AN ENQUIRY INTO THE LEGAL CHALLENGES OF CYBER WARFARE IN INTERNATIONAL LAW BY - DR. M.S. SHARMILA & VISHWA. B
AN ENQUIRY
INTO THE LEGAL CHALLENGES OF CYBER WARFARE IN INTERNATIONAL LAW
AUTHORED BY
- DR. M.S. SHARMILA**
VISHWA. B*
Abstract:
This article examines the legal
issues raised by cyberwar in the context of international law. It explores how
current legal standards, such as the Geneva Conventions, apply to cyberwar and
points out where gaps exist in their coverage. The paper also discusses
the accountability implications and challenges of attributing cyberattacks to
specific perpetrators. It also highlights current efforts to create new legal
frameworks and policies to address these issues. Using several recent case
studies, the essay highlights the urgent need to modify legal responses to
adequately address the complexities of modern cyberwar.
Keywords: Cyber Warfare, jus in
bello, jus ad bellum, International Law.
1.
Introduction:
The earliest reference of the
terminology cyber war was used in an article written by John Arquilla and David
Ronfeldt which in itself was titled as “Cyberwar is Coming”[1].
Cyber war simply would seem to mean that it is the war in the cyberspace of one
country into another. I am sure that none of us would have forgotten the WannaCry
Ransomware in 2017 or the Blue Whale Challenge. Going further into these
topics, we are now concerned about what cyber war actually is. The UNODC module
defines it as “cyberwarfare is used to describe cyber acts that
compromise and disrupt critical infrastructure systems, which amount to an
armed attack.”[2] With the
increasing advancements in the globe in relation to the technology, on one hand
we are all elated to see the world inside a six inch device; on the other hand,
we are constantly in a paranoid as to what this will all lead to. Cyber war
generally becomes a subject of international law because it denotes an attack
on the nation as a whole. In this article, I have made an attempt to discuss
how this concept of cyber warfare in international law, and also tried to
explain the problems in attribution of cyber war with real world examples.
2.
International Law and Cyber Warfare:
As we all know,
international law is the law of the nations. International law aims at creating
a set of principles or norms and obligations like the jus cogens and erga
omnes to maintain international peace and security among nations. When it
is about wars, international law intervenes to set the standards, and the
measures to prevent wars and also it deals with the maintenance of human rights
and humanitarian rights. This brings us now to a question. What is the reaction
of International Law to the emerging concerns of cyber warfare? Whether the law
regulates cyber war the way it regulates an armed war?
There are two
doctrines/concepts that are in relevance to cyber warfare under international
law. One is the concept of jus ad bellum, which delineates the use of
force in international law. This concept literally translates to ‘right of
war’. This concept of jus ad bellum is found to be present in the UN
Charter under article 2(4)[3], 39[4]
and 51[5]. However,
there is no definition for "use of force," "threat of
force," or "armed attack" in the United Nations Charter[6].
Nations recognise, nevertheless, that some unfriendly acts—regardless of their
magnitude—do not qualify as the use of force. Examples of these include trade
decisions that are unfavourable, space-based surveillance, boycotts, the
termination of diplomatic relations, communication blockages, espionage,
economic competition or sanctions, and political and economic coercion. A
declared war, a territorial occupation, a naval blockade, and the use of armed
force against civilians or military personnel stationed overseas are all
examples of an armed attack. On the other hand, there are no established
guidelines for evaluating offensive cyber activities.
Let us now move into another
concept involving cyber war, which is jus in bello or simply,
International Humanitarian Law. Jus in bello refers to the body of
international law that dictates how parties behave during armed conflict. Its
fundamental tenets are necessity—limiting force to that which is required to
achieve military objectives—proportionality—minimizing injury to civilians, and
distinction—differentiating between military targets and civilians[7].
It is evident from the definition of this concept that this concept was used
only at times of armed conflict. The central problem even faced today is that
how this concept could be connected to a cyber war or a cyber operation, In
cyber war, it calls into question the legitimacy of cyberattacks in the context
of cyberwar, particularly when they result in bodily injury. One complicated
example is the Stuxnet worm, which was created by the USA and Israel to
interfere with Iran's nuclear program[8].
