Professional Documents
Culture Documents
Bernal Jason Keanu S. Corresponding Evolution International Law and The Emergence of Cyber Warfare
Bernal Jason Keanu S. Corresponding Evolution International Law and The Emergence of Cyber Warfare
attack, the web sites of Estonia's leading elections. In response to what many
banks, newspapers, and major Iranians felt was an unfair election, the
government agencies had crashed, movements began coordinating
thrusting the nation into cyberspace demonstrations and undertaking efforts to
isolation. bring down key government web sites.
The internal forces working to subvert the
2. Georgia Iranian government were coordinating
their activities through Twitter, a U.S.-
In 2008, Georgia, responding to separatist based online communications and posting
actions, launched surprise aerial and web application. Despite the requests of
ground attacks against the revolutionary the Iranian government to cease its
forces located in the provinces of South functioning within Iran, Twitter took
Ossetia and Abkhazia. Shortly thereafter, a affirmative steps to remain active and
simple, yet crippling DDoS attack hit usable by the Iranian population. It
several of Georgia's government and remains unclear whether the decision to
media websites. These initial cyber-attacks remain operable came solely from Twitter,
were traced to commanding servers in or if the decision was backed by U.S.
Russia. Although there remains no direct government officials.. Second, in 2010,
evidence of Russian government Iran's two major nuclear power and
involvement, the subsequent actions make research facilities at Bushehr and Natanz
some degree of Russian State involvement were hit with what FOX News called the
seem far more likely. Only a short while "most sophisticated cyberweapon ever
after the initial cyber-attacks on Georgian created." The weapon, dubbed Stuxnet,
websites, Russian army, navy, and air operates as a cybermissile equipped with
forces formed the heart of a kinetic military a warhead designed specifically to
offensive against the territorial sovereignty penetrate advanced security systems and
of the Georgian State. The ability to take control of general computer system
coincide cyber attacks with conventional controls. Although Iran initially denied that
military offensives makes for an efficiently any attack had taken place, it has since
devastating combination and, in the admitted that the Stuxnet weapon was a
current state of international legal massive disruption to the development of
uncertainty surrounding the state- its nuclear program.
sponsored use of cyber attacks, they may
become more and more prevalent as a D. The Applicability of Current
general military strategy. International Laws to Cyber Warfare
"use of force" are all necessary elements to deterring terrorist and criminal
the development of an international legal organizations from conducting cyber
paradigm capable of dealing with cyber warfare operations,such agreements
warfare, it is only through the consistent would nonetheless serve to unite the
definition and application of such evolving global community in identifying and
principles that those changes can become holding these groups accountable through
truly ingrained within the international a well-defined international prohibition
community. At present, the international against such activities. Recently, there
community lacks consistency regarding have been signs that the international
even the most basic aspects of cyber community may be both ready and willing
warfare; in particular, there is no to begin seriously considering the
universally agreed upon definition of what formation of international treaties and
even constitutes "cyber warfare." This binding agreements to regulate cyber
inability to achieve international warfare operations. Many, apparently
consensus on even the most fundamental realizing that the presently existing
aspects of cyber warfare underscores the international legal regime is inadequate to
fact that such uncertainty invites cyber cope with the novel legal issues raised by
warfare operations during the cyber warfare, have come to understand
intermediate flux of legal uncertainty and the inherent advantage of definite
lack of enforcement against such attacks international agreements on the legality of
by the international 1257 community. such activities. The need for international
Further, once internationally consistent agreements regulating cyber warfare
definitions and regulations have been operations has recently been endorsed by
formed, the international community must groups within the U.N. and Russia. While
uniformly and strictly enforce those there are inherent problems with seeking
standards. Failure to enforce these to formulate agreeable international
standards may create a scenario, familiar treaties to address cyber warfare, such
in history, where banned weaponry agreements remain the best option for
continues to be developed and could dealing with a global threat that promises
eventually be used, despite international to rapidly grow more problematic.
prohibitions on such use. Existing international treaty structures and
cybercrime agreements could provide a
3. International Agreements workable foundation on which cyber
warfare treaties could be built, and
There has been significant debate over cooperation amongst the global
whether the international community community is a critical element to the
needs new treaties to deal with the success of any such treaty. Ultimately,
revolutionary problems created by cyber serious changes in international law may
warfare. However, the need for be required to address the legal issues
international agreements is critical to raised by cyber warfare operations, and it
realizing the evolutionary changes in remains likely that a reevaluation of the
international law and the consistency core, fundamental components of
required to afford such changes' staying traditional international legal structures
power amongst the global community. will be required. International treaties and
While some have commented that agreements present the most direct,
international agreements regulating cyber effective, and rapid means of
warfare will not do much in the way of implementing these needed changes.
LECTURE NOTES
Corresponding Evolution: International Law and the Emergence of Cyber Warfare
4. Conclusion