27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Cyber Strategy and the Law of Armed Conflict<br />

Ulf Haeussler<br />

National Defense University, Washington, USA<br />

ulf.haeussler@ndu.edu<br />

Abstract: At the time of writing, the author was Assistant Legal Advisor Operational Law, Headquarters,<br />

Supreme Allied Commander Transformation (NATO HQ SACT). The views expressed herein are the author's<br />

own and to not necessarily reflect the official position or policy of NATO and/or HQ SACT. Abstract: At its Lisbon<br />

Summit (November 2010), NATO has adopted its Strategic Concept. The U.S. may soon adopt its Cyberstrategy<br />

3.0 (originally expected for December 2010). Both strategy documents will contribute to a growing policy<br />

consensus regarding cyber security and defence as well as provide better policy insights regarding cyber offence.<br />

In doing so, they will contribute to a better understanding of how NATO and the U.S. want to prepare for, and<br />

conduct cyber warfare in a manner congruent with the law of armed conflict. In addition, they will determine to<br />

what extent this branch of the law needs to be better understood, developed, or reformed. Accordingly, this paper<br />

indicates how the existing legal and policy frameworks intersect with practical aspects of cyber warfare and<br />

associated intelligence activities, analyses how the new strategy documents develop and change the existing<br />

policy framework, and what repercussions this may have for the interpretation and application of the law of armed<br />

conflict. It also demonstrates how the new strategy documents inform the policy and legal discourse and hence<br />

help confirm that NATO and U.S. as well as other NATO Nations' cyber activities are, and will continue to be,<br />

lawful and legitimate.<br />

Keywords: NATO Strategic Concept 2010, U.S. Cyberstrategy 3.0, Law of Armed Conflict, collective security,<br />

collective defence<br />

1. Introduction<br />

Cyberspace is increasingly referred to as one of the global commons and as the fifth domain in which<br />

warfare may occur (Lynn 2010, 101). Activities in cyberspace as well as involving the use of cyber<br />

capabilities to create, or contribute to the creation of, effects in any one of the other commons, or<br />

domains, have attracted significant discussion and analysis among technical experts, policymakers,<br />

and legal scholars. The ensuing efforts to develop frameworks for cyberspace and the use of<br />

associated capabilities (hereinafter collectively referred to as 'cyberspace') bring various perspectives<br />

to bear. Cyberspace is multifunctional; it equally attracts private activities (with a strong business<br />

component) and governments' official conduct as well as associated competing, if not conflicting,<br />

interests. Not surprisingly, cyberspace has its unarguable dark side – on both its non-governmental<br />

and its governmental end. The range of challenges and threats associated with the dark side of<br />

cyberspace comprises, but is not limited to, privacy intrusions, financial loss, damage and destruction<br />

in the physical domains, the potential of injury or even death, and (other) adverse effects on the<br />

effectiveness of government. These challenges and threats reflects the large extent to which<br />

computers and other information and communication technology devices can be leveraged as<br />

weapons by non-governmental actors. Further challenges may arise out of policy positions adopted<br />

by some non-governmental actors. For instance, the so-called 'internet pirates' endorse the notion of<br />

a cyberspace beyond any government control whatsoever – a desire which, were it to come true,<br />

might exacerbate all other challenges and threats referred to above.<br />

Attempts to characterise cyber challenges and threats have usually used references to challenges<br />

and threats in the physical domains, to which the word 'cyber' is added as a qualifier, enabling the<br />

creation of catchwords such as cyber crime, cyber terrorism, and cyber attack. The terminology<br />

developed using this method is attractive because it triggers analogies with known phenomena.<br />

However, it is also prone to carrying misleading connotations since such analogies may easily fuel<br />

misconceptions. For instance, the terms 'cyber crime' and 'cyber terrorism' do not capture the whole<br />

range of non-governmental actors' malicious activities; moreover, they do not even attempt to address<br />

possible links between non-governmental actors and their potential governmental sponsors. By<br />

contrast, the term 'cyber attack' is too broad. Thus, information gathering activities may be referred to<br />

as cyber attacks, though they might not necessarily or directly cause tangible damage. The<br />

undifferentiated use of the notion of 'attack' may foster arguments by which a nation's inherent right of<br />

self-defence is considered relevant to cyber activities or actions which neither has nor causes<br />

potential or actual adverse effects. These examples may be indicative of a gap between technological<br />

realities and the terminology used in policymaking as well as legal interpretation.<br />

99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!