You are on page 1of 7

LECTURE NOTES

Corresponding Evolution: International Law and the Emergence of Cyber Warfare

A. Definition of Terms: floods it with so many additional requests


that regular traffic is either slowed or
Cyberspace completely interrupted". Generally, DOS
attacks work by crippling a website or
A global domain within the information computer network resource and making it
environment consisting of the unusable by overwhelming the resource
interdependent network of information with a massive amount of information
technology infrastructures, including the requests, resulting in an inability to
Internet, telecommunications networks, respond to legitimate information and
computer systems, and embedded data requests.
processors and controllers. (US
Department of Defense) 2. Malicious Programs

The total interconnectedness of human Malicious programs, or malware, typically


beings through computers and operate by disrupting normal computer
telecommunication without regard to functions, or by opening a back door for a
physical geography. remote attacker to take control of the
(US Congressional Research Service) computer. Viruses, the most common form
of malicious programming, may function to
A domain characterized by the use of delete certain computer files or make such
computers and other electronic devices to files unusable. Specifically, a virus attaches
store, modify, and exchange data via itself to a computer program or file and
networked systems and associated spreads from one computer to another,
physical infrastructures. moving across computer networks by way
of self-replication. Additionally, a virus will
(National Military Strategy for Cyberspace typically carry a "payload"- a side effect of
Operations) the virus that normally functions to corrupt
or destroy computer data on the infected
Cyber Warfare computer. Viruses typically have the
ability to remain discretely present within
A state sponsored use of weapons an infected computer, only becoming
functioning within the cyberspace domain destructive when a user runs or opens the
to create problematic and destructive real- software to which the malicious program
world effects. The lack of workable, has been attached.
universally accepted definitions of
cyberspace and cyber warfare only further The other common form of malicious
exacerbates any attempt to analyze programming, a worm, functions similarly
international regulation of activities, such by spreading from one computer to
as cyber warfare, occurring within the another and eventually infecting an entire
cyberspace domain. computer network. However, a worm
differs from a virus in that it is both
B. The Weapons of Cyber Warfare capable of traveling across a computer
system without aid from individual
1. Denial of Service computer users and it is capable of directly
replicating itself thousands of times within
A denial-of-service ("DoS") attack is a single computer. Worms tend to
defined as an assault on a network that consume massive amounts of memory, and
LECTURE NOTES
Corresponding Evolution: International Law and the Emergence of Cyber Warfare

as a result, infected computers, and the 5. Trojan Horses


networks they operate on, often become
unresponsive. With recent cyber advances, Trojan horses, as the name implies,
worms may now allow individuals to tunnel operate as a kind of malicious software
into computer systems and even remotely based on fooling targeted computers into
control the infected computer. believing that the malicious program will
actually perform a useful or desired
3. Logic Bombs function. Instead, the Trojan horse
acquires unauthorized access to the
Logic bombs, a more advanced type of infected computer. Subsequently, the
malicious programming, only execute their Trojan horse programming allows a
destructive effects when triggered by remote user to access the infected
particular events occurring at a pre- computer and may also cause the infected
determined time. A logic bomb can sit computer to serve as a resource in later
dormant for long periods of time DOS attacks. These key weapons of cyber
unsuspected and then be activated, warfare are becoming increasingly
making its effects far more likely to be accessible to an ever-growing number of
wide-spread than if its' malicious impact states. Recent studies have determined
was readily apparent. 48 Once activated, a that, given the modest costs involved in
logic bomb may cause severe damage to conducting basic cyber warfare operations,
the infected computer, rendering it entirely nearly 140 states have operational cyber
unusable, deleting specific data, or even warfare programs." The availability of
functioning to activate a more complex cyber warfare weaponry, and the
DOS attack. potentially devastating effects that such
weapons may have on an enemy's critical
4. IP Spoofing infrastructures during global conflict,
further indicate the paramount importance
Also known as IP address forgery, IP of understanding the legal implications of
spoofing is a kind of hijacking technique cyber warfare. The increased willingness to
that allows the hacking user to operate a engage in cyber warfare operations,
computer while appearing as a trusted examples of which form the basis of the
host. By thus concealing his true identity, following Part of this comment, make clear
the hacker can gain access to computer the immediate need for such
networks and network resources. When consideration.
hijacking a network Internet browser, any
computer using the browser upon entering C. Modern Proliferation:
a URL is taken to a fraudulent webpage
mirroring the entered site page but Instances of Cyber Warfare in Our
created by the hijacker. The moment the Contemporary World
user interacts with any of the content of
the fraudulent webpage, the hijacking user 1. Estonia
gains the ability to access sensitive
network information or the computer's In April of 2007, one of the world's most
fundamental programming features. Internet-dependent nations, Estonia, came
under severe and crippling cyber-attack.
The DDoS attack ultimately left the nation
in cyber shambles: only hours after the
LECTURE NOTES
Corresponding Evolution: International Law and the Emergence of Cyber Warfare

