Academia.eduAcademia.edu

International Law and Cyber-Warfare

2013, SSRN Electronic Journal

Today in the 21 st century the internet is the life and blood of the modern economy. Whatever the field is, it is fully dependent on cyberspace. In powerful countries like U.S.A, Russia, Germany, China the control of these cyber units if fully with the military agencies only. Many researchers in this field believes that, due the high dependence of Military services on internet the fifth dimension for global war is now opened, which is more dynamic and powerful. Banking, industry, infrastructure, and education all the modern facilities provided by the state to its citizen are to full extent dependent on cyberspace for better results.

Supercharge your research with Academia Premium

checkDownload curated PDF packages
checkTrack your impact with Mentions
checkAccess advanced search filters
INTERNATIONAL LAW AND CYBER WARFARE Rishabh Shrivastava 10/20/2013 College of Legal Studies (CoLS), University of Petroleum and Energy Studies (UPES) Bidholi via Prem-Nagar, Dehradun 248007, Uttarakhand, India BA.LLB. (Hons.) (1st Year) with specialization in Energy Laws E-mail- [email protected] 10/20/2013 Electronic copy available at: http://ssrn.com/abstract=2342775 PREFACE:Today in the 21st century the internet is the life and blood of the modern economy. Whatever the field is, it is fully dependent on cyberspace. In powerful countries like U.S.A, Russia, Germany, China the control of these cyber units if fully with the military agencies only. Many researchers in this field believes that, due the high dependence of Military services on internet the fifth dimension for global war is now opened, which is more dynamic and powerful. Banking, industry, infrastructure, and education all the modern facilities provided by the state to its citizen are to full extent dependent on cyberspace for better results. What happens if a group of 300 hackers, attacks on your computer and espionage on every activity performed by you? What will be the condition of that individual? What are the elements that will be involved in such an activity? How does law address to it? Does law has clear stand on it? These entire questions can be addressed with the help of this article. My article aims at how the cyberspace has evolved itself from it natural criterion and now formally used for activities that are aggressive in nature. How the activities of cyber-space can trigger armed conflict? Now-a-days cyberspace is becoming more dynamic and is used by intelligence units, ministries, and departments for purposes that may result in wars or other conflicts. Therefore we have to equip the cyberspace with all possible measures, and the one of those is to have an understanding of International Law and Cyber-warfare. The concept of ‘force’ and ‘armed attack’ present in Article 2(4) and 51 of UN Charter, how it can be interpreted in context to Cyber-warfare. The different case studies provided by me, will help to understand the analytical review done by experts, because these cases provide the legal considerations to the horizons of the both the international law and the cyber-warfare. International Law and Cyber-Warfare Electronic copy available at: http://ssrn.com/abstract=2342775 Page 1 INTRODUCTION:The usage of Internet has become the fastest and most powerful technological revolution in the history of mankind. In just 15 years the number of internet users in 1995 that was 16 million has been skyrocketed to more than 1.7 billion in late 20101. Every individual, corporation, companies, trust are dependent on this service. The military reliance on this technology has opened the fifth domain of war-fighting next to the traditional domains of land, sea, air and outer space2. This trend raises the question of “how far can the domains of International law be juxtaposed to that of Cyber warfare”? Why Cyber Security is considered as the hot topic in context to International Law? For every Sovereign state it is very important for him to maintain that his civil society is primarily protected from crime and espionage on Internet. The society has a safe and secure access to the internet services. Today every nation is fighting with Cyber War. The biggest problem with these Cyber wars is that, these attacks are not carried through by the government hackers but through the criminal ones who steal the business secrets and financial information. If the information is being tracked down in its normal course of transmission between the sender and the receiver, then it will not result in smooth flow of Information between the individuals, organizations etc. What is Cyber Warfare and how it is unique? The term “cyber warfare” refers to warfare conducted in cyberspace through cyber means and methods. ‘Cyberspace” can be identified as a globally connected network of digital information and communications infrastructures, including internet, telecommunications network, computer systems etc. Cyberspace is unique in itself because it is the only man made domain. Cyberspace not being subject to geopolitical or natural boundaries, information and electronic payloads are deployed instantaneously between any point of origin and the point of receiving. The information travels in the form of multiple digital fragments through unpredictable routings before being 1 2 UK Government, ”a Strong