• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD HOMELAND SECURITY UPDATE

July 21, 2017 by

Sponsored by Spectra Cyber Security Solutions

Cyber Security Solutions


——————————————————————-
20 Jul 17. We Need Cyberwar Rules of Engagement Now. The U.S. and Russia need to agree on basic notions, such as what constitutes an attack, as opposed to a mere nuisance. Today, Russia and the U.S. are engaged in creeping cyberwarfare against each other, and they may well be working to disable or undermine each other’s critical infrastructure. The conflict is potentially deadly and, unlike military interactions between the two adversaries, not subject to even the most rudimentary rules or mutual arrangements. That needs to be fixed, and although a multilateral process under the auspices of the United Nations or the G-20 would be preferable, a bilateral working group, of the kind proposed by Russian President Vladimir Putin during his recent meeting with U.S. counterpart Donald Trump, could be a useful start. The greatest tension in cyberspace today is between the U.S. and Russia; the two can lead the way in defusing it. They have experience doing so on nuclear disarmament after taking the world to the brink of catastrophe. An agreement could serve as a blueprint for a multilateral convention or other bilateral deals—say, with China, which has been known to take an interest in U.S. networks. Countries need to agree on basic notions, such as what constitutes an attack or an illegal intervention, as opposed to a mere nuisance, and what retaliatory moves are legitimate or excessive. An informal but highly authoritative attempt to lay out the issues has already been made. Earlier this year, NATO’s Cooperative Cyber Defense Center of Excellence presented the second edition of the so-called Tallinn Manual, a detailed exploration of current international law as it applies to cyberwarfare. The authors, 19 academics and international law practitioners led by Michael Schmitt of the U.S. Naval War College, had started compiling the manual in 2009 in response to massive Russian cyberattacks on Estonia and then on Georgia during the brief Russo-Georgian conflict. They identified 154 existing rules, but the manual isn’t an official document—it reflects only the authors’ understanding of the law. Within the framework laid out in the Tallinn Manual, the interference U.S. intelligence services ascribe to Russia in the 2016 presidential election wouldn’t qualify as illegal intervention. The activity—spying, “criticism, public diplomacy, propaganda, retribution, mere maliciousness”—wasn’t meant to coerce Americans, who still chose their president freely. Stealing Democratic Party functionaries’ emails, however, would be illegal because it violated their right to privacy. The U.S. would be justified in retaliating—or, in the manual’s legal language, taking “countermeasures.” The scope of such measures, however, would be limited: Any actions that violate fundamental human rights wouldn’t be allowed. The Tallinn Manual’s authors couldn’t agree on whether violating privacy would be permissible as a countermeasure. To retaliate for the election interference, President Barack Obama, the Washington Post reported, ordered U.S. intelligence services to place “implants” in Russian networks “important to the adversary and that would cause them pain and discomfort if they were disrupted.” Activating the implants probably wouldn’t wash under the Tallinn Manual, because it would be a disproportional response. We often use “cyberattack” indiscriminately to describe any kind of intrusion. The Tallinn Manualuses the word “attack” only for cyber operations “reasonably expected to cause injury or death to persons or damage or destruction to objects.” Shutting down a power grid, taking over a city’s traffic light system, or cutting off mobile communications to an area would qualify as an attack because of real-world consequences. It would also be an illegal attack, because it would target civilians, somet

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT