Assessment Coversheet and Feedback Form Faculty of…. School of…. Complete the details marked in the coloured text and leave everything else blank. Where appropriate, copy and paste your submission after the first pages as indicated. You are reminded of the University regulations on cheating. Except where the assessment is group-based, the final piece of work which is submitted must be your own work. Close similarity between submissions is likely to lead to an investigation for cheating. You must submit a file in an MSWord or equivalent format as tutors will use MSWord to provide feedback including, where appropriate, annotations in the text. Student Name Reasonable Adjustments Student Number Course and Year LL.M IHRL/ICL 2020/21 Module Code LAW 7123 Module Title International Criminal Law Check this box [x] if the Faculty has notified you that you are eligible for a Reasonable Adjustment (including additional time) in relation to the marking of this assessment. Please note that action may be taken under the University’s Student Disciplinary Procedure against any student making a false claim for Reasonable Adjustments. Module Tutor Personal Tutor First Marker Name: First Marker Signature: Date: Feedback: General comments on the quality of the work, its successes and where it could be improved Provisional Uncapped Mark Marks will be capped if this was a late submission or resit assessment and may be moderated up or down by the examination board. % Feed Forward: How to apply the feedback to future submissions Quality and use of Standard English and Academic Conventions Standard is a Cause for Concern Spelling Errors Style is Colloquial Grammatical Errors Inappropriate Structure Punctuation Errors Inadequate Referencing If the box above has been ticked you should arrange a consultation with a member of staff from the Centre for Academic Success via Success@bcu.ac.uk Moderation Comments (Please note that moderation is carried out through ‘sampling’. If this section is left blank, your work is not part of the sample.) Moderation is done via sampling. Your work was not part of the sample. Moderator Name: Moderator Signature: Date: 1 Marking criteria – please study these carefully 0 – 39% 40 – 49% 50 – 59% 60 – 69% 70 – 79% 80 – 100% Fail Fail Pass Strong pass Very strong pass (merit) (distinction) Exceptionally strong pass (distinction) 1. Identify and distinguish at the level of detail the key concepts, principles, and institutions of international criminal law, including their origins, limits and potential. Very little evidence of the ability to identify the key concepts, principles, and institutions of international criminal law Evidence of some ability to identify the key concepts, principles, and institutions of international criminal law Evidence of satisfactory ability to identify the key concepts, principles, and institutions of international criminal law Evidence of reasonably good ability to identify the key concepts, principles, and institutions of international criminal law Little to no ability to distinguish at the level of detail between different issues pertaining to international criminal law Limited ability to distinguish at the level of detail between different issues pertaining to international criminal law Satisfactory ability to distinguish at the level of detail between different issues pertaining to international criminal law Good ability to distinguish at the level of detail between different issues pertaining to international criminal law Evidence of very good ability to identify the key concepts, principles, and institutions of international criminal law Very good ability to distinguish at the level of detail between different issues pertaining to international criminal law Many substantial Mistakes and/or Few substantial Absence of any mistakes and/or omissions are present, mistakes or omissions Very few substantial substantial mistakes omissions are present some of which are mistakes or omissions or omissions substantial Evidence of exceptionally good ability to identify the key concepts, principles, and institutions of international criminal law Exceptionally good ability to distinguish at the level of detail between different issues pertaining to international criminal law Absence of any mistakes or omissions 2. Critically analyse issues pertaining to international criminal law, and to develop and sustain a convincing argument. Very little attention to the question asked Unsatisfactory attention to the question asked Little to no evidence of skills of critical Evidence of limited analysis, synthesis skills of critical and evaluation analysis, synthesis and evaluation No evidence of ability to develop a convincing argument including a critique of a rival position No attempt at originality in approaching the topic, and no personal contribution to debate on the topic Satisfactory attention to the question asked Good attention to the question asked Very good attention to Exceptional attention the question asked to the question asked Evidence of reasonable skills of critical analysis, synthesis and evaluation Evidence of good skills of critical analysis, synthesis and evaluation Evidence of very good skills of critical analysis, synthesis and evaluation Evidence of good ability to develop a convincing argument including a critique of a rival position Little to no evidence of ability to develop a convincing argument including a critique of a rival position Evidence of limited ability to develop a convincing argument including a critique of a rival position Evidence of reasonably good ability to develop a convincing argument including a critique of a rival position Little to no attempt at originality in approaching