Open Access. Powered by Scholars. Published by Universities.®

International Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 91

Full-Text Articles in International Law

Drawing The Cyber Baseline: The Applicability Of Existing International Law To The Governance Of Information And Communication Technologies, Dapo Akande, Antonio Coco, Talita De Souza Dias Feb 2022

Drawing The Cyber Baseline: The Applicability Of Existing International Law To The Governance Of Information And Communication Technologies, Dapo Akande, Antonio Coco, Talita De Souza Dias

International Law Studies

"Cyberspace" is often treated as a new domain of State activity in international legal discourse. This has led to the assumption that for international law to apply to cyber operations carried out by States or non-State actors, "cyber-specific" State practice and opinio juris must be demonstrated. This article challenges that assumption on five different bases. First, it argues that rules of general international law are generally applicable to all domains, areas, or types of State activity. In their interpretation and application to purported new domains, limitations to their scope of application cannot be presumed. Second, this article demonstrates that the …


In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller Oct 2021

In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller

International Law Studies

States currently endorse three different positions concerning the international wrongfulness of cyber operations that penetrate computer systems located on the territory of another state but do not rise to the level of a use of force or prohibited intervention. The first position is that such low-intensity cyber operations are never wrongful, because sovereignty is a principle of international law, not a primary rule that can be independently violated. The second is that low-intensity cyber operations are always wrongful, because sovereignty is a primary rule of international law that is violated by any non-consensual penetration of a computer system located on …


The Plea Of Necessity: An Oft Overlooked Response Option To Hostile Cyber Operations, Louise Arimatsu, Michael N. Schmitt Aug 2021

The Plea Of Necessity: An Oft Overlooked Response Option To Hostile Cyber Operations, Louise Arimatsu, Michael N. Schmitt

International Law Studies

States are increasingly focused on the measures—cyber or otherwise—that they can take in response to hostile cyber operations. Although cyber operations are usually responded to with acts of “retorsion” (acts that are lawful, although unfriendly), international law recognizes other self-help mechanisms that allow for more robust responses. In the cyber context, most attention has focused on countermeasures and self-defense. Yet, both are subject to various limitations that constrain their availability.

This article examines a further option, the so-called “plea of necessity.” It allows States to respond to a hostile cyber operation when the action taken would otherwise be unlawful but …


Cyber Attribution And State Responsibility, William Banks Jul 2021

Cyber Attribution And State Responsibility, William Banks

International Law Studies

We might expect international law to specifically address cyber attribution requirements due to the significance of attribution in framing the legal responsibility of States and the boundaries of responsive actions by victim States. However, there is little international law of cyber attribution, and what law there is exists largely by implication. Likewise, there is only a murky and highly contested law of State responsibility that theoretically constrains the vast majority of State-sponsored cyberattacks. Because victim States cannot engage in countermeasures unless they attribute a cyberattack to a State, attribution can serve simultaneously to constrain and empower victim States. However, the …


Neutrality And Cyberspace: Bridging The Gap Between Theory And Reality, Noam Neuman Apr 2021

Neutrality And Cyberspace: Bridging The Gap Between Theory And Reality, Noam Neuman

International Law Studies

While there exists a broad consensus among States that international law generally applies to the cyber domain, particular views regarding the applicability of the law of neutrality have rarely been put forward, and presently there seems to be insufficient State practice and domain-specific opinio juris in this regard. Against this backdrop, several attempts have been made throughout the years to apply certain neutrality rules to cyberspace by referring to analogies from other domains. However, this legal regime provides an emblematic example of what the introduction of traditional rules of international law, formulated with the physical domains of warfare in mind, …


Foreign Cyber Interference In Elections, Michael N. Schmitt Mar 2021

Foreign Cyber Interference In Elections, Michael N. Schmitt

International Law Studies

In the 2020 U.S. elections, Russia authorized and conducted influence operations designed to support former President Trump, although it did not attempt to alter any technical aspect of the voting process. Russia was not alone. Iran mounted a multi-pronged covert influence campaign intended to undercut Trump’s reelection prospects, while other foreign actors–like Lebanese Hizballah, Cuba, and Venezuela–also tried to influence the election. Interestingly, China did not conduct operations designed to alter the outcome, although it did consider doing so. The phenomenon of election meddling, however, extends well beyond the United States to such countries as Austria, Estonia, France, Germany, Hungary, …


