Ada 389043
Ada 389043
RESEARCH
The views expressed in this paper are those of the
author and do not necessarily reflect the views of the PROJECT
Department of Defense or any of its agencies. This
document may not be released for open publication until
it has been cleared by the appropriate military service or
government agency.
BY
DISTRIBUTION STATEMENT A:
Approved for Public Release.
Distribution is Unlimited.
20010430 118
USAWC STRATEGY RESEARCH PROJECT
The International Legal Implications and Limitations of Information Warfare: What Are Our
Options?
by
The views expressed in this academic research paper are those of the
author and do not necessarily reflect the official policy or position of the
U.S. Government, the Department of Defense, or any of its agencies.
DISTRIBUTION STATEMENT A:
Approved for public release.
Distribution is unlimited.
ABSTRACT
When we examine the relationship between information warfare (IW) and the law, particularly
international law and the law of war, it becomes apparent that fundamental questions need to be
explored. How is "war" defined as it relates to IW and what activities will we define as IW? Who
are considered combatants in IW? How do the terms "force," "armed attack," or "aggression"
equate or relate to IW? Does "war" require physical violence and human casualties? How will
established legal principles related to national sovereignty be affected by IW? These questions
and issues merely hint at the tremendous uncertainties surrounding the evolving discipline of
IW.
This paper examines IW from a layman's legal perspective and explores issues such as the
law of war and standing international agreements to which the United States is a signatory. The
concept for the employment of IW is evolving and as recently demonstrated in Yugoslavia, legal
constraints, limitations, and issues appear to be the norm. There is currently no authoritative
legal or international agreement as to whether an IW "attack" is comparable to an "attack" or
"use of force" in the traditional sense.
With this as a context, the study identifies several legal approaches our armed forces could
employ offensively, defensively, or in retaliation to an information attack.
in
IV
TABLE OF CONTENTS
±i±
ABSTRACT
INTERNATIONAL LAW 2
Identification of an Attack 9
Investigation of Network Attacks and the Problem of Territorial Jurisdiction 9
Cooperation 10
Retaliation and Reprisals 11
12
What Are Our Options?
International Cooperation 13
Complacency 14
v
CONCLUSION 15
ENDNOTES 17
BIBLIOGRAPHY 21
VI
THE INTERNATIONAL LEGAL IMPLICATIONS AND LIMITATIONS OF INFORMATION WARFARE:
WHAT ARE OUR OPTIONS?
"If we can drop a bomb on it, why can't we take it out by a computer network
attack?"1
— unknown U.S. military planner
In the spring of 1999, the Pentagon considered hacking into Serbian computer networks
to disrupt their military operations and basic civilian services in support of Operation Allied
Force. Prior to execution, however, the effort was halted because of continuing uncertainty and
limitations surrounding the emerging field of information warfare (IW).
As computers continue to revolutionize and impact virtually every aspect of our lives,
military planners have stepped up development of information weapons and speak of their
potential to change the nature of war. Instead of risking planes and pilots to interdict power
grids, rail lines, and telephone exchanges, planners envision IW soldiers stealthily invading
computer networks to shut down electrical facilities, interrupt phone service, and disrupt national
financial systems.3
In May 1999 (updated November 1999), the Department of Defense Office of General
Counsel issued guidelines warning that misuse of information attacks could subject U.S.
authorities to war crimes charges. It advised commanders to apply the same "law of war"
principles to computer attacks that they do to the use of bombs and missiles. These call for
hitting only targets of military significance, minimizing collateral damage, and avoiding
indiscriminate attacks.4
Yet the question posed by the military planner in the opening epigraph has become a
recurring theme. In some instances a computer network attack may be a viable option, but we
must still conduct such an attack in accordance with the law of armed conflict and ensure
collateral damage is limited. Sounds easy enough, but compliance with the law, especially
minimizing collateral damage, is extremely difficult in light of the fact that many military
communications systems transit civilian computer networks. Collateral damage then becomes
almost unavoidable.
Currently, our ability to utilize information warfare as an offensive capability is hamstrung
by a myriad of legal issues. Conversely, our ability to militarily respond to an information attack
is equally as hamstrung by the legal system.
This study investigates the legal implications and limitations of both offensive and
defensive IW. It also offers several legal approaches the U.S. could employ to protect the
military information infrastructure and clarifies options useful for offense, defense, or retaliation.