the topic, and no personal contribution to debate on the topic Limited attempt at originality in approaching the topic, and personal contribution to debate on the topic Reasonable attempt at originality in approaching the topic, and personal contribution to debate on the topic Good attempt at originality in approaching the topic, and personal contribution to debate on the topic Evidence of exceptionally good skills of critical analysis, synthesis and evaluation Evidence of very good ability to develop a convincing argument including a critique of a rival position Very good attempt at originality in approaching the topic, and personal contribution to debate on the topic 3. Conduct an independent and advanced legal and academic research in international criminal law, drawing from a wide array of sources including case law, other primary materials, and scholarly critique. No evidence of reading and research beyond basic texts No evidence of reading and research beyond basic texts Reading and research Evidence of is largely confined to reasonably wide basic texts reading and research Majority of the key sources are omitted Unsatisfactory competence in the selection and use of sources Satisfactory competence in the selection and use of sources Little to no evidence of ability to evaluate and engage with current Evidence of limited Evidence of legal research and ability to evaluate and reasonable ability to engage with current evaluate and engage 2 Evidence of wide reading and research Evidence of particularly wide reading and research Good competence in the selection and use of sources Very good competence in the selection and use of sources Evidence of good ability to evaluate and engage with current legal research and Evidence of very good ability to evaluate and Evidence of engage with current exceptional ability to legal research and evaluate and engage Exceptionally good competence in the selection and use of sources theoretical arguments legal research and on the subject theoretical arguments on the subject with current legal theoretical arguments theoretical arguments research and on the subject on the subject theoretical arguments on the subject with current legal research and theoretical arguments on the subject 4. Communicate complex ideas clearly and effectively in writing, maintaining coherent structure and a balanced organisation of information and argument, and paying close attention to professional legal and academic standards of style and presentation. Discussion is very unclear, with repetitions and sentences that make little sense Very confusing structure and organisation of information Clarity of discussion is Satisfactory clarity of inconsistent, confusion discussion or repetitions may be present Acceptable structure and organisation of Largely confusing information structure and organisation of Satisfactory information grammatical accuracy Good clarity of discussion Very good clarity of discussion Excellent clarity of discussion Reasonably clear and appropriate structure and organisation of information Very clear and appropriate structure and logical organisation of information Particularly clear and appropriate structure and logical organisation of information Good grammatical accuracy Unsatisfactory Reasonable attention Grammatical accuracy grammatical accuracy to providing clear and is particularly poor consistent referencing and appropriate Limited attention to Little to no attention to providing clear and bibliography providing clear and consistent referencing consistent referencing and appropriate and appropriate bibliography bibliography Good attention to providing clear and consistent referencing and appropriate bibliography 3 Very good Excellent grammatical accuracy grammatical accuracy Very good attention to providing clear and consistent referencing and appropriate bibliography Acute attention to providing clear and consistent referencing and appropriate bibliography RESEARCH MEMORANDUM To: Office of the Prosecutor, International Criminal Court From: Date: 02nd of October 2021 RE: Does the Rome Statute have a sufficient framework to address about the ‘Cyber Warfare’ that amount to serious crimes recognized by the International Criminal Court’s Jurisdiction? Table of Content 1. Introduction ……………………………………………………………………. 05 2. Identification and the scope of the selected legal issue………………………… 06 3. Facts and Discussion …………………………………………………………… 07 3.1 The current international legal framework governing cyber warfare 07 3.2 Armed conflict and Cyber Warfare………………………………………………… 08 3.3 Cyber Warfare as an ‘Attack’………………………………………………………. 09 3.4. Legal principles that are applicable to Cyber Warfare ……………. 09 3.5 International Convention on Cybercrime……………………………… 10 4. Analysis of the Rome Statute and its Jurisdiction on Cyber Warfare 11 . 5. Why does the Rome Statute need to be amended?..................................................12 6. Recommendations …………………………………………………………………………………………….14 7. Conclusion ………………………………………………………………………………………………………. 15 4 1. Introduction When technology is developing rapidly, the activities in cyber space also need to be modified with a new legal regime. ‘As information warfare capabilities have grown in recent years, the possibilities of war crimes with cyber-attacks have increased.’1 At the moment, both states and non-state actors use developed technology, means, and methods in warfare. Therefore, these online threats can emerge from state or non -state organizations.2 Cyber-attacks can occur as an armed conflict or can happen in an ongoing armed conflict. ‘Cyber space, the novel 5th space of warfare after land, sea, air, and space, is all of the computer networks in the world and everything they connect and control via cable, fibreoptics or wireless.3 Today, parties who engage in war now use cyber technology as a novel weapon of attack. 4 International Law governs conventional warfare, and presently, the use of digital weapons is increasing. Because of the novelty of cyber-attacks, the existing International Criminal Law has to provide a more specific legal framework to face this global challenge. ‘However, offensive operations in cyberspace are usually neglected from an International Criminal Law point of view. Therefore, the debate regarding the qualification of cyber-attacks N. C. Rowe “War Crimes from Cyber-Weapons.” Journal of Information Warfare 6, no. 3 (2007) PP 15–25. https://www.jstor.org/stable/26503486 (accessed on 27th September 2021) 1 Rafaela Macedo De Figueiredo, Carvalho Miranda, ‘Cyber Warfare in The Context of International Criminal Law’, (2016) https://repositorio.ucp.pt/bitstream/10400.14/22001/1/Rafaela%20Miranda.pdf (accessed on 27th September 2021) 2 3 Fred Schreier, On Cyberwarfare, DCAF Horizon, Working Paper No 07 (2015) https://www.dcaf.ch/sites/default/files/publications/documents/OnCyberwarfare-Schreier.pdf (accessed on 27th September 2021) . 4 ‘John A. Serbian, Jr., Information Operations Issue Manager at the CIA, reports that: we are detecting, with increasing frequency, the appearance of doctrine and dedicated offensive cyber warfare programs in other countries. we have identified several, based on all-source intelligence information, that are pursuing government-sponsored offensive cyber programs…they are developing strategies and tools to conduct information attacks.’ John A. Serabian, “Cyber Threats and The U.S. Economy,” Central Intelligence Agency, Https://Www.Cia.Gov/News-Information/Speeches-Testimony/2000/Cyberthreats_022300.Html (accessed on 27th September 2021) 5 as fundamental crimes have been less intense.’5 In this case, the research memorandum mainly aims to discuss how we could enforce the law of cyberwarfare within the parameters of International Criminal Law. The following questions may arise when investigating the existing Conventional and Customary International Laws that govern Cyber Operations, specifically Cyber Warfare. Firstly, it should be noted that the existing International Criminal Law is insufficient to address Cyber Warfare. Is the regulatory framework appropriate to govern the issues that may arise between state actors or between non-state actors? Then it should consider that if existing law is insufficient, how should International Criminal Law be amended better to regulate such cyber-attacks in an armed conflict, which may account for serious crimes? Therefore, the purpose of this memorandum is to discuss how the existing laws relating to Cyber Warfare can be placed within the framework of the Rome Statute6. 2. Identification and the scope of the selected legal issue While examining the current International Criminal Law which stands on Cyber Warfare, the research findings show that there is no comprehensive and clear existing legal framework for regulating the violations of fundamental crimes in Cyber Warfare under the Rome Statute, and the existing International Criminal Law is insufficient. Therefore, this Research Memorandum attempts to explore whether the Rome Statute has a sufficient framework to address ‘Cyber Warfare’ that amounts to serious crimes recognized by the International Criminal Court’s jurisdiction. Although Cyber Warfare has an extensive scope; and multiple issues connected with it, this Research Memorandum aims to limit the scope of how to penalize such conduct when it comes under the criminal jurisdiction of the International Criminal Court. Furthermore, it will discuss how to enforce the criminal liability through the provisions that are provided by the International Criminal Court on Cyber Warfare. Gian Piero Greco, ‘Cyber-Attacks as Aggression Crimes in Cyberspace in The Context of International Criminal Law’, European Law Journal of Political Studies, Volume 4, Issue 1 , (2020) https://www.researchgate.net/publication/351614276_cyberattacks_as_aggression_crimes_in_cyberspace_in_the_context_of_international_criminal_law (accessed on 27th September 2021) 6 Rome Statute of The International Criminal Court, 17 July 1998 https://www.icc-cpi.int/ , https://treaties.un.org/ (accessed on 27th September 2021) 5 6 3. Facts and Discussion 3 .1 The current international legal framework governing cyber warfare In international law generally, the conventions have been responses to particular problems at regional and global levels to regulate, harmonize or extend the claims of criminal jurisdiction.7 Since there is no specific legal instrument which identifies cyber space operations and regulates violations of cyber space, it is critical to understand the definitions which define key cyberspace terms such as cyber-attacks, cybercrimes, and Cyber Warfare. Cyber-attacks can be defined as “actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.”8 Cyber Crime is any activity that uses computers or networks as tools for criminal activities. 