AGL 39.15 Decreased By ▼ -0.85 (-2.13%)
AIRLINK 127.99 Decreased By ▼ -1.07 (-0.83%)
BOP 6.79 Increased By ▲ 0.04 (0.59%)
CNERGY 4.65 Increased By ▲ 0.16 (3.56%)
DCL 8.45 Decreased By ▼ -0.10 (-1.17%)
DFML 41.22 Increased By ▲ 0.40 (0.98%)
DGKC 82.30 Increased By ▲ 1.34 (1.66%)
FCCL 33.08 Increased By ▲ 0.31 (0.95%)
FFBL 73.50 Decreased By ▼ -0.93 (-1.25%)
FFL 11.82 Increased By ▲ 0.08 (0.68%)
HUBC 109.35 Decreased By ▼ -0.23 (-0.21%)
HUMNL 14.25 Increased By ▲ 0.50 (3.64%)
KEL 5.24 Decreased By ▼ -0.07 (-1.32%)
KOSM 7.61 Decreased By ▼ -0.11 (-1.42%)
MLCF 39.10 Increased By ▲ 0.50 (1.3%)
NBP 63.59 Increased By ▲ 0.08 (0.13%)
OGDC 192.70 Decreased By ▼ -1.99 (-1.02%)
PAEL 25.60 Decreased By ▼ -0.11 (-0.43%)
PIBTL 7.34 Decreased By ▼ -0.05 (-0.68%)
PPL 153.60 Decreased By ▼ -1.85 (-1.19%)
PRL 25.40 Decreased By ▼ -0.39 (-1.51%)
PTC 17.42 Decreased By ▼ -0.08 (-0.46%)
SEARL 78.15 Decreased By ▼ -0.50 (-0.64%)
TELE 7.65 Decreased By ▼ -0.21 (-2.67%)
TOMCL 33.40 Decreased By ▼ -0.33 (-0.98%)
TPLP 8.38 Decreased By ▼ -0.02 (-0.24%)
TREET 16.20 Decreased By ▼ -0.07 (-0.43%)
TRG 56.77 Decreased By ▼ -1.45 (-2.49%)
UNITY 27.50 Increased By ▲ 0.01 (0.04%)
WTL 1.37 Decreased By ▼ -0.02 (-1.44%)
BR100 10,485 Increased By 40.3 (0.39%)
BR30 31,031 Decreased By -158.5 (-0.51%)
KSE100 98,092 Increased By 293.5 (0.3%)
KSE30 30,597 Increased By 116.5 (0.38%)

With ransomware like "WannaCry" sowing chaos worldwide and global powers accusing rivals of using cyberattacks to interfere in domestic politics, the latest edition of the world's only book laying down the law in cyberspace could not be more timely. The Tallinn Manual 2.0 is a unique collection of law on cyber-conflict, says Professor Michael Schmitt from the UK's University of Exeter, who led work on the tome.
Published by Cambridge University Press and first compiled by a team of 19 experts in 2013, the latest updated edition aims to pin down the rules that governments should follow when doing battle in virtual reality. The manual was among the hot topics this week as over 500 IT security experts from across the globe gathered at Nato's Cycon cyber security conference in Tallinn. Launched in 2009, the annual event is organised by Nato's Cooperative Cyber Defence Centre of Excellence based in the Estonian capital. In 2007, Estonia was among the first countries to suffer a massive cyber attack, with authorities in Tallinn blaming the Baltic state's Soviet-era master Russia.
"The very next year, in the war between Russia and Georgia, again we saw a lot of cyber activity," said Schmitt, speaking to AFP at Cycon. Estonia was targeted just three years after it joined Nato and the EU in 2004. The attack raised a slew serious questions about how to apply and enforce Nato's Article 5 collective defence guarantee in cyberspace, said Schmitt, who also chairs the Stockton Center for the Study of International Law at the United States Naval War College. He said that Nato allies faced an unprecedented dilemma: did the attack "mean that Nato states had to somehow come to the rescue of Estonia or not?" Was it "an attack on the civilian population, a violation of international humanitarian law or not? No one had the answers," he added.
"Because of that (attack) the international community started looking at cyber, going: 'Oh my God, I can't answer any question!' That's why this manual was started." Schmitt says his team's work is intended to tame the "digital wild west" that emerged with the advent of cyberspace. But the virtually limitless range of possibilities in cyber-conflict raises a long laundry list of legal questions and dilemmas and the Tallinn Manual certainly cannot answer them all.
The legal experts, mostly professors of international law, filled its 642 pages with existing jurisprudence applying to cyberspace from across the globe, and did not shy away from laying out conflicting views on certain issues. For example: should cyber-espionage be subject to the same laws as conventional spying? Can a state obtain the online IDs and passwords of prisoners of war and use them? Does a cyberattack trigger a legitimate right to self-defence? Can you retaliate? What kind of status do victims have? What can you do when there is no evidence to prove guilt when attackers can easily cover their tracks?
"This book is intended to be a secondary source of law: it explains the law, but it doesn't create it. States make law," Schmitt told AFP. "My goal is that this books sits on the desk of every legal advisor for defence and foreign ministers, the intelligence services, so that legal advisors can sit with policy makers and say: in this situation, we can do this, or the law is not clear, you need to make a political decision here. "But at least the discussion is mature. It's not 'oh my God, what's happening to us?'."

Comments

Comments are closed.