SlideShare ist ein Scribd-Unternehmen logo
1 von 4
The Legalities of Cyber-Warfare:
By: AdamKinder
Twenty-nine major companies have had major data breaches so far this
year in the United States. Of these major companies’ breaches, there were over
1 billion estimated American accounts (more than 3 times the population of
America) whose information was compromised. There are few Americans left
who have not, in some way, shape, or form, been the victim of a cyber-attack.
Yet how many arrests have been made related to these attacks? The FBI keeps
a list of their cyber-operations here. With-in these operations less than 10%
of cyber-crime perpetrators are actually caught, and that is only counting the
known cyber-attacks. This also does not count the large amount of advanced
persistent attacks made on the private sector constantly. These advanced
persistent attacks are not considered a crime according to current laws and
regulations until they have successfully breached the private company’s
defensive restraints. Even after these attacks breach a private company’s
defensive restraints, it is more likely that the private company will be
penalized for the breach than the perpetrator of the cyber-attack.
Considering the wide reaching effects of these cyber-attacks to the
general public: I suggest to my fellow information security professionals that
we raise the public awareness of the importance of governing the cyber-space
domain as well as the lack of laws being made in order to ensure that the
governance is evolving with its landscape. I further advise that we lead and
direct the conversation governing these laws in order to provide our expert
opinion and experience to the cause, where the general public has none. This
will help to speed along the law making process as well as limit the excuses
that lawmakers have to delay the legislation any more than needed to ensure
just laws are enacted.
In our current state as a country technology tends to race ahead of the
law. As cyber weaponry continues to grow increasingly sophisticated,
lawmakers are busy playing catch up analyzing how old international rules
of war apply to a new battlefield. Among the many legal issues raised is the
particularly challenging question of how a state may lawfully respond to a
cyber-attack by another state. Can the victim state respond with a counter
cyber-attack, or even military force? U.S. Secretary of Defense Leon Panetta
said “The next Pearl Harbor that we face could well be a cyber-attack.” In
the event of a cyber-Pearl Harbor, how could the United States lawfully
respond?
In Manny Halberstam’s note “Hacking Back: Reevaluating the Legality of
Retaliatory Cyber-attacks” he offers a solution based off of laws surrounding
a state’s legal right to use force against another state. By using these laws of
engagement we have an excellent place to begin the legislation process around
governing state to state cyber warfare. While this is a very broad area that
may not affect those who do not deal directly with cyber warfare, it is a key
step needed in the legislation process needed to further govern our cyber space.
To paraphrase Mr.Halberstam’s note in order to make it easier to digest:
1. When responding to a cyber-attack that is unfriendly but lawful the victim state can
respond with a counter cyber-attack that is unfriendly but lawful. Examples of unfriendly
but lawful cyber-attacks are denial of service attacks that do not affect key areas of state
infrastructure needed to provide governance over that state. The justifying legal doctrine
or theory for this counter attack is called retorsion.
2. When responding to a cyber-attack that is unlawful but is not a use of force the victim
state can respond with a counter cyber-attack that is unlawful but is not a use of force.
Examples of unlawful counter-attacks that are not a use of force are using cyber-attacks
that are used as a means to intervene directly or indirectly in the internal or external
affairs of other states. For example if a state used cyber-attacks to collect sensitive data
on a political party that was in power and used this data to help another political party
rise to power, that operation would be considered unlawful but is not a use of force. The
justifying legal doctrine or theory for this counter attack is called non-forcible
countermeasures.
3. When responding to a cyber-attack that is a use of force but is not an armed attack the
victim state can respond with a counter cyber-attack that is a use of force but is not an
armed attack. Examples of cyber-attacks that would be considered a use of force but is
not an armed attack is any cyber-attack that disrupts or stops systems that are vital to
the victim state. An example of such a system would be the New York Stock Exchange
or Iran’s nuclear research facilities. The justifying legal doctrine or theory for this counter
attack is called gap theory of reprisal.
4. When responding to a cyber-attack that is an armed attack the victim state can use a
counter cyber-attack that is an armed attack (or use a physical armed attack). A cyber-
attack becomes an armed attack once loss of life or physical damage has occurred. If a
cyber-attack damaged a state’s infrastructure to the point where people were dying due
to that vital infrastructure being down, the cyber-attack would be considered an armed
attack. Just as well if someone were able to design a cyber-attack that caused missiles
to launch or trigger in place and caused physical damage, this would also be considered
an armed attack. The justifying legal doctrine or theory for this counter attack is called
defensive armed reprisals.
This proposed backbone to the legislation behind state to state governance
of cyber warfare provides a straight forward picture of how to deal with such
attacks and when it is appropriate to use counter cyber-attacks. It is based off
of the current laws that govern any escalation of force between states and as
such has a proven history of effect. With the evidence of ever increasing
cyber-attacks in the U.S. it is important that we, as the experts in this
domain, encourage our communities and lawmakers to start pushing for laws
that properly govern our cyber-space. Halberstam graciously gave us a great
starting point, and with that it is time to educate the masses and guide the
way to taming cyber-space. Cyber-attacks exponentially grow more
devastating, deviant, and diverse. Without the proper guidance and education
our lawmakers have no hope in creating a cyber-specific governance that
covers the types of cyber-attacks that will develop in the future. It is up to us
to ensure that the law is sound, and enforced properly.