Although it seriously damaged centrifuges physically, its legality is still up
for discussion because digital sabotage rather than conventional military force
was deployed. This emphasises how difficult it is to modify current legislation
to account for the particularities of cyber operations. Cyberwarfare is
impacted by a number of provisions from important agreements under
International Humanitarian Law (IHL), especially those that deal with
protecting civilians. Parties are required to use the principle of distinction,
which requires them to distinguish between civilians and combatants, as stated
in Article 48 of the Additional Protocol I (1977) to the Geneva Conventions[9].
The same protocol's Article 51[10]
forbids direct assaults on civilians. Attacks on undefended towns, villages, or
buildings are prohibited by Article 25 of the Hague Convention IV (1907)[11],
which also applies to civilian infrastructure in cyberspace. Cyberattacks
directed at water sources or hospitals would go against this accepted jus in
bello guidelines.
Other than International Humanitarian
law, there are numerous other concepts by which Cyberwarfare and International
Law are connected. The area where cyberwarfare and international law collide is
complicated and constantly changing. Traditional legal frameworks, such as the
UN Charter, offer some advice, but there are difficulties because cyber
activities are distinct. Important questions include identifying whether an
attack on a computer system qualifies as a use of force, assigning blame, and
incorporating international humanitarian law into cyber operations. Additional
frameworks for tackling cyber-related issues include human rights law,
regulations from the International Telecommunication Union (ITU), and special
treaties like the Budapest Convention on Cybercrime[12].
The need for precise and functional international legal principles governing
cyberwarfare is growing as technology develops.
3.
Challenges faced in attribution of
cyber attacks
For a
number of reasons, attribution in cyberattacks is a difficult and complex
process. Attackers' identities may be hidden by their anonymity and traceability,
which are frequently made possible by tools like VPNs, proxies, and botnets[13].
Advanced techniques like "false flags,"[14]
in which attackers purposefully mislead investigators, can make attribution
efforts even more difficult. Different legal systems and investigation
practices between nations make it challenging to exchange information and
coordinate efforts, which impedes international collaboration.[15]
It might take a lot of time and resources to analyse digital evidence due to its technological complexity, which calls for specific knowledge and advanced equipment. A climate of doubt can also be created by political objectives, which might persuade governments or state-sponsored groups to refrain from attributing assaults to their enemies.
It might take a lot of time and resources to analyse digital evidence due to its technological complexity, which calls for specific knowledge and advanced equipment. A climate of doubt can also be created by political objectives, which might persuade governments or state-sponsored groups to refrain from attributing assaults to their enemies.
Particularly, when international law
tries to step in, attribution in cyberattacks becomes complex because of the
challenges regarding state responsibilities and sovereignty. For fear of
worsening diplomatic ties or raising tensions, states frequently hesitate to
assign blame for attacks to other states[16].
The efficacy of legislative frameworks intended to combat cyber dangers may be
harmed by this unwillingness to abide by international law. Furthermore, it may
be challenging to establish whether non-state actors or a state is directly
accountable for a cyberattack due to their complexity. These difficulties leave
a legal void that may make it more difficult to prosecute offenders and prevent
such incidents in the future.
The mere fact that a cyberattack or
cyberespionage does not qualify as an act of war does not imply that there is
no legislation against such wrongs in international law. interference with the
territory, airspace, seaspace, or economy of a state, even if not forbidden by UN Charter Article 2(4) is
forbidden by the general non-interventionist stance. This feature is seen in
several UN accords, ICJ rulings and resolutions denouncing coercion, meddling,
or intrusion that stops short of using physical force. Some of this behaviour
has been described by the ICJ as "fewer grave forms" of force that
transgress the non-interventionist principle yet do not
invoking a victim's Article 51 rights[17].
invoking a victim's Article 51 rights[17].
4.
