Cyber Warfare Opens A New Front Against Civilians

Technology is a plant that is forever growing and humanity cannot currently anticipate its full height or width. The increasing use of cyberspace for virtually everything in contemporary life creates a scenario where we cannot imagine life without all the convenience it has brought.

Modern warfare is increasingly adjusting its power towards cyberspace as opposed to the traditional weapons.

The unique nature of cyberwarfare is that it does not need matching armies, it only needs keyboards, the equivalent of gunpowder in current warfare. This means that nations have lost their monopoly to wage war thus making armed conflicts more dangerous while leaving civilians ever more exposed.

Anyone with a keyboard and the skills can launch cyber-attacks against the state or any other entity that can be targeted. In a doomsday scenario, it paints a war of everyone against everyone because the skills can be learnt easily by anyone and the attendant tools are available for download on the Internet.

As such, the ability to enjoy e-commerce, among other advantages, does not come devoid of the possible damage that could result from full-scale cyberwar. In the words of Anthony Sinopoli, “The potential for disastrous consequences in a nuclear attack can be matched in the case of an all-out attack using cyber-warfare.

The example of a cyber-attack where critical infrastructures are destroyed or otherwise rendered useless can leave a state in a helpless position, causing unnecessary suffering to its citizens.”

Despite its convenience and its ability to launch attacks effectively without marching troops, there is no war that has been waged purely on cyber means.

Contemporary warfare incorporates the cyber capabilities alongside traditional methods and weapons. For instance, the Russian cyber-attacks against Ukraine and Georgia combined cyber attacks and kinetic means.

However, it is plausible that a full-scale cyberwar is possible even though recent conflicts have not been waged in that fashion. We are in the early days of keyboard combatants, and thus the future portends wars that may eliminate the need for physical armies in the invaded country.

Why, say, would a country expose its soldiers to possible injuries when it can comfortably cripple them by executing malware?

The wide ranging capabilities of cyber warfare can be deceptive as to what is allowed in the context of an armed conflict. Under the laws of armed conflict, not every action is permissible.

In other words, just because you can do something does not mean it necessarily becomes legal.In cyber-warfare, you can attack and disable hospitals or destroy dams remotely or through malware but it amounts to a violation of the laws of war. However, not every violation of the laws of war is a war crime. War crimes are a special category within the laws of armed conflict. War crimes can only occur within an existing state of war, an armed conflict.

In this case, this distinction is important because war crimes can be cyber-crimes but the reverse is not necessarily true.

The law of armed conflict provides a list of the actions that qualify as war crimes, for example willful killing, torture, biological experiments, taking hostages, or unlawful deportation. It is possible to commit egregious violations of the law of armed conflict through cyberwarfare but they will not necessarily become war crimes.

But it is not enough to classify actions as cybercrime or war crimes. The alleged crimes must be proved through admissible evidence to sustain a conviction, or to an acquittal.

Cyberwarfare is a realm where actions, violations or omissions leave no definitive evidence. Any court faced with alleged crimes of cyber-warfare will need to exercise judicial novelty.

Depending on the skillset of the perpetrators, it is possible to implicate an innocent user of cyber-space while absolving themselves of any crime.

There are no blood stains or fingerprints because sophisticated actors can erase all evidence of their involvement. Hence, war crimes by keyboard combatants are harder to prove.
 
The main challenge in the issue of evidence is because cyber weapons have no ethnicity, nationality or geographic identification. Cyberspace knows no boundaries and its weapons come with a faceless nature which traverses all keyboards, whether Kenyan or American, Estonian or Tanzanian.

The relevant provisions of Hague Law or Geneva Law can address all violations of humanitarian law committed through cyber warfare. Thus, it is needless to forge such any convention. States should rather wait for the slow crystallisation of customary law on cyber warfare than act in vain.

Ein News:

You Might Also Read:

Cybersecurity: The Cold War Online:

The Stage Is Set For Cyber War:

 

« There Are No Civilians In Cyber Warfare
Kenya Is 3rd in Africa for Cybercrime Readiness »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA) offer commercial insurance services including Cyber Liability insurance.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Hackuity

Hackuity

Hackuity is a breakthrough technology solution that rethinks the way of managing IT vulnerabilities in enterprises.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.