International Studies Journal (ISJ)

International Studies Journal (ISJ)

Invoking the Doctrine of Broad Interpretation of the Right to Self-Defense in Countering Post-Modern Terrorism: With Emphasis on the MEK’s Cyber Terrorism

Document Type : Original Article from Result of Thesis

Authors
1 PhD student of Public International Law, South Tehran Branch, Islamic Azad University, Tehran, Iran.
2 Assistant Professor at Department of Economics and Islamic Banking, Faculty of Economics, Kharazmi University, Tehran, Iran.
3 Assistant Professor at Department of Private Law, South Tehran Branch, Islamic Azad University, Tehran, Iran.
Abstract
Following September 11, 2001, the UN Security Council adopted resolutions consistent with international law that paved the way for recognizing new concepts of self-defense (preemptive and preventive strikes). The rationale behind this shift lay in the conduct of non-state actors whose actions could potentially amount to armed attacks. Current terrorist activities changed their traditional forms and are evolving into modern versions under the rubric of the “post-modern terrorism wave,” exemplified by phenomena such as cyberterrorism. According to Barry Buzan’s expansive approach to national security, this article seeks to answer the question: How can recourse to preemptive and preventive strikes against post-modern terrorism (specifically, the cyber terrorism of the Mojahedin-e Khalq Organization—MEK) be justified from the perspective of Article 51 of the UN Charter?
The research uses a descriptive-analytical method. Its primary objective is to establish a mutual understanding between the legal and political domains in countering post-modern terrorism threats (with a case study on the MEK’s cyberterrorism). The results indicate that international legal practice recognizes the legitimacy of invoking self-defense against terrorist attacks perpetrated by non-state groups, and the selected national security theory supports this view. The concepts of preemptive and preventive strikes are not officially recognized in international law. However, in the absence of a working legal regime governing cyberspace, there is little doubt about the existence and validity of the right to self-defense against post-modern terrorism.

Highlights

Introduction
In recent years, terrorism has moved beyond its traditional forms and is now manifesting in modern forms under what may be described as the “post-modern terrorism wave.” Among these new manifestations, cyber terrorism—emerging from the combination of terrorist acts and cyberspace—represents one of the newest and potentially most dangerous forms of post-modern terrorism. Despite being relatively novel, cyberterrorism poses a far greater danger than other variants of post-modern terrorism, and its threats have become a potential threat to national security.
Whereas states once primarily competed in the military sphere and related technological arenas, that competition has now extended into the virtual realm. Occasionally, media report news alleging that states have been subjected to cyberattacks, sometimes by non-state actors or other governments. Therefore, after land, sea, air, and space, cyberspace is often regarded as the fifth domain of warfare today.
Typically, states victimized by terrorist attacks undertake extensive military action against terrorist groups operating from within other countries, citing their right to self-defense. The traditional view that recognized armed attacks solely as acts perpetrated by states has, therefore, expanded to acknowledge armed attacks by non-state actors as well. This shift represents a significant transformation in international law. The UN Security Council, through resolutions like Resolution 1368, has provided a framework that attributes terrorist acts to the realm of lawful use of force in self-defense, thereby laying the groundwork for new concepts of self-defense (i.e. preemptive and preventive strikes).
While certain interpretations of the Charter’s provisions have facilitated greater alignment with the realities of today’s international community, others have led to inconsistencies. Unlike traditional terrorism, post-modern terrorism encompasses broader, more complex dimensions. At present, the economic structures of the countries and public service provision rely heavily on information technologies and communication networks. Hence, cyberterrorism is considered more dangerous than the traditional variants.

Methodology
This study uses a descriptive-analytical method.

