yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Defining cyberwarfare...in hopes of preventing it - Daniel Garrie


3m read
·Nov 8, 2024

Wars are a tragic part of our history and will almost certainly be a tragic part of our future. Since the establishment of the United Nations, wars of aggression have been outlawed, and multilateral conventions refer to armed conflict instead of war. But the wars of the future won't be like the wars of our past. Alongside traditional warfare, our future will include cyberwarfare, remotely fighting our enemies through the use of a new class of weapons, including computer viruses and programs to alter the enemy's ability to operate.

And not only is cyberwarfare not covered by existing legal frameworks, but the question of what exactly constitutes cyberwarfare is still highly debated. So, how can we deal with cyberwarfare if we can't even agree on what it means? One way forward is to envision situations where new international laws may be needed. Imagine a new kind of assassin, one that could perpetrate a crime without firing a single shot or even being in the same country. For example, an individual working for the government uses a wireless device to send a signal to another foreign leader's pacemaker. This device directs the pacemaker to malfunction, ultimately resulting in the foreign leader's death.

Would this cyber assassination constitute an act of war? As a second example, imagine an allied group of nations cooperatively infiltrating the computer systems of an enemy nation's nuclear warship. This attack results in a nuclear-powered aircraft carrier almost melting down, which was stopped just short of killing thousands of soldiers and civilians. As a defensive measure, the enemy country responds by unleashing a defensive cyberattack that results in the allied nations' power grids going down. Hospitals can no longer treat patients, entire regions without heat or clean water, all ultimately causing tens of thousands of civilian deaths.

The origin of the power failure was the counterattack, but the fragile infrastructure, feeble cybersecurity, and the antiquated state of the power grid all contributed to the deaths of the civilians. Could the country fight back? Who would they fight? And would their retaliation be considered an act of war? Do they constitute war crimes against humanity? Who is to be held responsible? The computer programmers who wrote the code? The military project manager who oversaw the creation of the code? The commander who hit the button, setting off the event? The hardware engineer who created the computers, knowing that they were intended to enable an attack?

Because war has been with us for so long, we have laws to deal with figuring out who should be held accountable for their actions in combat. These legal frameworks aim to contain and prevent atrocities from being more atrocious. Commandeering civilian planes and using them as weapons, dropping atomic bombs, the use of gas chambers or poisonous gas in conflict, all of these actions, if committed, constitute acts of war and war crimes under customary international law and the Hague conventions.

Again, the current legal framework stays silent on hypothetical questions and countless others because there are no easy answers, and there are only two ways to make progress on these questions: peace or new laws. So, what hypothetical but plausible scenarios can you imagine falling under the burgeoning definition of cyberwarfare, and how might you design an international legal framework to deter these activities?

More Articles

View All
Photos: When Food Prices Go Up, What Happens? | Nat Geo Live
We are now 7.3 billion fellow human beings, on the only place we can live, and in the next twenty-five years, we’re going to be 9 billion fellow human beings with no other place to go. I went to Egypt. Right before the landscape of the Great Pyramids of …
Proving the SSS triangle congruence criterion using transformations | Geometry | Khan Academy
What we’re going to do in this video is see that if we have two different triangles where the corresponding sides have the same measure. So this orange side has the same length as this orange side. This blue side has the same length as this blue side. Thi…
Determining the effects on f(x) = x (multiple transformations) | Algebra 1 (TX TEKS) | Khan Academy
We’re told here is a graph of a segment of f of x is equal to x. That’s this here, and then they say h of x is equal to 1⁄3 * f of x minus 5. Graph h. So think about how you would approach this before we do this together. All right, now I’m going to do t…
TAOISM | The Art of Not Trying
Those who stand on tiptoes do not stand firmly. Those who rush ahead don’t get very far. Those who try to outshine others dim their own light. — Lao Tzu How can we improve when we stop trying to improve? Many people waste their efforts trying to better …
A Conversation with Aileen Lee - Moderated by Geoff Ralston
Today I am honored to have my good friend Aileen Lee here, and we’re going to have a conversation about stuff. Yeah, well, I hope we talk about like aliens. Aileen is a very public personality in the venture world, so there’s lots of great talks she has g…
Developing strategies for multiplying two digit decimals
Let’s say I want to multiply 3 point 1, or 3 and 1⁄10, times 2.4, which can also be described as 2 and 4⁄10. So pause the video and see if you can do this. Once again, I’ll give you a hint: see if you can express these as fractions. There are a couple of…