The Times Australia
The Times World News

.
The Times Real Estate

.

the laws of war must apply in cyberspace

  • Written by Professor Johanna Weaver, Director, ANU Tech Policy Design Centre, Australian National University
the laws of war must apply in cyberspace

There are rules in war. International humanitarian law regulates what combatants can and can’t do, with the goal of protecting civilians and limiting suffering.

Most of these laws were developed during the 19th and 20th centuries. But in our own century a new kind of battlefield has emerged: the domain of cyberattacks, digital campaigns and online information operations. All these have played a heightened role in Russia’s war in Ukraine and, increasingly, in the current Israel–Hamas conflict.

There is a persistent myth that cyberspace is a lawless wild west. This could not be further from the truth. There is a clear international consensus that existing laws of war apply online.

In the past month, we have seen three significant developments in this area. Rules for “civilian hackers” have begun to gain traction. A new international humanitarian report has recommended ways forward for governments, tech companies and others. And the International Criminal Court has for the first time signalled that it considers cyber warfare to fall within its jurisdiction.

Rules for hacktivists

On October 4 2023, two advisers to the International Committee of the Red Cross proposed a set of rules for “civilian hackers” during war[1]. The proposals include things like “do not conduct any cyber operation against medical and humanitarian facilities” and “when planning a cyber attack against a military objective, do everything feasible to avoid or minimize the effects your operation may have on civilians”.

The authors were motivated by evidence of online attacks[2] disrupting banks, companies, pharmacies, hospitals, railway networks and civilian government services.

Cyber, digital and information operations – used alongside “real-world” military operations – have risen into the mainstream during Russia’s war in Ukraine. Many operations are carried out by civilian groups not formally connected to the military.

Read more: Russia is using an onslaught of cyber attacks to undermine Ukraine's defence capabilities[3]

These manoeuvres are not spectacular. However, as Jeremy Fleming[4] (former head of GCHQ, United Kingdom’s electronic spy agency) put it:

it was never our understanding that a catastrophic cyberattack was central to Russia’s use of offensive cyber in their military doctrine. To think otherwise, misjudges how cyber has an effect in military campaigns. That’s not to say that we haven’t seen cyber in this conflict. We have – and lots of it.

After the proposed rules for civilian hackers were published, something extraordinary happened.

Two of the largest hacktivist groups actively engaged on opposite sides of the war in Ukraine are the Russian-affiliated Killnet and the Ukrainian IT Army. Spokespeople for both groups vowed to the BBC[5] they would uphold the rules.

Digital threats during armed conflict

It is not just actors in Ukraine, and not just hacktivist groups, who must comply with the laws of war in cyberspace.

On October 18, the International Committee of the Red Cross published the final report of its global advisory board on digital threats during armed conflicts[6].

The report is the culmination of two years of work. The board comprises a diverse group of experts spanning the geopolitical spectrum, including the United States, Russia, China, South Africa, Mexico, India and Australia (including me).

We worked on “the international consensus that the established principles and rules of [international humanitarian law] apply to all forms of warfare and to all kinds of weapons, be they new or old, digital or physical”.

To safeguard civilians against digital threats, the report includes 25 action-oriented recommendations for belligerents, states, tech companies and humanitarian organisations.

A photo of a UN meeting.
United Nations agreements recognise that the laws of war apply to cyber operations. Eduardo Munoz / EPA[7]

Since 2013, negotiated agreements at the United Nations[8] have recognised that existing international law applies to what states do in cyberspace.

In 2021, Russia, China, the US, Australia and every country in the United Nations went one step further, explicitly recognising[9] the application of the laws of war to cyber operations.

The International Committee of the Red Cross – its mission being “to prevent suffering by promoting and strengthening humanitarian law and universal humanitarian principles” – has also affirmed this many times, including via the reports above.

The International Criminal Court weighs in

Of course, agreeing to the rules doesn’t prevent irresponsible actors from breaking them. And this is where the third significant development comes in.

In September 2023, Karim A.A. Khan, the prosecutor of the International Criminal Court, signalled[10] the court would begin “collecting and reviewing” evidence of cyber warfare. It will also examine “misuse of the internet to amplify hate speech and disinformation, which may facilitate or even directly lead to the occurrence of atrocities”.

A photo showing a bald man in a suit holding forth in front of a microphone with two out-of-focus people in the background.
Karim Khan, prosecutor of the International Criminal Court, is taking an interest in cyberwarfare and ‘misuse of the internet’. Neil Hall / EPA[11]

This is the first time the International Criminal Court has expressly indicated cyber warfare and misuse of the internet fall within its jurisdiction. This puts governments, militaries, tech companies and hacktivists on notice that they do not act with impunity in cyberspace.

