Some thoughts about the #cyberattack against Australia
: facts, assessment under international law and Australia's response options.
*THREAD*
/1

*THREAD*
/1
First, the facts:
state actor (most likely
, but
will not say)
persistent & ongoing campaign
targeted are all levels of gov't, political orgs, OES and other CI operators
systems were penetrated, but no info about disruptive or destructive effects
/2






/2
With this in mind, did this cyber operation breach international law? Let's look at:
use of force
non-intervention
sovereignty
I omit due diligence, because attribution to a state actor is assumed.
/3



I omit due diligence, because attribution to a state actor is assumed.
/3


/4



/5
Although governmental systems and critical infrastructure were affected, it seems that the actions were not coercive. Penetration of systems and exfiltration of data, without more, does not affect Australia's ability to decide freely on sovereign matters. So, no intervention.
/6
/6








/7
Here,
sovereignty would only be breached under the
approach. As there have been no reports that the penetrated systems and data thereon have been manipulated or destroyed (other than malware installation), this is not enough for usurpation of govt functions.
/8


/8
So far, Australia has not made its own views on sovereignty in cyberspace publicly known, so we don't know how they would assess the cyber attacks. Maybe this would be a good moment to develop a position on this issue.
/9
/9
Next, what are Australia's response options? Lets look at:
criminal indictments
public attribution
sanctions
countermeasures
/10




/10


/11


/12


/13


/14
Here, only a breach of sovereignty under the French penetration-based approach would qualify. Under all other approaches, there has been no breach of sovereignty.
/15
/15
Could
hack back? IMO yes, but the justification and scope varies depending on the approach towards sovereignty.
Under
- yes, because there is no rule of sovereignty to be breached.
Under
- yes, provided no phys. effects or usurpation of inherently govt functions.
/16

Under

Under

/16
Under
- yes, as a countermeasure to induce the responsible state to stop, provided proportionality and other requirements are met. Many states argue that in the cyber context, prior notification is not required if it would jeopardise the success of the countermeasure.
/17

/17
And that's it. Let's see how this thing develops and how the cyber attacks will affect Australia's position on IL (esp. sovereignty) in cyberspace, if at all.
Thanks for reading! Now I'm going back to grading exams *sigh*.
All copied text from here: https://www.dfat.gov.au/publications/international-relations/international-cyber-engagement-strategy/aices/chapters/2019_international_law_supplement.html
/END
Thanks for reading! Now I'm going back to grading exams *sigh*.
All copied text from here: https://www.dfat.gov.au/publications/international-relations/international-cyber-engagement-strategy/aices/chapters/2019_international_law_supplement.html
/END
There's a typo (flagpo?) in this tweet:
Of course I meant the French approach. https://twitter.com/Roguski_P/status/1273936037652451328
Of course I meant the French approach. https://twitter.com/Roguski_P/status/1273936037652451328