Cyber Warfare Opens A New Front Against Civilians

Technology is a plant that is forever growing and humanity cannot currently anticipate its full height or width. The increasing use of cyberspace for virtually everything in contemporary life creates a scenario where we cannot imagine life without all the convenience it has brought.

Modern warfare is increasingly adjusting its power towards cyberspace as opposed to the traditional weapons.

The unique nature of cyberwarfare is that it does not need matching armies, it only needs keyboards, the equivalent of gunpowder in current warfare. This means that nations have lost their monopoly to wage war thus making armed conflicts more dangerous while leaving civilians ever more exposed.

Anyone with a keyboard and the skills can launch cyber-attacks against the state or any other entity that can be targeted. In a doomsday scenario, it paints a war of everyone against everyone because the skills can be learnt easily by anyone and the attendant tools are available for download on the Internet.

As such, the ability to enjoy e-commerce, among other advantages, does not come devoid of the possible damage that could result from full-scale cyberwar. In the words of Anthony Sinopoli, “The potential for disastrous consequences in a nuclear attack can be matched in the case of an all-out attack using cyber-warfare.

The example of a cyber-attack where critical infrastructures are destroyed or otherwise rendered useless can leave a state in a helpless position, causing unnecessary suffering to its citizens.”

Despite its convenience and its ability to launch attacks effectively without marching troops, there is no war that has been waged purely on cyber means.

Contemporary warfare incorporates the cyber capabilities alongside traditional methods and weapons. For instance, the Russian cyber-attacks against Ukraine and Georgia combined cyber attacks and kinetic means.

However, it is plausible that a full-scale cyberwar is possible even though recent conflicts have not been waged in that fashion. We are in the early days of keyboard combatants, and thus the future portends wars that may eliminate the need for physical armies in the invaded country.

Why, say, would a country expose its soldiers to possible injuries when it can comfortably cripple them by executing malware?

The wide ranging capabilities of cyber warfare can be deceptive as to what is allowed in the context of an armed conflict. Under the laws of armed conflict, not every action is permissible.

In other words, just because you can do something does not mean it necessarily becomes legal.In cyber-warfare, you can attack and disable hospitals or destroy dams remotely or through malware but it amounts to a violation of the laws of war. However, not every violation of the laws of war is a war crime. War crimes are a special category within the laws of armed conflict. War crimes can only occur within an existing state of war, an armed conflict.

In this case, this distinction is important because war crimes can be cyber-crimes but the reverse is not necessarily true.

The law of armed conflict provides a list of the actions that qualify as war crimes, for example willful killing, torture, biological experiments, taking hostages, or unlawful deportation. It is possible to commit egregious violations of the law of armed conflict through cyberwarfare but they will not necessarily become war crimes.

But it is not enough to classify actions as cybercrime or war crimes. The alleged crimes must be proved through admissible evidence to sustain a conviction, or to an acquittal.

Cyberwarfare is a realm where actions, violations or omissions leave no definitive evidence. Any court faced with alleged crimes of cyber-warfare will need to exercise judicial novelty.

Depending on the skillset of the perpetrators, it is possible to implicate an innocent user of cyber-space while absolving themselves of any crime.

There are no blood stains or fingerprints because sophisticated actors can erase all evidence of their involvement. Hence, war crimes by keyboard combatants are harder to prove.
 
The main challenge in the issue of evidence is because cyber weapons have no ethnicity, nationality or geographic identification. Cyberspace knows no boundaries and its weapons come with a faceless nature which traverses all keyboards, whether Kenyan or American, Estonian or Tanzanian.

The relevant provisions of Hague Law or Geneva Law can address all violations of humanitarian law committed through cyber warfare. Thus, it is needless to forge such any convention. States should rather wait for the slow crystallisation of customary law on cyber warfare than act in vain.

Ein News:

You Might Also Read:

Cybersecurity: The Cold War Online:

The Stage Is Set For Cyber War:

 

« There Are No Civilians In Cyber Warfare
Kenya Is 3rd in Africa for Cybercrime Readiness »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

NightDragon

NightDragon

NightDragon is a venture capital firm investing in innovative growth and late stage companies within the cybersecurity, safety, security, and privacy industry.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

StrongDM

StrongDM

StrongDM is the leader in Zero Trust Privileged Access Management (PAM).