AustLII Home | Databases | WorldLII | Search | Feedback

Melbourne Journal of International Law

Melbourne Journal of International Law (MJIL)
You are here:  AustLII >> Databases >> Melbourne Journal of International Law >> 2019 >> [2019] MelbJlIntLaw 14

Database Search | Name Search | Recent Articles | Noteup | LawCite | Author Info | Download | Help

Chircop, Luke --- "Territorial Sovereignty in Cyberspace after Tallinn Manual 2.0" [2019] MelbJlIntLaw 14; (2019) 20(2) Melbourne Journal of International Law 349


TERRITORIAL SOVEREIGNTY IN CYBERSPACE AFTER TALLINN MANUAL 2.0

Territorial Sovereignty in Cyberspace After Tallinn Manual 2.0

Luke Chircop[1]*

Despite its status as a foundational principle of international law, territorial sovereignty has become contested and controversial in its application to cyberspace. Opportunistic states have exploited this circumstance by carrying out harmful cyber operations on the legal margins, with relative impunity, at the expense of peace and stability in the international system. The Tallinn Manual 2.0 sought to provide some needed clarity to this important legal doctrine. The manual’s International Group of Experts unanimously agreed that territorial sovereignty could be violated by cyber operations that caused the permanent loss of functionality to cyber infrastructure or that resulted in physical damage or injury. However, no agreement was reached as to when, if ever, cyber operations below this gravity threshold violated international law. In this context, this article provides a detailed account of when low-intensity or ‘below the threshold’ cyber operations violate territorial sovereignty. Specifically, it argues that state-sponsored cyber operations that interfere with a target state’s data, cyber systems or cyber infrastructure should be viewed as a violation of territorial sovereignty provided that more than de minimis effects are caused.

Contents

I Introduction

The status of territorial sovereignty in cyberspace has challenged states and scholars for more than two decades.[1] In that time, substantial progress has been made towards achieving consensus and granularity in the application of international law to cyber activities. This progress has primarily been facilitated at the state level by the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (‘GGE on Cyber Security’),[2] and at the academic level by the Tallinn Manual project of the North Atlantic Treaty Organization (‘NATO’) Cooperative Cyber Defence Centre of Excellence.[3] Yet, despite this progress there are some legal areas that, owing to the ‘mystifying characteristics’ of cyberspace, remain unsettled.[4] Foremost among these is uncertainty as to when low-intensity cyber operations violate territorial sovereignty.[5] This uncertainty is undesirable because it inhibits the ability of international law to ambitiously shape the behaviour and standards of states in the international system.[6] Indeed, ambiguity as to the operation of territorial sovereignty in cyberspace has been exploited by opportunistic states, who have been able to carry out harmful cyber operations on the legal margins with relative impunity.[7] As such, if international law is a common global language, it has not yet found its voice in relation to this important area.

This article provides a detailed account of territorial sovereignty and the application of this principle to cyber operations. Specifically, it contends that all cyber operations that interfere with a target state’s cyberspace should violate (at least) territorial sovereignty, provided that more than de minimis effects are caused. This will usually include cyber operations that involve the insertion, alteration and deletion of data in targeted cyber systems. Part II discusses key controversies concerning territorial sovereignty in cyberspace, as well as the treatment of this doctrine in Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (‘Tallinn Manual 2.0’).[8] Part III provides an analytical framework for assessing cyber operations along an interference spectrum and sets out competing theoretical approaches to territorial sovereignty in cyberspace. Finally, Part IV and Part V endorse a strict inviolability approach to territorial sovereignty and assess this approach by reference to relevant state practice and opinio juris. For all relevant purposes, this article confines its analysis to cyber operations that can be attributed to one or more responsible states with a high degree of certainty under the law of state responsibility.[9]

II The Development of Territorial Sovereignty in Cyberspace

A The Principle of Territorial Sovereignty

State sovereignty is the ‘basic constitutional doctrine of the law of nations’.[10] It is a contested and constantly evolving concept,[11] but fundamentally refers to the legal competency of states, manifesting as corresponding rights and duties. In relation to its content, sovereignty has both an internal and external dimension. Internal sovereignty is the supreme authority of a state to regulate the people and things within its territory, while external sovereignty is the power of a state to act in relation to other equally sovereign states on the international plane.[12]

