1 Introduction

On September 11, 2001 (9/11), four civilian airplanes were used as “guided bombs” in a coordinated suicide attack [1, 2]. Three of the airplanes were hijacked and crashed on various landmarks, such as the World Trade Center in New York City and the US Pentagon. The fourth airplane crashed in Pennsylvania, after a failed attempt by the passengers to regain control. In response to these attacks, a series of measures and actions were discussed and adopted at the NATO Prague Summit in 2002 [3]. Inter alia, NATO introduced the RENEGADE concept, which provides a structured way for National Authorities to address similar events promptly and effectively. The concept includes provisions regarding effective communication between the various stakeholders, clear roles and responsibilities, and actions which are automatically initiated when certain thresholds are reached.

Over the past decades, cyber-attacks (or cyber offensive operations) [4] have proved their ability to shut down nuclear centrifuges [5], inflict catastrophic failures in power generatorsFootnote 1, or attack military networks. Today, cyberspace is not only considered the 5th domain of operationsFootnote 2, but also creates a connection with all the rest of operational domains (i.e., land, sea, air, space). This has shifted the focus from mission assurance to information assurance, and has introduced kinetic warfare jargon (e.g., maneuver, superiority, dominance, etc.) into cyberspace operations. Information assurance requires understanding the relationship between military operations and the need for credible information flows and accurate information products. In that view, managing and responding to risks related to these flows and information is critical for maintaining the initiative in kinetic warfare missions.

Modern military operations conducted within the virtual boundaries of cyberspace are the norm and not the exception [6], and their results extend out to the physical domains. By default, warfare is an unpredictable, chaotic, and non-linear environment, where for years the “fog of war” was inevitable [7]. The advances in micro-electronics and programming languages and the introduction of the Internet have created an overflow, an abundance of information, where billions of devices collect, process, and store a vast amount of data.

1.1 Current situation

It took less than 2 years from the events of 9/11 until the introduction of the RENEGADE concept. In the meantime, cyber-attacks and cyber warfare operations have been conducted for at least three decades and yet no comparable framework has been widely recognized or implemented. The term cyber-attack is defined here as a deliberate attempt by individuals or organizations to breach the information system of another individual or organization. On the other hand, cyber warfare operations encompass both offensive and defensive cyber maneuvers enacted by military units or state-supported hacker groups to defend or undermine national interests. The key distinction between the two lays in the application: cyber-attacks might serve as elements of cyber warfare, but cyber warfare itself is deployed more broadly, targeting state actors in conjunction with traditional military actions. Detailed insights into cyber warfare are provided in Sect. 2.4. Most of the available playbooks, concepts, plans, and more, deal with how incidents are being handled, and with the responsive actions required in order to quickly restore the status quo ante. None of these documents address cyber-attacks as parts of a larger military campaign. Therefore, these playbooks end with resolving the issue and mitigating the effects.

Our work draws its inspiration from the RENEGADE concept and addresses what could follow a cyber-attack. While responsive actions to the incident or incidents are an internal part of the framework, they are not the end, and a certain path ultimately leading to potential responsive actions is described. In that view, we identify—but without adopting, encouraging, or proposing—a new approach by creating an automated process which connects the sensorFootnote 3 to the decision takerFootnote 4. By doing that, the international community is made aware of a number of new options that—although not essentially complying with current international norms—are enlarging the available responsive actions decision space for state actors and policy makers.

1.2 Scope and purpose

Cyber warfare is a reality that will take on increasing importance in the following years. Cyber-attacks could be used as the “weapon of choice” due to their specific characteristics. They can be highly targeted and focused, tailored to a specific unit or system, and can result in no or limited physical destruction, and—potentially—no loss of life. Whether or not a State should refrain from cyber-attacks as a retaliation method is heavily dependent upon several criteria. While cyber-attacks and cyber warfare operations have been conducted for decades, still no comparable concept has been introduced or adopted. Current strategic guidelines and operational plans are primarily concerned with the management of the cyber-attacks and detail the necessary actions to quickly revert systems to their pre-incident condition. However, these documents do not recognize that cyber-attacks may be part of a wider military campaign.

This research paper draws its inspiration from the RENEGADE concept and addresses what should follow a cyber-attack. The purpose of this paper is to propose a novel decision framework and flowchart, which will guide the decision-making process related to retaliatory actions within the concept of cyber warfare. By defining clear roles and responsibilities, and introducing an Attribution–Severity Matrix schema, it creates an automated process which connects the sensor to the decision taker. Doing so generates credible options and increases the decision space. We have followed a human-centric approach that is based on extensive analysis of historical and practical examples, exploiting knowledge acquired by other principles and examples. Furthermore, due to the novelty of this proposal, extensive testing and fine-tuning will be required.

In the following section, the multifaceted nature of warfare is analyzed, as well as cyber warfare, as a means to achieve strategic and operational goals. Furthermore, the transformation of military operations due to technological advancements, particularly in the area of cyber warfare, is explored. Afterwards, in Sect. 3, the research is focused to a structured approach to respond to cyber incidents, highlighting the importance of a rapid and informed reaction to minimize the impact of such events. Moreover, it proposes a framework that addresses the challenges of attributing cyber-attacks to specific actors and emphasizes the necessity of developing response plans that may not always align with international standards. Moving forward, Sect. 4 outlines the application of deterrence theory to cyberspace as a potential tool for preventing cyber-attacks by highlighting that while cyber deterrence may build on traditional deterrence concepts, it necessitates a nuanced approach considering the unique challenges of cyberspace. Finally, Sect. 5 examines the International and European legal frameworks that govern state behavior in cyber-space and ascertains that the established principles and norms of maintaining peace and security, protecting human rights, and ensuring the resilience of critical information infrastructure against cyber threats are aligned with the proposed framework. The concluding segment of the article acknowledges that the traditional deterrence models may not be applicable in cyberspace, due to difficulties in measuring effectiveness and the risk of misinterpretation of escalation following a cyber-attack. The described framework aims to align with international law and military doctrines addressing these challenges.

2 Background

2.1 War and warfare

War is usually the result of the failure of states to resolve various disputes through diplomatic means. Thucydides identified fear, honor, and interest as the root causes of interstate conflict [34]. Usually, war is not the main tool for dispute resolution over conflicting interests. State power is formulated through diplomatic, international, and economic means prior to resolving to military ones. When the use of force is required for the preservation or manifestation of a nation’s interests, then the military means become predominant, and war becomes a reality [7].

Warfare refers to the strategy, tactics, and means used in armed conflict against an opponent [8]. Essentially, it refers to the methods and strategies employed in waging war. According to Keegan, war is a phenomenon that occurs universally, and its nature and extent are determined by the culture that engages in it [9]. From that perspective, it is evident that battle undergoes constant transformations, although the essence of war stays unchanged. The nature of warfare is primarily influenced by social, diplomatic, political, and technological advancements. Military operations consist of the means of utilizing military forces to achieve strategic and/or operational objectives, through the design, organization, consolidation, and conduct. Through the art of military operations (or operational art), the military commander captures the way in which he will achieve the strategic objectives, and through the operational planning and conduct of the operations he materializes it, connects it with, and integrates it to the appropriate tactical actions to achieve strategic goals. Through military operational art, the efficient use of forces, space, time, and information is of essence. Operational art is not just about processes and techniques but incorporates ideas and concepts alike and combines together all the factors that can influence both the design and conduct of military operations.

Concrete military actions are a method to express the various forms of warfare. The following levels of warfare link the tactical actions required to achieve national objectives:

Strategic level

At this level, the national (or multinational objectives in case of an alliance or coalition) guidance that addresses strategic objectives and end states is formulated. The national resources in support of these objectives will be determined, developed, and used at this level.

Operational level

Here, the strategy and tactics are linked as needed to achieve the military end-states and strategic objectives. The focus falls on the planning and execution of operations via the Operational Art.

Tactical level

Battles and engagements are planned and executed at this stage, to achieve military objectives. Activities focus on the ordered arrangement and maneuver of combat elements in relation to each other and the enemy, to achieve the relevant objectives. The following table (Table 1) illustrates the various warfare levels along with their relevant characteristics.

Table 1 Military operational levels

2.2 A new form of warfare

The concept of a “revolution in military affairs” first appeared in the Soviet Union (today Russian Federation) in the early 1980s, when Ogarkov wrote about a “military technical revolution” [10] that could dramatically improve lethality as well as the capabilities of conventional weaponsFootnote 5. For years, the Soviet doctrine regarding the military technological enabler favored mass production over quality, while the US (mostly) and its allies relied on technological advancements, especially in the fields of micro-electronics and communications as their competitive advantage in the battlefield. In a Congressional hearing in 1970 General Westmoreland testified that “data links, computer assisted intelligence evaluation, and automated fire control…” will be used in the future to search for, lock-on, and engage enemy forces.

Information Technology is considered a key enabler in the revolution in military affairs (RMA) and has been materialized in the “system of systems” approach by the US militaryFootnote 6. To create the required command structures across all services and authorities together with the integration of all weapon-delivery platforms, it is essential to have a robust, reliable, and effective Command, Control, Computers, Communications, and Intelligence (C4I) system. The latter is heavily dependent on information technology advances and efforts. In that view, today’s military forces’ dependence on complex and unreliable systems (e.g., computers and communication systems) that are prone to attacks or disruption(s) begets the risk of a complete breakdown, if these attacks come to materialize and succeed. As a result, the “all-domain warfare” was introduced, where all previously unlinked domains, land, sea, air, space, and cyberspace were now interconnected and inter-depended.

Hybrid warfare as a term, was proposed by Hoffman [11] and describes a combination of conventional warfare, irregular warfare, and cyber warfare together with information warfare actions, like fake news, disinformation, misinformation, etc. Hybrid warfare has no universally accepted definition. Nevertheless, it helps better understand today’s military operations and the challenges that have emerged. In such a form of warfare all efforts, including conventional military operation, are subordinate to an information campaign. It should be considered as a “whole-of-government” activity. As per the NATO definitionFootnote 7hybrid threats combine military and non-military, as well as covert and overt means, including disinformation, cyber-attacks, economic pressure, and deployment of irregular armed groups and use of regular forces”.

2.3 Cyberspace

Cyberspace is a global domain of international significance that extends far beyond the domain of internal affairs of any state. Crucially, the uses and abuses of this complex borderless virtual space impinge on vital state interests in the physical world, including national security, public safety, and economic development. An early definition of cyberspace in the military domain was first introduced in the 2000s in the Joint Publication 1‑02 [8]. The definition provided then has already been identified as insufficient.

Kuehl defines cyberspace [12] as a “global domain within the information environment whose distinctive and unique character is framed by the use of electronics and the electromagnetic spectrum to create, store, modify, exchange, and exploit information via interdependent and interconnected networks using information-communication technologies”. The increasing importance of cyberspace for military operations has led to the US Department of Defense classifying it as the “5th domain of Warfare”.

2.4 Cyber warfare

While there is an ongoing debate [13] between the various stakeholders on whether the cyber-domain is, or is not, the 5th domain of military operations, many countries are becoming meaningfully engaged with the offensive possibilities that cyberspace can offer. The rise of cyber arming of states is emerging with the establishment of Cyber Military Units all around the world. Furthermore, the explicit references in the National Cyber Security Strategies (NCSS) of most of the EU and NATO member states that their cyber units are mandated to focus on offensive cyber operations leaves no room to doubt that we are at the crossroad of the “cyber-warfare age” [14].

Cyber warfare can be defined as the use of digital attacks against a state with the possibility to cause comparable harm to traditional kinetic warfare by the disruption of vital information, communication systems, and infrastructure [15]. Cyberspace is not sine qua non for the conduct of cyber warfare operations [13]. An insider threat, a spy with physical access to the server, or rogue materials can be used to launch cyber-attacks without the need for cyberspace. Furthermore, kinetic attacks materialized with a cruise or ballistic missiles and targeting data centers and similar infrastructures can also be utilized [6]. The integration of Cyber Military Units into military affairs and the militarization of cyberspace bring new challenges to the surfaceFootnote 8.

2.5 Incident response

Today’s incident response and recovery workflows and frameworks require that computer security incident response become one of their most important components. The term “incident response” refers to the processes and technologies that an organization should implement for detecting and responding to attacks originating from cyberspace and/or related to cybersecurity. Incident response builds upon two pillars: the first is preventing cyber-attacks, and the second is minimizing the effect if these attacks are to be materialized. While modern risk assessment frameworks can minimize the number of cyber-attacks or minimize their effects, not all incidents can be prevented, or their impact can be accurately calculated. Therefore, it is necessary for organizations to create incident response capabilities for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses and vulnerabilities exploited, and restoring IT services [16].

An event is anything that we observe in a system or computer network. Events can vary from user’s logging in to a server, sharing a file, requesting a web page, or a security system blocking a connection attempt. Events are not necessarily bad, and indeed not all events have malicious intent or purpose. On the other hand, adverse events are those that have a negative impact on any given system. These events may include unauthorized access or use of system privileges, execution of malware, power failures, etc. According to NIST SP 800-61r2 [16] “a computer security incident is a violation (or imminent threat of violation) of computer security policies, acceptable use policies, or standard security practices”. This definition implies that the relevant policies, standards, and procedures are in place so their violation can be measured.

There are several benefits behind the need for incident response planning, such as systematically responding to computer security incidents, minimizing loss of information or disruption of services, supporting the lessons learned process, etc. Although there is a large number of incident management models and frameworks, they all share some basic characteristics, such as identification, analysis, determination, and application of the proper countermeasures, finally ensuring that the same (or similar) incident will not happen again (part of the lessons learned process). The latter is based upon the notion that the organization had taken all the steps necessary to mitigate the vulnerabilities associated with the security incident and address the relevant risks. This approach usually leaves the offender untouched, either because the organization lacks the relevant digital forensic techniques or because it is impossible to attribute the cyber-attack to a person or individual, or finally, because there are state-backed player(s) involved. Furthermore, current frameworks do not address nation-wide major events (e.g., distributed denial-of-service [DDoS] attacks against Estonia [2007], the Ukrainian–Russian conflict [2022+], etc.).

