Preview

Kutafin Law Review

Advanced search

Controls for the Use of Cyber Weapons in the Light of International Humanitarian Law: What are the International Efforts to Legally Regulate Cyber Weapons?

https://doi.org/10.17803/2713-0533.2026.1.35.100-135

Abstract

The article analyzes the controls on the use of cyber weapons in the light of international humanitarian law. This is to show the extent to which the rules of international humanitarian law can be applied to cyber weapons. Cyberspace, in particular, is considered one of the modern fields that man has sought to develop and exploit in a way that achieves interests. Therefore, the concept of cyber weapons, the means and attacks that take place in it, and the scope of international recognition of these weapons will be clarified. The study also shows the appropriateness of the rules of international humanitarian law to be applied to these weapons. In conclusion, the authors formulate a set of results and recommendations. The most important of which is that the use of cyber weapons led to the creation and imposition of the concept of unconventional warfare that enables the conflicting parties, whether States or other parties, to launch attacks on other parties and inflict severe damage on all economic and social aspects. Finally, countries must seek to find new strategies that are compatible with the special nature that distinguishes cyberspace from physical reality and with the security challenges that arise with the continuous development of technology. The international legal rules regulating wars and conflicts must be reviewed in a manner consistent with the continuous technical and technological development. The international criminal justice system must also be activated, and cyber weapons must be included in agreements related to the control of the use of weapons.

About the Authors

T. Al-Billeh
Applied Science Private University
Jordan

Tareq Al-Billeh, PhD (Public Law), Associate Professor, Faculty of Law, Practicing Lawyer

Amman



Sh. Morad
Applied Science Private University
Jordan

Shahd Morad, LLM (Public Law), Lecturer, Faculty of Law, Practicing Lawyer

Amman



References

1. Abdali, A., (2008). Fear industry in the media and its impact on public opinion. Criterion Journal, 8(16), pp. 283–300. Available at: https://www.asjp.cerist.dz/en/article/16309.

2. Abdel Hamid, S., and a Atef, Y., (2015). Media and Cyberspace. Cairo: Atlas for publishing and media production.

3. Abdel-Sabour, S., (2017). Cyber conflict: The nature of the concept and the characteristics of the actors. Journal of International Politics, 52 (208), pp. 5–10. Available at: https://www.siyassa.org.eg/News/12076.aspx.

4. Abdul Hamid, Y., (2020). International Legal Challenges to Regulating Artificial Intelligence — The Case of Autonomous Weapons. Legal Journal, 8 (9), pp. 3127–3168. Available at: https://journals.ekb.eg/article_141847.html.

5. Abdul Rahman, I., (2003). Primary foundations of international humanitarian law. Cairo: Arab Future House.

6. Abdul Sadiq, A., (2017). Patterns of cyber warfare and its implications for global security. Journal of International Politics, 52 (208), pp. 31–36. Available at: http://www.siyassa.org.eg/News/12072.aspx.

7. Abdul Salam, T. and Al-Atabi, M., (2018). Psychological warfare and its use in the strategy of the ISIS entity (analytical psychological study). Inspector General Journal, 1(23), pp. 39–123. Available at: https://www.iasj.net/iasj/article/159736.

8. Abdul Wahed, S., (2021). Cyber wars; A study in its concept, characteristics and ways to confront it. Master’s Thesis, Middle East University.

9. Abdul-Ghaffar, F., (2016). Electronic Warfare. Amman: Al-Janadriyah for publication and distribution.

10. Al Makhmari, M., Al-Hammouri, A., Al-Billeh, T. and Almamari, A., (2024). Criminal liability for misuse of social media in Omani and UAE legislation. International Journal of Cyber Criminology, 18(2), pp. 92–106. Available at: https://cybercrimejournal.com/menuscript/index.php/cybercrimejournal/article/view/420/121.

11. Al-Billeh, T., (2022a). Freedom of Religious Belief and the Practice of Religious Rites According to the Jordanian Legislation: DiMcult Balance between International and Regional Requirements as well as the National Legislative Controls. Balkan Social Science Review, 20, pp. 117–137. Available at: https://js.ugd.edu.mk/index.php/BSSR/article/view/5503/4660.

12. Al-Billeh, T., (2022b). Legal Controls of the Crime of Publishing a Program on the Internet in Jordanian Legislation. Pakistan Journal of Criminology, 14(1), pp. 1–14. Available at: http://www.pjcriminology.com/publications/legal-controls-of-the-crime-of-publishing-a-program-on-the-internet-in-jordanian-legislation/.

13. Al-Billeh, T., Al-Hammouri, A., Khashashneh, T., Makhmari, M.A. and Al Kalbani, H., (2024a). Digital Evidence in Human Rights Violations and International Criminal Justice. Journal of Human Rights Culture and Legal System, 4(3), pp. 842–871, doi: 10.53955/jhcls.v4i3.446.

14. Al-Billeh, T., Hmaidan, R., Al-Hammouri, A. and Makhmari, M.A., (2024b). The Risks of Using Artificial Intelligence on Privacy and Human Rights: Unifying Global Standards. Jurnal Media Hukum, 31(2), pp. 333–350, doi: 10.18196/jmh.v31i2.23480.

15. Al-Burhami, A.R. and Ali, M., (2022). Cyberspace and Its Impact on the Concepts of Power, Security and Conflict in International Relations. Journal of Politics and Economics, 16(15), pp. 423–430, doi: 10.21608/jocu.2022.134235.1172.

16. Al-Burhami, M., (2022). Cyberspace and its impact on the concepts of power, security and conflict in international relations. Journal of the Faculty of Politics and Economics, 16(15), pp. 423–443. Available at: https://jocu.journals.ekb.eg/article_248952.html.

17. Al-Busaili, J., (1990). Electronic warfare and its impact on wars. Kuwait: The Arab Institute for Studies and Publishing.

18. Al-Daami, G., (2019). Public opinion-making from the age of print to the Internet: inherited traditions and absolute power. Amman: Dar Amjad for publication and distribution.

19. Al-Dabbagh, M., (1997). Reference in psychological warfare. Beirut: The Arab Institute for Studies and Publishing.

20. Al-Dulaeen, N., (2014). Advocacy and psychological warfare. Amman: Dar Al-Aasar Al-Alami for publication and distribution.

21. Al-Fatlawi, A., (2016). Cyber attacks: their concept and the international responsibility arising from them in the light of contemporary international organization. Al-Hilli Journal of Legal and Political Sciences, 8(4), pp. 611–687. Available at: https://iasj.net/iasj/download/3f12bd1a72924acd.

22. Al-Khawajah, N., Al-Billeh, T. and Manasra, M., (2023). Digital Forensic Challenges in Jordanian Cybercrime Law. Pakistan Journal of Criminology, 15(3), pp. 29–44. Available at: https://www.pjcrimi-nology.com/publications/digital-forensic-challenges-in-jordanian-cy-bercrime-law/.

23. Alkhseilat, A., Billeh, T.A., Albazi, M. and Ali, N.A., (2024). The authenticity of digital evidence in criminal courts: a comparative study. International Journal of Electronic Security and Digital Forensics, 16(6), pp. 720–738, doi: 10.1504/ijesdf.2024.142010.

24. Al-Mubaideen, S., (2020). E-government: models, applications and international experiences. Amman: Al-Yazuri Scientific House for publication and distribution.

25. Al-Sadiq, A., (2006). Cyberpower: Weapons of Mass Proliferation in the Age of Cyberspace. Cairo: Arab Center for Cyberspace Research.

26. AlSadiq, A.A., (2016). Cyberspace and international relations, a study in theory and practice. Cairo: Academic Library.

27. Al-Shammari, S. and Ismail, Z., (2020). Cybersecurity as a new pivot in the Iraqi strategy. Al-Nahrain University Journal 62, pp. 273–296.

28. Al-Sheikh, N., (2019). Psychological wars, rumors and self-destruction. Journal of International Politics, 218(54), pp. 248–253.

29. Al-Shuaibi, M. and Al-Naqeeb, N., (2022). Electronic war tongues. Journal of Educational Sciences and Human Studies 25(1), pp. 537–573, doi: 10.55074/hesj.v0i25.544.

30. Al-Tai, A., (2018). Conventional wars and cyber wars, a comparative study of concepts and rules of engagement. Journal of Legal and Political Sciences, 16(2), pp. 5–40. Available at: https://drive.google.com/file/d/12oegM-Vvvlpms3Pk2HvfwheB6qfzK-8T/view.

31. Amar, O., (2019). Cyber Warfare Under International Humanitarian Law. Dirasat: Shari’a and Law Sciences, 46(3), pp. 134–155. Available at: https://journals.ju.edu.jo/DirasatLaw/article/view/101907/10621.

32. Ashour, F., (2018). The impact of cyberspace on national security. Master Thesis, Kasdi Merbah University.

33. Belqziz, A., (1989). Arab national security. Cairo: The Egyptian General Book Organization.

34. Bernstein, S., (2018). Reckoning with the Cyber Revolution: A Journalist’s Take on Cyber Weapons. SAIS Review of International Affairs, 38(2), pp. 133–35, doi: 10.1353/sais.2018.0023.

35. Berri, M., (2019). Cybernetics, the science of the ability to communicate, control and control. Beirut: The Islamic Center for Strategic Studies.

36. Bougrara, Y., (2018). Cybersecurity The strategy for security and defense in cyberspace. Journal of African Studies and the Nile Basin, Arab Democratic Center, 1(3), pp. 100–120. Available at: https://www.democraticac.de/?p=56084.

37. Chang, N., (2014). Cyber Weapons and Transition in Security Dilemma. Journal of International Area Studies, 17(4), pp. 379–403, doi: 10.18327/jias.2014.01.17.4.379.

38. Czosseck, C. and Podins, K., (2012). A Vulnerability-Based Model of Cyber Weapons and Its Implications for Cyber Conflict. International Journal of Cyber Warfare and Terrorism, 2(1), pp. 14–26, doi: 10.4018/ijcwt.2012010102.

39. Dahmani, S., (2017). The impact of cyber threats on national security: the United States of America as a model. Master’s Thesis, Mohamed Boudiaf University.

40. Darwish, S., (2016). What is electronic warfare in light of the rules of international law? Annals of the University of Algiers, 29, pp. 117–137. Available at: https://www.asjp.cerist.dz/en/article/6724.

41. Dempsey, P., (2020). News — Comment. View from Washington: Cyber Security — Iranian Hackers’ Weapons of Muddled Digitisation. Engineering & Technology, 15(1), 12, doi: 10.1049/et.2020.0116.

42. Dinstein, Y., (2012). The principle of distinction and Cyber war in international armed conflicts. Journal of Conflict and Security Law, 17(2), pp. 261–277, doi: 10.1093/jcsl/krs015.

43. Dwan, J.H., Paige, T.P. and McLaughlin, R., (2022). Pirates of the Cyber Seas: Are State-Sponsored Hackers Modern-Day Privateers? Law, Technology and Humans, 3(2), pp. 49–62, doi: 10.5204/lthj.1583.

44. Farhat, A., (2019). Cyberspace Shaping the Battlefield of the 21st Century. Journal of Legal and Political Sciences, 10(3), pp. 88–107. Available at: https://www.asjp.cerist.dz/en/article/108478.

45. Geers, K., (2010). Cyber Weapons Convention. Computer Law & Security Review, 26(5), pp. 547–551, doi: 10.1016/j.clsr.2010.07.005.

46. Ghoneim, M., (2019). Towards an integrated model for the study of existence in cyberspace: Al-Hajrasy as a model. Scientific Journal of Libraries, Documentation and Information, 1(1), pp. 253–406. Available at:https://jslmf.journals.ekb.eg/article_24939.html.

47. Haataja, S., (2022). Nicole Perlroth (2021) This Is How They Tell Me the World Ends: The Cyberweapons Arms Race. New York: Bloomsbury Publishing. Law, Technology and Humans, 4(2), pp. 230–232, doi: 10.5204/lthj.2658.

48. Hilali, A., (1997). Inspection of computer systems and the accused’s information guarantees. Cairo: Arab Renaissance House.

49. Hilmi, N., (1999). International law according to the rules of public international law. Cairo: Arab Renaissance House.

