Open Access Research Article

CYBER WARFARE: CASUALTIES AND HUMANITARIAN LAW

Author(s):
ARAVIND GUNA SEKHARAN
Journal IJLRA
ISSN 2582-6433
Published 2023/04/26
Access Open Access
Volume 2
Issue 7

Published Paper

PDF Preview

Article Details

CYBER WARFARE: CASUALTIES AND HUMANITARIAN LAW
AUTHORED BY - ARAVIND GUNA SEKHARAN
 

 

Abstract:

Cyber warfare is a form of conflict that presents unique challenges and impacts on humanitarian law. Recent events have demonstrated the devastating impact of cyber-attacks on critical infrastructure and civilian targets. This research paper aims to examine the impact of cyber warfare on casualties and humanitarian law, with a focus on recent events. It will analyze the use of cyber weapons, the potential casualties resulting from such attacks, and the legal frameworks that govern such conflicts. Additionally, it will highlight the ethical and legal challenges posed by cyber warfare and offer recommendations for addressing these challenges. The expansion of cyberattacks due to technological innovation has rendered States, society, and individuals totally dependent on computers, computer systems, and the internet. The cost-effectiveness, simplicity, and safety of cyber-attackers have considerably increased cyberattacks on a global scale. The increased usage of computers in several locations, including numerous hazardous and crucial infrastructure like nuclear power plants, water dams, electric power networks, hospitals, and oil and gas stations, has placed humans in constant risk from cyberattacks. In this context, certain significant questions remain unresolved, including the identity of the attackers and the applicability of international humanitarian law to cyber-attacks.
 
Key words: Cyber-attack, cyber warfare, international humanitarian law, armed conflict, technological advancement.

Introduction:

Cyber warfare refers to the use of technology to carry out military operations in the cyberspace domain. Cyber warfare is a relatively new phenomenon that has emerged due to the rapid advancement of technology and the increasing reliance on technology in all aspects of modern society. Cyber warfare can be used to disrupt communications, damage infrastructure, steal sensitive information, and launch attacks on critical systems.
 
As the use of cyber warfare continues to grow, it raises important questions about the impact of cyber warfare on civilian populations and the applicability of humanitarian law to cyber warfare[1]. The rapid development of technology and increasing reliance on cyberspace have led to the emergence of a new form of conflict – cyber warfare. Recent events, such as the SolarWinds hack and the ransomware attack on Colonial Pipeline, have demonstrated the devastating impact of cyber-attacks on critical infrastructure and civilian targets. Cyber warfare can result in casualties and harm to civilians, which presents a significant challenge to humanitarian law.
 
With the development of new technologies the importance of the cyber space,1 the virtual domain, is increasing rapidly day by day. States, societies and even individuals have become increasingly dependent on computers and internets. Our daily life, fundamental life, social interactions and economics depend on information and communication technology working seamlessly. It has broken down the boundaries between States, communities and citizens, allowing interaction and sharing of information and ideas across the globe. Now a modern State cannot run even for a single day without using the cyber-space as all the functions of a State are dependent on computer, computer technology, information, Information technology, internet and so on.
 
The objective of this research paper is to examine the impact of cyber warfare on casualties and humanitarian law, with a focus on recent events. It will analyze the use of cyber weapons, the potential casualties resulting from such attacks, and the legal frameworks that govern such conflicts. Additionally, it will highlight the ethical and legal challenges posed by cyber warfare and offer recommendations for addressing these challenges.
 

The Emergence of Cyber Warfare

The emergence of cyber warfare can be traced back to the early days of the internet, when the first computer networks were created. As computer networks became more interconnected and more sophisticated, the potential for using these networks for military purposes became increasingly clear.
 
The first known example of cyber warfare occurred in 1982, when the CIA allegedly used a computer virus to sabotage the software controlling a Soviet gas pipeline. This attack reportedly caused the pipeline to explode, resulting in significant damage and loss of life.
In the years that followed, a number of other cyber-attacks were carried out by various governments and organizations. However, it wasn't until the late 1990s and early 2000s that cyber warfare began to emerge as a major concern for governments around the world.
 
The emergence of cyber warfare[2] as a major concern can be attributed to several factors. First, the rapid growth of the internet and computer networks made it easier for hackers and other malicious actors to carry out attacks on critical infrastructure and systems.
 
