THE PROTECTION OF ENERGY INFRASTRUCTURES IN INTERNATIONAL ARMED CONFLICTS

Document Type : ISI

Authors

1 Associate Professor, Department of International Law, Faculty of Law, University Of Qom, Qom, Iran

2 Ph.D. Student in (Public International Law), Department of International Law, Faculty of Law, University of QOM, Qom, Iran

Abstract

The Energy Infrastructures are critical for countries in terms of economic and social aspects. The occurrence of international armed conflicts exposes them to destruction or disruption. These infrastructures have also faced modern cyber threats with the development of technology. Therefore, the international legal and humanitarian protections of these installations have become a paramount necessity. Such legal protections are applicable under international human rights and humanitarian law. The provisions of the Geneva Conventions and the First Additional Protocol, play a significant role in this between. This article has been written in a descriptive and analytical method, with the aim to conceive the nature of these international legal obligations and to understand the state of these rules and regulations. The article eventually concludes that, by the emergence of new methods of warfare and the growing threats against the energy infrastructures, the protections stipulated in these instruments appear to be inefficient. The initiatives of governments and international organizations to codify the legal rules and regulations, although non-binding in nature, need to keep pace with the increasing threats.

Keywords


الف) فارسی
1. اسمعیل‌زاده ملاباشی، پرستو؛ عبداللهی، محسن؛ زمانی، سید قاسم (1396). «حملات سایبری و اصول حقوق بین‌الملل بشردوستانه (مطالعۀ موردی: حملات سایبری به گرجستان)». فصلنامۀ مطالعات حقوق عمومی، دورۀ 47، شمارۀ 2، ص 559-537.
2. امین‌زاده، الهام؛ مومنی‌راد، احمد؛ خداپرست، ناصر (1397). حقوق بینالملل و ابعاد سیاسی و نظامی امنیت انرژیهای فسیلی. چاپ اول، تهران، انتشارات دانشگاه تهران.
3. برادران، نازنین؛ حبیبی، همایون (1398). «قابلیت اعمال قواعد حقوق بین‌الملل بشردوستانه در جنگ‌های سایبری». فصلنامۀ مطالعات حقوق عمومی، دورۀ 49، شمارۀ 1، ص 158- 139.
4. بنجامین کی، سوواکول (1391). کتاب مرجع امنیت انرژی. ترجمۀ علیرضا طیب، چاپ اول، تهران، ابرار معاصر تهران.
5. حاتمی، مهدی (1397). «نقدی بر نظریۀ «قتل‌های هدفمند دولت آمریکا» در پرتو رویه و اصول بنیادین حقوق بشردوستانۀ بین‌المللی». پژوهشنامۀ انتقادی متون و برنامههای علوم انسانی، دورۀ 18، شمارۀ 5، ص 113- 89.
6. خلف رضایی، حسین (1392). «حملات سایبری از منظر حقوق بین‌الملل (مطالعۀ موردی: استاکس‌نت)». فصلنامۀ مجلس و راهبرد، دورۀ 20، شمارۀ 73، ص 153- 125.
7. رنجبریان، امیرحسین؛ بذار، وحید (1397). «رعایت حقوق بین‌الملل بشردوستانه از سوی ربات نظامی خودفرمان و مسئولیت ناشی از اقدامات آن‌ها». مجلۀ حقوقی بینالمللی، دورۀ 35، شمارۀ 59، ص 84- 63.
8. زرنشان، شهرام (1393). «مفهوم و ماهیت عنصر مادی در فرایند شکل‌گیری قواعد حقوق بین‌الملل عرفی». پژوهشهای حقوق تطبیقی، دورۀ 18، شمارۀ 3، ص 99- 77.
9. ____ (1397). «نسبت میان شرط مارتنس و حقوق بشر در نظم حقوقی بین‌المللی جدید». فصلنامۀ مطالعات حقوق عمومی، دورۀ 48، شمارۀ 2، ص 338- 319.
10. سلیمی ترکمانی، حجت (1394). حقوق بینالملل انرژی. چاپ اول، تهران، شهر دانش.
11. ضیائی بیگدلی، محمدرضا (1396). حقوق بین‌الملل بشردوستانه. چاپ چهارم، تهران، گنج دانش.
12. محقق داماد، سید مصطفی (1394). قواعد فقه- بخش مدنی. چاپ چهل و پنجم، تهران، مرکز نشر علوم اسلامی.
13. نامدار، سعید؛ قاسمی، غلامعلی (1397). «بررسی مفهوم دفاع مشروع در پرتو حملات سایبری (با تأکید بر حملۀ استاکس‌نت به تأسیسات هسته‌ای ایران)». مجلۀ مطالعات حقوقی، دورۀ 10، شمارۀ 1، ص 235- 199.
14. نوری، ولی‌الله؛ زمانی، سید قاسم؛ راعی، مسعود (1398). «ضرورت نظامی به عنوان یک استثنا در حقوق درگیری‌های مسلحانه». فصلنامۀ مطالعات حقوق عمومی، دورۀ 49، شمارۀ 3، ص 734- 717.
15. ممتاز، جمشید؛ رنجبریان، امیرحسین (1386). حقوق بینالملل بشردوستانه- مخاصمات مسلحانۀ داخلی. چاپ دوم، تهران، نشر میزان.
ب) خارجی
16. Allhoff Fritz, Henschke Adam; Strawser Bradley Jay (2016). Binary Bullets- The ethics of Cyberwarfare. US: Oxford University Press.
17. Bradbrook Adrian J; Gardam Judith G (2006). "Placing Access to Energy Services within a Human Rights Framework". Human Rights Quarterly, Vol. 28, No. 2, pp. 389-415.
18. Bohm Erick R (2015). "Targeting Objects of Economic Interest in Contemporary Warfare". Creighton International and Comparative Law Journal, Vol. 6, No.1, pp.74-84.
 19. Christen Markus; Gordihn Bert; Loi Michele (2020). The Ethics of Cybersecurity. Switzerland: Springer.
20. Cecchetti Emanuele Nicola; Jakson Heiki (2017). "The Role Risks and the Strategic Importance of Energy in Conflicts. The Case of Ukraine". Energy Security: Operational Highlights, NATO Energy Security Centre of Excellence, No. 11, pp. 16-24.
21. Clapham Andrew; Gaeta Paola (2014). The Oxford Handbook of International Law in Armed Conflict. UK: Oxford University Press.
22. Clifford Chance (2018). Infrastructure: 21st Century Challenges A Legal Perspective. London: Clifford Chance.
23. Critical Energy Infrastructure Security Stakeholders Group (November 2018). "CEIS-SG Security Roadmap V1", Available at https://defender-project.eu/ceis-sg/
24. CTED; UNOCT (2018). "The Protection of Critical Infrastructure against Terrorist Attacks: Compendium of Good Practices". available at:
25. Desarnaud Gabrielle (2017). "Cyber Attacks and Energy Infrastructures-Anticipating Risks". Ifri Center for Energy, Available at:
26. Dinstein Yoram (2002). "Legitimate Military Objectives under the Current Jus in Bello". International Law Studies, Vol. 78, pp.139-172.
27. Dugulin Riccardo; Cussac Drum (2015)." The Potential Cooperation Between NATO and Private Risk Management Companies in the Protection of Critical Energy Infrastructure". In Alessandro Niglia (Ed.), The Protection of Critical Energy Infrastructure against Emerging Security Challenges( pp. 89-100), Amsterdam, The Netherlands: IOS Press BV.
28. Endicott Neil (2010). "Military Responses to Energy Security Problems: What role for Common Security and Defence Policy?". Bruxelles: Quaker Council for European Affairs aisbl.
29. Energy Infrastructure (2019, April 23). Retrieved from:
30. Final Report to the Prosecutor by the Committee Established to Review the NATO Bombing Campaign against the Federal Republic of Yugoslavia (June 2000). United Nations International Criminal Tribunal for the Former Yugoslavia, Available at:
31. Geneva Water Hub (July 2016). The Protection of Water During and after Armed Conflicts. Geneva: University of Geneva.
32. Gisel Laurent; Olejnik Lukasz (November 2018). The Potential Human Cost of Cyber Operations. Geneva: ICRC.
33. Global Conference on Cyber Space (GCCS 2017). Internet Society, Available at: https://www.internetsociety.org/events/gccs-2017/
34. Guelpa Elisa; Bischi Aldo; Verda Vittoria; Chertkov Michael; Lund Henrik (2019). "Towards future Infrastructures for Sustainable Multi-Energy Systems: A Review". Energy, Vol. 184, pp.2-21.
35. Guzman Andrew T (2005). "Saving Customary International Law". Michigan Journal of International Law, Vol. 27, Issue. 1, pp. 116-176.
36. Henckaerts Jean-Marie; Doswald-Beck Louise (2005). Customary International Humanitarian Law, Rules. Volume 1, UK: Cambridge University press.
37. Herman Lior; Fischhendler (2019), "Energy as a Rewarding and Punitive Foreign Policy Instrument: The Case of Israeli–Palestinian Relations". Studies in Conflict and Terrorism, DOI: 10.1080/1057610X.2019.1567997.
38. Jakson Heiki; Brendan Byrne; Cecchetti Emanuela Nicola; Ciampor Jan; Hajek Jaroslav; Hausler Maximilian; Dubrova Kateryna (2017), Energy in Irregular Warfare. Energy in Conflict Series, Lithuania: NATO Energy Security Centre of Excellence.
39. Kerttunen Mika; Tikk Eneken (2017). The Alleged Demise of the UN GGE: An Autopsy and Eulogy. New York: Cyber Policy Institute.
40. Kodar Erki (2012). "Applying the Law of Armed Conflict to Cyber Attacks: From the Martens Clause to Additional Protocol I". In Rain Liivoja & Andres Saumets (Eds.), Cultural, Peace and Conflict Studies Series Volume III: The Law of Armed Conflict: Historical and Contemporary Perspectives (pp. 107-132), Estonia: Tartu University Press.
41. Kuzemco Caroline; Keating Michael F; Goldthau Andreas (2016). The Global Energy Challenge, Environment, Development and Security. London, UK: Palgrave.
42. Larsen Kjetil Mujezinovic; Cooper Camilla G. Guldahl; Nystuen Gro (2013). Searching for a Principle of Humanity in Internatioanl Humanitarian Law. New York: Cambridge University Press.
43.  Leetaru Kalev (2017, February 9). "What Tallinn Manual 2.0 Teaches Us About The New Cyber Order". Retrieved from:
44. Letter dated 9 January 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General, U.N. Doc. A/69/723 (13 January 2015).
45. Letter dated 12 September 2011 from the Permanent Representatives of China, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General, U.N. Doc. A/66/359 (14 September 2011).
46. Liivoja Rain; McCormack Tim (2016). Routledge Handbook of the Law of Armed Conflict. London: Routledge.
47. Luban David (2013). "Military Necessity and the Cultures of Military Law". Leiden Journal of International Law, Vol.26, No.2, pp. 315-349.
48. Mourlam, Anna C. (2018). "Unarmed Attacks: Cyber Combatants and the Right to Defend". The California International Law Journal, Vol. 26, No. 1, pp. 19-30.
49. Ngai Jenny Sing-hang (2012). " Energy as a Human Right in Armed Conflict: A Question of Universal Need, Survival, and Human Dignity". Brooklyn Journal of International Law, Vol.37, Issue.2, pp.579-622.
50. Proninska Kamila (2007). "Energy and Security: Regional and Global Dimensions". In Stockholm Internatioal Peace Research Institute (Ed.), Yearbook 2007 Armaments, Disarmament and International Security (pp. 215-243), New York, US: Oxford University press Inc.
51. Riga Summit Declaration (2006, 29 November). North Atlantic treaty Organization, Available at: https://www.nato.int/cps/en/natohq/official_texts_37920.htm?selectedLocale=en
52. Ruhle Michael (2017). "Energy Security: Eight Relevant Lessons". Energy Security: Operational Highlights, NATO Energy Security Centre of Excellence, No. 11, pp. 5-7.
53. Sassoli Marco (2019). International Humanitarian Law. UK: Edward Elgar Publishing Limited. 
54. Schmitt Michael N (2017). Tallin Manual 2.0 on the International Law Applicable to Cyber Operations. 2nd Edition, UK: Cambridge University Publication.
55. Solis Gary D (2016). The Law of Armed Conflict. 2nd Edition, New York: Cambridge University Press.
56. Sowers Jennie L; Weinthal Erika; Zawahri Neda (2017). "Targeting Environmental Infrastructures, International Law, and Civilians in the New Middle Eastern Wars". Security Dialogue, Vol.48, Issue.5, pp.1-21.
57. The Commander's Handbook on the Law of Naval Operation (August 2017). U.S. NAVY, Available at: https://portal.nwdc.navy.mil/NDLS/default.aspx
58. Tignino Mara (2016). Water During and After Armed Conflicts:What Protection in International Law?. Leiden, The Netherlands: Koninklijke Brill nv.
59. Tsagourias Nicholas; Morrison Alasdair (2018). Internatioanl Humanitarian Law". UK: Cambridge University Press.
60. Tully, Stephen (2006). "The Human Right to Access Electricity". The Electricity Journal, Vol.19, Issue.3, pp. 30-39.
61. U.S Department of Energy (2018). "Multiyear Plan for Energy Sector Cybersecurity". office of Electricity Delivery and Energy Reliability, Available at:  https://www.energy.gov/sites/prod/files/2018/05/f51/DOE%20Multiyear%20Plan%20for%20Energy%20Sector%20Cybersecurity%20_0.pdf
 
62. United Nations Environment Programme (2009). Protecting the Environment During Armed Conflict An Inventory and Analysis of International Law. Nairobi, Kenya: United Nations Environment Programme.
63. Valo Janne (January 2014). Cyber Attacks and the Use of Force in International Law. Faculty of Law, University of Helsinki.
64. Wagner Eric (1995). "Submarine Cables and Protections provided by the law of the Sea". Marine Policy, Vol. 19, No. 2, pp. 127-136.
65. Zarpelo Bruno Bogaz; Miani Rodrigo Sanches; Kawakani Cludio Toshio; De Alvarenga Sean Carlisto (2017). "A Survey of Intrusion Detection in Internet of Things". Journal of Network and Computer Applications, Vol. 84,Issue. C, pp. 25-37. 
66. Zio Enrico (2016). "Challenges in the Vulnirability and Risk Analysis of Critical Infrastructures". Reliability Engineering and System Safety, Vol. 152, pp. 137-150.