Telecommunications Regulation: Domestic and International

advertisement
Telecommunications
Regulation:
Domestic and International
MSIS 5600
Information Warfare and International
Law
(c) 2003 Charles G. Gray
1
Communications without
intelligence is noise; intelligence
without communications is
irrelevant.
General Alfred M. Gray, USMC
(c) 2003 Charles G. Gray
2
There are two powers in the world,
the sword and the mind. In the
long run the sword is always
beaten by the mind.
Napoleon Bonaparte
(c) 2003 Charles G. Gray
3
Questions to be Considered
• What is “information warfare” (IW)?
• Who are the ”combatants” in IW?
– Nation-states?
– Non-governmental entities (terrorists?)?
• What are (in the information age)?
– “Force”
– “Armed attack”
– “Armed aggression”
• What role is played by “intent” in IW?
(c) 2003 Charles G. Gray
4
Terms of Reference
•
•
•
•
•
National sovereignty
Inviolability of national boundaries
Belligerents
Kinetic (physical) vs. electronic conflict
National sovereignty
– Treaty of Westphalia, 1648
• Exclusive authority over events within the borders
• What is crime –
– Who commits it?
– What does the law say about it?
(c) 2003 Charles G. Gray
5
Sources of International Law
• Treaties/Conventions
• Resolutions (Generally non-binding)
• Customary Law
– Opinio Juris (“General practice accepted as law”)
• Conventional Law
– Jus Cogens (Acceptance and recognition by a
“large majority” of states”)
(c) 2003 Charles G. Gray
6
UN Definitions Related to War
• War inherently includes armed forces, force
and violence
– US and allies understand this to not include
economic coercion
• Aggression – the use of armed force by a
state against the sovereignty, territorial
integrity or political independence of another
state
• First use of armed force is prima facie
evidence of aggression
(c) 2003 Charles G. Gray
7
More UN Definitions
• Aggression is limited to the use of force
• Attacks – acts of violence against the
adversary, whether in offense or defense
• Not clear if IW constitutes an “armed attack”
• An attack on a social system might be part of
a war, but would not alone constitute an act
of war
• A state of “war” can exist without actual
fighting
(c) 2003 Charles G. Gray
8
Information Warfare Defined
Information warfare is the offensive and
defensive use of information and
information systems to deny, exploit,
corrupt, or destroy an adversary’s
information, information-based processes,
information systems, and computer-based
networks while protecting one’s own. Such
actions are designed to achieve advantages
over military or business adversaries.
Dr. Ivan Goldberg
(c) 2003 Charles G. Gray
9
Possible IW Scenarios
• Trap door
– Control code in a PSTN switch
• Mass dialing attack
– Overwhelm a local (or LD) phone system
• Logic bomb
– Misroute trains into collisions
• Video morphing
– Broadcast propaganda or misinformation
• Mass e-mail attack
– Paralyze a significant network
(c) 2003 Charles G. Gray
10
More Possible IW Scenarios
• Worms and viruses
– Damage data and disrupt systems
• “Infoblockade” (Okay under UN Article 41)
– Stop or restrict electronic information at the border
• Clandestine database access
– Disclose confidential personal, medical or financial
data for blackmail, extortion or widespread social
disruption and/or embarrassment
(c) 2003 Charles G. Gray
11
IW Computer Intrusion
• Modify pharmaceutical manufacturing
formulas
• Change blood types in military/civilian
hospitals
• Corrupt bank databases, causing financial
panic (banks shut down to find/repair)
• Disrupt C3 on the battlefield
• Manipulate commodity exchanges, power
grid, municipal traffic control, air traffic
control or navigation systems
(c) 2003 Charles G. Gray
12
Characteristics of International
Law
•
•
•
•
Not created by legislatures or courts
Not enforced by police and courts
Established by agreement
Established by explicit or tacit agreement,
among parties who will be bound by it
– Similar to private contracts
• International Court of Justice
– No established enforcement power
– Depends on political and diplomatic pressures
(c) 2003 Charles G. Gray
13
Violation of International Law
• A state may choose to violate international
law – When int’l law conflicts with pursuit of their
fundamental interests
• For example, national security
– Nation is willing to withstand international
objections and criticism
(c) 2003 Charles G. Gray
14
Historic “Information Warfare”
• Camouflage (Macduff brought Burnham
Wood to Dunsinane (Macbeth, Act V)
