10TH UNITED NATIONS WORKSHOP ON SPACE LAW September 5-8, 2016

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Promoting Cooperative Solutions for Space Security 1 Is Current International Humanitarian Law Sufficient to Regulate a Potential.
7 th ESPI Autumn Conference Space in a Changing World Vienna September 2013 Steven Freeland Professor of International Law, University of Western.
The Ethics of War Spring Main normative questions When, if ever, is resort to war justified? What can we permissibly do in war? Who are responsible.
INTERNATIONAL LAW THE USE OF FORCE. THE PROHIBITION OF FORCE: Art 2 t 3. All Members shall settle their international disputes by peaceful means in such.
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
WebCast 5 May 2003 NERC Cyber Security Standard Overview of Proposed Cyber Security Standard.
An Ocean of Opportunity: An integrated maritime policy for the EU 1 Places of refuge: General legal framework and developments within IMO and the EU Alexandros.
USE OF FORCE IN INTERNATIONAL LAW
International Law Unit 9: Use of Force Fall 2005 Mr. Morrison.
ENVIRONMENTAL LIABILITY IN GREECE THE LEGAL FRAMEWORK & THE ROLE OF FINANCIAL GUARANTEES/ INSURANCE PRODUCTS TO COVER OPERATORS’ RESPONSIBILITIES UNDER.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
Space Systems as Critical Infrastructure Iulia-Elena Jivanescu 1st Space Retreat, Tenerife, Spain, 8-22 January, 2013.
A project implemented by the HTSPE consortium This project is funded by the European Union GLOBAL EUROPE INSTRUMENT FOR STABILITY
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
The NIGF CONFERENCE © 2013 ADDRESSING THE VULNERABILITY OF CRITICAL ICT INFRASTRUCTURE by Ernest Ndukwe, OFR Chairman Openmedia Communications Ltd 18 th.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
WebCast 5 May 2003 Proposed NERC Cyber Security Standard Presentation to IT Standing Committee Stuart Brindley, IMO May 26, 2003.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
International Law and the Use of Force (LG566) Topic 4: Self-Defence.
The Egyptian Nuclear & Radiological Regulatory Authority (ENRRA)
International Law in Military Operations: a NATO practitioner’s views Mr. Vincent Roobaert Senior Legal Advisor NATO Communications and Information Agency.
Colonel Chaipun Nilvises Deputy Director, Office of ASEAN Affairs Office of Policy and Planning Ministry of Defence of Thailand.
LEGALITY OF THE THREAT OR USE OF NUCLEAR WEAPONS ICJ, Advisory Opinion,
Brooke Smith-Windsor, Ph.D. ACA 13 May 2016 Brooke Smith-Windsor, Ph.D. ACA 13 May 2016 NATO, Interconnected Security Threats and the Politics of Perception.
Manfred Lachs International Conference on Conflicts in Space and the Rule of Law SPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES Deborah Housen-Couriel,
International Law and the Use of Force (LG566) Topic 1: Introduction.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
National Cybersecurity Strategies: Global Trends in Cyberspace Online Paper Presentation 2016 AU Graduate Student Conference September 17 Regner Sabillon,
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
RESPONSIBLE BEHAVIOUR OF A STATE IN CYBERSPACE
Robin “Sak” Sakoda Armitage International, L.C.
Chinese perspectives on space sustainable development goals
UNECE International Forum on Trade Facilitation
Crisis management related research at
Žilinská univerzita v Žiline Fakulta špeciálneho inžinierstva
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Agenda Control systems defined
Space Governance as a Driver for Sustainable Development
Cybersecurity Due Diligence
Moscow, Russia 29 September 2016
Ward Munters, doctoral researcher Prof. Dr. Jan Wouters, Director
HIRA This is the lesson objective.
P.J. Blount University of Mississippi School of Law
TCBMs in Space: A Role for Middle Powers
Institute of Air & Space Law, McGill University May 2016
Homeland Security v. Homeland Defense: The Big Gap
Cybersecurity in Belarus a general overview of support areas
Cyber Security coordination in Europe CERT-EU’s perspective
Bob Siegel President Privacy Ref, Inc.
The UN Ad Hoc Committee The process to draft a new human rights treaty for people with disabilities.
The Concept of a Legal Norm
Overview of working draft v. 29 January 2018
Legal Issues Critical to SSA
NERC Cyber Security Standard
Chapter 19 Transnational actors and international organizations in global politics Name: MA XINYUE Student No.:ID02403 Student No.:ID02403.
CRIME AGAINST THE STATE TERRORISM
Securing free and fair European elections
Kazuto Suzuki Hokkaido University
The norms on the use of force in a nutshell
Cyber Security & Outer Space
TECHNOLOGY UPENDS EXISTING LEGISLATIVE FRAMEWORKS
The International Legal Rules on the Use of Firearms by Law Enforcement Officials Model Presentation.
HIRA This is the lesson objective.
Chapter VII Article 41 The Security Council may decide what measures not involving the use of armed force are to be employed to give effect to its decisions,
Marleen De Smedt Geoffrey Thomas Cynthia Tavares
CONTRACTS AND (HARMFUL) INTERFERENCE PROFESSOR LESLEY JANE SMITH, LEUPHANA UNIVERSITY OF LÜNEBURG/ WEBER-STEINHAUS & SMITH BREMEN 3rd Luxembourg Workshop.
Deborah Housen-Couriel, ADV.
Introduction to IHL: Application and Basic Principles
Presentation transcript:

10TH UNITED NATIONS WORKSHOP ON SPACE LAW September 5-8, 2016 SPACE SECURITY AND CYBERSECURITY: INTERSECTING CHALLENGES Deborah Housen-Couriel Interdisciplinary Cyber Research Center, Tel Aviv University

FOCUS ON A CRITICAL NEXUS SATELLITE COMMUNICATIONS

HOSTILE CYBER OPERATIONS AGAINST JOINT POLAR SAT SYSTEM SPACE / GROUND SEGMENTS

NOT NEW / UNIQUE 1997 until present - Turla internet connection hacking group 2007-8 Landsat and Terra AM-1 hacks summer 2015 - alleged interference with Globalstar’s asset-tracking systems (+ South Korean fishermen) Ongoing NASA hacks – ground segment

TYPES OF CYBER-ENABLED DISRUPTIONS TO SAT COMM (via EM SPECTRUM) JAMMING MORPHING HIJACKING TT&C >> COLLISION ‘GRILLING’ TURLA-TYPE SIGNAL RE-ROUTING

VULNERABILITY THROUGHOUT THE SATELLITE LIFESPAN Pre-launch and launch TT&C Physical destruction or disabling Disruption of transmissions- full taxonomy End-of-life events, “crashes”

WORKING DEFINITION: HOSTILE DISRUPTION OF satCOmm Physical, cyber-enabled and hybrid disturbance to satellites and satellite communications, originating in a hostile intent to disrupt, damage or otherwise disturb their uninterrupted operation. “harmful interference” under ITU Constitution + RR also under Article IX of the OST [query]

THESE ARE HIGH-RISK SCENARIOS “Because of the criticality of satellite data to weather forecasting, the possibility of a satellite data gap, and the potential impact of a gap on the health and safety of the U.S. population and economy, we added this issue to GAO’s High Risk List in 2013 and it remained on the list in 2015.”

EXTRAPOLATING > LOSS-OF-LIFE SCENARIOS Extrapolate Reminding us of recent cyber attacks on German nuclear plant and Ukraine electric grid – other crit infrastructure Even NPT monitoring could be threat of loss of life scenario Avionisc Satellites / ground stations not necessarily considered critical infrastructure – they may be – they may not be

THE GROWING CRITICALITY AND URGENCY OF THE PROBLEM AT THE NEXUS ‘PEACEFUL USE’ ISSUES COLLECTIVE SECURITY ISSUES SPACE SECURITY (LAW, POLICY, GOVERNANCE) CYBERSECURITY (EMERGING LEGAL NORMS, POLICY) CONCEPTUAL / NORMATIVE ISSUES LIABILITY ISSUES STATE PRACTICE NOT TRANSPARENT SATELLITE CONTROL OF CRITICAL INFRASTRUCTURE >> VULNERABILITIES

4 COMMON CORE CHALLENGES 1 CHANGING ACTORS / STAKEHOLDERS 2 DUAL-USE TECHNOLOGIES 3 LACK OF NAT’L POLICY TRANSPARENCY 4 LACK OF EFFECTIVE INTN’L COOPERATION

ONGOING AND PERVASIVE NON-ENGAGEMENT HOW IS THE INTERNATIONAL LEGAL COMMUNITY MEETING THIS CHALLENGE AT THE NEXUS OF THE TWO REGIMES? ONGOING AND PERVASIVE NON-ENGAGEMENT

SPACE + CYBER GGE’s 2013 2015

SHANGHAI CODE OF CONDUCT Network Security Directive, 2013 GGE SPACE 2013 SHANGHAI PPWT June 2014 (rev) EU CODE OF CONDUCT March 2014 (rev) Other initiatives: Canada Proposal, CD, June 2009; ITU-R; UNGA 69/32, 2014; Working Group on 5 Treaties, 2016 GGE CYBER 2015 SHANGHAI CODE OF CONDUCT January 2015 (rev) EU / CoE Network Security Directive, 2013 Budapest Convention, 2001 Tallinn Manuals 1 & 2 Inside and outside of UN frameworks New blocs Revised versions

THIS IS NOT ONLY A PROCEDURAL OR GOVERNANCE CHALLENGE… IT’S A SUBSTANTIVE ONE.

AT WHAT THRESHOLDS DO HOSTILE SATCOMM DISRUPTIONS BRIEF CASE STUDY AT WHAT THRESHOLDS DO HOSTILE SATCOMM DISRUPTIONS AN ILLEGAL USE OF FORCE IN SPACE AND CYBERSPACE?

APPLICABILITY OF INTERNATIONAL LAW IN CYBERSPACE G7 / G20 PRINCIPLES AND ACTIONS ON CYBER, 2016 -- NATO, article 5 -- US, UK, NL

All members shall refrain …from the threat or use of force against the territorial integrity or political independence of any state... UN 2(4)

Nothing in the present Charter shall impair the inherent right of …self- defense if an armed attack occurs against a Member of the UN... UN 51

ANTICIPATORY / PRE-EMPTIVE SELF-DEFENCE “No state can be expected to await an initial attack which…may well destroy the state’s capacity for further resistance and so jeopardize its very existence.” Derek Bowett, 1958 Osirak ANTICIPATORY / PRE-EMPTIVE SELF-DEFENCE

2013 LEADING EXPERT AUTHORITIES NOT STATES (FOR GOOD REASON) INTERNATIONAL LAW AND COLLECTIVE SECURITY APPLY STATES’ DE FACTO ACKNOWLEDGEMENT

RULE 30: “CYBER ATTACK” A cyber attack is a cyber operation, whether offensive or defensive, that is reasonably expected to cause injury or death to persons or damage or destruction to objects.

RULE 11: “USE OF FORCE” A cyber operation constitutes a use of force when its scale and effects are comparable to non- cyber operations rising to the level of a use of force. (ICJ Nicaragua 1986)

A decision as to when a cyber attack would lead to the invocation of Article 5 would be taken…on a case-by-case basis. Cyber attacks … could be as harmful to modern societies as a conventional attack … cyber defence is part of NATO's core task of collective defence.

HARMFUL DISRUPTION VULNERABILITIES: CYBER ATTACKS ON SATELLITE COMMS CAN CONSTITUTE PROHIBITED USES OF FORCE Pre-launch and launch TT&C Physical destruction or disabling Disruption of transmissions- full taxonomy End-of-life events, “crashes”

SUMMING UP Hostile disturbances to satellite transmissions constitute real threats and challenges, with significant ramifications for collective security. These challenges intersect because satellite communications are cyber operations. Beyond operative and governance issues, there are important normative overlaps. While there’s some intergov’t progress re admin measures – TCBMs, BPs (GGE’s)…

1 2 Insufficient awareness of the operational and normative overlaps The necessary and critical conversation between these 2 legal regimes has yet to begin

NEXT STEPS: WHAT’S TO BE DONE AND WHO SHOULD DO IT? CONSIDER HOW TO MOVE JOINTLY FROM TCBMs TO SUBSTANTIVE NORMS AS NORMATIVE WORK IS ONGOING – IDENTIFY AND SHARE BEST PRACTICES (ENCRYPTION) MERGE WORK PROCESSES OF RELEVANT INTER-GOV’T INITIATIVES (CO-COMMITTEES, CONFERENCES) CRITICAL CHALLENGES FOR LEGAL AND POLICY COMMUNITIES Paralllells with the challenges that Sgobba described re global space traffic management – no one wants to discuss jurisdictional issues because they want to maintain freedom of action

“DE-SILO”

THANK YOU. deborah@cyberregstrategies.com