Case Studies
Although
several significant cases provide pertinent insights, the International Court
of Justice (ICJ) has not yet directly decided any cases that are solely
concerned with cyber-attacks. State responsibility and the principle of due
diligence, which can be applied to cyber activities, were established in the
"Corfu Channel Case" (1949)[18].
State responsibility and non-intervention were emphasized in the 1986 case
Nicaragua v. United States[19],
which is relevant to situations involving state-sponsored cyberattacks. The
1996 advisory opinion titled "Legality of the Threat or Use of Nuclear
Weapons"[20] emphasized
the application of proportionality and necessity principles, as well as
international humanitarian law, to cyberattacks that have a significant impact
on civilian infrastructure. In addition, in order to comprehend accountability
in cyber warfare, the "Application of the Convention on the Prevention and
Punishment of the Crime of Genocide" case from 2007 established standards
for state responsibility. The international legal framework for dealing with
cyberattacks is influenced collectively by these cases.
The
intricate relationship between cyberwarfare and international law is brought to
light by recent cyberconflicts. Russian cyberattacks against Ukraine's
infrastructure during the conflict between the two countries (2022–2023)[21]
raised questions about compliance with international humanitarian law,
specifically with regard to proportionality and distinction. Similar
cyberattacks on vital infrastructure occurred during the Israeli Iranian cyber
conflict (2023)[22],
testing the boundaries of state sovereignty in cyberspace and upending the
non-intervention principle. The relevance of economic security in international
law was highlighted in 2022 by a cyberattack on Taiwan's semiconductor sector.
Additionally, debates on the potential applicability of Article 5 of the NATO
Treaty[23]
to cyber operations were spurred by several cyberattacks against NATO military
systems in 2022. These instances show how cyberwarfare is a dynamic field that
is governed by international law.
5.
Conclusion
The legal difficulties posed by cyber
warfare in international law are a reflection of a complex and changing
landscape in which conventional legal frameworks struggle to keep up with
technological advancements. When it comes to attribution, accountability, and
the application of existing legal norms, cyber-attacks are unique,
necessitating a nuanced strategy to guarantee effective regulation and
response.
One of the most significant obstacles
in combating cyberwarfare is still attribution. Cyber operations, in contrast
to conventional attacks, frequently conceal the identity of the perpetrator,
making it more difficult to hold states or actors accountable. Cybercriminals
can operate with relative impunity due to the anonymity and borderlessness of
cyberspace, making it difficult to pinpoint and demonstrate responsibility.
International law and cybersecurity practices must advance simultaneously to
resolve this problem. The accuracy of attribution can be improved through
enhanced collaboration and information sharing among states, organizations from
the private sector, and international organizations. In cyber incidents,
standard procedures for gathering and analyzing evidence can also make it
easier to identify those responsible. In addition, consistent attribution and
accountability can be established through the establishment and implementation
of international norms for cyber operations that are comparable to those for
conventional warfare.
In addition, the current
international legal system must be more stringent and adaptable to cyber
warfare's realities. Even though the Geneva Conventions are fundamental, they
do not fully address the particulars of cyber conflicts. New or revised
international agreements that are specifically tailored to cyber warfare are
urgently needed. The definitions, rules of engagement, and accountability
mechanisms for cyber operations that cause significant harm or disruption ought
to be clearly outlined in these agreements. The legal basis for responding to
and preventing cyberattacks would be strengthened as a result of this.
The protection of civilian entities
and critical infrastructure in cyberspace must also be emphasized in
international law. In order to safeguard civilian life and maintain economic
stability, the legal principles governing cyberattacks must evolve as they
increasingly target infrastructure and essential services. This could entail
developing comprehensive response strategies for states and international
organizations as well as specific international regulations to protect critical
infrastructure from cyber threats.
Furthermore, it is essential to
encourage international dialogue and cooperation. As a global problem that
crosses national boundaries, cyber warfare must be effectively addressed
through collaboration. Common standards and procedures for cyber security,
attribution, and response can be developed with the help of multilateral
agreements and forums. Regular discussions and exercises between nations can
improve preparedness and establish a common understanding of acceptable cyberspace
behavior.
