Acts of War in Cyberspace

“One of the big problems we face with cyber is that it hasn’t really been discussed internationally about what is the acceptable use of cyber-powers, where the red lines are and what happens when those red lines are crossed.”

Sir John Sawers — Former chief of the British Secret Intelligence Service [MI6]

tallinmanual

Senator John McCain (R-Ariz.), the chairman of the US Armed Services Committee, has said he believes Russia’s — alleged — interference in the 2016 presidential election amounted to an act of war. Legal scholars disagree. What defines an act of war in cyberspace? The US Military is currently working out its own definition. Follow us on Twitter: @Intel_Today

Although, there is a broad consensus on what constitutes an “Act of War” and how to define “Cyberspace”, there is no agreement on the definition of an act of war in cyberspace.

[NOTE: “A May 12 2008 ‘for official use only’ memo signed by Deputy Defense Secretary Gordon England defines ‘Cyberspace’ as “a global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.”  Wired ]

Can the existing legal framework be applied to cyber conflict? Assuming that it is the case,  is the existing framework adequate? Or does it require additional concepts and specific definitions?

Asked during a congressional hearing last year if offensive cyber operations could constitute an act of war, Admiral Atkin — Office of the US Secretary of Defense  — answered that an act of war [in the cyber domain] has not yet been defined.

“We are still working towards that definition across the interagency,” said Thomas Atkin.

“When determining whether a cyber incident constitutes an armed attack, the U.S. Government considers a number of factors including the nature and extent of injury or death to persons and the destruction of, or damage to, property.

Besides effects, other factors may also be relevant to a determination, including the context of the event, the identity of the actor perpetrating the action, the target and its location, and the intent of the actor, among other factors.”

RELATED POST: Former MI6 Chief: ‘ Electronic voting presents serious hacking risk.’

RELATED POST: MI6 Alex Younger & BND Bruno Kahl: Russian Hackers Will Target European 2017 Elections

Admiral Atkin also warned that civilians — who support military cyber operations — are not lawful combatants and therefore not legally protected as soldiers.

“During armed conflict, some civilians who support the U.S. armed forces may sit at the keyboard and participate, under the direction of a military commander, in cyberspace operations. The law of war does not prohibit civilians from directly participating in hostilities, such as offensive or defensive cyberspace operations, even when that activity would be a use of force or would involve direct participation in hostilities.”

“However, in such cases, a civilian is not a ‘lawful combatant’ and does not enjoy the right of combatant immunity, is subject to direct attack for such time as he or she directly participates in hostilities, and if captured by enemy government forces may be prosecuted for acts prohibited under the captor’s domestic law.”

International Law

Toni Gidwani, a former Department of Defense analyst who now heads up operations research at cyber-security firm “ThreatConnect”, agrees:

“The rules here are not as clean in terms of what’s allowable and what the consequences are.”

According to the US Department of State, cyber activities would constitute a use of force if they were to cause direct physical injury and property damage such as (1) operations that trigger a nuclear plant meltdown; (2) operations that open a dam above a populated area causing destruction; or (3) operations that disable air traffic control resulting in airplane crashes.

“The [US] government has defined an armed attack in cyberspace as one that results in death, injury or significant destruction, as Harold Koh, the State Department’s chief legal adviser, recently put it. Here’s the rule of thumb, as Koh stated it.”

“If the physical consequences of a cyberattack work the kind of physical damage that dropping a bomb or firing a missile would, that cyberattack should equally be considered a use of force.”

“If an attack reaches those levels, then a nation has a right to act in self-defence.” [Washington Post 2012]

The Tallinn Manual

The Tallinn Manual 2.0 is an updated reference for lawyers around the world on how International Law applies to cyberspace.The new manual was published by Cambridge University Press in March 2017.

Michael Schmitt is the chairman of the U.S. Naval War College’s International Law Department and director of a project that analyzes how International Law applies to cyber operations.

Schmitt — also a law professor at the University of Exeter in Britain — led the legal team that compiled the manual.

“I’m no friend of the Russians. But Moscow’s hacking and dumping of Democratic emails to WikiLeaks is not an initiation of armed conflict. It’s not a violation of the U.N. Charter’s prohibition on the use of force. It’s not a situation that would allow the U.S. to respond in self-defense militarily,” Schmitt recently said.

Hacking the DNC’s emails is an act of political espionage, which is not a breach of international law, Schmitt added.

RELATED POST: Obama’s Cryptic Comment on the DNC Leaks

RELATED POST: ‘Russia Hacking’: The Facts about Obama’s Warning Message to Putin

RELATED POST: International Law and Cyber Warfare. From the Tallinn Manual to a Digital Geneva Convention?

Microsoft weighs in

On February 14 2017, Microsoft President Brad Smith  pressed the world’s governments to form an international body to protect civilians from state-sponsored hacking.

“Countries need to develop and abide by global rules for cyber attacks similar to those established for armed conflict at the 1949 Geneva Convention that followed World War Two.

Technology companies need to preserve trust and stability online by pledging neutrality in cyber conflict.

We need a Digital Geneva Convention that will commit governments to implement the norms needed to protect civilians on the internet in times of peace.”

Cyber warfare: Legal experts and programmers search for solutions

“In war, anything connected to a computer network can be targeted from anywhere in the world, according to experts attending a recent conference on cyber warfare in Moscow. That includes civilian objects, so many countries are looking at how to protect civilians from cyber attacks. And one of the solutions is to comply with IHL in cyberspace.”

Is Cyberwarfare a Serious Problem? Richard Clarke (2010)

“Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War!

Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.”

REFERENCES

The Tallinn Manual — WIKIPEDIA

Russia’s apparent meddling in U.S. election is not an act of war, cyber expert says — Washington Post

Online voting could leave British elections vulnerable to hacking, former MI6 head warns – Independent

By November, Russian hackers could target voting machines

Russian Hacking and the U.S. Election: Against International Law?

International Law in Cyberspace — US Department of State

‘Digital Geneva Convention’ needed to deter nation-state hacking: Microsoft president — REUTERS

Is “Cyberwar” War? — Secrecy News

=

Acts of War in Cyberspace

This entry was posted in Cyber Warfare, DNC & Podesta Leaks, International law, Obama, Russia, Tallin Manual, Wikileaks and tagged , , , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s