Israel responded to a cyberattack with armed forces – but how should states be dealing with this threat?

States now have to deal with hackers who can potentially trigger major blackouts and nuclear meltdowns

Hackers are a threat to security systems worldwide
Hackers are a threat to security systems worldwide

Governments are becoming ever more reliant on digital technology, making them more vulnerable to cyberattacks. In 2007, Estonia was attacked by pro-Russian hackers who crippled government servers, causing havoc. Cyberattacks in Ukraine targeted the country’s electricity grid, while Iran’s nuclear power plants were infected by malware that could have led to a nuclear meltdown.

In the US, president Trump recently declared a “national emergency” to recognise the threat to US computer networks from “foreign adversaries”.

Politically motivated cyberattacks are becoming increasingly commonplace but unlike traditional warfare between two or more states, cyberwarfare can be launched by groups of individuals. On occasion, the state is actually caught in the crosshairs of competing hacking groups.

This doesn’t mean that states don’t actively prepare for such attacks. British defence officials have said they’re prepared to conduct cyberattacks against Moscow’s power grid, should Russia decide to launch an offensive.

In most cases, cyberwarfare operations have been conducted in the background, designed as scare tactics or displays of power. But the blending of traditional warfare and cyberwarfare seems inevitable – and a recent incident added a new dimension.

How to respond to cyberattacks

Israeli Defence Forces bombed a building allegedly housing Hamas hackers, after they had attempted to, according to the IDF, attack “Israeli targets” online. This is the first time a cyberattack has been met with physical force by a state’s military. But who is to blame and how should states respond when defending against cyberattacks?

Cyberattacks are a serious challenge for established laws of armed conflict. Determining the origin of an attack isn’t impossible, but the process can take weeks. Even when the origin can be confirmed, it may be difficult to establish that a state was responsible. This is especially true when cyberoperations could be perpetrated by hackers in other countries routing their attacks through different jurisdictions.

NATO experts have highlighted the issue in the Tallinn Manual on International Law Applicable to Cyberwarfare. There is no consensus on whether a state is responsible for a cyberattack originating from its networks if it did not have explicit knowledge of the attack. Failure to take appropriate measures to prevent an attack by a host state could mean that the victim state is entitled to respond through proportionate use of force in self defence. But if there’s uncertainty around who is to blame for the attack, any justification for a counter-attack is diminished.

Even if the problem of attribution is resolved, a state’s right to respond with force to a cyberattack would normally be prohibited. Article 2(4) of the UN Charter protects the territorial integrity and political structures of states from attack. This can be lawfully bypassed if a state can claim they’re defending themselves against an “armed attack”.

The International Court of Justice explains: “It will be necessary to distinguish between the most grave forms of the use of force (those constituting an armed attack) from other less grave forms.”

So a cyberattack would justify force as self-defence if it could be considered an “armed attack”. But is that possible? Only when the “scale” and “effect” of a cyberattack are comparable to an offline “armed attack”, such as attacks that lead to deaths and widespread damage to infrastructure. If so, self-defence is justified.

But what about when a cyberattack has been successfully targeted defensively? Then its effects can only be guessed at. This makes deciding a proportional response even trickier. Any physical force in this situation could be considered unnecessary and therefore, illegal. If an attack was imminent, however, an exception might be made for preemptive moves.

When self-defence is considered reasonably necessary, the nature of the force permitted can vary. Proportionate counter-attacks with conventional military weapons can be acceptable responses to cyber operations under international law.

These issues are only the start of the challenges posed by cyberwarfare, which will get more complicated as technology develops. The intellectual challenges this will generate are numerous, but we still can’t help but be fearful.

Support free-thinking journalism and attend Independent events

Societies face potentially devastating consequences from cyberwarfare as we become more reliant on information technologies and communication networks for everyday life – and we’re only just starting to ask questions about it.

Vasileios Karagiannopoulos is senior lecturer in law and cybercrime at the University of Portsmouth. Mark Leiser is an assistant professor of law and digital technologies at Leiden University. This article first appeared on The Conversation

Register for free to continue reading

Registration is a free and easy way to support our truly independent journalism

By registering, you will also enjoy limited access to Premium articles, exclusive newsletters, commenting, and virtual events with our leading journalists

Please enter a valid email
Please enter a valid email
Must be at least 6 characters, include an upper and lower case character and a number
Must be at least 6 characters, include an upper and lower case character and a number
Must be at least 6 characters, include an upper and lower case character and a number
Please enter your first name
Special characters aren’t allowed
Please enter a name between 1 and 40 characters
Please enter your last name
Special characters aren’t allowed
Please enter a name between 1 and 40 characters
You must be over 18 years old to register
You must be over 18 years old to register
Opt-out-policy
You can opt-out at any time by signing in to your account to manage your preferences. Each email has a link to unsubscribe.

By clicking ‘Create my account’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Already have an account? sign in

By clicking ‘Register’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Register for free to continue reading

Registration is a free and easy way to support our truly independent journalism

By registering, you will also enjoy limited access to Premium articles, exclusive newsletters, commenting, and virtual events with our leading journalists

Already have an account? sign in

By clicking ‘Register’ you confirm that your data has been entered correctly and you have read and agree to our Terms of use, Cookie policy and Privacy notice.

This site is protected by reCAPTCHA and the Google Privacy policy and Terms of service apply.

Join our new commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in