SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Application of IHL to
Computer Network Attacks
KOSTIANTYN IAKOVLIEV
(UKRAINE)
Yerevan State University
Center for European Studies
MA in Human Rights & Democratization
•
•
•
•
•
•
•
•
•
•

OUTLINE
Definitions
Can International Humanitarian Law apply to
Computer Network Attacks (CNAs)?
Main issues when applying International
Humanitarian Law to CNAS
Principle of distinction
Attacks only against military objects
The prohibition of indiscriminate attacks
Combatant status
Recent examples of using CNAs
in warfare
Our suggestions for creating an international
treaty on CNAs
Sources
Definitions:

•

•

Kinetic (usual) attacks are used to destroy the
opponent's infrastructure through traditional
means of warfare.

Computer network attacks (CNAs) are
used to disrupt or destroy information within the
opponent's computer networks themselves but
can also lead to results similar to those achieved
by kinetic attacks.
Can International Humanitarian Law
apply to Computer Network Attacks
(CNAs)?

•
•

•

Core provisions: 1977 Additional Protocols I and II to
the Geneva Conventions and customary international
law.
Martens Clause: whenever a situation is not covered by
an international agreement, “civilians and combatants
remain under the protection and authority of the principles
of international law derived from established custom, from
the principles of humanity, and from the dictates of public
conscience".
Article 38 of the Statute of the International Court of
Justice also demonstrates the fallacy of any contention
of inapplicability based on the absence of specific lex
Main issues when applying
International Humanitarian Law to
CNAs

•

•
•
•

the principle of
distinction;
attacks only against
military objectives;
the prohibition of
indiscriminate
attacks;
combatant status
Principle of distinction

•

General rule of IHL
In order to ensure respect for and
protection of the civilian population
and civilian objects, the Parties to a
conflict are required at all times to
distinguish between the civilian
population and combatants and
between civilian objects and military
objectives and accordingly must direct
their operations only against military
objectives (Art. 48 AP I)
Specificity of this rule in case of
CNAs
It is unclear whether hackers are part
of armed forces or not.

•
•

Military objects

General rule of IHL
AP I (Art. 52) comprises two conditions that
must be simultaneously met for an military
object: first, it must make an effective
contribution to the military action of the
adversary and secondly, in the
circumstances ruling at the time, its attack
must offer a definite military advantage to
the attacker.
Specificity of this rule in case of CNAs
Either network being affected must meet the
two conditions above or the object that the
network is controlling.
A network attacked may also be necessary
for the survival of the civilian population
(like dams, dykes, nuclear electrical
generating stations)

•
Indiscriminate attacks
•

General rule of IHL
The prohibition of indiscriminate attacks is defined in Article 51(4) of AP
l as one which is either not carefully aimed at a specific military
objective (through carelessness or use of weapons that are by
nature not capable of being so directed) or because the effects of an
attack on a military objective are uncontrollable and unpredictable.

•

Specificity of this rule in case of CNAs
Civilian and military computer networks are in practice highly
interconnected, and thus CNAs not always man be aimed accurately
at the intended target without creating a host of unforeseen and
unforeseeable effects at the same time.
Combatant status
•

General rule of IHL
The Geneva Conventions present rules for protecting civilians and those
hors de combat, such as soldiers that have been wounded or are sick
and unable to fight. These Conventions also spell out specific
guidelines for protecting those hors de combat in land, naval, and air
warfare.
Specificity of this rule in case of CNAs
If incorporated into the armed forces, personnel associated with CNAs
has all the rights and liabilities of combatants: they can be attacked
like any other combatant and should endeavour to be in uniform if
captured in order to be entitled to POW status, but the situation of
technicians that act for the army but are not incorporated into it is more
problematic as they may be considered civilians who would have no
POW status if captured and could be prosecuted for the mere fact of
taking part in the hostilities (their conduct does not seem to be
comparable to the situation of civilians described in Art. 4 (4) of
Geneva Convention III of 1949, which are entitled to POW status) and
would also be subject to attack.