3 The framework

3.1 Introduction

A State requires a structured and well-defined approach to resort to responsive actions against cyber incident(s). Such an approach can minimize the time gap between the sensor and the decision taker, thus providing credible options for the relevant actions and decisions. While a global effort to regulate actions within cyberspace is under way, most of the relevant efforts are drawn towards cybercrime and the protection of Critical Infrastructures or Critical Information Infrastructures, leaving acts of aggression untouched. This reality creates a gap between what state-sponsored actors can achieve, and the actions that the affected State can undertake to respond.

In this respect, state actors’ responsive plans may be developed and tested—though not necessarily complying with international standards and norms. This work aims at identifying, analyzing, and making publicly known such a potential responsive action, so that the research community can study it as an option, and the international community is made aware of it and be able to build an informed decision on how to address it. In any case, the view of this work should not be considered supportive of such an option.

3.2 Attribution matrix

One of the main issues related to cyber-attacks is that it is hard, if at all possible, to attribute them to certain groups or state-sponsored actors. Moreover, it is feasible for skillful individuals to incorporate key or buzz words. For example, the “Sandworm” group, a highly sophisticated and covert cyber espionage team, attacking military networks in the early 1990s, including the Black Energy attack on Ukrainian power grids, NotPetya ransomware outbreak, etc. The name “Sandworm” was attributed to this group by researchers due to references in their malware code to Frank Herbert’s science fiction novel “Dune”. The choice of this name reflects the group’s sophisticated and elusive modus operandi, akin to the fictional creature’s ability to move unseen through the sand and strike without warning. Further, it is possible for the attackers to add different characteristics in each layer of their attack. The Olympic Destroyer malware, which was used to attack the IT infrastructure in support of the Winter Olympic Games could easily be identified as attribution nightmareFootnote 9. Initially, indicators in the Olympic Destroyer malware code suggested links to several well-known state-sponsored groups, including the Russian-linked Sandworm and North Korean hackers. The malware had intricate false flags—deliberate misdirection embedded in the code—that made attribution challenging. These false flags included similarities to code previously used by North Korean, Chinese, and Russian groups, making it difficult for analysts to determine the true origin of the attack. Based on this, it is identified that attribution efforts are critical for the retaliation approach and should be initiated at the earliest possible attacking state. To create the necessary background, Table 2 depicts potential attribution levels based on the possibility to acquire enough relevant data.

Table 2 Attribution levels

3.3 Severity of events matrix

Measuring the severity of events is a key factor in deciding whether to respond to a cyber-attack. Table 3 illustrates the proposed severity matrix, which is predicated on the National Cyber Incident Scoring System (NCISS) levels established by the Cybersecurity and Infrastructure Security Agency (CISA)Footnote 10.

Table 3 Severity of events matrix

Further, we propose the following Responsive Action Matrix. The matrix suggests the responsive actions based upon the combination of the severity of the initial (cyber) event and the level of achieved attribution. With that, we can address the time criterion, thus creating the required credible options. Fig. 1 outlines the relevant responsive action matrix.

Fig. 1
figure 1

Responsive action matrix

An explanation of Fig. 1 in accordance with International Law is provided below:

Severity level (I-V)

The vertical axis likely represents the impact or potential harm caused by a cyber incident, with Level I being the least severe and Level V being the most severe. This aligns with principles of proportionality, suggesting that more severe incidents may warrant stronger responses.

Attribution level (low–high)

The horizontal axis likely reflects the confidence in attributing the cyber incident to a specific actor, with ‘Low’ being uncertain attribution and ‘High’ being certain attribution. Attribution is a key factor in international law for determining state responsibility and the appropriate response.

‘No’ response

For Levels I and II under ‘Low’ and ‘Medium’ attribution, the matrix indicates no response, which could be interpreted as either the incident does not warrant a response due to its low severity or the uncertainty of attribution makes a response legally or strategically unviable.

‘Cyber’ response

This indicates a digital or non-physical response to a cyber incident, such as cyber defense measures, cyber countermeasures, or other forms of digital retaliation. Under international law, such responses must be necessary, proportionate, and adhere to the principle of non-intervention.

‘Kinetic’ response

This indicates a physical response and is only recommended at the highest severity level with high attribution. Under the Tallinn Manual’s interpretation, a kinetic response is permissible under international law if it adheres to the principles of necessity, proportionality, and distinction. This is particularly relevant if the cyber operation can be considered an armed attack under the law of armed conflict.

