{"id":15256,"date":"2021-09-09T08:00:16","date_gmt":"2021-09-09T06:00:16","guid":{"rendered":"https:\/\/voelkerrechtsblog.org\/?p=15256"},"modified":"2021-09-09T11:11:09","modified_gmt":"2021-09-09T09:11:09","slug":"is-cyberwar-fought-with-weapons","status":"publish","type":"post","link":"https:\/\/voelkerrechtsblog.org\/de\/is-cyberwar-fought-with-weapons\/","title":{"rendered":"Is \u2018Cyberwar\u2019 Fought with Weapons?"},"content":{"rendered":"<p>How do \u2013 and should \u2013 we classify offensive cyber capabilities? Particularly in the context of international humanitarian law, the question whether offensive cyber capabilities are weapons, means of warfare, or methods of warfare is not just semantics but has legal implications. Yet, there is great terminological inconsistency.<\/p>\n<p>The most prominent term is arguably that of \u2018cyber weapons\u2019. It is used in the <a href=\"https:\/\/www.cambridge.org\/core\/books\/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations\/E4FFD83EA790D7C4C3C28FC9CA2FB6C9\">Tallinn Manual 2.0<\/a> (a non-binding comprehensive academic study on the application of international law to cyber operations), and military manuals (e.g. <a href=\"https:\/\/forsvaret.dk\/globalassets\/fko---forsvaret\/dokumenter\/publikationer\/-military-manual-updated-2020-2.pdf\">Denmark<\/a>), by states (<a href=\"https:\/\/front.un-arm.org\/wp-content\/uploads\/2020\/04\/comments-by-brazil-on-the-pre-draft-report-of-cyber-oewg-8-apr-2020.pdf\">Brazil<\/a>, <a href=\"https:\/\/front.un-arm.org\/wp-content\/uploads\/2021\/04\/A-AC.290-2021-INF-2.pdf\">Egypt<\/a>), the <a href=\"https:\/\/ihl-databases.icrc.org\/customary-ihl\/eng\/docs\/v1_rul_rule71\">International Committee of the Red Cross<\/a> (ICRC), <a href=\"https:\/\/www.accessnow.org\/cms\/assets\/uploads\/2018\/08\/DGC-tech-accord-human-rights.pdf\">tech companies<\/a>, <a href=\"https:\/\/warontherocks.com\/2021\/05\/cyber-security-as-counter-terrorism-seeking-a-better-debate\/\">government officials<\/a>, the <a href=\"https:\/\/www.nytimes.com\/2021\/06\/15\/world\/europe\/biden-putin-cyberweapons.html\">press<\/a>, and <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2400530\">academics<\/a>. In contrast, <a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/glossary\/cyber-weapon\">Australia<\/a> and the US largely refrain from calling offensive cyber capabilities \u2018weapons\u2019 (see e.g. the <a href=\"https:\/\/static.e-publishing.af.mil\/production\/1\/af_ja\/publication\/afi51-401\/afi51-401.pdf\">Air Force Instructions<\/a>, treating weapons and cyber capabilities as two distinct categories). At the same time, the term \u201ccyber means and methods of warfare\u201d can be found in many recently published cyber position papers (see e.g. <a href=\"https:\/\/www.auswaertiges-amt.de\/blob\/2446304\/32e7b2498e10b74fb17204c54665bdf0\/on-the-application-of-international-law-in-cyberspace-data.pdf\">Germany<\/a>, and <a href=\"https:\/\/um.fi\/documents\/35732\/0\/KyberkannatPDF_EN.pdf\/12bbbbde-623b-9f86-b254-07d5af3c6d85?t=1603097522727\">Finland<\/a>).<\/p>\n<p>Against the background of these terminological inconsistencies, this article will examine the legal relevance of and possible approaches to the classification of offensive cyber capabilities to then propose criteria according to which these capabilities could be classified.<\/p>\n<p><strong>The Terminology and Legal Implications of the Classification<\/strong><\/p>\n<p>Offensive cyber capabilities are resources, skills, and operational concepts used to <a href=\"https:\/\/ccdcoe.org\/uploads\/2012\/01\/3_3_Applegate_ThePrincipleOfManeuverInCyberOperations.pdf\">manipulate, deny, disrupt, degrade or destroy<\/a> targeted communications and information systems and achieve strategic, political, or military <a href=\"https:\/\/assets.publishing.service.gov.uk\/government\/uploads\/system\/uploads\/attachment_data\/file\/549291\/20160720-Cyber_Primer_ed_2_secured.pdf\">objectives in or through cyberspace<\/a>. They include, but are not limited to, \u201c<a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/glossary\/cyber-weapon\">computer code that is used, or designed to be used, with the aim of causing physical, functional, or mental harm to structures, systems, or people<\/a>.\u201d<\/p>\n<p>While the term \u2018cyber weapons\u2019 is very much <em>en vogue<\/em>, there is no authoritative or globally acknowledged definition of \u2018cyber weapons\u2019 (see <a href=\"https:\/\/ccdcoe.org\/uploads\/2018\/10\/TP-11_2018.pdf\">here<\/a>, <a href=\"https:\/\/jnslp.com\/wp-content\/uploads\/2014\/02\/Easier-Said-than-Done.pdf\">here<\/a>, and <a href=\"https:\/\/ccdcoe.org\/uploads\/2020\/05\/Data_as_a_weapon_-_reviews_and_oversight_FINAL_PDF.pdf\">here<\/a>). The inflationary and often unreflective categorization of offensive cyber capabilities as \u2018cyber weapons\u2019 neglects the specifics of the capability in question and leads to confusion about the legal rules applicable thereto.<\/p>\n<p>In the context of international humanitarian law (IHL), the terms \u2018means of warfare\u2019 and \u2018methods of warfare\u2019 are much more pertinent. Importantly, \u2018means of warfare\u2019 is commonly understood to <a href=\"https:\/\/casebook.icrc.org\/law\/conduct-hostilities#chapter4\">encompass weapons and weapons systems<\/a> (cf. <a href=\"https:\/\/ihl-databases.icrc.org\/applic\/ihl\/ihl.nsf\/Treaty.xsp?documentId=D9E6B6264D7723C3C12563CD002D6CE4&amp;action=openDocument\">ICRC Commentary to Additional Protocol I<\/a>, Rule 103 of the <a href=\"https:\/\/www.cambridge.org\/core\/books\/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations\/E4FFD83EA790D7C4C3C28FC9CA2FB6C9\">Tallinn Manual 2.0<\/a>, and <a href=\"https:\/\/www.eda.admin.ch\/dam\/eda\/en\/documents\/aussenpolitik\/voelkerrecht\/20210527-Schweiz-Annex-UN-GGE-Cybersecurity-2019-2021_EN.pdf\">Switzerland<\/a><u>\u2019s<\/u> cyber position paper, p.\u00a09). In this sense, whatever falls within the ambit of the above definition of \u2018cyber weapons\u2019 also falls under the ambit of \u2018means of warfare\u2019. The term \u2018methods of warfare\u2019, on the other hand, \u201cdesignates the way or manner in which the weapons are used\u201d and \u201ccomprises any specific, tactical or strategic, ways of conducting hostilities that are not particularly related to weapons and that are intended to overwhelm and weaken the adversary\u201d (see <a href=\"https:\/\/casebook.icrc.org\/law\/conduct-hostilities#chapter4\">here<\/a>, cf. Rule 103 <a href=\"https:\/\/www.cambridge.org\/core\/books\/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations\/E4FFD83EA790D7C4C3C28FC9CA2FB6C9\">Tallinn Manual 2.0<\/a>).<\/p>\n<p>While the review obligation and the precautionary principle under Articles 36 and 57(2)(a)(ii) <a href=\"https:\/\/ihl-databases.icrc.org\/applic\/ihl\/ihl.nsf\/Treaty.xsp?action=openDocument&amp;documentId=D9E6B6264D7723C3C12563CD002D6CE4\">Additional Protocol I<\/a>, respectively, apply to both means (encompassing weapons) and methods of warfare, the classification of cyber capabilities as either means or methods of warfare makes a crucial difference regarding the law of neutrality. The latter forbids belligerents \u201cto move [\u2026] convoys of either munitions of war or supplies across the territory of a neutral Power\u201d (Article 2 <a href=\"https:\/\/ihl-databases.icrc.org\/applic\/ihl\/ihl.nsf\/Treaty.xsp?documentId=71929FBD2655E558C12563CD002D67AE&amp;action=openDocument\">Hague V<\/a>) and obliges neutral states to prevent their territory from being used by the belligerents (Article 5 Hague V). The <a href=\"https:\/\/www.cambridge.org\/core\/books\/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations\/E4FFD83EA790D7C4C3C28FC9CA2FB6C9\">Tallinn Manual 2.0<\/a>\u2019s Rule 151 states that \u201cphysically transporting cyber weapons [and] transmission of cyber weapons across cyber infrastructure located in the neutral State\u201d falls under the prohibition of Article 2 Hague V.