Sovereignty has a clear textual foundation. Article 2(1) of the Charter of the United Nations provides that the United Nations ‘is based on the principle of the sovereign equality of all its Members’.[13] Moreover, the Friendly Relations Declaration, adopted by the United Nations General Assembly in 1970, confirms that ‘[e]ach State enjoys the rights inherent in full sovereignty’.[14] International courts and tribunals have also affirmed the eminent status of sovereignty among international law doctrines. In Corfu Channel (United Kingdom v Albania) (‘Corfu Channel’), the International Court of Justice (‘ICJ’) stated that ‘[b]etween independent States, respect for territorial sovereignty is an essential foundation’.[15] Similarly, in Military and Paramilitary Activities in and against Nicaragua (Nicaragua v United States of America) (‘Military and Paramilitary Activities’), the ICJ recognised and applied ‘the principle of respect for State sovereignty’, which ‘extends to the internal waters and territorial sea of every State and to the air space above its territory’.[16]

Territorial sovereignty refers to the sovereign rights and duties exercised by states in relation to their territory.[17] It is a fundamental aspect of the broader notion of sovereignty because the legal competency of states depends on and assumes a ‘stable, physically identified (and normally legally delimited) base’.[18] Indeed, ‘[a] state without a territory is not possible’.[19] In Island of Palmas (Netherlands v United States of America), Max Huber explained that territorial sovereignty is independence, which ‘in regard to a portion of the globe is the right to exercise therein, to the exclusion of any other State, the functions of a State’.[20] The exclusivity of territorial sovereignty was also emphasised by the Permanent Court of International Justice in the SS ‘Lotus’ (France v Turkey) (‘Lotus’) case: ‘the first and foremost restriction imposed by international law upon a State is that ... it may not exercise its power in any form in the territory of another State’.[21] Territorial sovereignty implies the rights of a state: to exercise and enforce its jurisdiction; to ‘control the access to and egress from its territory’; and (most importantly for present purposes) to have its territory protected against interference by other states.[22]

For completeness, territorial sovereignty should be distinguished from those aspects of sovereignty which are not territorial. For instance, while states have a sovereign right to exercise certain inherently governmental functions, such as the conduct of diplomatic activities, those functions do not necessarily have a connection to territory.[23] Territorial sovereignty should also be distinguished from territorial integrity. While these concepts are related, in traditional legal sources the protection of a state’s territorial integrity is more closely aligned with the prohibition on the use of force.[24] Accordingly, proscriptions against violating territorial integrity contemplate a particularly high threshold of harm that is not appropriate in the context of territorial sovereignty.

B Tallinn Manual 2.0

The Tallinn Manual 2.0 is an operational manual on the international law governing cyber warfare and peacetime cyber operations. It was prepared by an International Group of Experts (‘Experts’) constituted by lawyers, academics and technical specialists.[25] While its drafting process included consultations with states and international organisations, the manual’s 154 rules were adopted by the Experts, on a consensus basis, acting in their personal capacity.[26] The Tallinn Manual 2.0 claims to reflect customary international law as it existed in June 2016 — an ‘objective restatement of the lex lata’ — rather than being a best practices guide or an attempt at progressive development of the law.[27] Its authority should not be overstated though. While it has become an influential text on international law and cyberspace,[28] the Tallinn Manual 2.0 is not a binding instrument; it is an expression of the opinions of its Experts as to the state of the law at a point in time.[29]

Rule 4 of the Tallinn Manual 2.0 provides that a state ‘must not conduct cyber operations that violate the sovereignty of another State’.[30] In the commentary, the Experts expanded on the kinds of operations that they considered would fall foul of this rule. They agreed that cyber operations conducted from within a target state’s territory against that state (or entities or persons located within that state), violated its territorial sovereignty.[31] Most also agreed that cyber operations conducted remotely (that is, from outside the target state’s territory) violated territorial sovereignty where they resulted in ‘physical damage or injury’,[32] or caused cyber infrastructure to lose functionality ‘necessitating repair or replacement’.[33] No consensus was reached as to when, if ever, remote cyber operations below this gravity threshold breached international law.[34] Finally, the Experts agreed that cyber operations violated sovereignty where they usurped the ‘inherently governmental functions of another State’.[35] The phrase ‘inherently governmental functions’ was not defined with precision, but was said to overlap with the concept of domaine réservé,[36] and could otherwise be informed by the notion of acta jure imperii used in the context of state immunity.[37]