Weitere ähnliche Inhalte

Was ist angesagt?

Schmalleger Chapter 5 Policing legal aspects
Schmalleger Chapter 5  Policing legal aspectsSchmalleger Chapter 5  Policing legal aspects
Schmalleger Chapter 5 Policing legal aspectsgregory riley
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crimerharrisonaz
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimesrharrisonaz
 
Schmalleger Chapter 1 What is criminal justice – chapter 1
Schmalleger Chapter 1 What is criminal justice – chapter 1Schmalleger Chapter 1 What is criminal justice – chapter 1
Schmalleger Chapter 1 What is criminal justice – chapter 1gregory riley
 
Schmalleger Chapter 2 The crime picture – chapter 2
Schmalleger Chapter 2  The crime picture – chapter 2Schmalleger Chapter 2  The crime picture – chapter 2
Schmalleger Chapter 2 The crime picture – chapter 2gregory riley
 
Policy and the Private Sector: Addressing the NSA Leaks
Policy and the Private Sector: Addressing the NSA LeaksPolicy and the Private Sector: Addressing the NSA Leaks
Policy and the Private Sector: Addressing the NSA LeaksNational Journal Membership
 
Civil RICO - Racketeer Influenced and Corruption Organizations Act
Civil RICO - Racketeer Influenced and Corruption Organizations ActCivil RICO - Racketeer Influenced and Corruption Organizations Act
Civil RICO - Racketeer Influenced and Corruption Organizations ActEthan Burger
 
19 on 2019: Expert predictions on the top police issues in 2019
19 on 2019: Expert predictions on the top police issues in 201919 on 2019: Expert predictions on the top police issues in 2019
19 on 2019: Expert predictions on the top police issues in 2019Nancy Perry
 
Ch 5 Inchoate Offenses
Ch 5 Inchoate OffensesCh 5 Inchoate Offenses
Ch 5 Inchoate Offensesrharrisonaz
 
Now Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact SheetNow Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact SheetMargolis Healy
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementDavid Sweigert
 
Hackers take over federal website, threatens ‘war’ on US governme...
Hackers take over federal website, threatens ‘war’ on US governme...Hackers take over federal website, threatens ‘war’ on US governme...
Hackers take over federal website, threatens ‘war’ on US governme...waddywood
 
Mens rea
Mens reaMens rea
Mens reasebis1
 

Was ist angesagt? (20)

Schmalleger Chapter 5 Policing legal aspects
Schmalleger Chapter 5  Policing legal aspectsSchmalleger Chapter 5  Policing legal aspects
Schmalleger Chapter 5 Policing legal aspects
 
Ch 9 White Collar and Organized Crime
Ch 9 White Collar and Organized CrimeCh 9 White Collar and Organized Crime
Ch 9 White Collar and Organized Crime
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimes
 
Schmalleger Chapter 1 What is criminal justice – chapter 1
Schmalleger Chapter 1 What is criminal justice – chapter 1Schmalleger Chapter 1 What is criminal justice – chapter 1
Schmalleger Chapter 1 What is criminal justice – chapter 1
 
Police Brutality
Police BrutalityPolice Brutality
Police Brutality
 
Schmalleger Chapter 2 The crime picture – chapter 2
Schmalleger Chapter 2  The crime picture – chapter 2Schmalleger Chapter 2  The crime picture – chapter 2
Schmalleger Chapter 2 The crime picture – chapter 2
 
Policy and the Private Sector: Addressing the NSA Leaks
Policy and the Private Sector: Addressing the NSA LeaksPolicy and the Private Sector: Addressing the NSA Leaks
Policy and the Private Sector: Addressing the NSA Leaks
 
Elements of Crime and Justifications
Elements of Crime and JustificationsElements of Crime and Justifications
Elements of Crime and Justifications
 
Civil RICO - Racketeer Influenced and Corruption Organizations Act
Civil RICO - Racketeer Influenced and Corruption Organizations ActCivil RICO - Racketeer Influenced and Corruption Organizations Act
Civil RICO - Racketeer Influenced and Corruption Organizations Act
 
19 on 2019: Expert predictions on the top police issues in 2019
19 on 2019: Expert predictions on the top police issues in 201919 on 2019: Expert predictions on the top police issues in 2019
19 on 2019: Expert predictions on the top police issues in 2019
 
What is crime?
What is crime?What is crime?
What is crime?
 
