Navigating Legal Challenges in Drone Cyberattacks: The Case of the Kurdistan Region of Iraq

Authors

  • Sanh Shareef Qader Department of Law, Faculty of law, Political Sciences and Management, Soran University, Kurdistan Region, Iraq

DOI:

https://doi.org/10.21271/zjlp.23.38.1

Keywords:

Drone Cyberattacks, Sovereignty, Countermeasures, Responsibility of States for Internationally Wrongful Acts(RSIWA).

Abstract

This paper provides an international law perspective on the complexities of addressing drone cyberattacks against the KRI. It seeks to explore how drone cyberattacks intersect with established principles such as state sovereignty, the prohibition of intervention, and the prohibition of the use of force under international law. It applies relevant frameworks like the Tallinn Manual, the Articles on Responsibility of States for Internationally Wrongful Acts (ICL), and the UN Charter. This paper examines the legal foundation of countermeasures, including diplomatic, economic, and cyber responses, within the context of the KRI’s cooperation with the Iraqi federal government. Additionally, it explores how ICJ and the United Nations Security Council (UNSC) can respond to such attacks. Based on a qualitative research method, this study incorporates a review of legal documents, case studies, and expert opinions to assess drone cyberattacks in the framework of international law. The research also emphasizes the issues of proportionality and necessity in countermeasures, while highlighting the political and diplomatic constraints faced by the Kurdistan Region due to its relationship with the Iraqi state. The findings indicate that while the KRI is capable of implementing defensive strategies, determining appropriate international responses requires careful consideration of both legal norms and geopolitical factors.

References

- Books

Irani, P. K. (1964). International law and the use of force by states. [Online]. Oxford University Press. Last Accessed 4 September 2024 at: https://academic.oup.com/book/10823.

Marossi, A. & Bassett, M. (2015). Economic sanctions under international Law: Unilateralism, Multilateralism, Legitimacy, and Consequences. [online]. Den Haag: Springer. Last Accessed 15 September 2024 at: https://link.springer.com/book/10.1007/978-94-6265-051-0.

Roscini, M. (2014) Cyber operations and the use of force in international law. [Online]. Oxford University Press. Last Accessed 1 September 2024 at: https://books.google.iq/.

Schmitt, M. N. (2017). Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. {Online}. Cambridge University Press. Last Accessed 19 November 2024 https://assets.cambridge.org/97811071/77222/frontmatter/9781107177222_frontmatter.pdf.

Schmitt, M.N. (2013) Tallinn Manual on the International Law Applicable to Cyber Warfare. {Online}. Vol. 141. Cambridge: Cambridge University Press. Last Accessed 21 July 2024 at: https://www.penncerl.org/wp-content/uploads/2021/12/6481-tallinn-manual-on-the-international-law-applicable.pdf .

- Theses

O'Meara, C. (2021). Necessity and Proportionality and the Right of Self-defence in International Law. PhD thesis, University College London. [online]. Last Accessed 15 September 2024 at: https://discovery.ucl.ac.uk/id/eprint/10057299/.

Scientific Journals

Boylan, E. (2017). Applying the Law of Proportionality to Cyber Conflict: Suggestions for Practitioners. [online]. Vanderbilt Journal of Transnational Law, 50, pp. 217-252. Last Accessed 15 September 2024 at: https://scholarship.law.vanderbilt.edu/cgi/viewcontent.cgi?article=1127&context=vjtl.

Brooks, R. (2014). Drones and the international rule of law. [Online]. Ethics & International Affairs, 28(1), pp. 83-103.Last Accessed 26 August 2024 at: https://scholarship.law.georgetown.edu/cgi/viewcontent.cgi?article=2296&context=facpub.

Chang, C. H. (2023). How Does the Tallinn Manual 2.0 Shed Light on the Threat of Cyber Attacks against Taiwan?. [online]. European Conference on Cyber Warfare and Security, 22(1), pp. 649-656. Last Accessed 10 September 2024: https://papers.academic-conferences.org/index.php/eccws/article/view/1294.

Check, T. (2022). The Tallinn Manual 2.0 on Nation-State Cyber Operations Affecting Critical Infrastructure. [online]. National Security Law Brief, 13, pp. 1-XX. Last Accessed 10 September 2024: https://digitalcommons.wcl.american.edu/cgi/viewcontent.cgi?article=1150&context=nslb.

Coco, A., Dias, T. and van Benthem, T. (2022). 'Illegal: The SolarWinds hack under international law. [Online]. European Journal of International Law, 33(4), pp. 1275-1286. Last Accessed 18 September 2024: https://academic.oup.com/ejil/article/33/4/1275/6881099.

Cornthwaite, J. L. (2019) Can we shoot down that drone? An examination of international law issues associated with the use of territorially intrusive aerial and maritime surveillance drones in peacetime. [Online]. Cornell International Law Journal, 52, p. 475. Last Accessed 30 August 2024 at: https://ww3.lawschool.cornell.edu/research/ILJ/upload/Cornthwaite-final.pdf.

Currier, E.O (2023). After action: The US drone program's expansion of international law justification for use of force against imminent threats. [Online]. Vanderbilt Law Review, 76, pp. 259. Last Accessed 25 August 2024 at: https://scholarship.law.vanderbilt.edu/cgi/viewcontent.cgi?article=4842&context=vlr .

Doyle, J. (2013). Rise of the robots: Western unmanned air operations in Iraq and Afghanistan, 2001 to 2010. {Online}. Air Power Review, 16(2), pp. 10-31. Last Accessed 3 July 2024 at: https://raf.mod.uk/what-we-do/centre-for-air-and-space-power-studies/aspr/apr-vol16-iss2-1-pdf/.

Goldsmith, J. and Loomis, A. (2021) Defend Forward and Sovereignty. [Online]. Hoover Working Group on National Security, Technology and Law. Aegis Series Paper, (2102). Last Accessed 31 August 2024 at: https://www.lawfaremedia.org/article/defend-forward-and-sovereignty.

Haataja, S. (2017). The 2007 cyber attacks against Estonia and international law on the use of force: an informational approach. [Online]. Law, Innovation and Technology, 9(2), pp. 159-189. Last Accessed 18 September 2024: https://www.tandfonline.com/doi/abs/10.1080/17579961.2017.1377914.

Henriksen, A. (2019) The end of the road for the UN GGE process: The future regulation of cyberspace. [Online]. Journal of Cybersecurity, 5(1), tyy009. Last Accessed 30 August 2024 at: https://watermark.silverchair.com/ .

Herzog, S. (2011). Revisiting the Estonian cyber attacks: Digital threats and multinational responses. [Online]. Journal of Strategic Security, 4(2), pp. 49-60. Last Accessed 18 September 2024: https://www.jstor.org/stable/26463926.

Jarose, J. (2023). Reconsidering the definition of 'attack' and 'damage' in cyber operations during armed conflict: Emerging subsequent state practice. [online]. The Adelaide Law Review, 44(2), pp. 317-338. Last Accessed 10 September 2024: https://search.informit.org/doi/abs/10.3316/informit.514594046455151.

Khan, A. (2023) The Ambiguity in International Law and Its Effect on Drone Warfare and Cyber Security. [Online]. MA Major Research Papers, 22. Last Accessed 8 September 2024: https://ir.lib.uwo.ca/politicalscience_maresearchpapers/22/ .

Krebs, S. (2023). Above the law: Drones, aerial vision and the law of armed conflict–a socio-technical approach. [Online]. International Review of the Red Cross, 105(924), pp. 1690-1728. Last Accessed 5 September 2024: https://www.cambridge.org/core/journals/international-review-of-the-red-cross/article/above-the-law-drones-aerial-vision-and-the-law-of-armed-conflict-a-sociotechnical-approach/37559D8B9692011DD91576B07D311E28.

Lotrionte, C. (2012). State sovereignty and self-defense in cyberspace: A normative framework for balancing legal rights. [Online]. Emory International Law Review, 26, pp. 825. Last Accessed 23 August 2024 at: https://scholarlycommons.law.emory.edu/cgi/viewcontent.cgi?article=1072&context=eilr.