This article seeks to provide greater granularity than is contained in the Tallinn Manual 2.0 to the principle of territorial sovereignty in cyberspace. In particular, it presents a detailed account of when, and why, low-intensity cyber operations — those which do not result in physical damage or injury, or cause cyber infrastructure to lose functionality — might violate a target state’s territorial sovereignty. The inability of the Experts to find agreement on this point confirms that it is an important and unresolved ‘grey zone’ in the international law of cyberspace.[38]

C Controversies on Sovereignty in Cyberspace

There have been at least two central controversies concerning the nature and operation of sovereignty in cyberspace. The first controversy concerned whether state sovereignty applies to cyber activities at all. In 1996, John Barlow contended, in his Declaration of the Independence of Cyberspace, that because of its unique and ubiquitous nature, cyberspace could not be subject to sovereignty, or indeed other legal concepts, in any traditional sense.[39] In the subsequent two decades, however, this view has been widely rejected by states and scholars alike. In two consecutive reports, the United Nations Group of Governmental Experts on Cyber Security (‘UN GGE’) confirmed that sovereignty and the international norms that flow from sovereignty apply to cyber activities.[40] Similarly, the Tallinn Manual 2.0’s Experts unanimously agreed that existing international law applies to cyber operations.[41] On this basis, Professor Sean Watts has observed that the ‘argument that cyberspace constitutes a law-free zone is no longer taken seriously’.[42]

A second controversy, which has arisen more recently, concerns whether territorial sovereignty constitutes a primary rule of international law capable of independent breach, or whether it is instead a general Westphalian principle from which primary rules of international law emanate. The ‘sovereignty as principle’ position has been propagated by Gary Corn, former Staff Judge Advocate to United States Cyber Command, and Robert Taylor, former Principal Deputy General Counsel to the United States Department of Defense.[43] Corn and Taylor believe that sovereignty ‘serves as a principle of international law that guides state interactions, but is not itself a binding rule that dictates results under international law’.[44] In their view, until a more cogent body of state practice and opinio juris develops, cyber operations can only violate international law by amounting to a prohibited intervention or a use of force.[45] This has been echoed by former United Kingdom Attorney-General Jeremy Wright, who also rejected ‘the existence of a cyber specific rule of a “violation of territorial sovereignty” in relation to interference in the computer networks of another state without its consent’.[46] Wright’s observations are particularly salient because, when made, they reflected the official position of the UK government,[47] and therefore amounted to state practice.[48]

Before addressing the merits of the ‘sovereignty as principle’ view, there are some conceptual assumptions within this debate in need of clarification. Importantly, it is not disputed that sovereignty is a foundational principle of international law, which gives rise to various primary rules including the prohibitions on intervention and the use of force.[49] However, minds differ on whether, below the threshold of a prohibited intervention, cyber activities can violate a state’s territorial sovereignty. Territorial sovereignty can imply various different rights,[50] but here, it refers specifically to a state’s right to have its territory free from interference by other states (and the corresponding duty not to interfere with the territory of other states). Moreover, proponents of the ‘sovereignty as rule’ position do not seek to establish a ‘cyber specific’ principle of international law, as Wright assumed.[51] Instead, they consider that a state’s right to be free from territorial interference is one of the ‘international norms ... that flow from sovereignty’, and that it applies in cyberspace as it does in physical space.[52]

