SlideShare une entreprise Scribd logo
1  sur  16
Application of IHL to
Computer Network Attacks
KOSTIANTYN IAKOVLIEV
(UKRAINE)
Yerevan State University
Center for European Studies
MA in Human Rights & Democratization
•
•
•
•
•
•
•
•
•
•

OUTLINE
Definitions
Can International Humanitarian Law apply to
Computer Network Attacks (CNAs)?
Main issues when applying International
Humanitarian Law to CNAS
Principle of distinction
Attacks only against military objects
The prohibition of indiscriminate attacks
Combatant status
Recent examples of using CNAs
in warfare
Our suggestions for creating an international
treaty on CNAs
Sources
Definitions:

•

•

Kinetic (usual) attacks are used to destroy the
opponent's infrastructure through traditional
means of warfare.

Computer network attacks (CNAs) are
used to disrupt or destroy information within the
opponent's computer networks themselves but
can also lead to results similar to those achieved
by kinetic attacks.
Can International Humanitarian Law
apply to Computer Network Attacks
(CNAs)?

•
•

•

Core provisions: 1977 Additional Protocols I and II to
the Geneva Conventions and customary international
law.
Martens Clause: whenever a situation is not covered by
an international agreement, “civilians and combatants
remain under the protection and authority of the principles
of international law derived from established custom, from
the principles of humanity, and from the dictates of public
conscience".
Article 38 of the Statute of the International Court of
Justice also demonstrates the fallacy of any contention
of inapplicability based on the absence of specific lex
Main issues when applying
International Humanitarian Law to
CNAs

•

•
•
•

the principle of
distinction;
attacks only against
military objectives;
the prohibition of
indiscriminate
attacks;
combatant status
Principle of distinction

•

General rule of IHL
In order to ensure respect for and
protection of the civilian population
and civilian objects, the Parties to a
conflict are required at all times to
distinguish between the civilian
population and combatants and
between civilian objects and military
objectives and accordingly must direct
their operations only against military
objectives (Art. 48 AP I)
Specificity of this rule in case of
CNAs
It is unclear whether hackers are part
of armed forces or not.

•
•

Military objects

General rule of IHL
AP I (Art. 52) comprises two conditions that
must be simultaneously met for an military
object: first, it must make an effective
contribution to the military action of the
adversary and secondly, in the
circumstances ruling at the time, its attack
must offer a definite military advantage to
the attacker.
Specificity of this rule in case of CNAs
Either network being affected must meet the
two conditions above or the object that the
network is controlling.
A network attacked may also be necessary
for the survival of the civilian population
(like dams, dykes, nuclear electrical
generating stations)

•
Indiscriminate attacks
•

General rule of IHL
The prohibition of indiscriminate attacks is defined in Article 51(4) of AP
l as one which is either not carefully aimed at a specific military
objective (through carelessness or use of weapons that are by
nature not capable of being so directed) or because the effects of an
attack on a military objective are uncontrollable and unpredictable.

•

Specificity of this rule in case of CNAs
Civilian and military computer networks are in practice highly
interconnected, and thus CNAs not always man be aimed accurately
at the intended target without creating a host of unforeseen and
unforeseeable effects at the same time.
Combatant status
•

General rule of IHL
The Geneva Conventions present rules for protecting civilians and those
hors de combat, such as soldiers that have been wounded or are sick
and unable to fight. These Conventions also spell out specific
guidelines for protecting those hors de combat in land, naval, and air
warfare.
Specificity of this rule in case of CNAs
If incorporated into the armed forces, personnel associated with CNAs
has all the rights and liabilities of combatants: they can be attacked
like any other combatant and should endeavour to be in uniform if
captured in order to be entitled to POW status, but the situation of
technicians that act for the army but are not incorporated into it is more
problematic as they may be considered civilians who would have no
POW status if captured and could be prosecuted for the mere fact of
taking part in the hostilities (their conduct does not seem to be
comparable to the situation of civilians described in Art. 4 (4) of
Geneva Convention III of 1949, which are entitled to POW status) and
would also be subject to attack.

•
Recent examples of using CNAs
in warfare

•

•

Recently, the United States has
created new bodies within their
government organization to deal
specifically with CNAs that may
pose a threat to national security in
addition to existing mechanisms of
defense against kinetic attacks.
China’s Cyber Warfare Doctrine
considers operations against
computer networks fundamental to
the country's military and national
development strategy
Recent examples of using CNAs
in warfare continued

•

•
•

In 2009, a cyber attack called GhostNet that targeted
foreign embassies, government agencies and offices
used by the Dalai Lama, was traced to IP-addresses on
an island in the South China Sea where the People's
Liberation Army has an intelligence base.
In January 2010, Google Inc. said it had been hit by an
attack originating in China, and said the cyber-spies had
sought to steal emails from Chinese government critics.
In 2011, the U. S. government accused military and
intelligence services of Russia and China of conducting
a sustained campaign to steal American commercial
and military secrets through cyber espionage
Our suggestions for creating an
international treaty on CNAs

•
•
•
•

Defining CNAs that can trigger application of
IHL
Establishing rules for CNAs to be used in
disputed situations (e. g., interconnected
networks that are both military objectives and
necessary for survival of population)
Outlining combatant status of personnel
responsible for CNAs
Reaffirming the need to discriminate between
civilian population and military personnel
Sources:
Dilanian, K. (2011, August 12). Russia and China accused of cyber-spying campaign to steal U.S.
secrets. Los Angeles Times. Retrieved from http://articles.latimes.com/2011/aug/12/business/la-ficyber-china-20110813
Dörmann, K. (2001, May 19). Computer network attack and international humanitarian law. ICRC
Resource Centre. Retrieved November 22, 2012, from
http://www.icrc.org/eng/resources/documents/misc/5p2alj.htm
Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2011). The
Law Of Cyber Attack. California Law Review, 2012, 76.
Lewis, A. (2010, April 25). A Note on the Laws of War in Cyberspace. Center for Strategic and
International Studies. Retrieved December 16, 2012, from http://csis.org/publication/note-lawswar-cyberspace
Schmitt, M. N. (2002). Wired warfare: Computer network attack and jus in bello. International Review
of the Red Cross, 84(846), 365–399. doi:10.1017/S1560775500097741
Watts, S. (2010). Combatant Status and Computer Network Attacks. Virginia Journal of International
Law, 50(2), 391–447.
Wolf, J. (2012, March 8). China cyber capability endangers U.S. forces: report. Reuters. Washington.
Retrieved from http://www.reuters.com/article/2012/03/08/us-china-usa-cyberwaridUSBRE82712820120308
created with the help of Zotero 3.0.11 for Firefox
first presented on

5th Yerevan
International
Conference on
International
Humanitarian Law

https://www.facebook.com/groups/218931458229648/

Russian - Armenian
(Slavonic) University,
November 22-24, 2012
Conference Topic:
The means and
methods of warfare in
contemporary armed
conflicts: IHL
perspectives
Section:
Cyber warfare and
IHL

https://www.facebook.com/groups/218931458229648/

Chairperson:
Sergey Sayapin,
ICRC, Legal Adviser
Thank you for attention!
Kostiantyn Iakovliev
(Ukraine)
MA in Human Rights and
Democratization,
Yerevan State University,
2012
https://plus.google.com/u/0/
+KostiantynIakovliev/
https://www.linkedin.com/in/
iakovliev

Contenu connexe

Tendances

Take home test il
Take home test ilTake home test il
Take home test ilFAROUQ
 
International humanitarian law
International humanitarian lawInternational humanitarian law
International humanitarian lawAnjanileelarathna
 
Crimes Against Humanity
Crimes Against HumanityCrimes Against Humanity
Crimes Against HumanityFAROUQ
 
International Humanitarian Law and Terrorism
International Humanitarian Law and TerrorismInternational Humanitarian Law and Terrorism
International Humanitarian Law and TerrorismKardoman Tumangger
 
