Modern Australian
The Times Real Estate

.

Is counter-attack justified against a state-sponsored cyber attack? It's a legal grey area

  • Written by Sandeep Gopalan, Pro Vice-Chancellor (Academic Innovation) & Professor of Law, Deakin University
Is counter-attack justified against a state-sponsored cyber attack? It's a legal grey area

On March 23, the US Department of Justice commenced perhaps the largest prosecution of a state-sponsored cyber attack. It indicted nine Iranians for carrying out:

a coordinated campaign of cyber intrusions into computer systems belonging to 144 US universities, 176 universities across 21 foreign countries, 47 domestic and foreign private sector companies … [and] the United Nations…

At least 31.5 terabytes of data was allegedly stolen and Australian universities were targeted, although specific institutions are not named.

History suggests that this response is unlikely to deter future attacks, and that counter-attacks are a more effective strategy. But would it be justified? Current international law focuses on armed attack, not cyber attack as a justification for state action taken in self-defence.

As cyber attacks become more common, international law needs to clear up this grey area.

How they did it and what was taken

The indictment alleges that defendants Gholamreza Rafatnejad and Ehsan Mohammadi are founders of Mabna Institute – an organisation established for the purpose of scientific espionage. Mabna is alleged to have contracted with Iranian governmental agencies (including the Islamic Revolutionary guard) to conduct hacking on their behalf.

Read more: Following the developing Iranian cyberthreat

The defendants allegedly engaged in a conspiracy to compromise computer accounts of thousands of professors to steal research data and intellectual property, costing the US approximately US$3.4 billion. They allegedly conducted surveillance and sent professors targeted “spearphishing” emails to lure them into providing access to their computer systems.

Valuable data was transferred from the compromised IT systems to the hackers, according the the indictment. Over 100,000 professors were apparently targeted and approximately 8,000 email accounts compromised.

Private companies were also targeted – none Australian – via “password spraying”, said the US Department of Justice. This is a technique whereby the attacker identifies the email accounts of a target via public search and gains access to the account using common or default passwords.

Prosecution is an insufficient response

The defendants are charged with committing fraud and related activity in connection with computers, conspiracy, wire fraud, unauthorised access of a computer, and identity theft. Each charge carries a prison sentence ranging from two years to 20 years.

The prosecution is a necessary, but insufficient response to these cyber attacks.

The defendants are based in Iran and are unlikely to be brought to justice. Previously, US prosecutors have charged Iranian hackers with attacks against financial institutions and a dam in New York to no avail.

And hacking has escalated – the US accused Russia of compromising the US electricity grid and attacks against other countries are also alleged.

Counter-attack a better deterrent

Rogue states such as Iran, Russia, and North Korea are only likely to be deterred against conducting cyber attacks if their targets have robust self-defense and counter-attack capabilities. However, the legal status of cyber attacks and the appropriate responses are not clear in international law.

Under the UN Charter, states have an obligation to refrain “from the threat or use of force against the territorial integrity or political independence of any state”. Crucially, states possess an “inherent right of individual or collective self-defence if an armed attack occurs”.

Read more: Cybersecurity of the power grid: A growing challenge

The key questions then are whether a cyber attack amounts to a “use of force”, whether hacking attributable to a state amounts to an “armed attack”, and if a cyber attack violates “territorial integrity”. Traditionally, international law has answered these questions with reference to acts of physical violence – conventional military strikes.

It’s likely that a large scale cyber attack against a state that has physical consequences within its territory may be characterised as a “use of force”, and may violate “territorial integrity” under the charter. For instance, attacks that turn self-driving cars into weapons, knock out nuclear stations or paralyse the power grid might reach this threshold.

But what if the attack is designed to sow confusion or generate internal discord, such as in the case of Russian hacking of the US election? Or attacks directed beyond a particular country? This is a harder question and not settled currently. Similarly, it’s not certain that even large scale hacking would rise to the level of an “armed attack”.

Precedent in international law

In 1984, Nicaragua brought proceedings against the US in response to American support for the Contras (rebels fighting the government). In that case, the International Court of Justice (ICJ) opined that armed attack might also include:

the sending by a State of armed bands on to the territory of another State, if such an operation, because of its scale and effects, would have been classified as an armed attack had it been carried out by regular armed forces.

Crucially, the ICJ underlined the principle of non-intervention:

Intervention is wrongful … [using] methods of coercion, particularly force, either in the direct form of military action or in the indirect form of support for subversive activities in another State.