Margulies, P. (2013). Sovereignty and cyber attacks: Technology's challenge to the law of state responsibility. [Online]. Melbourne Journal of International Law, 14(2), pp. 496-519. Last Accessed 25 August 2024 at: https://search.informit.org/doi/abs/10.3316/INFORMIT.117621131187624 .

Mimran, T. (2022). Between Israel and Iran: Middle-East attitudes to the role of international law in the cyber-sphere. [Online]. Baltic Yearbook of International Law Online, 20(1), pp. 209-235. Last Accessed 16 September 2024: https://www.balticyearbook.org.

O'Connell, M. E. (2009). Unlawful killing with combat drones: a case study of Pakistan, 2004-2009', in Bronitt, S. (ed.) Shooting to kill: The law governing lethal force in context. [Online]. Notre Dame Legal Studies Paper, (09-43). Last Accessed 4 September 2024 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1501144.

Rid, T. and Buchanan, B. (2015). Attributing cyber attacks. [Online]. Journal of Strategic Studies, 38(1-2), pp. 4-37. Last Accessed 19 August 2024 at: https://www.tandfonline.com/doi/full/10.1080/01402390.2014.977382?scroll=top&needAccess=true .

Sadeghi, S.S. (2016). Turkish strategy in the Iraqi Kurdistan and Syrian Kurdish region and Iran. {Online}. Iranian Review of Foreign Affairs, 7(24), pp. 57-84. Last Accessed 3 July 2024 at:: https://irfajournal.csr.ir/article_125139.html.

Sadurska, R. (1988). Threats of force. [Online]. American Journal of International Law, 82(2), pp. 239-268. Last Accessed 4 September 2024 at: https://www.cambridge.org/core/journals/american-journal-of-international-law/article/abs/threats-of-force/1C28A6B9CBB526C500B8CD6121504639.

Sayankina, S. (2017). Drone strikes in violation of territoriality: How are they justified?. [Online]. Journal of Territorial and Maritime Studies. Last Accessed 29 August 2024 at: https://www.journalofterritorialandmaritimestudies.net/post/2017/05/19/drone-strikes-in-violation-of-territoriality-how-are-they-justified.

Walzer, M. (2016). Just & unjust targeted killing & drone warfare. Daedalus, 145(4), pp. 12-24. Last Accessed 30 August 2024 at: https://direct.mit.edu/daed/article/145/4/12/27115/Just-amp-Unjust-Targeted-Killing-amp-Drone-Warfare.

Waxman, M. C. (2011). Cyber-attacks and the use of force: Back to the future of Article 2(4). [Online]. Yale Journal of International Law, 36, pp. 421. Last Accessed 3 September 2024 at: https://openyls.law.yale.edu/bitstream/handle/20.500.13051/6629/14_36YaleJIntlL421_2011_.pdf?sequence=2&isAllowed=y.

Yadron, D., Barrett, D. and Barnes, J. E. (2014). U.S. struggles for response to Sony hack. [Online]. The Wall Street Journal. Last Accessed 15 September 2024: https://www.wsj.com/articles/u-s-struggles-for-response-to-sony-hack-1418950806.

- Websites

Amwaj.media (2024). Rare attack near heart of Iraqi Kurdish power holds multiple messages. [Online]. Amwaj.media. Last Accessed 16 August 2024 at: https://amwaj.media/media-monitor/drone-strike-near-kdp-headquarters-sends-domestic-and-geopolitical-message .

Aydogan, B. (2024). Iraq’s Kurdish Regional Government says it thwarted drone attack on US-led coalition base. [Online]. Anadolu Ajansı. Last Accessed 16 August 2024 at: https://www.aa.com.tr/en/middle-east/iraq-s-kurdish-regional-government-says-it-thwarted-drone-attack-on-us-led-coalition-base/3109983#.

Azhari, T. (2024). Attack on Iraqi Kurdish gas field leads to major power cuts. [Online]. Reuters. Last Accessed 17 August 2024 at: https://www.reuters.com/world/middle-east/explosive-drone-strikes-iraqs-khor-mor-gas-field-sources-2024-01-25/ .

Best, K. L., Schmid, J., Tierney, S., Awan, J. A. L. A. L., Beyene, N. M., Holliday, M. A., & Lee, K. (2020). How to analyze the cyber threat from drones. [online]. RAND Arroyo Center. Last Accessed 16 September 2024: https://www.rand.org/pubs/research_reports/RR2972.html .

Cherry, L.M. and Pascucci, P.P. (2023). International law in cyberspace. American Bar Association. [Online]. Last Accessed 26 August 2024 at: https://www.americanbar.org/groups/law_national_security/publications/aba-standing-committee-on-law-and-national-security-60-th-anniversary-an-anthology/international-law-in-cyberspace/.

Doski, D. (2023). Kurdistan and the United States: ISIS defeated, what happens now?. {Online}. Wilson Center. Last Accessed 12 July 2024 at: https://www.wilsoncenter.org/article/kurdistan-and-united-states-isis-defeated-what-happens-now .

Faidhi, K. (2024). Khor Mor drone attack draws international condemnation. [Online]. Rudaw. Last Accessed 8 September 2024: https://www.rudaw.net/english/kurdistan/27042024.

Frantzman, S.J. (2021). US concerned after Turkey attacks refugee camp. [Online]. The Jerusalem Post. Last Accessed 16 July 2024 at: https://www.jpost.com/middle-east/us-concerned-after-turkey-attacks-refugee-camp-670217 .

Human Rights Watch (2024). Iraq: Iranian attack kills civilians in Erbil. [Online]. Last Accessed 17 July 2024 at: https://www.hrw.org/news/2024/01/22/iraq-iranian-attack-kills-civilians-erbil .

Iddon, P. (2024). U.S.-allied Kurdish security forces face unprecedented drone attacks. {Online}. Forbes. Last Accessed 3 July 2024 at: https://www.forbes.com/sites/pauliddon/2024/02/06/us-allied-kurdish-security-forces-face-unprecedented-drone-attacks/.

International armed conflict (2024). [online]. International Cyber Law. Last Accessed 10 September 2024 at: https://cyberlaw.ccdcoe.org/wiki/International_armed_conflict.

International Bar Association (2017) The Legality of Armed Drones Under International Law. Background paper by the International Bar Association’s Human Rights Institute. Adopted in May 2017. pp. 1-56. [Online]. Last Accessed 8 September 2024: https://www.ibanet.org/medias/B0B8AF88-FD20-44F8-A920-634484645113.pdf?context=bWFzdGVyfGFzc2V0c3w0Mzg3MDJ8YXBwbGljYXRpb24vcGRmfGFERmxMMmhpTWk4NE56azJNek00TVRreU5ERTBMMEl3UWpoQlJqZzRMVVpFTWpBdE5EUkdPQzFCT1RJd0xUWXpORFE0TkRZME5URXhNeTV3WkdZfGYzMjdhZjRjY2RhMDM0M2Y3NmVlOTFkYzFiZjQ2ODY3OTUwYmQ1MDE0NWUyNTg4OTEzMmI5Y2Q1NmEwOTA4NTU#:~:text=Article%202(4)%20of%20the,of%20Article%202(4).

Isamel, Y. (2022). Turkey’s growing military presence in the Kurdish region of Iraq. [Online]. The Washington Institute for Near East Policy, 18. Last Accessed 15 July 2024 at: https://www.washingtoninstitute.org/policy-analysis/turkeys-growing-military-presence-kurdish-region-iraq .

Jones, S.G., Newlee, D., Harrington, N. & Bermudez Jr, J.S. (2019). Iran’s threat to Saudi critical infrastructure: The implications of US-Iranian escalation. [online]. Last Accessed 15 September 2024 at: https://apo.org.au/node/253086.

