Nato Cyber Warfare Manual: Civilian Hackers 'Legitimate Targets' For Conventional Attacks In War
Civilian hackers who cause death or damage to property could be legitimate targets for conventional weapons, according to the first international 'handbook' on cyber warfare.
In further proof that cyber warfare is not science fiction, but a fact of modern life, Nato has released a 'handbook' to try and codify how international law applies to state-sponsored hacking, and its role in future wars.
The Tallinn manual advises that cyber-attacks must not be targeted at hospitals, dams and nuclear power stations "even when they are military objectives".
It includes provisions allowing states to respond with conventional weapons to a cyber attack by another state that causes death or significant damage to property.
Attacks designed to spread terror are also forbidden under its guidelines.
But it also says that "hacktivists" who lead or participate in cyber attacks during conflict can be targeted. Even though such hackers are technically civilians they may still be legitimate targets, the manual says:
The key is whether civilains engage in "an act of direct participation in hostilities", in a similar way to non-military civilian fighters using conventional weapons in a legitimate conflict.
But experts were divided on exactly when such a hacker might be a target.
Page 103 of the manual says:
"Consider the example of an individual hacktivist who has, over the course of one month, conducted seven cyber attacks against the enemy's command and control system. By the first view the hacktivist was only targetable while conducting each attack. By the second he was targetable for the entire month. Moreover in the absence of a clear indication that the hacktivist was no longer engaging in such attacks, he or she would have remained targetable beyond that period."
It defines a 'Hacktivist' as:
A private citizen who on his or her own initiative engages in hacking for, inter alia, ideological, political, religious, or patriotic reasons.
The manual is not an official Nato document, and according to experts there is still no wide consensus on many aspects of how the law applies to online attacks.
The handbook was drawn up by Nato's Co-operative Cyber Defence Centre of Excellence, who worked with 20 lawyers, the International Committee of the Red Cross and the US Cyber Command.
vise na linku
http://www.huffingtonpost.co.u...l_n_2906122.html?utm_hp_ref=uk
Dakle, svi su legitimne mete....kako ja shvacam
Dok amerikanci govore o bumbama
A new report from the Department of Defense outlines the military's capability to deter cyber threats with some pretty heavy firepower, including nuclear weapons.
http://www.activistpost.com/20...rce-hackers-cyber-threats.html
Zelio bi vas podsjetiti na ovo iz proslosti
JOINT STATEMENT CONDEMNING LOU CYBERWAR
Posted 7 Jan 1999 00:00:00 UTC
The hacker groups 2600, Chaos Computer Club, the Cult of the Dead Cow (cDc), !Hispahack, L0pht Heavy Indusries, Phrack and Pulhas feel the need to comment on recent announcements of a group calling themselves the "Legion of the Underground" (LoU).
But we strongly oppose any attempt to use the power of hacking to threaten or destroy the information infrastructure of any country, for any reason. Declaring "war" against anyone, any group of people, or any nation is a most deplorable act. This only reduces the hacker to the level of the group or country that they are attacking. This has nothing to do with hacktivism or the hacker ethics and is nothing a hacker can be proud of.
http://www.2600.com/news/view/article/361
Takoder, kao sto znate..stux je napravljen od izraelaca (i amerikanaca). Najvjerojatnije....
Israel, through Unit 8200,[95][96] has been speculated to be the country behind Stuxnet in many media reports[60][73][97] and by experts such as Richard A. Falkenrath, former Senior Director for Policy and Plans within the U.S. Office of Homeland Security.[98][61] Yossi Melman, who covers intelligence for the Israeli daily newspaper Haaretz and is writing a book about Israeli intelligence, also suspected that Israel was involved, noting that Meir Dagan, the former (2011) head of the national intelligence agency Mossad, had his term extended in 2009 because he was said to be involved in important projects.
http://en.wikipedia.org/wiki/Stuxnet
http://en.wikipedia.org/wiki/Unit_8200
http://www.nytimes.com/2012/06...ainst-iran.html?pagewanted=all
http://www.phantomreport.com/mossad-wants-credit-for-stuxnet
Misljenja ?