27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Julie Ryan and Daniel Ryan<br />

or targeting information. Assuming that military units knew their own locations (not, necessarily, a<br />

reasonable assumption in those days), unit locations may have been reported. In short, information<br />

useful in prosecuting the belligerency, if it could be reduced to textual or numeric form suitable for<br />

transmission across the communications systems in use at that time, could be transmitted without<br />

imposing a burden on the neutral state to recognize or interdict the transmission. Some information<br />

may have been encoded or enciphered, and transmission would have necessarily been slow by<br />

today’s standards, but fast relative to other media and transmission capabilities available at the time<br />

(foot, horseback, railroad, ship). (Lail 2002, p. 4)<br />

Fast forward to the twenty-first century, and the ability to pass useful information across the Internet is<br />

much enhanced. Now not just text and numbers may be communicated, but sound to at least the<br />

level of voice recognition, imagery including high-quality color pictures, and measurement and<br />

telemetry data, such as GPS data, can be communicated quickly and easily across the Internet.<br />

Perhaps more importantly, tools and even weapons themselves, perhaps in the form of malware, can<br />

be moved across the territory of neutrals and belligerents alike using the Internet. Those engaged in<br />

such Internet communications do not and, for the most part cannot, know the path the packets<br />

comprising their communications will take, much less can they control the path. In fact, some of the<br />

packets may take different paths from other packets that are part of the same transmission, all<br />

transparent to and beyond the control of those engaged in the communication.<br />

Historically, warfare has involved the use of kinetic weapons (e.g. projectiles) to kill and destroy.<br />

Modern warfare continues to use kinetic weapons, but may also use energy weapons – lasers, for<br />

example; but note that Protocol IV of the 1980 Convention on Certain Conventional Weapons<br />

specifically outlaws the use of blinding lasers – or may use logic weapons to attack and defend cyberdependent<br />

infrastructures. In a modern warfare, information operations may be used in connection<br />

with kinetic operations (as in the confrontation between Russia and Georgia in 2008), (Tikk 2010, p.<br />

66ff) or can be used without ancillary kinetic operations (as in the confrontation between Russia and<br />

Estonia in 2007). (Tikk 2010, p. 14ff) It is highly probable that we will never again see kinetic<br />

operations of any great extent without a cyber component. Whether information operations among<br />

nation-states without “armed conflict” will be deemed to be warfare probably depends upon the level<br />

of destruction realized. (Article 51 of the United Nations Charter uses the expression “armed attack” to<br />

justify war in self-defense by nation-states. However, the expression is not defined. It is not clear that<br />

it is proper, or desirable, to view a purely cyber incident as an armed attack. See Wingfield 2006, p.<br />

12. See also Sullivan 2010) Information operations among, between or with non-nation-states cannot,<br />

by definition, be war, regardless of the level of destruction attained or the used of uniformed military<br />

personnel by one side or another and despite the common misuse of the term in referring to conflicts<br />

that are not between or among nation-states, as in “the global war on terror” (Rumsfeld Memo 16<br />

October 2003) or the “war on drugs.” (Testimony of OMB Director Nussle)<br />

While belligerents’ use of networks that cross a neutral’s territory can take place without violating the<br />

neutrality status of the nations through whose territory the communications pass, Hague V(8) arguably<br />

did not foresee that that use might include weapons. The rules concerning neutrality require that<br />

passage of weapons or other military materials and equipment across the territory of a neutral must<br />

be interdicted by the neutral state, and if it fails to do so, or is unable to do so, the belligerents against<br />

whom the weapons or materials are to be used have a legal right to attack the transfer. (Brown 2006,<br />

p. 210) Hague V(1) forbids land transfers and Hague V(2) forbids use of the atmosphere. Some<br />

analysts have, therefore, concluded that cyberwar is not permitted under current neutrality law without<br />

a likely violation of the claimed neutrality. (Kelsey2008, pp. 1441-6) They recommend changes to<br />

bring the law into conformance with the reality of Internet transfers. (Kelsey 2008, pp. 1448-9) One<br />

recommendation would focus on intent: the rules of neutrality would not be violated unless the<br />

belligerent intended to use the information infrastructure of the neutral to deliver the weapons. The<br />

neutral would not have to interdict an unintentional passage, and would not be subject to attack by the<br />

other side based on an unintentional crossing of its territory by the cyber weapons. (Kelsey 2008, pp.<br />

1448-9) This approach seems hopeless to us. The neutral probably has no knowledge that weapons<br />

are passing across its territory, could realistically do nothing if it did know, and has even less access<br />

to knowledge of the belligerent’s intent with respect to the crossing.<br />

However, there is an alternative approach to framing the problem and it’s solution. Extra-atmospheric<br />

movements of weapons (other than nuclear weapons) and military materials above the territory of<br />

neutrals is permitted without imposing a duty on the neutral to interdict. The United Nations adopted a<br />

224

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!