9 Cyber Warfare is defined as warfare carried out in cyberspace using cyber means and methods, or as a "massively coordinated digital assault on a government by another, or by large groups of citizens." It is the action by a nation-state to penetrate another nation’s computers and networks for the purposes David Freestone, “International Cooperation Against Terrorism and The Development of International Law Principles of Jurisdiction,” 1.ed. Rosalyn Higgins, Maurice Flory, Terrorism and International Law (New York: Routledge, 1997) PP 43 7 Cyberspace And Information Operations Study Center, “Computer Network Operations & Network Warfare Operations,” Air University, Http://Www.Au.Af.Mil/Info-Ops/Netops.Htm(accessed on 27th September 2021) 8 Cyber Attacks includes Illegal access, Illegal interception, Data interception, System interference, Malicious software (Malware), DDoS attacks, Attack against E-government websites, Attack against DNS server, Attack against bank websites, Phishing Site, Port scanning, spamming attacks, web defacement, web server hacking, and Email account hacking etc. 9 M. Gercke, Understanding Cybercrime: Phenomena, Challenges and Legal Response, International Telecommunication Union, (Sept. 2012) https://www.itu.int/en/ITD/Cybersecurity/Pages/legislation.aspx , (accessed on 27th September 2021) Maskun, Achmad, Naswar, Hasbi Assidiq, Armelia Syafira, Marthen Napang, Marcel Hendrapati, Qualifying Cyber Crime as A Crime of Aggression in International Law, (2020)13 No.2, P 397-418 7 of causing damage or disruption.”10“As all military operations must be in compliance with the laws of armed conflict; cyber operations can also be included.”11 3.2 Armed Conflicts and Cyber Warfare International armed conflict, refers to an armed conflict between two or more states, requires the resort to armed force between states.12 ‘It may also involve the use of armed force by a non-state organized armed group against a state, so long as the group is acting under the overall control of another state.’13 ‘Obviously, not all cyber operations would constitute a resort to armed force.’ 14 ‘To be an “armed” force, hostilities involving the “collective application of means and methods of warfare” have to take place.’15 10 Fred Schreier, On Cyberwarfare, (2015 - DCAF Horizon) Working Paper https://www.dcaf.ch/sites/default/files/publications/documents/OnCyberwarfare-Schreier.pdf (accessed on 27th September 2021) Keith Alexander, “Advance Questions for Lieutenant General Keith Alexander, USA, Nominee for Commander, United States Cyber Command,” Http://Www.Washingtonpost.Com/Wpsrv/Politics/Documents/Questions.Pdf. (accessed on 27th September 2021) Colleen E. Garcia, Regulating Nation-State Cyber Attacks in Counterterrorism Operations (June -2010) https://apps.dtic.mil/sti/citations/ADA524566 (accessed on 27th September 2021) 11 ‘Per Dod Guidance, all military operations must be in compliance with the laws of armed conflict—this includes cyber operations as well. The law of war principles such as military necessity, proportionality and distinction will apply when conducting cyber operation.’ 12 Prosecutor V. Tadic, Case No. It-94-1-I, Decision on The Defence Motion for Interlocutory Appeal on Jurisdiction, 70 (Int’l Crim. Trib. For The Former Yugoslavia Oct. 2, 1995) . 13 Prosecutor V. Tadic, Case No. It-94-1-A, Appeals Chamber Judgment 131-40, 145 (Intl’l Crim. Trib. For The Former Yugoslavia July 15, 1999). See Also Application of the Convention on The Prevention and Punishment of The Crime of Genocide (Bosn. & Herz. V. Serb. & Montenegro.), 2007 I.C.J. 108, 404 (Feb. 26); Http://Www.Icc-Cpi.Int/Iccdocs/Doc/Doc266175.Pdf (accessed on 27th September 2021) 14 Michael N. Schmitt, The Law of Cyber Warfare: Quo Vadis? Stanford Law & Policy Review, Vol. PP 25:269 https://law.stanford.edu/publications/law-cyber-warfare-quo-vadis/ (accessed on 27th September 2021) 15 Tallinn Manual, At 74, of The Red Cross, Interpretive Guidance on the notion of direct participation in hostilities under international humanitarian law 43 (Nils Melzer Ed., 2009), Http://Www.Icrc.Org/Eng/Resources/Documents/Publication/P0990.Htm. (Accessed on 27th October) 8 International armed conflicts are generally governed by International Humanitarian Law (hereinafter referred to as IHL) and Customary International Law16; the four Geneva Conventions and the Additional Protocol provide the legal framework for regulating conduct during warfare. However, it has already been 72 years, since the beginning of modern warfare in cyber space without using traditional means and methods. Therefore, it is questionable whether the above-mentioned old laws and mechanisms can be applicable to Cyber Warfare in the present context. Also, there should be a clear determination of to what extent a cyber-attack amounts to an armed conflict and how these types of attacks may count as the fundamental crimes recognized under Article 6, Article 7, and Article 8 of the Rome Statute. According to the literature, the IHL regulates the conduct of parties during an armed conflict. Although the IHL does not provide any provisions for penalties regarding the violations of fundamental crimes, since the Nuremberg Tribunal, Tokyo Tribunal, United Nations Security Council Ad-hoc tribunals, and also the International Criminal Court, have prosecuted violations of fundamental crimes. Certain punishments are provided for armed conflicts under international criminal law, and the Rome Statute criminalizes certain conduct that amounts to serious crimes in this context. 