Modern Australian
The Times Real Estate

.

Is counter-attack justified against a state-sponsored cyber attack? It's a legal grey area

  • Written by Sandeep Gopalan, Pro Vice-Chancellor (Academic Innovation) & Professor of Law, Deakin University
Is counter-attack justified against a state-sponsored cyber attack? It's a legal grey area

On March 23, the US Department of Justice commenced perhaps the largest prosecution of a state-sponsored cyber attack. It indicted nine Iranians for carrying out:

a coordinated campaign of cyber intrusions into computer systems belonging to 144 US universities, 176 universities across 21 foreign countries, 47 domestic and foreign private sector companies … [and] the United Nations…

At least 31.5 terabytes of data was allegedly stolen and Australian universities were targeted, although specific institutions are not named.

History suggests that this response is unlikely to deter future attacks, and that counter-attacks are a more effective strategy. But would it be justified? Current international law focuses on armed attack, not cyber attack as a justification for state action taken in self-defence.

As cyber attacks become more common, international law needs to clear up this grey area.

How they did it and what was taken

The indictment alleges that defendants Gholamreza Rafatnejad and Ehsan Mohammadi are founders of Mabna Institute – an organisation established for the purpose of scientific espionage. Mabna is alleged to have contracted with Iranian governmental agencies (including the Islamic Revolutionary guard) to conduct hacking on their behalf.

Read more: Following the developing Iranian cyberthreat

The defendants allegedly engaged in a conspiracy to compromise computer accounts of thousands of professors to steal research data and intellectual property, costing the US approximately US$3.4 billion. They allegedly conducted surveillance and sent professors targeted “spearphishing” emails to lure them into providing access to their computer systems.

Valuable data was transferred from the compromised IT systems to the hackers, according the the indictment. Over 100,000 professors were apparently targeted and approximately 8,000 email accounts compromised.

Private companies were also targeted – none Australian – via “password spraying”, said the US Department of Justice. This is a technique whereby the attacker identifies the email accounts of a target via public search and gains access to the account using common or default passwords.

Prosecution is an insufficient response

The defendants are charged with committing fraud and related activity in connection with computers, conspiracy, wire fraud, unauthorised access of a computer, and identity theft. Each charge carries a prison sentence ranging from two years to 20 years.

The prosecution is a necessary, but insufficient response to these cyber attacks.

The defendants are based in Iran and are unlikely to be brought to justice. Previously, US prosecutors have charged Iranian hackers with attacks against financial institutions and a dam in New York to no avail.

And hacking has escalated – the US accused Russia of compromising the US electricity grid and attacks against other countries are also alleged.

Counter-attack a better deterrent

Rogue states such as Iran, Russia, and North Korea are only likely to be deterred against conducting cyber attacks if their targets have robust self-defense and counter-attack capabilities. However, the legal status of cyber attacks and the appropriate responses are not clear in international law.

Under the UN Charter, states have an obligation to refrain “from the threat or use of force against the territorial integrity or political independence of any state”. Crucially, states possess an “inherent right of individual or collective self-defence if an armed attack occurs”.

Read more: Cybersecurity of the power grid: A growing challenge

The key questions then are whether a cyber attack amounts to a “use of force”, whether hacking attributable to a state amounts to an “armed attack”, and if a cyber attack violates “territorial integrity”. Traditionally, international law has answered these questions with reference to acts of physical violence – conventional military strikes.

It’s likely that a large scale cyber attack against a state that has physical consequences within its territory may be characterised as a “use of force”, and may violate “territorial integrity” under the charter. For instance, attacks that turn self-driving cars into weapons, knock out nuclear stations or paralyse the power grid might reach this threshold.

But what if the attack is designed to sow confusion or generate internal discord, such as in the case of Russian hacking of the US election? Or attacks directed beyond a particular country? This is a harder question and not settled currently. Similarly, it’s not certain that even large scale hacking would rise to the level of an “armed attack”.

Precedent in international law

In 1984, Nicaragua brought proceedings against the US in response to American support for the Contras (rebels fighting the government). In that case, the International Court of Justice (ICJ) opined that armed attack might also include:

the sending by a State of armed bands on to the territory of another State, if such an operation, because of its scale and effects, would have been classified as an armed attack had it been carried out by regular armed forces.

Crucially, the ICJ underlined the principle of non-intervention:

Intervention is wrongful … [using] methods of coercion, particularly force, either in the direct form of military action or in the indirect form of support for subversive activities in another State.

Based on the Nicaragua case, if a cyber attack has sufficient “scale and effects” it may amount to an armed attack. More importantly, if the attacks are attributable to a state (in this case the Islamic Revolutionary Guard) – or are within its overall or effective control or direction – it would appear that the armed attack would give rise to the right to self-defence.

