{"id":239,"date":"2010-09-27T20:25:44","date_gmt":"2010-09-27T17:25:44","guid":{"rendered":"http:\/\/2jk.org\/english\/?p=239"},"modified":"2010-09-27T20:25:44","modified_gmt":"2010-09-27T17:25:44","slug":"on-electronic-war-crimes","status":"publish","type":"post","link":"https:\/\/2jk.org\/english\/2010\/09\/27\/on-electronic-war-crimes\/","title":{"rendered":"On Electronic War Crimes"},"content":{"rendered":"<p>A rumor was spread that <a href=\"http:\/\/www.zerohedge.com\/article\/security-expert-suggests-stuxnet-originated-israel\">Israel was the brain behind an elaborate trojan horse<\/a>, <a href=\"http:\/\/www.symantec.com\/connect\/blogs\/stuxnet-introduces-first-known-rootkit-scada-devices\">Stuxnet<\/a>, which <a href=\"http:\/\/www.siliconrepublic.com\/strategy\/item\/17911-cyber-attack-stuxnet-worm\/\">alegedly penetrated into the Iranian nuclear reactor<\/a> and apparently caused damage. <a href=\"http:\/\/news.cnet.com\/8301-27080_3-20013545-245.html\">the trojan horse contaminated some civil facilities as well<\/a>. The trojan horse, which utilizes no less than <a href=\"http:\/\/it.slashdot.org\/story\/10\/09\/14\/1851224\/Stuxnet-Attacks-Used-4-Windows-Zero-Day-Exploits?from=rss\">four different zero-day vulnerabilities in Microsoft Windows<\/a> seems interesting and elaborate. However, the alleged involvement of Israel, alongside the claim that civilian facilities were damaged in the act, raise one interesting question: <b>Could there be electronic war crimes?<\/b><\/p>\n<p>The Public International Law, which bases the humane treatment to civilians in the different Geneva Conventions, sets the standards to use in times of war and defines acts prohibited by states in order to keep wars as civil as possible. The different conventions limit force and sanctions against civilians, but do those treaties and conventions apply on electronic warfare?<\/p>\n<p><i>Prima facia<\/i>, article 53 to the <a href=\"http:\/\/www.icrc.org\/ihl.nsf\/385ec082b509e76c41256739003e636d\/6756482d86146898c125641e004aa3c5\">fourth Geneva Convention<\/a> which deals in protecting civilians in times of war states that &#8220;<i>Any destruction by the Occupying Power of real or personal property belonging individually or collectively to private persons, or to the State, or to other public authorities, or to social or cooperative organizations, is prohibited, except where such destruction is rendered absolutely necessary by military operations<\/i>&#8220;. However, the fourth convention applies only, in this article, to occupied territories (<a href=\"http:\/\/www.unhcr.org\/refworld\/publisher,ICTY,,,47fdfb53d,0.html\">Prosecutor v. Dario Kordic, Mario Cerkez<\/a>). In contrast, <a href=\"http:\/\/deoxy.org\/wc\/wc-proto.htm\">the 1977 protocol<\/a> amended and added to article 51 and stated that &#8220;Indiscriminate attacks are prohibited. Indiscriminate attacks are:those which are not directed at a specific military objective; &#8220;. Meaning that an electronic attack against civilian property that couldn&#8217;t discriminate between military and civilian facilities are prohibited (However, most states have not adopted the 1977 protocol).<\/p>\n<p><strong>Jack Goldsmith<\/strong> states that <a href=\"http:\/\/www.theinternetpatrol.com\/should-cyberwar-have-to-follow-the-geneva-convention-and-the-rules-of-engagement\/\">the inability to determine which computers are military and which are civilian may protect the use of computer viruses in electronic warfare<\/a>, but I reckon the other way around: In the same way that indiscriminate shooting against innocent civilians is a war crime, so is using a trojan horse that does not differ civilian and military computers. The indiscriminate use is as prohibited as <a href=\"http:\/\/www.icrc.org\/web\/eng\/siteeng0.nsf\/html\/section_ihl_chemical_weapons\">the use of chemical weapons which cannot discriminate civilians and soldiers<\/a>. It is not a coincidence that the terminology is the same: computer or biological viruses.<\/p>\n<p>And what about the civil liability? Theoretically, the state immunity (and liability) should be limited in times of war (and see, in Israel<a href=\"http:\/\/www.nevo.co.il\/Law_html\/law01\/306_002.htm\">The Act of Civil Torts (State Liability) 1952<\/a>) and the state should not be liable for acts where the state protected itself; however, this doctrine should not be used in cases where civil damage arose when the state knew, should have known and forseen the damage (HCJ 8276\/05<a href=\"http:\/\/elyon1.court.gov.il\/files\/05\/760\/082\/a13\/05082760.a13.pdf\">Adallah v. Minister of Defense<\/a>). Therefore, the civilian casualties in Israel&#8217;s alleged cyber-attack should have liability against it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A rumor was spread that Israel was the brain behind an elaborate trojan horse, Stuxnet, which alegedly penetrated into the Iranian nuclear reactor and apparently caused damage. the trojan horse contaminated some civil facilities as well. The trojan horse, which utilizes no less than four different zero-day vulnerabilities in Microsoft Windows seems interesting and elaborate. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,3,23,22],"tags":[305,306,410,307,308],"_links":{"self":[{"href":"https:\/\/2jk.org\/english\/wp-json\/wp\/v2\/posts\/239"}],"collection":[{"href":"https:\/\/2jk.org\/english\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2jk.org\/english\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2jk.org\/english\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/2jk.org\/english\/wp-json\/wp\/v2\/comments?post=239"}],"version-history":[{"count":1,"href":"https:\/\/2jk.org\/english\/wp-json\/wp\/v2\/posts\/239\/revisions"}],"predecessor-version":[{"id":240,"href":"https:\/\/2jk.org\/english\/wp-json\/wp\/v2\/posts\/239\/revisions\/240"}],"wp:attachment":[{"href":"https:\/\/2jk.org\/english\/wp-json\/wp\/v2\/media?parent=239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2jk.org\/english\/wp-json\/wp\/v2\/categories?post=239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2jk.org\/english\/wp-json\/wp\/v2\/tags?post=239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}