Britain in an age of Uncertainty: the National Security Strategy”,2010,p.29 US Department of Defense, The National Military strategy for cyberspace operations, 2006,p.3 International Law and Cyber-Warfare Electronic copy available at: http://ssrn.com/abstract=2342775 Page 2 reconstituted to their destination. IP spoofing and use of botnets3 are some of the unique ways in sphere to cyber warfare How we are inventing Cyber war problem? In 1998 somewhat 3000 Chinese hackers attacked the Indonesian government sites. Since then there are more than 10,000 attempts to hack into major computer networks belonging to ministry of defense, banks, media etc. Cyber intrusions have the element of Espionage and theft present in them. These elements are categorized as ‘Computer Network Exploitation’ (CNE) but later on it was replaced by ‘Computer Network Attacks (CNA)’ but later on the most appropriate abbreviation for this wide practiced trend was ‘Computer Network Interference (CNI)’. Cyber Operations and Jus ad Bellum:The jus ad bellum is that body of law which governs the resort by states to force in their international relations. Today the most important source of jus ad bellum is ‘UN CHARTER’. If any cyber operations can amount to 1) an internationally wrongful threat or use of “force”, 2) an “armed attack” justifying to resort to necessary and proportionate use of “force” in selfdefense or 3) ‘threat to the peace’, ‘breach of the peace’ or ‘act of aggression’ subject to UN security council intervention will all be covered by UN CHARTER. The state sponsored Cyber Operations are qualifies as a use of ‘force’ against another state would not fall under the general prohibition of Article 2(4) of UN Charter, but would normally also trigger an international armed conflict. The occurrence of Cyber Operations amounting to an “armed attack” permits the attacked state to exercise its inherent right to self-defense through means of otherwise prohibited by the Charter including, most notably the resort to force. The Cyber Operations also amount to “threat to peace”, “breach to peace” or “act of aggression” is that it allows the UN Security Council to take measurable steps, including military force, in order to maintain or restore international peace and security under Article 2(4) and 51 of UN Charter. In addition the to the UN Charter, the International Court of Justice (ICJ) has pointed out in six cases4, the important rules of customary international law and general principles relevant to the A Botnet is an interconnected series of computers used for malicious purposes. A computer becomes “bot” when it runs the file that have bot software embedded in it 3 International Law and Cyber-Warfare Page 3 lawful resort to the force. Not only there must be armed attack or armed attack equivalent to justify the use of military force in self- defense, but the attack must be significant. It must be attributable to the state where the self -defense is being carried out the use of force must be the last resort and must be likely to succeed in achieving defense, and must be proportionate to the injury suffered. But the argument that usually arises by interpreting these statues of UN Charter is that, whether cyber operations can be classified as “force” if yes, then up to which degree of cyber operations can be classified in the category of Article 2(4) of UN Charter. The question is what extent of Cyber operations qualify as “force”? Cyber Operations as “Force”:Ordinary meaning of Force means both armed and unarmed forms of Coercion. The form of “force” given in UN Charter is practically synonyms to “armed” or “military” force. The real difficulty arises is to qualify the use of force in context to Cyber Operations is that do not, or not directly, cause death, injury or destruction. As a matter of logic, the Charter cannot allow that the prohibition of interstate be circumvented by the application of non-violent means and methods which, for all intents and purposes, are equivalent to a breach of the peace between the involved states. The UN Charter does not define what constitutes a wrongful “threat” of interstate force, the ICJ held that: [t]he notions of “threat” and “use” of force under Article 2, paragraph 4, of the Charter stand together in the sense that if the use of force itself in a given case is illegal—for whatever reason—the threat to use such force will likewise be illegal. In short, if it is to be 4 Nicaragua v. State of America, 27 June 1986 Iran v. United States of America, 6 November 2003 Democratic Republic of Congo v. Uganda, 19 December 2005 Estonia and NATO, Aril 2007 George- Russia, 2008 Stuxnet, 2009-2010 International Law and Cyber-Warfare Page 4 lawful, the declared readiness of a State to use force must be a use of force that is in conformity with the Charter.5 Overall there is no consensus as to the precise threshold at which cyber operations should amount to an internationally wrongful threat or use of force. The illegality of a cyber –operations may result from the violation of any obligation under international law. According to the article 2(4) of UN Charter, it prohibits the use of “force” between the states6 who are the participants in international community in their mutual international relations. It means that the use or threat of force must be legally attributable to the states only. In international law the acts are attributable to state only when there is some actors to perform the functions of the state, because there must be someone the engage the international legal responsibility upon. Such actors, person or entities are described as “state agents”. Thus the persons, actors and authorities who are not acting on behalf of the states are known as “non-state actors”. The cyber operations are not only carried by the government personnel and military officials but also by the increasing number of private contractors which fall under the category of “non-state actors”. The use of force by individual hackers and private contractors is not prohibited under the UN Charter, Article 2(4). While states providing significant support to these non-state actors is a fine example of use of “indirect force” that is being used by these State actors and the inference from the above situation is that the article 2(4) of UN Charter doesn’t have proper parameters to determine the use of “force” in context to Cyber Operations. Therefore still the Article 2(4) of UN Charter remains full of ambigousity in terms of setting “force” as an element of peace and security. Cyber Operations as “Armed Attacks”:From first instance an armed attack means a use of weapon. ICJ clarified that Article 51 of the Charter as just the other Article 2(4) and 42, applies “to any use of force regardless of the weapons employed”. Cyber -attacks are irrelevant to the use of biological, chemical or nuclear weaponry. They raise this question of its qualification as a ‘weapon’. Therefore in this context it has been noticed that: 5 6 International Court of Justice, Legality of the threat or use of Nuclear weapons, advisory opinion, 1996 Art. 4 of UN CHARTER. International Law and Cyber-Warfare Page 5 “It is neither the designation of a device, nor its normal use, which make it a weapon but the intent with which it is used and its effect. The use of any device or number of devices, which results in a considerable loss of life and/or extensive destruction of property must therefore be deemed to fulfill the conditions of an “armed” attack.”7 Whereas, the ICJ was interested in separating the more grave ‘force’ forms (constituting an armed attack) form less grave ‘force’ forms.8Unfortunately the courts subsequent failure to explain the further reasoning provided more confusion than insight and doesn’t able to co-relate the concept of “armed attack” to that of a “Cyber Operations”. The argument that often the researchers’ state is that: the injury caused by such warfare conducted by one sovereign state against the other automatically qualifies it for the conditions that are mentioned in Article 51 of UN Charter i.e. “a use of force” or “armed attack”. But this approach could also not be carried along to the great extent because it makes an individual study restrictive or too expansive. In order to come to adequate conclusion the Cyber warfare can be understood as the concept that disables an Infrastructure, which is known as the Cyber -attacks that incapacitate the Critical infrastructure.it is one of the far more better approach to qualify the cyber -attacks for the category of “use of force” or “armed attack” because ultimately the key concern for the states is the protection of these infrastructures only. Different or varied opinions and definitions are given on this concept, some of them are; 1- UN GENERAL ASSEMBLY- critical infrastructures include “those used for, inter alia, the generation, transmission and distribution of energy, air and maritime transport, banking, financial and e-commerce services, water supply, food distribution and public health, cyber operations are interconnected to it and affect their functioning”.9 2- EUROPEAN UNION- “Critical Infrastructure includes those physical resources and services and information technology facilities, networks and infrastructure assets which if disrupted or destroyed would have serious impact on health, safety, security or economic well- being of a citizen or the effective functioning of the government.10 Karl Zemanek, “Armed Attack”, in Rudiger Wolfrum (ed.), Max Plank Encyclopedia of Public International Law, 2010, $ 21. 8 Nicaragua Case 9 UN General Assembly resolution 58/199 of 30 January 2004. 10 European Commission, Green Paper on a European Programme on Critical Infrastructure Protection, document COM (2005) 576 final, 17 November 2005, annex.1, p.20. 7 International Law and Cyber-Warfare Page 6 3- SHANGHAI COPERATION ORGANIZATION (SCO)- Critical structure’- public facilities systems and institutions attacks on which may cause consequences directly affecting national security, including that of an individual, society and state.11 Therefore the only sphere of cyber operations where the International law is capable enough to qualify the cyber- attacks under the article 51 of UN Charter is this only, any cyber- attack that aims at damaging these critical infrastructures it will be deemed to be an “armed attack” or use of force” and thus will stand in relation to the article 51 of UN Charter. CONCEPT OF SELF-DEFENSE IN CYBER OPERATIONS:The basic function of the concept of self-dense in context to cyber operations is that the international law lies in protecting the legal order by balancing the rights of an attacking state against the one who is defending (state). Therefore, it permits the defending state to take measures necessary to repel an armed attack, even though this may require action otherwise prohibited under international law, most notably the use of interstate force. The justification for this permission is found in the initial wrongfulness of the offending state’s conduct and need to avert the harm likely to result from the wrongful conduct. To govern the exercise the right of self-defense is a matter of international customary law. These modalities comprise most notably the principles of necessity and proportionality. The principle of necessity defines the margin for the lawful self-defense in terms of what is objectively necessary to avert or repel an armed attack. The principle of proportionality determines to what extent the harm to be prevented justifies the harm done by the defensive act. The principle of necessity will only be applicable if the act of self-defense is done with the objective to revert or repel the armed attack. The aim of self-defense is not to react to the harm done but to prevent the materialization of harm potentially resulting from a threat. Therefore it will be erroneous to take the claim of ‘self-defense’ after the act has been committed. According to the modality of proportionality, action taken is self-defense is legally justifiable only to the extent that the harm it is expected to cause remains in reasonable proportion to the harm it aims to prevent. 11 Annex I to the Agreement between the Governments of the Member States of the Shanghai Cooperation Organization on Cooperation in the Field of International Information Security of 16 June 2009. International Law and Cyber-Warfare Page 7 So the inference that we could infer is that, Cyberspace is not permissible in response to harm which has already been done by hostile cyber operations, but only with a view to preventing or repelling an ongoing attack, and only to the extent actually necessary for that purpose. CAN CYBER OPERATIONS TRIGGER ARMED CONFLICT? Can cyber operations in and of them, trigger the applicability of International Humanitarian Law (IHL)? According to the 2008 opinion paper of International Committee of the Red Cross (ICRC), gave its legal opinion on the definition of armed conflict under IHL, it was as follows: 1- INTERNATIONAL ARMED CONFLICT- exists whenever there is resort to armed force between two or more states. 2- NON-INTERNATIONAL ARMED CONFLICT-are protracted armed confrontations occurring between governmental armed forces and the forces of one or more armed groups, or between such groups arising on the territory of a state. The armed confrontation must reach a minimum level of intensity and the parties involved in the conflict must show a minimum of organization. According to the opinion paper of ICRC no other type of conflict exists. Consequently the cyber operations can trigger the applicability of IHL to the extent they can give rise to all required constitutive elements of an international or non-international armed conflict. In the future, cyber warfare will further complicate the classification. Cyber operations have the potential for producing vast societal and economic disruption without causing the physical damage typically associated with armed conflict. International armed cyber conflict:As the title suggests that the conflict should be both INTERNATIONAL as well as ARMED. Generally the impression by seeing the latter criteria of the concept helps us to conclude that conflict consisting of cyber operations does not contains weapon and hence it appears not to be armed. Such a conclusion should be incongruous for cyber operations as they are highly destructive and even deadly in results. Article 2 provides that ‘any difference arising between two states and leading to the intervention of the members of the armed forces is an armed conflict within the meaning of Article 2 of UN Charter. IHL covers any dispute between the two states involving the use of their armed forces. Neither the duration of the conflict, nor its International Law and Cyber-Warfare Page 8 intensity, play a role: the law must be applied to its fullest extent required by the situation of the persons and the objects protected by it.12 Any cyber operation that amounts to an ‘attack’ in IHL terms would qualify as armed. Article 49(1) of Additional Protocol I defines attacks as “acts of violence against the adversary, whether in offence or defense”. The most important feature of cyber operations is that they are not at all violent but can lead to violent consequences. The ICRC has taken the position that a cyber -operation that disables an object is also an attack even when it does not cause physical damage.13 So apart from being the conflict ‘armed’ in nature it should also be ‘international’ in its context. The term international denotes actions conducted by, or attributable to, a state. Cyber-operations carried out by state agents like intelligence or law enforcement agencies, and private individuals will also fall under the purview of ‘international.’ Moreover the problem arise then, when it’s neither the state nor its agencies are operating but illegal groups and individuals. The classic example is ‘the hacktivist’ cyber campaign against Estonia in 2007. (Moreover they were not armed)14However if the state endorses and encourages the cyber campaign the groups or the individuals will fall under the ambit of international criterion and will be deemed ‘de facto’ organs of the state. Non-International armed cyber conflict:Non international armed conflicts are conflicts that are fought between the governmental authority and armed groups or between such groups within a state. The same definition has been adopted by international tribunals and in the statute of the international criminal court. Common article 3 refers to the ‘parties to conflict’. In considering this requirement, the ICTY has noted some degree of organization by the parties will suffice to establish the existence of an armed conflict. In Limaj, the ICTY looked to such factors as inter alia, the existence of a formal command structure, the creation of unit zones of operation, the issuance of orders, the establishment of a headquarters and he promulgation of disciplinary orders to find that the Kosovo Liberation Army qualified as an organized armed group in its conflict with the Federal Republic of Yugoslavia.15 The only clear inference that could be made through this situation is that; ‘individuals acting alone who conduct cyber operations against a state (or a particular armed 12 Y Sandoz and others (eds), commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949, para 62. 13 31st ICRC Conference 37. 14 See generally the discussions of these topics incidents in Tikk and others. 15 Limaj (n 42) paras 94-129. International Law and Cyber-Warfare Page 9 group) cannot meet the organized criterion. For example, despite the number of hacktivists involved in in the cyber operations against Estonia, they lacked the requisite degree of organization and therefore the operations did not amount to international non-international armed conflict. The primary obstacle to characterization of the group as organized would be its inability to enforce compliance with international humanitarian law. Additional protocol II implies that a requirement that a group be ‘under responsible command’ before a non-international armed conflict covered by the instruments exists.16 The term implies that there should be some degree of organization of the insurgent armed group or dissident armed forces, but this does not implies that there is hierarchical system of military organization similar to that of regular armed forces. It means an organization capable, on the other hand, of planning and carrying out sustained and concerted military operations, and on the other, of imposing discipline in the name of de facto authority.17 WARRIORS OF CYBER WARFARE:1- COMBATANTS- cyber operations are generally carried out by highly specialized personnel. To the extent that they are members of the armed forces of a belligerent state, their status, rights and obligations are no different from those of traditional combatants. According to the treaty IHL, armed force of a belligerent state comprise all organized armed forces, groups and units which are under a command responsible to that state for the conduct of its subordinates.18 This broad and functional concept of armed forces includes essentially all armed actors belonging to belligerent state and showing sufficient degree of military organization. 2- CONTRACTORS AND CIVILIAN EMPLOYEES- in recent decades, belligerent states have increasingly employed private contractors and civilian employees in a variety of functions traditionally performed by military personnel. Today this also, includes the support, preparation and conduct of cyber operations. As long as such personnel assume functions not amounting to direct participation in hostilities they remain civilians and if formally authorized to accompany the armed forces in an international armed conflict are even entitled to prisoner-of-war status in case of capture.19 16 AP II, art. 1(1) AP commentary, para 4663. 18 Art.43, AP I 19 Arts. 4(4) and (5), GC III 17 International Law and Cyber-Warfare Page 10 3- MEMBERS OF ORGANIZED ARMED GROUPS- in IHL, governing non-international armed conflict, organized armed groups constitute the armed forces of a non-state belligerent and must not be confused with the belligerent party itself or with the other supportive segments of the civilian population. Treaty IHL governing non-international armed conflict uses the terms civilian, armed forces and organized armed group without defining them. It is generally recognized, however, that members of state armed forces do not qualify as civilians, and the wording an logic of article 3, GC I-IV, and AP II suggests that the same applies to members of organized armed groups. 4- CIVILIANS- in the IHL, the concept of civilians encompasses all persons who are neither members of the armed forces of a state or non-state party to an armed conflict, nor participants in a levee en masse. As civilians they are entitled to protection against the dangers arising from military operations and most notably, against attack. In Cyber warfare this category is likely to include most non-state hackers not belonging to the military wing of an organized armed group. Contrary to combatants, however they do not benefit from immunity from prosecution for lawful acts of war (so-called ‘combatant privilege’) and therefore, can be punished by their captor for any violation of national law. 5- LEVEE EN MASSE- it refers to the inhabitants of a non- occupied territory who on the approach of the enemy, spontaneously take up arms to resist