Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Security Think Tank Analyzes How International Law Applies to Cyber War

A team of security experts have published a manual outlining how existing international laws can be applied to conflicts in cyber-space.

A team of security experts have published a manual outlining how existing international laws can be applied to conflicts in cyber-space.

The 215-page study, titled “The Tallinn Manual on the International Law Applicable to Cyber Warfare” examines existing international law that allows countries to legally use force against other nations, as well as laws governing the conduct of armed conflict. The rules of conventional warfare are more difficult to apply in cyber-space, making this analysis critical.

Cyber War

The scope and manner of how international law applies to offensive and defensive cyber-operations have “remained unsettled,” Michael N. Schmitt, project director and chairman of the International Law Department at the U.S. Naval War College, wrote in the induction to the manual. Since attribution, or knowing who was actually behind a cyber-attack, is so difficult, governments have traditionally struggled with questions such as how to legally respond to an attack.

“The threshold questions are whether the existing law applies to cyber issues at all, and, if so, how,” Scmitt wrote.

A group of experts from Australia, Canada, and United States, the Netherlands, and the United Kingdom worked on the manual under the auspices of the Cooperative Cyber Defense Center of Excellence (CCDCOE). Founded in 2008 in Tallinn, Estonia, CCDOE is an institute that assists NATO with technical and legal issues associated with cyber-warfare-related issues.

The manual addresses questions such as sovereignty, jurisdiction, and state responsibility.

Many security experts believe the term cyber-warfare is overused, and there is plenty of disagreement over what makes an incident an act of cyber-war as opposed to just an attack. Even though many incidents have been called an act of cyber-war, the only one that comes close to the definition under international law was Stuxnet, according to the manual. The damage the Stuxnet malware caused the centrifuges used in Iranaian nuclear facilities reached the “armed attack” threshold, the authors wrote.

“No international cyber-incidents have, as of 2012, been unambiguously and publically characterized by the international community as reaching the threshold of an armed attack,” the authors wrote.

Advertisement. Scroll to continue reading.

Tallinn Manual on Cyber WarThe disagreement over what constitutes an armed attack was apparent in the manual, as the authors were divided over how to characterize a cyber-operation as an act of war.

In the case of a cyber-espionage operation by State A against State B that unexpectedly resulted in significant damage to State B’s cyber-infrastructure, some experts were not willing to call State A’s action as an armed attack, according to the manual. The majority of the experts working on the manual took the view that “intention is irrelevant in quantifying an operation as an armed attack and that only scale and effects matter,” the manual said.

Governments around the world are beginning to consider cyberspace as a critical component of their overall security. Many countries, such as China, have a cyber-unit within their military. The Department of Defense released its “Strategy for Operating in Cyberspace” which designated cyber-space as an operational domain and clearly indicated the United States would respond in the event of an cyber-attack.

The United Kingdom characterized “cyber-attack, including by other States, and by organized crime and terrorists” as one of four “Tier One” threats to British national security back in 2010, Schmitt wrote in the introduction.

The Tallinn manual is “not a manual on ‘cyber security’ as that term is understood in common usage,” since international law does not apply to cyber-espionage, theft of intellectual property, and other cyber-crimes, wrote Schmitt. It also doesn’t apply to kinetic-to-cyber operations, such as an aerial attack deploying bombs against a cyber-control center.

The Tallinn Manual focuses on “jus ad bellum,” the international law governing the resort to force as an instrument of national policy, and “jus in bello,” the international law regulating the conduct of armed conflict, according to a post on the CCDOE blog. Other related areas, such as the law of State responsibility and the law of the sea are also addressed in the manual. The Tallinn Manual focuses only on the existing law and its interpretation in the cyber-context, according to a CCDOE statement. It does not propose or aim to contribute to the discussions on norms of behavior and codes of conduct, CCDOE said.

The manual’s emphasis is on “cyber-to-cyber operations, strictu ensu,” such as attacks against a state’s critical infrastructure, or one targeting enemy command and control systems, Schmitt said.

Published by Cambridge University Press, the manual is intended to be a reference for legal advisors at various government agencies. Until the book form is available, CCDOE has a draft version available online.

The Tallinn Manual is not intended to be NATO’s official doctrine but a compilation of views.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...