The Internet as a Field of War Anne Plouy Claerwen OHara Louis Lonet - - PowerPoint PPT Presentation

the internet as a field of war
SMART_READER_LITE
LIVE PREVIEW

The Internet as a Field of War Anne Plouy Claerwen OHara Louis Lonet - - PowerPoint PPT Presentation

The Internet as a Field of War Anne Plouy Claerwen OHara Louis Lonet Lucy Turner Leiden University, The Netherlands Leiden University, 16/11/2015 Why? Military spending Increase in attacks Heightened vulnerability Increase in


slide-1
SLIDE 1

Leiden University, 16/11/2015

The Internet as a Field of War

Anne Plouy Claerwen O’Hara Louis Léonet Lucy Turner Leiden University, The Netherlands

slide-2
SLIDE 2

Leiden University, 16/11/2015 2

Why?

  • Military spending
  • Increase in attacks
  • Heightened vulnerability
  • Increase in number of vigilantes
  • International Humanitarian Law is old
slide-3
SLIDE 3

Leiden University, 16/11/2015

Stuxnet: first 60th of Stuxnet binary

3

http://julianoliver.com/output/log_2012-11-12_19-56

slide-4
SLIDE 4

Leiden University, 16/11/2015 4

International Humanitarian Law (IHL)

  • 1. Applicability
  • 2. Distinction
  • 3. Proportionality
  • 4. Precaution
slide-5
SLIDE 5

Leiden University, 16/11/2015

Issue 1: Applicability of IHL

  • International humanitarian law= law of armed

conflict

  • Governs cyber warfare

warfare

5

http://www.extremetech.com/extreme/ 185125-how-to-watch-hacking-and- cyberwarfare-between-the-usa-and- china-in-real-time

slide-6
SLIDE 6

Leiden University, 16/11/2015 6

Issue 1: Applicability of IHL

Armed conflict:

  • 1) Armed force
  • Non-physical consequences
  • 2) International or non-international armed

conflict

  • Anonymity
  • Defies national boundaries
slide-7
SLIDE 7

Leiden University, 16/11/2015 7

Issue 2: Distinction

Key Points:

  • Military/civilian objects
  • No indiscriminate attacks
  • Identification

MSF Hospital in Kunduz, Afghanistan www.theguardian.com/world/2015/oct/03/kunduz-charity-hospital-bombing-violates-international-law#img-2

slide-8
SLIDE 8

Leiden University, 16/11/2015 8

Issue 2: Distinction

Problems for Cyber Warfare:

  • Internet as “Dual-purpose”
  • Viruses and Worms
  • Stuxnet – did it distinguish?
  • DDoS Attacks
  • IP addresses
  • Hackers as combatants?

Natanz Nuclear Facility Hamed Saber http://www.flickr.com/photos/hamed/237790717

slide-9
SLIDE 9

Leiden University, 16/11/2015 9

Issue 3: Proportionality

Civilians Civilians Objects Lawful Objective

slide-10
SLIDE 10

Leiden University, 16/11/2015

Issue 3: Proportionality

10

ANTICIPATED EXPECTED MILIT MILITAR ARY Y ADV ADVANT ANTAGE AGE COLLA COLLATERAL TERAL DAMAGE DAMAGE

slide-11
SLIDE 11

Leiden University, 16/11/2015

Issue 3: Proportionality

Challenges Regarding Cyber Warfare: Challenges Regarding Cyber Warfare:

  • Physical Damage VS

VS Loss of Functionality

  • Unexpected & Indirect Consequences

è Reasonableness Reasonableness “A Posteriori Evaluation”

  • Dual-Use Objects

è Usability Ratio?

11

slide-12
SLIDE 12

Leiden University, 16/11/2015 12

Issue 4: Precaution

Legal Key Points Legal Key Points:

  • Definition
  • Two parts obligation
  • Precaution in attack
  • Precaution against the effects of an attack
slide-13
SLIDE 13

Leiden University, 16/11/2015

Issue 4: Precaution

The The “Perfect Weapon Perfect Weapon”:

  • ‘Turn it off’
  • Information needed to create a weapon

BUT

  • Testing
  • Suspend & Cancel the attack
  • Segregation & Protection

13

slide-14
SLIDE 14

Leiden University, 16/11/2015 14

Suggestions for the future?

  • Modernizing the law
  • Limiters for worms and viruses
  • Internet as a global commons?

WarGames (1983)

slide-15
SLIDE 15

Questions?