The study is intentionally limited in two areas: First, the definition of IW is based on those
in Martin Libicki's What is Information Warfare?, where he describes seven distinct forms of IW.5
To limit its scope, this study includes no discussion or reference to electronic, psychological,
and economic IW.6 Second, the study includes no discussion of international law regulating
activities in space. No doubt, there is a strong imperative to interfere with space-based
information systems belonging to an adversary, and an equal imperative to defend our own.
INTERNATIONAL LAW
IDENTIFICATION OF AN ATTACK
The first dilemma in responding to an attack is identifying a specific event as an actual
attack. This is exacerbated when an attack occurs during a period of relative calm or reduced
international tensions. Investigators may have difficulty distinguishing an accidental catastrophe
from one stemming from malice.
Computer-based attacks may be difficult to distinguish from innocent malfunctions. If an
attack is carried out across a network, the culprit may never be in physical proximity to the
target and may leave no tangible evidence. An attack that uses viruses, logic bombs, or
infected software may be difficult to detect quickly, if at all, because of the complexity of
systems and the frequency of unintentional errors.
Perhaps the greatest challenge the U.S. faces in presenting evidence of an attack to the
international community is that it must not only be sufficient to convince U.S. policymakers, but
also to convince foreign governments. There is currently no accepted standard of proof for an
information attack in the U.S. or the international community. The deliberations of the U.N.
Security Council, as well as those of foreign governments, are political rather than legal.
Diplomacy may be more significant than persuasive, logical arguments. And the skepticism of
foreign governments towards U.S. intentions and technical methods of detection further
CO
COOPERATION
In the absence of an international investigation treaty, countries have no obligation to
cooperate with each other in law enforcement or national security investigations. Non-
cooperation cannot be considered evidence of implication in an attack. Further, hostile nations
may be unwilling to assist foreign investigators, whom they may consider spies.
International law enforcement agreements may not adequately support an investigation.
For example, treaties of mutual legal assistance generally contain exceptions that permit parties
to refuse cooperation under certain circumstances. In cases where a country may feel they will
not be able to adequately monitor or control the investigators' activities, they will certainly take
advantage of any loopholes that exist.64
Given the challenges to international cooperation discussed above, the U.S. may
unilaterally pursue an investigation without the cooperation of foreign countries. Although such
10
an investigation seems likely to violate the sovereignty of those nations, it would not in itself
violate international law. However, some countries could characterize the investigation as
espionage, which does not violate international law,65 but certainly violates, indeed threatens,
national sovereignty.
11
when the attack inflicts little or no physical destruction. When a computer attack disrupts or
corrupts a database or results in denial of important services, a decision must be made
regarding what sort of response is appropriate to the original computer attack. In the absence
of physical destruction, it is questionable whether the international community would consider a
conventional military attack a proportionate response.
The U.S. seems to hold the position that "reprisals involving the use of force are illegal,"
although it "recognizes that patterns of attack or infiltration can rise to the level of an 'armed
attack,' thus justifying a responding use of force in the exercise of the right of self-defense."70 In
other words, the U.S. may be disinclined to characterize an armed attack as a reprisal, labeling
it instead as an act of self-defense.
12
advantageous to support a broad definition to minimize or reduce the legal methods by which an
adversary can exploit our information infrastructure.
Any U.S. action to reduce or minimize civilian casualties and suffering will be viewed as a
positive step by the international community and may open the way to productive negotiations.
Definitions that include non-lethal information attacks within "war" or "force" might offer civilians
an element of protection from such peacetime attacks because of the increased political and
diplomatic repercussions of such attacks. To increase protection of civilian targets in wartime,
the U.S. could pursue treaties or other international agreements that define non-lethal or
intangible damage to civilian institutions or infrastructure as the type of injuries against which
humanitarian law should protect noncombatants.
The U.S. possesses the legal leverage necessary in the international community to
achieve whatever objectives it chooses. The U.S. can also influence the development of
customary law regarding IW. The introduction of U.S. views and position in bodies such as the
U.N. can potentially influence the opinions of other states, leading to the emergence of
international norms regarding IW.73
The U.S. must be equally cautious in drawing international attention to the potential
dangers of IW. It is possible that potential adversaries may view the U.S. initiative as an effort
to protect our technological advantage, which could in turn actually increase their efforts to
obtain and use IW weapons.
