Journal of Liberal Arts & Interdisciplinary Sciences
issue front

Priti Rana1, Amna Mirza2

First Published 29 Jan 2026. https://doi.org/10.1177/jlais.251408160
Article Information Volume 1, Issue 1 January 2026
Corresponding Author:

Amna Mirza, C-121, Defence Colony, Lajpat Nagar, Delhi 110024, India
Email: amna.mirza786@gmail.com

1Faculty of Law, University of Delhi, India

2SPM College, University of Delhi, India

Creative Commons Non Commercial CC BY-NC: This article is distributed under the terms of the Creative Commons Attribution-NonCommercial 4.0 License (http://www.creativecommons.org/licenses/by-nc/4.0/) which permits non-Commercial use, reproduction and distribution of the work without further permission provided the original work is attributed.

Abstract

The frequency and sophistication of cyber warfare pose novel challenges to conventional ideas of sovereignty and international law. As state and non-state actors leverage cyber capabilities to launch attacks, the legal frameworks that have long regulated the use of force and state sovereignty are being challenged. This article discusses the changing dynamic between sovereignty and international law in the context of cyber warfare, highlighting the necessity for a reimagined approach to meet the fast-paced technological developments. Based on international case studies, including the 2007 cyberattack on Estonia and the current cyber tensions between the USA and Russia, this research investigates how states are attempting to navigate the intricacies of cyber sovereignty in a connected digital world. It also looks at the lacunae in current international law and the issues of attribution, proportionality and protection of civilian infrastructure. The article also identifies national legal systems and the need for international collaboration to construct a harmonious legal structure to combat cyber threats. Considering the accelerated pace of technological advancements, the article makes the case for creating international treaties and norms that give states responsibility and accountability in cyber warfare clearly. Ethical aspects involving human rights, digital infrastructure and privacy are also touched upon. Finally, this will advocate for drastic reforms in interdisciplinary reflections on law, ethics and global power to guarantee that sovereignty can be properly protected against advanced cyber threats.

Keywords

Cyber warfare, sovereignty, international law, cyber security, attribution, digital infrastructure, international cooperation, global power

References

Benkler, Y., Faris, R., & Roberts, H. (2018). Network propaganda: Manipulation, disinformation, and radicalization in American politics. Oxford University Press.

Deibert, R. J. (2018). Reset: Reclaiming the internet for civil society. House of Anansi Press.

Deibert, R. J. (2020). The road to digital unfreedom: Seven challenges to democracy in the digital age. Journal of Democracy, 31(1), 25–39.

Greenwald, G. (2013). No place to hide: Edward Snowden, the NSA, and the U.S. Surveillance State. Metropolitan Books.

Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The law of cyber-attack. California Law Review, 100(4), 817–885.

Held, D., & McGrew, A. (2007). Globalization/anti-globalization: Beyond the great divide (2nd ed.). Polity Press.

Kello, L. (2017). The virtual weapon and international order. Yale University Press.

Keohane, R. O. (2002). Power and governance in a partially globalized world. Routledge.

Klabbers, J. (2013). International law. Cambridge University Press.

Krasner, S. D. (2001). Sovereignty: Organized hypocrisy. Princeton University Press.

Lindsay, J. R. (2015). The impact of China on cybersecurity: Fiction and friction. International Security, 39(3), 7–47.

Mueller, M. (2010). Networks and states: The global politics of internet governance. MIT Press.

Nakashima, E. (2018). Russian military was behind ‘NotPetya’ cyberattack. The Washington Post.

Osiander, A. (2001). Sovereignty, international relations, and the Westphalian myth. International Organization, 55(2), 251–287.

Rid, T., & Buchanan, B. (2015). Attributing cyber-attacks. Journal of Strategic Studies, 38(1–2), 4–37.

Schmitt, M. N. (2013). The international law of cyber warfare. In M. E. O’ Connell (Ed.), International law and the use of force: A case-based approach (pp. 257–279). Cambridge University Press.

Schmitt, M. N. (Ed.). (2017). Tallinn Manual 2.0 on the international law applicable to cyber operations. Cambridge University Press.

Shackelford, S. J. (2014). Managing cyber attacks in international law, business, and relations. Cambridge University Press.

Shackelford, S. J. (2017). International cybersecurity law. Edward Elgar Publishing.

Tikk, E. (2010). International cyber incidents: Legal perspectives. NATO Cooperative Cyber Defence Centre of Excellence.

Tikk, E. (2015). International law and cyber operations. NATO Cooperative Cyber Defence Centre of Excellence.

Zetter, K. (2014). Countdown to zero day: Stuxnet and the launch of the world’s first digital weapon. Crown Publishing.


Make a Submission Order a Print Copy