attack, the web sites of Estonia's leading elections. In response to what many
banks, newspapers, and major Iranians felt was an unfair election, the
government agencies had crashed, movements began coordinating
thrusting the nation into cyberspace demonstrations and undertaking efforts to
isolation. bring down key government web sites.
The internal forces working to subvert the
2. Georgia Iranian government were coordinating
their activities through Twitter, a U.S.-
In 2008, Georgia, responding to separatist based online communications and posting
actions, launched surprise aerial and web application. Despite the requests of
ground attacks against the revolutionary the Iranian government to cease its
forces located in the provinces of South functioning within Iran, Twitter took
Ossetia and Abkhazia. Shortly thereafter, a affirmative steps to remain active and
simple, yet crippling DDoS attack hit usable by the Iranian population. It
several of Georgia's government and remains unclear whether the decision to
media websites. These initial cyber-attacks remain operable came solely from Twitter,
were traced to commanding servers in or if the decision was backed by U.S.
Russia. Although there remains no direct government officials.. Second, in 2010,
evidence of Russian government Iran's two major nuclear power and
involvement, the subsequent actions make research facilities at Bushehr and Natanz
some degree of Russian State involvement were hit with what FOX News called the
seem far more likely. Only a short while "most sophisticated cyberweapon ever
after the initial cyber-attacks on Georgian created." The weapon, dubbed Stuxnet,
websites, Russian army, navy, and air operates as a cybermissile equipped with
forces formed the heart of a kinetic military a warhead designed specifically to
offensive against the territorial sovereignty penetrate advanced security systems and
of the Georgian State. The ability to take control of general computer system
coincide cyber attacks with conventional controls. Although Iran initially denied that
military offensives makes for an efficiently any attack had taken place, it has since
devastating combination and, in the admitted that the Stuxnet weapon was a
current state of international legal massive disruption to the development of
uncertainty surrounding the state- its nuclear program.
sponsored use of cyber attacks, they may
become more and more prevalent as a D. The Applicability of Current
general military strategy. International Laws to Cyber Warfare

3. Iran At present, international law has yet to


fully comprehend the legal ramifications of
In 2009, two events relating to the volatile cyber warfare. As such, international law
Iranian state further evidenced the power, typically only applies to cyber warfare
utility, and growing use of cyber warfare in activities by analogy.
modem military strategy. First, following
the 2009 Iranian elections, there erupted The analogies is inadequate by its very
what FOX News termed a "full-on guerrilla nature. As such, the attempts to address
cyberwar" between the Iranian perhaps the greatest threat to
government and dissatisfied domestic international security since the
movements protesting the national development of the atomic bomb require
LECTURE NOTES
Corresponding Evolution: International Law and the Emergence of Cyber Warfare

