the internet as a field of war
play

The Internet as a Field of War Anne Plouy Claerwen OHara Louis Lonet - PowerPoint PPT Presentation

The Internet as a Field of War Anne Plouy Claerwen OHara Louis Lonet Lucy Turner Leiden University, The Netherlands Leiden University, 16/11/2015 Why? Military spending Increase in attacks Heightened vulnerability Increase in


  1. The Internet as a Field of War Anne Plouy Claerwen O’Hara Louis Léonet Lucy Turner Leiden University, The Netherlands Leiden University, 16/11/2015

  2. Why? • Military spending • Increase in attacks • Heightened vulnerability • Increase in number of vigilantes • International Humanitarian Law is old 2 Leiden University, 16/11/2015

  3. Stuxnet: first 60th of Stuxnet binary http://julianoliver.com/output/log_2012-11-12_19-56 3 Leiden University, 16/11/2015

  4. International Humanitarian Law (IHL) 1. Applicability 2. Distinction 3. Proportionality 4. Precaution 4 Leiden University, 16/11/2015

  5. Issue 1: Applicability of IHL • International humanitarian law= law of armed conflict • Governs cyber warfare warfare http://www.extremetech.com/extreme/ 185125-how-to-watch-hacking-and- cyberwarfare-between-the-usa-and- china-in-real-time 5 Leiden University, 16/11/2015

  6. Issue 1: Applicability of IHL Armed conflict: • 1) Armed force • Non-physical consequences • 2) International or non-international armed conflict • Anonymity • Defies national boundaries 6 Leiden University, 16/11/2015

  7. Issue 2: Distinction Key Points: • Military/civilian objects • No indiscriminate attacks • Identification MSF Hospital in Kunduz, Afghanistan www.theguardian.com/world/2015/oct/03/kunduz-charity-hospital-bombing-violates-international-law#img-2 7 Leiden University, 16/11/2015

  8. Issue 2: Distinction Problems for Cyber Warfare: • Internet as “Dual-purpose” • Viruses and Worms • Stuxnet – did it distinguish? • DDoS Attacks • IP addresses • Hackers as combatants? Natanz Nuclear Facility Hamed Saber http://www.flickr.com/photos/hamed/237790717 8 Leiden University, 16/11/2015

  9. Issue 3: Proportionality Civilians Lawful Objective Civilians Objects 9 Leiden University, 16/11/2015

  10. Issue 3: Proportionality EXPECTED ANTICIPATED MILIT MILITAR ARY Y COLLA COLLATERAL TERAL ADV ADVANT ANTAGE AGE DAMAGE DAMAGE 10 Leiden University, 16/11/2015

  11. Issue 3: Proportionality Challenges Regarding Cyber Warfare: Challenges Regarding Cyber Warfare: • Physical Damage VS VS Loss of Functionality • Unexpected & Indirect Consequences è Reasonableness Reasonableness � “ A Posteriori Evaluation ” • Dual-Use Objects è Usability Ratio? 11 Leiden University, 16/11/2015

  12. Issue 4: Precaution Legal Key Points Legal Key Points: • Definition • Two parts obligation • Precaution in attack • Precaution against the effects of an attack 12 Leiden University, 16/11/2015

  13. Issue 4: Precaution The The “ Perfect Weapon Perfect Weapon ” : - ‘ Turn it off ’ - Information needed to create a weapon BUT • Testing • Suspend & Cancel the attack • Segregation & Protection 13 Leiden University, 16/11/2015

  14. Suggestions for the future? • Modernizing the law • Limiters for worms and viruses • Internet as a global commons? WarGames (1983) 14 Leiden University, 16/11/2015

  15. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend