Countering Terrorist Attacks on Critical Infrastructure of a Country in International Law

Document Type : Original Article from Result of Thesis

Authors

1 PhD Student in Public International Law, North Tehran Branch, Islamic Azad University, Tehran, Iran.

2 Assistant Professor, Department of International Law, North Tehran Branch, Islamic Azad University, Tehran, Iran.

3 Assistant Professor, Department of Political Science and International Relations, North Tehran Branch, Islamic Azad University, Tehran, Iran.

Abstract

Terrorism has taken different forms over time; however, the international legal community fails to keep up with these modern forms of terrorism and always falls a few steps behind. Since the critical infrastructure includes the most essential services for life in a country, attacks on this infrastructure cause widespread and sometimes irreversible damage so that the targeted state will have to comply with the demands of terrorist groups. Although there are important documents regarding counterterrorism in airlines, marine navigation, nuclear power, and hostage holding in the international law, the literature evidently lacks a fundamental document regarding countermeasures to terrorist attacks on the critical infrastructure of a country to cover both cyberattacks and physical attacks. Hence, in addition to addressing the problem of critical infrastructure and counterterrorism documents, this paper seeks to answer the main question: what international law rules over countermeasures to physical terrorist attacks on the critical infrastructure of a country? For this purpose, a descriptive-analytical technique was employed with the desk method. According to the results, there is a legal gap in the international law in response to physical terrorist attacks on the critical infrastructure of countries. Finally, it is recommended that an international convention be formulated and approved to counter such terrorist attacks.

Highlights

Introduction

There have been many changes in attitudes toward terrorism and counterterrorism since old times. In the international law, proper measures have been taken to counter terrorist attacks. Countries have reached an international consensus to cooperate with each other in order to stand against terrorism and its adverse outcomes. The United Nations has formulated and approved different conventions to counter terrorist threats and attacks in different dimensions for the survival of states. However, what motivated the author to write this manuscript and do research in this area is the presence of a legal gap in the literature on countermeasures to terrorist attacks on the critical infrastructure of a company.

This study found cyber terrorism attacks on the critical infrastructure of a country under the rule of different international documents compensating partly for the lack of international legal power to regulate the cooperation of states. The main research concern is the lack of a convention or a unique comprehensive document regarding countermeasures to terrorist physical attacks on the infrastructure of a country. The literature was reviewed in a bid to analyze the applicable regulations regarding terrorist attacks on the critical infrastructure of a country. Therefore, it is possible to determine the legal gaps concerning the refusal of countries and terrorist groups to take the responsibility of physical attacks on the critical infrastructure of other countries. The main question is: What international law rules over countermeasures to terrorist attacks on the infrastructure of a country? Based on the research hypothesis, it appears that the international law has set different rules in various resolutions and conventions to counter terrorist threats; however, there is still a gap regarding terrorist attacks on the critical infrastructures of a country. Hence, this paper reviews the research background and analyzes the theoretical foundations to explain and perceive the contents and goals of interest properly. The next section discusses the goals and instances of the critical infrastructure. Finally, the manuscript presents the rules and documents existing in the international law regarding terrorist attacks on the critical infrastructure of a country.

 

Research Method

A descriptive-analytical technique was employed in this manuscript, and the relevant information was collected through the desk method.

 

Findings

  • Determining the availability of many documents and studies regarding terrorist attacks on the critical infrastructure of countries in the cyberspace
  • Detecting a gap in the international law concerning physical terrorist attacks on the critical infrastructure of countries
  • Proposing a comprehensive international convention to bridge the gap

 

Conclusion

This study aims to answer the question what international law rules over countermeasures to terrorist attacks on the critical infrastructure of a country. Accordingly, the ultimate result indicates that terrorist attacks are generally covered by the rule of international regulations under the international law. However, in particular, physical terrorist attacks on the critical infrastructure of a country and the legal consequences are not covered by a specific document in the international law. Therefore, the international community faces a gap in regulations while encountering these terrorist attacks and needs to formulate and approve a comprehensive international convention in this regard. Moreover, the international law includes different documents for monitoring terrorist attacks on the critical infrastructure; however, they only rule over terrorist attacks on the cyber infrastructure. In other words, physical attacks on the critical infrastructure are not ruled by any international conventions or comprehensive documents. In fact, cyberattacks are conducted through software or hardware invasions that cause damage to the target without any physical interventions. However, physical attacks are conducted by either explosives or unmanned aerial vehicles and missiles. In both cases, when the critical infrastructure of a country is attacked, the damage might be so irreversible that the post-attack measure will be futile. As discussed thoroughly in the manuscript, the term “critical infrastructure” is still new in the research literature on the international law; therefore, the international community has not yet managed to organize the cooperation of states to counter such attacks and mitigate these attacks and the resultant damage. As mentioned earlier, the necessary measures were taken in the formulation and approval of the essential rules; however, there is a considerable gap regarding physical terrorist attacks on the critical infrastructure. To bridge this gap, this manuscript proposed integrating the international cooperation and assistance of countries in addition to formulating and approving a comprehensive convention to counter physical terrorist attacks on the critical infrastructure of a country. Furthermore, there are different instances of critical infrastructure in various countries; thus, it is necessary to first give a comprehensive definition of the critical infrastructure. Its instances should then be clarified in order to prevent misinterpretations and misuse of its concepts.

Keywords

Main Subjects


  1. Alcarz, Cristina., Zeadally Sherali. (2015).1 critical infrastructure protection: equirements and challenges for the 21st century, International Jounral of Critical Infrastructure Protection (IJCIP), 8. Elsevier Science.
  2. Alghafour, M., Sadeghian, R. (2016). Modernization, globalization and modern and postmodern terrorism phenomenon, Policy Journal, Issue 4(3). (In Persian)
  3. Alikhani, M. (2015). Non-use of force rule and self-defense in predictable conditions, ISJ, 4 (11). 21-56 (In Persian)
  4. Atigui, F. et.al.. (2020). “Vulnerability and Incident Propagation in Cyber-Physical Systems, in Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures. Edited by John Soldatos, James Philpot and Gabriele, 193–205.
  5. Brunner, E. M. and Suter, M. (2009). An Inventory of 25 National and 7 International Critical Information Infrastructures policies, Center for Security Studies, ETH Zurich.
  6. CTED and UNOCT. (2018). The Protection of Critical Infrastructure against Terrorist Sttacks: Compendium of Good Practices, Interpol.
  7. Firahi, D. Zahiri, S. (2009). Terrorism, definition, history and existing achievements in analysis of terrorism, Policy Journal, Issue 3(3). (In Persian)
  8. Gelbstein, E. and Kamal, A. (2002). Information Insecurity – A Survival Guide to the Uncharted Territories of Cyber-Threats and Cyber-Security”, New York. https://unp.un.org/details.aspx?entry=E04291#
  9. Heidargholizadeh, J. et.al.. (2016). transformation of terrorism from the perspective of international law, Journal of Islamic Human Rights Studies. (In Persian)
  10. Kazerouni, M. (2016). Challenge of adapting freedom of expression with prohibition of terrorism to use cyberspace, International Studies Journal, 12(4), 167-198. (In Persian)
  11. Maleki, M. (2016). Legal obligations of the states to prevent international terrorism, M.A. thesis, Qom Uni. (In Persian)
  12. Mehregan, A., et.al. (2020). the necessity for reforming the mission of International Red Cross Committee, ISJ, (17), 2. (In Persian)
  13. Mockaitis, T. R. (2006). The New Terrorism: Myths and Rreality, Praeger Security International, London: Westport
  14. Najafabadi, S. et.al.. (2020). Future study analysis of NATO presence in the middle east and areas around Iran and its effect on national security of the IRI., International Studies Journal, 17(3), 169-193. (In Persian)
  15. UN Nations Office of Counter-Terrorism (2019), International Legal Instruments, at: https://www.un.org/counterterrorism/international-legal-instruments.
  16. Sánchez Frías, A. (2020). Bringing Terrorists to Justice in the Context of Armed Conflict: Interaction between International Humanitarian Law and the UN Conventions Against Terrorism. Israel Law Review, 53(1), 71–99. doi:10.1017/s0021223719000220.
  17. Schmid, A. (2020). Handbook of Terrorism Prevention and Preparedness, ICCT Press.
  18. Shana (2021). DaeshRocket Attack on Iraqi Oil Refinery, at: https://www.shana.ir/news/31018 (In Persian)
  19. Simbar, R. (2006). Formation of international cooperation in counterterrorism: opportunities, challenges and solutions, Political Science Research, 2, 147-171. (In Persian)
  20. Un Crisis Relief. (2019). "Yemen: The orst humanitarian crisis in the world", available in https://www.un.org/counterterrorism/international-legal-instruments
  21. United Nation. (2001). Security Council, available in S/RES/1373 (2001).
  22. (2019). The Multi-Agency task force of the Middle East and North Africa Region, at: Multi-Agency Task Force (MATF) 3. https://www.unodc.org/pdf/terrorism/MATF-2019/Fact.
  23. USAGOV LOGO. (2007). U.S. Department of Homeland Security, S. Department of Homeland Security.
  24. Zarghani, S.H., Kharazmi, O. A. (2016). Analysis of Terrorism Threats and Security of Critical infrastructures of a City, National Conference on Non-Active Defense and Sustainable. (In Persian)