INTERNATIONAL COOPERATION
If we look to history for solutions, we realize that international cooperation has met with
little success in eliminating international acts of terrorism, but has met with some success in
stemming certain international acts of terrorism, such as hijacking. A strategy similar to that
applied to hijacking can be applied to IW. First, diplomatic pressure must be applied to those
nations that do not currently recognize information attacks as a crime.74 This diplomatic
pressure would discourage a passive view towards those involved in IW within their borders and
would encourage extradition of the offenders. In addition to diplomatic pressure, a nation's
refusal to cooperate with a reasonable investigation could be met with sanctions against the
nation. In cases where evidence indicates the nation is shielding individuals who acted on its
behalf, the evidence, combined with the refusal to cooperate, should be considered an act of
war. Second, the U.S. could support the development of an extradition regime for criminal or
terrorist information attacks, requiring the extradition or prosecution of those charged with
specific network-related crimes.
13
PROTECTION OF CRITICAL SYSTEMS
Technology has driven us to a precarious position. More and more critical functions are
controlled by networked computer systems, the failure of which can have catastrophic
consequences. This is true not only in the U.S., but throughout the developed world. It is
reasonable to believe that some of these systems are so critical that countries can agree that
they be off limits to information attacks, or that all countries would agree they must cooperate in
defending one another's systems.
Systems that might qualify under a protection regime include those involved in command
and control of strategic weapons, international finance, financial markets or stock exchanges,
telephone switches, emergency communications, rail transport, air traffic control, and medical
databases.75 Such agreements could be pursued under direct U.N. auspices or by means of
individual treaties in the context of existing organizations and institutions.
COMPLACENCY
A final option may be to accept the status quo and do nothing, or very little. As
mentioned, currently international law does not conclusively address the legality of many forms
of IW, or the appropriate responses to them. The potential and threat of IW has not yet reached
a critical level because the attacks to date have not been particularly serious, in terms of
damage or destruction.
14
However, as technology increases, the danger of a destructive attack seems likely. When
its target is a U.S. system, we will undoubtedly respond. At this point, international law will be
forced to address the issue of IW. It is obviously to our advantage to address the legal issues in
advance, rather than being forced to address them in the midst of an emergency.
CONCLUSION
It is unlikely the international legal community will soon generate a comprehensive,
coherent body of IW law. If the international legal community eventually deals with the issue
and is able to develop a coherent set of guidelines, it is imperative that the U.S. realize law is
not a panacea. Law itself will not guarantee the safety of U.S. systems or clearly define our
offensive options. Law can help regulate national and individual behavior it can critically aid our
diplomatic efforts to alleviate or avoid conflict.
The speed of technological advancement far surpasses that of the legal system. It is quite
plausible that advances in IW self-defense technology may be the only remedy to our current
concerns. In this case, legal measures, over time, may merely supplement, not supplant
preparedness.
There appears to be little reason why the U.S. should support negotiations in most areas
of international law relevant to IW.77 The principal exception is cooperation in apprehending
international criminals; such efforts seek to improve mutual legal assistance.
There are currently no "show-stoppers" in international law that limit our efforts in the
Department of Defense.78 There are, however, many areas where legal uncertainties can
create significant risk, which can be reduced by prudent planning.
15
16
ENDNOTES
1
Bradley Graham, "Military Grappling with Guidelines for Cyber Warfare; Questions
Prevented Use on Yugoslavia," The Washington Post, 8 November 1999, sec. 1A, p. 6.
2
Ibid.
3
Ibid.
4
Ibid.
5
Martin C. Libicki, What is Information Warfare? (Washington, D.C.: National Defense
University), 1995, 7.
6
Ibid.
7
Louis Henkin, international Law Politics and Values (1995), 38-39; quoted in Lawrence
T Greenberq Seymour E. Goodman, and Kevin J. Soo Hoo, Information Warfare and
International Law (Washington, D.C.: National Defense University Press, 1998), Chapter 1, 2.
8
David J. DiCenso, "IW Cyberlaw: The Legal Issues of Information Warfare," Airpower
Journal vol. XII, no. 2 Summer 1999): 92.
