- ISIL creates all-female brigade to terrorize women into following Sharia law
- ISTOOK: Obama wants to be impeached
- Obama to Latin leaders: Help with border
- Military bans troops from Baptist church event honoring ‘God’s Rescue Squad’
- ‘Pocket drones’: U.S. Army developing tiny surveillance tools for the next big war
- Belgian cafe posts sign: Dogs allowed, but Jews stay out
- Gen. Dempsey: Pentagon studying Russian readiness plans not viewed ‘for 20 years’
- John McCain: Botched, two-hour execution of murderer is ‘torture’
- House GOP ready to move border bill
- Bomb squad called after live WWII artillery washes on Cape Cod beach
Civilian ‘hacktivists’ could be lethal targets in cyberwar, NATO study says
Question of the Day
Politically motivated civilian hackers, or “hacktivists,” who conduct online attacks as part of a nation’s cyberwar efforts could lawfully be targeted with deadly force, according to a new study commissioned by NATO’s cyberwarfare center.
“An act of direct participation in hostilities by civilians renders them liable to be attacked, by cyber or other legal means,” reads the study, “The Tallinn Manual on the International Law Applicable to Cyber Warfare.”
An international group of experts in the laws of warfare wrote the manual, at the invitation of NATO’s Cooperative Cyber Defense Center of Excellence in Tallinn, Estonia. It is not a statement of official policy by NATO or any of its member governments, but it reflects a consensus view of a large group of legal scholars and practitioners, including several senior military lawyers from NATO countries.
The manual is being launched next week in Washington, and the issue it raises, of hacktivists who join hostilities online, is far from merely hypothetical.
In August 2008, the Republic of Georgia and the Russian Federation went to war in the disputed border province of South Ossetia. But the shooting war was accompanied by cyberattacks that knocked offline much of the Georgian government, including the Foreign Affairs Ministry. At a crucial moment for their nation’s history, Georgian diplomats were reduced to using a publicly hosted Google Blogspot page to post their public statements.
Georgian websites were attacked using a technique known as distributed denial of service, or DDoS, in which networks of personal computers, infected and enslaved unbeknown to their innocent owners, are used to bombard the target’s web servers so that real users cannot get through.
The manual says that joining a DDoS attack against a military network counts as “direct participation,” but the manual does not squarely address the issue of such an attack against civilian or government computers.
But the manual is clear that civilian infrastructure, including computers and computer networks, that is used for a “military purpose” — for instance, to carry military communications traffic — can lawfully be targeted, providing that any damage is “proportional” to the value of the military objective.
“The analogy is to a road network used by civilian and military vehicles,” the manual states. “There is no reason to treat a computer network differently.”
The DDoS attacks on Georgia were led by loosely-knit groups of ultranationalist Russian hackers who coordinated the timing and targeting of their attacks and distributed software that could be downloaded by volunteer users so their computers could join the assault.
The hackers who wrote such malicious software and made it “openly available online” would not be legally targetable even if the malware was used in cyberwarfare, according to the manual. But a hacker who supplied a similar cyberweapon specifically designed for use in an online assault that rose to the level of international hostilities could be treated as a legitimate military target.
Former senior U.S. intelligence officials have said that private sector or freelance contractors write much of the malicious computer code used by the Chinese military in its cyberespionage operations.
Moreover, since they are not members of their countries’ military, the manual says, hacktivists taking part in a cyberwar should be considered “unprivileged belligerents” — the status the Bush administration accorded to al Qaeda fighters captured on the battlefield in Afghanistan. Unprivileged belligerents are not entitled to prisoner of war status under the Geneva Conventions, and they can be prosecuted for their actions — even if those actions would have been legal under the laws of war if carried out by military personnel.
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003. His reporting on the Sept. 11 Commission and the tortuous process by which some of its recommendations finally became ...
- Senator's memo shows Iran links in Homeland Security's troubled immigration program
- Help wanted: Homeland Security plagued by vacancies at the top
- Dems back bill to fix problems in investor visa program
- Democrats proceed with Mayorkas vote despite pending investigation
- NSA monitored 'World of Warcraft' players
Latest Blog Entries
TWT Video Picks
President wants everyone but himself to pay more
- 'We're coming for you, Barack Obama': Top U.S. official discloses threat from ISIL terrorists
- 'Pocket drones': U.S. Army developing tiny spies for the next big war
- Ted Nugent loses second casino gig for 'racist remarks'
- Obama orders Pentagon advisers to Ukraine
- ISTOOK: Obama wants to be impeached
- NAPOLITANO: What if our democracy is a fraud?
- Afghan who killed three U.S. Marines in 2012 to serve over 7-year prison sentence
- EDITORIAL: Obama's 'economic patriotism' means higher taxes
- HUSAIN: Fleeing Iraqi Christians find safe haven at the Shrine of Imam Ali
- Brian Kelly, Notre Dame ready for different route to title
Obama's biggest White House 'fails'
Celebrities turned politicians
Athletes turned actors
20 gadgets that changed the world
Fighting in Iraq