NATO Cyberwar: Establishing Rules Of Engagement

Counter-measures are operations that would otherwise be unlawful but can be used if the purpose is to stop another state from violating the law. 

In a red brick building on a 19th-century Russian czarist military compound in Tallinn, Estonia, a team of cyber experts is analyzing the hacking of the Democratic National Committee and how a Western democracy can legally respond.

Inside, the building is cutting-edge high-tech. These military officers, lawyers and cyber techies are part of NATO's Cooperative Cyber Defence Centre of Excellence, carrying out research, training and exercises. One of their biggest challenges: When it comes to cyber, so far, there is no agreed-upon international law of war.

"The international community is extraordinarily interested in this," said Michael N. Schmitt, chairman of the US Naval War College's international law department. "They're struggling with questions like, when the Russians hack into the DNC database and then release it, is that a violation of international law? What doors does that open with respect to our responses?"

Three years ago, Schmitt and his team at the NATO Cyber Centre wrote the book, literally, on international law and the use of cyber in warfare, the "Tallinn Manual." Applying principles of the international law of war, they provided answers to questions like: "In war, how can you use cyber and how can you not use it? If you operate against civilians, is that prohibited?"

They're now completing the "Tallinn Manual 2.0," examining how international law applies to cyber-attacks that don't cross the line into armed conflict by one state against another or by a terrorist group that kills civilians, what's called "below the threshold" operations.

The DNC hacks and the release of emails are "below the threshold" operations and, although Russia denies it did the hacking, the US government has been extraordinarily clear in accusing Moscow, citing 17 US government agencies that have concluded Russia was behind it.

"This, in my opinion, has reached a specific threshold in the audacity and impact of the attack," said the Cyber Defence Centre's Strategy Branch Chief Matthijs Veenendaal, a Dutch citizen. "This is still very much an attack on civilian infrastructure and government infrastructures and not an armed attack."

If that's the case, did Russia violate international law? Schmitt has no doubt. "In my mind, it is crystal clear that the Russians have violated international law in this particular case." But here is where it gets less clear: Schmitt and other experts say Russia and cyber-savvy countries like China are "playing the margins."

"They're operating within the space where there is some degree of uncertainty," he explained. If Russia had destroyed America's cyber infrastructure, that would be a use of force and hence a violation. If Russia is simply engaging in low-level espionage, that's a violation of domestic US law, but probably not a violation of international law.

Schmitt, however, called the DNC hack a "prohibited intervention into the internal affairs of the United States," affairs that include running elections, and that means it is a violation of international law.

It may also be a violation of US sovereignty, he said. If Russia is simply "infiltrating" data, or stealing it but not doing anything with it, that's not a violation, but if there is proof it is using data and manipulating election results, that would be a violation.

As Schmitt sees it, the DNC hacks are not a game-changer, but a major disruption of the US economy would be. "My personal view is that would constitute moving over the threshold and allow us to take off the gloves."

"But," he added, "that view is not universally held."

Vice President Joe Biden has indicated the US will retaliate against the hack of the DNC and other Democratic Party entities, warning that the administration will be "sending a message" to Russian President Vladimir Putin. Putin, he said, "will know it, and it will be at the time of our choosing, and under the circumstances that have the greatest impact."

But under international law, does President Barack Obama have the legal right to retaliate? Schmitt of the Naval War College maintains that Obama "unambiguously" does have the right to respond, but Schmitt would not use the term "retaliate."

"In international law, we don't do tit for tat," he said. "What we may do is engage in what is called, and this is a legal term, 'counter measures.' "

Counter-measures are operations that would otherwise be unlawful but can be used if the purpose is to stop another state from violating the law. So the US could hack back against the Russians? The answer is yes, Schmitt said, as long as Washington reasonably believes Moscow is going to continue to hack it.

Counter-measures don't have to be cyber-related. The US, for example, could prevent Russian ships from transiting its territorial waters until Russia stops its cyber breaches. The response, however, must be "proportionate." Shutting down a Russian electric grid would only be permissible if it didn't cause more harm to Russia than its hacking caused the US, a tricky thing to measure.

As the US considers itself a law-abiding country, it most often tries to follow accepted international law of war principles. It could, however, ignore those internationally accepted principles or interpret them in its favor. "I know some in America have called for that (retaliation), and I can see where the urge comes from, because you want Russia to stop it," said the Cyber Defence Centre's Veenendaal, but going on a path of escalation with the Russians is a "recipe for disaster."

"Responding to an escalation with your own escalation will lead to further escalation, which -- in cyber space -- is extremely hard to contain and monitor, especially for Western democracies," he warned.

The cyber world presents unique challenges, like the ability for actors to maintain "plausible deniability," which makes it devilishly hard to define who is behind an attack.

"You can always just plausibly state that this was just a 19-year-old hacker working in someone's basement in Belarus," said Kadri Kaska, an Estonian researcher at the NATO center.

Pointing the finger at the perpetrators, "attribution", also is not that simple. If an intelligence agency says it knows who did it, it could be challenged to reveal sources and methods of how it collects intelligence data.

"Probably in the US National Security Agency there are a lot of discussions ongoing, like, 'How far should we go in publicly attributing these attacks to these guys in St. Petersburg? We know who their girlfriends are, we know who they talk to. We're deep in their systems, we're deep in any Russian system you can think of. And we want to stay there,' " according to Veenendaal.

The US has responded to hacks by China by "naming and shaming" specific officials in the Chinese military whom it holds responsible for attacks, then entering discussions with Beijing to deter further economic espionage. "But against the Russians," he said, "no, we haven't been effective."

Veenendaal and other cyber experts say the Chinese, in an effort not to jeopardize their economic relations with the US, have quietly pulled back some of their hacking. With Russia, however, there is little economic incentive.

In July, NATO included cyber as a domain of its military operations, along with land, sea, air and space. That means if there is an armed attack through cyberspace, NATO members can call on their allies for collective defense.

But intrusions, like the DNC hacks, that fall short of armed attacks still lie in a gray zone, exploited by nations clever enough not to cross the line that would trigger an armed response. They are the cyber equivalent of the "little green men" that Russia used in Crimea: Russian armed forces without insignia whose existence Putin, at first, denied.

The West, so far, has no common strategy to deter "little green hackers." The DNC hacks may be their first major operation against the US, but they almost surely won't be their last.

Ein News:              Russian General Brags About Cyberwar Successes:     NATO Tools Up For Cybewar:

 

« Fears Of Hacked US Election Ebb Away
Smartphone Attachment Can Detect Cancer »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Libraesva

Libraesva

Libraesva specialize in Email Security. From Email Security, Phishing Awareness and Email Archiver. We can assist you with any email issues you may have.

CCL Solutions Group

CCL Solutions Group

CCL is one of Europe’s leading digital investigation specialists, supporting law enforcement, government and organisations across both public and private sectors.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

RFA

RFA

RFA is an institutional-quality IT, financial cloud and cyber-security services provider to the financial service and investment management sector.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

StrikeReady

StrikeReady

StrikeReady have developed CARA, an advanced technology solution that offers personalized and proactive assessment and remediation of future and current risk in real-time.

Stripe OLT

Stripe OLT

At Stripe OLT, we provide complete business technology solutions - Our team has an unrivalled reputation as a Microsoft Gold Partner, specialising in secure, cloud-first technology.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

Darknone Global

Darknone Global

Darknone is a consortium of elite hackers and security leaders united by an unbridled passion for augmenting the security of the digital realm.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.