Cyber Operations by Private Actors in the Ukraine-Russia Conflict: From Cyber War to Cyber Security

Issue: 
1
Volume: 
19
By: 
Gertjan Boulet
Date: 
January 07, 2015

Introduction

Media attention to the ongoing Ukraine-Russia conflict has focused on a significant number of hacking and malware attacks by private actors, described in this Insight as cyber operations.  As an example, the pro-Russian hacker group CyberBerkut has assumed responsibility for cyber operations against NATO, the vote counting system for Ukrainian elections, and a mobile device within the U.S. vice-president’s delegation during a visit to Ukraine.[1]

CyberBerkut does not mention support by Russia.  Similarly, several security companies have found Russian roots in a number of cyber operations, without explicitly alleging Russia’s involvement or revealing the identity of their clients.  In March, security company BAE systems (U.K.) alleged the involvement of “committed and well-funded professionals” from within the Moscow time zone in the use of malware Snake against Ukrainian computer systems.[2]  Media reports during the year also reported the use of Snake against the Belgian Ministry of Foreign Affairs to access documents on the crisis in Ukraine.[3]  In September, F-Secure (Finland) reported use of malware BlackEnergy by the Russian cybercrime gang Quedagh against the Ukrainian government.[4]  In October, FireEye (U.S.) reported malware attacks by Russian hacker group APT28 against Eastern European governments. FireEye found consistency between the targeted information and Russian interests and identified malware code in Russian written during working hours in Moscow and St. Petersburg.[5]

These recent developments reveal difficulties in applying traditional public international law rules and principles regarding state responsibility to cyber operations. Implicit attribution of cyber operations to Russia by media and security companies cannot substitute for the formal task of finding proof of involvement by Russia under international law.[6]  This Insight reveals the challenges that arise in attributing to Russia cyber operations in the Ukraine-Russia conflict on the basis of the Articles on State Responsibility (ASR)[7] and the Tallinn Manual on the International Law Applicable to Cyber Warfare (Tallinn Manual).[8] At the same time, a shift in the discourse from cyber war to cyber security is evident from the surrounding events and commentary.

The ASR and the Tallinn Manual

The ASR were adopted in 2001 by the UN International Law Commission, which promotes the codification and progressive development of international law.  Although the ASR involve both a codification and progressive development,[9] they are not easily applicable to cyber operations.

In 2009, the NATO Cooperative Cyber Defence Centre of Excellence, an international military organization, invited an international group of experts to clarify “complex legal issues surrounding cyber operations,” more particularly regarding sovereignty, jurisdiction, state responsibility, jus ad bellum, and jus in bello or international humanitarian law (IHL).[10]  The group included technical experts, legal practitioners, and academics, representing think tanks, universities, and military organizations. Russia was not represented. The outcome of the experts’ work is the 2013 Tallinn Manual, which contains “rules” reflecting a consensus amongst the experts regarding currently applicable law governing cyber conflict, including consideration of how the ASR translate to a cyber context. Acting in their personal capacity, the experts recognized the lack of well-developed treaty law and state practice in relation to cyber operations; the Tallinn Manual therefore articulates differing positions among them.[11]

Attribution of Cyber Operations by Private Actors to a State

ASR article 5 provides a first basis for attributing conduct by private actors to a state, providing that the conduct of a person or entity empowered by law to exercise elements of governmental authority “shall be considered an act of the State under international law, provided the person or entity is acting in that capacity in the particular instance.”  As article 5 covers the scenario of private contractors that exercise public functions,[12] the Tallinn Manual includes as examples falling within article 5 a private entity empowered to undertake cyber intelligence (electronic gathering of political or military information) and a private corporation authorized by a state to conduct offensive computer network operations against another state.[13]  Russian empowerment or authorization of hacker groups and cybercrime gangs seems lacking in its conflict with Ukraine.

The Tallinn Manual also mentions private contractors in relation to ASR article 8, which provides that “[t]he conduct of a person or group of persons shall be considered an act of a State under international law if the person or group of persons is in fact acting on the instructions of, or under the direction or control of, that State in carrying out the conduct.”  The Tallinn Manual considers article 8 particularly relevant in a cyber context, applicable to private companies or citizens contracted or called upon by a state to conduct cyber operations against other states.  Article 8 would, however, not apply to private citizens conducting cyber operations on their own initiative (so-called hacktivists or patriotic hackers).  Hacker groups in the Ukraine-Russia conflict may qualify as patriotic hackers, but cybercrime gangs may be more profit-driven.

It is difficult to prove that Russia has “effective control” over these groups, which is the threshold set by the International Court of Justice (ICJ) in the Nicaragua case[14] for attributing conduct under ASR article 8.  According to the Tallinn Manual, effective control goes beyond the mere encouragement or expression of support for the acts of non-state actors and beyond the mere provision of hacking tools to insurgent groups that choose to act against another state.[15]  Yet, the Tallinn Manual concludes that a use of force arises from “providing an organized group with a malware and the training necessary to carry out cyber attacks against another state.”[16]  Thus, Russian provision of malware and training to a group for use against another state could constitute effective control for the purposes of ASR article 8 as elaborated in Nicaragua.

The Tallinn Manual indicates that “the provision of cyber attack tools for rebel use” is insufficient to meet the lower threshold of “overall control” established by the International Criminal Tribunal for the former Yugoslavia (ICTY) in the Tadić case for classifying an international armed conflict under IHL.  The ICTY reserved the application of the “overall control” test for “organized and hierarchically structured groups,”[17] described in the Tallinn Manual as coordinated groups that specify cyber targets, share attack tools, and conduct cyber vulnerability assessments.[18]  Cybercrime gangs may well meet the required level of organization, but overall control by Russia would depend on its involvement with the targeting by the gang.  For the ICTY, the requisite level of control goes beyond financing and equipment to participation in planning and supervision.  The Tallinn Manual regards overall control as arising from the provision of “specific intelligence on cyber vulnerabilities that renders particular rebel cyber attacks possible.”[19]

ASR article 11 provides another basis for attributing conduct by private actors to a state: the acknowledgement and adoption by a state of the conduct of private actors as its own.  For the ICJ, this goes beyond mere factual acknowledgement, approval, or endorsement of private conduct.[20]  The Tallinn Manual applies article 11 to a state that supports non-state actors conducting computer operations against another state and that “uses its cyber capabilities to protect the non-State actors against counter-cyber operations.”[21]  To date, Russia has not publicly supported cyber operations by private actors in its conflict with Ukraine.

The Shifting Discourse from Cyber War to Cyber Security

Some scholars have observed that most cyber operations relate not to cyber war but to cyber security, with commentary therefore focused on state responsibility to prevent cyber conduct by private actors rather than on attribution of such conduct to a state.[22]

Rule 5 of the Tallinn Manual provides that a “State shall not knowingly allow the cyber infrastructure located in its territory or under its exclusive governmental control to be used for acts that adversely and unlawfully affect other States.”  This rule is inspired by the ICJ’s Corfu Channel judgment of 1948, holding that a state may not knowingly allow its territory to be used for acts contrary to the rights of other states.[23]  Whereas the Tallinn Manual addresses sovereignty only in connection with jus ad bellum and jus in bello, the Corfu Channel case arguably provides a basis for tackling cyber operations beyond the scope of cyber war: so-called “cyber security” threats.

Tallinn Manual 2.0, scheduled for 2016, will further explore the application of the principle of sovereignty in a cyber context, examining cyber security threats under “the law of State responsibility, the law of the sea, international telecommunications law, space law, diplomatic and consular law, and, with respect to individuals, human rights law.”[24] With respect to human rights law, Russia’s accession to the first international treaty on cybercrime, the Council of Europe’s Cybercrime Convention,[25] could stimulate cooperation with the United States and European countries on these matters. International consensus may also develop through ongoing discussions between Ukraine and the U.S. on their cooperation in the fight against cybercrime.[26]

About the author: Gertjan Boulet is a Ph.D. candidate in Law at the Vrije Universiteit Brussel (Free University Brussels, Belgium). He is a member of the Research Group on Law, Science, Technology and Society.