Criminal Law
Criminal LawCriminal Law
Criminal Law
 
Ch 5 Inchoate Offenses
Ch 5 Inchoate OffensesCh 5 Inchoate Offenses
Ch 5 Inchoate Offenses
 
Cyber2
Cyber2Cyber2
Cyber2
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Now Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact SheetNow Is the Time: The President’s Plan - Fact Sheet
Now Is the Time: The President’s Plan - Fact Sheet
 
NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
HClinton
HClintonHClinton
HClinton
 
Hackers take over federal website, threatens ‘war’ on US governme...
Hackers take over federal website, threatens ‘war’ on US governme...Hackers take over federal website, threatens ‘war’ on US governme...
Hackers take over federal website, threatens ‘war’ on US governme...
 
Mens rea
Mens reaMens rea
Mens rea
 

Andere mochten auch

Corporate Crime Legal Research Refresher
Corporate Crime Legal Research RefresherCorporate Crime Legal Research Refresher
Corporate Crime Legal Research RefresherCharlotte Gill
 
81-220-1 Chapter 14
81-220-1 Chapter 1481-220-1 Chapter 14
81-220-1 Chapter 14mpalaro
 
White Collar Crime, Consumers and Victimization
White Collar Crime, Consumers and VictimizationWhite Collar Crime, Consumers and Victimization
White Collar Crime, Consumers and Victimizationv2zq
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceJarno Limnéll
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfareMike Chapple
 
Crimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crimeCrimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crimeLeen Gultia
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrimepatelripal99
 
The Dark Side Of Digital Strategy: Cyberwarfare, Porn & Telegraphs [SFW]
The Dark Side Of Digital Strategy: Cyberwarfare, Porn & Telegraphs [SFW]The Dark Side Of Digital Strategy: Cyberwarfare, Porn & Telegraphs [SFW]
The Dark Side Of Digital Strategy: Cyberwarfare, Porn & Telegraphs [SFW]Oliver Woods
 

Andere mochten auch (14)

Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?
 
Chapter12
Chapter12Chapter12
Chapter12
 
Corporate Crime Legal Research Refresher
Corporate Crime Legal Research RefresherCorporate Crime Legal Research Refresher
Corporate Crime Legal Research Refresher
 
Case study 12
Case study 12Case study 12
Case study 12
 
Case study 11
Case study 11Case study 11
Case study 11
 
81-220-1 Chapter 14
81-220-1 Chapter 1481-220-1 Chapter 14
81-220-1 Chapter 14
 
White Collar Crime, Consumers and Victimization
White Collar Crime, Consumers and VictimizationWhite Collar Crime, Consumers and Victimization
White Collar Crime, Consumers and Victimization
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in CyberspaceCyberwarfare and Aggressiveness in Cyberspace
Cyberwarfare and Aggressiveness in Cyberspace
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfare
 
Crimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crimeCrimes against economics and political order, white collar and corporate crime
Crimes against economics and political order, white collar and corporate crime
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
The Dark Side Of Digital Strategy: Cyberwarfare, Porn & Telegraphs [SFW]
The Dark Side Of Digital Strategy: Cyberwarfare, Porn & Telegraphs [SFW]The Dark Side Of Digital Strategy: Cyberwarfare, Porn & Telegraphs [SFW]
The Dark Side Of Digital Strategy: Cyberwarfare, Porn & Telegraphs [SFW]
 

Ähnlich wie Legal Responses to Cyber Attacks

I need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxI need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxanthonybrooks84958
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slidesdondiw
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Hackers in the national cyber security
Hackers in the national cyber securityHackers in the national cyber security
Hackers in the national cyber securityCsaba Krasznay
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Tech and Law Center
 
Reply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docxReply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docxscuttsginette
 

Ähnlich wie Legal Responses to Cyber Attacks (9)

I need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docxI need answers to both discussions questions as well as replies to f.docx
I need answers to both discussions questions as well as replies to f.docx
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGTHE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPING
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Hackers in the national cyber security
Hackers in the national cyber securityHackers in the national cyber security
Hackers in the national cyber security
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
Gillian Cafiero - "Codifying the Harm of Cybercrime": Injecting zemiology in ...
 
