Writing the Rules of Cyberwar Karl Rauscher IEEE Spectrum December 2013 IS 376 November 11, 2014.

Slides:



Advertisements
Similar presentations
SESSION 5: INTERNATIONAL HUMANITARIAN LAW
Advertisements

Promoting Cooperative Solutions for Space Security 1 Is Current International Humanitarian Law Sufficient to Regulate a Potential.
Michael Lacewing Can war be just? Michael Lacewing © Michael Lacewing.
Just War Theory.
The Red Cross Red Crescent Movement
The Ethics of War Spring Main normative questions When, if ever, is resort to war justified? What can we permissibly do in war? Who are responsible.
Overview of International Humanitarian Law ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
1 I I Is Pre-Emptive War Wrong?. 2 Phillips’ Central Claim On the principle that just war requires both justice in going to war (jus ad bellum) and justice.
Chapter 4: Principles.
The International Law of Armed Conflict: An Overview
Journal 5: Just War? MLA Format 350 Words or More.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Internal Armed Conflict and the Law
Rob Gaston 04/04/2013 CIS 150. Cyber Warfare  U.S. government security expert Richard A. Clarke, Cyber War (May 2010): "cyber warfare" is "actions by.
The Law of Armed Conflict in Practice: Prima-facie Charges & New Defenses The charging of Iraqi insurgents with war crimes and the defense theories that.
The Geneva Conventions and Human Rights during Wartime
20 th Century American History. War: A Definition  Noun  A conflict carried on by force of arms, as between nations or between parties within a nation;
The Privatisation of War The Law of Armed Conflict and Private Military Firms Dr Regina Rauxloh School of Law, University of Surrey, UK Surrey International.
© Michael Lacewing Can war be just? Michael Lacewing
JUS1730/5730 International Humanitarian Law (the Law of Armed Conflict), autumn 2014 Lecture 1, 28 August 2014 Kjetil Mujezinović Larsen
Just War Theory Unit #7: The Cold War Essential Question: Was the Cold War a just war?
I nternational Humanitarian Law Legal FoundationsLegal Foundations Historical DevelopmentsHistorical Developments Current IssuesCurrent Issues.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
© 2006 Human Rights in Armed Conflict Federal Ministry for Foreign Affairs of Austria.
Government 1740 International Law Summer 2008 Lecture 9: The Use of Force.
Government S-1740 International Law Summer 2006
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Threats and vulnerabilities
A sophisticated Malware Arpit Singh CPSC 420
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
Viruses & Destructive Programs
MSL 401, Lesson 6a : The Law of Land Warfare The Law of Land Warfare.
The law of war: Humanitarian law THE STORY BEHIND THE STORY.
Situating International Humanitarian Law (IHL) ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
Conduct of hostilities Protection of civilians against the effects of hostilities Dr. Elżbieta Mikos-Skuza Seminar „Introduction to International Humanitarian.
Just War Theory Jus ad bellum Right to engage in war When? Where? For what reason? To what end? Jus in bello Right conduct in war How? Who? With what means?
International Humanitarian Law Geneva Conventions.
Lecture Notes on Concept of International Humanitarian Law Gyan Basnet
The law of war: Humanitarian law THE STORY BEHIND THE STORY.
Topic 5: Basic Security.
Government 1740 International Law Summer 2006 Lecture 9: The Use of Force.
Why is considering ethical issues so important?.  Jus ad bellum – rules before war to justify actions taken  Jus in bello – rules during war to justify.
1. 2
Justice in Action: Just War Theory Just War Theory   Jus ad bellum: proposals to justify the use of force in a particular type of situation   Jus.
Justice in Action: Just War Theory PHI 2604 January 25, 2016.
Before formal intro, hand out hit/myth sheet as students get settled and ask them to fill it out. Encourage them to discuss with others and not worry if.
Karna Thapa Faculty of Law T.U
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
The Geneva Conventions
Chapter 8 War and Strife. Security Issues Global trends, see: –Human security.
International Humanitarian Law Oral Presentation Module Name: UJGT8E-15-M Student No:
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
HUMAN RIGHTS LAW Ahmed T. Ghandour.. CHAPTER 9. HUMANITARIAN LAW.
1 International Humanitarian Law: Indian Perspectives Dr. Tasneem Meenai Associate Professor Nelson Mandela Centre for Peace and Conflict Resolution Jamia.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
LAW OF ARMED CONFLICT. HISTORY AND OVERVIEW BACKGROUND n Definition (JCS Pub 1-02): u The part of international law that regulates the conduct of armed.
International Law and the Use of Force (LG566) Topic 1: Introduction.
International Humanitarian Law (IHL). What is IHL? >A large body of law >Rules for behaviour in armed conflict situations >Protects victims and vulnerable.
Nation State Actors Lex Dunlap.
International Humanitarian Law
Network Security Fundamentals
This is Why you can’t just blow stuff up.
Chapter2 humanitarian law and international human rights law
Protection under international humanitarian law
Key Principles: A few preliminaries
Just War Theory. Just War Theory JWT is not Pacifism Pacifism says that war is always unjust, and therefore always wrong. This is an absolute statement.
War and Violence Can war be just?.
UNIT FOUR| DEFENSE & SECURITY
Introduction to IHL: Application and Basic Principles
Presentation transcript:

Writing the Rules of Cyberwar Karl Rauscher IEEE Spectrum December 2013 IS 376 November 11, 2014

Writing the Rules of Cyberwar IS 376 November 11, 2014 Page 2 Just War Doctrine Jus Ad Bellum - The Right To Go To War One of the first recorded discussions of the concept of a “just war” was in the Mahabharata, the Indian epic narrative of the mythological Kurukshetra War. There must be a just cause for declaring war There must be comparative justice on the declarer’s side There must be a just cause for declaring war There must be comparative justice on the declarer’s side Only a competent authority may wage war (no dictators) There must be a just cause for declaring war There must be comparative justice on the declarer’s side Only a competent authority may wage war (no dictators) Force may be used only with right intention (w/o ulterior motivations) There must be a just cause for declaring war There must be comparative justice on the declarer’s side Only a competent authority may wage war (no dictators) Force may be used only with right intention (w/o ulterior motivations) The probability of success must be reasonably high There must be a just cause for declaring war There must be comparative justice on the declarer’s side Only a competent authority may wage war (no dictators) Force may be used only with right intention (w/o ulterior motivations) The probability of success must be reasonably high War is a last resort after peaceful options are exhausted There must be a just cause for declaring war There must be comparative justice on the declarer’s side Only a competent authority may wage war (no dictators) Force may be used only with right intention (w/o ulterior motivations) The probability of success must be reasonably high War is a last resort after peaceful options are exhausted There must be proportionality between benefits and harms

There is a distinction between combatants and non-combatants who are caught in circumstances they did not create There should be proportionality between the damage caused by an attack and the advantage anticipated as a result of the attack There is a distinction between combatants and non-combatants who are caught in circumstances they did not create There should be proportionality between the damage caused by an attack and the advantage anticipated as a result of the attack Attacks should only occur out of military necessity, limiting excessive destruction There is a distinction between combatants and non-combatants who are caught in circumstances they did not create There should be proportionality between the damage caused by an attack and the advantage anticipated as a result of the attack Attacks should only occur out of military necessity, limiting excessive destruction Prisoners of war no longer posing threats should receive fair treatment There is a distinction between combatants and non-combatants who are caught in circumstances they did not create There should be proportionality between the damage caused by an attack and the advantage anticipated as a result of the attack Attacks should only occur out of military necessity, limiting excessive destruction Prisoners of war no longer posing threats should receive fair treatment Inherently evil means of warfare (e.g., mass rape, using weapons whose effects are uncontrollable, forcing prisoners to fight against their own side) are forbidden Writing the Rules of Cyberwar IS 376 November 11, 2014 Page 3 Just War Doctrine Jus In Bello – Right Conduct In War

