• Monday, Dec 06, 2021
  • Last Update : 01:15 am

The rules of warfare are changing

  • Published at 12:01 am May 21st, 2019
Cyber Criminal

Information technology is changing the nature of battle

Governments are becoming more and more reliant on digital technology, making them more vulnerable to cyber attacks. In 2007, Estonia was attacked by pro-Russian hackers who crippled government servers, causing havoc. Cyber attacks in Ukraine targeted the country’s electricity grid, while Iran’s nuclear power plants were infected by malware that could have led to a nuclear meltdown.

In the US, President Trump recently declared a “national emergency” to recognize the threat to US computer networks from “foreign adversaries.”

Politically-motivated cyber attacks are becoming increasingly commonplace, but unlike traditional warfare between two or more states, cyber warfare can be launched by groups of individuals. 

On occasion, the state is actually caught in the crosshairs of competing hacking groups. 

This doesn’t mean that states don’t actively prepare for such attacks. British defense officials have said they’re prepared to conduct cyber attacks against Moscow’s power grid, should Russia decide to launch an offensive. 

In most cases, cyber warfare operations have been conducted in the background, designed as scare tactics or displays of power. 

But the blending of traditional warfare and cyber warfare seems inevitable, and a recent incident added a new dimension.

How to respond to cyber attacks

Israeli Defense Forces bombed a building allegedly housing Hamas hackers, after they had attempted to, according to the IDF, attack “Israeli targets” online. 

This is the first time a cyber attack has been met with physical force by a state’s military. But who is to blame and how should states respond when defending against cyber attacks? 

Cyber attacks are a serious challenge for established laws of armed conflict. Determining the origin of an attack isn’t impossible, but the process can take weeks. 

Even when the origin can be confirmed, it may be difficult to establish that a state was responsible. 

This is especially true when cyber operations could be perpetrated by hackers in other countries routing their attacks through different jurisdictions. 

NATO experts have highlighted the issue in the Tallinn Manual on International Law Applicable to Cyberwarfare. There is no consensus on whether a state is responsible for a cyber attack originating from its networks if it did not have explicit knowledge of the attack. Failure to take appropriate measures to prevent an attack by a host state could mean that the victim state is entitled to respond through proportionate use of force in self defense. 

But if there’s uncertainty around who is to blame for the attack, any justification for a counter-attack is diminished. 

Even if the problem of attribution is resolved, a state’s right to respond with force to a cyber attack would normally be prohibited. 

Article 2(4) of the UN Charter protects the territorial integrity and political structures of states from attack. This can be lawfully bypassed if a state can claim they’re defending themselves against an “armed attack.”

The International Court of Justice explains that: It will be necessary to distinguish between the gravest forms of the use of force (those constituting an armed attack) from other less grave forms.

So a cyber attack would justify force as self-defense if it could be considered an “armed attack.” 

But is that possible? Only when the “scale” and “effect” of a cyber attack are comparable to an offline “armed attack,” such as attacks that lead to deaths and widespread damage to infrastructure. If so, self-defense is justified. 

But what about when a cyber attack has been successfully defended against? Then, its effects can only be guessed at. This makes deciding a proportional response even trickier. 

Physical force used as self-defense after the cyber attack has already been successfully defended against could be considered unnecessary and therefore, illegal. 

An exception, however, might be made for a pre-emptive defense against an imminent or possible attack.

When self-defense is considered reasonably necessary, the nature of the force permitted can vary. 

Proportionate counter-attacks with conventional military weapons can be acceptable responses to cyber operations under international law.

These issues are only the start of the challenges posed by cyber warfare, which will get more complicated as technology develops. The intellectual challenges this will generate are numerous, but we still can’t help but be fearful.

Societies face potentially devastating consequences from cyber warfare as we become more reliant on information technologies and communication networks for everyday life -- and we’re only just starting to ask questions about it. 

Vasileios Karagiannopoulos is Senior Lecturer in Law and Cybercrime, University of Portsmouth. Mark Leiser is Assistant Professor of Law and Digital Technologies, Leiden University. This article first appeared in The Conversation UK.

Facebook 72
blogger sharing button blogger
buffer sharing button buffer
diaspora sharing button diaspora
digg sharing button digg
douban sharing button douban
email sharing button email
evernote sharing button evernote
flipboard sharing button flipboard
pocket sharing button getpocket
github sharing button github
gmail sharing button gmail
googlebookmarks sharing button googlebookmarks
hackernews sharing button hackernews
instapaper sharing button instapaper
line sharing button line
linkedin sharing button linkedin
livejournal sharing button livejournal
mailru sharing button mailru
medium sharing button medium
meneame sharing button meneame
messenger sharing button messenger
odnoklassniki sharing button odnoklassniki
pinterest sharing button pinterest
print sharing button print
qzone sharing button qzone
reddit sharing button reddit
refind sharing button refind
renren sharing button renren
skype sharing button skype
snapchat sharing button snapchat
surfingbird sharing button surfingbird
telegram sharing button telegram
tumblr sharing button tumblr
twitter sharing button twitter
vk sharing button vk
wechat sharing button wechat
weibo sharing button weibo
whatsapp sharing button whatsapp
wordpress sharing button wordpress
xing sharing button xing
yahoomail sharing button yahoomail