Academia.eduAcademia.edu

Cyber Attacks, Information Attacks, and Postmodern Warfare

2017, Baltic Journal of Law & Politics

The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war). Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well) can only be perceived as "war" if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived "only" as a non-linear warfare (postmodern conflict), this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly) a crime under national laws, unless this type of conduct will be recognized by the international community as a " war" proper, in its new, postmodern sense.

BALTIC JOURNAL OF LAW & POLITICS A Journal of Vytautas Magnus University VOLUME 10, NUMBER 1 (2017) ISSN 2029-0454 Cit.: Baltic Journal of Law & Politics 10:1 (2017): 63–89 http://www.degruyter.com/view/j/bjlp DOI: 10.1515/bjlp-2017-0003 CYBER ATTACKS, INFORMATION ATTACKS, AND POSTMODERN WARFARE Jozef Valuch Assistant Professor; PhD. Comenius University in Bratislava, Faculty of Law (Slovak Republic) Contact information Address: Šafárikovo nám. č. 6, P.O.BOX 313, 810 00 Bratislava, Slovakia Phone: 00421 2 592 44 237 E-mail address: jozef.valuch@flaw.uniba.sk Tomáš Gábriš Associate Professor; PhD., LL.M., MA Comenius University in Bratislava, Faculty of Law (Slovak Republic) Contact information Address: Šafárikovo nám. č. 6, P.O.BOX 313, 810 00 Bratislava, Slovakia Phone: 00421 2 592 44 560 E-mail address: tomas.gabris@flaw.uniba.sk Ondrej Hamuľák Assistant Professor; Ph.D. Palacký University Olomouc, Faculty of Law (Czech Republic) Contact information Address: tr. 17. listopadu 8, 771 11 Olomouc, Czech Republic Phone: 00420 585 637 635 E-mail address: ondrej.hamulak@upol.cz Received: April 3, 2017; reviews: 2; accepted: June 15, 2017. BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 ABSTRACT The aim of this paper is to evaluate and differentiate between the phenomena of cyberwarfare and information warfare, as manifestations of what we perceive as postmodern warfare. We describe and analyse the current examples of the use the postmodern warfare and the reactions of states and international bodies to these phenomena. The subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war). Based on ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well) can only be perceived as "war" if executed in addition to classical kinetic warfare, which is often not the case. In most cases perceived "only" as a non-linear warfare (postmodern conflict), this practice nevertheless must be condemned as conduct contrary to the principles of international law and (possibly) a crime under national laws, unless this type of conduct will be recognized by the international community as a " war" proper, in its new, postmodern sense. KEYWORDS International law, law of war, cyber attacks, information attacks, postmodern warfare 64 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 INTRODUCTION The issue of cyberspace currently attracts a lot of attention even in the context of international conflicts. News regularly report about cyber warfare and information warfare, where lines are blurred between a traditional war, in which only state actors are participants, and new forms of enmities and warfare which include non-state actors and civilians. Experts speak of nonlinear wars, or of a postmodern blurring of differences between war and peace, good and evil, and often predict terrible futures full of wars against each other,1 unless a new standard for assessment of such conflicts will be introduced – in order to overcome uncertainties in international relations. Lawyers are already talking about options to include civilians and civilian facilities in military operations, about "cyber conscriptions" – i.e. mobilization of civilian resources for the purpose of war, 2 but also about new possibilities to respond to the new forms of war. 3 While mostly speaking of cyberwarfare, information warfare as another manifestation of nonlinear war (dissemination of conspiracies with the aim of demoralization of population) is often neglected. The aim of our paper is to differentiate between the phenomena of cyber warfare and information warfare, as manifestations of what we perceive as postmodern warfare. 1. CYBER- AND INFORMATION WARFARE In what follows, we are primarily interested in a different kind of conflict than an “armed conflict” in proper sense. We shall focus on “wars” that may take various other forms, closer or more distant to the classical concept of war, while mostly they take a “cyber”, or “information/electronic” form. Not all illegal activities in cyberspace necessarily have to do with war – e.g. the CRN at the University of Zurich distinguished between various levels of illegal conduct in cyberspace: activism, hactivism, cybercrime, cyberterrorism and cyberwar. 4 Thereby, even the most intensive illegal conduct is sometimes denied the nature of a "war" proper Roman Kanda, et al., Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days) (Praha: Filosofia, 2016), 237, 286. 2 Susan W. Brenner and Leo L. Clarke, “Civilians in Cyberwarfare: Conscriptions,” Vanderbilt Journal of Transnational Law 43 (2010): 1031. 3 Peter Margulies, “Sovereignty and Cyber Attacks: Technology’s Challenge to the Law of State Responsibility,” Melbourne Journal of International Law 14 (2013): 496. 4 Elgin Brunner, Anna Michalkova, Manuel Suter, and Myrian Dunn Cavelty, Focal Report 3: Critical Infrastructure Protection – Cybersecurity – Recent Strategies and Policies: An Analysis, CRN Reports, (Zurich: Center for Security Studies, 2009), 16-17. See also Pauline C. Reich, Stuart Weinstein, Charles Wild, and Allan S. Cabalong, “Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents – and the Dilemma of Anonymity,” European Journal of Law and Technology 1 (2010): 28. 1 65 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 (being considered rather a sort of sabotage, espionage, or subversion). 5 Still, there are also opinions that cyberspace actually represents a laboratory of early human society and therefore can be seen as an area of a Hobbesian war of all against all. For the purposes of this paper, we shall not pay attention to illegal activities taking place among private entities, such as, for example, trolling 6 or cyber-bullying, 7 which can be hindered by state or by private tools (e.g. autonomous regulation, codes of conduct, best practices).8 Rather, we focus on cases of possible abuse of cyberspace by states in the form of cyberwarfare (direct electronic interference with foreign military and civilian targets with the intent to cause damage) and information warfare (controlling or influencing the mood in the society via social engineering). 9 In respect of the latter, we might take the example of the third (non-profit) sector in Slovak, which presents numerous hypotheses on the society in the Slovak Republic as well as in the neighbouring Czech Republic as an object of social engineering, or even of information warfare. NGOs and non-profit think-tanks in Slovakia and in the Czech Republic argue mainly by pointing to the unclear financial background of some websites disseminating pro-Russian and antiAmerican or anti-Western European propaganda. While the financial background is unclear, the ideological background and content of the information apparently refer to Russian sources.10 This is what leads the NGOs to fear that Slovak and Czech servers are possibly tools of a foreign-funded non-linear information warfare, aimed to demoralize the civilian population of the two Republics. The second possible answer, being a less serious one, would be that of a natural inclination to conspiracies among the population, which is a characteristic feature of our postfactual age, not only in these Republics but in general across Europe – this trend can be fought only by rational counter-arguments, but these often do not fall on Thomas Rid, “Cyber War Will Not Take Place,” The Journal of Strategic Studies 35 (2012): 5. Arthur Gaus, “Trolling Attacks and the Need for New Approaches to Privacy Torts,” University of San Francisco Law Review 47 (2012-2013): 353. There are various categories of trolling, such as snerts, trolls, and haters. Cf. Jonathan Bishop, “The effect of de-individuation of the Internet Troller on Criminal Procedure implementation: An interview with a Hater,” International Journal of Cyber Criminology (IJCC) 7 (2013). 7 “Cyber-bullying is using technology to deliberately and repeatedly cause harm and distress. Trolling is deliberately trying to distress someone online but usually just to disrupt and often anonymously. It is frequently inflammatory and abusive. Cyber-bullies usually know the person they are attacking and it is ongoing” (Sarah Nicol, “Cyber-bullying and trolling,” Youth Studies Australia 31 (2012): 3-4). 8 See e.g. the fight of Microsoft against botnets misused for DDOS and for spam distribution, in 2010. Cf. Janine S. Hiller, “Civil Cyberconflict: Microsoft, Cybercrime, and Botnets,” Santa Clara High Technology Law Journal 31 (2015): 177. 9 Glenn Greenwald, “How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations” (November 2016) // https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/. 10 Ivana Smoleňová, “Campaign in the Czech Republic and Slovakia: Types of Media Spreading ProRussian Propaganda, their Characteristics and Frequently Used Narratives” (November 2016) // http://www.pssi.cz/download/docs/253_is-pro-russian-campaign.pdf: “These pro-Russian media show a high level of similarity, using the same language and narratives. Individual disinformation campaigns appear to be spreading in a joint effort, re-posting the same articles, using identical arguments, citing Russian sources, and referring to the same pro-Kremlin public personalities. Their appearance correlates with the Ukrainian crises, however, many were founded before 2014, suggesting that the system might have been years in making.” 5 6 66 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 fertile soil within a generally irrational context. A final answer as to whether the situation in Slovakia and Czech Republic is a manifestation of independent national development, or rather an action initiated and supported from abroad, is not available for the time being. Of course, one cannot rule out a combination of both, relying on the popularity of electronic sharing of "secret, exclusive, nonmainstream" information. Uncertainties associated with identification of sources, background and the real goals of "information wars" are elements that information warfare shares with the cyberwarfare. In the case of cyberwarfare it is often difficult to prove the source of the initiative, as well as the actual share of military and civilian participants necessary to correctly determine the legal categorization and responsibility for such actions. The classical doctrine of humanitarian international law, respectively of the law of war, requires both the presence of states as entities waging war, as well as that the conflicts are both “armed” and “international”. 11 Neither information warfare nor cyberwarfare usually satisfies these conditions – especially that of being "armed". While there are many theoretical attempts to prove that cyber warfare should be considered an armed conflict12 within the context of the use of force under Art. 2 (4) of the UN Charter (valid as a customary rule of ius cogens, thus applicable also to States that might not be UN Members), 13 these attempts have not so far been accepted generally.14 For example, Schmit proposed to take into account several criteria in order to assess whether a cyber attack meets the characteristics of use of force, and therefore of a “cyberwar”: severity, immediacy, directness, invasiveness, measurability and presumptive illegitimacy. 15 However, Schmit´s criteria were refused as allowing for subjective interpretation. 16 An “information war” must then be perceived as even more ambiguous; it can in fact never be fundamentally considered an “armed conflict”, and within international law of war we can see at most an attack on civilian targets (protected in the time of war under the 4th Geneva Convention of 1949 and under the Additional Protocol of 1977), or a demoralization technique employed in relation to enemy civilian Michael Schmit, “Classification of Cyber Conflict,” Journal of Conflict & Security Law 17 (2012): 250. Ibid.: “cyber operations can have highly destructive, even deadly, results. A State involved in an exchange of cyber attacks at this level would be very likely to characterize the situation as international armed conflict, much as it would if it fell victim of another State’s non-kinetic bacteriological attack.” 13 E.g. focusing on the actual damage caused by cyber attacks, including economic damage. Cf. Walter Gary Sharp, Cyberspace and the use of force (Falls Church, Virginia: Aegis Research Corp., 1999), 8891. For refuting of this viewpoint see Titiriga Remus, “Cyber-attacks and International law of armed conflict; a ‘jus ad bellum’ perspective,” Journal of International Commercial Law and Technology 8 (2013): 182. 14 Arguing that nobody is yet willing to escalate computer attacks to match the armed conflict. Thus, so far, cyber attacks are labelled as cyber wars only metaphorically (Titiriga Remus, supra note 13: 189). 15 Michael N. Schmitt, “Computer network attack and the use of force in international law: thought on a normative framework,” Columbia Journal of Transnational Law 37 (1999): 885. 16 Stephenie Gosnell Handler, “The New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare,” Stanford Journal of International Law 48 (2012): 229. 11 12 67 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 facilities. These institutes of international law of war are, however, only applicable in the time of an ongoing war, which in case of “information wars” and “cyberwars” usually means that the conventions do not apply if these take place independently from armed/military operations, or (in case of so-called information warfare) if no actual harm to civilians occurs.17 As far as possible solutions to the problem of cyberwarfare are concerned, there was the well-known so-called Tallinn manual drafted some time ago on this issue (by its nature legally non-binding18), and legal scholarship also suggests some other solutions to this issue – e.g. Peter Margulies proposes to shift the burden of proof onto a suspect state within the so-called theory of virtual control; 19 furthermore, Scott Shackleford recommends adopting in the long term an international convention on cybersecurity, defining cyber attack and its various levels which can be perceived as an armed attack, while creating a Multinational Cyber Emergency Response Team (MCERT), or at least while introducing a closer cooperation between the already existing CERTs in order to identify the hidden sponsors of cyber attacks.20 It remains questionable, however, to what extent such an international convention (potentially including also information warfare) would be acceptable and subsequently enforceable in practice, given the current international practice of blurring the origin of cyber- (and information-) attacks – such an obfuscation being yet another manifestation of the postmodern situation in international relations, and an expression of the postmodern nature of non-linear wars. 2. POSTMODERN AND NON-LINEAR WARS It is mostly in relation to the “war on terror” and to “cyberwars” where traditional characteristics of war under the legal definition of war are absent. Indeed, while already Cicero considered war traditionally as a conflict between state entities, 21 in case of postmodern international conflicts it may be questionable whether the conflicts are initiated by the states, executed by the states and whether they involve the use of armed force at all. On the other hand, what is 17 Susan W. Brenner and Leo L. Clarke, supra note 2: 1031. It draws from the International Law Commission’s Draft Articles on Responsibility of States for Internationally Wrongful Acts, which recognize responsibility of states for private entities’ conduct attributable to the states. The International Court of Justice thereby adopted a special effective control test. The International Criminal Tribunal for Former Yugoslavia speaks here of the criteria of “overall control”. See Peter Margulies, supra note 3: 497–498. 19 Ibid.: 514. 20 Scott J. Shackelford, “Estonia Two-and-a-Half Years Later: A Progress Report on Combating Cyber Attacks” (November 2016) // https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1499849; Scott J. Shackelford, “From Nuclear War to Net War: Analogizing Cyber Attacks in International Law,” Berkeley Journal of International Law 27 (2009): 192. 21 Cf. Stephen C. Neff, War and the Law of Nations. A General History (Cambridge: Cambridge University Press, 2005), 18-19. 18 68 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 rather clear is that they affect not only military, but also (often primarily) civilian targets. While history is not unfamiliar with the concept of private wars, which have been present in Western Europe particularly in the High Middle Ages, 22 these are still rather close to civil war or to self-help in a situation of missing state monopoly of violence,23 while the modern non-linear wars/postmodern conflicts are closer to wars in which states stands in the background – either directly and openly such as the USA in the “war on terror”, or indirectly as in some cases of cyberwarfare and information warfare which we shall pay particular attention to in this paper. A similar evaluation of the current situation was penned by the postmodern Slovenian philosopher Slavoj Zizek: “we no longer have wars in the old sense of a regulated conflict between sovereign states in which certain rules apply (the treatment of prisoners, the prohibition of certain weapons, etc.).” 24 Instead, he distinguishes between two types of current armed conflicts - (1) “ethnic-religious conflicts” which violate the rules of universal human rights, do not count as wars proper, and call for ‘humanitarian pacifist’ intervention by Western powers, and (2) direct attacks on the USA or other representatives of the new global order, in which case, again, we do not have wars proper, merely prosecution of “unlawful combatants”,25 which is the case with the war on terror. The following applies to the US: Is obviously not in a state of war, at least not in the old conventional sense of the term (for the great majority of people, daily life goes on, and war remains the exclusive business of state agencies): the very distinction between the state of war and the state of peace is thus blurred; we are entering a time in which a state of peace itself can at the same time be a state of emergency. 26 Hence, blurring of war and peace seems to be the major sign of postmodern situation in international relations. This is mostly due to the fact that no traditional “armed conflict” is present; the issue here is also the applicability of other requirements of a traditional war, such as the status of warring entities (including often non-state actors). In this line, Michael Hauser, a contemporary Czech philosopher, speaks of a situation of heterogeneous and momentary alliances, lack of unifying discourse, and military operations run by no logical plan, thus war being 22 Justine Firnhaber-Baker, “From God's Peace to the King's Order: Late Medieval Limitations on NonRoyal Warfare,” Essays in Medieval Studies 23 (2006/7): 20. Justine Firnhaber-Baker, “Introduction: History, historians, and seigneurial war”: 2; in: Violence and the State in Languedoc, 1250–1400 (Cambridge: Cambridge University Press, 2014). 23 Max Weber, “Politics as a Vocation” (November 2016) // http://anthropos-lab.net/wp/wpcontent/uploads/2011/12/Weber-Politics-as-a-Vocation.pdf. 24 Slavoj Źižek, Welcome to the Desert of the Real! Five Essays on September 11 and Related Dates (London: Verso, 2002), 93. 25 Ibid. 26 Ibid., 107. 69 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 not logocentric, 27 and indeed representing a postmodern war of all against all 28 (e.g. by using countermeasures 29 ). He considers the above (together with the Žižekian diagnosis) to be features of postmodern and non-linear warfare, the notions of which will be employed throughout this article. In order to better grasp these postmodern phenomena, in the following we offer an analysis and some examples of cyber warfare, from which certain principles can also be derived for information warfare, both showing specificities which make them distant from traditional warfare, and a part of postmodern conflicts as defined above. 3. INTERNATIONAL LAW AND INTERNATIONAL SECURITY IN CYBERSPACE On the most general level, the task of ensuring international security is entrusted to the United Nations (UN) organization. In this respect, it incorporated the Charter of the United Nations, signed already on 26th June 1945. 30 The UN Charter features in a prominent place the objectives of the United Nations to maintain international peace and security. 31 The security system of the UN is thereby further institutionalized in the form of one of its main bodies – the Security Council. This has the primary responsibility for maintenance of international peace and security.32 Since the establishment of this organization, however, more than seventy years have passed, and the international community and individual states are now facing various new (postmodern) challenges and security threats that are Michael Hauser, “Za hranice postmodernismu” (Beyond the Frontiers of Postmodernism): 237; in: Roman Kanda, et al., Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days) (Praha: Filosofia, 2016). 28 Ibid.: 286. 29 Mary Ellen O’Connell, “Cyber Security without Cyber War,” Journal of Conflict & Security Law 17 (2012): 204: “countermeasures are the mechanisms through which international law allows parties to carry out self-help, coercive enforcement of their rights. ... The International Court of Justice, in the Gabčíkovo – Nagymaros case, laid out four elements of a lawful countermeasure: 1. In the first place it must be taken in response to a previous international wrongful act of another State and must be directed against that State; 2. The injured State must have called upon the State committing the wrongful act to discontinue its wrongful conduct or to make reparation for it; 3. The effects of a countermeasure must be commensurate with the injury suffered, taking account of the rights in question; 4. Its purpose must be to induce the wrongdoing State to comply with its obligations under international law, and the measure must therefore be reversible.” 30 Cf. John P. Grant and Craig J. Barker, Parry & Grant Encyclopaedic Dictionary of International Law, 3rd ed. (Oxford: Oxford University Press, 2009), 635. Cf. also Peter Vršanský, “The United Nations Charter entered into force 70 years ago (is the twilight of the United Nations near?),” Slovak yearbook of international law 5 (2015). 31 UN Charter, Art. 1(1): “To maintain international peace and security, and to that end: to take effective collective measures for the prevention and removal of threats to the peace, and for the suppression of acts of aggression or other breaches of the peace, and to bring about by peaceful means, and in conformity with the principles of justice and international law, adjustment or settlement of international disputes or situations which might lead to a breach of the peace.” 32 UN Charter, Art. 24(1): “In order to ensure prompt and effective action by the United Nations, its Members confer on the Security Council primary responsibility for the maintenance of international peace and security, and agree that in carrying out its duties under this responsibility the Security Council acts on their behalf.” 27 70 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 different from those which were known at the time of establishment of the UN. All the more, the Charter of the United Nations underwent so far only minor "cosmetic changes" and its fundamental reform is not in sight. The changing nature of security threats is a fact of which many state officials and authorities are well aware. Their worries and thoughts are manifested in numerous international documents of varying legal force. One of the documents related to the issue of international security is, for example, the high-level panel report entitled “A more secure world: Our shared responsibility”,33 prepared by a team of recognized authorities, under the aegis of the then UN Secretary-General Kofi Annan in 2004. The report states that we live in a world of new threats that could not be known or anticipated at the time when the United Nations were established, namely in 1945. At the beginning of the new millennium the report outlined following six categories of the most serious threats to international security: inter-state conflicts, violence within states, economic and social threats, weapons of mass destruction, terrorism and international organized crime. In the meantime, however, more than a decade has past, and progress in the development of new technologies and their availability makes us reflect on whether the above calculation is still relevant and sufficient. Several events from the recent years confirm that the international community is again facing some new challenges. Simple availability, as well as anonymity and the spatial intangibility of information technology lead currently to a growing proportion of activities taking place in the cyberspace, with only a negligent risk of prosecution. Cyberspace is indeed in many respects different from any previously known and exploited space dimensions. For a long time, humanity basically used only two dimensions of space – namely the Earth's surface and water (i.e. the sea). Later on, due to the development of technology, sky and outer space were added. Now we know that in addition to these four dimensions, there is also a fifth one available for international conflicts – cyberspace. This fifth spatial dimension is very different in comparison to the above enumerated examples. It has a global reach, which blurs the physical boundaries between countries, and allows for operating regardless of the political system, with an extremely wide range of actors – from individuals, through various groupings, up to states.34 It may also be noted in addition that in the previously exploited four dimensions of space the seizure of each area had required a sufficient military and 33 Report of the Secretary-General's High-level Panel on Threats, Challenges and Change (2004) // http://www.un.org/en/peacebuilding/pdf/historical/hlp_ more_secure_world.pdf. 34 Cf. Michaela Melková and Tomáš Sokol, “Kybernetický priestor ako nová dimenzia národnej bezpečnosti” (Cyber Space as the New Dimension of the National Security): 55-56; in: Bezpečnostné fórum 2015 (Banská Bystrica: Belianum, 2015). 71 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 material capacity. For example, to ensure superiority at sea, it was necessary to dispose of the prevailing maritime power. In contrast, in cyberspace it is almost impossible to achieve, even for a short time, absolute hegemony – given the number of actors, simple access and anonymity. Finally, it is also very difficult to determine the source of a cyber attack. 