50. Horschig, D., (2020). Cyber weapons in Nuclear Counter-Proliferation. Defense & Security Analysis, 36(3), pp. 352–371, doi: 10.1080/14751798.2020.1790811.

51. Isa, H.A., Alwerikat, N. and Al-Billeh, T., (2022). The Concept of the Public Employee in Jordanian Law: Different Constitutional, Administrative, and Criminal Law Definitions. BiLD Law Journal, 7(2s), pp. 331–337. Available at: https://bildbd.com/index.php/blj/article/view/318.

52. Khalifa, I., (2014). Electronic force and dimension shift in force properties. Alexandria: Library of Alexandria.

53. Khashashneh, T., Al-Billeh, T., Al-Hammouri, A. and Belghit, R., (2023). The importance of digital technology in extracting electronic evidence: how can digital technology be used at crime scenes? Pakistan Journal of Criminology, 15(4), pp. 69–85.

54. Mukhtar, M., (2015). Can countries avoid the dangers of cyberattacks? Future Concepts. Future Center for Research and Development.

55. Ni’ma, A., (2018). Cyber attacks. Beirut: Zain Legal Publications. Perlroth, N., (2021). This Is How They Tell Me the World Ends: The Cyber Weapons Arms Race. New York: Bloomsbury Publishing.

56. Ponangi, P., (2012). On the Offense: Using Cyber Weapons to Influence Cognitive Behavior. International Journal of Cyber Society and Education, 5(2), pp. 127–50, doi: 10.7903/ijcse.1101.

57. Rid, T. and McBurney, P., (2012). Cyber Weapons. The RUSI Journal, 157(1), pp. 6–13, doi: 10.1080/03071847.2012.664354.

58. Roscini, M., (2014). Cyber operations as nuclear counterproliferation measures. Journal of Conflict and Security Law, 19(1), pp. 133–157, doi: 10.1093/jcsl/krt028.

59. Saeed, W., (2013). The role of electronic warfare in the Arab-Israeli conflict. Master Thesis, An-Najah National University.

60. Samesim, H., (2010). Psychological war. Lebanon: The Cultural House for Publishing and Distribution.

61. Saud, Y., (2018). Cyber warfare in light of the rules of international humanitarian law. The Legal Journal, 4(4), pp. 80–108. Available at: https://jlaw.journals.ekb.eg/article_45192.html.

62. Schmitt, M.N., (2017). Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: An Analytical Vade Mecum. Harvard National Security Journal, 8, pp. 239–282. Available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3180699.

63. Shata, A., (1986). The Disobedient State: A Study of the Conflict Between States’ Positions and Their International Commitments at the United Nations, with reference to Israel and South Africa in particular. PhD Thesis, Cairo University.

64. Shehab, M., (2000). Studies in international humanitarian law. Cairo: Arab Future House.

65. Shloush, N., (2018). Electronic piracy in cyberspace “the rising threat to the security of states”. Journal of the Babylon Center for Humanitarian Studies, 8(2), pp. 185–206. Available at: https://iasj.net/iasj/download/bce8f50577f3c83f185-206.

66. Touré, H., (2011). International response to cyber warfare. Research on cyber security. International Communications Union.

67. Wardana, A., Gunaryo, G. and Yogaswara, Y.H., (2022). Development of Cyber Weapons to Improve Indonesia’s Cyber Security. Journal of Sosial Science, 3(3), pp. 453–459, doi: 10.46799/jss.v3i3.334.

68. William, B., (2011). Cyber conflict and geocyber stability. International Telecommunication Union and the International Federation of Scientists.

69. Zaruqa, E., (2019). Cyberspace and the shift in concepts of power and conflict. Journal of Legal and Political Science, 10(1), pp. 1016–1031. Available at: http://dspace.univ-eloued.dz/handle/123456789/5233.


Review

For citations:


Al-Billeh T., Morad Sh. Controls for the Use of Cyber Weapons in the Light of International Humanitarian Law: What are the International Efforts to Legally Regulate Cyber Weapons? Kutafin Law Review. 2026;13(1):100-135. https://doi.org/10.17803/2713-0533.2026.1.35.100-135

Views: 45

JATS XML


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2713-0525 (Print)
ISSN 2713-0533 (Online)