pilipiliĀž»­

 

A new generation of cyber warfare?

- February 6, 2017

Colonel Gary Brown delivers the keynote speech at the 12th annual International Humanitarian Law Conference. (Rachael Kelly photos)
Colonel Gary Brown delivers the keynote speech at the 12th annual International Humanitarian Law Conference. (Rachael Kelly photos)

Throughout the afternoon of January 27, the panel of speakers at the 12th annual International Humanitarian Law Conference shared their expertise on the issues surrounding cyber warfare with around 80 people in Room 105 at the Schulich School of Law.

The conference was hosted by the John E. Read International Law Studentsā€™ Society (JERILS) and Dalhousieā€™s Law & Technology Institute, in partnership with the Canadian Red Cross. Schulich Law alumna Catherine Gribbin (LLB ā€™06), senior legal advisor for IHL at the Canadian Red Cross, was the moderator.

The keynote speaker was Colonel Gary Brown of Marine Corps University, a former judge advocate with the United States Air Force who speaks on cyber operations law and policy.

In addition to Gribbin and Colonel Brown, the panel consisted of Schulich Law Professor Jonathon Penney; Stephanie Carvin, assistant professor of international relations at Carleton Universityā€™s Norman Paterson School of International Affairs; and Major Max Reede, legal advisor to Joint Task Force Atlantic and Maritime Forces Atlantic.

Schulich Law Dean Camille Cameron welcomed the speakers and attendees, taking a moment to praise the law students for organizing the conference.

ā€œHats off to our students who have worked so hard to pull this together,ā€ she said, ā€œItā€™s an important educational event not only for our university community but also for the broader community.ā€

Schulich Law Professor Robert Currie, director of the Law & Technology Institute, says the topic is timely.

ā€œCyber warfare has landed in the news recently because of the [alleged] Russian hacks on the U.S. election,ā€ he says. ā€œWhile militaries have been working on the front line of trying to develop the law, itā€™s important that other civil society voices be brought to the table. This conference brought together different viewpoints on a front-burner topic. The Schulich School of Law, with its strong tradition of engagement with both international law and technology, was the ideal place to have it.ā€

Understanding cyber warfare


According to the International Committee of the Red Cross, cyber warfare has been defined as any hostile measures against an enemy designed ā€œto discover, alter, destroy, disrupt, or transfer data stored in a computer, manipulated by a computer, or transmitted through a computer.ā€

Examples of hostile use include computer attacks on air traffic control systems, oil pipeline flow systems, and nuclear plants.

Lawyers and technical experts such as information security professionals working at security firms like CrowdStrike and ThreatConnect agree that the potential of computer network attacks is massive, leading to questions about how to apply international humanitarian law (IHL) and how to define ā€œarmed conflict.ā€

While there is no specific mention of cyber warfare or computer network attacks in the Geneva Conventions or their Additional Protocols, the principles and rules in these treaties governing the means and methods of warfare arenā€™t restricted to situations that existed when they were created. Those who work in IHL clearly anticipate advances in weaponsā€™ technology and the development of new means and ways of waging war.

Cyber warfare adds a new level of complexity to armed conflict that may pose challenging questions for IHL.

ā€œThereā€™s so much thatā€™s unknown ā€” thatā€™s why weā€™re excited to be here today,ā€ said Gribbin. ā€œWe must understand the legal context in which cyber warfare is being conducted.ā€

"Cyber is interested in you"


Colonel Brown made the audience laugh with his first slide, which read, ā€œYou may not be interested in cyber, but cyber is interested in youā€¦ā€ He explained that all of the systems we use now rely on cyber systems.

ā€œIs anyone here concerned about your privacy on the Internet?ā€ asked Brown. ā€œWell, forget it! We gave it up a long time ago. We assume things like the webcams we buy are safe and secure, but everything that touches the Internet is a potential ā€˜botā€™ in a cyber attack.ā€

Brown explained that cyber ā€œdisruptions,ā€ as opposed to warfare, are events that only cause inconvenience but no direct injury or death or property destruction; for example, limiting access to bank machines. Among global nations, he cited Russia and China as the best at manipulating data.

Professor Penney said that he confronts international humanitarian law and cyber warfare in his research.

ā€œWe throw around legal and public policy terms like cyber warfare, but we have to focus on how IHL and other laws influence or donā€™t influence cyber attacks,ā€ he said. ā€œIn other words, do state and non-state operatives think about international human rights law and other legal requirements of war when they carry out these attacks ā€” focusing on military rather than civil targets, for instance? And if not, why not?ā€

An area of significant challenge


Major Reede said that in the foreseeable future, cyber warfare is an area of ā€œsignificant challengeā€ and an important area of growth and development for the Canadian military.

ā€œItā€™s easy to understand a [traditional] bomb, but itā€™s less easy to understand a logic bomb,ā€ he said. ā€œWhat makes it even more challenging is that the cyber weapons of today might soon be obsolete.ā€



Professor Carvin pointed to the increasing role that artificial intelligence will play in cyber defence and security in the future. Thereā€™s also no international standard practice on how data should be stored and maintained, or who should have access to it and when it should be deleted.

ā€œGovernments are good at protecting themselves,ā€ she said, ā€œbut small and medium enterprises arenā€™t.ā€ She advised the aspiring lawyers in the room to think about this question: What is the right to data privacy under IHL?

Third-year law student Dylan Oā€™LearyĀ helped organize the conference.

ā€œThe support and participation of the Canadian Red Cross, the Law & Technology Institute, and the student organizers made the conference a great pilipiliĀž»­,ā€ he said. ā€œCreating a legal regime that can tackle the problem of cyber conflict is one of the foremost challenges that we face as a society. Weā€™re grateful to the speakers for sharing their expertise and encouraging us to work through the tools and concepts necessary to confront this challenge.ā€