The matrix suggests a framework where the response escalates not only with the severity of the incident but also with the confidence in attributing the attack to a particular actor. It is critical that the matrix is accompanied by clear definitions and thresholds for each level of severity and attribution. Additionally, the matrix should be developed with an understanding that any response, particularly at the ‘Kinetic’ level, must be in accordance with international law, which includes respecting state sovereignty and avoiding unnecessary harm to civilians and civilian infrastructure.

3.4 Structure and phases

This Incident Response Framework may include three distinct phases, as per Table 4.

Table 4 Incident response phases

Finally, we identify the required roles and responsibilities and the relevant command and control relationships, to respond to the time criticality, limit the line of efforts, and keep the required communications (which could be severely impacted by the initial event) to a minimum. By enabling the appropriate decision-takers in each level, we implement a “man-in-the-loop” approach, which ensures flexibility and prompt actions, down to the level of military unit/civilian sector. The identified roles and responsibilities are outlined in Table 5. The flow-chart supporting the proposed framework, the roles, responsibilities, and command structures is depicted in Fig. 2.

Table 5 Roles and responsibilities

4 The framework as a potential deterrence tool

4.1 Deterrence theory

Fig. 2
figure 2

Incident response framework flowchart

The classical deterrence theory can be traced back to the Peloponnesian War (431–404 BC), the famous ancient Greek war between the city-states of Athens and Sparta for the hegemony of the Greek world, and the threat of violence in response to adversary actions [17]. The first formal theories of a—strategic—form of national deterrence emerged during the years of Cold War, even though their routes can be traced back to the 1920–1930s, when the air-power theory was taking shape. In 1962, Kahn had coined the idea of “mutual assured destruction” (or MAD), which was based on the strategy of rational deterrence [18]. The latter entails that the threat of using destructive weapons against the enemy is an adequate measure for maintaining peace and stability. The strategy itself is based upon Nash’s equilibrium [19] in which, once armed, neither side has the will to initiate a conflict. As per MAD, second-strike capabilities developed by a nuclear-armed defender will result in the annihilation of both the defender and the attacker.

The basic deterrence theories that were proposed and introduced during the Cold War were heavily based upon the perceived advantage that nuclear bombs could replace costlier conventional forces. The destructive force of those nuclear weapons assured total annihilation in the event of their use, and it is a reality that until today no nuclear weapons were used in an armed conflict. Nuclear capable countries were extremely reluctant to use such weapons and their mere existence (or even suspicion of existence as has been observed in the case of Israel/Palestine) had created a perception of a deterrent effect. Nuclear deterrence remained active even after the end of the Cold War. In 1996, the then-secretary of defense Perry asserted that the US could retaliate with an overwhelming nuclear response against rogue states and other similar powers [20].

The whole deterrence theory can be summarized into the following words, “if you do this, then I will do to you this plus that”. In essence, it extends the behavioral modification that is sought through the warfare (ultimately, warfare aims to “persuade” the opponent to accept terms that, under other circumstances, they would be reluctant or unwilling to accept [7]) by increasing the “cost” for the offender. The main difference between warfare and deterrence is that the latter usually works prospectively and not retrospectively. Ultimately, deterrence works within the boundaries of a “cost–benefit” analysis, by increasing the potential “cost” for the offender above its “accepted” level [21]. It can generally be defined [22] as “the practice of discouraging or restraining someone (…) from tak-ing unwanted actions. […] It involves an effort to stop or prevent an action”.

4.2 Deterrence and cyberspace

While deterrence was considered a straightforward concept during the Cold War, and most (if not all) countries embraced deterrence in their national security posture, the concept remains difficult to achieve, even though the “information era” is dominating our economic, social, and personal lives. The wide-scale DDoS attack against Estonia (2007), the Stuxnet case (2010), and a series of events since then gained cyber deterrence more prominence into national security doctrines around the globe, but still the whole concept remains difficult to achieve, since most will focus on preventing (or responding to) attacks on or through cyberspace. Therefore, the majority of the relevant efforts will be directed in resilience rather than deterrence. This is a reasonable approach since the traditional models of deterrence have limited applicability within the boundaries of cyberspace. During the Cold War, a stable bipolar world made the MAD concept possible. Clear communication channels and the relevant perception on international matters led to successful crisis management.

Deterrence has many forms. For example, it can be singular and symmetric, like the nuclear one (or, by extent, the conventional warfare one). If retaliatory actions are to be invoked, then a major conventional or nuclear war is quite possible. Today, there is an endless and constantly changing number of asymmetrical relationships within cyberspace, where stakes, interests, and power all vary and are constantly in flux. In that view, cyber deterrence is considered repeatable and symmetric. Repeatable because, for the time being, it seems not physically possible to eliminate the offending state through cyber-retaliatory actions (unlike nuclear weapons), and symmetric because it could be directed against states and not individuals (peer-to-peer actions). As a result, state entities usually identify three distinct cases of deterrence in cyberspace as their potential actions: (a) cyber-attacks as a retaliatory deterrence method against cyber-attacks, (b) cyber-attacks as a retaliatory deterrence method against kinetic attacks, and (c) kinetic attacks as a retaliatory deterrence method against cyber-attacks.

4.3 Key considerations

Deterrence is widely considered a fine method, as long as it remains idle. The challenge for a state entity is that the gains from retaliating may be less than the potential counter-retaliation of the attacker. Based on that reality, in comparison to the threat of using nuclear weapons, it was argued [23] that a large-scale conventional war would be more than enough to deter the Soviet Union in the Cold War. The ultimate question is how one can demonstrate a will to retaliate without having to do so, deterring an opponent from acting. The above being said, it might be necessary to further harm critical networks and systems, thus minimizing functionality and usability and increasing the relevant costs, instead of retaliating. Recovery time back to a situation ante is also uncertain. Further, the opponent might not only counter-retaliate but—based on the belief that the retaliation was not merited or appropriate, being under pressure to respond, etc.—escalate further. Another option is to respond with a conventional kinetic warfare attack, rather than a cyber-attack, especially if the opponent assumes his inferiority in cyberspace. In the latter scenario, pain and suffering from the kinetic warfare would be far greater than in the case of a cyber-attack-only scenario.

One of the key issues is that retaliatory deterrence in cyberspace needs to be clearly identified. The challenge for a state actor here is that any retaliatory cyber-attack can be lost in the “noise” of modern communications, and the “message” may never be received by the appropriate addressee. Without clear signaling, deterrence may be misinterpreted as aggression. This challenge is not the sole privilege of cyberspace but extends to all the domains [24]. Cyber operations conducted as a deterrence method to cyber (or kinetic) attacks from offending peers have the potential to violate international legal obligations. Table 6 refers to a set of prerequisites that need to be considered.

Table 6 List of requirements for deterrence considerations in cyberspace

5 Legal considerations

5.1 The international legal framework

Devastated by the two world wars of the last century, nations developed an international regulatory framework that lays down the legal rules, norms, and standards that apply between sovereign states and other entities that are legally recognized as international actors. The United Nations (UN) was established following the conclusion of the 2nd World War and in the light of Allied planning and intentions expressed during that conflict. The purpose of the UN is set out in article 1 of the Charter as follows:

  1. a)

    To maintain international peace and security, and to that end, to take effective collective measures for the prevention and removal of threats to the peace, and for the suppression of acts of aggression or other breaches of the peace, and to bring about peaceful means, and in conformity with the principles of justice and international law, adjustment or settlement of international disputes or situations which lead to a breach of the peace.

  2. b)

    To develop friendly relations among nations based on respect for the principle of equal rights and self-determination of peoples, and to take other appropriate measures to strengthen universal peace.

  3. c)

    To achieve international cooperation in solving international problems of an economic, social, cultural or humanitarian character, and in promoting and encouraging respect for human rights and for fundamental freedoms for all without distinction as to race, sex, language, or religion.

  4. d)

    To be a center for harmonizing the actions of nations in the attainment of these common ends.

As the main global forum for states to discuss and agree upon issues regarding international security, the UN has been one of the main venues to address international cybersecurity issues. Established to promote international cooperation, the UN is an intergovernmental organization committed to maintaining international peace and security, developing friendly relations among nations, and endorsing social progress, better living standards, and human rights. The UN is based upon the sovereign equality of states and the principles of fulfilment in good faith of the obligations contained in the Charter, the peaceful settlement of disputes and the prohibition on the use of force. It is also provided that member states must assist the organization in its activities taken in accordance with the Chapter and must refrain from assisting states in which the UN is taking preventive or enforcement action [25].

The UN’s activities regarding cyber security can be seen as highly fragmented as the subject is addressed in many of its different intergovernmental bodies and organizational platforms. The United Nations Security Council (UNSC) is one of the principal organs of the UN alongside the UN General Assembly (UNGA) and the International Court of Justice (ICJ). The UNSC is intended to operate as an efficient executive organ of limited membership, functioning continuously. The UNSC’s main mission is to ensure international peace and security. The UNSC acts on behalf of the members of the organization as a whole in performing its functions, and its decisions are binding upon all member states. Its powers are concentrated in two particular categories, the peaceful settlement of disputes and the adoption of enforcement measures. As one of the most powerful organs, it has the authority to issue binding resolutions to its member states, and—among others—authorize military action.

