ABSTRACT

This chapter explains about the general overview of the complexities relating to the technology underpinning cyber operations. The cyber space as the fifth domain of battle space is in tension with many basic aspects of international law governing the use of force. In 2009/10, a computer malware dubbed Stuxnet worm attacked industrial Supervisory Control and Data Acquisition (SCADA) systems central to Iranian nuclear programme. Many experts and politicians subsequently speculated on its original architects. Israel had already previously stated that cyber warfare was an important part of its national strategy and had established a military intelligence unit dedicated to this realm of engagement. Cyber attacks directed against CNI such as transport, dams and nuclear plants whose automated systems rely heavily on SCADAs can lead to widespread physical damage. Computer networks and the Internet had capability to fuse and diffuse all forms of modern technology. The right to self-defence has limitations since not all uses of force qualify as armed attacks.