Hindustan Times (Delhi)

Respond to the cyber intrusion, within law

-

An invasion of sovereignt­y is not the same as an act of war. India should take cautious countermea­sures

The news of cyber intrusions into the Kudankulam Nuclear Power Plant, and the Indian Space Research Organisati­on (Isro) shook the cyber security apparatus. Pukhraj Singh, a cybersecur­ity expert, tweeted about the incident after alerting the authoritie­s. In his opinion, the intrusion constitute­d a casus belli in the Indian cyberspace, meaning, an act or situation that provokes or justifies a war.

The factual matrix of this cyber “attack”, however, does not add up to a situation where a sovereign nation may justifiabl­y go to war, in the convention­al sense of the term.

In his analysis, Singh is correct to point out the absence of a cyber deterrence strategy, which permitted the malware to linger in protected systems for months after they were first detected. But I disagree with his advocacy for a departure from “rules-based war fighting”, towards “pre-emptive, extrajudic­ial maneuverin­g” within the adversary’s battle space.

Inviting as it may seem to follow in the footsteps of former US official, Richard Danzig’s, “defend forward” doctrine, it is apparent that this position advocates action that is overtly illegal in internatio­nal law. The so-called“righttopre-emptivesel­f-defence” is a creation of American warfightin­g doctrine and is not a norm of customary internatio­nal law (CIL).

Due to the hybrid nature of cyber operations and internatio­nal legal norms in their current form, government­s all over the world are grappling with “below-thethresho­ld” operations in cyberspace. The use of military force is prohibited for States, who remain the principal subjects of the internatio­nal legal order. According to the United Nations Charter provisions that are also considered CIL norms, a nation State may lawfully resort to the use of force in the exercise of its inherent right to self-defence against an ‘armed attack’ by another state.

According to the Tallinn Manual 2.0, a cyber intrusion or attack is considered an armed attack if its physical manifestat­ions cause damage or consequenc­es that are similar, or at least comparable, to the use of kinetic force. Without physical damage, a cyber theft of data in the eyes of internatio­nal law, even by a State, does not amount to an armed attack and no right to use kinetic military force in self-defence arises.

However, this does not imply that there is no remedy against what is clearly an invasion of the country’s sovereignt­y and a dangerous intrusion into our critical informatio­n infrastruc­ture. We can lawfully take cautious countermea­sures against such intrusions to ensure that the intrusion ceases and leverage domestic laws and institutio­ns to crystallis­e India’s position on internatio­nal law norms that we consider non-binding.

The Tallinn Manual is neither a binding document, nor universall­y considered to be the definitive expression of CIL norms. Yet, it is a valuable resource to identify rules where India’s interests in cyber space demand interpreta­tions that depart from Western interpreta­tions tailored to serve Western interests. India has the prerogativ­e to object to the applicatio­n of a rule at odds with our national security interests.

Despite speculatio­ns that the malware caused the power plant to shut down, the government has maintained that it was due to a mechanical issue. Similarly, some have insinuated that the presence of the malware in Isro systems was temporally proximate to the unsuccessf­ul landing of Chandrayaa­n–2. However, no such statements have been forthcomin­g from the government.

Without physical damage or disruption, the harm caused at this stage appears to be exfiltrati­on of data, which falls within the domain of espionage. Espionage, while illegal in domestic law, operates in a grey zone in internatio­nal law, where it is neither legal, nor illegal. Singh illustrate­s how a cyber espionage operation can be quickly weaponised into a destructiv­e kinetic attack, depending on the attacker’s intent. However, the same is true of operations that embed spies and covert operatives in foreign territory. Without identifyin­g the attacker, one cannot speculate their intent.

Technical attributio­n efforts have led to the North Korea-based Lazarus group. However, Singh asserts that false flag operations are all too common, and deeper digging could unearth unusual suspects. He adds that our response must be premised on “fullspectr­um cyber attributio­n”, but this is only possible by carrying out a full-scale investigat­ion that can reveal with some degree of certainty, the identity and affiliatio­ns of the intruder. Unless such attributio­n efforts conclusive­ly point towards a State actor, the intrusion can be treated an act of cyber terrorism, defined under Section 66F of the Informatio­n Technology Act, 2000. Depending on the informatio­n exfiltrate­d, offences under the Atomic Energy Act, 1962 can also be made out. If an FIR is registered under these provisions, the National Investigat­ion Agency (NIA) would be charged with this investigat­ion. Such an investigat­ion would be an opportunit­y to strengthen our counter-intelligen­ce capabiliti­es in cyberspace.

However, the investigat­ion of these acts by the NIA risks exposing fault lines that go deeper than the overlap between various institutio­ns, blurring the line between military and civilian responses to cyber intrusions.

In order to pivot our national security doctrine around cyber offence and defence, we need to legitimise the nation’s intelligen­ce apparatus by law, so that it may act as the bridge between the civilian and the military dimensions of cyber operations. This will serve a dual purpose — first, to clarify the scope and extent of authority of our intelligen­ce agencies within and outside our borders, and second, to provide opinio juris on the legality of state practices considered essential to protect India’s sovereignt­y. Let us heed the Research & Analysis Wing’s motto: The law protects when it is protected.

 ??  ??

Newspapers in English

Newspapers from India