The patriot act
The patriot actThe patriot act
The patriot actpalita Px
 
International law and_the_use_of_force
International law and_the_use_of_forceInternational law and_the_use_of_force
International law and_the_use_of_forceStudsPlanet.com
 
International Humanitarian Law, (Lecture 15)- Distinction between internation...
International Humanitarian Law, (Lecture 15)- Distinction between internation...International Humanitarian Law, (Lecture 15)- Distinction between internation...
International Humanitarian Law, (Lecture 15)- Distinction between internation...Nilendra Kumar
 
International Law in Times of Armed Conflict
International Law in Times of Armed ConflictInternational Law in Times of Armed Conflict
International Law in Times of Armed Conflictswissnex San Francisco
 
International humanitarian law (ihl)
International humanitarian law  (ihl)International humanitarian law  (ihl)
International humanitarian law (ihl)bhagya913
 
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHLInternational Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHLNilendra Kumar
 
International Humanitarian Law Lecture 11 - International Armed Conflict
International Humanitarian Law Lecture 11 - International Armed ConflictInternational Humanitarian Law Lecture 11 - International Armed Conflict
International Humanitarian Law Lecture 11 - International Armed ConflictNilendra Kumar
 
International humanitarian law presentation
International humanitarian law   presentationInternational humanitarian law   presentation
International humanitarian law presentationRida Khan
 
International humanitarian law
International humanitarian lawInternational humanitarian law
International humanitarian lawFAROUQ
 
International Humanitarian Law Lecture 12 - Non International Armed Conflict
International Humanitarian Law Lecture 12 - Non International Armed ConflictInternational Humanitarian Law Lecture 12 - Non International Armed Conflict
International Humanitarian Law Lecture 12 - Non International Armed ConflictNilendra Kumar
 
International Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
International Humanitarian Law Lecture 19 - 70 Years of Geneva ConventionsInternational Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
International Humanitarian Law Lecture 19 - 70 Years of Geneva ConventionsNilendra Kumar
 
Prohibited means & methods of warfare
Prohibited means & methods of warfare Prohibited means & methods of warfare
Prohibited means & methods of warfare Nazakat887
 

Tendances (20)

Take home test il
Take home test ilTake home test il
Take home test il
 
International humanitarian law
International humanitarian lawInternational humanitarian law
International humanitarian law
 
Crimes Against Humanity
Crimes Against HumanityCrimes Against Humanity
Crimes Against Humanity
 
The patriot act
The patriot act The patriot act
The patriot act
 
International Humanitarian Law and Terrorism
International Humanitarian Law and TerrorismInternational Humanitarian Law and Terrorism
International Humanitarian Law and Terrorism
 
The patriot act
The patriot actThe patriot act
The patriot act
 
International law and_the_use_of_force
International law and_the_use_of_forceInternational law and_the_use_of_force
International law and_the_use_of_force
 
International Humanitarian Law, (Lecture 15)- Distinction between internation...
International Humanitarian Law, (Lecture 15)- Distinction between internation...International Humanitarian Law, (Lecture 15)- Distinction between internation...
International Humanitarian Law, (Lecture 15)- Distinction between internation...
 
International Law in Times of Armed Conflict
International Law in Times of Armed ConflictInternational Law in Times of Armed Conflict
International Law in Times of Armed Conflict
 
International humanitarian law (ihl)
International humanitarian law  (ihl)International humanitarian law  (ihl)
International humanitarian law (ihl)
 
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHLInternational Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
 
International Humanitarian Law Lecture 11 - International Armed Conflict
International Humanitarian Law Lecture 11 - International Armed ConflictInternational Humanitarian Law Lecture 11 - International Armed Conflict
International Humanitarian Law Lecture 11 - International Armed Conflict
 
Law of War
Law of WarLaw of War
Law of War
 
Ihl
IhlIhl
Ihl
 
International humanitarian law presentation
International humanitarian law   presentationInternational humanitarian law   presentation
International humanitarian law presentation
 
