Real-time cyber attacks are displayed in 2017 on the 275th Cyberspace Squadron's operations floor, known as the Hunter's Den, at Warfield Air National Guard Base, Middle River, Md.

Real-time cyber attacks are displayed in 2017 on the 275th Cyberspace Squadron's operations floor, known as the Hunter's Den, at Warfield Air National Guard Base, Middle River, Md. Air Force / J.M. Eddins Jr

Should Cyber Arms Be Treated Like Bioweapons?

A recent paper suggests that the two are more closely related under international law than previously thought. But the analogy, while useful, is not exact.

In an important contribution, Jeffrey T. Biller and Michael N. Schmitt argue that cyber capabilities are not “weapons” or “means of warfare,” but can be “methods of warfare” under international humanitarian law (IHL). These conclusions challenge the prevailing notion, contained in the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, that cyber capabilities can be weapons and means of warfare. Biller’s and Schmitt’s claim is that, unlike other military technologies, cyber capabilities do not cause direct harm to people or property. “Having a damage mechanism with the ability to directly inflict the damaging or injurious terminal effect on a target is,” they write, “the litmus test for qualification as a means of warfare.” When computer code is deployed, “the harmful effects are . . . indirect; they are not terminal vis-à-vis the code.” Harmful effects directly arise from the operation of the target system infected with the code, rather than from the code itself. “Therefore,” they conclude, “computer code and associated systems cannot qualify as means of warfare.”

For much of article, I nodded in agreement as the argument unfolded. With one exception, which produced a quizzical tilt of the head.

Biller and Schmitt observe that biological weapons are “beyond question” a means of warfare because the biological agent’s “damage mechanism is...terminal” as the agent “directly inflicts the harm.” However, they appear to conflate biological agents with toxins in stating that “[t]ypical biological toxins include bacteria, rickettsia, fungi, and viruses.” Not all biological agents are toxins or generate morbidity or mortality through toxins.

Some agents, such as anthrax, produce toxins that directly damage cells and organs. Other pathogens considered biological weapons trigger a cascade of adverse physiological reactions in the host that contribute to, or cause, illness or death. In addition, fears about biological weapons include how inadequate health systems can exacerbate pathogenic damage. Put another way, many harmful effects of biological agents directly arise from the operation of biological and social systems the pathogen affects, rather than from the pathogen itself.

Related: Suspected Iranian Cyber Attacks Show No Sign of Slowing

Related: States Must Explain When a Cyber Attack Might Draw a Violent Reprisal

Related: NATO Getting More Aggressive on Offensive Cyber

The smallpox virus is one of the most feared biological weapon agents. How the virus causes disease and death is complicated and does not simply involve the virus killing cells. Responses of the immune system factor significantly in the morbidity and mortality associated with smallpox. The virus interferes with the normal functioning of the immune system, which over-reacts in ways that seriously harm the body. A review of smallpox in Clinical Infectious Diseasesstated that “many features of severe illness...were the result of host inflammatory responses. In severe cases, the release of cytokines, chemokines, and other mediators into the bloodstream caused vascular dysfunction, coagulopathy, and multiorgan failure, resembling septic shock.” Smallpox also generates concern because most countries do not have adequate health capabilities to address re-emergence of the smallpox virus.

Whether biological agents are “means of warfare” or only “methods of warfare” based on direct or indirect effects has not been a major policy or legal question. Smallpox and other pathogens that cause adverse biological and societal cascades are considered “repugnant to the conscience of mankind” because of the totality of their direct and indirect effects. The indirect effects of pathogenic infection are proximate to the direct action of the pathogen on the host and sufficiently severe in the human body and the body politic to take into account.

This treatment of biological agents perhaps suggests that deciding whether cyber capabilities constitute a means of warfare should involve consideration of the nature and scale of indirect effects and not just the direct effects of code on target computer systems. The indirect effects of malware can be proximate to the direct impact of the code and, potentially, severe enough within the target system and beyond to warrant inclusion in the determination of a means of warfare.

However, reasoning from biological analogy is not persuasive. International law bans the development and use of biological agents for non-peaceful purposes. Indeed, biological agents are one of the few areas in which states have banned specific technologies as means of war. Many of these bans reflect heightened concerns about the direct and indirect effects these technologies can inflict on people and societies. So far, cyber capabilities and operations have not generated fears about such grave, gruesome, and repugnant threats to human life, health, and social order.

As a method of warfare, cyber operations that constitute attacks would, Biller and Schmitt note, “still have to comply with all [IHL] prohibitions and limitations that apply to attacks.” Thus, the likely indirect effects of cyber capabilities would not escape scrutiny. Further, the nature and complexity of military cyber operations, military-civilian interdependence in cyberspace, and civilian dependence on cyber technologies counsel early and comprehensive technical, policy, and legal consideration of the potential direct and indirect effects of such operations, regardless how cyber capabilities slot into legal definitions of means or methods of warfare. Whether such prudential handling of cyber capabilities keeps indirect effects tolerable as military cyber operations expand remains to be seen.

This piece, first published by the Council on Foreign Relations, is used with permission.

Related podcast:

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.