[QODLink]
Inside Story Americas

Cyber warfare: Where are the limits?

We examine how far the US itself is pioneering offensive cyber policy.

Last Modified: 29 Mar 2013 13:52
Email Article
Print Article
Share article
Send Feedback

A NATO-commissioned report suggests an alleged US cyber attack on Iran's uranium enrichment programme was an "act of force" that was likely illegal. And Microsoft with Google admitted it allowed the FBI to spy on its customers.

"NATO itself is not saying that it was an act of force, it was just a group of scholars and scientist who investigated it, but if it was reversed, and say the US was the victim of this, then I think it could be more a political outcome and could give more of a reason for the US to perhaps want to try to shut down Iran's uranium enrichment plants."

- David Kravets, a senior writer for Wired magazine

Stuxnet was a computer worm discovered in June 2010 that was allegedly created by the US and Israel to target Iran's nuclear facilities.

However, the US has never owned up to involvement.

Now a 300-page manual commissioned by NATO and written by legal scholars and military lawyers from member countries suggests the attack was an act of force prohibited under the United Nations charter. 

After months of the US national security establishment sounding the alarm on the need to defend against potential cyber threats, questions are again being raised about how far the US itself is pioneering offensive cyber policy.

Domestically, American privacy campaigners have been reacting to an admission from Microsoft that the FBI has been able to access customer data by issuing what are known as national security letters that do not require a judge's approval.

So was the Stuxnet attack an illegal act of force? Are the US offensive cyber policies crossing the limits? And are the private rights of the American citizens at risk? 

To discuss this, Inside Story Americas is joined by guests: David Kravets from Wired magazine; Alfredo Lopez, an internet freedom activist; and Julian Sanchez, a research fellow at the Cato Insitute who focuses on technology and civil liberties.

"Certainly there is an act of force, and their policy does seem to leave it open, that if they considered it equivalently damaging to a physical attack that a military response might be justified, so this is the principle they are applying. And in a way it makes a certain ammount of common sense, you don't want to say that taking down an airplane with a stinger missile is an act of war but doing it with a laptop isn't. There is a lot of complications in cyber aspects that make it more dangerous and difficult to apply those rules clearly. It seems like in this case there is the classic attribution problem with cyber attacks, that is, unlike a missile being launched it's much more difficult to know within a great certainty where an attack really originated from."

- Julian Sanchez, a research fellow at Cato Institute

529

Source:
Al Jazeera
Email Article
Print Article
Share article
Send Feedback
Topics in this article
People
Country
Organisation
Featured on Al Jazeera
Italy struggles to deal with growing flood of migrants willing to risk their lives to reach the nearest European shores.
Israel's Operation Protective Edge is the third major offensive on the Gaza Strip in six years.
Muslims and Arabs in the US say they face discrimination in many areas of life, 13 years after the 9/11 attacks.
At one UN site alone, approximately four children below the age of five are dying each day.
Featured
Rights groups say the US prosecution of terrorism cases targets Muslims and are fraught with abuses.
Local painters forgo experimentation to cater to growing number of foreign buyers.
Cyprus is a tax haven and has long attracted wealthy Russians, but it could become a European energy hub.
Palestinians in Gaza have been shocked by the scale of Israeli destruction, as long-term truce efforts continue.
The Positive Action Foundation Philippines, manned by HIV-positive staff, provides care to those who have no one else.
join our mailing list