جنگ مدرن و تخاصمات سایبری در چارچوب فضای بین‌الملل

نوع مقاله : علمی-پژوهشی

نویسنده

استادیار دانشکده حقوق دانشگاه آزاد اسلامی- واحد تهران جنوب

چکیده

مخاصمات در دنیای کنونی در دوقالب سایبری و نظامی به وقوع می پیوندد. حملات سایبری مانند مخاصمات مسلحانه باید متناسب و در چهارچوب حقوق بشردوستانه تجلی باید. اصلی بی طرفی در حملات سایبری و حفظ معیارهای حقوق بشردوستانه در حملات سایبری به مراکز اصلی کشورها باید در رعایت حقوق غیرنظامیان و منطبق بر تمایز بین نظامیان ، افراد غیر نظامی که به طور مستقیم در جنگ شرکت کرده اند باشد.  تناسب در رفتار یا عکس العمل در مخاصمه سایبری نیز ازاصولی است که باید  رعایت گردد. هنگامی که که حمله ای باعث جان باختن زندگی غیر نظامیان ، ایراد صدمه و آسیب به آنها، ایراد خسارت به اشیاء و اموال غیر نظامی، و یا ایراد تمام خسارت های ذکر شده برخلاف نوع تجاوز گردد و به طور کلی منافع غیرنظامیان مورد تجاوز جدی قرار گیرد تناسب در حمله رعایت نگردیده و ممنوع می باشد.

کلیدواژه‌ها


عنوان مقاله [English]

Information Technology Review on the Basis of International Law in International Conflict

نویسنده [English]

  • Ali Faghih Habibi
چکیده [English]

Conflicts in the current world occur in two forms of cyber and military. Cyber attacks, such as armed conflict, must fit into the framework of humanitarian law. The principle of neutrality in cyberattacks and the maintenance of human rights standards in cyberattacks to the main centers of the states must be in keeping with the civil rights of the civilians and in accordance with the distinction between military personnel and civilians directly involved in the war.Equity in behavior or reaction in a cyber conflict is one of the principles that must be observed. When an attack causes the loss of life of civilians, injury and damage to them, damage to objects

کلیدواژه‌ها [English]

  • cyber space
  • rape
  • cyberattack
  • Necessity
  • fitness
  • emphasis and neutrality in cyberattacks
AP I, arts. 51(2). art. 51(3)., arts. 51(5)(b) & 57(2)(a)(iii)., art. 57(1)., art. 57., art. 58., art. 56(1). art. 55(1). arts. 51(2) & 54
Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, 1880 (Yves Sandoz, Christophe Swinarski & Bruno Zimmermann, eds., 1987
Geneva Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases,and of Bacteriological Methods of Warfare, June 17, 1925, 26 U.S.T. 571, T.I.A.S. No. 8061
Geoffrey S. Corn, Unarmed but How Dangerous? Civilian Augmentees, the Law of Armed Conflict, and the Search for a More Effective Test for Permissible Civilian Battlefield Functions, 2 J. NAT’L SECURITY L. & POL’Y 257, 261 (2008) 
Herbert Lin, Cyber conflict and international humanitarian law, international review of red cross, Volume 94 Number 886 Summer 2012,p517-518
Herbert Lin, Cyber conflict and international humanitarian law, international review of red cross, Volume 94 Number 886 Summer 2012,p525 
International Law Department United States Naval War College,Newport, U.S.A. 2012 4th International Conference on Cyber Confl ict,C. Czosseck, R. Ottis, K. Ziolkowski (Eds.),2012 © NATO CCD COE,publications, Tallinn
International Law Department United States Naval War College,Newport, U.S.A. 2012 4th International Conference on Cyber Confl ict,C. Czosseck, R. Ottis, K. Ziolkowski (Eds.),2012 © NATO CCD COE,publications, Tallinn,p284
James D. Fry, Gas Smells Awful: U.N. Forces, Riot-Control Agents, and the Chemical Weapons Convention, 31 MICH. J. INT’L L. 475 (2010);
Jeffrey T.G. Kelsey, Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare, 106 MICH. L. REV. 1431 (2008). 
Jeffrey T.G. Kelsey, Hacking into International Humanitarian Law:The Principles of Distinction and Neutrality in the Age of Cyber Warfare, Michigan Law Review ,Vol. 106,p1446-8  
Lectures at The Hague Academy of International Law; first published in Receuil des Cours -197211(1973), 136. Leiden, A. W. Sijthoff. mefacts.org/cached.asp?x_id=10943
Lectures at The Hague Academy of International Law; first published in Receuil des Cours -197211(1973), 136. Leiden, A. W. Sijthoff. mefacts.org/cached.asp?x_id=10943
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p45
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p 48
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p 49
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p 45
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p46
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p46
Matthew C. Waxman ( Associate Professor of Law, Columbia Law School). Cyber Attacks as “Force” under UN Charter Article 2(4), International Law Studies - Volume 87.p 48
Matthew C. Waxman, Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4), THE YALE JOURNAL OF INTERNATIONAL LAW,Vol. 36: 421
Matthew C. Waxman, Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4), YALE JOURNAL OF INTERNATIONAL LAW ,Vol. 36,p428,.
Matthew C. Waxman, Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4), YALE JOURNAL OF INTERNATIONAL LAW ,Vol. 36,p429
Michael N. Schmitt ,“Attack” as a Term of Art in International Law: The Cyber Operations Context”,
Michael N. Schmitt ،“Attack” as a Term of Art in International Law: The Cyber Operations Context,
MICHAEL N. SCHMITT. 1999. “Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework.” Columbia Journal of Transnational Law 37,p6-7
Michael N. Schmitt. 1999. “Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework.” Columbia Journal of Transnational Law 37: 885, 913–15. This article also appears in The Columbia Journal of Transnational Law, Volume 37, 1999,pages 885-937 و https://cyber.law.harvard.edu/cybersecurity/Computer_Network_Attack_and_the_Use_of_Force_in_International_Law#Full_Title_of_Reference
Military objectives are targets that meet two criteria: they serve a military purpose and their incapacitation conveys a definite advantage. Protocol Additional I, supra note 120, art. 52(2). 
Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, Julia Spiegel,  THE LAW OF CYBER-ATTACK,  Forthcoming in the California Law Review, 2012,p7
Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, Julia Spiegel,  THE LAW OF CYBER-ATTACK,  Forthcoming in the California Law Review, 2012,p10
Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, Julia Spiegel,  THE LAW OF CYBER-ATTACK,  Forthcoming in the California Law Review, 2012,p10-12
Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue, Julia Spiegel , THE LAW OF CYBER-ATTACK,  Forthcoming in the California Law Review, 2012,p43
Protection of Victims of International Armed Conflicts (Protocol 1),art. 51(5)(b), 57(2)(a)(iii)
Protocol Additional I, art. 54(2).  
Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol 1),art. 48, art. 51(5)(b),art. 85(3)(b).,art. 85(3)(a). arts. 51(5)(b), 54, 57(2)(a)(iii), 52(2)
Yoram Dinstein, Computer Network Attacks and Self-Defense, 76 INT’L L. STUD. 99,114-15 (2002)