•
Recent examples of using CNAs
in warfare

•

•

Recently, the United States has
created new bodies within their
government organization to deal
specifically with CNAs that may
pose a threat to national security in
addition to existing mechanisms of
defense against kinetic attacks.
China’s Cyber Warfare Doctrine
considers operations against
computer networks fundamental to
the country's military and national
development strategy
Recent examples of using CNAs
in warfare continued

•

•
•

In 2009, a cyber attack called GhostNet that targeted
foreign embassies, government agencies and offices
used by the Dalai Lama, was traced to IP-addresses on
an island in the South China Sea where the People's
Liberation Army has an intelligence base.
In January 2010, Google Inc. said it had been hit by an
attack originating in China, and said the cyber-spies had
sought to steal emails from Chinese government critics.
In 2011, the U. S. government accused military and
intelligence services of Russia and China of conducting
a sustained campaign to steal American commercial
and military secrets through cyber espionage
Our suggestions for creating an
international treaty on CNAs

•
•
•
•

Defining CNAs that can trigger application of
IHL
Establishing rules for CNAs to be used in
disputed situations (e. g., interconnected
networks that are both military objectives and
necessary for survival of population)
Outlining combatant status of personnel
responsible for CNAs
Reaffirming the need to discriminate between
civilian population and military personnel
Sources:
Dilanian, K. (2011, August 12). Russia and China accused of cyber-spying campaign to steal U.S.
secrets. Los Angeles Times. Retrieved from http://articles.latimes.com/2011/aug/12/business/la-ficyber-china-20110813
Dörmann, K. (2001, May 19). Computer network attack and international humanitarian law. ICRC
Resource Centre. Retrieved November 22, 2012, from
http://www.icrc.org/eng/resources/documents/misc/5p2alj.htm
Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2011). The
Law Of Cyber Attack. California Law Review, 2012, 76.
Lewis, A. (2010, April 25). A Note on the Laws of War in Cyberspace. Center for Strategic and
International Studies. Retrieved December 16, 2012, from http://csis.org/publication/note-lawswar-cyberspace
Schmitt, M. N. (2002). Wired warfare: Computer network attack and jus in bello. International Review
of the Red Cross, 84(846), 365–399. doi:10.1017/S1560775500097741
Watts, S. (2010). Combatant Status and Computer Network Attacks. Virginia Journal of International
Law, 50(2), 391–447.
Wolf, J. (2012, March 8). China cyber capability endangers U.S. forces: report. Reuters. Washington.
Retrieved from http://www.reuters.com/article/2012/03/08/us-china-usa-cyberwaridUSBRE82712820120308
created with the help of Zotero 3.0.11 for Firefox
first presented on

5th Yerevan
International
Conference on
International
Humanitarian Law

https://www.facebook.com/groups/218931458229648/

Russian - Armenian
(Slavonic) University,
November 22-24, 2012
Conference Topic:
The means and
methods of warfare in
contemporary armed
conflicts: IHL
perspectives
Section:
Cyber warfare and
IHL

https://www.facebook.com/groups/218931458229648/

Chairperson:
Sergey Sayapin,
ICRC, Legal Adviser
Thank you for attention!
Kostiantyn Iakovliev
(Ukraine)
MA in Human Rights and
Democratization,
Yerevan State University,
2012
https://plus.google.com/u/0/
+KostiantynIakovliev/
https://www.linkedin.com/in/
iakovliev

Weitere ähnliche Inhalte

Was ist angesagt?

The patriot act
The patriot actThe patriot act
The patriot act
palita Px
 
International law and_the_use_of_force
International law and_the_use_of_forceInternational law and_the_use_of_force
International law and_the_use_of_force
StudsPlanet.com
 
International Law in Times of Armed Conflict
International Law in Times of Armed ConflictInternational Law in Times of Armed Conflict
International Law in Times of Armed Conflict
swissnex San Francisco
 
International humanitarian law presentation
International humanitarian law   presentationInternational humanitarian law   presentation
International humanitarian law presentation
Rida Khan
 
International humanitarian law
International humanitarian lawInternational humanitarian law
International humanitarian law
FAROUQ
 

Was ist angesagt? (20)

Take home test il
Take home test ilTake home test il
Take home test il
 
International humanitarian law
International humanitarian lawInternational humanitarian law
International humanitarian law
 
Crimes Against Humanity
Crimes Against HumanityCrimes Against Humanity
Crimes Against Humanity
 
The patriot act
The patriot act The patriot act
The patriot act
 
International Humanitarian Law and Terrorism
International Humanitarian Law and TerrorismInternational Humanitarian Law and Terrorism
International Humanitarian Law and Terrorism
 
The patriot act
The patriot actThe patriot act
The patriot act
 
International law and_the_use_of_force
International law and_the_use_of_forceInternational law and_the_use_of_force
International law and_the_use_of_force
 
International Humanitarian Law, (Lecture 15)- Distinction between internation...
International Humanitarian Law, (Lecture 15)- Distinction between internation...International Humanitarian Law, (Lecture 15)- Distinction between internation...
International Humanitarian Law, (Lecture 15)- Distinction between internation...
 
