08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

originating from country X, law enforcement agencies in the US must first<br />

write a note to the US State Department that in turn must deliver the request to<br />

the embassy of the country concerned in order to receive permission to conduct<br />

the investigation beyond US borders. Perhaps the creation of an international<br />

cyber circuit court could shorten the process, but the eventually of this<br />

development ever occurring is remote. On the other hand, if the requested<br />

nation is unable or unwilling to prevent another attack, then the doctrine of selfdefense<br />

permits the injured nation to act in self-defense inside the territory of<br />

another nation. However, the immediate danger presented to a nation, and to<br />

what degree the sanctuary government is likely to object, and how the world<br />

community is likely to respond, may play decisive roles in the action taken by<br />

the government. 554 While it may be possible for a government or key civilian<br />

infrastructure system to specify itself as vital to national security, attacks are<br />

also greatly influenced by the fact that this type of activity using public<br />

communications networks as an attack means is not a violation of a nation’s<br />

sovereignty. 555<br />

What this means is that if nations decide not to negotiate a treaty that<br />

addresses computer attacks, then international law will develop through a trial<br />

and error routine based on the actions nations take as events unfold. There are<br />

great implications for both national and international security systems under<br />

such conditions.<br />

Legal Challenges Presented by Information Operations<br />

Clearly the characteristics of a computer attack complicate the<br />

application of traditional national and international law. Laws were originally<br />

developed in response to more traditional crimes and uses of force, such as<br />

those conducted by criminals or terrorists in peacetime, or by troops, aircraft,<br />

and kinetic weapons in wartime. 556 Computer attacks make it very difficult to<br />

ascertain combatants from noncombatants, especially since most criminal or<br />

terrorist activity occurs during peacetime. In time of war, civilians making<br />

direct contributions to the war effort may be attacked, along with objects whose<br />

damage or destruction would produce a significant military advantage based on<br />

location and purpose. 557 In peacetime, criminals and terrorists may still be<br />

attacked under certain circumstances and according to the following logic. An<br />

information weapon is an indiscriminate weapon since its consequences are<br />

unknown. International law bans the use of indiscriminate weapons, but this<br />

law, written before the advent of the computer, focused on bacteriological<br />

554 Ibid., p. 56.<br />

555 Ibid.<br />

556 Ibid., p. 36.<br />

557 Ibid., p. 37.<br />

333

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!