Second, the increasing reliance on technology[3] in all aspects of modern society made it clear that cyber-attacks could have significant economic and social consequences. For example, an attack on a power grid could cause widespread power outages, leading to significant economic damage and social unrest.
 
The increasing militarization of cyberspace by various governments around the world has also contributed to the emergence of cyber warfare as a major concern. As governments have developed their cyber capabilities, the potential for using these capabilities for military purposes has become increasingly clear.
 
Today, cyber warfare is considered to be a major threat to national security for many countries around the world. Governments are investing significant resources into developing their cyber capabilities and defending against cyber-attacks, and the potential for cyber warfare to cause significant damage and loss of life is a growing concern.
 

Cyber Warfare and its Impact on Civilian Populations

One of the primary concerns with cyber warfare is its potential impact on civilian populations. Cyber-attacks can cause significant disruptions to critical infrastructure, including power grids, transportation systems, and communication networks. These disruptions can lead to loss of life, economic damage, and social unrest.
 
Cyber warfare can have a significant impact on civilian populations, both directly and indirectly. Direct impact can occur when critical infrastructure, such as power grids or transportation systems, are targeted in a cyber attack, resulting in disruptions to essential services and potential harm to individuals.
 
For example, in December 2015, a cyber attack on the Ukrainian power grid caused widespread power outages, leaving more than 200,000 people without electricity. This attack had a direct impact on the civilian population, as individuals were left without access to heating, lighting, and other essential services.
 
Indirect impact can occur when cyber attacks target businesses or organizations that provide essential goods and services, such as hospitals or food suppliers. These attacks can disrupt supply chains and cause shortages, which can have a ripple effect on the wider population.
 
In addition, cyber attacks can also impact the privacy and security of individuals, as personal data may be compromised in a breach. This can lead to identity theft and other forms of financial fraud, which can have a significant impact on individuals and their families.
Children are also vulnerable to the impact of cyber warfare. Schools and other educational institutions have increasingly relied on technology to deliver educational services, and cyber attacks on these systems can disrupt access to education, potentially affecting the long-term well-being of children.
 
The impact of cyber warfare on civilian populations underscores the need for states and organizations to take steps to protect critical infrastructure and to ensure that the use of technology in military operations is consistent with international humanitarian law. By working together to mitigate the impact of cyber warfare on civilians, we can help to ensure that the fundamental rights and needs of individuals and communities are protected.
 

Understanding Cyber Weapons and Tactics

Cyber weapons and tactics are an increasingly important aspect of modern warfare and national security. As our reliance on technology continues to grow, the potential impact of cyber attacks on critical infrastructure, government systems, and individual privacy and security has become a major concern for governments, organizations, and individuals around the world.
 
Cyber weapons and tactics are constantly evolving, with attackers using increasingly sophisticated techniques to bypass security measures and gain unauthorized access to systems and data. This has led to a growing need for governments, organizations, and individuals to invest in cybersecurity measures, such as firewalls, intrusion detection systems, and encryption technologies, to protect against cyber attacks.
 
At the same time, there are concerns about the potential impact of cyber weapons and tactics on civilian populations, particularly in the context of international humanitarian law. As we have seen in recent years, cyber attacks can have a direct impact on the safety and well-being of civilians, particularly when critical infrastructure is targeted.
 
In addition to the direct impact on civilians, there is also a risk that cyber weapons and tactics could escalate into more traditional forms of warfare, particularly if attacks are launched by state actors. This could lead to a dangerous and unpredictable situation, with the potential for widespread destruction and loss of life.
 
Overall, the emergence of cyber weapons and tactics as a major component of modern warfare and national security underscores the need for governments, organizations, and individuals to take cybersecurity seriously and to work together to develop effective strategies and defences against cyber attacks. By doing so, we can help to mitigate the impact of cyber warfare on civilians and protect the fundamental rights and needs of individuals and communities around the world.
 

The Consequences of Cyber Warfare: Humanitarian Perspectives

The consequences of cyber warfare from a humanitarian law perspective are significant and far-reaching. Cyber attacks have the potential to cause harm to individuals and communities, both directly and indirectly, and can have a significant impact on the safety, security, and well-being of civilians.
 