International Law in Times of Armed Conflict
International Law in Times of Armed ConflictInternational Law in Times of Armed Conflict
International Law in Times of Armed Conflict
 
International humanitarian law (ihl)
International humanitarian law  (ihl)International humanitarian law  (ihl)
International humanitarian law (ihl)
 
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHLInternational Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
 
International Humanitarian Law Lecture 11 - International Armed Conflict
International Humanitarian Law Lecture 11 - International Armed ConflictInternational Humanitarian Law Lecture 11 - International Armed Conflict
International Humanitarian Law Lecture 11 - International Armed Conflict
 
Law of War
Law of WarLaw of War
Law of War
 
Ihl
IhlIhl
Ihl
 
International humanitarian law presentation
International humanitarian law   presentationInternational humanitarian law   presentation
International humanitarian law presentation
 
International humanitarian law
International humanitarian lawInternational humanitarian law
International humanitarian law
 
Mercenaries_Freedom_Fighters_and_Self_De
Mercenaries_Freedom_Fighters_and_Self_DeMercenaries_Freedom_Fighters_and_Self_De
Mercenaries_Freedom_Fighters_and_Self_De
 
International Humanitarian Law Lecture 12 - Non International Armed Conflict
International Humanitarian Law Lecture 12 - Non International Armed ConflictInternational Humanitarian Law Lecture 12 - Non International Armed Conflict
International Humanitarian Law Lecture 12 - Non International Armed Conflict
 
International Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
International Humanitarian Law Lecture 19 - 70 Years of Geneva ConventionsInternational Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
International Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
 
Prohibited means & methods of warfare
Prohibited means & methods of warfare Prohibited means & methods of warfare
Prohibited means & methods of warfare
 

Andere mochten auch (12)

project_report_myungho
project_report_myunghoproject_report_myungho
project_report_myungho
 
A
AA
A
 
Technology
TechnologyTechnology
Technology
 
العمارة الاسلامية في دمشق
العمارة الاسلامية في دمشقالعمارة الاسلامية في دمشق
العمارة الاسلامية في دمشق
 
CUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOS
CUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOSCUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOS
CUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOS
 
Mouse.
Mouse. Mouse.
Mouse.
 
Efficient provisioning private network in a virtualized environment
Efficient provisioning private network in a virtualized environmentEfficient provisioning private network in a virtualized environment
Efficient provisioning private network in a virtualized environment
 
GSM Proximity Platform
GSM Proximity PlatformGSM Proximity Platform
GSM Proximity Platform
 
Programming Fundamental handouts
Programming Fundamental handoutsProgramming Fundamental handouts
Programming Fundamental handouts
 
Cohen sutherland algorithm
Cohen sutherland algorithmCohen sutherland algorithm
Cohen sutherland algorithm
 
Tratamiento de la insuficiencia cardiaca
Tratamiento de la insuficiencia cardiacaTratamiento de la insuficiencia cardiaca
Tratamiento de la insuficiencia cardiaca
 
Jukran pramuka garuda (2008)
Jukran pramuka garuda (2008)Jukran pramuka garuda (2008)
Jukran pramuka garuda (2008)
 

Ähnlich wie Application of IHL to Computer Network Attacks

INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdfINTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
SiranjanaRodrigo
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
Talwant Singh
 
Technological Advancement of Warfare and IHL.pptx
Technological Advancement of Warfare and IHL.pptxTechnological Advancement of Warfare and IHL.pptx
Technological Advancement of Warfare and IHL.pptx
AntaresCobodero1
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
MarioEliseo3
 
[Challenge:Future] Cyber war
[Challenge:Future] Cyber war[Challenge:Future] Cyber war
[Challenge:Future] Cyber war
Challenge:Future
 

Ähnlich wie Application of IHL to Computer Network Attacks (20)

Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
Villard WritingSample Cybersecurity and International Law
Villard WritingSample Cybersecurity and International LawVillard WritingSample Cybersecurity and International Law
Villard WritingSample Cybersecurity and International Law
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...
 