<\/p>\n<p>Problematically, due to the interconnectedness of cyberspace, code used for offensive cyber operations will almost always be routed through neutral territory and civilian information and communications technology (ICT) infrastructure. For the same reason, <a href=\"https:\/\/www.datamachines.io\/blog\/viruses-and-malware-tricks-not-treats\">its path and spread are nearly impossible to control once employed.<\/a> Even the <a href=\"https:\/\/cyber-peace.org\/cyberpeace-cyberwar\/relevante-cybervorfalle\/stuxnet\/\">Stuxnet worm<\/a>, employed against an Iranian nuclear facility, though considered carefully designed and precise, did not only affect the targeted system but spread to several <a href=\"https:\/\/www.wsj.com\/articles\/BL-CIOB-1156\">unintended targets<\/a> across multiple countries. During <a href=\"https:\/\/www.avg.com\/en\/signal\/what-is-ddos-attack\">distributed denial-of-service (DDoS) operations<\/a>, <a href=\"https:\/\/www.malwarefox.com\/botnet\/#:~:text=The%20botnet%20is%20a%20network%20of%20robots.%20Developers,herders.%20They%20have%20access%20to%20thousands%20of%20devices.\">Botnets<\/a>, <em>i.e.<\/em> networks of hijacked internet-connected devices which are remotely controlled and operated to perform a certain task, are employed to flood a target system with requests to overload and disrupt it. The massive number of requests likely also overwhelms and (temporarily) incapacitates the systems it is routed through. Accordingly, the employment of offensive cyber capabilities that classify as means of warfare would almost always violate the law of neutrality. This would render their employment virtually impossible.<\/p>\n<p>On the other hand, if offensive cyber capabilities were seen as methods of warfare, the law of neutrality would not prohibit states from transmitting code used for offensive cyber operations through neutral territory: The transmission of code would be a permitted use of ICT infrastructure in the neutral state (cf. Article 8 Hague V). This would risk undermining the <a href=\"https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?tp=&amp;arnumber=6243964\">purpose of the law of neutrality<\/a> \u2013 protecting neutral states and their nationals and preventing a further escalation of the conflict.<\/p>\n<p><strong>\u2018One Size Fits All\u2019 versus Case-by-Case Approach<\/strong><\/p>\n<p>In accordance with the terminology chosen in the <a href=\"https:\/\/www.cambridge.org\/core\/books\/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations\/E4FFD83EA790D7C4C3C28FC9CA2FB6C9\">Tallinn Manual 2.0<\/a>, most publicly available cyber position papers contain the notion \u2018cyber means and methods of warfare\u2019 (e.g. <a href=\"https:\/\/www.internationalcybertech.gov.au\/sites\/default\/files\/2021-06\/Australia%20Annex%20-%20Final%2C%20as%20submitted%20to%20GGE%20Secretariat.pdf\">Australia<\/a>, <a href=\"https:\/\/www.auswaertiges-amt.de\/blob\/2446304\/32e7b2498e10b74fb17204c54665bdf0\/on-the-application-of-international-law-in-cyberspace-data.pdf\">Germany<\/a>, <a href=\"https:\/\/um.fi\/documents\/35732\/0\/KyberkannatPDF_EN.pdf\/12bbbbde-623b-9f86-b254-07d5af3c6d85?t=1603097522727\">Finland<\/a>, <a href=\"https:\/\/www.internationalcybertech.gov.au\/sites\/default\/files\/2021-06\/Australia%20Annex%20-%20Final%2C%20as%20submitted%20to%20GGE%20Secretariat.pdf\">Australia<\/a>, <a href=\"https:\/\/www.eda.admin.ch\/dam\/eda\/en\/documents\/aussenpolitik\/voelkerrecht\/20210527-Schweiz-Annex-UN-GGE-Cybersecurity-2019-2021_EN.pdf\">Switzerland<\/a>, and the <a href=\"https:\/\/www.icrc.org\/en\/download\/file\/108983\/icrc_ihl-and-cyber-operations-during-armed-conflicts.pdf\">ICRC<\/a>). While all documents lack an elaboration on criteria for distinguishing between means and methods, they indicate support for a classification on a case-by-case basis.