more consideration in order to be truly international law regime can also be


effective. applied to cyber warfare operations. in
considering the five traditional modes of
E. Inadequacies of Current International acquiring criminal jurisdiction for
Laws international crimes - territorial, active
nationality, protective security, passive
Presently, international law is unable to nationality, and universality - it becomes
deal with three key legal issues raised by apparent that several of these theories
cyber warfare: the problems of attribution, may be helpful in deciding jurisdiction over
jurisdiction, and "use of force." These cyber warfare operations. Although the
paramount considerations are problematic active and passive nationality principles
in the cyber warfare context because they remain potentially applicable to instances
make clear the fundamental flaw in of non-state actor cyber-attacks, it is the
attempting to apply current international territorial, protective security, and
law to cyber warfare: international law universality principles that would create a
naturally assumes it can be made far more efficient basis for determining
applicable to any type of military strategy, jurisdiction over state-attributed cyber
however, the reality is that cyber warfare warfare.
cannot be adequately addressed by the
existing paradigm and structure of Although this may help resolve the issue
international law. of jurisdiction, it would do little more than
transfer the burden of identifying the
1. Attribution Problem culprit behind the attack to a victim-state
that, because of that attack, is likely to be
The most commonly identified challenge even less equipped to trace the origin of
that cyber warfare poses for the present the cyber-based strike. Ultimately, the
international legal regime is the concept of problems of jurisdiction, like those of
attribution. The concept of attribution-the attribution, seem to lead inexorably to the
question of whose acts are attributable to same conclusion: cyberspace and cyber
a sovereign national State-is a critical warfare operations transcend the most
question in present international law for fundamental assumptions underlying
two reasons. First, identifying the source traditional international law and, as such,
of an attack allows the victim to make an it is only through the creation of a new
appropriate response against that party international legal paradigm that effective
without threatening innocent collateral solutions can emerge.
damage, and second, the right of reprisal
and self-defense of a State that is the 3. "Use of Force" Problem
victim of a cyber-attack largely depend on
whether the identity of the attacker can be Perhaps the most critical problem with
definitively determined. seeking to apply the current international
legal regime to cyber warfare is the
2. Jurisdiction Problem general uncertainty surrounding what
constitutes "use of force," and,
The necessary inquiry regarding the accordingly, what self-defense responses
jurisdiction problem is whether any of the remain permissible reactions under
traditional jurisdiction principles already international law. Under current,
existing and applicable under the present customary international law, codified in the
LECTURE NOTES
Corresponding Evolution: International Law and the Emergence of Cyber Warfare

U.N. Charter Article 2(4), defining an act as potentially catastrophic consequences of


a "use of force" is important for two full-scale cyber warfare based on anything
reasons. First, if an act is defined as a "use less than absolutely certain State
of force", it is presumptively illegal under attribution. Secondly, international legal
both customary international law and the concepts of jurisdiction must also evolve
U.N. Charter. Second, if an action is defined to accommodate the technological
as a "use of force" under these provisions, innovation that underpins the
retaliation by the victim state may be development of cyber warfare. While the
expressly permitted by those same traditional forms of establishing state
provisions. While the importance of jurisdiction over internationally unlawful
defining an act of cyber warfare as "use of conduct prove inadequate for dealing with
force," and hence illegal under instances of cyber warfare, new modes of
international law, is apparent,the jurisdiction must be developed by the
attribution issue also makes cyber warfare international community that take into
problematic in terms of self-defense. account the unique characteristics of the
cyberspace domain. Finally, the
F. The Future of Cyber Warfare and international definition and understanding
International Law of what constitutes an unlawful "use of
force" under the U.N. Charter and
1. Evolution customary international law must also
evolve to account for cyber warfare
In order for international law to effectively operations. Although a present
address the issues raised by cyber warfare consideration of cyber warfare as a "use of
operations, the traditional international force" under international law may be
legal regime must adapt to the core factor inadequate and uncertain, there are
driving the development of cyber warfare: developing proposals that call for
technology. Throughout history, the redefining "use of force" to better
international legal regime has adapted to accommodate cyber warfare operations by
technological advances, indicating that it considering both the effects of, and intent
both can, and must, continue to adapt and behind, a cyber attack. In the modem
evolve alongside the ever changing realm world, cyber warfare is reshaping the
of technology. Critical to the evolution of global community, and laws regulating
international laws are the necessary and defining acceptable global behavior
alterations to traditional understandings must be created either by adapting the
of attribution, jurisdiction, and "use of current international legal regime or by
force." While traditional international law building a completely new international
assumes that attribution of State military legal structure developed specifically to
operations will be fairly straightforward, address cyber warfare. The evolution of
cyber warfare has made evident that this international legal concepts to mirror the
assumption is not always true. Rather, new simultaneous developments in cyber
theories of attribution must be developed warfare technology is a key element in
by the international community to address defining and regulating this new field.
the difficulty in tracing cyber-based
attacks. Further, until such a globally 2. Consistency
supported notion can be developed, a
more strict attribution requirement should While the evolution of international legal
be maintained in order to avoid the concepts of attribution, jurisdiction, and
LECTURE NOTES
Corresponding Evolution: International Law and the Emergence of Cyber Warfare