[1] CyberBerkut, http://cyber-berkut.org/en/ (last visited Dec. 29, 2014).

[2] BAE Systems Applied Intelligence, Snake Campaign & Cyber Espionage Toolkit (2014), available at http://info.baesystemsdetica.com/rs/baesystems/images/snake_whitepaper.pdf ; Ukraine Attacked by Cyberspies as Tensions Escalated in Recent Months, The Guardian, Mar. 9, 2014, http://www.theguardian.com/world/2014/mar/09/ukraine-attacked-cyberspies-tensions-computer.

[3] Foreign Ministry Finally Free of Snake Virus, Flanders News.be (Aug. 6, 2014, 2:40 PM), http://deredactie.be/cm/vrtnieuws.english/News/1.2053207.

[4] F-Secure, Blackenergy & Quedagh: The Convergence of Crimeware and APT Attacks (2014), available at https://www.f-secure.com/documents/996508/1030745/blackenergy_whitepaper.pdf .

[5] FireEye, APT28: Window into Russia’s Cyber espionage Operations,  3, 5 (2014), available at https://www.fireeye.com/resources/pdfs/apt28.pdf.

[6] Marco Roscini, Cyber Operations and the Use of Force in International law, 44 (2014); Nicholas Tsagourias, Cyber-Attacks, Self-Defence and the Problem of Attribution, 17 J. Conflict & Security L. 229, 233 (2012).

[7] International Law Commission, Draft Articles on the Responsibility of States for Internationally Wrongful Acts, Y.B. Int’l L. Comm., Vol. 2, Part II (2001); see also G.A. Res. 56/83, U.N. Doc. A/RES/56/83.

[8] Tallinn Manual on the International Law Applicable to Cyber Warfare (Michael N. Schmitt ed., 2013) [hereinafter Tallinn Manual], available at https://www.ccdcoe.org/tallinn-manual.html. 

[9] James Crawford & Simon Olleson, The Nature and Forms of International Responsibility, in International Law 441, 447 (Malcolm D. Evans ed., 4th ed. 2010).

[10] Tallinn Manual, supra note 8, at 3–4

[11] Id. at 5, 6, 11.

[12] James Crawford, The International Law Commission’s Articles on State Responsibility: Introduction, Text and Commentaries, 100 (2002).

[13] Tallinn Manual, supra note 8, at 31.

[14] Military and Paramilitary Activities in and against Nicaragua (Nicar. v. U.S.) 1986 I.C.J. 14, 50–51, 61–62, 64–65 (June 27).

[15] Tallinn Manual, supra note 8, at 33–34.

[16] Id. at 46.

[17] Prosecutor v. Tadić, Case No. IT-94-1-A, Judgment, Appeals Chamber, 138 (Int’l Crim. Trib. for the Former Yugoslavia July 15, 1999).

[18] Tallinn Manual, supra note 8, at 89–90.

[19] Id. at 81.

[20] United States Diplomatic and Consular Staff in Tehran (U.S. v. Iran), Judgment, 1980 I.C.J. 3, 35 (May 24).

[21] Tallinn Manual, supra note 8, at 34.

[22] David Fidler, Cyberattacks and International Human Rights Law, in Weapons Under International Human Rights Law 299, 306 (Stuart Casey-Maslen ed., 2014).; Mary Ellen O’Connell, Cyber Security Without Cyber War, 17 J. Conflict & Security L. 187, 191 (2012).

[23] Corfu Channel (U.K. v. Alb.), Judgment, 1949 I.C.J. 4 (Apr. 9).

[24] Tallinn Manual, NATO Cooperative Cyber Defence Centre of Excellence, https://ccdcoe.org/research.html (last visited Dec. 29, 2014).

[25] Convention on Cybercrime, Nov. 23, 2001, CETS No. 185.

[26] Marc Clayton, How Ukraine Crisis Could Dent Country's Booming Cyber-Crime, Christian Science Monitor, Mar. 26, 2014, available at http://www.csmonitor.com/World/Passcode/2014/0326/How-Ukraine-crisis-could-dent-country-s-booming-cyber-crime.