Protection Of Data In Armed Conflict, Robin Geiss, Henning Lahmann Feb 2021

Protection Of Data In Armed Conflict, Robin Geiss, Henning Lahmann

International Law Studies

This article presents a novel way to conceptualize the protection of data in situations of armed conflict. Although the question of the targeting of data through adversarial military cyber operations and its implications for the qualification of such conduct under International Humanitarian Law has been on scholars’ and states’ radar for the last few years, there remain a number of misunderstandings as to how to think about the notion of “data.” Based on a number of fictional scenarios, the article clarifies the pertinent terminology and makes some expedient distinctions between various types of data. It then analyzes how existing international …


Israel’S Perspective On Key Legal And Practical Issues Concerning The Application Of International Law To Cyber Operations, Roy Schöndorf Jan 2021

Israel’S Perspective On Key Legal And Practical Issues Concerning The Application Of International Law To Cyber Operations, Roy Schöndorf

International Law Studies

The speech given by the Israeli Deputy Attorney General (International Law) at the Naval War College’s event on “Disruptive Technologies and International Law” sets out, for the first time, Israel’s position on the application of international law to cyber operations. Consistent with the position taken by the vast majority of States thus far, Israel considers that international law applies to such operations. The speech stresses that questions pertaining to the identification and application of relevant legal rules remain, given the profound differences between the cyber domain and traditional domains of warfare—land, sea, and air. Therefore, in Israel’s view, a cautious …


Responding To Hostile Cyber Operations: The “In-Kind” Option, Michael N. Schmitt, Durward E. Johnson Jan 2021

Responding To Hostile Cyber Operations: The “In-Kind” Option, Michael N. Schmitt, Durward E. Johnson

International Law Studies

Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of engagement. One of the major challenges in doing so is that key aspects of the international law governing cyber responses are vague, unsettled or complex. Not surprisingly, therefore, international law is markedly absent from strategies and operational concepts. Rather, they tend to take on a practical “tit-for-tat” feel as policymakers logically view “in-kind” responses as “fair play.” For them, responding in-kind surely must be lawful notwithstanding any challenges in discerning the precise legal character of the initial hostile cyber operation.

Testing that sense, this article examines the …


Autonomous Cyber Weapons And Command Responsibility, Russell Buchan, Nicholas Tsagourias Dec 2020

Autonomous Cyber Weapons And Command Responsibility, Russell Buchan, Nicholas Tsagourias

International Law Studies

Autonomous cyber weapons have made their way onto the battlefield, raising the question of whether commanders can be held criminally responsible under command responsibility when war crimes are committed. The doctrine of command responsibility has a long history in international criminal law and comprises three core elements: the existence of a superior-subordinate relationship, the commander’s knowledge of the crime, and the commander’s failure to prevent or repress the subordinate’s criminal actions. This article unpacks the content of these elements and applies them to autonomous cyber weapons by treating them as being analogous to soldiers since they operate within an organized …


Autonomy And Precautions In The Law Of Armed Conflict, Eric Talbot Jensen Nov 2020

Autonomy And Precautions In The Law Of Armed Conflict, Eric Talbot Jensen

International Law Studies

Already a controversial topic, legal debate and broader discussions concerning the amount of human control required in the employment of autonomous weapons—including autonomous cyber capabilities—continues. These discussions, particularly those taking place among States that are Parties to the 1980 Certain Conventional Weapons Convention, reveal a complete lack of consensus on the requirement of human control and serve to distract from the more important question with respect to autonomy in armed conflict: under what conditions could autonomous weapons “select” and “attack” targets in a manner that complies with the law of armed conflict (LOAC).

This article analyzes the specific LOAC rules …


Autonomous Cyber Capabilities And The International Law Of Sovereignty And Intervention, Michael N. Schmitt Nov 2020

Autonomous Cyber Capabilities And The International Law Of Sovereignty And Intervention, Michael N. Schmitt

International Law Studies

This article explores the intersection of autonomous cyber capabilities and two primary rules of international law—the respect for the sovereignty of other States and the prohibition on coercive intervention into another State's internal or external affairs. Of all the rules of international law, these are the likeliest to be violated through employment of cyber capabilities, whether autonomous or not. This raises the question of whether a cyber operation that involves autonomous capabilities presents unique issues with respect to the application of the two rules. The article concludes that while there are numerous unsettled issues surrounding their application to cyber operations, …


