Modern Australian
Men's Weekly

.

Why international law is failing to keep pace with technology in preventing cyber attacks

  • Written by Lorraine Finlay, Lecturer in Law, Murdoch University
Why international law is failing to keep pace with technology in preventing cyber attacks

The prime minister’s announcement yesterday that a “sophisticated state actor” had hacked the computer networks of Australia’s major political parties again highlights the serious threat posed by cyber attacks.

This follows a breach of the Parliament House network earlier this year. Previous examples in Australia include the 2015 malware attack on the Bureau of Meteorology and breaches of the computer systems at the Australian National University in 2018.

Indeed, cyber measures targeting Australian government infrastructure have been described as the “new normal”.

Read more: A state actor has targeted Australian political parties – but that shouldn't surprise us

Australia is not alone in facing this threat, and it is a significant one. The US Secretary of Homeland Security highlighted the seriousness of this challenge when she recently suggested that:

… cyber-attacks in terms of their breadth and scope of possible consequences now exceed the risk of physical attacks.

Technological advances continue to outpace legal developments. While intelligence officials have suggested the most recent attack came from a “nation state”, the reality is that the existing international law framework fails to provide timely or effective legal remedies.

The problem of attribution

One of the most significant hurdles is the problem of attribution. For a nation state to be held responsible under international law for a particular act, that act must be attributable to that state. There are a variety of ways this can occur. For example, the conduct of state organs (such as government departments and officials) will usually be attributable to the state.

But here’s a key problem: in the case of cyber attacks, states don’t generally operate through formal state bodies. Instead, they tend to use non-state actors who are less visible, more removed and offer plausible deniability. This creates problems of both factual and legal attribution.

Read more: Is counter-attack justified against a state-sponsored cyber attack? It's a legal grey area

The factual problem is that it is often extremely difficult to accurately identify the origin of a cyber attack. The lack of boundaries and anonymity that are characteristic of cyberspace make it hard for states to identify exactly who is responsible for a specific cyber attack.

Perpetrators are becoming increasingly effective at masking their true identities and locations. They may even deliberately make it look as though innocent third parties are responsible for an attack.

The legal problem of attribution arises from the fact that international law does not generally hold states responsible for the actions of non-state actors.

Responsibility will only be attributed if the state either acknowledges and adopts the conduct of the non-state actor as its own, or the state directs or controls the non-state actor.

The former is unlikely given the lengths that states go to mask their involvement in cyber attacks in the first place. The latter is also unlikely, given the high threshold set by international law to establish the required direction or control.

The International Court of Justice has held that a state must be shown to have had “effective control” over each specific act for which attribution is sought. Simply providing financial aid or equipment to support a cyber attack, or even providing a safe haven base for individual hackers, would likely not be enough to meet the “effective control” test.

Given these problems, it is highly unlikely that a state will ever be held publicly accountable under the existing legal framework.

It is one thing for intelligence officials to privately suggest China may be to blame for the most recent breach. But that is a long way from meeting the high threshold required to establish state responsibility under international law.

How can a state respond to a cyber attack?

Even if legal attribution could be established, that does not entirely resolve the legal complexities. International law has few mechanisms that allow a state to respond effectively to a cyber attack once it has occurred.

A state is allowed to use force in self-defence – but only in response to an armed attack. An armed attack in this context refers to only the most grave use of force. It is highly unlikely that acts of cyber espionage focused primarily on gathering intelligence or data could ever be characterised as an armed attack under this definition.

Similarly, while countermeasures (a broad category of temporary, reversible measures designed to induce a state to cease its wrongful conduct) are allowed under international law in certain circumstances, the conditions imposed on these mean they are of limited use in the context of cyber attacks. For example, in all but the most urgent circumstances, an injured state must notify the responsible state of the decision to take countermeasures and offer to negotiate with them before any countermeasures are actually taken. Such procedural requirements are simply impractical when responding to cyber attacks, given their potential speed and reach.

Cyber attacks by foreign states pose a real and growing threat to Australia. Unfortunately, the existing international law framework provides little effective protection or recourse. This makes it even more important for Australia to ensure we are doing everything possible to protect ourselves and our democratic institutions from cyber attacks.

Authors: Lorraine Finlay, Lecturer in Law, Murdoch University

Read more http://theconversation.com/why-international-law-is-failing-to-keep-pace-with-technology-in-preventing-cyber-attacks-111998

Why Older Melbourne Homes Require Detailed Building & Pest Inspections

Older homes make up a large part of Melbourne’s housing stock. Victorian terraces, Edwardian houses, Californian bungalows, and post-war brick hom...

7 Essential Tips for Choosing Reliable Moving Services in Perth

Moving to a new home or office can be exciting, but it also comes with stress, planning, and plenty of decisions. One of the most important choices yo...

How to Find the Best Real Estate Agent Near You on the Central Coast

Choosing the right real estate agent can make a major difference to your final sale price, days on market, and overall experience. The Central Coast...

Unlock Durability And Beauty With Burnt Timber Cladding Solutions

Imagine a home or commercial space that not only stands the test of time but also tells a story through its very facade. In the world of architectur...

Offroad Caravans: Built for Adventure Beyond the Beaten Track

Australia’s vast and varied landscapes invite travellers to explore far beyond sealed roads and crowded parks. Offroad caravans are purpose-built ...

The Expert's Guide to Understanding Large Bore Steel Pipe Specifications

When it comes to infrastructure, construction, and various industrial applications, the choice of materials is paramount. Among the options availabl...

Preparing for Your First Trip to San Francisco in 2026

San Francisco has long occupied a particular place in the Australian imagination. It is compact yet complex, progressive but historic, and visually st...

Modern Office Painting in Australia - It's the Real Game Changer

Walk into any modern Australian office today and you'll be struck by the fact it's a whole different beast from the ones we grew up with. Gone are t...

How to Choose the Right Suburb for Your Lifestyle

Choosing the right suburb is one of the most important decisions you’ll make when buying or renting a home. Beyond the property itself, the suburb...

Considering Cryolipolysis Fat Freezing? Here’s What You Need to Know

Body confidence can shift over time, and sometimes even good diet and training can still leave a stubborn area of fat that won’t budge. If you’r...

From Local Tradie to Digital Leader: The Strategy Behind Auto Gate Guys Sydney’s Growth

For many small trade businesses, digital marketing still feels like a buzzword, not a necessity. They rely on word-of-mouth referrals, repeat clients...

Electric Automation System: Smarter Control for Modern Electrical Infrastructure

Modern buildings and industrial facilities are increasingly dependent on intelligent control and efficiency. An electric automation system brings t...

The Damp Truth: Why Your Overflowing Gutters Are an Open Invitation for Termites

When it comes to protecting your home, most people think about visible threats — storm damage, cracked tiles, break-ins. But one of the most destruc...

Is Your Inventory a Sitting Duck? 2 Critical Upgrades to Protect Your Business Assets and Your Bottom Line

Imagine this: you finish a long day on the job, lock up your tools, materials, and work vehicle in the garage, and head home. But overnight, someone b...

Electrician in Melbourne: Reliable Electrical Solutions for Homes and Businesses

Finding a dependable electrician Melbourne is essential when safety, efficiency, and long-term performance matter. Electrical systems form the back...

Rims and Tyres for Sale in Sydney: Performance, Safety, and Style Combined

Finding the right rims and tyres for sale Sydney is about far more than appearance. Tyres and rims directly influence how a vehicle handles, brakes...

Why Access to Doctors in Bundoora Is Essential for Ongoing Community Health

Reliable access to healthcare plays a vital role in maintaining physical wellbeing and peace of mind. Having trusted doctors in Bundoora available ...

Pendant Lights: Elevating Interior Spaces With Style and Purpose

Well-chosen pendant lights have the power to transform interiors by combining focused illumination with strong visual impact. More than just a ligh...