One of the main concerns with cyber warfare is that it can be difficult to attribute attacks to a specific actor, particularly if they are carried out by non-state actors or if the attack is designed to be covert. This can make it difficult to hold those responsible for the attack accountable, which can in turn undermine the rule of law and exacerbate the impact on civilians.
 
In addition to the challenges of attribution, cyber attacks can also have a significant impact on critical infrastructure, such as power grids, transportation systems, and water treatment plants. These attacks can disrupt essential services and put the safety and well-being of civilians at risk, particularly if the attack is carried out during a time of crisis, such as a natural disaster or public health emergency.
 
Furthermore, cyber attacks can also be used to target individuals and communities directly, through tactics such as identity theft, blackmail, and harassment. These attacks can have a significant impact on the mental and emotional well-being of individuals, as well as their financial stability and personal safety.
 
In the context of humanitarian law, the use of cyber weapons and tactics must be evaluated in light of the principles of proportionality and distinction. This means that any attack must be proportional to the military objective and must distinguish between military targets and civilians and civilian objects. Attacks that violate these principles can be considered war crimes, and those responsible can be held accountable under international law.
 
Overall, the consequences of cyber warfare from a humanitarian law perspective are significant and require careful consideration and attention from governments, organizations, and individuals around the world. By working together to develop effective strategies and defenses against cyber attacks, we can help to minimize the impact on civilians and protect the fundamental rights and needs of individuals and communities.
 
The emergence of cyber warfare as a new form of warfare in the modern era has raised important questions about the application of humanitarian law. Humanitarian law, also known as the law of armed conflict or international humanitarian law (IHL), is a set of rules that regulates the conduct of armed conflicts, including traditional warfare. However, the unique characteristics of cyber warfare pose challenges in determining how IHL applies in this context.
 
Cyber warfare involves the use of computer-based techniques to disrupt, damage, or destroy the information systems of an adversary. This can include targeting critical infrastructure, such as power grids, communication networks, and financial systems, or disrupting military command and control systems. Unlike traditional warfare, cyber warfare does not typically involve physical violence or the use of conventional weapons. Instead, it relies on the exploitation of vulnerabilities in computer systems to gain unauthorized access, steal information, or disrupt operations.
 
One of the main challenges in applying IHL to cyber warfare is determining when a cyber operation rises to the level of an armed conflict. IHL applies to armed conflicts, which are typically characterized by the use of force between states or non-state armed groups.
However, determining when a cyber operation constitutes an armed conflict can be complex. The traditional requirement of "armed force" or "use of force" may not be easily applicable to cyber operations, as they do not always involve physical violence.
 
Another challenge is identifying the targets in cyber warfare. IHL distinguishes between civilian objects and military objectives, and only military objectives can be lawfully targeted. However, in cyber warfare, the lines between civilian and military objects can be blurred, as cyber operations can target both civilian infrastructure and military systems. Additionally, cyber operations can have indirect and cascading effects, impacting civilian populations and causing harm beyond the immediate target.
 
Proportionality is another principle of IHL that poses challenges in the context of cyber warfare. Proportionality requires that the anticipated harm to civilians or civilian objects caused by an attack must not be excessive in relation to the anticipated military advantage. However, determining the proportionality of a cyber operation can be difficult, as the effects of cyber operations can be unpredictable and extend beyond the initial attack. Moreover, attribution, or identifying the responsible state or non-state actor behind a cyber operation, can be challenging in cyber warfare. Cyber operations can be conducted from remote locations, using sophisticated techniques to conceal the identity of the attacker. This can make it difficult to hold parties accountable for violations of IHL or to determine the appropriate response to a cyber attack[4].
 
 

Legal Frameworks for Cyber Warfare

The legal frameworks for cyber warfare are still developing, but there are several existing international agreements and principles that can help guide the use of cyber weapons and tactics in a manner that is consistent with international law.
 
One of the key frameworks for cyber warfare is the United Nations Charter, which prohibits the use of force against other states except in cases of self-defense or with the authorization of the United Nations Security Council. This framework helps to establish a clear legal basis for the use of cyber weapons and tactics in the context of armed conflict, and emphasizes the importance of avoiding the use of force except as a last resort.
 
In addition to the UN Charter, there are several other international agreements and principles that can help guide the use of cyber weapons and tactics, including the Tallinn Manual on the International Law Applicable to Cyber Warfare and the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security.
 
These agreements and principles emphasize the importance of distinguishing between military targets and civilian objects, minimizing harm to civilians and civilian infrastructure, and avoiding attacks that could cause disproportionate harm or that violate the principles of necessity and proportionality.
 
At the national level[5], many countries have developed their own legal frameworks for cyber warfare, including laws and regulations governing the use of cyber weapons and tactics, as well as procedures for conducting cyber operations and responding to cyber attacks.
 
India has been taking steps towards developing legal frameworks for cyber warfare. The country has recognized the growing importance of cybersecurity and the need to establish clear guidelines for the use of cyber weapons and tactics in the context of armed conflict.
 
At the national level, India has implemented several laws and regulations related to cyber security and cyber warfare. The Information Technology Act of 2000 provides a legal framework for the protection of electronic data and computer systems, and includes provisions related to cyber attacks and cyber terrorism.
 
In addition, the Indian Armed Forces have developed their own guidelines and procedures for the use of cyber weapons and tactics in the context of military operations. These guidelines emphasize the importance of following international law and ethical principles, and include provisions related to the protection of civilian infrastructure and the avoidance of attacks that could cause disproportionate harm.
 
Overall, India has recognized the importance of establishing clear legal frameworks for cyber warfare and has taken steps to develop both international and national agreements and guidelines. By continuing to prioritize cybersecurity and the development of effective legal frameworks for cyber warfare, India can help to ensure the safety and security of its citizens and contribute to stability and peace in the international community.
 
The legal frameworks for cyber warfare are still evolving, but there are several existing international agreements and principles that can help guide the use of cyber weapons and tactics in a manner that is consistent with international law. By working together to develop effective legal frameworks and guidelines for the use of cyber weapons and tactics, we can help to ensure that these tools are used in a manner that promotes peace, security, and stability in the international community.

Ethical and Legal Challenges

Cyber warfare, which refers to the use of technology and computer systems to conduct offensive and defensive operations in the virtual domain, presents a number of ethical and legal challenges[6]. When cyber warfare is conducted in the context of armed conflict, it is subject to the principles of international humanitarian law (IHL), also known as the law of armed conflict. Here are some of the ethical and legal challenges associated with cyber warfare and humanitarian law:
 
1.      Attribution: One of the challenges in cyber warfare is the difficulty of attributing cyber attacks to specific actors. Unlike traditional warfare where military forces wear uniforms and carry identifiable insignia, cyber attackers can hide their identities behind layers of obfuscation and anonymity. This makes it challenging to determine who is responsible for a cyber attack, which in turn affects the ability to hold individuals or states accountable for their actions.
 
2.      Proportionality and collateral damage: IHL requires that the use of force in armed conflict be proportionate to the military objective and that civilians and civilian objects be spared from attack as much as possible. In the context of cyber warfare, it can be difficult to determine the proportionality of a cyber attack, as the effects may not be immediately evident and could have unintended consequences. Moreover, the use of cyber weapons can result in collateral damage, including harm to civilian infrastructure and disruption of essential services, such as power grids or healthcare systems.
 
3.      Dual-use technology: Cyber warfare often involves the use of dual-use technology, which has both civilian and military applications. This raises ethical concerns about the potential misuse of civilian technology for military purposes and the blurring of lines between civilian and military targets in cyberspace. It also poses challenges in determining what constitutes a legitimate target in cyber warfare and how to distinguish between civilian and military objects in the virtual domain.
 

4.      Cybersecurity of civilian infrastructure: Cyber attacks on civilian infrastructure, such as power grids, water treatment plants, and hospitals, can have severe humanitarian consequences, including loss of life and disruption of essential services. IHL requires that civilian infrastructure be spared from attack as much as possible. However, the increasing reliance on technology and interconnectedness of critical infrastructure systems make them vulnerable to cyber attacks, posing ethical and legal challenges in ensuring their cybersecurity and protecting civilian populations during armed conflicts.
 
5.      Norms and rules of cyber warfare: Unlike traditional warfare, which has well-established norms and rules under IHL, cyber warfare is a relatively new domain with evolving norms and rules. There is ongoing debate and disagreement among states, international organizations, and experts about what constitutes acceptable behavior in cyberspace during armed conflicts, including issues such as the use of cyber espionage, cyber attacks on non- state actors, and the role of private actors in cyber warfare. This lack of consensus on norms and rules complicates efforts to regulate cyber warfare and ensure compliance with humanitarian law.
 