Findings and Results
According to the hypothesis adopted in this study, although international law does not formally recognize preemptive and preventive strikes, international practice demonstrates that states are entitled to invoke self-defense against terrorist attacks carried out by non-state actors. The fluid nature of post-modern terrorism, and its transnational expansion, makes it difficult for international law to respond effectively within the traditional legal frameworks. Furthermore, the absence of a comprehensive, universally accepted definition of terrorism and the UN Charter’s assumption of states as the sole international actors constitute fundamental shortcomings.
The atrocities of September 11 brought about new approaches to politics, security, and international law. Certain concepts that were considered obsolete, such as “just war”, have been revitalized to address global challenges and maintain security.
Despite the existing consensus on the gravity of terrorist threats, international cooperation in combating terrorism has far remained ineffective. Initially, differing state perceptions and disagreements over how to define terrorist acts hindered international collaboration. Soon thereafter, divergent national priorities and interests severely weakened global cooperative efforts. The major powers’ pursuit of their interests and objectives proved to be the principal obstacle to successful international counterterrorism measures.
Whether a rule of customary international law exists that permits preemptive and preventive strikes largely depends on the stance of those states most directly affected by terrorism. These states play a predominant role in shaping such a rule. The stance of “aggressor” states is even more contentious, as powers conducting such attacks have tended to present uniform justifications and interpretations to support their actions.
Seemingly, deciding whether preemptive and preventive strikes are permissible against unconventional actors undermining national security represents one of the current international legal system’s fundamental challenges. Given the recent worldwide political, social, and economic developments, as well as influential scholarly theories—such as the Copenhagen School’s expansive approach to national security (exemplified by Barry Buzan’s framework)—amendments to the UN Charter seem desirable. Such reforms could enable more effective responses to aggression and terrorism, enhance the efficiency of collective security mechanisms, identify and address the Security Council’s weaknesses, and clarify the criteria for the legitimate exercise of self-defense, including necessity, proportionality, and urgency. Doing so would prevent states from exploiting various interpretations of the Charter to further their interests at the expense of international peace and security and would ultimately promote lasting peace and stability for humanity.