9
Lawrence T. Greenberg, Seymour E. Goodman, and Kevin J. Soo Hoo, Information
wgrfarp and International Law (Washington, D.C.: National Defense University Press, 1998),
Chapter 1,3.
10
Ibid.
11
Ibid.
12
Ibid.
13
Ibid.
14
International Court of Justice, "Legality of the Threat or Use of Nuclear Weapons,"
Advisorv ODinion para. 21; available from htto://www.ici-
% nrn/idwww/ider-^ions/isummaries/i. .nana, ,mmarv960708.html: Internet; accessed 4 January
2001.
15
Greenberg, Chapter2, 1.
16
Gerd D Wallenstein, International Telecommunications Agreements (1986), 67-69;
quoted in Lawrence T. Greenberg, Seymour E. Goodman, and Kevin J Soo Hoo Information
warfare and International Law (Washington, D. C: National Defense University Press, 1998),
Chapter 2,1.
17
International Telecommunications Convention (hereinafter "ITC"), 1934, Article 35;
available from google.com,
17
http://www.austlii.edu.au/au/other/dfat/treaties/1934/10.html+lntemational+Telecommunications
+Convention; Internet; accessed 4 January 2001.
18
Greenberg, 1.
19
Ibid.
20
Ibid.
21
Sean P. Kanuck, "Information Warfare: New Challenges for Public International Law,"
Harvard International Law Journal 37 (Winter 1996): 289.
22
Greenberg, 3.
23
Hague Convention (V) (hereinafter "Hague V"), "Respecting the Rights and Duties of
Neutral Powers and Persons in Case of War on Land," 18 October 1907; available from
http://www1 .umn.edu/humanrts/peace/docs/con5.html; Internet; accessed 4 January 2001.
24
Greenberg, 3.
25
Michael J. Robbat, "Resolving the Legal Issues Concerning the Use of Information
Warfare in the International Forum: The Reach of the Existing Legal Framework and the
Creation of a New Paradigm," Boston University Journal of Science and Technology Law
(Spring 2000): 8.
26
Hague V, Article 8.
27
Robbat, 8.
28
Department of Defense, Office of General Counsel, An Assessment of International Legal
Issues in Information Operations (Washington, D.C.: Department of Defense, 2d edition,
November 1999), 9.
29
Hague Convention (IV) (hereinafter "Hague IV"), "Respecting the Laws and Customs of
War on Land," 1907; Advisory Opinion 81; available from
http://librarv.bvu.edu/~rdh/wwi/hague/haque5.html: Internet; accessed 29 January 2001.
30
Hague IV, Advisory Opinion 86.
31
Greenberg, 4.
32
Karl Kuschner, Major, USAF, "Legal and Practical Constraints on Information Warfare,"
available from http://www.airpower.maxwell.af.mil/airchronicles/cc/kuschner.html; Internet;
accessed 20 October 2000.
33
Robbat, 7.
34
Ibid., 8.
18
35
Ibid.
36
DoD, Office of General Counsel, 39.
37
Ibid.
38
Ibid., 11.
39
Gary H. Anthes, "New Laws Sought for Information Warfare as Technology Outpaces the
Law," ComDUterworid, 5 June 1995, 1.
40
Greenberg, 7.
41
DoD, Office of General Counsel, 11.
42
Ibid.
43
U.N. Charter, Art. 51. Chap VII; available from http://www.un.ora/aboutun/charter;
Internet; accessed 4 January 2001.
44
Robbat, 7.
45
Ibid.
46
U.N. Charter, Art. 51.
47
Robbat, 7.
48
Ibid.
49
Ibid.
50
U.N. Charter, Art. 51.
51
Greenberg, 11.
52
Ibid.
53
U.N. Charter, Art. 39.
54
U.N. Charter, Art. 41-49.
55
Greenberg, 11.
56
Ibid., Chapter 3,1.
57
Ibid., 2.
58
Ibid.
19
59
Mark W. Janis, An Introduction to International Law (2d edit., 1993), 1; quoted in
Lawrence T. Greenberg, Seymour E. Goodman, and Kevin J. Soo Hoo, Information Warfare
and International Law (Washington, D.C.: National Defense University Press, 1998), Chapter 3,
3.
60
Greenberg, 3.
61
United Nations, "United Nations Manual on the Prevention and Control of Computer-
Related Crime," 264; available from http://www.sarm.com/art25.html; Internet; accessed 3
February 2001.
62
General Accounting Office, Information Security: Computer Attacks at Department of
Defense Pose Increasing Risks (Washington, D.C.: U.S. General Accounting Office, 22 May
1996), 22.
63
Greenberg, 4.
64
Ibid.
65
Ibid.
66
U.N. Charter, Art. 51.
67
Greenberg, 8.
68
Ibid., 9.
69
Ibid.
70
Marian L Nash, Digest of United States Practice in International Law (Washington, D.C.:
Office of the Legal Advisor, Department of State, 1983), 1749-1752.
71
Greenberg, Chapter 4,1.
72
Ibid.
73
Ibid., 2.
74
Ibid.
75
Ibid.
76
Ibid., 3.
77
"U.S. Military Grapples With Cyber Warfare Rules," Reuters, 8 November 1999; available
from http://www.infowar.com/mil c4i/99/mil c4i 110899b i.shtml: Internet; accessed 25 August
2000.
78
DoD, Office of General Counsel, 47.
20
BIBLIOGRAPHY
Anthes, Gary H. "New Laws Sought for Information Warfare as Technology Outpaces the Law."
Computerworld, 5 June 1995, 1-4.
DiCenso David J., Major (Ret), USAF. "IW Cyberlaw: The Legal Issues of Information
Warfare." Airoower Journal vol. XIII, no. 2 (Summer 1999): 85-102.
Graham Bradley. "Military Grappling with Guidelines for Cyber Warfare; Questions Prevented
Use on Yugoslavia." The Washington Post, 8 November 1999, sec. 1A, p. 6.
Greenberg, Lawrence T., Seymour E. Goodman, and Kevin J. Soo Hoo. Information Warfare
and International Law. Washington, D.C.: National Defense University Press, 1998.
Hague Convention (IV). "Respecting the Laws and Customs of War on Land." 1907^ Available
fmmhttp//lihrarv.bvu.edu/~rdh/wwi/haQue/haaue5.html. Internet. Accessed29January
2001.
Hague Convention (V). "Respecting the Rights and Duties of Neutral Powers and Persons in
Case of War on Land." 18 October 1907. Available from
httD://www1.umnedu/humanrts/peace/docs/con5.html. Internet. Accessed4January
2001.
Henkln | ™.». m+omgtinnai I aw Politics and Values. 1995,38-39. Quoted in Lawrence T.
Greenberg Seymour E. Goodman, and Kevin J. Soo Hoo, Information Warfare and
International Law, Chapter 2, 2. Washington, D.C.: National Defense University Press,
1998.
International Court of Justice. "Legality of the Threat or Use of Nuclear Weapons," Advisory
Opinion, 8 July 1996. Available from http://www.ici-
ciiorQ/iciwww/idecisions/isummaries/iunanaummarv960708.html. Internet. Accessed4
January 2001.
International Telecommunications Convention, 1934. Availablefromgoogle.com
http//www.austlii.eduau/au/other/dfat/treaties/1934/1O.html+lnternational+Telecommuni
cations+Convention. Internet. Accessed 4 January 2001.
Kuschner, Karl, Major, USAF. "Legal and Practical Constraints on Information Warfare-
Available from http://www.airpower.maxwellaf.mil/airchronicles/cc/kuschner.html.
Internet. Accessed 20 October 2000.
21
Nash, Marian L Digest of United States Practice in International Law. Washington, D.C.:
Office of the Legal Advisor, Department of State, 1983.
Robbat, Michael J. "Resolving the Legal Issues Concerning the Use of Information Warfare in
the International Forum: The Reach of the Existing Legal Framework, and the Creation
of a New Paradigm." Boston University Journal of Science and Technology Law, Spring
2000 (10165 words). Database on-line. Available from Lexis-Nexis, Reed Elsevier.
U.N. Manual, "United Nations Manual on the Prevention and Control of Computer-Related
Crime." Available from http://www.sorm.com/art26.html. Internet. Accessed 3 February
2001.
"U.S. Military Grapples With Cyber Warfare Rules," Reuters. 8 November 1999. Available from
http://www.infowar.com/mil c4i/99/mil c4i 110899b i.shtml. Internet. Accessed 25
August 2000.
22