3.3 Cyber Warfare as an ‘Attack’ The Common Article 2 of the Geneva Conventions states the necessity of an attack as follows; “The present Convention shall apply to all cases of declared war or of any other armed conflict which may arise between two or more of the high contracting parties, even if the state of war is not recognized by one of them.’’17 Therefore, cyber operations resulting in either severe injuries or deaths of people or damage or destruction of property can amount to attacks under IHL. 3.4 Legal principles that are applicable to Cyber Warfare As previously noted, in the present context of international law, violations of Cyber-attacks will be regulated according to the principles of the law of armed conflict and the United Nations Charter 16 18 . Jonathan Crowe And Kylie Weston-Scheuber, Principles of International Humanitarian Law, Vol.21, Issue 2, Article 7 (Edward Elgar Publishing -2013). https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=1915&context=hrbrief (accessed on 27th September 2021) 17 Geneva Convention for the Relief of Wounded and Sick Armed Forces in the Field, Art. 2, Aug. 12, 1949, 75 U.N.T.S. 970 18 Charter of The United Nations and Statute of The International Court of Justice https://treaties.un.org/doc/publication/ctc/uncharter.pdf (here in after refer as UN Charter) (accessed on 27th September 2021) 9 The ‘jus ad bellum’ codified by the U.N Charter applies to an ongoing war when nations may use force. According to Article 2(4), the U.N charter prohibits states from using force except when conducted in self defense as provided under Article 51 or under the auspices of the Security Council in accordance with Article 39. States that have signed onto the U.N Charter have agreed to abide by these rules when waging conventional wars. 19 Certain actions are prohibited under international humanitarian law (IHL) "during an armed conflict" (jus in bello). The Hague Conferences, Geneva Conventions, and customary international law specify how force may be used during war, whereas International Criminal Law criminalizes certain behaviours and provides for punishments "once the conflict has ended" (jus post bellum). It governs behaviour during war. Military necessity, proportionality, perfidy, distinction, neutrality, and discrimination are also applicable as principles in that manner. According to the above laws and principles, it is needed to understand how these principles do or should apply to cyberweapons.20 Another question is whether these long-standing laws and principles of armed conflict are sufficient to regulate and punish cyber warfare. 3.5 International Convention on Cybercrime. The states have already attempted to address cyber criminality since 1998. 21 In 2000, the UN General Assembly also called upon states to ‘‘ensure that their laws and practices eliminate safe havens for those who criminally misuse information technologies’’22 19 Dorothy E. Denning, The Ethics of Cyber Conflict, In the Handbook of Information and Computer Ethics Eds. K. E. Himma and H. T. Tavani, 4 (Hoboken, Nj: Wiley, 2008). Colleen E. Garcia, Regulating NationState Cyber Attacks in Counterterrorism Operations, (June -2010) 20 Colleen E. Garcia, Regulating Nation-State Cyber Attacks in Counterterrorism Operations (June2010), William A. Owens, Kenneth W. Dam, and Herbert S. Lin, Technology, Policy, Law, and Ethics Regarding the United States' Acquisition and Use of Cyber-Attack Capabilities (Washington, D.C.: The National Academies Press, 2009), P 3–20. 21 Marco Roscini, Gravity in The Statute of The International Criminal Court and Cyber Conduct That Constitutes, Instigates or Facilitates International Crime, Criminal Law Forum (2019) 30:247–272 22 (Un General Assembly Resolution 55/63, 4 December 2000, Para. 1; Marco Roscini, Gravity in The Statute of The International Criminal Court and Cyber Conduct That Constitutes Instigates or Facilitates International Crime, Criminal Law Forum (2019) 30: P247–272 10 The Convention on cybercrimes is the first and only international treaty to deal with breaches of law: happening over the Internet or other information networks. This was adopted in 2001 by the Council of Europe and entered into force in 2004. ‘Thirty countries, including the United States, have signed and this Convention requires state signatories to “update and harmonize their criminal laws against hacking, infringements on copyrights, computer facilitated fraud, child pornography, and other illicit cyber activities’’. 23 This Convention also seeks to harmonize national laws, improve cybercrime investigation techniques, and improve international cooperation.24 While analysing the existing international law which applies to cyberspace, ‘the debate about the qualification of cyber-attacks as fundamental crimes under International Criminal Law is still ongoing and has not produced definitive answers.25 4. Analysis of the Rome Statute and its Jurisdiction on Cyber Warfare As it was mentioned previously, the IHL does not provide any punishments for violations of an armed conflict. After the 1st world war, the 1919 Peace Treaty of Versailles (Article 229 (2)) attempted to prosecute for IHL violations. However, in 2002, the International Criminal Court was established26. As a permeant institution; the International Criminal Court shall have the power to exercise its jurisdiction over persons for the most serious crimes of international concern.’27 It means the Rome 23 Convention On Cybercrime, Council of Europe, http://Conventions.Coe.Int/Treaty/En/Treaties/Html/185.Htm(accessed on 27th September 2021) 24 https://Www.Unodc.Org/E4j/En/Cybercrime/Module-3/Key-Issues/International-And-RegionalInstruments.Html, Https://Www.Coe.Int/En/Web/Cybercrime/Home (accessed on 27th September 2021) 25 Gian Piero Greco, Cyber-Attacks as Aggression Crimes in Cyberspace in The Context of International Criminal Law, European Journal of Political Science Studies Volume 4, Issue 1 (2020) 26 Rome Statute of The International Criminal Court, A/Conf.183/9 Of 17 July 1998, Done at Rome on 17 July 1998, In Force On 1 July 2002, United Nations, Treaty Series, Vol. 2187, No. 38544, Depositary: SecretaryGeneral of The United Nations. 