the invading forces without having had time to form themselves into regular armed units, provided to carry arms openly and respect the laws and customs of war. Participants of levee en masse are the only armed actors who are entitled not only to prisoner-of-war status, but also to the combatant privilege although by definition they operate spontaneously and lack sufficient organization and command to qualify as the members of armed forces. International Law and Cyber-Warfare Page 11 CASE STUDIES: INTERNATIONAL CYBER INCIDENTS AND IMPLICATION OF LAW:The purpose for doing the case study is to increase the level of acquaintance with the cyber security and its various dimensions that are discussed above. The case studies provide us detailed investigations into the world’s most serious cyber incidents that changed the horizons for both, the cyber world and the international law. These case studies will provide that what all elements of UN Charter and other statues were followed in, what legal implications followed it. Without getting practical knowledge, theory is unsubstantiated. Case studies provide altogether a greater competence to the legal network in context to cyber operations. This section will be dealing with the incidents directly describing the timeline, methods, targets and effects of the attack as well as the measures that were employed to cope with the attacks. It also discusses the origin of attack. It also discusses the legal lessons that should be drawn from these case studies. The two important case studies that I will be discussing in this section of the article are; 1- ESTONIA 2007 APRIL-MAY 2- GEORGIA 2008 JUNE-JULY International Law and Cyber-Warfare Page 12 ESTONIA 2007 APRIL-MAY:Time period:The Cyber warfare started in the capital city of Tallinn in Estonia, near Helsinki. The cyber warfare started on Friday, 27 April 2007 and ended on Friday, 18 May 2007. The bloody warfare went on for 3 weeks. Background of the incident:The political context and the background to the incident was that the Government of Estonia decided to relocate a Soviet-era WW-II era memorial from a central location in the capital city to a military cemetery. It was met by intense opposition from the Russian government and media. The protests that were going down against the removal work suddenly converted into brutish riots. It resulted in siege of the Estonian embassy in Moscow conducted by Nashi, a Russian political youth movement and the Ambassador was physically harassed. Information society indicators:The state was well versed with the e-solutions since mid-1990, by both the private and public sectors. The prevalent use of Internet was in the sections of banking, mobile parking and public transportation tickets, online voting in elections etc. internet was nearly accessible to the 98% of the territory and mobile penetration was somewhat to the whooping! extent of full 100%. The policy of the government was fully backed by internet technologies only, and the government was paperless since 2001. Incident facts:The methods the hacktivist used were; - DoS (Denial of service) and DDoS (distributed denial of service):These attacks helped in websites becoming inaccessible. The DoS is a concentrated malevolent effort to deny access to any electronic device, computer, server, network, internet etc.20 this can be accomplished in numerous ways like; ping-flooding, UDP flood and malformed queries, were mainly used in Estonian case. The effect of DDoS attacks were more severely noticed by users outside of Estonia as a large amount of queries were cut off in order to cope with excessive traffic and to filter out genuine queries. According to Arbor Networks 128 Unique DDoS attacks were detected on Estonian Websites. 20 Cyber warfare: a glossary of useful terms, Stratfor today, 1 March 2008 International Law and Cyber-Warfare Page 13 - Website Defacement - Attacking DNS server:A more dangerous trend was attacking the DNS servers managed by Internet Service Providers. Repeated attacks were observed between April 30 and May18. These temporarily disrupted the DNS servers in parts of the Country.21 - Mass e-mail and comment spam.22 Targets:The main targets of this attack were; - Primarily the servers of the institutions responsible for the Estonian Internet Infrastructure. - Secondly, governmental and political targets like Parliament, President, ministries, state agencies etc. - Thirdly, the services that were being provided by the private sector (e-banking, news organization etc.) - Lastly, the personal and random targets. Origin of the attack:The attack was mainly aimed from outside the Estonia, with computers of more than 173 countries involved. The early attacks were largely incorporated by nationalistically or politically motivated individuals and following instructions provided on Russian language Internet Forums and websites. The Second Phase of attacks had features of central command and control. The main point of interest was that the Russian state agencies have denied any involvement. Effect of the attack:The affected the sectors of commerce, industry and governance that relied on ICT infrastructure and electric communications in their daily conduct of business. Banks, media, corporations, institutions, small and medium sized enterprises etc. were also badly affected by this attack. The Social effect of this attack was that it hindered access to communication with public administration; there was unavailability of the information. Information flow to the outside world was impaired. 