{"id":74743,"date":"2026-05-23T21:28:32","date_gmt":"2026-05-23T15:58:32","guid":{"rendered":"https:\/\/www.nextias.com\/ca\/?p=74743"},"modified":"2026-05-23T21:30:48","modified_gmt":"2026-05-23T16:00:48","slug":"cyberwarfare-global-law","status":"publish","type":"post","link":"https:\/\/www.nextias.com\/ca\/current-affairs\/23-05-2026\/cyberwarfare-global-law","title":{"rendered":"Cyber Warfare and the Challenge to International Law"},"content":{"rendered":"\n<p><strong>Syllabus: GS3\/Cyber Security<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Context<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Recent cyber operations linked to the Israel-Iran conflict highlighted how digital attacks now accompany conventional military strikes.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>About Cyber Warfare<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cyber warfare refers to the use of digital technologies to disrupt, damage or gain strategic advantage over another state\u2019s systems and infrastructure.<\/li>\n\n\n\n<li>It operates in cyberspace and often targets communication, financial and defence networks unlike traditional warfare.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Components of Cyber Warfare<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Cyber Espionage:<\/strong> Stealing sensitive military or strategic information.<\/li>\n\n\n\n<li><strong>Cyber Attacks:<\/strong> Disrupting networks, websites or infrastructure through malware, ransomware or DDoS attacks.<\/li>\n\n\n\n<li><strong>Information Warfare:<\/strong> Manipulating public opinion through misinformation and propaganda.<\/li>\n\n\n\n<li><strong>Critical Infrastructure Targeting:<\/strong> Attacks on power grids, banking systems, defence systems and healthcare networks.<\/li>\n\n\n\n<li><strong>Psychological Operations:<\/strong> Influencing morale and public perception digitally.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cyber Operations as a New Instrument of Warfare<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Modern conflicts increasingly combine physical strikes with cyber operations.<\/li>\n\n\n\n<li>Reports during the US-Israel-Iran tensions indicated hacking of news portals and communication applications alongside military action.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Emerging Trends<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cyber operations are used <strong>before physical strikes<\/strong> to disable communication and defence systems.<\/li>\n\n\n\n<li>Digital attacks extend conflict beyond geographical borders.<\/li>\n\n\n\n<li>Non-state hacker groups act as proxies, making accountability difficult.<\/li>\n\n\n\n<li>States use cyber tools for both offensive and defensive strategic purposes.\n<ul class=\"wp-block-list\">\n<li>Thus, cyberspace has become the <strong>\u2018fifth domain\u2019 of warfare after land, sea, air and space.<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What are the Issues and Concerns Associated with Cyber Warfare?<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Difficulty in Attribution: <\/strong>Cyber attacks are routed through multiple jurisdictions and anonymous networks, making it difficult to identify the real perpetrator.<\/li>\n\n\n\n<li><strong>Ambiguity in International Law: Article 2(4) of the UN Charter<\/strong> prohibits the use of force, and in principle applies to cyberspace.\n<ul class=\"wp-block-list\">\n<li>However, determining when a cyber attack qualifies as \u2018use of force\u2019 remains unclear.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Lack of Legal Remedies: <\/strong>Victims rarely obtain justice because international courts require state consent; sovereign immunity protects states in domestic courts; and evidence is often classified or technically complex.<\/li>\n\n\n\n<li><strong>Threat to Critical Infrastructure: <\/strong>Cyber attacks can disrupt banking systems, energy grids, healthcare services, and governance platforms.\n<ul class=\"wp-block-list\">\n<li>It creates risks to national security and economic stability.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Escalation Risks: <\/strong>Cyber attacks can trigger retaliation and heighten geopolitical tensions without crossing traditional military thresholds.<\/li>\n\n\n\n<li><strong>Role of Non-State Actors: <\/strong>Hacktivist groups and cyber mercenaries complicate state responsibility under international law.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Related International Laws<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>UN Charter:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>Article 2(4):<\/strong> Prohibits threat or use of force against another state.<\/li>\n\n\n\n<li><strong>Article 51:<\/strong> Allows self-defence in case of armed attack.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Tallinn Manual: <\/strong>Prepared by NATO experts, it interprets how international law applies to cyber warfare, though it is non-binding.<\/li>\n\n\n\n<li><strong>Budapest Convention on Cybercrime: <\/strong>It promotes international cooperation against cybercrime. India is not a signatory due to concerns regarding sovereignty and non-participation in drafting.<\/li>\n\n\n\n<li><strong>UN Convention against Cybercrime: <\/strong>It aims to strengthen global cooperation in combating cybercrime, though it inadequately addresses state-sponsored cyber warfare.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How India is Tackling Cyber Warfare?<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Institutional Measures:<\/strong>\n<ul class=\"wp-block-list\">\n<li><strong>CERT-In (Indian Computer Emergency Response Team):<\/strong> Nodal agency for cyber incident response.<\/li>\n\n\n\n<li><strong>National Critical Information Infrastructure Protection Centre (NCIIPC):<\/strong> Protects critical sectors.<\/li>\n\n\n\n<li><strong>Defence Cyber Agency (DCA):<\/strong> Handles military cyber operations.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Policy Initiatives:<\/strong>\n<ul class=\"wp-block-list\">\n<li>National Cyber Security Policy, 2013.<\/li>\n\n\n\n<li>Digital Personal Data Protection Act, 2023.<\/li>\n\n\n\n<li>Cyber Surakshit Bharat Initiative for capacity building.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>International Cooperation: <\/strong>India actively participates in the <strong>UN Open-Ended Working Group<\/strong> on cybersecurity; and bilateral cyber cooperation with countries such as the U.S., Japan and Australia.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Strengthening Measures Against Cyber Warfare<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Develop Clear Cyber Deterrence: <\/strong>India should formulate a comprehensive National Cyber Security Strategy with offensive and defensive capabilities.<\/li>\n\n\n\n<li><strong>Improve Attribution Capacity: <\/strong>Investment in AI-driven cyber forensics and intelligence sharing is essential.<\/li>\n\n\n\n<li><strong>Strengthen Critical Infrastructure: <\/strong>Regular security audits and indigenous cybersecurity technologies should be promoted.<\/li>\n\n\n\n<li><strong>Build Skilled Workforce: <\/strong>Cybersecurity education and specialised training needs to be expanded.<\/li>\n\n\n\n<li><strong>Promote International Cyber Norms: <\/strong>India should actively shape global rules on responsible state behaviour in cyberspace.<\/li>\n\n\n\n<li><strong>Public-Private Partnership: <\/strong>Collaboration with industry is crucial since much digital infrastructure is privately owned.<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.thehindu.com\/opinion\/op-ed\/cyber-warfare-is-outpacing-global-legal-accountability\/article71011864.ece\" target=\"_blank\" rel=\"noopener\">Source: TH<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong> Context <\/strong><\/p>\n<li class=\"ms-5\"> Recent cyber operations linked to the Israel-Iran conflict highlighted how digital attacks now accompany conventional military strikes. <\/li>\n<p><\/p>\n<p><strong> About Cyber Warfare <\/strong><\/p>\n<li class=\"ms-5\"> Cyber warfare refers to the use of digital technologies to disrupt, damage or gain strategic advantage over another state\u2019s systems and infrastructure. <\/li>\n<li class=\"ms-5\"> It operates in cyberspace and often targets communication, financial and defence networks unlike traditional warfare. <\/li>\n<p><a href=\" https:\/\/www.nextias.com\/ca\/current-affairs\/23-05-2026\/cyberwarfare-global-law \" class=\"btn btn-primary btn-sm float-end\">Read More<\/a><\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[21],"tags":[],"class_list":["post-74743","post","type-post","status-publish","format-standard","hentry","category-current-affairs"],"acf":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/74743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/comments?post=74743"}],"version-history":[{"count":3,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/74743\/revisions"}],"predecessor-version":[{"id":74748,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/posts\/74743\/revisions\/74748"}],"wp:attachment":[{"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/media?parent=74743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/categories?post=74743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextias.com\/ca\/wp-json\/wp\/v2\/tags?post=74743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}