Writing the Rules of Cyberwar IS 376 November 11, 2014 Page 4 The Geneva Conventions After witnessing the horrors of war, the Swiss businessman Henry Dunant ( ), proposed: The establishment of a permanent relief agency for humanitarian aid in times of war, and An international treaty recognizing the agency’s neutrality and letting it provide aid in a war zone The former led to the establishment of the Red Cross, while the latter led to the Geneva Conventions The Geneva Convention for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field 1906 The Geneva Convention for the Amelioration of the Condition of the Wounded, Sick, and Shipwrecked Members of Armed Forces at Sea 1929 The Geneva Convention relative to the Treatment of Prisoners of War 1949 The Geneva Convention relative to the Protection of Civilian Persons in Time of War 1899 The Hague Convention for the Pacific Settlement of International Disputes and with respect to the Laws and Customs of War on Land 1907 The Hague Convention regarding the Rights and Duties of Neutral Powers During War, Prohibiting the Discharge of Projectiles and Explosives from Balloons, Etc. Dunant was awarded the first Nobel Peace Prize in 1901.

Writing the Rules of Cyberwar IS 376 November 11, 2014 Page 5 Cyberwar

Writing the Rules of Cyberwar IS 376 November 11, 2014 Page 6 Stuxnet – Invasion! Stuxnet enters a system via a USB stick and proceeds to infect all machines running Windows. By using a phony digital certificate that seems to indicate it came from a legitimate source, the worm is able to circumvent automated defense systems. Stuxnet then checks whether a given machine is part of the target industrial control system made by Siemens. Such systems are used in Iran to run high-speed centrifuges for nuclear fuel enrichment. If it is a target machine, Stuxnet tries to access the Internet and download the latest version of itself. Otherwise, it does nothing.

Writing the Rules of Cyberwar IS 376 November 11, 2014 Page 7 Stuxnet – Sabotage! The worm compromises the target systems logic controllers. It exploits software weaknesses that have never been identified by security experts. At first, Stuxnet spies on the operation of the targeted system Later, it uses the gathered information to take control of the centrifuges and make them spin themselves to failure. False feedback is provided to outside controllers This ensures that they won’t know that something is wrong until it’s too late.

Writing the Rules of Cyberwar IS 376 November 11, 2014 Page 8 Quantum Dawn 2 In July 2013, numerous financial institutions and associations worked with various federal contributors (DoT, SEC, DoHS, FBI) to conduct a simulated cyber-attack on the financial sector. 1.Creation of an automatic sell-off in target stocks by using stolen administrator accounts 2.Introduction of malicious counterfeit telecommunication equipment to divert attention and slow the investigation into the automatic sell-off 3.Substantiation of the price drop by issuing fraudulent press releases on target stocks 4.Disruption of governmental websites and services through a distributed denial of service (“DDOS”) attack 5.Corruption of the source code of a financial application widely used in the equities market 6.Degradation of the credibility of an industry group by sending a phishing to harvest user names and passwords and submitting false information on the attack 7.Disruption of technology service by unleashing a custom virus with the goal of degrading post-trade processing Resulting Recommendations Better sharing of information between industry and government Clearer decision-making process on when to open and close markets

Writing the Rules of Cyberwar IS 376 November 11, 2014 Page 9 Dragonfly Of particular concern is the potential for cyberattacks against the energy grid, as demonstrated in June 2014, when DoHS issued an alert concerning Dragonfly, a group of attackers whose campaign against American and European energy firms included... Sending malware in spear-phishing s to personnel in target firms. Watering hole attacks compromising websites likely to be visited by those working in energy in order to redirect them to websites hosting an exploit kit that delivered malware to the victim’s computer. Trojanizing legitimate software bundles belonging to three different industrial control system (ICS) equipment manufacturers. Evidence suggests that Dragonfly is state-sponsored, originating from Eastern Europe, most likely from Russia.

Writing the Rules of Cyberwar IS 376 November 11, 2014 Page 10 Tallinn Manual In 2009, NATO commissioned an international panel of legal scholars to interpret international law in the context of cyberwarfare.