As to the merits, while it will no doubt remain contentious, the balance of authority currently favours the ‘sovereignty as rule’ position. The ICJ has enforced territorial sovereignty as a primary rule of international law on several occasions. In the Military and Paramilitary Activities case, the Court acknowledged that territorial sovereignty was ‘closely linked with the principles of the prohibition of the use of force and of non-intervention’, but nonetheless applied each respective rule separately.[53] Crucially, the Court found that some instances of less grave conduct (such as unauthorised aerial overflights) amounted to a standalone violation of territorial sovereignty.[54] Likewise, in Certain Activities Carried Out by Nicaragua in the Border Area (Costa Rica v Nicaragua) (‘Certain Activities’), the Court ordered Nicaragua to ‘make reparation for the damage caused by its unlawful activities’ on the basis of its finding that Nicaragua had violated Costa Rica’s territorial sovereignty.[55] The Court did not consider separate submissions on the prohibition of the use of force because the finding of a territorial sovereignty violation was considered adequate to establish the ‘unlawful character’ of the impugned activities.[56] While decisions of the ICJ are a ‘subsidiary means for the determination of rules of law’,[57] in practice they are of highly persuasive force.[58]

In addition, the Tallinn Manual 2.0’s Experts unanimously endorsed the ‘sovereignty as rule’ position by adopting Rule 4 and its accompanying commentary.[59] The Tallinn Manual 2.0 itself likely constitutes a subsidiary source of international law.[60] Moreover, Professor Michael Schmitt and Liis Vihul (the Director and Managing Editor of Tallinn Manual 2.0, respectively) have noted that opposition to the ‘sovereignty as rule’ position did not surface during the seven years of deliberations preceding the manual’s publication in 2017.[61] These deliberations included unofficial consultations with over 50 states and international organisations.[62] Schmitt and Vihul have defended the ‘sovereignty as rule’ position on the basis of an extensive body of supportive state practice and opinio juris, including state responses to unwelcome aerial and marine incursions, drone operations, counterterrorism activity and the public comments of state officials.[63] Moreover, preliminary research conducted under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence concluded that the ‘sovereignty as rule’ position was adopted ‘more often than not’ by states in their national cyber security documents.[64] Thus, this article proceeds on the assumptions that sovereignty does prima facie apply to cyberspace, and that territorial sovereignty constitutes a primary rule of international law capable of being breached.

III Defining Territorial Interference

A state-sponsored cyber operation will violate the territorial sovereignty of a target state when it interferes with that state’s territory to a requisite degree. However, the degree of interference at which a sovereignty violation occurs is disputed, as is the method by which territorial interference should be measured in cyberspace. As such, to inform the subsequent discussion of these matters from a practical perspective, below is a proposed Scale Chart which classifies cyber operations along a spectrum from the least to the most grave examples of interference by cyber means:[65]

Table 1: Scale Chart for Assessing Cyber Operations along an Interference Spectrum

Scale Number
Type
Description
1
Surveilling or exfiltrating data
These are cyber espionage operations in which data stored on or transiting through targeted cyber infrastructure is surveilled remotely. This includes cyber operations that result in the copying or exfiltration of data to a remote cyber system for storage or review.
Examples: In 2010, Chinese hackers infiltrated the servers of Google in the United States and exfiltrated data in an attempt to access the email accounts of Chinese human rights activists.[66] Further examples of Scale 1 cyber operations discussed in this article include the Office of Personnel Management hack of 2015,[67] and the Democratic National Committee hack of 2016.[68]
2
Inserting data
These are cyber operations in which data, sometimes containing false or ‘bogus’ information, is temporarily or permanently placed onto targeted cyber systems.
3
Manipulating data
These are cyber operations in which the data stored on targeted cyber systems is temporarily or permanently manipulated (but not deleted).
4
Deleting data
These are cyber operations in which the data stored on targeted cyber systems is corrupted, so that it cannot be used, or is deleted altogether.
5
Causing temporary loss of functionality
These are cyber operations that cause a temporary loss of functionality to the targeted cyber infrastructure. Common examples of this kind of operation include distributed denial-of-service (‘DDoS’) attacks and ransomware attacks.
Examples: In 2007, Estonia was targeted by a DDoS attack that prevented public access to online government, banking and news services for up to a month.[69] Similar DDoS attacks were conducted against Georgia in 2008[70] and Kyrgyzstan in 2009.[71] Further examples of Scale 5 cyber operations discussed in this article include the NotPetya and Bad Rabbit ransomware attacks of 2017.[72]
6
Causing permanent loss of functionality
These are cyber operations that cause the permanent loss of functionality of targeted cyber infrastructure in a way that necessitates the repair or replacement of physical components.
Examples: In August 2012, the Shamoon virus infected Saudi Aramco’s computers, deleting substantial quantities of its data and necessitating the repair of thousands of its hard drives.[73] A further example of a Scale 6 cyber operation discussed in this article is the Sony hack of 2014.[74]
7
Causing physical damage or injury
These are cyber operations that cause physical damage to targeted cyber infrastructure (or to other physical components which rely on the targeted infrastructure to operate) or cause physical injury to people.
Example: In 2010, the US and Israel allegedly deployed the Stuxnet virus against the Supervisory Control and Data Acquisition system of the Natanz uranium enrichment plant in Iran. The malware was reported to have changed the rotor speeds of gas centrifuges at the facility, causing vibrations and distortions that ultimately damaged the centrifuges.[75]