<\/p>\n<p>In contrast, a \u2018one size fits all\u2019 approach to the classification is now advocated by the Tallinn Manuals&#8217; general editor, Michael Schmitt. By comparison, he <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3424500\">concludes<\/a> that offensive cyber capabilities lack a prevalent characteristic of acknowledged physical weapons &#8211; direct causation of the terminal effect on the target \u2013 because they \u201c<a href=\"https:\/\/www.youtube.com\/watch?v=AQWG_hjV9Yc\">merely tr[y] to convince another computer to do something<\/a>\u201d. Thus, all offensive cyber capabilities would constitute methods of warfare.<\/p>\n<p>Considering the variety of types and technical means of cyber capabilities, a \u2018one size fits all\u2019 approach is overly simplified. Moreover, relying on characteristics decisive in the physical domain neglects the fact that cyber capabilities\u2019 nature, deployment, and ways of causing harm are fundamentally different from physical weapons. While the terminal effect (i.e. damage\/destruction to objects, injury\/death to persons) is a <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3424500\">primary effect of physical weapons<\/a>, it is usually a second-, or third-order effect of cyber capabilities. Primary effects of cyber capabilities include \u201c<a href=\"https:\/\/ccdcoe.org\/uploads\/2018\/10\/TP-11_2018.pdf\">the deletion, corruption, or alteration of data or the disruption of an adversary\u2019s computer network.<\/a>\u201d The Stuxnet <a href=\"https:\/\/us.norton.com\/internetsecurity-malware-what-is-a-computer-worm.html\">worm<\/a>, for example, successfully took over the operation of centrifuges in an Iranian nuclear enrichment facility and caused the system to send faulty instructions (first-order effect), leading to the malfunctioning of the centrifuges (second-order effect) and ultimately the destruction of some centrifuges (third-order and terminal effect).<\/p>\n<p>In the desirable event that <a href=\"https:\/\/www.cambridge.org\/core\/journals\/israel-law-review\/article\/abs\/cyber-warfare-applying-the-principle-of-distinction-in-an-interconnected-space\/62FD230E8D5EDB2D6F7226B5F4EDD261\">loss of functionality<\/a> is recognized as damage, the primary effect of Botnets used in <a href=\"https:\/\/www.avg.com\/en\/signal\/what-is-ddos-attack\">DDoS operations<\/a>, the (temporary) incapacitation of the target system with the amount of requests they send to the target system, and ransomware (like <a href=\"https:\/\/www.hypr.com\/wannacry\/\">WannaCry<\/a>) which encrypts targeted files rendering them unusable, would also be the terminal effect. The same is true for <a href=\"https:\/\/www.avg.com\/en\/signal\/what-is-malware\">malware<\/a> deleting data, if <a href=\"https:\/\/digital-commons.usnwc.edu\/cgi\/viewcontent.cgi?article=1725&amp;context=ils\">data is considered an object<\/a>. Those capabilities have in common that \u2013 once launched \u2013 they operate and develop independently from human interaction, thus entailing an almost incalculable risk of spreading uncontrollably and harming unintended targets. One could refer to them as <a href=\"https:\/\/ccdcoe.org\/uploads\/2021\/05\/CyCon_2021_Kaminska_Broeders_Cristiano.pdf\">automated<\/a>.<\/p>\n<p>Different from these cyber capabilities are non-automated cyber capabilities, which are employed to gain access to and control over a system which can then be manually influenced (consider e.g. recent <a href=\"https:\/\/siliconangle.com\/2021\/02\/08\/hacker-targets-florida-treatment-plant-attempts-poison-water-supply\/\">water plant incidents<\/a>). Here, the terminal effect is not initiated by the primary effect of the offensive cyber capability. To cause harm, intermediary human interaction is needed to exploit the situation established by the primary effect.<\/p>\n<p><strong>Conclusion: A Proposal for Classification Criteria<\/strong><\/p>\n<p>Against this background, the capacity to inflict damage or destruction as a primary effect must not be an essential feature of a cyber weapon \u2013 because no authoritative weapons definition requires it, and it contradicts the mode of action of all cyber capabilities. The classification of offensive cyber capabilities should focus on technical means, the need of intermediary human interaction to cause harm, and on effects on the target system, the civilian population, and neutral states.