Leiden University, 16/11/2015 The Internet as a Field of War Anne Plouy Claerwen O’Hara Louis Léonet Lucy Turner Leiden University, The Netherlands.

Slides:



Advertisements
Similar presentations
SESSION 5: INTERNATIONAL HUMANITARIAN LAW
Advertisements

Promoting Cooperative Solutions for Space Security 1 Is Current International Humanitarian Law Sufficient to Regulate a Potential.
7 th ESPI Autumn Conference Space in a Changing World Vienna September 2013 Steven Freeland Professor of International Law, University of Western.
Private military and security companies - The legal framework – Christophe Deschard, ICRC Regional FAS Delegate Sarah Swart, ICRC Legal.
Future International Environmental Security Issues and Potential Military Requirements over the period of 2010 to for the U.S. Army Environmental.
ATHA Specialized Training on International Humanitarian Law
Overview of International Humanitarian Law ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
Methods in armed conflict – legal framework
The International Law of Armed Conflict: An Overview
Asymmetric warfare - parties - unlawful targets - direct participations in hostilites.
Core Principles Related to Conduct of Hostilities ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
Computer Security Fundamentals
The Privatisation of War The Law of Armed Conflict and Private Military Firms Dr Regina Rauxloh School of Law, University of Surrey, UK Surrey International.
Protecting our Cyber Space Staying Ahead of the Game Basel Alomair National Center for Cybersecurity Technology (C4C) King Abdulaziz City for Science and.
I nternational Humanitarian Law Legal FoundationsLegal Foundations Historical DevelopmentsHistorical Developments Current IssuesCurrent Issues.
Cyber Warfare v. Cyber Stability Jody R. Westby, Esq. Forth International Forum Garmisch-Partenkirchen, Germany April 12-15,
Making choices Rules of war - walking debate. 2 Slide 5 > Look at each image scenario in turn and decide whether you think it is acceptable/unacceptable.
SGTM 3: Legal Framework of United Nations Peace Operations Slide 1 SGTM 3: Legal Framework of United Nations Peace Operations.
Mock exam Method / the « law -approach » : Specify the question : what is the essence (question) Use legal sources – as a basis for the rules (
International Peace and Security Vladimir Radunović Director, Cybersecurity and E-diplomacy 20 March 2015 WEBINAR.
Cyber vs Legislation and Ethics Colonel John Doody Panel Chair.
CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.
Military Ethics in the New Millennium
The law of war: Humanitarian law THE STORY BEHIND THE STORY.
EXPLORING HUMANITARIAN LAW Introductory Questions PPT produced by A. Ripley ssrsb.
Human security and international law (Borrowed from 2008 lecture by Professor Gro Nystuen, University of Oslo)
Situating International Humanitarian Law (IHL) ATHA Specialized Training on International Humanitarian Law May 31, 2010 Stockholm, Sweden.
Conduct of hostilities Protection of civilians against the effects of hostilities Dr. Elżbieta Mikos-Skuza Seminar „Introduction to International Humanitarian.
International Humanitarian Law and New Technologies of Warfare Lou Maresca Legal Adviser ICRC.
PACIFIC RIM SECURITY CONFERENCE CYBERATTACK: A NEW STRATEGIC WEAPON David Elliott February 24, 2010.
Legal Advisor to the Executive Director
1) THE ROLE OF STATUS IN IHL 2) QUALIFICATION OF ARMED CONFLICT 3) REPERCUSSIONS OF STATUS ON 3 LEVELS : ON THE BATTLEFIELD : 1. CONDUCT OF HOSTILITIES.
The law of war: Humanitarian law THE STORY BEHIND THE STORY.
International Humanitarian Law (IHL) & Peacekeeping Forces (PKF) Larry Maybee Delegate to Armed & Security Forces South East Asia and the Pacific.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
Understanding the Threats of and Defenses Against Cyber Warfare.
CURRENT CHALLENGES TO HUMANITARIAN RESPONSE International Seminar on Jointly Addressing Challenges to Humanitarian Aid Vincent Ochilet Deputy.
Basic Principles of IHL Dr. Hilly Moodrick-Even Khen, Alma course 2011.
The use of force against energy installations at sea under international law Kiara Neri Maître de conférences Université Jean Moulin Lyon 3.
"Health Care in Danger" Protecting health care personnel and infrastructure in armed conflict and other situations of violence Robin Coupland International.
International Humanitarian Law, SS 2011, Alexander Breitegger Session 3: Methods and means of combat with particular focus on cluster munitions.
Before formal intro, hand out hit/myth sheet as students get settled and ask them to fill it out. Encourage them to discuss with others and not worry if.
Daniel Cahen Legal Advisor, ICRC Regional Delegation for the US and Canada Clarifying the Notion of DIRECT PARTICIPATION IN HOSTILITIES under International.
International Humanitarian Law Oral Presentation Module Name: UJGT8E-15-M Student No:
HUMAN RIGHTS LAW Ahmed T. Ghandour.. CHAPTER 9. HUMANITARIAN LAW.
1 International Humanitarian Law: Indian Perspectives Dr. Tasneem Meenai Associate Professor Nelson Mandela Centre for Peace and Conflict Resolution Jamia.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Stephane Ojeda Legal Adviser ICRC Delegation to the United Nations The International Committee of the Red Cross & The challenges of contemporary.
LAW OF ARMED CONFLICT. HISTORY AND OVERVIEW BACKGROUND n Definition (JCS Pub 1-02): u The part of international law that regulates the conduct of armed.
A country uses all its human, economic and military resources to fight the war.
Binary Numbers. Decimal vs Binary = 1001 = 101 = 10 1 = on = 0 = off = On and off.
International Humanitarian Law (IHL). What is IHL? >A large body of law >Rules for behaviour in armed conflict situations >Protects victims and vulnerable.
Human security from a legal point of view
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
The Outer Space Treaty Article III
International Humanitarian Law Oral Presentation
Understanding the Threats of and Defenses Against Cyber Warfare
Chapter2 humanitarian law and international human rights law
Protection under international humanitarian law
Key Principles: A few preliminaries
Chapter1 introcuction.
Who needs rules? Discuss
Means and Methods of Warfare in Armed Conflict
From the Perspective of Combatants
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Introduction to IHL: Application and Basic Principles
Presentation transcript:

Leiden University, 16/11/2015 The Internet as a Field of War Anne Plouy Claerwen O’Hara Louis Léonet Lucy Turner Leiden University, The Netherlands

Leiden University, 16/11/ Why? Military spending Increase in attacks Heightened vulnerability Increase in number of vigilantes International Humanitarian Law is old

Leiden University, 16/11/2015 Stuxnet: first 60th of Stuxnet binary 3

Leiden University, 16/11/ International Humanitarian Law (IHL) 1.Applicability 2.Distinction 3.Proportionality 4.Precaution

Leiden University, 16/11/2015 Issue 1: Applicability of IHL International humanitarian law= law of armed conflict Governs cyber warfare how-to-watch-hacking-and- cyberwarfare-between-the-usa-and- china-in-real-time

Leiden University, 16/11/ Issue 1: Applicability of IHL Armed conflict: 1) Armed force Non-physical consequences 2) International or non-international armed conflict Anonymity Defies national boundaries

Leiden University, 16/11/ Issue 2: Distinction Key Points: Military/civilian objects No indiscriminate attacks Identification MSF Hospital in Kunduz, Afghanistan

Leiden University, 16/11/ Issue 2: Distinction Problems for Cyber Warfare: Internet as “Dual-purpose” Viruses and Worms Stuxnet – did it distinguish? DDoS Attacks IP addresses Hackers as combatants? Natanz Nuclear Facility Hamed Saber

Leiden University, 16/11/ Issue 3: Proportionality Civilians Civilians Objects Lawful Objective

Leiden University, 16/11/2015 Issue 3: Proportionality 10 ANTICIPATED EXPECTED MILITARY ADVANTAGE COLLATERAL DAMAGE

Leiden University, 16/11/2015 Issue 3: Proportionality Challenges Regarding Cyber Warfare: Physical Damage VS Loss of Functionality Unexpected & Indirect Consequences  Reasonableness  “A Posteriori Evaluation” Dual-Use Objects  Usability Ratio? 11

Leiden University, 16/11/ Issue 4: Precaution Legal Key Points: Definition Two parts obligation Precaution in attack Precaution against the effects of an attack

Leiden University, 16/11/2015 Issue 4: Precaution The “Perfect Weapon”: - ‘Turn it off’ - Information needed to create a weapon BUT Testing Suspend & Cancel the attack Segregation & Protection 13

Leiden University, 16/11/ Suggestions for the future? Modernizing the law Limiters for worms and viruses Internet as a global commons? WarGames (1983)

Questions?