Of course, this Scale Chart is not exhaustive of the countless types of cyber operations states are capable of conducting. Fine technical distinctions may be drawn between cyber operations that have been grouped together for analytical convenience. Further, there may be instances where cyber operations with a low classification on the Scale Chart nonetheless constitute a violation of international law, or otherwise have serious political, social or economic consequences. This is particularly the case for cyber espionage operations (Scale 1), which may only involve a modest degree of territorial interference, but which can undermine the confidentiality of highly sensitive commercial or governmental information. Finally, certain levels of the Scale Chart are not mutually exclusive. To illustrate, a cyber operation involving the manipulation of data (Scale 2) may cause the temporary loss of functionality to targeted cyber infrastructure (Scale 5). As such, for the avoidance of doubt, cyber operations involving the insertion, manipulation and deletion of data should only be classified from Scale 2 to 4 in so far as they do not cause the more serious effects contemplated at Scale 5 to 7. These observations notwithstanding, the Scale Chart is a useful tool for evaluating competing formulations of the degree of interference required for a cyber operation to violate territorial sovereignty.

There are four prevailing approaches to territorial sovereignty in cyberspace that will be canvassed with reference to the Scale Chart. The first approach, referred to here as the ‘material damage approach’, provides that only cyber operations that cause a permanent loss of functionality to cyber infrastructure (Scale 6), or that result in physical damage or injury (Scale 7), are to be considered violations of territorial sovereignty. The material damage approach has been endorsed by various scholars, who have described this interference threshold using different but synonymous terms: ‘physical damage or hardware malfunction’,[76] ‘material damage’,[77] and ‘actual physical damage’.[78] Broadly, these scholars observe that there is no clear consensus on whether, and if so when, cyber operations below this threshold will violate territorial sovereignty.[79] For proponents of the material damage approach, only state practice and opinio juris over the course of time are capable of lowering the bar for territorial sovereignty violations in cyberspace.[80] While this approach is not without merit, it represents a particularly conservative view of the application of international law to cyberspace. At best, it fails to account for the substantial harm that can be caused to states by cyber operations below the Scale 6 threshold.[81] At worst, it is doctrinally inconsistent with the operation of territorial sovereignty in relation to land, sea and airspace interference.[82]

Secondly, a number of different ‘intermediate approaches’ have been formulated pursuant to which moderately severe cyber operations are capable of violating territorial sovereignty. Some of these were identified by the Tallinn Manual 2.0’s Experts, including: cyber operations ‘causing cyber infrastructure or programs to operate differently’;[83] ‘emplacing malware into a cyber system’ (Scale 2);[84] ‘altering or deleting data stored on cyber infrastructure without causing physical or functional consequences’ (Scales 3 and 4);[85] ‘installing backdoors’ (Scale 2);[86] and ‘causing a temporary, but significant, loss of functionality’ (Scale 5).[87] The Experts who endorsed each of these formulations did so on the basis that they were considered to be ‘consistent with the object and purpose of the principle of sovereignty that affords States the full control over access to and activities on their territory’.[88] However, none of these intermediate formulations have been subsequently expanded upon or affirmed by states or scholars. Further, it is not immediately apparent that these particular standards can be justified on a principled basis. For instance, it is unclear why a state’s territory would be infringed by the emplacement of malware on its cyber infrastructure, but not the emplacement of other kinds of data on the same infrastructure. Likewise, if the touchstone of wrongfulness is causing targeted cyber infrastructure to operate differently, operations which have dormant or covert effects (even if substantial over a period of time) would be unjustifiably excluded.[89] Perhaps the most sensible intermediate approach is that which captures cyber operations causing temporary but significant losses of functionality. But again, this lacks a clear doctrinal justification. General or sweeping reliance on the ‘the object and purpose of the principle of sovereignty’[90] in support of these formulations is unhelpful. The term ‘sovereignty’, without further specification, ‘is susceptible to multiple meanings and justifications’, and ‘is rather descriptive in character, referring in a “catch-all” sense to the collection of rights held by a state’.[91]