• Greeks used sun reflected from bright
shields
• US Civil War – both sides cut telegraph
wires
• Breaking cipher codes in all wars
(c) 2003 Charles G. Gray
15
IW Challenges to International Law
• Dual-use nature of IT blurs distinction
between military and civilian targets
– 90+% of US military telecommunications is
handled over “civilian” facilities
• Damage is different from traditional warfare
– Disruption, corruption or manipulation of data
may cause intangible damage
– Damage to civil society or government services
may be more like economic sanctions than war
(c) 2003 Charles G. Gray
16
More IW Challenges
• Radio waves challenge the concept of
national, territorial sovereignty
– Sovereignty may not be suited in an
increasingly “wired” world
– Signals don’t stop at international borders
• Targets are hard to define
– Military (good target) vs. civilian (not good)
– Intangible damage may not even be the kind
protected by the “humanitarian law of war”
(c) 2003 Charles G. Gray
17
Physical Destructiveness
Propaganda Computer intrusion
disrupting communiBroadcast
cations
Computer intrusion
causing dam failure
(c) 2003 Charles G. Gray
Thermonuclear
attack
18
Physical Intrusiveness
Infoblockade
Computer intrusion
Espionage
(c) 2003 Charles G. Gray
Invasion
19
Character of Target
Church-run
hospital
Social
Service
System
Public
Switched
Network
Transportation
infrastructure
(c) 2003 Charles G. Gray
Munitions
Plant
Tank
20
The Legality of IW
• IW not explicitly prohibited
– General rule – it is legal if not expressly
prohibited
– General principles may still apply
• Territory of neutral states is inviolable
– Attack through a network, satellite, or computer
in a neutral country same as planes flying over
• Considered illegal, and perhaps an act of war against
the neutral
(c) 2003 Charles G. Gray
21
Principles of a “Just War”
• jus ad bellum
– Just cause
• Good reason to go to war
– Competent authority
• Legitimate – authorized by the government
– Right intention
• Seeks to restore a just peace
– Limited objectives
• War is just only if its goals are limited
– Last resort
• Exhaust all peaceful means of resolution
– Reasonable hope of success
(c) 2003 Charles G. Gray
22
Concept of jus in bello
• Applicable after a war starts
• Discrimination – Military force must be
applied only against the political leadership
and military forces of the state. Discriminate
between soldiers and civilians. Minimize
civilian casualties.
• Proportionality – The destruction inflicted by
military forces in war must be proportional to
the goals they seek to realize. An indiscriminate war of attrition to eliminate the enemy
society altogether is not morally justified.
(c) 2003 Charles G. Gray
23
IW and the ITU
• Radio interference rules do not apply
between belligerents
• Offshore radio stations are banned
• Governments obliged to protect the secrecy
of international correspondence
– States retain the right to stop radio or wire transmissions for national or domestic security
• Can’t transmit false or misleading signals
(station identification, etc.)
(c) 2003 Charles G. Gray
24
IW and the IFRB
• Interference and interoperability are the
major concerns
• No authority to enforce its decisions
• Violations are more likely to be breaches of
contract than acts of war requiring a
“kinetic response”
• States usually respect the rules against
interference, expecting that their own
communications will be similarly protected
(c) 2003 Charles G. Gray
25
IW and Space
• 1967 Multilateral “Outer Space Treaty”
– Equal access for exploration, no WMD
• 1971 Intelsat Agreement and 1976 Inmarsat
Convention specify only nondiscrimination
between nations
• 1979 “Moon Treaty” (US has not ratified)
– Equal access for exploration, no WMD
• No prohibition to IW using satellites
• Orbital surveillance, navigation, weapons
guidance and military comm are all legal
(c) 2003 Charles G. Gray
26
Practical Considerations
• Espionage, universally a crime under domestic
law, does not violate international law
• Orbital remote sensing with radar/radio permitted
during war or peace
• “Protection of undersea cables” rules exempt
belligerents
• Radio/TV jamming used in both war and peace
since 1934
• Ruses are legitimate (Trojan Horse, old and new)
(c) 2003 Charles G. Gray
27
International Humanitarian Law
• St. Petersburg Declaration of 1868
– The only legitimate object of war is to weaken
the enemy’s military forces
– Civilians cannot be the subject of an attack
• Hague Convention of 1907, Geneva
Convention of 1949, etc.