35 Due to all these reasons, this type of space offers in addition to substantial possible benefits also ample possibilities for cyber crime or cyber attacks, covering a wide range of negative phenomena including cyber warfare. Other negative examples of cyber attacks may include cyber espionage, hacking, DDoS attacks,36 or other undesirable activities, including extremism and abuse of the Internet for terrorist activities and terrorist propaganda (e.g. in the form of making available manuals for manufacturing explosives) and the like. Relatively easily and cheaply accessible cyber technology and the necessary skills allow even the weaker states or non-state actors to cause serious damage to states disposing with strong conventional armed forces. Hence, as indicated in the “Australia’s cyber security strategy”, 37 the differences between traditional actors of illegal phenomena – hackers, terrorists, organized criminal networks, industrial espionage and foreign intelligence services – is becoming increasingly blurred with state actors, being one of the features of postmodern nonlinearity.38 In this context, there is a long-lasting discussion going on regarding the applicability of international law in cyberspace. Most Western countries are favourable to the application of existing international law. Some other countries, like Russia and China, have proposed to introduce a specific set of standards. 39 Still, one can conclude that it is generally accepted that international law is and should be also in the future applicable to cyberspace. This is confirmed by the 2013 report of the Group of Governmental Experts, established by the United Nations (UN) General Assembly. It states that “international law, and in particular the Charter of the United Nations, is applicable and is essential to maintaining peace and stability and promoting an open, secure, peaceful and accessible ICT environment.”40 However, there is also the question of how to apply international 35 Ibid.: 57. Cf. Franklin D. Kramer, Stuart H. Starr, Larry K. Wentz, and Daniel T. Kuehl, Cyberpower and National Security (Washington: Potomac Books Inc., 2009), 664. 36 Distributed Denial of Service (DDoS). 37 Australian Government Cyber Security Strategy, 2009 // http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/AG%20Cyber%20Security%20St rategy%20-%20for%20website.pdf. 38 Marco Roscini, Cyber Operations and the Use of Force in International Law (Oxford: Oxford University Press, 2014), 1-2. 39 Letter dated 9 January 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations, addressed to the SecretaryGeneral, United Nations, General Assembly, A/69/723, 2015. 40 Report on Developments in the Field of Information and Telecommunications in the Context of International Security, United Nations, General Assembly, Group of Governmental Experts (GGE), A/68/98, June 24, 2013. The Group consisted of representatives of 15 nations, including the United 72 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 law in this sector, and this is not a debate that will be resolved easily in the near future.41 At present, there is no consensus among the leaders of United Nations on the international law character of cyberwarfare. It is interesting here that the 2015 Group of Governmental Experts (GGE), which was tasked to look at the application of international law to cyber conflicts,42 found this topic to be the most difficult. Disagreements prevailed between Russia, China and several other countries on one hand, and the Member States of NATO on the other. The crux of the disagreement was in the applicability of specific provisions of the UN Charter (the general applicability of the Charter had been agreed upon within the GGE), in particular the applicability of Article 2(4), renouncing the use of force, and Article 51 on the inherent right to self-defence. Another issue was whether it is possible to overcome the norms enshrined in the UN Charter and in the international conventions governing the conduct of war and armed conflicts, in order to establish new and specific standards for this type of conflicts. One (the simplest) possibility would be here to re-interpret the UN Charter commitment to avoid actions that threaten territorial integrity or political independence of a state (found in Articles 2(4) and 51) so as to explicitly include cyber actions.43 Besides the (unlikely) re-interpretation of the UN Charter, or introduction of a new convention on cyberwars, according to J. A. Lewis there are still four categories of international legal standards applicable currently to the issue of cyber warfare (and possibly also other forms of postmodern international conflicts): - those that call for observation of existing international law regarding state responsibility, especially the laws of armed conflict; - those that seek to exempt from cyber attack infrastructures where an attack could have an indiscriminate effect (such as critical infrastructures, including the infrastructure of the global Internet); - norms on the state obligation to assist other states that are victims of cyber attacks; and States, Russia, and China. In their Report of July 2015, the GGE recommended a set of norms of behaviour of states in cyberspace (Jan Stinissen, “A Legal Framework for Cyber Operations in Ukraine”: 124; in: Kenneth Geers, ed., Cyber War in Perspective: Russian Aggression against Ukraine (Tallinn: NATO CCD COE Publications, 2015)). 41 Ibid. 42 Report on Developments in the Field of Information and Telecommunications in the Context of International Security, United Nations, General Assembly, Group of Governmental Experts, A/70/174, July 22, 2015// http://www.un.org/ga/search/view_doc.asp?symbol= A/70/174. 43 James Andrew Lewis, “Compelling Opponents to Our Will: The Role of Cyber Warfare in Ukraine”: 42– 43; in: Kenneth Geers, ed., Cyber War in Perspective: Russian Aggression against Ukraine (Tallinn: NATO CCD COE Publications, 2015). 73 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 - norms on the proliferation of cyber technologies that could be abused for malevolent purposes (which is still nascent and suffers from definitional problems, though).44 4. SELECTED CASES OF CYBERSPACE ABUSE From among the threats connected to cyberspace, we analyze those that have or may have the greatest relevance for international security, being close to cyber warfare as a type of non-linear postmodern conflict. 4.1. ESTONIA (2007) As an initial example, one can mention the case of April 2007, when Estonia faced a three-weeks-long DDoS (distributed denial of service) attack. The stimulus was supposed to have been a decision of the Estonian authorities to relocate a Soviet war memorial from the centre of the capital Tallinn to a military cemetery. This act triggered riots among the Russian minority, whose members perceived this monument as a memorial to war victims. (Estonians saw this monument as a symbol of foreign occupation.) This has also led to a blockade of the Estonian Embassy in Moscow. The DDoS attacks first hit the websites of governmental institutions and later also websites of some major newspapers, TV stations, banks and other targets. Several of the attacked websites were replaced by sites with Russian propaganda or with false apologies for websites being non-functional, but most attacks focused simply on turning the websites off. A spokesman for the Estonian Ministry of Defence compared these attacks to those against the USA on September 11, 2001. Estonia thereby claimed that several of the first attacks came from Russia, but most of them came later on from many thousands of ordinary computers from all around the world, making it difficult to ascribe the responsibility to a (single) state actor (Russia). Several computers were operated by Russian civilians angry with Estonia, and some Russian websites featured anonymously circulated instructions on how to perform the DDoS attacks. Many more attacks, however, came from computers infected with a virus in order to hijack the computers and involve them in these attacks without any knowledge of their owners.45 Some sources claim that in this second phase of attacks, more than one million computers (as non-linear non-state actors of cyber warfare) were involved from over a hundred countries. Overall, however, these attacks resulted “only” in 44 45 Ibid.: 44. The Economist, “A Cyber-riot” (May 10, 2007) // http://www.economist.com/node/9163598. 74 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 economic and communication disruption, and caused no significant property damage, injury or loss of life.46 4.2. RUSSIA - GEORGIA CONFLICT (2008) Cyber operations against Georgia took place in late July and early August 2008, before and during an armed conflict with Russia. They caused that governmental websites were offline and Internet services were slowed down. Especially immediately before and after the Russian troops entered the Georgian province of South Ossetia, several governmental websites were disabled or their content had been replaced by anti-Georgian propaganda, while the DDoS attacks prevented Georgian authorities from dissemination of any information to the citizens. Georgia accused the Russian Federation of these cyber attacks, but Russia denied this and claimed that the attacks were a work of private individuals who did so voluntarily. These cyber operations were then addressed in a report of an independent fact-finding mission on the conflict in Georgia in 2009,47 which did not, however, recognize their imputability to Russia, and only stated that “if these attacks were controlled by governments or government, it is likely that this form of warfare was used for the first time in an inter-State armed conflict”. 48 Some sources state that the origins of the attacks were in five anonymous systems, out of which four were in Russia and one in Turkey, and at the same time all were controlled by the RNB crime syndicate (a non-state actor, making this hence a nonlinear, postmodern conflict).49 4.3. IRAN (2010) Iran was also a target for cyber attacks in recent years, namely in 2010, in connection with its nuclear program. This was the case of a computer worm called Stuxnet, which was one of the most sophisticated and most intelligent computer worms. It was discovered in the second half of 2010, spreading easily through Microsoft Windows, and focused mainly on industrial software by Siemens and its equipment. The attack was relatively simple. It could hit extremely important points in the system, for example programs that manage and monitor industrial 46 Marco Roscini, supra note 38, 4-5. Report of Independent International Fact-Finding Mission on the Conflict in Georgia, Vol I, September 2009 // http://echr.coe.int/Documents/HUDOC_38263_08_Annexes_ENG.pdf. 48 Marco Roscini, supra note 38, 7-8. Cf. Report of the Independent Fact-Finding Mission on the Conflict in Georgia, Vol II, September 2009, pp. 217-219 // http://www.mpil.de/files/pdf4/IIFFMCG_Volume_II1.pdf. 49 The Russian Business Network. Cf. Michaela Melková and Tomas Sokol, supra note 34: 59. Cf. David J. Smith, “Russian Cyber Strategy and the War Against Georgia” (January 17, 2014) // http://www.atlanticcouncil.org/blogs/natosource/russian-cyber-policy-and-the-war-against-georgia. 47 75 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 processes, or that cooperate with various other systems and applications. So far, five different types of Stuxnet are known, which were used against Iranian facilities. As a result of these attacks, Iran's nuclear program has been damaged.50 This is a proof of further qualitative step in the use of cyber attacks – despite the fact that the extent of damage is unclear, this incident confirms the potential dangers of malware that can engulf important computer systems managing energy supplies or traffic networks. This case is thus considered the first proof of cyber attacks potentially causing real physical damage and endangering human lives. 51 On this basis one can indeed conclude that Stuxnet was the first global cyber weapon of geopolitical importance. 52 Still, however, no specific state actor was accused or attributed responsibility in this postmodern warfare case. 4.4. 2014 AND 2015 From the more recent years, one may further invoke events such as an attack on the movie studios of Sony Pictures Entertainment, from which many important documents about movies, celebrities and access data were stolen. The attack was attributed to North Korea in connection with the fact that the studio had just prepared a movie in which the North Korean leader was to die. Another instance of a cyber attack, this time ascribed to Islamic State (ISIS, in fact rather a non-state actor), was focused on a Twitter account and YouTube channel of the Central Command of the US Army. Central Command is the part of the US military responsible for the regions of the world where US military operations take place – i.e. about twenty countries, including Afghanistan, Iran, Iraq, Saudi Arabia and Syria. Next to the slogan "We won't stop! We know everything about you," the names and phone numbers of military personnel were shown on the attacked channels. Other social media displayed an office with people in uniforms, picture being taken probably through a web camera. Other displayed reports contained the words “In the Name of Allah, the Most Gracious, the Most Merciful, the CyberCaliphate continues its CyberJihad.” The YouTube account of the Central Command showed an image of a man in scarf with the phrase "i love you isis". A representative of the Pentagon has then said that although this had caused some embarrassment, it has not been shown that this was an actual security threat.53 Veronika Macková, “Cyber War of the States: Stuxnet and Flame Virus Opens New Era of War”: 5 // http://cenaa.org/wp-content/uploads/2014/05/Veronika-Mackova-PP-No.-15-2013-Vol.-2.pdf. 51 Nové hrozby - kybernetické dimenzie (New risks – cyber dimensions), NATO Review // http://www.nato.int/docu/review/2011/11-september/cyber-Threads/SK/index.htm. 52 Veronika Macková, supra note 50: 7. 53 Dave Lee, “Top US military Twitter feed ‘hacked by Islamic State’” (January 12, 2015) // http://www.bbc.co.uk/newsbeat/article/30781377/top-us-military-twitter-feed-hacked-by-islamic-state. 50 76 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 4.5. THE UKRAINE CRISIS (2013-2016) The beginning of the so-called Ukraine crisis, or so-called Russia-Ukraine conflict, dates back to 2013 andpersists to this day. Overall, this conflict is often referred to as a hybrid war (hybrid warfare) – a mixture of unconventional tactics and strategies, secret actions, irregular forces, cyber operations and political manipulations in order to achieve political objectives. This basically seems to be a set of tactics to avoid military retaliation and not to exceed the limit, which could be considered a use of force, making it a postmodern conflict par excellence. Conventional warfare is thus only a part of a larger range of coercive actions available to states in the postmodern situation.54 Interestingly for us, in this case cyber operations were also used as a tool of information war (information warfare). They encompassed digital propaganda, website defacements, denial-of-service (DoS) campaigns, information leaks by hacktivist groups, and cutting-edge cyber espionage malware. However, apart from disruptions to Internet connectivity between Crimea, Donbass, and the rest of Ukraine, there have been no known attacks against civilian or military critical infrastructures. 55 According to some authors, Russian cyber activities, especially those associated with the recent conflict in Ukraine and with the annexation of Crimea, probably offer the best example of the employment of cyber attacks in information warfare – to shape the overall political course of a dispute.56 5. RESPONSES BY INTERNATIONAL BODIES The above examples are only a selection of cases of postmodern and nonlinear conflict with the use of cyberspace in a way approaching level of warfare. Many other states have actual experience with similar interventions. This has quite naturally prompted the international bodies, namely various regional groupings and organizations, to respond to this kind of threat, whether by adopting domestic laws, building relevant capacities, or strengthening international cooperation. Cyber operations have created a risky space in which states can conduct offensive action with less political risk, given the grey zones of international law, and given the fact that opponents can find it difficult to respond.57 54 James Andrew Lewis, supra note 43: 40. Kenneth Geers, ed., Cyber War in Perspective: Russian Aggression against Ukraine (Tallinn: NATO CCD COE Publications, 2015) // https://ccdcoe.org/multimedia/cyber-war-perspective-russianaggression-against-ukraine.html. 56 James J. Wirtz, “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy”: 30; in: Kenneth Geers, ed., Cyber War in Perspective: Russian Aggression against Ukraine (Tallinn: NATO CCD COE Publications, 2015). 57 James Andrew Lewis, supra note 43: 40. 55 77 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 5.1. NATO NATO is an international organization of a military and political nature, which brings together countries for the sake of cooperation in the security field. Through the institute of collective defence it provides Member States with protection via political as well as military means. 58 New forms of threats can therefore not go unnoticed by the organization; its various strategic documents now consider cyberspace as a new operation domain. One can mention, for example, the “NATO Strategic Concept” adopted at Lisbon Summit in 2010. Under this conception, cyber attacks are one of the key threats today. They occur more often and are able to reach a level that threatens the national and Euro-Atlantic prosperity, security and stability. The actors of such attacks can be foreign military and intelligence services, terrorist and extremist groups, as well as organized or individual criminals. In 2011, NATO adopted the “NATO Policy on Cyber Defence”. It defines the role and activities of NATO in the field of cyber defence to be developed in the future. In addition to this Policy, a “NATO Cyber Defence Action Plan” was adopted, giving details on tasks and resources on order to achieve the objectives of cyber defence. The Policy and Plan were updated in May 2014 via the “Enhanced NATO Policy on Cyber Defence” and at the summit in Wales where the updated “NATO Cyber Defence Action Plan” was approved. This sets out specific tasks in order to fulfil the above Policy, and one of its key tasks is to enhance mutual cooperation between the public sector, private sector and academia.59 Especially the abovementioned attacks in Estonia in 2007 resulted in fundamental questions being raised in NATO: “If a member state's communications centre is attacked with a missile, you call it an act of war. So what do you call it if the same installation is disabled with a cyber-attack?” 60 Consequently, NATO Secretary-General Fogh Rasmussen after the meeting in Wales said: “Today we declare that cyber defence is part of a collective defence.” This statement is thereby a shift from the traditional perception of collective defence within NATO, since so far the article on collective defence 61 referred only to the classical, conventional or Jozef Valuch, Michaela Rišová, and Radoslav Seman, Právo medzinárodných organizácií (The Law of International Organisations) (Praha: C. H. Beck, 2011), 289. 59 Koncepcia kybernetickej bezpečnosti Slovenskej republiky (Conception of Cyber Security of the Slovak Republic). https://lt.justice.gov.sk/Attachment/Vlastn%C3%BD%20materi%C3%A1l_docx.pdf?instEID=1&attEID=75645& docEID=413095&matEID=7996&langEID=1&tStamp=20150218154455240. 60 The Economist, supra note 45. 61 Art. 5 of the NATO Treaty reads: “The Parties agree that an armed attack against one or more of them in Europe or North America shall be considered an attack against them all and consequently they agree that, if such an armed attack occurs, each of them, in exercise of the right of individual or collective selfdefence recognised by Article 51 of the Charter of the United Nations, will assist the Party or Parties so attacked by taking forthwith, individually and in concert with the other Parties, such action as it deems necessary, including the use of armed force, to restore and maintain the security of the North Atlantic 58 78 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 nuclear threats and was only marginally associated with new security challenges. Leaders of NATO Member States seem thus have newly agreed that a cyber attack on one of the NATO members could be considered an attack on the entire Alliance, and could therefore give rise to a military response. 62 5.2. EUROPEAN UNION The need to ensure cyber security arises also within the EU. From among the more recent actions in this area one can name, inter alia, the document entitled “Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace”,63 which represents the vision of the EU in relation to preventing cyber disruptions and attacks, as well as with respect to potential countermeasures. The aim is foremost to increase the resilience of information systems against cyber attacks and to strengthen the EU policy on international cyber security and cyber defence. This document thereby defines cyber security as follows: Cyber-security commonly refers to the safeguards and actions that can be used to protect the cyber domain, both in the civilian and military fields, from those threats that are associated with or that may harm its interdependent networks and information infrastructure. Cyber-security strives to preserve the availability and integrity of the networks and infrastructure and the confidentiality of the information contained therein. 64 In response to this, European Council endorsed an “EU Cyber Defence Policy Framework”, which was approved at a meeting of defence ministers in November 2014. Its key objectives are to support the development of cyber defence in the Member States, to support the missions and operations within the joint defence and security policy, science and research, and to use synergies with other actors outside the EU, mainly NATO. Significant in this regard is that the security of cyberspace should be one of the main priorities for future EU foreign policy in the field of security.65 One of the latest results of the European Commission's intention to legislate on cyber security is also the Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of area. Any such armed attack and all measures taken as a result thereof shall immediately be reported to the Security Council. Such measures shall be terminated when the Security Council has taken the measures necessary to restore and maintain international peace and security.” 62 Monika Masariková, “Potvrdené. Kyberútoky predmetom článku 5 NATO” (Confirmed. Cyberattacks are subject to Art. 5 NATO) (September 5, 2014) // http://www.cybersec.sk/spravy/politika/potvrdenekyberutoky-predmetom-clanku-5-nato/. 63 Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace, JOIN (2013) 1 final, Brussels, 2013. 64 Ibid.: 3. 65 An outline for Europen Cyber Diplomacy Engagement, 9967/4/14 REV 4, DG D 1C, Brussels, September 2014. 79 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 security of network and information systems across the Union, which is a key part of the overall strategy of cybersecurity in the EU. Besides mutual cooperation, the Directive requires that each Member State adopts a national strategy for network and information security, establishes a national authority responsible for the security of networks and information systems, and sets up a group to respond to cyber threats, a so-called CERT (Computer Emergency Response Team). 5.3. THE UNITED STATES OF AMERICA One of the most recent US documents related to cyber threats is a paper presented by James R. Clapper, Director of National Intelligence, in September 2015, entitled “Worldwide Cyber Threats”. 66 Among other things, this document states that cyber threats are increasing in the frequency, sophistication and intensity of the action. Furthermore, the range of actors of cyber threats, attack methods, targets and victims are also expanding. It is likely that even in the future attempts aimed at infringement of computer and information systems will continue, but “catastrophic attack” is considered unlikely in the USA. Rather than “cyber Armageddon” which would paralyze the entire US infrastructure, a series of cyber attacks on low or moderate level is expected instead, possibly coming from different sources. This document thereby distinguishes the following potential actors of cyber attacks against the USA: a) states with highly sophisticated cyber programs (such as Russia or China), b) states with lesser technical capabilities but possibly more disruptive intent (such as Iran or North Korea), c) profit-motivated criminals, d) ideologically motivated extremists or hackers. The distinction between state and non-state actors (a sign of postmodern conflict proper) is extremely difficult to ascertain, especially when working together (directly or indirectly), or when states are overlooking crime detrimental to foreign victims, or even using similar cyber tools themselves.67 6. POSTMODERN WARFARE IN LIGHT OF IUS AD BELLUM AND IUS IN BELLO Although cyber tools and techniques can be used in harmful ways, they are still not weapons per se, which can make it difficult to decide about James R. Clapper, “Worldwide Cyber Threats” (September 10, 2015) // http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/ClapperOpening09102015.pd. 67 Ibid. 66 80 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 countermeasures. 68 A cyber attack can produce results equivalent to a kinetic attack, but this is not its primary effect; instead it is (at least for now) to manipulate the data, knowledge, and opinion – simply put to produce political or psychological effect rather than physical damage. 69 What is thereby the relationship between this kind of attack and the principles of ius ad bellum and ius in bello? A particularly important role in searching for an answer in this respect was played by an international expert group that was invited by the NATO Centre of Excellence to clarify this relationship. The result was the so-called Tallinn manual, drawn up in 2012, 70 but being only the result of work by independent experts, which is not legally binding. This document pays particular attention to cyber security and the relationship between cyber attacks and ius ad bellum, i.e. the international law governing the resort to force (I), and the ius in bello, i.e. the international law regulating the conduct of armed conflict (II). Related bodies of international law, such as the law of state responsibility, are dealt with in greater detail in the context of these topics.71 Concerning legally binding sources, from an International Court of Justice (ICJ) award in the issue of nuclear weapons, 72 it becomes clear that the law of armed conflict applies to any use of force, irrespective of the weapon. 73 In order to assess whether a cyber attack is an instance of using force under Art. 2(4) of the UN Charter,74 one can resort to a helpful Nicaragua case,75 which shows that the decisive factor in determining the existence of an armed conflict is the scope and scale of operations. Therefore, non-destructive cyber operations aimed, for example, at undermining the confidence of population in the government or at undermining a domestic economic situation, would most likely not be classified as attacks with the use of force.76 On the basis of the given viewpoint, a difference can be seen in the above described cases of Estonia in 2007 and Georgia in 2008. In Estonia the attacks did not reach the level of an armed attack and thus the international law of armed conflict did not apply. On the other hand, the operations within the Russia-Georgia 68 James Andrew Lewis, supra note 43: 41. Ibid.: 40. 70 Tallinn Manual on the International Law Applicable to Cyber Warfare, 2012. 71 The Tallinn Manual is not an official document, but instead an expression of the scholarly opinions of a group of independent experts acting solely in their personal capacity. CCDCOE (NATO Cooperative Cyber Defence Centre of Excellence): “Tallinn Manual - Research” // https://ccdcoe.org/research.html. 72 ICJ Opinion on Legality of Threat or Use of Nuclear Weapons, July 8, 1996, alinea 39. 73 Katarína Šmigová, “Kybernetické útoky a medzinárodné právo” (Cyber Attacks and International Law): 1225; in: Bratislavské právnické fórum 2013 (Bratislava Legal Forum 2013) (Bratislava: Univerzita Komenského, Právnická fakulta, 2013). 74 UN Charter, art. 2 (4): “All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purposes of the United Nations.” 75 Nicaragua v. USA, ICJ Judgment of June 27, 1986, al. 195. 76 Katarina Šmigová, supra note 73: 1226. 69 81 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 conflict have been made to support the kinetic attack, and thus the international law of armed conflict was to be applied. It was namely a case of cyber operations carried out in the context of armed conflict, which included cyber operations (cyber attacks), but at the same time was not limited to them. This approach to cyber attacks was confirmed even by the Tallinn manual, which states that cyber operations fall under the law of armed conflict, if they are made in the context of an armed conflict, whether international or noninternational.77 Recently, a follow-up to the above-mentioned Tallinn manual, the Tallinn Manual 2.0 was launched in 2017 within a project hosted by the NATO Cooperative Cyber Defence Centre of Excellence from 2013 to 2016. This was aimed at expanding the expert analysis to international law during peacetime. The result of this project is an extended edition of the Tallinn Manual, dealing with (among others) the following issues: internal and external sovereignty, violations of sovereignty, jurisdiction, due diligence, prohibition of intervention, cyber espionage, etc.78 Still, while the issue of cyber warfare and cyber attacks that go hand in hand with the development and availability of information technology, are the best examples of new threats in international relations, cyberspace is providing substantial opportunities for many other types of (postmodern and non-linear) security threats. The documents dealing with cyber security do not pay attention to one specific field related to cyber security, namely, that of misusing cyberspace for waging an information warfare. This aspect of cyberwarfare, often a tool of subversion, was addressed by Thomas Rid already in 2012, refuting the idea of cyberwars at all.79 Since the term "cyberwar" itself is mostly used only as a metaphor (especially in case of attacks performed outside actual use of armed force), the concept of “information war” cannot be understood otherwise, by analogy. In terms of lex lata, therefore, information warfare is not to be perceived as a war in legal sense (if not accompanied by kinetic attacks).80 The mutual relationship between cyberwarfare and information warfare could (in line with arguments proposed by Rid) be understood as being two partially overlapping areas, since “information war” can also be pursued by other than 77 Ibid.: 1227. The Tallin 2.0 project explores how the general principles of international law apply in the cyber context. CCDCOE (NATO Cooperative Cyber Defence Centre of Excellence): “Tallinn Manual - Research”. https://ccdcoe.org/research.html. 79 Thomas Rid, supra note 5: 5. 80 Jack M. Beard, “Legal Phantoms in Cyberspace: The Problematic Status of Information as a Weapon and a Target under International Humanitarian Law,” Vanderbilt Journal of Transnational Law 47 (2014): 139. 78 82 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 electronic means. Fundamentally, however, the same reservations and conclusions apply by analogy to information warfare as well as to cyber warfare. Similarly as with respect to categorization of cyber attacks, it might therefore be possible to propose a specific scale or categorization of degrees of “information attacks” – from the positive promotion, through negative promotion, false propaganda, up to the information warfare (connected to kinetic attacks). At any rate, it can be concluded that information warfare (using electronic media/cyberspace), just like cyberwarfare, is one of the relatively new kinds of international conflicts that use modern technology, while they are blurring the differences between war and peace, which is considered an expression of the current postmodern period, marked with non-conventional conflicts. Is there yet any possibility of correctly grasping such conflicts and to have them legally categorized in the future? The previously quoted Czech philosopher Michael Hauser suggests in this regard to look for a way out of postmodernism in general, not only with respect to armed conflicts.81 He proposes a way of negative, or transcendent modernism – in terms of rejection of negative consequences of the postmodernism,82 leaving the self-destructive mood.83 Should his recommendation be applied to the issue of non-linear wars, this would probably require condemning related practices as a conduct contrary to the principles of international law (such as the principle of compulsory cooperation among states, 84 non-interference in internal affairs85 etc.), or considering this conduct as an act of crime, if meeting conditions imposed under domestic laws, thus fighting against the negative phenomena primarily with the domestic means of prevention and prophylaxis, leaving aside theoretical polemics as to whether such conduct is a war or not – especially since there is currently no will of the international community to legally categorize such acts clearly as a war in its new, postmodern sense. CONCLUSIONS The fact that cybersecurity is one of the key postmodern challenges was sufficiently shown in the cases referred to in this paper: be it the Russia-Georgia 81 Michael Hauser, supra note 27: 245. Ibid.: 271. 83 Ibid.: pp. 284-285. 84 “The duty of States to co-operate with one another in accordance with the Charter” (Cf. Declaration of Principles of International Law Concerning Friendly Relations and Cooperation among States in Accordance with the Charter of the United Nations, Resolution adopted by the General Assembly on October 24, 1970, Res. 2625 (XXV)). 85 “The principle concerning the duty not to intervene in matters within the domestic jurisdiction of any State, in accordance with the Charter” (ibid.; cf. John P. Garnt and Craig J. Barker, supra note 30, 229; cf. also Peter Vršanský, Jozef Valuch, et al., Medzinárodné právo verejné. Všeobecná časť (Public International Law. The General Part) (Bratislava: Eurokódex, 2012), 150; Cf. Nicaragua Case (Military and Paramilitary Activities in and against Nicaragua; Nicaragua v. USA), ICJ Reports, 1986, al. 202). 82 83 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 conflict (2008), in which cyberspace has become a scene of conflict between two states, or a computer worm Stuxnet deployed to harm the Iranian nuclear program (2010), regarded by many as the first cyber weapon of geopolitical significance, or the Ukrainian crisis that persists to this day. All of the examples show that traditional legal definitions of war as well as traditional expectations of a linear state-to-state conflict fail in the postmodern era. NATO Member States have therefore resolved that cyber defence is a part of collective defence, which is a shift in the traditional meaning of the collective defence within this organization. The seriousness of the situation indeed leads international bodies to take precautionary measures and to enact documents of varying legal force in order to address the respective (mostly labelled as “cyber”) threats. The essential subject matter of this paper is the relationship between new types of postmodern conflicts and the law of armed conflicts (law of war). Based on the ICJ case law, it is clear that under current legal rules of international law of war, cyber attacks as well as information attacks (often performed in the cyberspace as well) can only be perceived as "war" if executed in addition to a classical kinetic warfare, which is often not the case. In most cases, perceived "only" as a non-linear warfare (postmodern conflict), this practice nevertheless must be condemned as a conduct running contrary to principles of international law and (possibly) a crime under national laws, unless this type conduct will be recognized by the international community as a “war” proper, in its new, postmodern sense. BIBLIOGRAPHY 1. Beard, Jack M. “Legal Phantoms in Cyberspace: The Problematic Status of Information as a Weapon and a Target under International Humanitarian Law.” Vanderbilt Journal of Transnational Law 47 (2014): 67–143. 2. Bishop, Jonathan. “The effect of de-individuation of the Internet Troller on Criminal Procedure implementation: An interview with a Hater.” International Journal of Cyber Criminology (IJCC) 7 (2013): 28–48. 3. Brenner, Susan W., and Leo L. Clarke. “Civilians in Cyberwarfare: Conscriptions.” Vanderbilt Journal of Transnational Law 43 (2010): 1011– 1076. 4. Brunner, Elgin, Anna Michalkova, Manuel Suter, and Myrian Dunn Cavelty. Focal Report 3: Critical Infrastructure Protection – Cybersecurity – Recent Strategies and Policies: An Analysis, CRN Reports. Zurich: Center for Security Studies, 2009. 84 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 5. ISSN 2029-0454 2017 Clapper, James R. “Worldwide Cyber Threats” (September 10, 2015) https://intelligence.house.gov/sites/intelligence.house.gov/files/documents/cl apperopening09102015.pdf. 6. Firnhaber-Baker, Justine. “From God's Peace to the King's Order: Late Medieval Limitations on Non-Royal Warfare.” Essays in Medieval Studies 23 (2006/7): 19–30. 