University Press. https://global.oup.com/academic/product/international-law-9780199259397
Comisión de Derecho Internacional. (2002). Responsabilidad del Estado por hechos internacionalmente ilícitos: Proyecto de artículos aprobado en el 53º período de sesiones (A/56/10), adoptado por la Asamblea General de las Naciones Unidas en la resolución A/RES/56/83, de 28 de enero de 2002. Naciones Unidas. https://docs.un.org/en/A/RES/56/83
Comité Internacional de la Cruz Roja (CICR). (1977). Protocolo adicional a los Convenios de Ginebra del 12 de agosto de 1949 relativo a la protección de las víctimas de los conflictos armados internacionales (Protocolo I). https://ihl-databases.icrc.org/es/ihl-treaties/api-1977
Consejo de Europa. (2024). El Convenio de Budapest contra la Ciberdelincuencia suma ya 75 Estados Parte. https://www.coe.int/es/web/portal/-/budapest-convention-reaches-75-parties
Deeks, A. S. (2021). The law of cyber operations and the sovereignty of states. In N. Tsagourias & R. Buchan (Eds.), Research handbook on international law and cyberspace (2nd ed., pp. 103–123). Edward Elgar Publishing. https://doi.org/10.4337/9781789904253.00014
Dinniss, H. A. (2021). Cyber Operations and International Law. Oxford University Press. https://global.oup.com/academic/product/cyber-operations-and-international-law-9780198780097
Finlay, L., & Payne, C. (2019). The Attribution Problem and Cyber Armed Attacks. American Journal of International Law, 113(2), 202–206. https://doi.org/10.1017/aju.2019.35
Greenberg, A. (2018). The Untold Story of NotPetya, the Most Devastating Cyberattack in History. Wired. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world
Hathaway, O. A., & Klimburg, A. (2021). The Law of Cyber Conflict: Advances and Emerging Challenges. https://openyls.law.yale.edu/bitstream/handle/20.500.13051/3283/Law_of_Cyber.pdf
Hollis, D. (2020). Cyber Operations and International Law. Cambridge University Press.
Instituto Nacional de Ciberseguridad (INCIBE). (2021, 26 de abril). Proxy: navega y utiliza tu equipo de forma más segura. https://www.incibe.es/ciudadania/blog/proxy-navega-y-utiliza-tu-equipo-de-forma-mas-segura
International Committee of the Red Cross (ICRC). (2019). Autonomous Weapon Systems: Technical, Military, Legal and Humanitarian Aspects. https://www.icrc.org/en/document/report-icrc-meeting-autonomous-weapon-systems-26-28-march-2014
International Committee of the Red Cross (ICRC). (2019). International Humanitarian Law and Cyber Operations during Armed Conflicts. https://www.icrc.org/sites/default/files/document/file_list/icrc_ihl-and-cyber-operations-during-armed-conflicts.pdf
Jensen, E. T. (2015). Cyber Warfare and Precautions Against the Effects of Attacks. International Law Studies, 91(2), 547–570. https://digital-commons.usnwc.edu/ils/vol91/iss1/21/
Kello, L. (2020). Striking Back: The End of Peace in Cyberspace and How to Restore It. Yale University Press. https://yalebooks.yale.edu/book/9780300253039/striking-back/
Koh, H. H. (2012). International Law in Cyberspace. Harvard International Law Journal, 54(1), 1–21. https://harvardilj.org/wp-content/uploads/sites/15/2012/04/Koh.pdf
Lin, H. (2010). Cyber conflict and international humanitarian law. International Review of the Red Cross, 94(886) https://international-review.icrc.org/sites/default/files/irrc-886-lin.pdf
Lin, H. (2021). Cyber Threats and Norm Evolution: International Security in the Digital Age. Stanford University Press. https://es.everand.com/book/520038645/Cyber-Threats-and-Nuclear-Weapons
Lubin, A. (2021). The Rights to Privacy and Data Protection in Times of Armed Conflict. International Review of the Red Cross, 102(913), 43–73. https://international-review.icrc.org/articles/the-rights-to-privacy-and-data-protection-923
Martínez, M. (2011). Cuestionando la desterritorialización. Hiperterritorio, dimensiones imaginarias del espacio y nuevas cartografías. https://catalogus.boekman.nl/pub/P13-0092.pdf#page=81
McCormack, T. L. H. (2020). The Law of Cyber Warfare. Cambridge University Press. https://www.cambridge.org/core/books/law-of-cyber-warfare/
Naciones Unidas. (1945). Carta de las Naciones Unidas. https://www.oas.org/36ag/espanol/doc_referencia/carta_nu.pdf
Naciones Unidas. (2021, 7 de julio). Consejo de Seguridad, documento S/2021/621. Naciones Unidas. https://docs.un.org/es/s/2021/621
Rid, T. (2020). Active Measures: The Secret History of Disinformation and Political Warfare. Farrar, Straus and Giroux. https://us.macmillan.com/books/9780374287269/activemeasures
Schmitt, M. N. (Ed.). (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press. https://doi.org/10.1017/CBO9781139169285
Schmitt, M. N., & Vihul, L. (2020). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press. https://doi.org/10.1017/9781316822524
Shackelford, S. J. (2014). Managing Cyber Attacks in International Law, Business, and Relations: In Search of Cyber Peace. Cambridge University Press.
Shackelford, S. J. (2020). Cyber War and Peace: Building a Safer Digital World. Cambridge University Press.
Shackelford, S. J., Douzet, F., & Ankersen, C. (Eds.). (2022). Cyber peace: Charting a path toward a sustainable, stable, and secure cyberspace. Cambridge University Press.
Tsagourias, N., & Buchan, R. (2021). Research Handbook on International Law and Cyberspace (2nd ed.). Edward Elgar Publishing. https://www.e-elgar.com/shop/gbp/research-handbook-on-international-law-and-cyberspace-9781789904246.html
Valencia. E. (2024). Implicaciones y desafíos del ciberespacio para la aplicación del Derecho Internacional. Revista Política Internacional, 6(1), 219-233. https://doi.org/10.5281/zenodo.10396392
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Juan Carlos Almache Barreiro, Nathali Berríos Marrero

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.