• Permissible methods of hurting an enemy are
not unlimited
• Cruelty of war must be mitigated and limited
(c) 2003 Charles G. Gray
28
Humanitarian Law Examples
• Covered
–
–
–
–
Attack on an air traffic control system
Destruction of pipelines by surging oil through
Causing meltdown of a nuclear reactor
Trigger release of toxic chemicals
• Not covered
– Disrupting a university intranet
– Downloading financial records
– Cyber espionage not causing injury, death or
destruction
(c) 2003 Charles G. Gray
29
Manipulating Enemy Perceptions
• Spurring internal turmoil - lawful
– Manipulate perceptions of leaders or populace
– Spoofing intelligence information
• Database modification to mark an infantry
HQ as a hospital - unlawful
• Perfidy - unlawful
– Feigning truce, surrender, civilian status
– Attacking in the uniform of the enemy
(c) 2003 Charles G. Gray
30
Responding to an IW Attack
• How to identify an event as an actual attack
– Up to 500,000 “hacks” per year on DoD systems
– Distinguish between an attack and “buggy”
software
– AT&T network failure 1990
• Faulty software – not a hacker attack
• USAF Rome Lab, 1994 – hackers in the UK
downloaded all S. Korean nuclear data
– Feared N. Korea would interpret as an act of war
(c) 2003 Charles G. Gray
31
Extradition of IW Attackers
• State cannot respond until source is found
• Options are unsettled and potentially
unsatisfactory
• Extradition treaty required – no underlying
right of extradition under international law
• Jurisdictional disputes are common
• “Double criminality” – act must be criminal
in both countries involved
– Pakistan wanted Madonna and Michael Jackson
• “Political offenses” exempt
(c) 2003 Charles G. Gray
32
Alternatives to Extradition
•
•
•
•
Diplomatic pressure
Economic sanctions
Multilateral pressure
Abduction
– Not illegal under US law
– State has a right to try, even if capture was
technically illegal
(c) 2003 Charles G. Gray
33
US (Air Force) IW Objectives
• Corruption
– Make data nonsensical or inaccurate
• Deception
– Alteration of information, creating false
knowledge, masquerading
• Delay
– Slow the flow of information, and acquisition
of new knowledge
• Denial
– Adversary denied access to information
(c) 2003 Charles G. Gray
34
More US IW Objectives
• Disruption
– Destruction of existing knowledge, delay in the
acquisition and dissemination of new
knowledge
• Degradation
– Reduction in the capacity to provide or process
information
• Destruction
– Destruction of information before it can be
transmitted
(c) 2003 Charles G. Gray
35
US Tools of IW
• US Embassies worldwide
• Carnivore
• USS Jimmy Carter (Seawolf class submarine)
–
–
–
–
Undersea cable tapping (including fiber)
Remotely operated surveillance vehicle
Transport for Navy Seals
Advanced communications send/receive mast
• Navy surface ships /Air Force planes
• Special operations forces tap land lines
• Special collection services agents
– Steal cipher keys, plant bugs, etc.
(c) 2003 Charles G. Gray
36
Echelon Monitoring Stations
Yakima, WA
Menwith Hill
Guam
Sugar Grove, VA
Morwenston
Shoal Bay, AU
Buckley Field, CO
Bad Aibling
Waihpai, NZ
Ft. Gordon, GA
Cyprus
Pine Gap, AU
Medina Annex, TX Diego Garcia
Geraldton, AU
Ft. Meade, MD
Misawa
Leitrim, Canada
Sabana Sea, PR
Kunai, HI
(c) 2003 Charles G. Gray
37
Voice Analysis/Recognition
• “How” you say it is as important as “what”
you say
• Decision tree classifier – pattern recognition
–
–
–
–
–
Pitch
Vowel duration
Loudness
Word content
Falling/rising pitch in sentence
• Hope to detect code words (unusual
inflections)
(c) 2003 Charles G. Gray
38
Conclusions
• International law is unsettled vis a vis IW
• Clarify definitions of
– Armed attack
– Force
– Others
• Uniform application of humanitarian law
• US should pursue Harmonization of IW laws
• Use the aviation example to protect
worldwide information systems
(c) 2003 Charles G. Gray
39
Download