7. Firnhaber-Baker, Justine. “Introduction: History, historians, and seigneurial war”: 1–23. In: Violence and the State in Languedoc, 1250–1400 (Cambridge: Cambridge University Press, 2014). 8. Gaus, Arthur. “Trolling Attacks and the Need for New Approaches to Privacy Torts.” University of San Francisco Law Review 47 (2012-2013): 353–376. 9. Geers, Kenneth, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015 // https://ccdcoe.org/multimedia/cyber-war-perspective-russian-aggressionagainst-ukraine.html. 10. Gosnell Handler, Stephanie. “The New Cyber Face of Battle: Developing a Legal Approach to Accommodate Emerging Trends in Warfare.” Stanford Journal of International Law 48 (2012): 209–237. 11. Grant, John P., and Craig J. Barker. Parry & Grant Encyclopaedic Dictionary of International Law. 3rd ed. Oxford: Oxford University Press, 2009. 12. Greenwald, Glenn. “How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations” // https://firstlook.org/theintercept/2014/02/24/jtrig-manipulation/. 13. Hauser, Michael. “Za hranice postmodernismu” (Beyond the Frontiers of Postmodernism): 223–286. In: Roman Kanda, et al., Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days). Praha: Filosofia, 2016. 14. Hiller, Janine S. “Civil Cyberconflict: Microsoft, Cybercrime, and Botnets.” Santa Clara High Technology Law Journal 31 (2015): 163–214. 15. Kanda, Roman, et al. Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days). Praha: Filosofia, 2016. 16. Kramer, Franklin D., Stuart H. Starr, Larry K. Wentz, and Daniel T. Kuehl. Cyberpower and National Security. Washington: Potomac Books Inc., 2009. 17. Lee, Dave. “Top US military Twitter feed ‘hacked by Islamic State’.” (January 12, 2015) // http://www.bbc.co.uk/newsbeat/article/30781377/top-us-military-twitterfeed-hacked-by-islamic-state. 85 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 18. ISSN 2029-0454 2017 Lewis, James Andrew. “Compelling Opponents to Our Will: The Role of Cyber Warfare in Ukraine”: 39–47. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015. 19. Macková, Veronika. “Cyber War of the States: Stuxnet and Flame Virus Opens New Era of War” // http://cenaa.org/wp-content/uploads/2014/05/VeronikaMackova-PP-No.-15-2013-Vol.-2.pdf 20. Margulies, Peter. “Sovereignty and Cyber Attacks: Technology´s Challenge to the Law of State Responsibility.” Melbourne Journal of International Law 14 (2013): 496–519. 21. Masariková, Monika. “Potvrdené. Kyberútoky predmetom článku 5 NATO” (Confirmed. Cyberattacks are subject to Art. 5 NATO) (September 5, 2014) // http://www.cybersec.sk/spravy/politika/potvrdene-kyberutoky-predmetomclanku-5-nato/. 22. Melková, Michaela, and Tomáš Sokol. “Kybernetický priestor ako nová dimenzia národnej bezpečnosti” (Cyber Space as the New Dimension of the National Security): 54–64. In: Bezpečnostné fórum 2015. Banská Bystrica: Belianum, 2015. 23. Neff, Stephen C. War and the Law of Nations. A General History. Cambridge: Cambridge University Press, 2005. 24. Nicol, Sarah. “Cyber-bullying and trolling.” Youth Studies Australia 31 (2012): 3–4. 25. O’Connell, Mary Ellen. “Cyber Security without Cyber War.” Journal of Conflict & Security Law 17 (2012): 187–209. 26. Reich, Pauline C., Stuart Weinstein, Charles Wild, and Allan S. Cabalong. “Cyber Warfare: A Review of Theories, Law, Policies, Actual Incidents – and the Dilemma of Anonymity.” European Journal of Law and Technology, 1 (2010): 1–58. 27. Remus, Titiriga. “Cyber-attacks and International law of armed conflict; a ‘jus ad bellum’ perspective.” Journal of International Commercial Law and Technology 8 (2013): 179–189. 28. Rid, Thomas. “Cyber War Will Not Take Place.” The Journal of Strategic Studies 35 (2012): 5–32. 29. Roscini, Marco. Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press, 2014. 30. Schmit, Michael. “Classification of Cyber Conflict.” Journal of Conflict & Security Law 17 (2012): 245–260. 86 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 31. ISSN 2029-0454 2017 Schmitt, Michael N. “Computer network attack and the use of force in international law: thought on a normative framework.” Columbia Journal of Transnational Law 37 (1999): 885–937. 32. Shackelford, Scott J. “Estonia Two-and-a-Half Years Later: A Progress Report on Combating Cyber Attacks” // https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1499849. 33. Shackelford, Scott J. “From Nuclear War to Net War: Analogizing Cyber Attacks in International Law.” Berkeley Journal of International Law 27 (2009): 192–251. 34. Sharp, Walter Gary. Cyberspace and the use of force. Falls Church, Virginia: Aegis Research Corp., 1999. 35. Šmigová, Katarína. “Kybernetické útoky a medzinárodné právo” (Cyber Attacks and International Law): 1224–1230. In: Bratislavské právnické fórum 2013 (Bratislava Legal Forum 2013). Bratislava: Univerzita Komenského, Právnická fakulta, 2013. 36. Smith, David J. “Russian Cyber Strategy and the War Against Georgia” (January 17, 2014) // http://www.atlanticcouncil.org/blogs/natosource/russian-cyber-policy-andthe-war-against-georgia. 37. Smoleňová, Ivana. “Campaign in the Czech Republic and Slovakia: Types of Media Spreading Pro-Russian Propaganda, their Characteristics and Frequently Used Narratives” // http://www.pssi.cz/download/docs/253_is-pro-russian-campaign.pdf. 38. Stinissen, Jan. “A Legal Framework for Cyber Operations in Ukraine”: 123– 134. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015. 39. The Economist. “A Cyber-riot” (May 10, 2007) // http://www.economist.com/node/9163598. 40. Valuch, Jozef, Michaela Rišová, and Radoslav Seman. Právo medzinárodných organizácií (The Law of International Organisations). Praha: C. H. Beck, 2011. 41. Vršanský, Peter. “The United Nations Charter entered into force 70 years ago (is the twilight of the United Nations near?).” Slovak yearbook of international law 5 (2015): 6–21. 42. Vršanský, Peter, Jozef Valuch, et al. Medzinárodné právo verejné. Všeobecná časť (Public International Law. The General Part). Bratislava: Eurokódex, 2012. 43. Weber, Max. “Politics as a Vocation” // http://anthropos-lab.net/wp/wpcontent/uploads/2011/12/Weber-Politics-as-a-Vocation.pdf. 87 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 44. ISSN 2029-0454 2017 Wirtz, James J. “Cyber War and Strategic Culture: The Russian Integration of Cyber Power into Grand Strategy”: 29–37. In: Kenneth Geers, ed. Cyber War in Perspective: Russian Aggression against Ukraine. Tallinn: NATO CCD COE Publications, 2015. 45. Žižek, Slavoj. Welcome to the Desert of the Real! Five Essays on September 11 and Related Dates. London: Verso, 2002. LEGAL REFERENCES 1. An Outline for European Cyber Diplomacy Engagement. 9967/4/14 REV 4, DG D 1C, Brussels, September 2014. 2. Australian Government Cyber Security Strategy, 2009 // http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Documents/AG%2 0Cyber%20Security%20Strategy%20-%20for%20website.pdf. 3. Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. JOIN(2013) 1 final, Brussels, 2013. 4. Declaration of Principles of International Law Concerning Friendly Relations and Cooperation among States in Accordance with the Charter of the United Nations. Resolution adopted by the General Assembly on October 24, 1970, Res. 2625 (XXV). 5. ICJ Opinion on Legality of Threat or Use of Nuclear Weapons. July 8, 1996, alinea 39. 6. Koncepcia kybernetickej bezpečnosti Slovenskej republiky (Conception of Cyber Security of the Slovak Republic) // https://lt.justice.gov.sk/Attachment/Vlastn%C3%BD%20materi%C3%A1l_do cx.pdf?instEID=1&attEID=75645&docEID=413095&matEID=7996&langEID=1&tStamp=2015 0218154455240. 7. Letter dated January 9, 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations, addressed to the Secretary-General. United Nations, General Assembly, A/69/723, 2015. 8. Nicaragua Case (Military and Paramilitary Activities in and against Nicaragua; Nicaragua v. USA). ICJ Reports, 1986, al. 202. 9. Nicaragua v. USA. ICJ Judgment of June 27, 1986, al. 195. 10. Nové hrozby - kybernetické dimenzie (New risks – cyber dimensions). NATO Review // 88 BALTIC JOURNAL OF LAW & POLITICS VOLUME 10, NUMBER 1 ISSN 2029-0454 2017 http://www.nato.int/docu/review/2011/11-september/cyberThreads/SK/index.htm. 11. Report of Independent International Fact-Finding Mission on the Conflict in Georgia. Vol. I., September 2009 // http://echr.coe.int/Documents/HUDOC_38263_08_Annexes_ENG.pdf. 12. Report of the Independent Fact-Finding Mission on the Conflict in Georgia. Vol. II, September 2009 // http://www.mpil.de/files/pdf4/IIFFMCG_Volume_II1.pdf. 13. Report of the Secretary-General's High-level Panel on Threats, Challenges and Change (2004) // http://www.un.org/en/peacebuilding/pdf/historical/hlp_more_secure_world.p df. 14. Report on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations, General Assembly, Group of Governmental Experts, A/70/174, July 22, 2015 // http://www.un.org/ga/search/view_doc.asp?symbol= A/70/174. 15. Report on Developments in the Field of Information and Telecommunications in the Context of International Security. United Nations, General Assembly, Group of Governmental Experts (GGE). A/68/98, June 24, 2013. 16. Tallinn Manual – Research. CCDCOE (NATO Cooperative Cyber Defence Centre of Excellence) // https://ccdcoe.org/research.html. 17. Tallinn Manual on the International Law Applicable to Cyber Warfare, 2012. 89