<\/p>\n<p>In line with this, offensive cyber capabilities would classify as means of warfare (weapons) if they 1) are automated, 2) have the capacity to initiate the process leading to the terminal effect on the target independently without human interference, and 3) are intended to and can cause a certain degree of harm (not just <a href=\"https:\/\/digital-commons.usnwc.edu\/cgi\/viewcontent.cgi?article=2462&amp;context=ils\">inconvenience, irritation, or fear<\/a>). Stuxnet, for example, would fall within this category.<\/p>\n<p>Non-automated offensive cyber capabilities, on the other hand, where the situation created by virtue of the primary effect must be actively exploited (e.g. <a href=\"https:\/\/siliconangle.com\/2021\/02\/08\/hacker-targets-florida-treatment-plant-attempts-poison-water-supply\/\">water plant incidents<\/a>) to cause harm, would constitute methods of warfare. This also fits in with <a href=\"https:\/\/casebook.icrc.org\/glossary\/methods-warfare\">methods of warfare<\/a> of the physical domain, like <a href=\"https:\/\/casebook.icrc.org\/glossary\/perfidy\">perfidy<\/a>, where e.g. feigning surrender or improper use of distinctive emblems elicit confidence from the belligerent (primary effect) which is betrayed\/exploited to cause harm.<\/p>\n<p>While the criteria set out above will likely raise some intricate follow-up questions, they can be a starting point to discuss the classification of cyber capabilities independent from inadequate reliance on cyber capabilities\u2019 ability to demonstrate characteristics of physical weapons.<\/p>\n<p>&nbsp;<\/p>\n<p><em>The \u201cBofaxe\u201d series appears as part of a\u00a0<\/em><a href=\"https:\/\/voelkerrechtsblog.org\/new-collaboration-between-volkerrechtsblog-and-ruhr-university-bochums-institute-for-international-law-of-peace-and-armed-conflict-ifhv\/\"><u><em>collaboration<\/em><\/u><\/a><em>\u00a0between the\u00a0<\/em><a href=\"http:\/\/www.ifhv.de\/\" target=\"_blank\" rel=\"noopener\"><u><em>IFHV<\/em><\/u><\/a><em>\u00a0and V\u00f6lkerrechtsblog.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How do \u2013 and should \u2013 we classify offensive cyber capabilities? Particularly in the context of international humanitarian law, the question whether offensive cyber capabilities are weapons, means of warfare, or methods of warfare is not just semantics but has legal implications. Yet, there is great terminological inconsistency. The most prominent term is arguably that [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6639],"tags":[],"authors":[6056],"article-categories":[5108],"doi":[],"class_list":["post-15256","post","type-post","status-publish","format-standard","hentry","category-uncategorized","authors-lisa-m-cohen","article-categories-bofaxe"],"acf":{"subline":"On the Classification of Offensive Cyber Capabilities in International Humanitarian Law"},"meta_box":{"doi":"10.17176\/20210909-093732-0"},"_links":{"self":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/15256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/comments?post=15256"}],"version-history":[{"count":2,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/15256\/revisions"}],"predecessor-version":[{"id":15259,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/15256\/revisions\/15259"}],"wp:attachment":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/media?parent=15256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/categories?post=15256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/tags?post=15256"},{"taxonomy":"authors","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/authors?post=15256"},{"taxonomy":"article-categories","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/article-categories?post=15256"},{"taxonomy":"doi","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/doi?post=15256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}