Kurdistan Region of Iraq (2019). The Snapshot: KRI. Brand KR. [online]. Last Accessed 16 September 2024: https://brandkri.com/the-krg-structure/.

Ministry for Europe and Foreign Affairs. (2023). Attack in Iraqi Kurdistan (31 December 2023). [Online]. Last Accessed 18 August 2024 at: https://www.diplomatie.gouv.fr/en/country-files/iraq/news/article/attack-in-iraqi-kurdistan-31-dec-2023 .

Moynihan, H. (2019) The application of international law to state cyberattacks. Chatham House. Last Accessed 29 August 2024 at: www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks/2-application-sovereignty-cyberspace.

O'Connell, M.E. (2019). Drone attacks on Saudi Aramco oil installations. [Online]. Last Accessed 22 August 2024 at: https://scholarship.law.nd.edu/ndls_news/535/.

Oxford Research Group (2011). Discussion paper: Drone attacks, international law, and the recording of civilian casualties of armed conflict. [Online]. Last Accessed 25 August 2024 at: https://reliefweb.int/report/afghanistan/discussion-paper-drone-attacks-international-law-and-recording-civilian.

Schmitt, M. (2014). International Law and Cyber Attacks: Sony v. North Korea. [Online]. Just Security. Last Accessed 31 August 2024 at: https://www.justsecurity.org/18460/international-humanitarian-law-cyber-attacks-sony-v-north-korea/.

Sirwan, D. (2021). Drone wars in Iraq. {Online}Rudaw, 25 June. Last Accessed 13 July 2024 at: https://www.rudaw.net/english/analysis/25062021.

Van Wilgenburg, W. (2024). Arab countries condemn Khor Mor gas field attack. [online]. KurdistanChronicle. Last Accessed 10 September 2024: https://kurdistanchronicle.com/b/3047.

Washington Kurdish Institute (2020) Turkey’s military aggression in Iraqi Kurdistan once again targets refugees. {Online}. 20 April. Last Accessed 15 July 2024 at: https://dckurd.org/2020/04/20/turkeys-military-aggression-in-iraqi-kurdistan-once-again-targets-refugees/.

- Legal Documents

UN General Assembly (1970) Declaration on Principles of International Law concerning Friendly Relations and Cooperation among States in accordance with the Charter of the United Nations, A/RES/2625(XXV), 24 October. [Online]. Last Accessed 8 September 2024: https://www.refworld.org/legal/resolution/unga/1970/en/19494.

UN General Assembly (1970). Declaration on Principles of International Law concerning Friendly Relations and Cooperation among States in accordance with the Charter of the United Nations, A/RES/2625(XXV). [Online]. Last Accessed 31 August 2024 at: https://www.refworld.org/legal/resolution/unga/1970/en/19494.

UN General Assembly (1974) Definition of aggression (A/RES/3314(XXIX)). [Online]. Last Accessed 29 August 2024 at: https://digitallibrary.un.org/record/190983?v=pdf&ln=en .

United Nations. (2001). Responsibility of States for Internationally Wrongful Acts. [Online]. Last Accessed 19 August 2024 at: https://legal.un.org/ilc/texts/instruments/english/draft_articles/9_6_2001.pdf.

International Law Commission. Responsibility of States for Internationally Wrongful Acts. [Online]. Supplement No. 10 (A/56/10), 2001. Last Accessed 19 November 2024 at: https://legal.un.org/ilc/texts/instruments/english/commentaries/9_6_2001.pdf .

- Legal Cases

International Court of Justice (1984). Nicaragua v. United States of America, 10 September. [Online]. Last Accessed 1 September 2024 at: https://www.icj-cij.org/case/70/intervention.

Downloads

Published

2025-06-04

How to Cite

Shareef, S. (2025). Navigating Legal Challenges in Drone Cyberattacks: The Case of the Kurdistan Region of Iraq. Zanco Journal of Law and Politics گۆڤاری زانكۆ بۆ یاساو رامیاری, 1–30. https://doi.org/10.21271/zjlp.23.38.1

Issue

Section

Articles