21 22 Cyber -attacks against the Republic of Estonia, supra Note Id. International Law and Cyber-Warfare Page 14 Measures taken:1- The first and the most major step taken by the Estonian government was that the response was coordinated by CERT-EE23, with assistance from system administrators and experts both within and outside the country. 2- Bandwidth increased, use of multiple servers or connections, firewalling, filtering out malicious traffic, application of security patches, use of attack detection systems, some sites were switched off to “lightweight mode”. These were some of the technical measures that were adopted by the Cyber experts of the Estonian Government. 3- The International Co-operation was organized by the Ministry of Defense. The information was spread to the partners in European Union and North Atlantic Treaty Organization. National CERTs assisted in locating and reporting sources of attack. 4- News about Estonia cooperating with foreign authorities to locate cyber criminals and bring them to justice reduced the number of spontaneous attackers. Legal lessons identified or learned:1- This case highlighted the need to raise international awareness about crimes against information society 2- Raised the question of efficiency of mutual criminal assistance treaties situation where the receiving party is unwilling to co-operate. 3- The traditional view of Substantive criminal law considers cyber-crime foremost as an economically motivated activity which may not be sufficient to satisfactorily respond to politically motivated cyber-attacks where the damaged legal interest is not the integrity, availability, confidentiality or the proper functioning and use of computer data, programs or networks, but the political, constitutional, economic or social structure of the state. 4- There are often differing legal requirements for what is permissible in criminal proceedings in the countries involved and the attackers may resort their activities to jurisdictions that attacked the country. International law lacks effective enforcement of mechanisms to ensure co-operation from the country in which the attacks originate, if latter in refuses to co-operate. 23 CERT-EE is the computer emergency response team for Estonia, established in year 2006. It is responsible for management of security incidence in . ee computer networks International Law and Cyber-Warfare Page 15 GEORGIA 2008 JUNE-JULY:Time Period:This Cyber conflict falls within the timeframe and context of a broader armed conflict that broke out in August 2008. This attack started on Friday 8 August 2008 and lasted till Thursday, 28 August 2008. The total duration of this attack was 3 weeks. Background of the incident:The reason that triggered the spread of cyber-warfare was the ongoing conflict between the Russian Federation and Georgia over South Ossetia. Information Society Indicator:The internet penetration was very low at about 7% of total population in 2008. The dependence on IT infrastructure was very low. There was limited option for connectivity to internet via land routes. The dependency of connection on Russia was very strong.24 Facts of the Incidents:The methods that were used by the warriors of the cyber warfare were; 1- DoS and DDoS attacks25 2- Distribution of Malicious Software:Several Russian blogs, websites and forums spreaded a Microsoft Windows batch script that was designed to attack Georgian websites.26 According to Steven Adair of Shadowserver, this script was posted on several websites and was also posted on several websites and was also hosted on one site as compressed downloadable file which contained an executable “war.bat” file within it.27 The same method was used in phase of Cyber-attacks against Estonia. 3- Website Defacement 4- Using e-mail addresses for spamming and targeted attacks. Targets:The main targets of this attack were; 1- Primarily, the government sites like the official sites of President of Republic of Georgia, Parliament of Republic of Georgia, and News portal of Georgia etc. 24 Stratfor Today, supra note 297. As explained in above incident 26 Adair, supra note 315. 27 A redacted version of the script could be accessed at http://www.shadowserver.org/wiki/pmwiki. php?n=Calendar.20080813. 25 International Law and Cyber-Warfare Page 16 2- Secondly, the News and media sites and online discussion forums 3- Financial Institutions Origin:The main suspect that was behind this superfluous cyber-attack was, organized Russian hackers groups. But there was no evident link found to the Russian Administration or state organizations guiding or directing the attacks. Moreover, the Russian Government has denied their involvement in the Cyber assaults. There is no conclusive evidence of who was behind the DDoS or defacement attacks. Effect:The main aim of this attack was to limit the Georgia’s opinions to distribute information regarding the ongoing Georgian-Russian military conflict to the outside world and the Georgian public, especially during the early days of Conflict. The main communication networks were affected. The problem was exacerbated by physical disconnections in the communications network infrastructure caused by war-activities. Measures taken:Attack mitigation coordinated by Georgian academic sector CERT who assumed the role of national CERT during the cyber-attacks. A state-mandated block was created on access to Russian websites for the dual purpose of information control and freeing up bandwidth. The assistance of other national CERTs of other countries was adopted by the state of Georgia. Legal lessons identified and Learned:1- Applicability of law of Armed Conflicts to cyber-attacks occurring during conventional armed conflict. 