Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15, 2010 www.globalcyberrisk.com.

Slides:



Advertisements
Similar presentations
Promoting Cooperative Solutions for Space Sustainability swfound.org ©2011 Secure World Foundation. Used with Permission APPRAISING THE EFFECTIVENESS OF.
Advertisements

EU Energy and Competition Law: Influence On Russian Trade and Investment Interests Ivan Gudkov, MGIMO-University, May, 31, 2013.
The Ethics of War Spring Main normative questions When, if ever, is resort to war justified? What can we permissibly do in war? Who are responsible.
Cyber Security and Data Protection Presented by Mrs Drudeisha Madhub (Data Protection Commissioner ) Tel: Helpdesk:+230.
INTERNATIONAL LAW THE USE OF FORCE. THE PROHIBITION OF FORCE: Art 2 t 3. All Members shall settle their international disputes by peaceful means in such.
Sources Of Human Rights
Internal Armed Conflict and the Law
Eneken Tikk // EST. Importance of Legal Framework  Law takes the principle of territoriality as point of departure;  Cyber security tools and targets.
PROJECT Towards an Harmonised Approach for National Space Legislation in Europe Berlin, January 2004 NATIONAL SPACE LEGISLATION: THE BELGIAN.
United Nations Humanitarian Civil-Military Coordination
International Law Unit 9: Use of Force Fall 2005 Mr. Morrison.
UNIVERSAL HUMAN RIGHTS
European Union Common and Security Defense Policy I. General introduction. Basic issues and concepts
Formation of the United Nations
ICTS and VIOLENCE AGAINST CHILDREN: MINIMISING RISKS AND RELEASING POTENTIAL EXPERT CONSULTATION Costa Rica, 9-10 June 2014 Renato Leite Monteiro Council.
North Atlantic Treaty Organization (NATO)
Optional Protocol to the Convention on the Rights of the Child on the sale of Children, Child Prostitution and Child Pornography.
THE UNITED NATIONS OUR ONLY HOPE FOR PEACE? WHAT IS THE UNITED NATIONS? The United Nations officially came into existence on October 24, 1945 with 51.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Situating International Humanitarian Law (IHL) ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
Convention on the Protection and Promotion of the Diversity of Cultural Expressions Adopted 20 October 2005 Entry into force 18 March 2007.
Moving Forward With the African Dialogue Cross-Border Principles By Mary Gurure Manager, Legal Services and Compliance COMESA Competition Commission Lilongwe,
ICGFM International Conference “New Developments in Government Bringing Together the Tools, Talent and Technology” 2007 ICGFM International Conference.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
International Organizations
International law and IR theories The invasion of Iraq, 2003.
Chapter 11 - Collective Self-Defense. 2 The UN What was the League of Nations? How well did it work? What did the world's nations promise in Article 2(4)
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
The Evolving Role of NATO Marko Savković Research Associate Centre for Civil-Military Relations, Belgrade.
1 The importance of migration terminology. 2 Migration Terminology Importance of terminology in the area of migration Challenges in the area of migration.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
1 Arms Trade Treaty (ATT) Ratification by Parliament PCD&MV 11 November 2014.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Government 1740 International Law Summer 2006 Lecture 9: The Use of Force.
1 Foundation module 2 Child rights-based approaches.
EU activities against cyber crime Radomír Janský Unit - Fight against Organised Crime Directorate-General Justice, Freedom and Security (DG JLS) European.
United Nations. Key Terms General Assembly Security Council Military Staff Committee Secretary General.
1 The importance of migration terminology. 2 Migration Terminology Importance of terminology in the area of migration Challenges in the area of migration.
The Use of Force Unit 11. Introduction Before the U.N. Charter, before 1945, many states followed the Just War doctrine. Just War theory states that war.
International Organizations. Early International Organizations The rise of formal international organizations in the 19 th century was a result of many.
EPHA Presentation Healthcare and social services treated equally as estate agents or advertising companies excluded from the Directive or Healthcare and.
Article 19, 21and 22 chapter 111 of ICCPR Right to freedom of expression Right to Peaceful assembly Right to freedom of association.
Section 4: Foreign Aid and Alliances The United States works with other nations to keep the peace and to ensure political stability around the world. American.
Foreign policy in Action. Long term goals of US foreign policy 1. National security Main goal of US foreign policy is to preserve the security of US.
LAW OF ARMED CONFLICT. HISTORY AND OVERVIEW BACKGROUND n Definition (JCS Pub 1-02): u The part of international law that regulates the conduct of armed.
Consent of the parties Impartiality Non-use of force except in self-defence and defence of the mandate.
LEGALITY OF THE THREAT OR USE OF NUCLEAR WEAPONS ICJ, Advisory Opinion,
Brooke Smith-Windsor, Ph.D. ACA 13 May 2016 Brooke Smith-Windsor, Ph.D. ACA 13 May 2016 NATO, Interconnected Security Threats and the Politics of Perception.
Workshop on strengthening international legal cooperation among OSCE Member States to combat transnational organized crime (Vienna, 7-9 April 2008) Extradition.
International Law and the Use of Force (LG566) Topic 1: Introduction.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Johannesburg, South Africa
Tuesday, January 19th Good Morning, Happy Tuesday! 
Bell Ringer Get with your groups and make any final changes to your political cartoon, paragraph explanation, and prepare for your presentation! You will.
P.J. Blount University of Mississippi School of Law
Foreign Policy Ch 7.3.
Homeland Security v. Homeland Defense: The Big Gap
U.S. Department of Justice
The Concept of a Legal Norm
Forth International Forum
President of the Russian Association of International Law
Chapter 8 “Making Foreign Policy”
Chapter 8 “Making Foreign Policy”
Chapter VII Article 41 The Security Council may decide what measures not involving the use of armed force are to be employed to give effect to its decisions,
Chapter Six, Section Three “Making Foreign Policy”
Deborah Housen-Couriel, ADV.
CHILDREN‘S RIGHTS Charalampos Papaioannou.
Introduction to IHL: Application and Basic Principles
Presentation transcript:

Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,

2 © Global Cyber Risk LLC CURRENT STATE OF ONLINE AFFAIRS 1.7 Billion Online Users; 233 Countries & Territories Connected to Internet In Bridging Digital Divide, Created Security Divide New Level of Sophistication in Cybercrime New Level of Activity by Nation States; Cyber Warfare is Hot Topic Response Requires Swift Coordination, Certainty on Legal Authority for Actions SOME Laws for Cybercrime (Inconsistent); NONE for Cyber Warfare © Jody R. Westby

3 © Global Cyber Risk LLC LEGAL FRAMEWORK: UN CHARTER Art. 2(4): Members refrain from threat or use of force against territorial integrity and political independence Art. 41: Security Council may decide what measures not involving the use of armed force are to be employed; complete or partial disruption of communications ok Art 42: If Security Council considers actions pursuant to Art 41 inadequate, it may take action by air, sea, or land forces Art 51: Nothing impairs inherent right to self-defense if armed attack occurs Art 99: Secretary-General may bring to the attention of the Security Council any matter which in his opinion may threaten the maintenance of peace and security © Jody R. Westby

4 © Global Cyber Risk LLC LEGAL FRAMEWORK: NATO TREATY Art. 3: Parties separately & jointly maintain and develop individual and collective capacity to resist armed attack Art. 4: Parties will consult when territorial integrity, political independence, or security of any of the Parties is threatened Art 5: Parties agree armed attack against one or more of them shall be considered attack against all Art 6(1): Armed attack means On territory of any of Parties in Europe or North America On territories or on islands of any of Parties On the forces, vessels, or aircraft of any of the Parties Art 12: After 10 years in force, Parties shall, if any of them requests, consult together for the purposes of reviewing the Treaty, having regard for the factors then affecting peace and security © Jody R. Westby

5 © Global Cyber Risk LLC LEGAL QUESTIONS What Constitutes an Act of Cyber Warfare? Can Critical Infrastructure Be Targeted? If Infrastructure Supports Targets Protected by Geneva Convention, Should These Infrastructures Be Targeted? Are Infrastructure Attacks Necessary to Achieve Military Objectives? Is Damage Caused by Attack Proportional to Military Objectives? How Are Cyber Soldiers Distinguished? How are arms visible? How Is It Determined If Third Parties Are Acting for Nation State? What is Excessive Force In Cyberspace? What Cooperation & Assistance Do Governments Have to Provide? What Permission From Other Countries Is Required? Can Governments Take Over Private Sector Network? Is More Than One Network Required? How Is This Negotiated? © Jody R. Westby

6 © Global Cyber Risk LLC NEED GEO-CYBER STABILITY Geo-Cyber Stability – The Ability of All Countries to Utilize the Internet for Both National Security Purposes and Economic, Political, and Social Benefit While Refraining From Activities That Could Cause Unnecessary Suffering & Destruction Depends on Legal Framework to Assure Agreed Upon Level of Geo- Cyber Stability Through Mutual Cooperation & International Law Means Country’s Critical Infrastructure Shall Not Be Disrupted In Manner Inconsistent With the Laws of Armed Conflict & Other Applicable Treaties and Conventions © Jody R. Westby

7 © Global Cyber Risk LLC CYBER STABILITY: WHERE TO BEGIN Need harmonized cybercrime legal framework; ITU Toolkit on Cybercrime Legislation & COE Cybercrime Convent Need International Laws That Govern Cyber Conflict—Assure Minimum Stability Should Protect Critical Infrastructure Like Hospitals, Civilians, Sick, Wounded Because All of Life is Dependent Upon Them, Even Medical Treatment Use of Bot Herders or Rogue Actors Are Not Within Definition of Legal Combatant Need NATO Treaty or International Agreement to Ensure Collective Defense as Deterrent Need International Agreement to Assist & Cooperate on Cyber Investigations; Russia has tried to promote multilateral efforts to contain cyber warfare in UN; US has opposed but now more supportive © Jody R. Westby

8 © Global Cyber Risk LLC A STEP FORWARD: ERICE DECLARATION All governments should recognize that international law guarantees individuals the free flow of information and ideas; these apply to cyberspace. Restrictions should only be as necessary and accompanied by a process for legal review. All countries should work together to develop a common code of cyber conduct and harmonized global legal framework, including procedural provisions regarding assistance and cooperation that respects privacy and human rights. All governments, service providers, and users should support international law enforcement efforts against cyber criminals. All users, service providers, and governments should work to ensure that cyberspace is not used in any way that would result in the exploitation of users, particularly the young and defenseless, through violence or degradation. © Jody R. Westby

9 © Global Cyber Risk LLC A STEP FORWARD: ERICE DECLARATION Governments, organizations, and the private sector, including individuals, should implement and maintain comprehensive security programs based upon internationally accepted best practices and standards and utilizing privacy and security technologies. Software and hardware developers should strive to develop secure technologies that promote resiliency and resist vulnerabilities. Governments should actively participate in United Nations’ efforts to promote global cyber security and cyber peace and to avoid the use of cyberspace for conflict. Adopted by World Federation of Scientists, August 2009 Distributed to all Member States of UN © Jody R. Westby

10 © Global Cyber Risk LLC CONCLUSION The international community must come together and realize that the enormous benefits of the Internet are at risk if it is used as an instrument of harm outside the rule of law. Governments have an obligation to help protect the Internet and systems that support their economies, enrich the lives of their citizens, and support government and military operations. They also have an obligation to assist in tracking and tracing cyber activities. A legal framework applicable to cyber conflict that assures a minimum level of geo-cyber stability must be developed, lest the Wild Wild Web becomes the 21 st century tool of destruction and impedes on the rule of law regarding armed conflict, human rights, and friendly relations among nation states. © Jody R. Westby

11 © Global Cyber Risk LLC THANK YOU! Jody R. Westby