将武装冲突法应用于网络战的挑战

VIP文档

ID:63146

大小:0.10 MB

页数:4页

时间:2023-06-13

金币:10

上传者:战必胜
1
Challenges in Applying the Law of Armed Conflict to Cyberspace
Richard W. Aldrich
1
On June 17, 2010 a small antivirus company established in Belarus discovered what would later
come to be known as the Stuxnet worm. Later research would reveal that a variant of the worm existed
at least a year earlier. Stuxnet reputedly caused the physical degradation of some 1000 centrifuges at
the Natanz facility in Iran, based on data of the International Atomic Energy Agency (IAEA).
2
While the
identity of the perpetrators is still unknown almost two years later, some have suggested nation-state
involvement due to the sophistication of the malware. The heavily hardened Natanz facility was built to
withstand “bunker buster” bomb attacks, but apparently not cyber-attacks. The incident has created
new impetus for examining the law of armed conflict in cyberspace.
On the 5
th
of February of this year, several senior government officials, including Secretary of State
Hillary Clinton, Prime Minister David Cameron, Chancellor Angela Merkel and others, participated in the
47
th
Munich Security Conference to address, among other issues, how the Geneva and Hague
Conventions should be applied in cyberspace. A joint US-Russian bilateral document presented at the
conference offered recommendations in five key areas:
1. Detangling Protected Entities in Cyberspace
2. Application of the Distinctive Geneva Emblem Concept in Cyberspace
3. Recognizing New Non-State Actor and Netizen Power Stature
4. Consideration of the Geneva Protocol Principles for Cyber Weaponry
5. Examination of a Third, ‘Other-Than-War’ Mode
This paper will examine the merits and challenges of each recommendation, as well as the overarching
challenge of attribution in cyberspace.
I. Detangling Protected Entities in Cyberspace
The aim of this recommendation is to “promote the preservation of the observed principles of the
[Geneva and Hague] Conventions that protect humanitarian critical infrastructure and civilians.”
3
The
concern seems to be how to disentangle internet communications that support protected civilian
functions from those that would be legitimate military targets. It is widely estimated that at over 95
percent of military Internet communications ride over the commercial backbone,
4
which shows just how
1
Mr. Aldrich is a Lead Associate at Booz Allen Hamilton and the Senior Computer Network Operations Policy
Analyst for the Information Assurance Technology Analysis Center.
2
David Albright, Paul Brannan, and Christina Walrond, “Did Stuxnet Take Out 1,000 Centrifuges at the Natanz
Enrichment Plant? Preliminary Assessment,” ISIS, Dec. 22, 2010 (available at http://www.isis-online.org/isis-
reports/detail/did-stuxnet-take-out-1000-centrifuges-at-the-natanz-enrichment-plant/).
3
Karl Frederick Rauscher & Andrey Korotkov, “Working Towards Rules For Governing Cyber Conflict: Rendering
the Geneva and Hague Conventions in Cyberspace,” at 7 (Jan. 2011) [hereinafter “EastWest Proposal”].
4
Science Applications International Corporation, “Information Warfare: Legal, Regulatory, Policy and
Organizational Considerations for Assurance,” research report for the chief, Information Warfare Division
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