Keywords

Subjects


  1. Abbasi, M., Moradi, H. (2015). Cyber war from the perspective of international humanitarian law. Majlis and Strategy Quarterly, Volume 22(81), 37-68. (In Persian)
  2. Ackerman, D. (2003). International Law and the Preemptive Use of Force Against Iraq. CRS Report of Congress Aprill. 1-6.
  3. Arend, A. (2003). International Law and the Preemptive Use of Military Force. The Washington Quarterly. Vol. 26. 89-103.
  4. Aslani, J. (2015). Iran, Stuxnet and upcoming legal challenges in the face of cyber attacks. A collection of articles on Iran and contemporary international legal challenges, Tehran: Shahr Danesh Publications, first edition. (In Persian)
  5. Bahari, B., Bakshi Sheikh Ahmad, M. (2009). What is new terrorism and its characteristics. Research Journal of Law and Politics, 11(27), 1-20. (In Persian)
  6. Behestani, M. (2008). Preventive defence in new international law. Evidence Legal Quarterly, (12), 133-136. (In Persian)
  7. Collin, B. (1997). The future of Cyberterrorism: Where the Physical and Virtual Worlds Converge. 11th Annual International Symposium on Criminal Justice Issues.
  8. Cornish, P., Livingstone, D., Clemente, D., Yorke, C. (2010). On Cyber Warfare. A chatham House Report. 1-49.
  9. Couzigou, I. (2022). The Criminalization of Online Terrorism Preparatory Acts under International Law. Studies in Conflict and Terrorism. Vol. 45. 535-554.
  10. Eghtesad News. (2021). an unprecedented event; Hacking attack of hypocrites on radio and television. Eghtesad News news base, at: https://www.eghtesadnews.com/%D8%A8%D8%AE%D8%B4-%D8%A7%D8%AE%D8%A8%D8%A7%D8%B1-%D8%B3%DB%8C%D8%A7%D8%B3%DB%8C-57/472081-%D8%A7%D8%AA%D9%81%D8%A7%D9%82 (In Persian)
  11. (2022). The site and camera network of Tehran Municipality was hacked. Insaf  News news and analysis database, at: http://www.ensafnews.com/349452/%D8%B3%D8%A7%DB%8C%D8%AA-%D9%88 (In Persian)
  12. Farshasaid, P., Jalali, M., Guderzi, M. (2022). The need for governments to cooperate in strengthening cyber security. International Studies Quarterly, 74(2), 163-178. doi: 10.22034/isj.2022.305392.1603. (In Persian)
  13. Fazaeli, M. (2023). the relationship between terrorism and armed conflicts; Looking at the situation in Afghanistan. Legal Research Quarterly, 26(102), 113-140. doi: 10.48308/jlr.2022.224025.2008. (In Persian)
  14. Fleck, D., Bath, M., Fischer, H., Pietergasser, H., Greenwood, K., Hinschel van Heing, W., Ippen, N., Otter, A., Joseph Parrish, K., Rabus. , W., Wolfrum, R. (2008). Humanitarian rights in armed conflicts, translated by Seyed Ghasem Zamani, Nader Saed, Hossein Sharifi Tarzkohi, Hajar Siah Rostami, Fatemeh Kihanlou, Mirshahbiz Shafe, Mohammad Jafar Saed, Katayoun Hosseinnejad, Tehran: Shahr Danesh Institute of Legal Studies and Research, first edition. (In Persian)
  15. Garner, B. (2009). black\s law dictionary. USA: Thomson West, 9th ed.
  16. ICJ Reports. (1986). Military and Paramilitary Activities in and Against Nicaragua (Nicaragua V United states). at: https://www.icj-cij.org/node/100900.
  17. ICJ Reports. (1996). on the Legality of the Threat or use of Nuclear weapons. at: Reportshttps://www.refworld.org/cases,ICJ,4b2913d62.html.
  18. Jalali Farahani, A. (2006). Cyber terrorism. Islamic Law Quarterly, 3(10), 85-112. (In Persian)
  19. Jalali, M., Aqalar, A. (2023). recourse to bioterrorism from the perspective of international law. Quarterly Journal of Public Law Studies, 53(4), 2057-2079. doi: 10.22059/jplsq.2021.296700.2311. (In Persian)
  20. Kefaeifar, M., Timuri, M. (2023). Developments of human and humanitarian rights caused by the impact of the fragmentation of international law on the concept of terrorism. Quarterly Journal of Public Law Studies, 53(2), 831-851. doi: 10.22059/jplsq.2021.307614.2513. (In Persian)
  21. Kyanizadeh, A., Vathouq, M., Birjandi, F., Ghasemi, Z. (2018). The challenges of modern terrorism from the perspective of international humanitarian law. Afaq Journal of Humanities, (23), 65-81. (In Persian)
  22. Martínez Esponda, (2023). Norm-instability as a Strategy in International Lawmaking: The Case of Self-defence against Non-state Actors. The Many Paths of Change in International Law. 69-88. doi: doi.org/10.1093/oso/9780198877844.003.0003
  23. Melzer, N. (2011). Cyberwarfare and international Law. UNIDIR. 1-38.
  24. Mohebbi, M., Shafiei, A. (2017). Evolution of the concept of self-defence: international law and non-state actors. Legal Research Quarterly, 21(81), 113-89. doi: 10.22034/jlr.2018.120863.1134. (In Persian)
  25. Momtaz, J., Saberi Ansari, b. (2012). The effect of the subsequent procedure of governments on the principle of prohibition of threats and resorting to force. Strategy Quarterly, 21(2), 175-204. (In Persian)
  26. Mousavi, S., Hatami, M. (2006). Preemptive self-defence in international law. Journal of Faculty of Law and Political Sciences, 72(0), 324-303. (In Persian)
  27. Nematpour, A., Taghizadeh Ansari, M., Bebri Gonbadi, S. (2021). Dealing with terrorist attacks on the critical infrastructure of a country in the rules of international law. International Studies Quarterly, 18(3), 165-185. doi: 10.22034/isj.2022.301984.1573. (In Persian)
  28. Nematpour, A., Taghizadeh Ansari, M., Bebri Gonbadi, S. (2023). The responsibility of governments in dealing with terrorist attacks on the critical infrastructure of a country. International Studies Quarterly, 19(4), 171-187. doi: 10.22034/isj.2023.365506.1912. (In Persian)
  29. (2021). Cyber attack on the website of the Ministry of Guidance and the display of images of the group of hypocrites. Noandish news-analytical database, at: https://noandish.com/fa/news/138788/%D8%AD%D9%85%D9%84%D9%87 (In Persian)
  30. Plasaeidi, P., Ranjbarian, A. (2022). Critical reading of the concept of collective security in the current international system. Public Law Studies Quarterly, Volume 52(4), 1717-1737. doi: 10.22059/JPLSQ.2020.289395.2175 (In Persian)
  31. Qanbarlu, A. (2018). National Security: Concept, Theory, and Practice. Applied Politics Quarterly, 1(1), 41-67. (In Persian)
  32. Qasemi, A., Barin Chaharbakhsh, w. (2012). Cyber attacks and international law. Judiciary Law Journal, (78), 115-145. (In Persian)
  33. Ramehr, A. (2006). A study of the concept of national security. Quarterly Journal of Military Sciences and Technologies, 3(5), 33-25. (In Persian)
  34. Razmkhah, N. (2023). Criticism of the draft law of the European Union in harmonizing the laws governing artificial intelligence, from the perspective of dealing with cyber terrorism. Public Law Studies Quarterly, 1-27. doi: 10.22059/jplsq.2022.343006.3086. (In Persian)
  35. Sahraei, M. (2009). Legitimacy of use of force in the fight against terrorism. Foreign Policy Quarterly, 23(4), 1115-1136. (In Persian)
  36. Scharf, P., Sterio, M., Williams, P. (2020). Use of Force in Self-Defense against Non-State Actors In: The Syrian Conflict's Impact on International Law. London: Cambridge University Press. doi: https://doi.org/10.1017/9781108863650.005.
  37. Scobbie, I. (2020). self—defence as an exception to the prohibition on the use of force. Oxford University Press. 149-178. doi: doi.org/10.1093/oso/9780198789321.003.0009.
  38. SC/Res/2249. (2015). (threats to international peace and security caused by terrorist acts) at: https://www.securitycouncilreport.org/atf/cf/%7B65BFCF9B-6D27-4E9C-8CD3-CF6E4FF96FF9%7D/s_res_2249.pdf.
  39. Sepehr, H. (2005). The reaction of the Security Council to the procedure of governments in the fight against international terrorism. Strategy Quarterly, 13(2), 338-335. (In Persian)
  40. Sharifi, M. (2003). Evolution of the concept of self-defence in international law with emphasis on developments after September 11, 2001. Foreign Policy Quarterly, 17(1), 91-112. (In Persian)
  41. Stark, R. (1999). cyber Terrorism: Rethinking New Technology. Department of Defence and Strategic Studies.
  42. The U.S. Army Training and Doctrine Command. (2016). Threat tactics report: islamic state of Iraq and the levant. S. Army Training and Doctrine Command. 1-44.
  43. Voice of Iran. (2021). What is the story of radio and television hacking?. Voice of Iran news base, at: https://sedayiran.com/fa/news/271584/%D9%85%D8%A7%D8%AC%D8%B1%D8%A7% (In Persian)
  44. YOUNG, S. (2022). Contesting Subjects: International Legal Discourses on Terrorism and Indigenous Peoples’ Human Rights. Asian Journal of International Law, 13(2). 273-293. doi: https://doi.org/10.1017/S2044251322000534.
  45. Zarif, M. Ahani Amine, M. (2012). Preemptive self-defence of the legitimacy of the use of force in international relations. International Political Research Quarterly, (12), 41-82. (In Persian)
  46. Zavarei, M., Salimi, P. (2022). Applying the principle of universal jurisdiction to crimes against cyber security in international aviation. Journal of Legal Research, 21(52), 89-65. doi: 10.48300/jlr.2021.299970.1741. (In Persian)