As the war drags on in Ukraine and conflict escalates between Israel and Hamas (including increasing reports[12] of hacktivism), all parties would do well to reflect that the rules of cyber warfare are clear.

Bombs or bytes, missiles or malware, international humanitarian law applies.

References

  1. ^ a set of rules for “civilian hackers” during war (blogs.icrc.org)
  2. ^ evidence of online attacks (blogs.icrc.org)
  3. ^ Russia is using an onslaught of cyber attacks to undermine Ukraine's defence capabilities (theconversation.com)
  4. ^ Jeremy Fleming (nsc.crawford.anu.edu.au)
  5. ^ vowed to the BBC (www.bbc.com)
  6. ^ digital threats during armed conflicts (www.icrc.org)
  7. ^ Eduardo Munoz / EPA (photos.aap.com.au)
  8. ^ negotiated agreements at the United Nations (digitallibrary.un.org)
  9. ^ explicitly recognising (digitallibrary.un.org)
  10. ^ signalled (digitalfrontlines.io)
  11. ^ Neil Hall / EPA (photos.aap.com.au)
  12. ^ increasing reports (www.politico.eu)

Read more https://theconversation.com/governments-and-hackers-agree-the-laws-of-war-must-apply-in-cyberspace-216202

The Times Features

Australian businesses face uncertainty under new wage theft laws

As Australian businesses brace for the impact of new wage theft laws under The Closing Loopholes Acts, data from Yellow Canary, Australia’s leading payroll audit and compliance p...

Why Staying Safe at Home Is Easier Than You Think

Staying safe at home doesn’t have to be a daunting task. Many people think creating a secure living space is expensive or time-consuming, but that’s far from the truth. By focu...

Lauren’s Journey to a Healthier Life: How Being a Busy Mum and Supportive Wife Helped Her To Lose 51kg with The Lady Shake

For Lauren, the road to better health began with a small and simple but significant decision. As a busy wife and mother, she noticed her husband skipping breakfast and decided ...

How to Manage Debt During Retirement in Australia: Best Practices for Minimising Interest Payments

Managing debt during retirement is a critical step towards ensuring financial stability and peace of mind. Retirees in Australia face unique challenges, such as fixed income st...

hMPV may be spreading in China. Here’s what to know about this virus – and why it’s not cause for alarm

Five years on from the first news of COVID, recent reports[1] of an obscure respiratory virus in China may understandably raise concerns. Chinese authorities first issued warn...

Black Rock is a popular beachside suburb

Black Rock is indeed a popular beachside suburb, located in the southeastern suburbs of Melbourne, Victoria, Australia. It’s known for its stunning beaches, particularly Half M...

Times Magazine

Lessons from the Past: Historical Maritime Disasters and Their Influence on Modern Safety Regulations

Maritime history is filled with tales of bravery, innovation, and, unfortunately, tragedy. These historical disasters serve as stark reminders of the challenges posed by the seas and have driven significant advancements in maritime safety regulat...

What workers really think about workplace AI assistants

Imagine starting your workday with an AI assistant that not only helps you write emails[1] but also tracks your productivity[2], suggests breathing exercises[3], monitors your mood and stress levels[4] and summarises meetings[5]. This is not a f...

Aussies, Clear Out Old Phones –Turn Them into Cash Now!

Still, holding onto that old phone in your drawer? You’re not alone. Upgrading to the latest iPhone is exciting, but figuring out what to do with the old one can be a hassle. The good news? Your old iPhone isn’t just sitting there it’s potential ca...

Rain or Shine: Why Promotional Umbrellas Are a Must-Have for Aussie Brands

In Australia, where the weather can swing from scorching sun to sudden downpours, promotional umbrellas are more than just handy—they’re marketing gold. We specialise in providing wholesale custom umbrellas that combine function with branding power. ...

Why Should WACE Students Get a Tutor?

The Western Australian Certificate of Education (WACE) is completed by thousands of students in West Australia every year. Each year, the pressure increases for students to perform. Student anxiety is at an all time high so students are seeking suppo...

What Are the Risks of Hiring a Private Investigator

I’m a private investigator based in Melbourne, Australia. Being a Melbourne Pi always brings interesting clients throughout Melbourne. Many of these clients always ask me what the risks are of hiring a private investigator.  Legal Risks One of the ...

LayBy Shopping