27 Un General Assembly, Rome Statute of The International Criminal Court, 17 July 1998, Article 1, The CourtAn International Criminal Court ("the court") is hereby established. It shall be a permanent institution and shall have the power to exercise its jurisdiction over persons for the most serious crimes of international concern, as referred to in this statute, and shall be complementary to national criminal jurisdictions. The jurisdiction and functioning of the court shall be governed by the provisions of this statute 11 Statute is applicable for violations of serious breaches of international law in an armed conflict and entails not only state responsibility, but also individual criminal responsibility. In article 5, the Rome statue limits its jurisdiction to the most serious crimes. Furthermore, the following crimes have been identified as serious crimes under the Rome Statute. a) The Crime of Genocide,28 b) Crimes against Humanity,29 c) War Crimes30 d) The crime of Aggression31 According to some literature International Humanitarian Law meets International Criminal Law through Article 5, Articles, 6, 7, 8 and 8 bis.32 However, the Rome Statute does not provide any provisions explicitly regarding Cyber Warfare. 5. Why does the Rome Statute need to be amended? The means and methods of war are rapidly changing. Therefore, as previously noted, several issues related to Cyber Warfare seem to emerge under the Rome Statute. The perpetrator may carry out the attack without giving any warnings. Furthermore, in most cases, it is difficult to categorize the act as an act of Cyber Warfare. While the attack is carried out through a virtual platform, it is difficult to Un General Assembly, Rome Statute Of The International Criminal Court, 17 July 1998, Article 6 – ‘For the purpose of this Statute, "Genocide" means any of the following acts committed with intent to destroy, in whole or in part, A National, Ethnical, Racial Or Religious Group, as such: (a) killing members of the group; (b) causing serious bodily or mental harm to members of the group; (c) deliberately inflicting on the group conditions of life calculated to bring about its physical destruction in whole or in part; (d) imposing measures intended to prevent births within the group; (e) forcibly transferring children of the group to another group’. 28 29 Un General Assembly, Rome Statute of The International Criminal Court, 17 July 1998, Article 7 states that for the purpose of this Statute, "crime against humanity" means any of the specified acts when committed as part of a widespread or systematic attack directed against any civilian population, with knowledge of the attack: 30 Un General Assembly, Rome Statute of The International Criminal Court, 17 July 1998, Article 8 refers to war crimes - The Court shall have jurisdiction in respect of war crimes in particular when committed as part of a plan or policy or as part of a large-scale commission of such crimes. 31 UN General Assembly, Rome Statute of the International Criminal Court, 17 July 1998, Article 8 bis states that “crime of aggression” means the planning, preparation, initiation or execution, by a person in a position effectively to exercise control over or to direct the political or military action of a state, of an act of aggression which, by its character, gravity, and scale, constitutes a manifest violation of the Charter of the United Nations. 32 Aman Kumar, Placing Cyber Warfare Within the Rome Statute Framework (November 16, 2019). International Humanitarian Law: A Reflection on 70 Years of Geneva Conventions 1949 Https://Ssrn.Com/Abstract=3514098(accessed on 27th September 2021) 12 identify the opposing force in an armed conflict. Also, the attack must be counted as a serious crime which comes under the jurisdiction of the International Criminal Court. Another issue is territoriality; the location of the data, or the location of the data controller or the nationality of the data owner. 33 Some commentators argue that ‘the lack of sufficient evidence might be a significant obstacle to the identification and prosecution of those ‘‘most responsible’’ for the crimes involving conduct in cyberspace.’34 However, because of the incompletion of the law relating to these issues in the Rome Statute; prosecuting such cases may become more comprehensive and challenging to enforce for criminal justice.35 According to the Rome Statute the gravity of the crime is the most important element. When concern about the application of the gravity threshold of cyber conduct which might come under the jurisdiction of the International Criminal Court, there are several issues which may arise. There must be sufficient gravity in order to determine or assess the gravity of a specific cyber conduct. The preamble of the 33 When it comes to define the cyber space operations; the cloud means servers that have access over the internet. the software and databases run on those servers. a number of issues rise with regarding this cloud computing as there is no any certain law to interpret about such online methods and it is very complected to gain electronic evidence for criminal justice purposes to impose the responsibility upon the perpetrator. following issues may rise such as; ‘location of data? nationality of owner of data? location of data controller? headquarters of a cloud service provider? subsidiary of a cloud service provider? territory where a cloud provider is offering its services? laws of the territory where the data owner has subscribed to a service? the territory of the criminal justice authority’ Jan Kleijssen And Pierluigi Perri, Cybercrime, Evidence and Territoriality: Issues and Options, Chapter 7 (T.M.C. Asser Press and The Authors -2017); M. Kuijer and W. Werner (Eds.), Netherlands Yearbook of International Law (2016) Netherlands Yearbook of International Law47, 34 Article 53(2) Requires that there should be a ‘‘sufficient basis’’ for prosecution, which is arguably a higher standard than ‘‘reasonable basis to proceed’’; Marco Longobardo, Everything Is Relative, Even Gravity, 14 Journal of International Criminal Justice (2016), Pp. 1022–1023); Marco Roscini, Gravity in The Statute of The International Criminal Court and Cyber Conduct That Constitutes, Instigates or Facilitates International Crime, Criminal Law Forum (2019) 30:247–272 35 Colleen E. Garcia, Regulating Nation-State Cyber Attacks in Counterterrorism Operations (June -2010) ‘The National Research Council Finds: The conceptual framework that underpins the U.N. charter on the use of force and armed attack and today’s law of armed conflict provides a reasonable starting point for an international legal regime to govern cyber-attack. However, those legal constructs fail to account for non-state actors and for the technical characteristics of some cyber-attacks.’ William A. Owens, Kenneth W. Dam, And Herbert S. Lin, Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use or Cyber-Attack capabilities (Washington, Dc: The National Academies Press -2009) 13 Rome Statute stipulates that the International Criminal Court was established to prosecute only ‘the most serious crimes of concern to the international community as a whole’’36 Furthermore, Article 7 also stipulates that those crimes against humanity must be ‘‘committed as part of a widespread or systematic attack directed against the civilian population’’. Article 8 bis (1) states that an act of aggression must be ‘by its character, gravity and scale. Under article 8(1) of war crimes, provides that the Court prosecutes them ‘‘in particular when committed as part of a plan or policy or as part of a large-scale commission of such crimes.37 According to the literature, when Violations of IHL norms are prosecuted at the International Criminal Court under Article 8 of the Rome Statute; the list of war crimes explicitly does not address Cyber Warfare. 38 6. Recommendations As previously stated, the absence of Cyber Warfare as a war crime under Article 8 of the Rome Statute39 has resulted in some literature suggesting that the Rome Statute be amended to include Cyber Warfare as a war crime. However, researchers revealed that so many serious cyber-attacks have occurred globally, but because of the lack of enforcement of International Criminal Law; nobody has been sentenced. Furthermore, there is a lacuna in the legal framework regarding the investigation process as well as prosecuting those violations with proper evidence. 36 U.N General Assembly, Rome Statute of The International Criminal Court, 17 July 1998, Preambledetermined to these ends and for the sake of present and future generations, to establish an independent permanent international criminal court in relationship with the United Nations system, with jurisdiction over the most serious crimes of concern to the international community as a whole When discuss about the cyber-attacks in the context of armed conflict the ‘incidental loss of life or injury to civilians or damage to civilian objects or widespread, long-term and severe damage to the natural environment which would be clearly excessive in relation to the concrete and direct overall military advantage anticipated’’, would amount to war crimes under Article 8(2)(b)(i), (ii) and (iv), and Article 8(2)(e)(i) of the Rome Statute. cyber-attacks resulting in harmful physical consequences on individuals might also constitute acts of genocide (Article 6(a)), or, if they are ‘‘committed as part of a widespread or systematic attack directed against any civilian population, with knowledge of the attack’’, crimes against humanity (Article 7(1)(a) and (b)), whether or not they occur in the context of an armed conflict. 37 38 ); Marco Roscini, Gravity in The Statute of The International Criminal Court and Cyber Conduct That Constitutes, Instigates or Facilitates International Crime, Criminal Law Forum (2019) 30:247–272 39 Aman Kumar, Placing Cyber Warfare Within the Rome Statute Framework (November 16, 2019). International Humanitarian Law: A Reflection on 70 Years of Geneva Conventions 1949 Https://Ssrn.Com/Abstract=3514098 (accessed on 27th September 2021) 14 Therefore, the Rome Statute should be amended with the following amendments; a) There should be a clear legal definition of Cyber Warfare b) It should be mentioned that the threshold of the character, gravity, scale and other parameters that may constitute Cyber Warfare may amount to a serious crime. c) The international criminal court may provide assistance to any requesting state party who is conducting an investigation into cybercrimes. Furthermore, some literature has suggested establishing a special International Criminal Court for violations of serious crimes in Cyberspace; as a subdivision of the International Criminal Court or a separate judicial instrument. It is recommended that if the Rome Statute could be amended with an alternative tribunal, limited to the jurisdiction of cybercrimes which may amount to serious crimes recognized under the Rome Statute, the legal enforcement of cyber threats and cyber warfare would be strengthened.40 7. Conclusion The Rome Statute is an international legal instrument which is binding globally. Therefore, the International Criminal Court may strengthen the global integration of procedural and court proceedings on the most serious crimes of global concern in cyberspace.41 Although the Rome Statute is amended with specific alternations, the insufficiency of legal enforcement may cause harm to the peace and security of the nations. As this is a new aspect of war, the international community should move on from the long-standing international laws and specifically should amend the