International humanitarian law
International humanitarian lawInternational humanitarian law
International humanitarian law
 
Mercenaries_Freedom_Fighters_and_Self_De
Mercenaries_Freedom_Fighters_and_Self_DeMercenaries_Freedom_Fighters_and_Self_De
Mercenaries_Freedom_Fighters_and_Self_De
 
International Humanitarian Law Lecture 12 - Non International Armed Conflict
International Humanitarian Law Lecture 12 - Non International Armed ConflictInternational Humanitarian Law Lecture 12 - Non International Armed Conflict
International Humanitarian Law Lecture 12 - Non International Armed Conflict
 
International Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
International Humanitarian Law Lecture 19 - 70 Years of Geneva ConventionsInternational Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
International Humanitarian Law Lecture 19 - 70 Years of Geneva Conventions
 
Prohibited means & methods of warfare
Prohibited means & methods of warfare Prohibited means & methods of warfare
Prohibited means & methods of warfare
 

En vedette

project_report_myungho
project_report_myunghoproject_report_myungho
project_report_myunghoMyungho Jung
 
العمارة الاسلامية في دمشق
العمارة الاسلامية في دمشقالعمارة الاسلامية في دمشق
العمارة الاسلامية في دمشقKhanzad Barzinjy
 
CUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOS
CUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOSCUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOS
CUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOSEliud Gamez Gomez
 
Efficient provisioning private network in a virtualized environment
Efficient provisioning private network in a virtualized environmentEfficient provisioning private network in a virtualized environment
Efficient provisioning private network in a virtualized environmentMyungho Jung
 
Cohen sutherland algorithm
Cohen sutherland algorithmCohen sutherland algorithm
Cohen sutherland algorithmFarwa Ansari
 
Tratamiento de la insuficiencia cardiaca
Tratamiento de la insuficiencia cardiacaTratamiento de la insuficiencia cardiaca
Tratamiento de la insuficiencia cardiacaLili Gallardo
 
Jukran pramuka garuda (2008)
Jukran pramuka garuda (2008)Jukran pramuka garuda (2008)
Jukran pramuka garuda (2008)Hari Wibowo
 

En vedette (12)

project_report_myungho
project_report_myunghoproject_report_myungho
project_report_myungho
 
A
AA
A
 
Technology
TechnologyTechnology
Technology
 
العمارة الاسلامية في دمشق
العمارة الاسلامية في دمشقالعمارة الاسلامية في دمشق
العمارة الاسلامية في دمشق
 
CUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOS
CUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOSCUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOS
CUANDO LAS CONGREGACIONES DE CRISTO SE ACOSTUMBRAN A NO TENER ANCIANOS
 
Mouse.
Mouse. Mouse.
Mouse.
 
Efficient provisioning private network in a virtualized environment
Efficient provisioning private network in a virtualized environmentEfficient provisioning private network in a virtualized environment
Efficient provisioning private network in a virtualized environment
 
GSM Proximity Platform
GSM Proximity PlatformGSM Proximity Platform
GSM Proximity Platform
 
Programming Fundamental handouts
Programming Fundamental handoutsProgramming Fundamental handouts
Programming Fundamental handouts
 
Cohen sutherland algorithm
Cohen sutherland algorithmCohen sutherland algorithm
Cohen sutherland algorithm
 
Tratamiento de la insuficiencia cardiaca
Tratamiento de la insuficiencia cardiacaTratamiento de la insuficiencia cardiaca
Tratamiento de la insuficiencia cardiaca
 
Jukran pramuka garuda (2008)
Jukran pramuka garuda (2008)Jukran pramuka garuda (2008)
Jukran pramuka garuda (2008)
 

Similaire à Application of IHL to Computer Network Attacks

Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slidesdondiw
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...Ethan S. Burger
 
