6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Julie Ryan and Daniel Ryan<br />
or targeting information. Assuming that military units knew their own locations (not, necessarily, a<br />
reasonable assumption in those days), unit locations may have been reported. In short, information<br />
useful in prosecuting the belligerency, if it could be reduced to textual or numeric form suitable for<br />
transmission across the communications systems in use at that time, could be transmitted without<br />
imposing a burden on the neutral state to recognize or interdict the transmission. Some information<br />
may have been encoded or enciphered, and transmission would have necessarily been slow by<br />
today’s standards, but fast relative to other media and transmission capabilities available at the time<br />
(foot, horseback, railroad, ship). (Lail 2002, p. 4)<br />
Fast forward to the twenty-first century, and the ability to pass useful information across the Internet is<br />
much enhanced. Now not just text and numbers may be communicated, but sound to at least the<br />
level of voice recognition, imagery including high-quality color pictures, and measurement and<br />
telemetry data, such as GPS data, can be communicated quickly and easily across the Internet.<br />
Perhaps more importantly, tools and even weapons themselves, perhaps in the form of malware, can<br />
be moved across the territory of neutrals and belligerents alike using the Internet. Those engaged in<br />
such Internet communications do not and, for the most part cannot, know the path the packets<br />
comprising their communications will take, much less can they control the path. In fact, some of the<br />
packets may take different paths from other packets that are part of the same transmission, all<br />
transparent to and beyond the control of those engaged in the communication.<br />
Historically, warfare has involved the use of kinetic weapons (e.g. projectiles) to kill and destroy.<br />
Modern warfare continues to use kinetic weapons, but may also use energy weapons – lasers, for<br />
example; but note that Protocol IV of the 1980 Convention on Certain Conventional Weapons<br />
specifically outlaws the use of blinding lasers – or may use logic weapons to attack and defend cyberdependent<br />
infrastructures. In a modern warfare, information operations may be used in connection<br />
with kinetic operations (as in the confrontation between Russia and Georgia in 2008), (Tikk 2010, p.<br />
66ff) or can be used without ancillary kinetic operations (as in the confrontation between Russia and<br />
Estonia in 2007). (Tikk 2010, p. 14ff) It is highly probable that we will never again see kinetic<br />
operations of any great extent without a cyber component. Whether information operations among<br />
nation-states without “armed conflict” will be deemed to be warfare probably depends upon the level<br />
of destruction realized. (Article 51 of the United Nations Charter uses the expression “armed attack” to<br />
justify war in self-defense by nation-states. However, the expression is not defined. It is not clear that<br />
it is proper, or desirable, to view a purely cyber incident as an armed attack. See Wingfield 2006, p.<br />
12. See also Sullivan 2010) Information operations among, between or with non-nation-states cannot,<br />
by definition, be war, regardless of the level of destruction attained or the used of uniformed military<br />
personnel by one side or another and despite the common misuse of the term in referring to conflicts<br />
that are not between or among nation-states, as in “the global war on terror” (Rumsfeld Memo 16<br />
October 2003) or the “war on drugs.” (Testimony of OMB Director Nussle)<br />
While belligerents’ use of networks that cross a neutral’s territory can take place without violating the<br />
neutrality status of the nations through whose territory the communications pass, Hague V(8) arguably<br />
did not foresee that that use might include weapons. The rules concerning neutrality require that<br />
passage of weapons or other military materials and equipment across the territory of a neutral must<br />
be interdicted by the neutral state, and if it fails to do so, or is unable to do so, the belligerents against<br />
whom the weapons or materials are to be used have a legal right to attack the transfer. (Brown 2006,<br />
p. 210) Hague V(1) forbids land transfers and Hague V(2) forbids use of the atmosphere. Some<br />
analysts have, therefore, concluded that cyberwar is not permitted under current neutrality law without<br />
a likely violation of the claimed neutrality. (Kelsey2008, pp. 1441-6) They recommend changes to<br />
bring the law into conformance with the reality of Internet transfers. (Kelsey 2008, pp. 1448-9) One<br />
recommendation would focus on intent: the rules of neutrality would not be violated unless the<br />
belligerent intended to use the information infrastructure of the neutral to deliver the weapons. The<br />
neutral would not have to interdict an unintentional passage, and would not be subject to attack by the<br />
other side based on an unintentional crossing of its territory by the cyber weapons. (Kelsey 2008, pp.<br />
1448-9) This approach seems hopeless to us. The neutral probably has no knowledge that weapons<br />
are passing across its territory, could realistically do nothing if it did know, and has even less access<br />
to knowledge of the belligerent’s intent with respect to the crossing.<br />
However, there is an alternative approach to framing the problem and it’s solution. Extra-atmospheric<br />
movements of weapons (other than nuclear weapons) and military materials above the territory of<br />
neutrals is permitted without imposing a duty on the neutral to interdict. The United Nations adopted a<br />
224