Cyber-attacks and autonomous weapons under the principle of proportionality
DOI:
https://doi.org/10.31185/wjfh.Vol21.Iss2.892Keywords:
Cyber-attacks, autonomous weapons, proportionality principle, artificial intelligenceAbstract
The digital world has produced a new type of danger, with cyber-attacks and the use of autonomous weapons becoming a reality in contemporary armed conflicts. With the new arms race in which countries arm themselves for cyberspace battles, many countries are not only conducting cyber espionage, cyber reconnaissance and investigation missions; they have also created cyber offensive capabilities, developed national strategies, and engaged in cyber-attacks at a frightening pace. The same is true for autonomous weapons, which are nothing more than machines with tremendous artificial intelligence, some of which even resemble humans in their design, and have the ability to determine their targets automatically. All a person has to do is operate them and then leave them to work by themselves. These weapons are undoubtedly the future of wars, as countries no longer need to sacrifice their human soldiers, nor spend huge sums of money on soldiers' salaries and equipment, and perhaps compensation after their death on the battlefields. Such dangerous operations had to be viewed through the lens of international humanitarian law. It is a type of war, and whenever wars exist, international humanitarian law exists to protect individuals from them in accordance with the principles in effect in this regard, including the principle of proportionality.
Downloads
References
المصادر
اولاً : المصادر العربية :
.678-610 :)8( والسياسية، 4.
احمد عطا حسين. (2022). وسائل حماية التجارة الالكترونية من مخاطر الهجمات السيبرانيه. مجلة واسط للعلوم الانسانية18(52).، https://doi.org/10.31185/.Vol18.Iss52.338
الحديثي، (2021)التفصيل الشامل لتطور القواعد القانونية الخاصة بالحرب السيبرانية ،ط 1 مصر: منشورات المجموعة العلمية للطباعة والنشروالتوزيع.
صلاح جبير البصيصي, & حــازم فـارس حبيـــب. (2023). استجابة اتفاقيات جنيف الأربع لعام 1949 بشأن استخدام أنظمة أسلحة الذكاء الاصطناعي في النزاعات المسلحة. مجلة رسالة الحقوق، ١٥(٥).
علام ، ايمان احمد ،(2023)، الهجمات السيبرانية واستخدام القوة المسلحة في القانون الدولي العام ، بحث منشور في مجلة الدراسات القانونية والاقتصادية ، المجلد /9، العدد /4، مصر .
الفتلاوي، أ. ) 2016 (. الهجمات السيبرانية مفهومها والمسؤولية الدولية الناشئة عنها في ضوء التنظيم الدولي المعاصر، مجلة المحقق للعلوم القانونية
الفتلاوي، أ.) 2018 (. الهجمات السيبرانية، دراسة قانونية تحليلية. )ط 1(. بيروت: منشورات زين الحقوقية.
لين ، هربرت ،(2012) ، النزاع السيبراني والقانون الدولي ، المجلة الدولية للصليب الاحمر ، المجلد /94، العدد/ 886.
هنكرتس ، ماري، ولويز دوزوالد بك(2005) ، القانون الدولي الإنساني العرفي، المجلد الأول: القواعد، اللجنة الدولية للصليب الاحمر ، مطابع جامعة كامبردج، كامبردج.
ثانياً : المصادر باللغة الانكليزية :
-Allhoff, F., Evans, N. G., & Henschke, A. (2013). Routledge handbook of ethics and war: Just war theory in the 21st century. Routledge.
-Chavannes, E., Klonowska, K., & Sweijs, T. (2020). Governing autonomous weapon systems. The Hague: The Hague Centre For Strategic Studies.
-Chengeta, T. (2016). Are Autonomous Weapons Systems the Subject of Article 36 of Additional Protocol I to the Geneva Conventions. UC Davis J. Int'l L. & Pol'y, 23, 65.
-Connor, W. (2013). Underwater Drones Are Multiplying Fast. Wall Street Journal, 24.
-Converse, B. D. Cyber Power and Operational Art.
-Etzioni, A., & Etzioni, A. (2018). Pros and cons of autonomous weapons systems (with Oren Etzioni). Happiness is the Wrong Metric: A Liberal Communitarian Response to Populism, 253-263.
-Geers, K. (2008). Cyberspace and the changing nature of warfare. SC magazine, 27.
-Geiss, R. (2015). The international-law dimension of autonomous weapons systems. Friedrich-Ebert-Stiftung, International Policy Analysis.
-Ghasemi, A. H. (2014). Semi-autonomous weapon systems in international humanitarian law: A study of the new decision-making and responsibility issue in international humanitarian law relating to semi-autonomous weapon systems (Doctoral dissertation, Lund University, Faculty of Law).
-Graham, D. E. (2010). Cyber threats and the law of war. J. Nat'l Sec. L. & Pol'y, 4, 87.
-Hathaway, O. A., Crootof, R., Levitz, P., & Nix, H. (2012). The law of cyber-attack. Calif. L. Rev.,
-Heyns, C. (2013). Extrajudicial, summary or arbitrary executions. Security Issues in the Greater Middle East, 183.
-Jensen, E. T. (2012). Cyber attacks: Proportionality and precautions in attack.
-Kesan, J. P., & Hayes, C. M. (2011). Mitigative counterstriking: Self-defense and deterrence in cyberspace. Harv. JL & Tech., 25, 429.
-Khan, A., Ullah, M., Rehman, F., & Ghani, A. (2017). Cyber Attacks in International Law: From Atomic War to Computer War. Available at SSRN 3064787.
-Kwik, J. (2024). AWS and Targeting. In Lawfully Using Autonomous Weapon Technologies (pp. 227-273). The Hague: TMC Asser Press.
-Markoff, J., & Shanker, T. (2009). Halted’03 Iraq plan illustrates US fear of cyberwar risk. The New York Times, 2, 2009.
-McClelland, J. (2003). The review of weapons in accordance with Article 36 of Additional Protocol I. International Review of the Red Cross, 85(850), 397-420.
-Nakashima, E., & Harris, S. (2018). How the Russians hacked the DNC and passed its emails to WikiLeaks. The Washington Post, 13.
-Righetti, L., Sharkey, N., Arkin, R., Ansell, D., Sassoli, M., Heyns, C., ... & Lee, P. (2014, March). Autonomous weapon systems: technical, military, legal and humanitarian aspects. In Expert Meeting, International Committee of the Red Cross.
-Shackelford, S. J. (2009). From nuclear war to net war: analogizing cyber attacks in international law. Berkeley J. Int'l Law, 27, 192.
-Sharkey, A. (2019). Autonomous weapons systems, killer robots and human dignity. Ethics and Information Technology, 21(2), 75-87.
-Trux, J. (1991). Desert Storm: a space-age war. New Scientist, 131, 30-4.
-Wagner, M. (2014). The dehumanization of international humanitarian law: legal, ethical, and political implications of autonomous weapon systems. Vand. J. Transnat'l L., 47, 1371.
-Warner, M. (2012). Cybersecurity: A pre-history. Intelligence and National Security, 27(5), 781-799.
-Whyte, C., & Mazanec, B. (2023). Understanding cyber-warfare: Politics, policy and strategy. Routledge.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 م.د مهند عجب جنديل السراي

This work is licensed under a Creative Commons Attribution 4.0 International License.

