Cyber Warfare Opens A New Front Against Civilians

Technology is a plant that is forever growing and humanity cannot currently anticipate its full height or width. The increasing use of cyberspace for virtually everything in contemporary life creates a scenario where we cannot imagine life without all the convenience it has brought.

Modern warfare is increasingly adjusting its power towards cyberspace as opposed to the traditional weapons.

The unique nature of cyberwarfare is that it does not need matching armies, it only needs keyboards, the equivalent of gunpowder in current warfare. This means that nations have lost their monopoly to wage war thus making armed conflicts more dangerous while leaving civilians ever more exposed.

Anyone with a keyboard and the skills can launch cyber-attacks against the state or any other entity that can be targeted. In a doomsday scenario, it paints a war of everyone against everyone because the skills can be learnt easily by anyone and the attendant tools are available for download on the Internet.

As such, the ability to enjoy e-commerce, among other advantages, does not come devoid of the possible damage that could result from full-scale cyberwar. In the words of Anthony Sinopoli, “The potential for disastrous consequences in a nuclear attack can be matched in the case of an all-out attack using cyber-warfare.

The example of a cyber-attack where critical infrastructures are destroyed or otherwise rendered useless can leave a state in a helpless position, causing unnecessary suffering to its citizens.”

Despite its convenience and its ability to launch attacks effectively without marching troops, there is no war that has been waged purely on cyber means.

Contemporary warfare incorporates the cyber capabilities alongside traditional methods and weapons. For instance, the Russian cyber-attacks against Ukraine and Georgia combined cyber attacks and kinetic means.

However, it is plausible that a full-scale cyberwar is possible even though recent conflicts have not been waged in that fashion. We are in the early days of keyboard combatants, and thus the future portends wars that may eliminate the need for physical armies in the invaded country.

Why, say, would a country expose its soldiers to possible injuries when it can comfortably cripple them by executing malware?

The wide ranging capabilities of cyber warfare can be deceptive as to what is allowed in the context of an armed conflict. Under the laws of armed conflict, not every action is permissible.

In other words, just because you can do something does not mean it necessarily becomes legal.In cyber-warfare, you can attack and disable hospitals or destroy dams remotely or through malware but it amounts to a violation of the laws of war. However, not every violation of the laws of war is a war crime. War crimes are a special category within the laws of armed conflict. War crimes can only occur within an existing state of war, an armed conflict.

In this case, this distinction is important because war crimes can be cyber-crimes but the reverse is not necessarily true.

The law of armed conflict provides a list of the actions that qualify as war crimes, for example willful killing, torture, biological experiments, taking hostages, or unlawful deportation. It is possible to commit egregious violations of the law of armed conflict through cyberwarfare but they will not necessarily become war crimes.

But it is not enough to classify actions as cybercrime or war crimes. The alleged crimes must be proved through admissible evidence to sustain a conviction, or to an acquittal.

Cyberwarfare is a realm where actions, violations or omissions leave no definitive evidence. Any court faced with alleged crimes of cyber-warfare will need to exercise judicial novelty.

Depending on the skillset of the perpetrators, it is possible to implicate an innocent user of cyber-space while absolving themselves of any crime.

There are no blood stains or fingerprints because sophisticated actors can erase all evidence of their involvement. Hence, war crimes by keyboard combatants are harder to prove.
 
The main challenge in the issue of evidence is because cyber weapons have no ethnicity, nationality or geographic identification. Cyberspace knows no boundaries and its weapons come with a faceless nature which traverses all keyboards, whether Kenyan or American, Estonian or Tanzanian.

The relevant provisions of Hague Law or Geneva Law can address all violations of humanitarian law committed through cyber warfare. Thus, it is needless to forge such any convention. States should rather wait for the slow crystallisation of customary law on cyber warfare than act in vain.

Ein News:

You Might Also Read:

Cybersecurity: The Cold War Online:

The Stage Is Set For Cyber War:

 

« There Are No Civilians In Cyber Warfare
Kenya Is 3rd in Africa for Cybercrime Readiness »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

PSYND

PSYND

PSYND is a Swiss consultancy company based in Geneva specialized in CyberSecurity and Identity & Access Management.

Halcyon Knights

Halcyon Knights

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. Areas of specialisation include cybersecurity.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

AuthLite

AuthLite

With AuthLite, you can keep using all your existing software, with added two-factor authentication security placed exactly where you need it.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

Wazuh

Wazuh

Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

BeamSec

BeamSec

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats.