The ‘Rules’ Of Modern Warfare Are Being Rewritten

Governments are becoming ever more reliant on digital technology, making them more vulnerable to cyber-attacks. 
In 2007, Estonia was attacked by pro-Russian hackers who crippled government servers, causing havoc. 

Cyber-attacks in Ukraine targeted the country’s electricity grid, while Iran’s nuclear power plants were infected by malware that could have led to a nuclear meltdown. In the US, president Trump recently declared a “national emergency” to recognise the threat to US computer networks from “foreign adversaries”.

Politically-motivated cyber-attacks are becoming increasingly commonplace but unlike traditional warfare between two or more states, cyberwarfare can be launched by groups of individuals. On occasion, the state is actually caught in the crosshairs of competing hacking groups. 

In most cases, cyberwarfare operations have been conducted in the background, designed as scare tactics or displays of power. But the blending of traditional warfare and cyberwarfare seems inevitable and a recent incident added a new dimension.

How to respond to Cyber Attacks
Israeli Defence Forces bombed a building allegedly housing Hamas hackers, after they had attempted to, according to the IDF, attack “Israeli targets” online. This is the first time a cyber-attack has been met with physical force by a state’s military. But who is to blame and how should states respond when defending against cyber-attacks?

Cyber-attacks are a serious challenge for established laws of armed conflict. Determining the origin of an attack isn’t impossible, but the process can take weeks. Even when the origin can be confirmed, it may be difficult to establish that a state was responsible. This is especially true when cyber operations could be perpetrated by hackers in other countries routing their attacks through different jurisdictions. 

NATO experts have highlighted the issue in the Tallinn Manual on International Law Applicable to Cyberwarfare. There is no consensus on whether a state is responsible for a cyber-attack originating from its networks if it did not have explicit knowledge of the attack. 

‘Cyber operations began to draw the attention of the international legal community in the late 1990s. Most significantly, in 1999 the United States Naval War College convened the first major legal conference on the subject. 

‘In the aftermath of 911 and ensuing conflicts diverted attention from the topic until the massive cyber operations by ‘hacktivists’ against Estonia in 2007 and against Georgia during its war with the Russian Federation in 2008, as well as cyber incidents like the targeting of the Iranian nuclear facilities with the Stuxnet worm in 2010’. 

Failure to take appropriate measures to prevent an attack by a host state could mean that the victim state is entitled to respond through proportionate use of force in self defence. But if there’s uncertainty around who is to blame for the attack, any justification for a counter-attack is diminished. 

Even if the problem of attribution is resolved, a state’s right to respond with force to a cyber-attack would normally be prohibited. Article 2(4) of the UN Charter protects the territorial integrity and political structures of states from attack. This can be lawfully bypassed if a state can claim they’re defending themselves against an “armed attack”.

The International Court of Justice explains that: 

‘It will be necessary to distinguish between the most-grave forms of the use of force (those constituting an armed attack) from other less grave forms’.

So a cyber-attack would justify force as self-defence if it could be considered an “armed attack”. But is that possible? Only when the “scale” and “effect” of a cyber-attack are comparable to an offline “armed attack”, such as attacks that lead to deaths and widespread damage to infrastructure. If so, self-defence is justified.

But what about when a cyber-attack has been successfully defended against? Then, its effects can only be guessed at. This makes deciding a proportional response even trickier. Physical force used as self-defence after the cyber-attack has already been successfully defended against could be considered unnecessary and therefore, illegal. 

An exception, however, might be made for a preemptive defence against an imminent or possible attack. When self-defence is considered reasonably necessary, the nature of the force permitted can vary. Proportionate counter-attacks with conventional military weapons can be acceptable responses to cyber operations under international law.

These issues are only the start of the challenges posed by cyberwarfare, which will get more complicated as technology develops. The intellectual challenges this will generate are numerous, but we still can’t help but be fearful.

Societies face potentially devastating consequences from cyberwarfare as we become more reliant on information technologies and communication networks for everyday life, and we’re only just starting to ask questions about it. 

The Conversation:       CSEF

You Might Also Read: 

NATO Could Go To War In Response To A Cyber Attack:

 

« Banks Investing Serious Money In Blockchain
Career Opportunities In Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

ITrust

ITrust

French cybersecurity pure player since 2007. ITrust offers its Cyber expertise services and develops disruptive products in Cyber/Artificial Intelligence.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Stripe OLT

Stripe OLT

At Stripe OLT, we provide complete business technology solutions - Our team has an unrivalled reputation as a Microsoft Gold Partner, specialising in secure, cloud-first technology.

NI Cyber Security Centre

NI Cyber Security Centre

NI Cyber Security Centre works to make Northern Ireland cyber safe, secure and resilient for its citizens and businesses.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

Panoptic Cyber

Panoptic Cyber

Panoptic Cyber are a team of elite Armed Forces Veterans who hold a wealth of experience in Information Security, Cyber Security, Data Protection and Risk Management.

Lightpoint Global

Lightpoint Global

Lightpoint Global is a bespoke software development company. We also provide a spectrum of services such as IT consulting, business analysis, QA and testing, and DevOps services.

Diverto

Diverto

Diverto is a company that provides a high level of information security to companies, institutions and other organisations in an information-centric world.

UltraViolet Cyber

UltraViolet Cyber

UltraViolet is an industry leading tech-enabled managed security services company.