Table of Contents Table of Contents
Previous Page  118 / 464 Next Page
Information
Show Menu
Previous Page 118 / 464 Next Page
Page Background

104

KRISTÝNA URBANOVÁ

CYIL 6 ȍ2015Ȏ

against impunity.

3

Admittedly, the consensus accomplished after decades of struggle

over the definition might be justly seen as a historical agreement.

Nevertheless, a closer look at the definition of aggression brings also some queries

over the exact content of the definition of the crime of aggression. Beside those

important issues concerned with the role of the United Nations Security Council,

jurisdictional questions, etc., one of the main criticisms heard after the Kampala

conference was over the question of whether the definition satisfies the needs of

the 21

st

century.

4

That is, does the definition of the crime of aggression respond

appropriately to modern means of warfare, such as cyber-attacks?

2. Cyber operations

2.1 Variety of cyber operations

Recent technical development has produced not only new weapons, such as

drones, but has also constituted new battlefields completely distinct and distant

from yesterday’s conception of armed conflict. Scrutinizing the new battlefield of

cyberspace from the perspective of international law, it is useful to notice distinctions

between the various detrimental kinds of cyber operations.

Firstly,

cybercrime

does not correspond to the term of cyber-attack. Cybercrime is

a crime of “ordinary” nature, employing the cyber operation in order to achieve the

criminal’s task of unlawful self-enrichment. Examples of cyber-criminality include

attacks on bank accounts, distribution of child pornography, etc.

5

Another example

of malicious cyber operation is

cyberespionage

. Cyberespionage is an operation using

cyber space to gain unauthorized access to confidential information, typically that

held by a government or business corporations. While the motive of the cyber spies or

cyber-criminals might be purely private, the

cyber terrorists

seek to put a government

or public under pressure through the spread of threats or violence.

6

Apparently, it is

the motivation of the actor which makes a difference in the categorization of these

types of cyber operations.

Although defining cyber terrorism or cybercrimes does not cause difficulties in

contemporaneous legal theory, attempts to reach the same over the definition of

cyber-attack

do not show the same signs of consistency. While some authors consider

3

KAUL, Hans-Peter. Kampala June 2010 – A First Review of the ICC Review Conference

Gottingen

Journal of International Law

, 2010, no. 2, p. 649-667, p. 656.

4

BOAS, A. The definition of the crime of aggression and its relevance for contemporary armed conflict,

International crime database

, 2013, Brief 1, available at

http://www.internationalcrimesdatabase.org/

upload/documents/20131030T045349-ICD%20Brief%201%20-%20Boas.pdf.

5

OPHARDT, J., Cyber warfare and the crime of aggression: the need for individual accountability on

tomorrow’s battlefield,

Duke Law & Technology Review

, 2010, no. 3, p. 4.

6

SOLCE The Battlefield of Cyberspace: The Inevitable New Military Branch – The Cyber Force,

ALB.

L.J. SCI. & TECH

., 2008, pp. 198-324, p. 301.