Global Security Challenges of the 21st Century: Workshop on Cyber Crimes
Global Security Challenges of the 21st Century: Workshop on Cyber CrimesGlobal Security Challenges of the 21st Century: Workshop on Cyber Crimes
Global Security Challenges of the 21st Century: Workshop on Cyber CrimesMichelle Ribeiro
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William BoothbyHanah Croft
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdfINTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdfSiranjanaRodrigo
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYTalwant Singh
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
Artificial Intelligence and the Law of Armed Conflict
Artificial Intelligence and the Law of Armed ConflictArtificial Intelligence and the Law of Armed Conflict
Artificial Intelligence and the Law of Armed ConflictDr. Lydia Kostopoulos
 
Technological Advancement of Warfare and IHL.pptx
Technological Advancement of Warfare and IHL.pptxTechnological Advancement of Warfare and IHL.pptx
Technological Advancement of Warfare and IHL.pptxAntaresCobodero1
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warMarioEliseo3
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
[Challenge:Future] Cyber war
[Challenge:Future] Cyber war[Challenge:Future] Cyber war
[Challenge:Future] Cyber warChallenge:Future
 

Similaire à Application of IHL to Computer Network Attacks (20)

Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
Villard WritingSample Cybersecurity and International Law
Villard WritingSample Cybersecurity and International LawVillard WritingSample Cybersecurity and International Law
Villard WritingSample Cybersecurity and International Law
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...
 
Global Security Challenges of the 21st Century: Workshop on Cyber Crimes
Global Security Challenges of the 21st Century: Workshop on Cyber CrimesGlobal Security Challenges of the 21st Century: Workshop on Cyber Crimes
Global Security Challenges of the 21st Century: Workshop on Cyber Crimes
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William Boothby
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdfINTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
INTRO-Lorenz-HRL+and+IAC+(DAY+1).pptx.pdf
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
Artificial Intelligence and the Law of Armed Conflict
Artificial Intelligence and the Law of Armed ConflictArtificial Intelligence and the Law of Armed Conflict
Artificial Intelligence and the Law of Armed Conflict
 
Technological Advancement of Warfare and IHL.pptx
Technological Advancement of Warfare and IHL.pptxTechnological Advancement of Warfare and IHL.pptx
Technological Advancement of Warfare and IHL.pptx
 
OTI Cyber warefare
OTI Cyber warefareOTI Cyber warefare
OTI Cyber warefare
 
Kenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-warKenneth geers-sun-tzu-and-cyber-war
Kenneth geers-sun-tzu-and-cyber-war
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
[Challenge:Future] Cyber war
[Challenge:Future] Cyber war[Challenge:Future] Cyber war
[Challenge:Future] Cyber war
 
Cyber War
Cyber WarCyber War
Cyber War
 

Plus de Konstantin Yakovlev

International Protection of Children left without Parental Custody
International Protection of Children left without Parental CustodyInternational Protection of Children left without Parental Custody
International Protection of Children left without Parental CustodyKonstantin Yakovlev
 
Coursera Class on 21st Centrury American Foreign Policy
Coursera Class on 21st Centrury American Foreign PolicyCoursera Class on 21st Centrury American Foreign Policy
Coursera Class on 21st Centrury American Foreign PolicyKonstantin Yakovlev
 
EU Common Security and Defense Policy in 2000s
EU Common Security and Defense Policy in 2000sEU Common Security and Defense Policy in 2000s
EU Common Security and Defense Policy in 2000sKonstantin Yakovlev
 
Совет министров обороны СНГ
Совет министров обороны СНГСовет министров обороны СНГ
Совет министров обороны СНГKonstantin Yakovlev
 
Linguistic Rights in Eastern Partnership countries
Linguistic Rights in Eastern Partnership countriesLinguistic Rights in Eastern Partnership countries
Linguistic Rights in Eastern Partnership countriesKonstantin Yakovlev
 

Plus de Konstantin Yakovlev (7)

Political Instability Index
Political Instability IndexPolitical Instability Index
Political Instability Index
 
International Protection of Children left without Parental Custody
International Protection of Children left without Parental CustodyInternational Protection of Children left without Parental Custody
International Protection of Children left without Parental Custody
 
