SlideShare a Scribd company logo
1 of 18
Cyber Warfare Law
and the Tallinn Manual
by
William H. Boothby
Copyright for this presentation belongs to Bill Boothby. The presentation is not to be copied
in whole or in part without his prior written permission.
What are we talking about?
 Cyber will have a role in warfare
 Is this the new wild west?
 Tallinn Manual Process and the role of
NATO CCD COE, Tallinn
 Tallinn Manual is not a source of law
 Opinions differ – China/Russia speak
of information space
GGE process
 GGE members agree states should:
1. Abide by international law in cyberspace
2. Honour state responsibility norms for
cyber attacks from their territory
3. Develop confidence building measures
4. Build capacity to enable developing
countries to protect networks and citizens
– 2013
Context
 Prohibition on the use of force – UN
Charter art 2(4)
 Most grave forms = armed attack
 Inherent right of individual or
collective self defence
 Underlying principle that states
should resolve their differences
peaceably
 Sensible to apply this to cyber?
Cyber hostilities
ICJ said IHL applies “to any use
of force regardless of the
weapons employed” Nuclear
Weapons Advisory Opinion, para 39
ICJ also said distinction is a
‘cardinal’ principle Nuclear Weapons
Advisory Opinion, para 78
Principle of distinction
“…the Parties to the conflict shall
at all times distinguish between
the civilian population and
combatants and between civilian
objects and military objectives
and accordingly shall direct their
operations only against military
objectives” – API, art 48
Principle of distinction 2
Attacks = acts of violence against
adversary, in offence or defence
– art 49(1), Additional Protocol I
Notion of violent consequences
Enables application of detailed
targeting law
Issue is HOW rules apply
Principle of distinction 3
 So, indiscriminate attacks, including
undirected attacks, prohibited
 Cyber attackers must take
precautions
 Constant care and specific rules for
planners and those who decide upon
attacks….AND
 Precautions against the effects of
attacks
Cyber weapons – myth or
sensible?
 No legal definition of weapon
 Used, designed or intended to be
used to apply an offensive
capability to an enemy person or
object
 If ‘cyber weapon’ makes sense
weapons law applies
Implications for cyber
weapons/attack procedures
 To attack without doing anything to
verify unlawful
 To attack without considering civilian
consequences also unlawful
 Can we cyber map without disclosing
our intentions?
 Can we know we have the right target
without cyber mapping?
 Can we know collateral dangers without
cyber mapping?
 Battle damage assessment advisable
Implications for those in control
 Take precautions early
 Segregate military and civilian
networks if possible
 Segregate critical infrastructure
from Internet if possible
 Reinforce control of entry in light of
known vulnerabilities – fingerprints
seem inadequate
 Which of our systems is liable to be
attacked?
Precautions against attack
effects - contd
 Are techies on duty 24/7 during
period of danger to reboot/repair
as necessary
 Backing up
 Anti-virus/patching etc
arrangements in place and always
up to date
Weapons law implications
 Superfluous injury principle applies
 Is cyber weapon indiscriminate by
nature? Stuxnet?
 No ad hoc weapons law rule on
cyber
 Is the cyber weapon capable of use
iaw Targeting Law?
The Future
Cyber deception operations
Law distinguishes deception as to
protected status (illegal) and ruses
(lawful)
Future priority = reliability of information,
robustness of systems, indications of
intrusions, indications of implications of
tampering for data reliability
Will wars be won by the most effective
liar?
The Future 2
 Major disruption (without actual
damage) = attack?
 Notion of ‘damage’ to include damage to
data?
 If treaty law on cyber unlikely, legal
development requires customary law
through state practice. Consider …
 Tallinn Manual and GGE processes
Role of states
 States make international law
 Regional responses to Tallinn
Manual and GGE processes can
drive law forward
 States can/should develop own
legal interpretations
The ‘Balkanisation’ risk
 National ‘Information space’ notion
could jeopardise free access for all
 BUT
 All states have an interest in
maintaining national cyber security
 SO
 Can states agree on when control
of access to information ceases to
be legitimate?
Questions?

More Related Content

What's hot

State Jurisdiction under International Criminal Law
State Jurisdiction under International Criminal LawState Jurisdiction under International Criminal Law
State Jurisdiction under International Criminal LawUniversity of Rajshahi
 
Artificial Intelligence and the Law of Armed Conflict
Artificial Intelligence and the Law of Armed ConflictArtificial Intelligence and the Law of Armed Conflict
Artificial Intelligence and the Law of Armed ConflictDr. Lydia Kostopoulos
 
International law and_the_use_of_force
International law and_the_use_of_forceInternational law and_the_use_of_force
International law and_the_use_of_forceStudsPlanet.com
 
Lwn158 seminar 6 2016
Lwn158 seminar 6 2016Lwn158 seminar 6 2016
Lwn158 seminar 6 2016hollyranae
 
of Autonomous Weapons System in the Light of Principles of International Huma...
of Autonomous Weapons System in the Light of Principles of International Huma...of Autonomous Weapons System in the Light of Principles of International Huma...
of Autonomous Weapons System in the Light of Principles of International Huma...mahee tori
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
Eff presentation on_tp_ms_and_civil_rights_sd
Eff presentation on_tp_ms_and_civil_rights_sdEff presentation on_tp_ms_and_civil_rights_sd
Eff presentation on_tp_ms_and_civil_rights_sdCarolina Rossini
 
TRIPs Treaty and Computer Programs
TRIPs Treaty and Computer ProgramsTRIPs Treaty and Computer Programs
TRIPs Treaty and Computer ProgramsRamanraj K
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacyblogzilla
 
OUTLINE FOR INTERNATIONAL LAW
OUTLINE FOR INTERNATIONAL LAWOUTLINE FOR INTERNATIONAL LAW
OUTLINE FOR INTERNATIONAL LAWsuzi smith
 
Lwn158 seminar 9 2016
Lwn158 seminar 9 2016Lwn158 seminar 9 2016
Lwn158 seminar 9 2016hollyranae
 
Jurisdiction active and passive personality, protective principle and
Jurisdiction active and passive personality, protective principle andJurisdiction active and passive personality, protective principle and
Jurisdiction active and passive personality, protective principle andAbsar Aftab Absar
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international lawblogzilla
 
Take home test il
Take home test ilTake home test il
Take home test ilFAROUQ
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issuesGeritt Contillo
 
Lwn158 seminar 10
Lwn158 seminar 10 Lwn158 seminar 10
Lwn158 seminar 10 hollyranae
 

What's hot (20)

State Jurisdiction under International Criminal Law
State Jurisdiction under International Criminal LawState Jurisdiction under International Criminal Law
State Jurisdiction under International Criminal Law
 
Riot
RiotRiot
Riot
 
Artificial Intelligence and the Law of Armed Conflict
Artificial Intelligence and the Law of Armed ConflictArtificial Intelligence and the Law of Armed Conflict
Artificial Intelligence and the Law of Armed Conflict
 
International law and_the_use_of_force
International law and_the_use_of_forceInternational law and_the_use_of_force
International law and_the_use_of_force
 
Lwn158 seminar 6 2016
Lwn158 seminar 6 2016Lwn158 seminar 6 2016
Lwn158 seminar 6 2016
 
of Autonomous Weapons System in the Light of Principles of International Huma...
of Autonomous Weapons System in the Light of Principles of International Huma...of Autonomous Weapons System in the Light of Principles of International Huma...
of Autonomous Weapons System in the Light of Principles of International Huma...
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Eff presentation on_tp_ms_and_civil_rights_sd
Eff presentation on_tp_ms_and_civil_rights_sdEff presentation on_tp_ms_and_civil_rights_sd
Eff presentation on_tp_ms_and_civil_rights_sd
 
TRIPs Treaty and Computer Programs
TRIPs Treaty and Computer ProgramsTRIPs Treaty and Computer Programs
TRIPs Treaty and Computer Programs
 
Security technology and democratic legitimacy
Security technology and democratic legitimacySecurity technology and democratic legitimacy
Security technology and democratic legitimacy
 
OUTLINE FOR INTERNATIONAL LAW
OUTLINE FOR INTERNATIONAL LAWOUTLINE FOR INTERNATIONAL LAW
OUTLINE FOR INTERNATIONAL LAW
 
Individual protection vs national security
Individual protection vs  national securityIndividual protection vs  national security
Individual protection vs national security
 
Lwn158 seminar 9 2016
Lwn158 seminar 9 2016Lwn158 seminar 9 2016
Lwn158 seminar 9 2016
 
Jurisdiction active and passive personality, protective principle and
Jurisdiction active and passive personality, protective principle andJurisdiction active and passive personality, protective principle and
Jurisdiction active and passive personality, protective principle and
 
بحث حول قانون الارهاب En
بحث حول قانون الارهاب En   بحث حول قانون الارهاب En
بحث حول قانون الارهاب En
 
Digital freedoms in international law
Digital freedoms in international lawDigital freedoms in international law
Digital freedoms in international law
 
Villard WritingSample Cybersecurity and International Law
Villard WritingSample Cybersecurity and International LawVillard WritingSample Cybersecurity and International Law
Villard WritingSample Cybersecurity and International Law
 
Take home test il
Take home test ilTake home test il
Take home test il
 
Symposium on social issues
Symposium on social issuesSymposium on social issues
Symposium on social issues
 
Lwn158 seminar 10
Lwn158 seminar 10 Lwn158 seminar 10
Lwn158 seminar 10
 

Similar to Dr William Boothby

2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...Ethan S. Burger
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Adriana Dvorsak
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptFranciscoJoaoVitug
 
The Legalities of CyberWarfare
The Legalities of CyberWarfareThe Legalities of CyberWarfare
The Legalities of CyberWarfareAdam Kinder
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or governmentM S Siddiqui
 
Application of IHL to Computer Network Attacks
Application of IHL to Computer Network AttacksApplication of IHL to Computer Network Attacks
Application of IHL to Computer Network AttacksKonstantin Yakovlev
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Pranav Gupta
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Benjamin Ang
 
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Benjamin Ang
 
Ames -- Memo (Cyber)
Ames -- Memo (Cyber)Ames -- Memo (Cyber)
Ames -- Memo (Cyber)Kyle Ames
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesDrSamsonChepuri1
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinAFCEA International
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document LeAnn Rhodes
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 

Similar to Dr William Boothby (20)

2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...
 
Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...Application of principles of international law to computer networks operation...
Application of principles of international law to computer networks operation...
 
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.pptPresentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
Presentation_on_protection_of_reporting_persons_UNCAC_LP.ppt
 
The Legalities of CyberWarfare
The Legalities of CyberWarfareThe Legalities of CyberWarfare
The Legalities of CyberWarfare
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
Application of IHL to Computer Network Attacks
Application of IHL to Computer Network AttacksApplication of IHL to Computer Network Attacks
Application of IHL to Computer Network Attacks
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism
 
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...Framework of responsible state behaviour in cyberspace - for Marshall Center ...
Framework of responsible state behaviour in cyberspace - for Marshall Center ...
 
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
Cyber norms (b) and (c) United Nations Singapore Cyber Programme 2019
 
Cyber2
Cyber2Cyber2
Cyber2
 
Ames -- Memo (Cyber)
Ames -- Memo (Cyber)Ames -- Memo (Cyber)
Ames -- Memo (Cyber)
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
UNPO.pptx
UNPO.pptxUNPO.pptx
UNPO.pptx
 
CYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal PerspectivesCYBER SECURITY :Cyber Law – The Legal Perspectives
CYBER SECURITY :Cyber Law – The Legal Perspectives
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 

Recently uploaded

YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfyalehistoricalreview
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Christina Parmionova
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhellokittymaearciaga
 
DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024Energy for One World
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...narwatsonia7
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...ankitnayak356677
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urgesnarwatsonia7
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...narwatsonia7
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...ResolutionFoundation
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...narwatsonia7
 
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalorenarwatsonia7
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27JSchaus & Associates
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012rehmti665
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...narwatsonia7
 

Recently uploaded (20)

YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdfYHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
YHR Fall 2023 Issue (Joseph Manning Interview) (2).pdf
 
Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.Action Toolkit - Earth Day 2024 - April 22nd.
Action Toolkit - Earth Day 2024 - April 22nd.
 
history of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptxhistory of 1935 philippine constitution.pptx
history of 1935 philippine constitution.pptx
 
DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024DNV publication: China Energy Transition Outlook 2024
DNV publication: China Energy Transition Outlook 2024
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
Russian Call Girl Hebbagodi ! 7001305949 ₹2999 Only and Free Hotel Delivery 2...
 
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
Greater Noida Call Girls 9711199012 WhatsApp No 24x7 Vip Escorts in Greater N...
 
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual UrgesCall Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
Call Girl Benson Town - Phone No 7001305949 For Ultimate Sexual Urges
 
The Federal Budget and Health Care Policy
The Federal Budget and Health Care PolicyThe Federal Budget and Health Care Policy
The Federal Budget and Health Care Policy
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
No.1 Call Girls in Basavanagudi ! 7001305949 ₹2999 Only and Free Hotel Delive...
 
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...Powering Britain: Can we decarbonise electricity without disadvantaging poore...
Powering Britain: Can we decarbonise electricity without disadvantaging poore...
 
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
High Class Call Girls Bangalore Komal 7001305949 Independent Escort Service B...
 
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
9953330565 Low Rate Call Girls In Adarsh Nagar Delhi NCR
 
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service BangaloreCall Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
Call Girls Bangalore Saanvi 7001305949 Independent Escort Service Bangalore
 
2024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 272024: The FAR, Federal Acquisition Regulations - Part 27
2024: The FAR, Federal Acquisition Regulations - Part 27
 
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
Call Girls Connaught Place Delhi reach out to us at ☎ 9711199012
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
Premium Call Girls Btm Layout - 7001305949 Escorts Service with Real Photos a...
 

Dr William Boothby

  • 1. Cyber Warfare Law and the Tallinn Manual by William H. Boothby Copyright for this presentation belongs to Bill Boothby. The presentation is not to be copied in whole or in part without his prior written permission.
  • 2. What are we talking about?  Cyber will have a role in warfare  Is this the new wild west?  Tallinn Manual Process and the role of NATO CCD COE, Tallinn  Tallinn Manual is not a source of law  Opinions differ – China/Russia speak of information space
  • 3. GGE process  GGE members agree states should: 1. Abide by international law in cyberspace 2. Honour state responsibility norms for cyber attacks from their territory 3. Develop confidence building measures 4. Build capacity to enable developing countries to protect networks and citizens – 2013
  • 4. Context  Prohibition on the use of force – UN Charter art 2(4)  Most grave forms = armed attack  Inherent right of individual or collective self defence  Underlying principle that states should resolve their differences peaceably  Sensible to apply this to cyber?
  • 5. Cyber hostilities ICJ said IHL applies “to any use of force regardless of the weapons employed” Nuclear Weapons Advisory Opinion, para 39 ICJ also said distinction is a ‘cardinal’ principle Nuclear Weapons Advisory Opinion, para 78
  • 6. Principle of distinction “…the Parties to the conflict shall at all times distinguish between the civilian population and combatants and between civilian objects and military objectives and accordingly shall direct their operations only against military objectives” – API, art 48
  • 7. Principle of distinction 2 Attacks = acts of violence against adversary, in offence or defence – art 49(1), Additional Protocol I Notion of violent consequences Enables application of detailed targeting law Issue is HOW rules apply
  • 8. Principle of distinction 3  So, indiscriminate attacks, including undirected attacks, prohibited  Cyber attackers must take precautions  Constant care and specific rules for planners and those who decide upon attacks….AND  Precautions against the effects of attacks
  • 9. Cyber weapons – myth or sensible?  No legal definition of weapon  Used, designed or intended to be used to apply an offensive capability to an enemy person or object  If ‘cyber weapon’ makes sense weapons law applies
  • 10. Implications for cyber weapons/attack procedures  To attack without doing anything to verify unlawful  To attack without considering civilian consequences also unlawful  Can we cyber map without disclosing our intentions?  Can we know we have the right target without cyber mapping?  Can we know collateral dangers without cyber mapping?  Battle damage assessment advisable
  • 11. Implications for those in control  Take precautions early  Segregate military and civilian networks if possible  Segregate critical infrastructure from Internet if possible  Reinforce control of entry in light of known vulnerabilities – fingerprints seem inadequate  Which of our systems is liable to be attacked?
  • 12. Precautions against attack effects - contd  Are techies on duty 24/7 during period of danger to reboot/repair as necessary  Backing up  Anti-virus/patching etc arrangements in place and always up to date
  • 13. Weapons law implications  Superfluous injury principle applies  Is cyber weapon indiscriminate by nature? Stuxnet?  No ad hoc weapons law rule on cyber  Is the cyber weapon capable of use iaw Targeting Law?
  • 14. The Future Cyber deception operations Law distinguishes deception as to protected status (illegal) and ruses (lawful) Future priority = reliability of information, robustness of systems, indications of intrusions, indications of implications of tampering for data reliability Will wars be won by the most effective liar?
  • 15. The Future 2  Major disruption (without actual damage) = attack?  Notion of ‘damage’ to include damage to data?  If treaty law on cyber unlikely, legal development requires customary law through state practice. Consider …  Tallinn Manual and GGE processes
  • 16. Role of states  States make international law  Regional responses to Tallinn Manual and GGE processes can drive law forward  States can/should develop own legal interpretations
  • 17. The ‘Balkanisation’ risk  National ‘Information space’ notion could jeopardise free access for all  BUT  All states have an interest in maintaining national cyber security  SO  Can states agree on when control of access to information ceases to be legitimate?