. 24/7 Space News .
CYBER WARS
'Tallinn Manual 2.0' -- the rulebook for cyberwar
By Michel MOUTOT
Tallinn (AFP) June 3, 2017


With ransomware like "WannaCry" sowing chaos worldwide and global powers accusing rivals of using cyberattacks to interfere in domestic politics, the latest edition of the world's only book laying down the law in cyberspace could not be more timely.

The Tallinn Manual 2.0 is a unique collection of law on cyber-conflict, says Professor Michael Schmitt from the UK's University of Exeter, who led work on the tome.

Published by Cambridge University Press and first compiled by a team of 19 experts in 2013, the latest updated edition aims to pin down the rules that governments should follow when doing battle in virtual reality.

The manual was among the hot topics this week as over 500 IT security experts from across the globe gathered at NATO's Cycon cyber security conference in Tallinn.

Launched in 2009, the annual event is organised by NATO's Cooperative Cyber Defence Centre of Excellence based in the Estonian capital.

In 2007, Estonia was among the first countries to suffer a massive cyber attack, with authorities in Tallinn blaming the Baltic state's Soviet-era master Russia.

"The very next year, in the war between Russia and Georgia, again we saw a lot of cyber activity," said Schmitt, speaking to AFP at Cycon.

Estonia was targeted just three years after it joined NATO and the EU in 2004.

The attack raised a slew serious questions about how to apply and enforce NATO's Article 5 collective defence guarantee in cyberspace, said Schmitt, who also chairs the Stockton Center for the Study of International Law at the United States Naval War College.

He said that NATO allies faced an unprecedented dilemma: did the attack "mean that NATO states had to somehow come to the rescue of Estonia or not?"

Was it "an attack on the civilian population, a violation of international humanitarian law or not? No one had the answers," he added.

"Because of that (attack) the international community started looking at cyber, going: 'Oh my God, I can't answer any question!' That's why this manual was started."

- 'Digital wild west' -

Schmitt says his team's work is intended to tame the "digital wild west" that emerged with the advent of cyberspace.

But the virtually limitless range of possibilities in cyber-conflict raises a long laundry list of legal questions and dilemmas and the Tallinn Manual certainly cannot answer them all.

The legal experts, mostly professors of international law, filled its 642 pages with existing jurisprudence applying to cyberspace from across the globe, and did not shy away from laying out conflicting views on certain issues.

For example: should cyber-espionage be subject to the same laws as conventional spying? Can a state obtain the online IDs and passwords of prisoners of war and use them?

Does a cyberattack trigger a legitimate right to self-defence? Can you retaliate? What kind of status do victims have? What can you do when there is no evidence to prove guilt when attackers can easily cover their tracks?

"This book is intended to be a secondary source of law: it explains the law, but it doesn't create it. States make law," Schmitt told AFP.

"My goal is that this books sits on the desk of every legal advisor for defence and foreign ministers, the intelligence services, so that legal advisors can sit with policy makers and say: in this situation, we can do this, or the law is not clear, you need to make a political decision here.

"But at least the discussion is mature. It's not 'oh my God, what's happening to us?'."

CYBER WARS
Random numbers: Hard times ahead for hackers
Geneva, Switzerland (SPX) Jun 01, 2017
Whenever we need to communicate in secret, a cryptographic key is needed. For this key to work, it must consist of numbers chosen at random without any structure - just the opposite of using the birthdate of our favourite pet. But, for a human, it is extremely difficult to choose without creating any bias, even by hitting the keyboard chaotically. To solve this problem, researchers from the Univ ... read more

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


Comment using your Disqus, Facebook, Google or Twitter login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Russia on the Way to Adopt New Program on Development of Space Centers

First Year of BEAM Demo Offers Valuable Data on Expandable Habitats

Conch shells may inspire better helmets, body armor

NASA honors Kennedy's space vision on 100th birthday

CYBER WARS
Ariane 5 launches its heaviest telecom payload

Ariane 5 launches its first all-electric satellite

India launches GSLV in heavy lift configuation

Colossal rocket-launching plane rolls toward testing

CYBER WARS
Curiosity Peels Back Layers on Ancient Martian Lake

Student-Made Mars Rover Concepts Lift Off

Illinois Company Among Hundreds Supporting NASA Mission to Mars

Halos discovered on Mars widen time frame for potential life

CYBER WARS
Spotlight: First China-designed experiment flies to space station

News Analysis: U.S.-China space freeze may thaw with new commercial pathway

China willing to cooperate in peaceful space exploration: Xi

California Woman Charged for Trying to Hand Over Sensitive Space Tech to China

CYBER WARS
Propose a course idea for the CU space minor

Leading Global Air And Space Law Group Joins Reed Smith

New Horizons for Alexander Gerst

Government space program spending reaches 62B dollars in 2016

CYBER WARS
Saudi deal for counterfire radars approved by U.S. State Department

Mitsubishi Electric Completes New Satellite Component Production Facility

BAE Systems, Helios to collaborate on liquid armor

Bamboo inspires optimal design for lightness and toughness

CYBER WARS
Giant Ringed Planet Likely Cause of Mysterious Eclipses

Viable Spores, DNA Fragments Discovery at ISS Justifies Biosphere's Expansion

Russia thinks microorganisms may be living outside the space station

The race to trace TRAPPIST-1h

CYBER WARS
A whole new Jupiter with first science results from Juno

First results from Juno show cyclones and massive magnetism

Jupiters complex transient auroras

NASA's Juno probe forces 'rethink' on Jupiter









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.