Read more: Cyber peacekeeping is integral in an era of cyberwar – here's why

However, this may be difficult to establish in practice – there may not be sufficient evidence connecting the hacker to the state to show control, and hence attribution.

So, what are the permissible self-defence responses under international law? Could the US launch military strikes against Iran or Russia for these incidents if they are found to be behind these attacks? The legality of such strikes is not clear even though the US might claim such status.

The international community should set bright line rules on this matter before an expansive reading of self-defence triggers war. The NATO Cooperative Cyber Defence Centre of Excellence’s Tallinn Manual 2.0 is a start, but a binding instrument is needed. John Bolton’s appointment as US President Donald Trump’s National Security Advisor makes this an urgent priority because a military strike in response to the next major cyber attack is a realistic prospect.

Authors: Sandeep Gopalan, Pro Vice-Chancellor (Academic Innovation) & Professor of Law, Deakin University

Read more http://theconversation.com/is-counter-attack-justified-against-a-state-sponsored-cyber-attack-its-a-legal-grey-area-94023

Commercial Plastering Can Boost Your Business Appeal

In business, appearances matter. The way your space looks sets the tone for how clients, customers, and even your staff perceive your brand. A well-...

How to Transfer Registration When You Buy a Used Car in Brisbane

Purchasing a second-hand car can be a thrilling experience, but there's more to it than simply handing over the cash and driving off. One very impor...

Expert Tips for Comparing Budget Movers and Energy Providers For a Modern Apartment

Starting a new life in a modern apartment can be a challenging yet exciting step. While moving into a modern apartment, people always need reliable ...

Slowing Down in Nature: My Experience on Orchid Classic Cruise in Lan Ha Bay

Why Orchid Classic is a Top Choice for Lan Ha Bay Lan Ha Bay, a hidden gem adjacent to the more famous Ha Long Bay, offers travelers a quieter and ...

Your Next Travel Essential? Why Aussies Love Lightweight Electric Wheelchairs

Planning for a trip or just getting around town? A lightweight electric wheelchair could be your perfect travel mate. Whether it’s a stroll throug...

Australian Study Woes – What is a Confirmation of Enrolment?

Recent changes to Australian study visas are altering the landscape for international students who want to learn and work on our shores.  To secur...

Metal lockers vs. wooden lockers: which is better?

Lockers—the ultimate background hero of the workplace. They might not have the flashiness of that overpriced espresso machine in the break room, b...

Invisalign Treatment: What Your Dentist Wants You to Know

When straightening the teeth, out-of-date metal braces are no longer the only option. Nowadays, Invisalign is among the most highly sought-after alt...

The Best Nail Art for Short Nails

Short nails often get overlooked in the world of nail art, but they’re actually the perfect canvas for stylish, sophisticated designs. Whether you...

How Much Does a Skip Bin Cost? Skip Bin Prices, Sizes & What Influences the Price

Regardless of whether you're renovating a house. You are tidying up your backyard, or running a construction site. Chances are you'll require a skip...

Panoramic Elevators: Combining Functionality with Aesthetic Appeal

In the evolving world of building design, the demand for architectural features that are both practical and visually striking continues to rise. One...

No Dig, No Drama: Sydney Pipe Relining Explained

You know that feeling when water starts pooling where it shouldn't? Or received a quote for pipe repairs that made your eyes water? Let's chat about...

The SEO Benefits of AI-Optimized Landing Pages: Smarter Metadata, Faster Load Times

Landing pages are integral to the conversion funnel in digital marketing. Yet, when SEO works well to drive traffic to the landing page, it's just a...

How to Reduce Turbo Lag with an Upgraded Mazda BT-50 Exhaust System

Are you struggling with turbo lag affecting your driving experience?  Did you know upgrading your Mazda BT-50 exhaust system could be the key to u...

How to Segment Email Lists Based on Content Engagement (Not Just Demographics)

Email segmentation generally refers to age, location, gender demographic, and conventional elements. While this could be helpful information, it doe...

6 Qualities to Look for in Local Caravan Dealers

If you're searching for reliable caravan dealers in Campbellfield, it's essential to choose a dealer that offers quality products, excellent custome...

How to Repair a Faema Coffee Machine: A Practical Guide for Coffee Lovers

Introduction If you’re the proud owner of a Faema coffee machine, you already know that it’s more than just a kitchen appliance — it’s a vi...

Smart Health Decisions in Your 30s, 40s, and 50s: The Ultimate Prevention Guide

Making informed health decisions becomes increasingly important as we navigate through different life stages. What may have seemed unimportant in our ...