Based on the Nicaragua case, if a cyber attack has sufficient “scale and effects” it may amount to an armed attack. More importantly, if the attacks are attributable to a state (in this case the Islamic Revolutionary Guard) – or are within its overall or effective control or direction – it would appear that the armed attack would give rise to the right to self-defence.

Read more: Cyber peacekeeping is integral in an era of cyberwar – here's why

However, this may be difficult to establish in practice – there may not be sufficient evidence connecting the hacker to the state to show control, and hence attribution.

So, what are the permissible self-defence responses under international law? Could the US launch military strikes against Iran or Russia for these incidents if they are found to be behind these attacks? The legality of such strikes is not clear even though the US might claim such status.

The international community should set bright line rules on this matter before an expansive reading of self-defence triggers war. The NATO Cooperative Cyber Defence Centre of Excellence’s Tallinn Manual 2.0 is a start, but a binding instrument is needed. John Bolton’s appointment as US President Donald Trump’s National Security Advisor makes this an urgent priority because a military strike in response to the next major cyber attack is a realistic prospect.

Authors: Sandeep Gopalan, Pro Vice-Chancellor (Academic Innovation) & Professor of Law, Deakin University

Read more http://theconversation.com/is-counter-attack-justified-against-a-state-sponsored-cyber-attack-its-a-legal-grey-area-94023

Managed IT Services for Australian Retailers

Australian retailers are constantly being compelled to deliver flawless customer experiences with tight security measures. Managed IT services, or M...

What to Consider When Looking for Family Lawyers in Brisbane

Family law issues can be deeply personal and emotionally charged, making it important to choose the right family lawyers in Brisbane. Whether you're...

Construction and Surveying: The Foundation of Modern Infrastructure

Precision and accuracy are the name of the game in construction. Construction and surveying are crucial disciplines that most public members remain ...

Why the Demand for Tutors is Growing Across Australia

As the academic stakes rise each year, students across Australia are increasingly turning to tutors to maximise their chances of success. But why the ...

House Movers in Perth: Tips for a Successful Relocation

Moving houses can be exciting, but it can also be an overwhelming process. The mere anticipation of packing up your life and transporting it somewhe...

Why Rental Property Inspections Are Important for Tenants and Landlords

Regular property inspection is one of the key components of a smooth rental experience, benefitting both the tenant and the landlord.  Experts sugge...

Beer Label Design for New Breweries: Where to Start in 2025

Imagine a customer picking up your beer based purely on its striking label. In a crowded market full of craft brews and new brands, first impression...

Functional and Fashionable: The Rise of Ladies Workwear in Australia

A perfect change in the Australian workforce has been happening in recent days. Women are contributing a lot in the male-dominated workplaces. They ...

Concrete Trailer Pump for Sale: Your Ultimate Solution for Efficient Concrete Placement

In construction projects where efficiency, precision, and flexibility are paramount, concrete trailer pumps for sale stand out as an essential piece...

Exploring Different Types of Solar Panels: Monocrystalline, Polycrystalline, and Thin-Film

The demand for solar energy continues to grow as more Australians embrace sustainable energy solutions. A crucial step in transitioning to solar pow...

Common Mistakes in Food and Wine Pairing (And How to Avoid Them)

Pairing food and wine is often considered an art, but it doesn’t have to be intimidating. The right pairing can elevate a dining experience, while...

Wine Tasting 101: A Beginner’s Guide to Smelling, Swirling, and Sipping

Wine tasting is an art form that can seem daunting to beginners, but with a little knowledge and a lot of enthusiasm, anyone can master the basics. ...

How to Fix a Clogged Shower Drain: Tips for Homeowners

A clogged shower drain is a common household issue that can be both frustrating and inconvenient. Over time, hair, soap scum, and other debris can a...

Top Trends in Electric Recliner Sofas for 2024

Electric recliner sofas have taken center level in the world of furniture layout, combining consolation, comfort, and superior generation. As we pas...

Setting Up the Perfect Home Studio for Drummers

Creating the perfect home studio for drumming is a fulfilling project that goes beyond just having a space to practice. A well-designed studio can a...

Essential Guide to Surveying Services for Land and Construction

Surveying is indispensable in all land development, real estate transactions, and construction. The core of surveys, including metric geodetic and pre...

A Step in the Right Direction: Choosing the Best Nursing Shoes and Socks for Australian Healthcare Workers

Australian healthcare professionals need to work long hours for the people. They have to be on their feet in demanding situations. So, it will be ne...

Understanding Modern Art Movements – Surrealism, Cubism, and Beyond

Modern art movements have always challenged conventions, pushing the boundaries of creativity and expression. From the fragmented perspectives of Cu...