Will Cyber Autonomy Undercut Democratic Accountability?, Ashley Deeks Oct 2020

Will Cyber Autonomy Undercut Democratic Accountability?, Ashley Deeks

International Law Studies

In recent years, legislative bodies such as the U.S. Congress and the U.K. Parliament have struggled to maintain a role for themselves in government decisions to conduct military operations against foreign adversaries. Some of these challenges arise from constitutional structures, but they are also due to the changing nature of conflict: a shift away from large-scale kinetic operations and toward smaller-scale operations—including cyber operations—that are less visible and that do not require robust legislative support. These modern operations leave legislatures to engage in ex post and sometimes ineffective efforts to hold their executive branches accountable for international uses of force …


Autonomous Cyber Capabilities Below And Above The Use Of Force Threshold: Balancing Proportionality And The Need For Speed, Peter Margulies Oct 2020

Autonomous Cyber Capabilities Below And Above The Use Of Force Threshold: Balancing Proportionality And The Need For Speed, Peter Margulies

International Law Studies

Protecting the cyber domain requires speedy responses. Mustering that speed will be a task reserved for autonomous cyber agents—software that chooses particular actions without prior human approval. Unfortunately, autonomous agents also suffer from marked deficits, including bias, unintelligibility, and a lack of contextual judgment. Those deficits pose serious challenges for compliance with international law principles such as proportionality.

In the jus ad bellum, jus in bello, and the law of countermeasures, compliance with proportionality reduces harm and the risk of escalation. Autonomous agent flaws will impair their ability to make the fine-grained decisions that proportionality entails. However, a …


An International Attribution Mechanism For Hostile Cyber Operations, Yuval Shany, Michael N. Schmitt Jul 2020

An International Attribution Mechanism For Hostile Cyber Operations, Yuval Shany, Michael N. Schmitt

International Law Studies

This article is the result of an international research project organized by the Federmann Cyber Security Research Center at Hebrew University to consider the feasibility of establishing an international attribution mechanism for hostile cyber operations, as well as the usefulness of such a body. The authors observe that, at present, states wielding significant cyber capability have little interest in creating such a mechanism. These states appear to be of the view that they can generate sufficient accountability and deterrence based on their independent technological capacity, access to expertise and to offensive (active defense) cyber tools, political clout, security alliances, and …


Adverse Cyber Operations: Causality, Attribution, Evidence, And Due Diligence, Hans-Georg Dederer, Tassilo Singer Nov 2019

Adverse Cyber Operations: Causality, Attribution, Evidence, And Due Diligence, Hans-Georg Dederer, Tassilo Singer

International Law Studies

Adverse cyber operations against States are on the rise, and so are the legal challenges related to such incidents under public international law. This article will not delve into already intensely debated problems of classification, such as whether adverse cyber operations constitute “armed attacks” or “use of force.” Rather, the article will focus on causality and attribution with special regard to problems of evidence. In particular, the article will elaborate on the applicable standards of proof to be met by the victim State when submitting, or having to submit, evidence to justify self-defense or countermeasures against the State of origin. …


Classification Of Cyber Capabilities And Operations As Weapons, Means, Or Methods Of Warfare, Jeffrey T. Biller, Michael N. Schmitt Jul 2019

Classification Of Cyber Capabilities And Operations As Weapons, Means, Or Methods Of Warfare, Jeffrey T. Biller, Michael N. Schmitt

International Law Studies

Despite several persistent controversies regarding how international law applies to cyber operations during an armed conflict, general understanding of the law in this domain is maturing. Reasoning by analogy to non-cyber application and interpretation of international law underlies much of the progress. Yet, although preexisting normative structures and legal terminology enable legal advisors and scholars to usefully draw upon previously acquired experience and understanding, there are obstacles to definitive analogizing that result from fundamental differences between cyber and kinetic operations. The number of imperfect analogies that underlie some of the normative uncertainty in the field underscores this point.

One key …


International Humanitarian Law And The Targeting Of Data, Tim Mccormack Nov 2018

International Humanitarian Law And The Targeting Of Data, Tim Mccormack

International Law Studies

The 2013 publication of the Tallinn Manual on the International Law Applicable to Cyber Warfare confirmed the view of the majority of the international group of experts that data was not an object and therefore not subject to the rules of targeting during an armed conflict. Intuitively, a number of scholars reacted negatively to this view, and instead were drawn to the Tallinn Manual minority position that data did constitute an object. The significance of data, particularly personal data, is only increasing, and the purpose of the law of armed conflict is to reduce the deleterious impact of armed conflict …


The Dod Law Of War Manual And Its Critics: Some Observations, Charles J. Dunlap Jr. Jan 2016

The Dod Law Of War Manual And Its Critics: Some Observations, Charles J. Dunlap Jr.