Coursera Class on 21st Centrury American Foreign Policy
Coursera Class on 21st Centrury American Foreign PolicyCoursera Class on 21st Centrury American Foreign Policy
Coursera Class on 21st Centrury American Foreign Policy
 
EU Common Security and Defense Policy in 2000s
EU Common Security and Defense Policy in 2000sEU Common Security and Defense Policy in 2000s
EU Common Security and Defense Policy in 2000s
 
Совет министров обороны СНГ
Совет министров обороны СНГСовет министров обороны СНГ
Совет министров обороны СНГ
 
Cyber Security Laws
Cyber Security LawsCyber Security Laws
Cyber Security Laws
 
Linguistic Rights in Eastern Partnership countries
Linguistic Rights in Eastern Partnership countriesLinguistic Rights in Eastern Partnership countries
Linguistic Rights in Eastern Partnership countries
 

Dernier

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 

Dernier (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

Application of IHL to Computer Network Attacks

  • 1. Application of IHL to Computer Network Attacks KOSTIANTYN IAKOVLIEV (UKRAINE) Yerevan State University Center for European Studies MA in Human Rights & Democratization
  • 2. • • • • • • • • • • OUTLINE Definitions Can International Humanitarian Law apply to Computer Network Attacks (CNAs)? Main issues when applying International Humanitarian Law to CNAS Principle of distinction Attacks only against military objects The prohibition of indiscriminate attacks Combatant status Recent examples of using CNAs in warfare Our suggestions for creating an international treaty on CNAs Sources
  • 3. Definitions: • • Kinetic (usual) attacks are used to destroy the opponent's infrastructure through traditional means of warfare. Computer network attacks (CNAs) are used to disrupt or destroy information within the opponent's computer networks themselves but can also lead to results similar to those achieved by kinetic attacks.
  • 4. Can International Humanitarian Law apply to Computer Network Attacks (CNAs)? • • • Core provisions: 1977 Additional Protocols I and II to the Geneva Conventions and customary international law. Martens Clause: whenever a situation is not covered by an international agreement, “civilians and combatants remain under the protection and authority of the principles of international law derived from established custom, from the principles of humanity, and from the dictates of public conscience". Article 38 of the Statute of the International Court of Justice also demonstrates the fallacy of any contention of inapplicability based on the absence of specific lex
  • 5. Main issues when applying International Humanitarian Law to CNAs • • • • the principle of distinction; attacks only against military objectives; the prohibition of indiscriminate attacks; combatant status
  • 6. Principle of distinction • General rule of IHL In order to ensure respect for and protection of the civilian population and civilian objects, the Parties to a conflict are required at all times to distinguish between the civilian population and combatants and between civilian objects and military objectives and accordingly must direct their operations only against military objectives (Art. 48 AP I) Specificity of this rule in case of CNAs It is unclear whether hackers are part of armed forces or not. •
  • 7. • Military objects General rule of IHL AP I (Art. 52) comprises two conditions that must be simultaneously met for an military object: first, it must make an effective contribution to the military action of the adversary and secondly, in the circumstances ruling at the time, its attack must offer a definite military advantage to the attacker. Specificity of this rule in case of CNAs Either network being affected must meet the two conditions above or the object that the network is controlling. A network attacked may also be necessary for the survival of the civilian population (like dams, dykes, nuclear electrical generating stations) •
  • 8. Indiscriminate attacks • General rule of IHL The prohibition of indiscriminate attacks is defined in Article 51(4) of AP l as one which is either not carefully aimed at a specific military objective (through carelessness or use of weapons that are by nature not capable of being so directed) or because the effects of an attack on a military objective are uncontrollable and unpredictable. • Specificity of this rule in case of CNAs Civilian and military computer networks are in practice highly interconnected, and thus CNAs not always man be aimed accurately at the intended target without creating a host of unforeseen and unforeseeable effects at the same time.