2- Measures available in national law to deal with wide scale cyber-attacks. 3- The right of the injured state to use force as a response against another state depends on the level of involvement of the source of the state. While state direction and/ or support of attacks can be seen as active involvement. Therefore justify a stronger reaction, mere toleration or inaction on behalf of the source state as passive forms of involvement do not make the source state as passive forms of involvement to make source state a target of lawful military operations. 4- Effective response to cyber-attacks of scale and type like the Georgia incident are quite limited under the law. Important is the promotion of effective international cooperation, International Law and Cyber-Warfare Page 17 as there is no way for a country to coordinate defenses against attacks originating from other jurisdictions. CONCLUSION:In the post-world war II era, cyber security has evolved from a technical discipline to the strategic concept. The power of the internet, our growing dependence upon it and the disruptive capability of cyber attackers now threaten national and international security. The nature of a security threat has changed a lot, but the internet provides a new delivery mechanism that can increase the speed, scale, and power of an attack. National critical infrastructures are now at risk. As a consequence, all future political and military conflicts will have a cyber-dimension, whose size and impact is difficult to predict. World leaders must address the threat of strategic cyber-attacks with strategic responses in favor of cyber defense. The nations will now have to adopt the technologies like that of deterrence, arms control and technology. Cyber-attacks deterrence lacks creditability because hacker skills are easy to acquire and because attackers are often able to conduct high-asymmetry attacks even while remaining anonymous to their victims. Cyber arms controls appear unlikely because cyberspace is too big to inspect and malicious code is even hard to define. However political will, perhaps in the wake of a future cyber-attack, could change the status-quo. The dynamic nature of Cyberspace makes it difficult to predict the next future cyber-attack, or how serious it could be. A key challenge for the national security planners is that the hacker tools and techniques required for cyber espionage are often the same as for cyber-attacks.28 Hackers today have enormous advantages over cyber defenders, including anonymity and asymmetry. In fact, if there is future war between major world powers, a significant degree of fighting will take place on the cyberspace only, and the first victim may be the internet itself. To shift the balance, the cyber defenders will need to increase the trust on hardware and software. More improved defense strategies should be there. Government will aslo have to play active role in this action packed future. 28 These may be differentiated by the terms computer network exploitation (CNE) and computer network attack (CNA). International Law and Cyber-Warfare Page 18 Whereas on the other hand, the International law have to furnish its sections related to ‘force’ and ‘armed attack’. The ambigousity related to these factors is not giving a convincing answer to the ones affected by the cyber-warfares. The societies, trusts and the NGOs will have to play more active role in supporting the statutory international law bodies related to the cyber-warfare. More opinions and research work should be conducted by the scholars to provide the law bodies with adequate amount of evidences. The problem of Jurisdiction, armed attack, international etc. have to be sort out as early as possible because there is hardly anytime left before the next Cyber-warfare takes place. International Law and Cyber-Warfare Page 19 AUTHORITIES REFERRED:1- Cyber Security and International Law by Mary Ellen O’ Connell, Louise Arimatsu, Elizabeth Wilmshurst 2- Cyber-warfare and International 2011 by Nils Melzer 3- Cyber Security without Cyber war by Mary Ellen O’ Connell, Journal of Conflict & Security Law, Oxford University Press 2011. 4- Classification of Cyber Conflicts by Michael Schmitt, Journal of Conflict & Security Law, Oxford University Press 2011. 5- International Cyber Incidents: Legal Considerations by Eneken Tikk, Kadri Kaska and Liis Vihul, 2010. 6- Strategic Cyber Security by Kenneth Geers, NATO Cooperative Cyber Defense Centre for excellence, 2011. 7- Charter of the United Nations and the Statute of International Court of Justice, San Francisco, 1945. RISHABH SHRIVASTAVA BA.LLB. (Hons.) (1st year) with specialization in Energy Laws College of Legal Studies (CoLS), University of Petroleum and Energy Studies (UPES) Bidholi via Prem Nagar, Dehradun-248001, Uttarakhand, India E-mail- [email protected] International Law and Cyber-Warfare Page 20