Rome Statute with new enforceable laws which can explicitly address Cyber Warfare. (Word count -4448 words) 40 Stein Schjolberg Norwa, An International Criminal Tribunal for Cyberspace (ICTC), A paper for the East West Institute (EWI), Cybercrime Legal Working Group (March 2012) 41 An International Criminal Tribunal for Cyberspace (ICTC) By Judge Stein Schjolberg Norwa A paper for the EastWest Institute (EWI) Cybercrime Legal Working Group by Judge Stein Schjolberg March 2012 15 Bibliography International Instruments Rome Statute of The International Criminal Court, 17 July 1998 https://www.icc-cpi.int/ , https://treaties.un.org/ (accessed on 27th September 2021) Geneva Convention for The Amelioration of The Condition of The Wounded and Sick in Armed Forces in The Field, Art. 2, Aug. 12, 1949, 75 U.N.T.S. 970 Charter of The United Nations and Statute of The International Court of Justice https://treaties.un.org/doc/publication/ctc/uncharter.pdf (here in after refer as UN Charter) (accessed on 27th September 2021) Convention On Cybercrime, Council of Europe, http://Conventions.Coe.Int/Treaty/En/Treaties/Html/185.Htm(accessed on 27th September 2021) List of Cases Prosecutor V. Tadic, Case No. It-94-1-I, Decision on The Defence Motion for Interlocutory Appeal on Jurisdiction, 70 (Int’l Crim. Trib. For The Former Yugoslavia Oct. 2, 1995) . Application of the Convention on The Prevention and Punishment of The Crime of Genocide (Bosn. & Herz. V. Serb. & Montenegro.), 2007 I.C.J. 108, 404 (Feb. 26) Journal Articles and Reports Achmad M, Naswar, Assidiq A, Syafira A, Napang A, Hendrapati M, ‘Qualifying Cyber Crime as A Crime of Aggression in International Law’, (2020)13 No.2, P 397-418 Alexander K, “Advance Questions for Lieutenant General Keith Alexander, USA, Nominee for Commander, United States Cyber Command,” Http://Www.Washingtonpost.Com/Wpsrv/Politics/Documents/Questions.Pdf. (accessed on 27th September 2021) Aman Kumar, Placing Cyber Warfare Within the Rome Statute Framework (November 16, 2019). International Humanitarian Law: A Reflection on 70 Years of Geneva Conventions 1949 Https://Ssrn.Com/Abstract=3514098(accessed on 27th September 2021) Crowe J And Scheuber K S, Principles of International Humanitarian Law, Vol.21, Issue 2, Article 7 (Edward Elgar Publishing -2013). https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=1915&context=hrbrief (accessed on 27th September 2021) De Figueiredo R M, Mirand C, ‘Cyber Warfare in The Context of International Criminal Law’, (2016) (accessed on 27th September 2021) 16 Denning D E, The Ethics of Cyber Conflict, In the Handbook of Information and Computer Ethics Eds. K. E. Himma and H. T. Tavani, 4 (Hoboken, Nj: Wiley, 2008). Freestone D, “International Cooperation Against Terrorism and The Development of International Law Principles of Jurisdiction,” 1.ed. Rosalyn Higgins, Maurice Flory, Terrorism and International Law (New York: Routledge, 1997) Pg 43 Garcia C E, Regulating Nation-State Cyber Attacks in Counterterrorism Operations (June -2010) https://apps.dtic.mil/sti/citations/ADA524566 (accessed on 27th September 2021) Gercke M, Understanding Cybercrime: Phenomena, Challenges and Legal Response, International Telecommunication Union, (Sept. 2012) https://www.itu.int/en/ITD/Cybersecurity/Pages/legislation.aspx , (accessed on 27th September 2021) Gianpiero G, ‘Cyber-Attacks as Aggression Crimes in Cyberspace in The Context of International Criminal Law’, European Law Journal of Political Studies, Volume 4, Issue 1 , (2020) https://www.researchgate.net/publication/351614276_cyberattacks_as_aggression_crimes_in_cyberspace_in_the_context_of_international_criminal_law (accessed on 27th September 2021) Greco G P, Cyber-Attacks as Aggression Crimes in Cyberspace in The Context of International Criminal Law, European Journal of Political Science Studies Volume 4, Issue 1 (2020) Kleijssen J And Perri P, Cybercrime, Evidence and Territoriality: Issues and Options, Chapter 7 (T.M.C. Asser Press and The Authors -2017); M. Kuijer and W. Werner (Eds.), Netherlands Yearbook of International Law (2016) Netherlands Yearbook of International Law47 Norwa S S, An International Criminal Tribunal for Cyberspace (ICTC), A paper for the East West Institute (EWI), Cybercrime Legal Working Group (March 2012) Roscini M, Gravity in The Statute of The International Criminal Court and Cyber Conduct That Constitutes, Instigates or Facilitates International Crime, Criminal Law Forum (2019) 30:247–272 Rowe N C. “War Crimes from Cyber-Weapons.” Journal of Information Warfare 6, no. 3 (2007) Pg 15–25. https://www.jstor.org/stable/26503486 (accessed on 27th September 2021) Schreier F, On Cyberwarfare, DCAF Horizon, (Working Paper No 07 -2015) https://www.dcaf.ch/sites/default/files/publications/documents/OnCyberwarfare-Schreier.pdf (accessed on 27th September 2021) Serabian J A, “Cyber Threats and The U.S. Economy,” Central Intelligence Agency Https://Www.Cia.Gov/News-Information/Speeches-Testimony/2000/Cyberthreats_022300.Html (accessed on 27th September 2021) Schmitt M N, The Law of Cyber Warfare: Quo Vadis? Stanford Law & Policy Review, Vol. Pg 25:269 https://law.stanford.edu/publications/law-cyber-warfare-quo-vadis/ (accessed on 27th September 2021) 17 Schreier F, On Cyberwarfare, (2015 - DCAF Horizon) Working Paper https://www.dcaf.ch/sites/default/files/publications/documents/OnCyberwarfare-Schreier.pdf (accessed on 27th September 2021) Tallinn Manual, At 74, of The Red Cross, Interpretive Guidance on the notion of direct participation in hostilities under international humanitarian law 43 (Nils Melzer Ed., th Http://Www.Icrc.Org/Eng/Resources/Documents/Publication/P0990.Htm. (Accessed on 27 October) 18 2009),