Cyber Warfare and the Challenge to International Law

Syllabus: GS3/Cyber Security

Context

  • Recent cyber operations linked to the Israel-Iran conflict highlighted how digital attacks now accompany conventional military strikes.

About Cyber Warfare

  • Cyber warfare refers to the use of digital technologies to disrupt, damage or gain strategic advantage over another state’s systems and infrastructure.
  • It operates in cyberspace and often targets communication, financial and defence networks unlike traditional warfare.

Components of Cyber Warfare

  • Cyber Espionage: Stealing sensitive military or strategic information.
  • Cyber Attacks: Disrupting networks, websites or infrastructure through malware, ransomware or DDoS attacks.
  • Information Warfare: Manipulating public opinion through misinformation and propaganda.
  • Critical Infrastructure Targeting: Attacks on power grids, banking systems, defence systems and healthcare networks.
  • Psychological Operations: Influencing morale and public perception digitally.

Cyber Operations as a New Instrument of Warfare

  • Modern conflicts increasingly combine physical strikes with cyber operations.
  • Reports during the US-Israel-Iran tensions indicated hacking of news portals and communication applications alongside military action.

Emerging Trends

  • Cyber operations are used before physical strikes to disable communication and defence systems.
  • Digital attacks extend conflict beyond geographical borders.
  • Non-state hacker groups act as proxies, making accountability difficult.
  • States use cyber tools for both offensive and defensive strategic purposes.
    • Thus, cyberspace has become the ‘fifth domain’ of warfare after land, sea, air and space.

What are the Issues and Concerns Associated with Cyber Warfare?

  • Difficulty in Attribution: Cyber attacks are routed through multiple jurisdictions and anonymous networks, making it difficult to identify the real perpetrator.
  • Ambiguity in International Law: Article 2(4) of the UN Charter prohibits the use of force, and in principle applies to cyberspace.
    • However, determining when a cyber attack qualifies as ‘use of force’ remains unclear.
  • Lack of Legal Remedies: Victims rarely obtain justice because international courts require state consent; sovereign immunity protects states in domestic courts; and evidence is often classified or technically complex.
  • Threat to Critical Infrastructure: Cyber attacks can disrupt banking systems, energy grids, healthcare services, and governance platforms.
    • It creates risks to national security and economic stability.
  • Escalation Risks: Cyber attacks can trigger retaliation and heighten geopolitical tensions without crossing traditional military thresholds.
  • Role of Non-State Actors: Hacktivist groups and cyber mercenaries complicate state responsibility under international law.

Related International Laws

  • UN Charter:
    • Article 2(4): Prohibits threat or use of force against another state.
    • Article 51: Allows self-defence in case of armed attack.
  • Tallinn Manual: Prepared by NATO experts, it interprets how international law applies to cyber warfare, though it is non-binding.
  • Budapest Convention on Cybercrime: It promotes international cooperation against cybercrime. India is not a signatory due to concerns regarding sovereignty and non-participation in drafting.
  • UN Convention against Cybercrime: It aims to strengthen global cooperation in combating cybercrime, though it inadequately addresses state-sponsored cyber warfare.

How India is Tackling Cyber Warfare?

  • Institutional Measures:
    • CERT-In (Indian Computer Emergency Response Team): Nodal agency for cyber incident response.
    • National Critical Information Infrastructure Protection Centre (NCIIPC): Protects critical sectors.
    • Defence Cyber Agency (DCA): Handles military cyber operations.
  • Policy Initiatives:
    • National Cyber Security Policy, 2013.
    • Digital Personal Data Protection Act, 2023.
    • Cyber Surakshit Bharat Initiative for capacity building.
  • International Cooperation: India actively participates in the UN Open-Ended Working Group on cybersecurity; and bilateral cyber cooperation with countries such as the U.S., Japan and Australia.

Strengthening Measures Against Cyber Warfare

  • Develop Clear Cyber Deterrence: India should formulate a comprehensive National Cyber Security Strategy with offensive and defensive capabilities.
  • Improve Attribution Capacity: Investment in AI-driven cyber forensics and intelligence sharing is essential.
  • Strengthen Critical Infrastructure: Regular security audits and indigenous cybersecurity technologies should be promoted.
  • Build Skilled Workforce: Cybersecurity education and specialised training needs to be expanded.
  • Promote International Cyber Norms: India should actively shape global rules on responsible state behaviour in cyberspace.
  • Public-Private Partnership: Collaboration with industry is crucial since much digital infrastructure is privately owned.

Source: TH

 
Next article Border Management

Other News of the Day

Syllabus: GS2/ Governance In News The Ministry of Youth Affairs and Sports has placed proposed amendments to the National Anti-Doping Act, 2022 for public consultation. The amendments seek to criminalise organised doping activities targeting traffickers, syndicates, coaches, and suppliers not athletes who test positive. About Doping Doping refers to the use of prohibited performance-enhancing substances...
Read More

Syllabus: GS2/Health Context The recent Sample Registration Survey 2024 was released by the Office of the Registrar General of India (ORGI). The Sample Registration System (SRS) It provides reliable annual estimates of Infant Mortality Rate, Birth Rate, Death Rate and other Fertility & Mortality Indicators at the National and subNational levels.  It is a large-scale...
Read More

Syllabus: GS3/Internal Security  In News The Union Government is going to launch a Smart Border Project to strengthen India’s borders with Pakistan and Bangladesh using advanced technologies such as drones, radars, and modern surveillance cameras. Border Management  Border management is the process through which a country controls and manages its borders to ensure both security...
Read More

Syllabus: GS1/World History Context The Defence Minister and Republic of Korea’s Minister jointly inaugurated the Indian War Memorial in South Korea, commemorating the 75th anniversary of the Korean War and honouring the contribution of Indian troops. Background of Korean War After World War II, Korea, which had been under Japanese rule, was divided along the...
Read More

Public Accounts Committee (PAC) Syllabus: GS2/Polity and Governance Context The reconstituted Public Accounts Committee (PAC) convened recently under the chairmanship of K. C. Venugopal.  About Public Accounts Committee (PAC) The PAC is one of Parliament’s oldest financial committees and was first constituted in 1921 following the Montagu-Chelmsford Reforms.  It consists of 22 members: 15 from...
Read More
scroll to top