Regulating Digital Weapons: Autonomous Cyberattacks, AI Warfare, and International Humanitarian Law
Keywords:
Autonomous cyberattacks, AI warfare, digital weapons, International Humanitarian Law, cyber conflict, algorithmic accountability, meaningful human control, cybersecurity governance, autonomous weapons regulation, cyber normsAbstract
The rapid integration of artificial intelligence into cyber operations has transformed the nature of contemporary conflict, producing digital weapons capable of autonomous decision-making, adaptive targeting, and machine-speed escalation. These developments challenge long-standing assumptions within International Humanitarian Law (IHL), exposing doctrinal gaps that traditional legal frameworks are not yet prepared to address. This narrative review examines the technical foundations, operational dynamics, and legal implications of autonomous cyberattacks and AI-enabled warfare, synthesizing insights from technology studies, security analysis, and humanitarian law. The discussion begins by contextualizing the emergence of digital weapons, defining autonomous cyber systems and AI warfare, and outlining their growing relevance in military doctrine and strategic competition. It then analyzes the challenges these systems pose for IHL, particularly regarding distinction, proportionality, necessity, and precaution, as well as attribution, foreseeability, dual-use infrastructure, and the ambiguity surrounding data as an object of attack. The review further evaluates existing regulatory approaches, including the Tallinn Manual, UN cyber governance initiatives, regional frameworks, and national strategies, highlighting their limitations in addressing autonomous escalation, opaque algorithms, and self-learning cyber capabilities. Building on this analysis, the final section proposes foundational elements for a coherent legal and ethical framework that integrates meaningful human control, establishes clear accountability mechanisms, promotes shared definitions of autonomous cyber weapons, strengthens due-diligence obligations, and embeds ethical principles into AI system design. The article concludes that governing digital weapons requires innovative regulatory models that combine legal, technical, and ethical expertise. Only through coordinated international efforts can states ensure that AI-enabled cyber operations evolve in ways that preserve humanitarian protections, enhance accountability, and promote stability in an increasingly digital battlespace.
References
Ali, S. (2022). Legal Framework of Right of Self Defense in Cyber Warfare: Application Through Laws of Armed Conflict. Journal of Development and Social Sciences, 3(II). https://doi.org/10.47205/jdss.2022(3-ii)96
Casey-Maslen, S., & Mwale, B. (2021). The Prohibition of Cyberterrorism as a Method of Warfare in International Law. South African Yearbook of International Law, 44. https://doi.org/10.25159/2521-2583/7977
Dumitru, D., & Bodoni, C. (2022). Extension of International Humanitarian Law Order in the Information Area Through Digital Diplomacy. Strategic Impact, 80(3), 86-102. https://doi.org/10.53477/1841-5784-21-18
Gisel, L., Rodenhäuser, T., & Dörmann, K. (2020). Twenty Years On: International Humanitarian Law and the Protection of Civilians Against the Effects of Cyber Operations During Armed Conflicts. International Review of the Red Cross, 102(913), 287-334. https://doi.org/10.1017/s1816383120000387
Gomez, M. A. (2023). Public Opinion and Alliance Commitments in Cybersecurity: An Attack Against All? https://doi.org/10.31235/osf.io/bcwhu
Igakuboon, A. N. (2022). An Appraisal of the Legal Framework for the Protection of Civilians in Cyber-Warfare Under International Humanitarian Law. International Journal of Research and Scientific Innovation, 09(07), 14-26. https://doi.org/10.51244/ijrsi.2022.9702
Jiang, Z. (2019). Regulating the Use and Conduct of Cyber Operations Through International Law: Challenges and Fact-Finding Body Proposal. Lselr, 5, 59-88. https://doi.org/10.61315/lselr.42
Kaushik, P. (2023). Deep Learning Multi-Agent Model for Phishing Cyber-Attack Detection. International Journal on Recent and Innovation Trends in Computing and Communication, 11(9s), 680-686. https://doi.org/10.17762/ijritcc.v11i9s.7674
Kaushik, S. (2023). Analysis of Blockchain Security: Classic Attacks, Cybercrime and Penetration Testing. https://doi.org/10.1109/mobisecserv58080.2023.10329210
Kleemann, S. (2021). Cyber Warfare and the “Humanization” of International Humanitarian Law. International Journal of Cyber Warfare and Terrorism, 11(2), 1-11. https://doi.org/10.4018/ijcwt.2021040101
Kumar, S., & Mallipeddi, R. R. (2022). Impact of cybersecurity on operations and supply chain management: Emerging trends and future research directions. Production and Operations Management, 31(12), 4488-4500. https://doi.org/10.1111/poms.13859
Protas, P., & Joseph, L. C. (2020). The Law of Armed Conflict in the Era of Cyber Technology: Assessing the Legal Challenges and Response in Tanzania. Eastern Africa Law Review, 47(1), 95-139. https://doi.org/10.56279/ealr.v47i1.4
Schmitt, M. N. (2022). International Humanitarian Law and the Conduct of Cyber Hostilities: Quo Vadis? Journal of International Humanitarian Legal Studies, 13(2), 189-221. https://doi.org/10.1163/18781527-bja10059
Tang, B., Wang, J., Qiu, H., Yu, J., Yu, Z., & Liu, S. (2023). Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks. Computers Materials & Continua, 74(1), 235-252. https://doi.org/10.32604/cmc.2023.029135
Yuliantiningsih, A. (2021). Analisis Doktrin Perang Yang Adil (Just War ) Dalam Kasus Serangan Siber Rusia Terhadap Georgia Tahun 2008. Kosmik Hukum, 21(3), 175. https://doi.org/10.30595/kosmikhukum.v21i3.10613
Zuhra, A., & Almira, L. (2021). The LIMITATION OF CYBER WARFARE UNDER HUMANITARIAN LAW (Pembatasan Perang Siber Dalam Hukum Humaniter). Teras Law Review Jurnal Hukum Humaniter Dan Ham, 3(1), 1-10. https://doi.org/10.25105/teras-lrev.v3i1.10741
Downloads
Published
Submitted
Revised
Accepted
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.