In conclusion, a multifaceted
strategy that includes enhancing global cooperation, strengthening
international legal frameworks, and improving attribution methods is necessary
to address the legal challenges posed by cyber warfare. The international
community will be able to better manage and reduce the risks posed by cyber
warfare if these areas are developed. This will ensure that the legal system
effectively upholds the principles of accountability, security, and justice in
the digital age.
[1] John Arquilla and David Ronfeldt,
Cyberwar is Coming! in Comparative Strategy, Vol. 12, No. 2, Spring 1993, pp.
141–165, 144.
[2] Katharina.kiener-Manu Cybercrime
module 14 key issues: Cyberwarfare, Cybercrime Module 14 Key Issues:
Cyberwarfare. Available at:
https://www.unodc.org/e4j/en/cybercrime/module-14/key-issues/cyberwarfare.html
(Accessed: 15 August 2024).
[3] Article 2(4) of the UN Charter
1945 which states about Prohibition on the threat or use of force
[4] Article 39 of the UN
Charter 1945 which states about Action with respect to threats to the
peace, breaches of the peace, and acts of aggression
[5] Article 51 of the UN Charter
1945 which states about Right of self-defense
[6] Madubuike-Ekwe, J.N. (2021)
‘Cyberattack and the use of force in international law’, Beijing Law Review,
12(02), pp. 631–649. doi:10.4236/blr.2021.122034.
[7] Jus ad bellum and jus in Bello
(2024) International Committee of the Red Cross. Available at:
https://www.icrc.org/en/law-and-policy/jus-ad-bellum-and-jus-bello (Accessed:
17 August 2024).
[8] Kushner, D. (2024) The real
story of stuxnet, IEEE Spectrum. Available at:
https://spectrum.ieee.org/the-real-story-of-stuxnet (Accessed: 18 August 2024).
[9] Article 51 of the Additional
Protocol I (1977) to the Geneva Conventions
[10] Article 48 of the Additional
Protocol I (1977) to the Geneva Conventions
[11] Supra, note 10
[12] Budapest Convention -
Cybercrime - www.coe.int (2024b) Cybercrime. Available at:
https://www.coe.int (Accessed: 17 August 2024).
[13] Sheldon, R. (2024) What is
cyber attribution? Definition from TechTarget, Security. Available
at:
https://www.techtarget.com/searchsecurity/definition/cyber-attribution#:~:text=Challenges%20of%20cyber%20attribution,be%20challenging%20even%20for%20them.
(Accessed: 17 August 2024).
[14] What is a false flag? how
state-based hackers cover their tracks (2020) CSO Online. Available
at:
https://www.csoonline.com/article/568799/what-is-a-false-flag-how-state-based-hackers-cover-their-tracks.html
(Accessed: 17 August 2024).
[15] Supra, note 14
[16] Vis Legis Law Practice, A. (2023) Cybersecurity
challenges in international law, LinkedIn. Available at:
https://www.linkedin.com/pulse/cybersecurity-challenges-international-law-vllp2017-y5uxf/
(Accessed: 17 August 2024).
[17] Cyber Security and
international law. Available at: https://www.chathamhouse.org (Accessed: 17 August 2024).
[18] ICJ Rep 244, ICGJ 201 (ICJ 1949)
[19] 1984] ICJ Rep 392
[20] ICJ Rep 226, ICGJ 205
[21]The role of cyber in the Russian
War against Ukraine.
Available at: https://www.europarl.europa.eu/RegData/etudes/BRIE/2023/702594/EXPO_BRI(2023)702594_EN.pdf
(Accessed: 17 August 2024).
[22]Cyberattacks by Iran, Hezbollah
have tripled during the war, says Israel Cyber czar | The Times of Israel. Available at:
https://www.timesofisrael.com/cyberattacks-by-iran-hezbollah-have-tripled-during-the-war-says-israel-cyber-czar/
(Accessed: 17 August 2024).
[23] Nato (2022) The North Atlantic
Treaty, NATO. Available at: https://www.nato.int/cps/en/natohq/official_texts_17120.htm
(Accessed: 18 August 2024).