Furthermore, the UNGA is the parliamentary body of the UN and consists of representatives of all member states. Membership of the UN, as provided by article 4 of the Chapter, is open to “all other peace-loving states which accept the obligations contained in the present Chapter and, the judgment of the organisation, are able and willing to carry out these obligations and is affected by a decision of the UNGA upon the recommendation of the UNSC”. The UNGA has a purely recommendatory role and in that sense, its Resolutions are not binding on the member states. The ICJ is the principal judicial organ of the UN. The Court’s mission is to settle, in accordance with international law, legal disputes submitted to it by states and to give advisory opinions on legal questions referred to it by authorized UN organs and specialized agencies (Report of International Court of Justice, A/76/4Footnote 11). A list of UN Resolutions and Reports related to cybersecurity challenges is provided in Table 7.

Table 7 List of resolutions and reports related to cybersecurity challenges

5.1.1 Principles and aspects of international law

International law is the law of the international community of states. It is enshrined in conventions, treaties, and standards and it addresses a broad range of domains and issues, like war, diplomacy, trade, etc. It is applied to sovereign states and operated through consent since there is no established way to enforce it. The sources of international law are clearly defined in Article 38(1) of the Statute of the International Court of Justice: International conventions/treaties, international customs, general principles recognized by civilized nations, judicial decisions, and the teachings of the most highly qualified publicists.

Furthermore, it is essential to clarify that international law incorporates two major sets of rules, i.e., Jus ad bellum, the body of international law that governs a state’s resort to force as an instrument of its national policy (which focuses on the criteria for going to war in the first place by covering issues such as “right purpose”, “duly constituted authority”, and “last resort”), and the Jus in bello, the international law regulating the conduct of armed conflict (also labelled the law of war, the law of armed conflict or international humanitarian law), which governs how warfare is (or should be) conducted [26]. Its main purpose is to limit the suffering caused by providing protection and assistance to the victims of war by covering issues such as non-combatant immunity and proportionality. Jus in bello recognizes the reality of a conflict and regulates only those aspects which are of humanitarian concern. The law of armed conflict is triggered by the existence of aggression, irrespectively of its duration, or how much slaughter is taking place. Its main purpose is to protect combatants and non-combatants from unnecessary suffering and to safeguard the fundamental human rights of persons not actively taking part in hostilities.

A UN General Assembly resolution defined and adopted by consensus the definition of aggression, which is described as the use of armed force by a state against the sovereignty, territorial integrity, or political independence of another State. In 2010, the Rome Statute of the International Criminal Court used this definition in the relevant elements comprising the crime of aggressionFootnote 12. Article 2 of the UN Chapter, forbids the use of force, and asks states to refrain from the threat or use of force in their international relations, with the following exceptions: (a) when the use of force is authorized by the UN Security Council, (b) as an act of individual or collective self-defense if an armed attack occurs, and (c) when Article 5 of the North Atlantic Treaty of 1949 is triggered.

In certain cases, limited use of force is justified, in support of the purposes laid down by the Security Council, but without the Council’s express authorization (e.g., Northern Iraq in 1991 and Kosovo in 1999). Finally, it should be stated that the choice of the means and methods of warfare by the parties involved, while it stands as their right it is not unlimitedFootnote 13. In that view, the fundamental principles of military necessity, humanity, distinction, and proportionality are still governing the law of armed conflict.

5.1.2 Retaliation and reprisals

The words retaliation and reprisal are not present in the relevant international law treaties. Their exact meaning remains elusive and their scope is considered ambiguous. Article 51 of the UN Charter outlaws both the threat and the use of force and prohibits these acts, unless otherwise authorized by the Security Council, or when States resort to self-defense. Reprisals are a recognized yet controversial concept within international law. They can be defined as “unlawful acts that become lawful in that they constitute a reaction to a delinquency by another state” [27], while Lissitzyn and Kelsen [28] defined reprisals as “acts, which although normally illegal, are exceptionally permitted as the reaction of one state against a violation of its right by another state”. The element of unlawfulness is an essential view of reprisals within the concept of International Law, whereas retaliation can be used in a broader sense, including reprisals, or other unfriendly or hostile, yet lawful acts of retorsion.

The term ‘retaliation’ in International Law is used as a generic one, incorporating retaliation, reprisals, and retorsion [29]. The meaning of these concepts “seem at times to be as varied as the writers dealing with them”. In 1962, Kahn [30] coined the idea of MAD, based on the strategy of rational deterrence, which holds that the threat of using destructive weapons against the enemy is an adequate measure for maintaining peace and stability. The strategy itself is based upon Nash’s equilibrium and dictates that once armed neither side has the will to initiate a conflict.

