Throughout the afternoon of January 27, the panel of speakers at the 12th annual International Humanitarian Law Conference shared their expertise on the issues surrounding cyber warfare with around 80 people in Room 105 at the Schulich School of Law.
The conference was hosted by the John E. Read International Law Studentsâ Society (JERILS) and ±«Óătvâs Law & Technology Institute, in partnership with the Canadian Red Cross. Schulich Law alumna Catherine Gribbin (LLB â06), senior legal advisor for IHL at the Canadian Red Cross, was the moderator.
The keynote speaker was Colonel Gary Brown of Marine Corps University, a former judge advocate with the United States Air Force who speaks on cyber operations law and policy.
In addition to Gribbin and Colonel Brown, the panel consisted of Schulich Law Professor Jonathon Penney; Stephanie Carvin, assistant professor of international relations at Carleton Universityâs Norman Paterson School of International Affairs; and Major Max Reede, legal advisor to Joint Task Force Atlantic and Maritime Forces Atlantic.
Schulich Law Dean Camille Cameron welcomed the speakers and attendees, taking a moment to praise the law students for organizing the conference.
âHats off to our students who have worked so hard to pull this together,â she said, âItâs an important educational event not only for our university community but also for the broader community.â
Schulich Law Professor Robert Currie, director of the Law & Technology Institute, says the topic is timely.
âCyber warfare has landed in the news recently because of the [alleged] Russian hacks on the U.S. election,â he says. âWhile militaries have been working on the front line of trying to develop the law, itâs important that other civil society voices be brought to the table. This conference brought together different viewpoints on a front-burner topic. The Schulich School of Law, with its strong tradition of engagement with both international law and technology, was the ideal place to have it.â
Understanding cyber warfare
According to the International Committee of the Red Cross, cyber warfare has been defined as any hostile measures against an enemy designed âto discover, alter, destroy, disrupt, or transfer data stored in a computer, manipulated by a computer, or transmitted through a computer.â
Examples of hostile use include computer attacks on air traffic control systems, oil pipeline flow systems, and nuclear plants.
Lawyers and technical experts such as information security professionals working at security firms like CrowdStrike and ThreatConnect agree that the potential of computer network attacks is massive, leading to questions about how to apply international humanitarian law (IHL) and how to define âarmed conflict.â
While there is no specific mention of cyber warfare or computer network attacks in the Geneva Conventions or their Additional Protocols, the principles and rules in these treaties governing the means and methods of warfare arenât restricted to situations that existed when they were created. Those who work in IHL clearly anticipate advances in weaponsâ technology and the development of new means and ways of waging war.
Cyber warfare adds a new level of complexity to armed conflict that may pose challenging questions for IHL.
âThereâs so much thatâs unknown â thatâs why weâre excited to be here today,â said Gribbin. âWe must understand the legal context in which cyber warfare is being conducted.â
"Cyber is interested in you"
Colonel Brown made the audience laugh with his first slide, which read, âYou may not be interested in cyber, but cyber is interested in youâŠâ He explained that all of the systems we use now rely on cyber systems.
âIs anyone here concerned about your privacy on the Internet?â asked Brown. âWell, forget it! We gave it up a long time ago. We assume things like the webcams we buy are safe and secure, but everything that touches the Internet is a potential âbotâ in a cyber attack.â
Brown explained that cyber âdisruptions,â as opposed to warfare, are events that only cause inconvenience but no direct injury or death or property destruction; for example, limiting access to bank machines. Among global nations, he cited Russia and China as the best at manipulating data.
Professor Penney said that he confronts international humanitarian law and cyber warfare in his research.
âWe throw around legal and public policy terms like cyber warfare, but we have to focus on how IHL and other laws influence or donât influence cyber attacks,â he said. âIn other words, do state and non-state operatives think about international human rights law and other legal requirements of war when they carry out these attacks â focusing on military rather than civil targets, for instance? And if not, why not?â
An area of significant challenge
Major Reede said that in the foreseeable future, cyber warfare is an area of âsignificant challengeâ and an important area of growth and development for the Canadian military.
âItâs easy to understand a [traditional] bomb, but itâs less easy to understand a logic bomb,â he said. âWhat makes it even more challenging is that the cyber weapons of today might soon be obsolete.â
Professor Carvin pointed to the increasing role that artificial intelligence will play in cyber defence and security in the future. Thereâs also no international standard practice on how data should be stored and maintained, or who should have access to it and when it should be deleted.
âGovernments are good at protecting themselves,â she said, âbut small and medium enterprises arenât.â She advised the aspiring lawyers in the room to think about this question: What is the right to data privacy under IHL?
Third-year law student Dylan OâLeary helped organize the conference.
âThe support and participation of the Canadian Red Cross, the Law & Technology Institute, and the student organizers made the conference a great success,â he said. âCreating a legal regime that can tackle the problem of cyber conflict is one of the foremost challenges that we face as a society. Weâre grateful to the speakers for sharing their expertise and encouraging us to work through the tools and concepts necessary to confront this challenge.â