Reply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docxReply to bellow post around 200 wordDefending cyberspace.docx
Reply to bellow post around 200 wordDefending cyberspace.docx
 

Legal Responses to Cyber Attacks

  • 1. The Legalities of Cyber-Warfare: By: AdamKinder Twenty-nine major companies have had major data breaches so far this year in the United States. Of these major companies’ breaches, there were over 1 billion estimated American accounts (more than 3 times the population of America) whose information was compromised. There are few Americans left who have not, in some way, shape, or form, been the victim of a cyber-attack. Yet how many arrests have been made related to these attacks? The FBI keeps a list of their cyber-operations here. With-in these operations less than 10% of cyber-crime perpetrators are actually caught, and that is only counting the known cyber-attacks. This also does not count the large amount of advanced
  • 2. persistent attacks made on the private sector constantly. These advanced persistent attacks are not considered a crime according to current laws and regulations until they have successfully breached the private company’s defensive restraints. Even after these attacks breach a private company’s defensive restraints, it is more likely that the private company will be penalized for the breach than the perpetrator of the cyber-attack. Considering the wide reaching effects of these cyber-attacks to the general public: I suggest to my fellow information security professionals that we raise the public awareness of the importance of governing the cyber-space domain as well as the lack of laws being made in order to ensure that the governance is evolving with its landscape. I further advise that we lead and direct the conversation governing these laws in order to provide our expert opinion and experience to the cause, where the general public has none. This will help to speed along the law making process as well as limit the excuses that lawmakers have to delay the legislation any more than needed to ensure just laws are enacted. In our current state as a country technology tends to race ahead of the law. As cyber weaponry continues to grow increasingly sophisticated, lawmakers are busy playing catch up analyzing how old international rules of war apply to a new battlefield. Among the many legal issues raised is the particularly challenging question of how a state may lawfully respond to a cyber-attack by another state. Can the victim state respond with a counter cyber-attack, or even military force? U.S. Secretary of Defense Leon Panetta said “The next Pearl Harbor that we face could well be a cyber-attack.” In the event of a cyber-Pearl Harbor, how could the United States lawfully respond? In Manny Halberstam’s note “Hacking Back: Reevaluating the Legality of Retaliatory Cyber-attacks” he offers a solution based off of laws surrounding a state’s legal right to use force against another state. By using these laws of engagement we have an excellent place to begin the legislation process around governing state to state cyber warfare. While this is a very broad area that may not affect those who do not deal directly with cyber warfare, it is a key
  • 3. step needed in the legislation process needed to further govern our cyber space. To paraphrase Mr.Halberstam’s note in order to make it easier to digest: 1. When responding to a cyber-attack that is unfriendly but lawful the victim state can respond with a counter cyber-attack that is unfriendly but lawful. Examples of unfriendly but lawful cyber-attacks are denial of service attacks that do not affect key areas of state infrastructure needed to provide governance over that state. The justifying legal doctrine or theory for this counter attack is called retorsion. 2. When responding to a cyber-attack that is unlawful but is not a use of force the victim state can respond with a counter cyber-attack that is unlawful but is not a use of force. Examples of unlawful counter-attacks that are not a use of force are using cyber-attacks that are used as a means to intervene directly or indirectly in the internal or external affairs of other states. For example if a state used cyber-attacks to collect sensitive data on a political party that was in power and used this data to help another political party rise to power, that operation would be considered unlawful but is not a use of force. The justifying legal doctrine or theory for this counter attack is called non-forcible countermeasures. 3. When responding to a cyber-attack that is a use of force but is not an armed attack the victim state can respond with a counter cyber-attack that is a use of force but is not an armed attack. Examples of cyber-attacks that would be considered a use of force but is not an armed attack is any cyber-attack that disrupts or stops systems that are vital to the victim state. An example of such a system would be the New York Stock Exchange or Iran’s nuclear research facilities. The justifying legal doctrine or theory for this counter attack is called gap theory of reprisal. 4. When responding to a cyber-attack that is an armed attack the victim state can use a counter cyber-attack that is an armed attack (or use a physical armed attack). A cyber- attack becomes an armed attack once loss of life or physical damage has occurred. If a cyber-attack damaged a state’s infrastructure to the point where people were dying due to that vital infrastructure being down, the cyber-attack would be considered an armed attack. Just as well if someone were able to design a cyber-attack that caused missiles to launch or trigger in place and caused physical damage, this would also be considered an armed attack. The justifying legal doctrine or theory for this counter attack is called defensive armed reprisals. This proposed backbone to the legislation behind state to state governance of cyber warfare provides a straight forward picture of how to deal with such attacks and when it is appropriate to use counter cyber-attacks. It is based off of the current laws that govern any escalation of force between states and as such has a proven history of effect. With the evidence of ever increasing cyber-attacks in the U.S. it is important that we, as the experts in this domain, encourage our communities and lawmakers to start pushing for laws that properly govern our cyber-space. Halberstam graciously gave us a great starting point, and with that it is time to educate the masses and guide the
  • 4. way to taming cyber-space. Cyber-attacks exponentially grow more devastating, deviant, and diverse. Without the proper guidance and education our lawmakers have no hope in creating a cyber-specific governance that covers the types of cyber-attacks that will develop in the future. It is up to us to ensure that the law is sound, and enforced properly.