Global Security Challenges of the 21st Century: Workshop on Cyber Crimes
Global Security Challenges of the 21st Century: Workshop on Cyber CrimesGlobal Security Challenges of the 21st Century: Workshop on Cyber Crimes
Global Security Challenges of the 21st Century: Workshop on Cyber Crimes
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William Boothby
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdfINTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Artificial Intelligence and the Law of Armed Conflict
Artificial Intelligence and the Law of Armed ConflictArtificial Intelligence and the Law of Armed Conflict
Artificial Intelligence and the Law of Armed Conflict
 
Technological Advancement of Warfare and IHL.pptx
Technological Advancement of Warfare and IHL.pptxTechnological Advancement of Warfare and IHL.pptx
Technological Advancement of Warfare and IHL.pptx
 
OTI Cyber warefare
OTI Cyber warefareOTI Cyber warefare
OTI Cyber warefare
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
[Challenge:Future] Cyber war
[Challenge:Future] Cyber war[Challenge:Future] Cyber war
[Challenge:Future] Cyber war
 
Cyber War
Cyber WarCyber War
Cyber War
 

Mehr von Konstantin Yakovlev

Mehr von Konstantin Yakovlev (7)

Political Instability Index
Political Instability IndexPolitical Instability Index
Political Instability Index
 
International Protection of Children left without Parental Custody
International Protection of Children left without Parental CustodyInternational Protection of Children left without Parental Custody
International Protection of Children left without Parental Custody
 
Coursera Class on 21st Centrury American Foreign Policy
Coursera Class on 21st Centrury American Foreign PolicyCoursera Class on 21st Centrury American Foreign Policy
Coursera Class on 21st Centrury American Foreign Policy
 
EU Common Security and Defense Policy in 2000s
EU Common Security and Defense Policy in 2000sEU Common Security and Defense Policy in 2000s
EU Common Security and Defense Policy in 2000s
 
Совет министров обороны СНГ
Совет министров обороны СНГСовет министров обороны СНГ
Совет министров обороны СНГ
 
Cyber Security Laws
Cyber Security LawsCyber Security Laws
Cyber Security Laws
 
Linguistic Rights in Eastern Partnership countries
Linguistic Rights in Eastern Partnership countriesLinguistic Rights in Eastern Partnership countries
Linguistic Rights in Eastern Partnership countries
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Application of IHL to Computer Network Attacks