International Law Studies

The U.S. Department of Defense’s (DoD) new Law of War Manual has generated serious debate about its treatment of a variety of issues including human shields, the status of journalists, cyber operations, the precautions to be taken prior to attacks and even the role of honor in war. Although this article does not purport to be a comprehensive response to every critique of the Manual and, indeed, cites opportunities for its improvement, it nevertheless concludes that on balance the Manual provides an excellent, comprehensive and much-needed statement of DoD’s view of the lex lata of the law of war.


Emerging Technologies And Loac Signaling, Eric Talbot Jensen Aug 2015

Emerging Technologies And Loac Signaling, Eric Talbot Jensen

International Law Studies

As States seek to weaponize new technologies such as robotics, cyber tools and nanotechnology, the current law of armed conflict (LOAC) that guides the employment of existing weapons will signal rules and principles that should guide national decisions on what new technologies to weaponize and how to do so in a way that ensures compliance with battlefield regulation. LOAC has served this "signaling" function historically with respect to innovative weapon systems such as balloons, submarines, airplanes, and nuclear weapons, and will continue to do so as nations look forward to potentially weaponizing emerging technologies.


State Opinio Juris And International Humanitarian Law Pluralism, Michael N. Schmitt, Sean Watts May 2015

State Opinio Juris And International Humanitarian Law Pluralism, Michael N. Schmitt, Sean Watts

International Law Studies

International humanitarian law has developed through a pluralistic process. Its history reveals a pattern of rough proportionality between State opinio juris and non-State expressions of law. These diverse sources have maintained a respectable yet realistic balance between humanity and military necessity. However, current IHL dialogue presents a stark contrast to the vibrant and pluralistic exchanges of the past. The substantive input of non-State actors such as non-governmental organizations, tribunals, and scholars far outpaces the work of States. Parity of input, especially in quantitative terms, is surely too much to demand and surely not necessary given the special status of State …


Methods And Means Of Cyber Warfare, William H. Boothby Dec 2013

Methods And Means Of Cyber Warfare, William H. Boothby

International Law Studies

No abstract provided.


The Law Of State Responsibility In Relation To Border Crossings: An Ignored Legal Paradigm, Louise Arimatsu Dec 2013

The Law Of State Responsibility In Relation To Border Crossings: An Ignored Legal Paradigm, Louise Arimatsu

International Law Studies

No abstract provided.


Cyber War And International Law: Concluding Remarks At The 2012 Naval War College International Law Conference, Yoram Dinstein Dec 2013

Cyber War And International Law: Concluding Remarks At The 2012 Naval War College International Law Conference, Yoram Dinstein

International Law Studies

No abstract provided.


The Role Of Counterterrorism Law In Shaping Ad Bellum Norms For Cyber Warfare, William Banks Dec 2013

The Role Of Counterterrorism Law In Shaping Ad Bellum Norms For Cyber Warfare, William Banks

International Law Studies

No abstract provided.


Networks In Non-International Armed Conflicts: Crossing Borders And Defining "Organized Armed Groups", Peter Margulies Dec 2013

Networks In Non-International Armed Conflicts: Crossing Borders And Defining "Organized Armed Groups", Peter Margulies

International Law Studies

No abstract provided.


Anticipatory Self-Defense In The Cyber Context, Terry D. Gill, Paul A.L. Ducheine Dec 2013

Anticipatory Self-Defense In The Cyber Context, Terry D. Gill, Paul A.L. Ducheine

International Law Studies

No abstract provided.


International Law And Cyber Threats From Non-State Actors, Laurie R. Blank Dec 2013

International Law And Cyber Threats From Non-State Actors, Laurie R. Blank

International Law Studies

No abstract provided.


Lawful Targets In Cyber Operations: Does The Principle Of Distinction Apply?, Noam Lubell Dec 2013

Lawful Targets In Cyber Operations: Does The Principle Of Distinction Apply?, Noam Lubell

International Law Studies

No abstract provided.


Cyber Warriors In The Jus In Bello, Vijay M. Padmanabhan Dec 2013

Cyber Warriors In The Jus In Bello, Vijay M. Padmanabhan

International Law Studies

No abstract provided.