6.      Legal frameworks and jurisdiction: There is a lack of clear legal frameworks and jurisdictional challenges in cyber warfare. International law, including IHL, applies to cyber warfare, but there are questions about how existing legal principles can be effectively applied to cyberspace. Additionally, there are challenges in determining jurisdiction and responsibility for cyber attacks that may originate from one country but have effects in multiple countries. This can hinder efforts to hold states or individuals accountable for their actions in cyberspace.
 
7.      Cybersecurity of military operations: Cyber attacks can target military operations, including command and control systems, intelligence gathering, and weapon systems. Ensuring the cybersecurity of military operations and protecting military personnel from cyber threats is crucial in the conduct of cyber warfare. However, the rapidly changing nature of cyber threats, the vulnerabilities of military systems[7], and the potential for cyber-attacks to disrupt military operations pose significant ethical and legal challenges.

Conclusion

In conclusion, recent events have highlighted the devastating impact of cyber-attacks on critical infrastructure and civilian targets. Cyber warfare presents a significant challenge to humanitarian law, and its impact on civilians and infrastructure cannot be ignored. The use of cyber weapons has the potential to cause physical and psychological harm, and existing legal frameworks are inadequate to address this challenge. To address these challenges, new legal norms and ethical standards must be developed, and international cooperation is necessary.
 
By working together, we can ensure that the use of technology in conflicts is governed by principles of humanity, legality, and proportionality.


[1] Chang, Z. (2017) Cyberwarfare and international humanitarian law, SSRN. Available at: https://deliverypdf.ssrn.com/delivery.php?ID=915114116100107115092005024077029 0660570780530460120821121150700101250880070251250861210570010340180190
9611306807002212209011201008606905901710209912201606708910511300809305
2094097022071093003126108127071113004112018023119112104069127076103098
101090009&EXT=pdf&INDEX=TRUE.
[2] MIT CAMS | Cybersecurity at MIT Sloan (no date). Available at: https://cams.mit.edu/wp- content/uploads/2017-10.pdf .
[3] Chang, Z. (2017) Cyberwarfare and international humanitarian law, SSRN. Available at: https://deliverypdf.ssrn.com/delivery.php?ID=915114116100107115092005024077029 0660570780530460120821121150700101250880070251250861210570010340180190
9611306807002212209011201008606905901710209912201606708910511300809305
2094097022071093003126108127071113004112018023119112104069127076103098
101090009&EXT=pdf&INDEX=TRUE (Accessed: April 25, 2023).
[4] Cyber Warfare and international humanitarian law : A study - researchgate (no date).
Available at: https://www.researchgate.net/publication/335365277_Cyber_Warfare_and_Internationa l_Humanitarian_Law_A_Study (Accessed: April 25, 2023).
[5] Cyber Warfare and international humanitarian law : A study - researchgate (no date). Available at: https://www.researchgate.net/publication/335365277_Cyber_Warfare_and_Internationa l_Humanitarian_Law_A_Study (Accessed: April 25, 2023).
 
[6] Cyber Warfare and international humanitarian law : A study - researchgate (no date).
Available at: https://www.researchgate.net/publication/335365277_Cyber_Warfare_and_Internationa l_Humanitarian_Law_A_Study (Accessed: April 25, 2023).
[7] MIT CAMS | Cybersecurity at MIT Sloan (no date). Available at: https://cams.mit.edu/wp- content/uploads/2017-10.pdf (Accessed: April 25, 2023).

Article Information

CYBER WARFARE: CASUALTIES AND HUMANITARIAN LAW

Authors: ARAVIND GUNA SEKHARAN

  • Journal IJLRA
  • ISSN 2582-6433
  • Published 2023/04/26
  • Volume 2
  • Issue 7

About Journal

International Journal for Legal Research and Analysis

  • Abbreviation IJLRA
  • ISSN 2582-6433
  • Access Open Access
  • License CC 4.0

All research articles published in International Journal for Legal Research and Analysis are open access and available to read, download and share, subject to proper citation of the original work.

Creative Commons

Disclaimer: The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of International Journal for Legal Research and Analysis.