5.2 The European legal framework

On 8 November 2001, the Committee of Ministers of the Council of Europe adopted the Convention on CybercrimeFootnote 14 (also known as the Budapest Convention). Drawn up by the Council of Europe, the Budapest Convention was the first international treaty that addresses internet and computer crime (cybercrime). The Convention was principally aimed at harmonizing the domestic criminal substantive law elements of offences and connected provisions in the area of cybercrime. However, the Budapest Convention did not address concerns that may be raised by cyber-attacks that are not just criminal acts but may also constitute espionage or use of force under the specific legal framework of international law. Table 8 outlines the EU efforts for a legal framework to protect critical infrastructures from large-scale cyber-attacks and to create an open, safe, and secure cyberspace followed.

Table 8 EU efforts for a legal framework for cybersecurity

6 Conclusions

The advent of cyberspace has introduced a new realm of interaction, transcending traditional physical boundariesFootnote 15 [32] and presenting unique challenges to the application of international law. As a domain that is inherently global and decentralized, cyberspace poses significant questions about jurisdiction, sovereignty, and the enforceability of legal norms. Traditional principles of international law, developed in the context of a world divided by territorial borders, face considerable adaptation challenges when applied to the digital landscape. Issues such as cybercrime, data protection, intellectual property rights, and state-sponsored cyber activities push the boundaries of conventional legal frameworks, necessitating a re-examination of how these established norms can be effectively implemented in an online context.

In response to these challenges, there has been a growing movement to develop a coherent set of principles and rules that can govern conduct in cyberspace [33]. This involves not only the adaptation of existing international laws but also the introduction of new legal instruments and cooperative frameworks. States, international organizations, and private entities are engaged in ongoing dialogues to determine how international law can be extended or modified to address the unique characteristics of cyberspace. Key areas of focus include the establishment of jurisdiction in a borderless environment, the balancing of state sovereignty with the global nature of the internet, and the protection of human rights online. As cyberspace continues to evolve, the development of a comprehensive legal framework that respects the complexities of this domain remains a critical task for the international community.

Cyber-attacks have been a reality for more than four decades, and while most military forces have created cyber units, no framework can quickly resolve a decision on whether to retaliate against cyber or a kinetic attack. The described framework appears to build upon the fundamental principles of international law and military doctrines on cyber operations, and identifies key challenges (e.g., attribution, proportionality, termination, etc.). In that view, State actors may argue that it abides by current international law norms and concepts, even though the applicability of international law in cyberspace operations is debatable. For a better understanding of the framework, a severity analysis and attribution matrix were also provided.

In that view, it abides with current international law norms and concepts, even though the applicability of international law in cyberspace operations is still debatable. It also addresses the information overflow, by automating the necessary actions, minimizing command and control communications, and assigning specific roles and responsibilities. In support of the framework, a severity analysis, and a severity—attribution matrix was also proposed. The framework may be further developed and updated by following the proposed steps:

  1. a)

    Evaluation through a series of cybersecurity exercises and/or tabletop exercises where the framework can be examined against a series of events and scenarios. The framework can also be evaluated against ad-hoc or legacy approaches. Certain key performance indicators (KPI) can be introduced to measure applicability, flexibility, and effectiveness. A proposed approach is to use the SMARTFootnote 16 paradigm (Specific—Measurable—Achievable—Relevant—Time-bound) for the identification of the relevant and appropriate KPIs.

  2. b)

    Assignment of roles and responsibilities, as well as the establishment of the “command structure” and communication lines needed for its implementation.

  3. c)

    Artificial intelligence/machine learning algorithms can also be used to further automate the process and ensure that all the relevant information has been considered. The challenge regarding this option is not the algorithms themselves, but access to valuable and extensive data, ensuring that these data have not been manipulated to create situations where abnormal scenarios would be identified as legitimate actions.

Cyber warfare usually lacks the known components of conventional warfare, such as physical destruction on a massive scale, violence, and submission to another entity’s will. While cyber-attacks might be difficult to be categorized as “armed” ones, the use of cyber capabilities in war is a common feature of today’s conflicts. In that view, the identified framework may be incorporated into the relevant playbooks at the governmental and military levels. It may also be used to allow governmental intervention and enable state authorities to respond to cyber-attacks, even though the latter are directed against the civilian sector. This framework may be adopted by governmental and State use since international law dictates their accountability. It does not apply to corporations and businesses (“hack-back” approach).

Further considerations may refer to the formulation of the relevant thresholds and their consequent update. However, traditional models of deterrence may have little relevance to cyberspace. Moreover, it is difficult to assess the effectiveness of deterrence since there is no baseline behavior to compare with. Cyber-attacks may not even be noticed by the offending state or be misinterpreted, thus leading to escalation. Future research will be focused on developing incident response protocols for states—grounded in international legal principles—that can be practically implemented or clearer mechanisms for the attribution of cyber operations to States considering the technical challenges.