  • 9. Combatant status • General rule of IHL The Geneva Conventions present rules for protecting civilians and those hors de combat, such as soldiers that have been wounded or are sick and unable to fight. These Conventions also spell out specific guidelines for protecting those hors de combat in land, naval, and air warfare. Specificity of this rule in case of CNAs If incorporated into the armed forces, personnel associated with CNAs has all the rights and liabilities of combatants: they can be attacked like any other combatant and should endeavour to be in uniform if captured in order to be entitled to POW status, but the situation of technicians that act for the army but are not incorporated into it is more problematic as they may be considered civilians who would have no POW status if captured and could be prosecuted for the mere fact of taking part in the hostilities (their conduct does not seem to be comparable to the situation of civilians described in Art. 4 (4) of Geneva Convention III of 1949, which are entitled to POW status) and would also be subject to attack. •
  • 10. Recent examples of using CNAs in warfare • • Recently, the United States has created new bodies within their government organization to deal specifically with CNAs that may pose a threat to national security in addition to existing mechanisms of defense against kinetic attacks. China’s Cyber Warfare Doctrine considers operations against computer networks fundamental to the country's military and national development strategy
  • 11. Recent examples of using CNAs in warfare continued • • • In 2009, a cyber attack called GhostNet that targeted foreign embassies, government agencies and offices used by the Dalai Lama, was traced to IP-addresses on an island in the South China Sea where the People's Liberation Army has an intelligence base. In January 2010, Google Inc. said it had been hit by an attack originating in China, and said the cyber-spies had sought to steal emails from Chinese government critics. In 2011, the U. S. government accused military and intelligence services of Russia and China of conducting a sustained campaign to steal American commercial and military secrets through cyber espionage
  • 12. Our suggestions for creating an international treaty on CNAs • • • • Defining CNAs that can trigger application of IHL Establishing rules for CNAs to be used in disputed situations (e. g., interconnected networks that are both military objectives and necessary for survival of population) Outlining combatant status of personnel responsible for CNAs Reaffirming the need to discriminate between civilian population and military personnel
  • 13. Sources: Dilanian, K. (2011, August 12). Russia and China accused of cyber-spying campaign to steal U.S. secrets. Los Angeles Times. Retrieved from http://articles.latimes.com/2011/aug/12/business/la-ficyber-china-20110813 Dörmann, K. (2001, May 19). Computer network attack and international humanitarian law. ICRC Resource Centre. Retrieved November 22, 2012, from http://www.icrc.org/eng/resources/documents/misc/5p2alj.htm Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2011). The Law Of Cyber Attack. California Law Review, 2012, 76. Lewis, A. (2010, April 25). A Note on the Laws of War in Cyberspace. Center for Strategic and International Studies. Retrieved December 16, 2012, from http://csis.org/publication/note-lawswar-cyberspace Schmitt, M. N. (2002). Wired warfare: Computer network attack and jus in bello. International Review of the Red Cross, 84(846), 365–399. doi:10.1017/S1560775500097741 Watts, S. (2010). Combatant Status and Computer Network Attacks. Virginia Journal of International Law, 50(2), 391–447. Wolf, J. (2012, March 8). China cyber capability endangers U.S. forces: report. Reuters. Washington. Retrieved from http://www.reuters.com/article/2012/03/08/us-china-usa-cyberwaridUSBRE82712820120308 created with the help of Zotero 3.0.11 for Firefox
  • 14. first presented on 5th Yerevan International Conference on International Humanitarian Law https://www.facebook.com/groups/218931458229648/ Russian - Armenian (Slavonic) University, November 22-24, 2012
  • 15. Conference Topic: The means and methods of warfare in contemporary armed conflicts: IHL perspectives Section: Cyber warfare and IHL https://www.facebook.com/groups/218931458229648/ Chairperson: Sergey Sayapin, ICRC, Legal Adviser
  • 16. Thank you for attention! Kostiantyn Iakovliev (Ukraine) MA in Human Rights and Democratization, Yerevan State University, 2012 https://plus.google.com/u/0/ +KostiantynIakovliev/ https://www.linkedin.com/in/ iakovliev