  • 1. Application of IHL to Computer Network Attacks KOSTIANTYN IAKOVLIEV (UKRAINE) Yerevan State University Center for European Studies MA in Human Rights & Democratization
  • 2. • • • • • • • • • • OUTLINE Definitions Can International Humanitarian Law apply to Computer Network Attacks (CNAs)? Main issues when applying International Humanitarian Law to CNAS Principle of distinction Attacks only against military objects The prohibition of indiscriminate attacks Combatant status Recent examples of using CNAs in warfare Our suggestions for creating an international treaty on CNAs Sources
  • 3. Definitions: • • Kinetic (usual) attacks are used to destroy the opponent's infrastructure through traditional means of warfare. Computer network attacks (CNAs) are used to disrupt or destroy information within the opponent's computer networks themselves but can also lead to results similar to those achieved by kinetic attacks.
  • 4. Can International Humanitarian Law apply to Computer Network Attacks (CNAs)? • • • Core provisions: 1977 Additional Protocols I and II to the Geneva Conventions and customary international law. Martens Clause: whenever a situation is not covered by an international agreement, “civilians and combatants remain under the protection and authority of the principles of international law derived from established custom, from the principles of humanity, and from the dictates of public conscience". Article 38 of the Statute of the International Court of Justice also demonstrates the fallacy of any contention of inapplicability based on the absence of specific lex
  • 5. Main issues when applying International Humanitarian Law to CNAs • • • • the principle of distinction; attacks only against military objectives; the prohibition of indiscriminate attacks; combatant status
  • 6. Principle of distinction • General rule of IHL In order to ensure respect for and protection of the civilian population and civilian objects, the Parties to a conflict are required at all times to distinguish between the civilian population and combatants and between civilian objects and military objectives and accordingly must direct their operations only against military objectives (Art. 48 AP I) Specificity of this rule in case of CNAs It is unclear whether hackers are part of armed forces or not. •
  • 7. • Military objects General rule of IHL AP I (Art. 52) comprises two conditions that must be simultaneously met for an military object: first, it must make an effective contribution to the military action of the adversary and secondly, in the circumstances ruling at the time, its attack must offer a definite military advantage to the attacker. Specificity of this rule in case of CNAs Either network being affected must meet the two conditions above or the object that the network is controlling. A network attacked may also be necessary for the survival of the civilian population (like dams, dykes, nuclear electrical generating stations) •
  • 8. Indiscriminate attacks • General rule of IHL The prohibition of indiscriminate attacks is defined in Article 51(4) of AP l as one which is either not carefully aimed at a specific military objective (through carelessness or use of weapons that are by nature not capable of being so directed) or because the effects of an attack on a military objective are uncontrollable and unpredictable. • Specificity of this rule in case of CNAs Civilian and military computer networks are in practice highly interconnected, and thus CNAs not always man be aimed accurately at the intended target without creating a host of unforeseen and unforeseeable effects at the same time.
  • 9. Combatant status • General rule of IHL The Geneva Conventions present rules for protecting civilians and those hors de combat, such as soldiers that have been wounded or are sick and unable to fight. These Conventions also spell out specific guidelines for protecting those hors de combat in land, naval, and air warfare. Specificity of this rule in case of CNAs If incorporated into the armed forces, personnel associated with CNAs has all the rights and liabilities of combatants: they can be attacked like any other combatant and should endeavour to be in uniform if captured in order to be entitled to POW status, but the situation of technicians that act for the army but are not incorporated into it is more problematic as they may be considered civilians who would have no POW status if captured and could be prosecuted for the mere fact of taking part in the hostilities (their conduct does not seem to be comparable to the situation of civilians described in Art. 4 (4) of Geneva Convention III of 1949, which are entitled to POW status) and would also be subject to attack. •
  • 10. Recent examples of using CNAs in warfare • • Recently, the United States has created new bodies within their government organization to deal specifically with CNAs that may pose a threat to national security in addition to existing mechanisms of defense against kinetic attacks. China’s Cyber Warfare Doctrine considers operations against computer networks fundamental to the country's military and national development strategy
  • 11. Recent examples of using CNAs in warfare continued • • • In 2009, a cyber attack called GhostNet that targeted foreign embassies, government agencies and offices used by the Dalai Lama, was traced to IP-addresses on an island in the South China Sea where the People's Liberation Army has an intelligence base. In January 2010, Google Inc. said it had been hit by an attack originating in China, and said the cyber-spies had sought to steal emails from Chinese government critics. In 2011, the U. S. government accused military and intelligence services of Russia and China of conducting a sustained campaign to steal American commercial and military secrets through cyber espionage
  • 12. Our suggestions for creating an international treaty on CNAs • • • • Defining CNAs that can trigger application of IHL Establishing rules for CNAs to be used in disputed situations (e. g., interconnected networks that are both military objectives and necessary for survival of population) Outlining combatant status of personnel responsible for CNAs Reaffirming the need to discriminate between civilian population and military personnel
  • 13. Sources: Dilanian, K. (2011, August 12). Russia and China accused of cyber-spying campaign to steal U.S. secrets. Los Angeles Times. Retrieved from http://articles.latimes.com/2011/aug/12/business/la-ficyber-china-20110813 Dörmann, K. (2001, May 19). Computer network attack and international humanitarian law. ICRC Resource Centre. Retrieved November 22, 2012, from http://www.icrc.org/eng/resources/documents/misc/5p2alj.htm Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2011). The Law Of Cyber Attack. California Law Review, 2012, 76. Lewis, A. (2010, April 25). A Note on the Laws of War in Cyberspace. Center for Strategic and International Studies. Retrieved December 16, 2012, from http://csis.org/publication/note-lawswar-cyberspace Schmitt, M. N. (2002). Wired warfare: Computer network attack and jus in bello. International Review of the Red Cross, 84(846), 365–399. doi:10.1017/S1560775500097741 Watts, S. (2010). Combatant Status and Computer Network Attacks. Virginia Journal of International Law, 50(2), 391–447. Wolf, J. (2012, March 8). China cyber capability endangers U.S. forces: report. Reuters. Washington. Retrieved from http://www.reuters.com/article/2012/03/08/us-china-usa-cyberwaridUSBRE82712820120308 created with the help of Zotero 3.0.11 for Firefox
  • 14. first presented on 5th Yerevan International Conference on International Humanitarian Law https://www.facebook.com/groups/218931458229648/ Russian - Armenian (Slavonic) University, November 22-24, 2012
  • 15. Conference Topic: The means and methods of warfare in contemporary armed conflicts: IHL perspectives Section: Cyber warfare and IHL https://www.facebook.com/groups/218931458229648/ Chairperson: Sergey Sayapin, ICRC, Legal Adviser
  • 16. Thank you for attention! Kostiantyn Iakovliev (Ukraine) MA in Human Rights and Democratization, Yerevan State University, 2012 https://plus.google.com/u/0/ +KostiantynIakovliev/ https://www.linkedin.com/in/ iakovliev