"use of force" are all necessary elements to deterring terrorist and criminal
the development of an international legal organizations from conducting cyber
paradigm capable of dealing with cyber warfare operations,such agreements
warfare, it is only through the consistent would nonetheless serve to unite the
definition and application of such evolving global community in identifying and
principles that those changes can become holding these groups accountable through
truly ingrained within the international a well-defined international prohibition
community. At present, the international against such activities. Recently, there
community lacks consistency regarding have been signs that the international
even the most basic aspects of cyber community may be both ready and willing
warfare; in particular, there is no to begin seriously considering the
universally agreed upon definition of what formation of international treaties and
even constitutes "cyber warfare." This binding agreements to regulate cyber
inability to achieve international warfare operations. Many, apparently
consensus on even the most fundamental realizing that the presently existing
aspects of cyber warfare underscores the international legal regime is inadequate to
fact that such uncertainty invites cyber cope with the novel legal issues raised by
warfare operations during the cyber warfare, have come to understand
intermediate flux of legal uncertainty and the inherent advantage of definite
lack of enforcement against such attacks international agreements on the legality of
by the international 1257 community. such activities. The need for international
Further, once internationally consistent agreements regulating cyber warfare
definitions and regulations have been operations has recently been endorsed by
formed, the international community must groups within the U.N. and Russia. While
uniformly and strictly enforce those there are inherent problems with seeking
standards. Failure to enforce these to formulate agreeable international
standards may create a scenario, familiar treaties to address cyber warfare, such
in history, where banned weaponry agreements remain the best option for
continues to be developed and could dealing with a global threat that promises
eventually be used, despite international to rapidly grow more problematic.
prohibitions on such use. Existing international treaty structures and
cybercrime agreements could provide a
3. International Agreements workable foundation on which cyber
warfare treaties could be built, and
There has been significant debate over cooperation amongst the global
whether the international community community is a critical element to the
needs new treaties to deal with the success of any such treaty. Ultimately,
revolutionary problems created by cyber serious changes in international law may
warfare. However, the need for be required to address the legal issues
international agreements is critical to raised by cyber warfare operations, and it
realizing the evolutionary changes in remains likely that a reevaluation of the
international law and the consistency core, fundamental components of
required to afford such changes' staying traditional international legal structures
power amongst the global community. will be required. International treaties and
While some have commented that agreements present the most direct,
international agreements regulating cyber effective, and rapid means of
warfare will not do much in the way of implementing these needed changes.
LECTURE NOTES
Corresponding Evolution: International Law and the Emergence of Cyber Warfare

4. Conclusion

Cyber warfare is a burgeoning technology


that allows a computer savvy user to
disrupt other computer networks and
programs in various ways. More advanced
forms of cyber warfare can result in
destruction of property and State
infrastructure equivalent to, if not
surpassing, most forms of conventional,
kinetic warfare. However, such cyber
warfare is unique in that it operates within
the borderless domain of cyberspace. As
such, cyber warfare remains impervious to
many traditional international legal
regulations and constraints. While some
international laws may be altered,
adapted, and enhanced to take cyber
warfare operations into account, it may be
an inevitable reality that the traditional
international legal regime may simply be
inadequate to accommodate the
revolutionary issues raised by cyber
warfare. Consequently, new international
laws may need to be developed, and a new
global legal regime introduced, to
effectively deal with cyber warfare issues.
Ultimately, while some have argued that
extensive renovations to the international
legal paradigm are premature, it is critical
that such changes not be delayed, as cyber
warfare already possesses destructive
capabilities approaching that of full-scale
nuclear war. Consequently, further delay in
the formation of international treaties,
limiting the use of and defining the status
of cyber warfare under international law,
risks devastating global repercussions. In
the end, the need for new international
legal structures cannot be ignored, and a
reevaluation of traditional legal values,
combined with a willingness to completely
reinvent the international legal paradigm
to make it specifically applicable to cyber
warfare issues, is a reality that must be
accepted and addressed by the global Bernal, Jason Keanu S.
community as a whole. 2018-12145-MN-0

You might also like