Throughout the afternoon of January 27, the panel of speakers at the 12th annual International Humanitarian Law Conference shared their expertise on the issues surrounding cyber warfare with around 80 people in Room 105 at the Schulich School of Law.
The conference was hosted by the John E. Read International Law Studentsā Society (JERILS) and Dalhousieās Law & Technology Institute, in partnership with the Canadian Red Cross. Schulich Law alumna Catherine Gribbin (LLB ā06), senior legal advisor for IHL at the Canadian Red Cross, was the moderator.
The keynote speaker was Colonel Gary Brown of Marine Corps University, a former judge advocate with the United States Air Force who speaks on cyber operations law and policy.
In addition to Gribbin and Colonel Brown, the panel consisted of Schulich Law Professor Jonathon Penney; Stephanie Carvin, assistant professor of international relations at Carleton Universityās Norman Paterson School of International Affairs; and Major Max Reede, legal advisor to Joint Task Force Atlantic and Maritime Forces Atlantic.
Schulich Law Dean Camille Cameron welcomed the speakers and attendees, taking a moment to praise the law students for organizing the conference.
āHats off to our students who have worked so hard to pull this together,ā she said, āItās an important educational event not only for our university community but also for the broader community.ā
Schulich Law Professor Robert Currie, director of the Law & Technology Institute, says the topic is timely.
āCyber warfare has landed in the news recently because of the [alleged] Russian hacks on the U.S. election,ā he says. āWhile militaries have been working on the front line of trying to develop the law, itās important that other civil society voices be brought to the table. This conference brought together different viewpoints on a front-burner topic. The Schulich School of Law, with its strong tradition of engagement with both international law and technology, was the ideal place to have it.ā
Understanding cyber warfare
According to the International Committee of the Red Cross, cyber warfare has been defined as any hostile measures against an enemy designed āto discover, alter, destroy, disrupt, or transfer data stored in a computer, manipulated by a computer, or transmitted through a computer.ā
Examples of hostile use include computer attacks on air traffic control systems, oil pipeline flow systems, and nuclear plants.
Lawyers and technical experts such as information security professionals working at security firms like CrowdStrike and ThreatConnect agree that the potential of computer network attacks is massive, leading to questions about how to apply international humanitarian law (IHL) and how to define āarmed conflict.ā
While there is no specific mention of cyber warfare or computer network attacks in the Geneva Conventions or their Additional Protocols, the principles and rules in these treaties governing the means and methods of warfare arenāt restricted to situations that existed when they were created. Those who work in IHL clearly anticipate advances in weaponsā technology and the development of new means and ways of waging war.
Cyber warfare adds a new level of complexity to armed conflict that may pose challenging questions for IHL.
āThereās so much thatās unknown ā thatās why weāre excited to be here today,ā said Gribbin. āWe must understand the legal context in which cyber warfare is being conducted.ā
"Cyber is interested in you"
Colonel Brown made the audience laugh with his first slide, which read, āYou may not be interested in cyber, but cyber is interested in youā¦ā He explained that all of the systems we use now rely on cyber systems.
āIs anyone here concerned about your privacy on the Internet?ā asked Brown. āWell, forget it! We gave it up a long time ago. We assume things like the webcams we buy are safe and secure, but everything that touches the Internet is a potential ābotā in a cyber attack.ā
Brown explained that cyber ādisruptions,ā as opposed to warfare, are events that only cause inconvenience but no direct injury or death or property destruction; for example, limiting access to bank machines. Among global nations, he cited Russia and China as the best at manipulating data.
Professor Penney said that he confronts international humanitarian law and cyber warfare in his research.
āWe throw around legal and public policy terms like cyber warfare, but we have to focus on how IHL and other laws influence or donāt influence cyber attacks,ā he said. āIn other words, do state and non-state operatives think about international human rights law and other legal requirements of war when they carry out these attacks ā focusing on military rather than civil targets, for instance? And if not, why not?ā
An area of significant challenge
Major Reede said that in the foreseeable future, cyber warfare is an area of āsignificant challengeā and an important area of growth and development for the Canadian military.
āItās easy to understand a [traditional] bomb, but itās less easy to understand a logic bomb,ā he said. āWhat makes it even more challenging is that the cyber weapons of today might soon be obsolete.ā
Professor Carvin pointed to the increasing role that artificial intelligence will play in cyber defence and security in the future. Thereās also no international standard practice on how data should be stored and maintained, or who should have access to it and when it should be deleted.
āGovernments are good at protecting themselves,ā she said, ābut small and medium enterprises arenāt.ā She advised the aspiring lawyers in the room to think about this question: What is the right to data privacy under IHL?
Third-year law student Dylan OāLearyĀ helped organize the conference.
āThe support and participation of the Canadian Red Cross, the Law & Technology Institute, and the student organizers made the conference a great pilipiliĀž»,ā he said. āCreating a legal regime that can tackle the problem of cyber conflict is one of the foremost challenges that we face as a society. Weāre grateful to the speakers for sharing their expertise and encouraging us to work through the tools and concepts necessary to confront this challenge.ā