The third approach, referred to here as the ‘strict inviolability approach’, provides that all cyber operations that interfere with a target state’s cyber infrastructure violate territorial sovereignty, as long as they cause more than de minimis effects.[92] This approach involves a two-stage inquiry. At the first stage, a territorial sovereignty violation is premised on evidence of a prima facie interference. While this is a relatively low threshold, it is not exceeded by mere cyber espionage operations (Scale 1), which do not typically result in any change to the targeted data or cyber infrastructure. This is consistent with the weight of authority, which currently favours the view that cyber espionage is not per se prohibited under international law.[93] All other cyber operations contemplated on the Scale Chart (Scale 2 to 7) exceed the prima facie interference threshold, as they each have a definite and measurable impact on data or infrastructure. For example, in the case of a Scale 2 cyber operation, evidence of interference is satisfied by the presence of data on a cyber system that previously did not exist. At the second stage of inquiry, a territorial sovereignty violation requires the causing of more than de minimis effects. The principle of de minimis non curat lex provides that international law does not concern itself with trifles.[94] On this basis, certain harms are considered to be so minor, variable or intangible, that they ‘must be accepted as the price of living in society’.[95] While ‘harm’ is a difficult concept to define in the cyber context, it is not limited to the causing of physical consequences. Instead, under the strict inviolability approach, ‘harm’ includes the degradation of a target state’s data or cyber infrastructure without its consent.[96] Thus, without being exhaustive, cyber operations may have more than de minimis effects when they: create a cyber vulnerability which can later be exploited; limit the accessibility of data; cause data, a network or cyber infrastructure to lose functionality or function in a manner that was not intended; or cause physical damage or injury. In contrast, cyber operations that have no material or practical adverse consequence on the targeted cyber system or infrastructure (even if they involve the insertion, manipulation or deletion of data) likely would not exceed the de minimis effects threshold. As states exercise sovereignty over all of their territory equally, it is inconsequential whether the cyber infrastructure targeted in a given case is personal, private or governmental.[97] This article endorses the strict inviolability approach and, in Parts IV and V, sets out the normative and legal basis on which it may emerge as a norm of customary international law.

The fourth (and final) approach, worth briefly acknowledging, provides that all intrusions into another state’s cyber infrastructure, including cyber espionage operations, amount to a violation of territorial sovereignty.[98] This position has been defended on the basis that ‘States exert sovereignty over information in cyberspace which belongs to entities and individuals over which they exercise jurisdiction’.[99] Interestingly though, while it has been described by one of its proponents as a ‘majority view’,[100] it was not identified as such, or expanded upon in any meaningful way, in the Tallinn Manual 2.0. Further, it is contrary to the balance of state practice and opinio juris arising from cyber operations that have involved the exfiltration of data.[101] For instance, between 2010 and 2013, a Chinese government-sponsored hacker group called APT1 (Unit 61398) conducted numerous cyber espionage operations against US corporations.[102] Rather than treating these as violations of international law, the US responded by having recourse to its domestic criminal jurisdiction, indicting five Chinese hackers thought to be responsible for the operations.[103] Similarly, in 2015, the US refrained from characterising the Office of Personnel Management hack, which resulted in the theft of the personal information of more than 20 million government employees, as a violation of international law.[104]

IV Rationale for the Strict Inviolability Approach

A The Importance and Ubiquity of Data

The principal rationale for adopting the strict inviolability approach is that it appropriately recognises the importance and ubiquity of data in modern society. Data is necessary for the effective functioning of critical systems, including those that support government services, national security, defence, financial markets, commercial transactions, energy grids, water supply, public health and transport.[105] Interference with data has the capacity to degrade and impair each of these systems. Data is also a valuable commodity at an individual level. People reasonably expect a legal (intellectual property) right to the integrity of their unique self-generated data, and expect privacy to attach to the data that captures their sensitive personal information.[106] These interests and expectations are clearly undermined when data is destroyed, degraded or deprived of being the genuine source of information it otherwise would have been.[107] On this basis, Professor Tim McCormack has observed that in a digitally connected world ‘data is more than a complex succession of 1s and 0s’.[108] The strict inviolability approach acknowledges the importance of data in modern society by positing that states exercise territorial sovereignty over the data emanating from the cyber infrastructure on their territory, and that consequently, a state’s data is protected from external interference under international law.

The application of territorial sovereignty to cyberspace has most commonly been explained by reference to the domain’s physical features. That is, cyberspace needs a physical architecture to exist, which includes servers, computers, cables and other components.[109] This physical architecture is located on the sovereign territory of states, and is owned by governments, corporations and individuals. As such, by extension of the control states exercise over their territory, they also exercise control (in the form of territorial sovereignty) over cyber infrastructure located on their territory.[110] There is thus wide agreement that state-sponsored cyber operations that cause physical damage to another state’s cyber infrastructure amount to, at least, a violation of the latter state’s territorial sovereignty.[111] But physicality is clearly not the only basis on which sovereignty applies to cyberspace.[112] For instance, states exercise territorial sovereignty over the individuals engaged in cyber activities on their territory,[113] and can accordingly prohibit cybercrime under their domestic laws.[114] The critical next step is to recognise that states also exercise territorial sovereignty over data emanating from their cyber infrastructure. The basis of a state’s claim to territorial sovereignty over data remains physical, in that it is limited to data that emanates from infrastructure located on its territory. As a state’s sovereign rights and duties in respect of data are independent and complete, territorial sovereignty can be violated by interference with data alone, even when the interference does not have ancillary effects on the underlying physical infrastructure.[115] That states exercise territorial sovereignty over data was seemingly accepted, but not explained, in the Tallinn Manual 2.0. The manual’s Experts agreed that cyberspace has a ‘logical layer’, consisting of ‘applications, data, and protocols that allow the exchange of data’ across physical infrastructure, and agreed that sovereignty applies to this logical layer.[116] However, no view was reached as to the circumstances in which data interference would constitute a sovereignty violation.

One limitation of the strict inviolability approach, worth noting here, is that a state’s data will not always emanate from cyber infrastructure located on its territory. Global technology companies like Amazon, Microsoft and Google store customer data on cloud systems, which make use of ‘server farms’ in many different countries around the world.[117] Moreover, since June 2017, Estonia has stored some of its critical governmental data in a ‘data embassy’ hosted by servers in Luxembourg.[118] This practice could result in competing claims to sovereignty in a case where, for instance, the data of state A was interfered with, but that data emanated from physical infrastructure located on the territory of state B. In such a case, it would be difficult for state A to sustain a claim to territorial sovereignty over the affected data. But state A may nonetheless be able to assert a violation of its sovereignty if the interference usurped one of its inherently governmental functions, or amounted to a prohibited intervention in its internal affairs. Separately, state B may be able to assert a violation of its territorial sovereignty on the basis that the interference affected data emanating from cyber infrastructure located on its territory. These issues will require further examination as companies and states continue to make use of cloud-based systems for the storage of important personal and governmental information.

B Providing Clarity in the International Law of Cyberspace

A subsidiary rationale for adopting the strict inviolability approach is that it provides granularity to the operation of territorial sovereignty in the case of low-intensity cyber operations. Low-intensity cyber operations ‘present a far more likely picture of future State cyber interactions’ than violent or destructive ones.[119] States engage in this kind of cyber activity because it is an inexpensive and potentially anonymous way of degrading adversaries during conflict or peacetime.[120] The application of international law to cyberspace remains particularly unsettled in respect of low-intensity cyber operations,[121] which has allowed opportunistic states to engage in harmful cyber conduct while making it difficult for target states to lawfully respond.[122] The strict inviolability approach has the potential to ameliorate this circumstance by providing a clear (and protective) framework for the application of territorial sovereignty to cyber operations at the lower end of the gravity spectrum.

This rationale is not immune from normative criticism, though. Some states might resist the relatively low gravity threshold of this formulation because it represents an expansion of the scope for potential state responsibility in cyberspace.[123] It might also be contended that a strict inviolability approach could have a destabilising effect on the international system by making countermeasures more readily available to target states, including as a means of response to low-intensity cyber operations.[124] These concerns are legitimate, but they are not insurmountable. Overall, greater clarity in the international law of cyberspace should promote, rather than undermine, peace and stability in the relations between states.[125] That is because states would be deterred from carrying out hostile cyber operations if they could face equivalent (and lawful) countermeasures in response. Further, the risk of conflict escalation as a result of over-reliance on the countermeasures regime is mitigated by the evidential certainty and strict procedural requirements that must be satisfied before countermeasures can be properly invoked.[126] In this way, assuming international law sets a behavioural benchmark for states in the international system, a stricter view of territorial sovereignty in cyberspace should ultimately have a prophylactic effect on the harmful conduct of aggressor states.[127]

V Legal Status of the Strict Inviolability Approach

The strict inviolability approach to territorial sovereignty in cyberspace would constitute customary international law if it was consistent with generally uniform state practice and opinio juris.[128] However, evidence of the existence of customary law is famously difficult to distil in cyberspace, in part, because of the significant challenges associated with attribution in this domain.[129] The attribution of cyber conduct to a responsible state is a necessary prerequisite to concluding that international law has been violated under the state responsibility framework,[130] and when attribution is not possible, target states have generally refrained from publicly commenting on whether a particular cyber operation might have otherwise violated territorial sovereignty.[131] Even when attribution can be made out with a high degree of certainty, target states have often refused to comment on, or respond to, hostile cyber operations for diplomatic or strategic reasons.[132] Indeed, it has been observed that many states are ‘inclined to take a “wait and see” approach toward the manner in which cyberspace ought to be regulated, maintaining, in effect, a policy of silence and ambiguity’.[133] Against this background, the strict inviolability approach cannot yet sensibly be described as a crystallised rule of customary international law.

In the remainder of this article, it is shown that the strongest argument in favour of the strict inviolability approach is that an equivalent standard of territorial sovereignty has long been accepted by states in respect of physical space, and that the content of the principle should not differ across the physical and cyber domains.[134] On the other hand, states have been acting in cyberspace and officially commenting on cyber conduct for more than a decade,[135] and the resulting body of practice cannot be ignored. As will be seen, state practice and opinio juris in respect of cyberspace is broadly consistent with the strict inviolability approach, but the outer limits of territorial sovereignty in this domain remain untested or controversial in a few important respects.[136] Therefore, this article contends that the strict inviolability approach provides a principled account of an unresolved legal area, and constitutes lex ferenda, or an emerging view of customary international law.

A Territorial Sovereignty in Physical Space

In the context of physical space, a state’s right to freedom from interference with territorial sovereignty is strictly protected. The physical territory of a state consists of its land, its territorial sea (if any) and its airspace.[137] Accordingly, unwelcome state-sponsored incursions into each of these spaces has consistently been treated as a violation of territorial sovereignty, even where such incursions are of a low gravity.

First, in relation to airspace, Estonia has protested several incursions by Russian planes since 2016.[138] While at least one of these incursions lasted less than 60 seconds, Estonia’s Ministry of Foreign Affairs has regularly characterised them as airspace violations, and has issued complaint notes to Russian ambassadors in response.[139] As a further example, in 1960, the Soviet Union downed an unarmed American U-2 reconnaissance aircraft because it was flying through Soviet national airspace.[140] The US did not protest the shoot down, and the absence of protest has been taken as an acknowledgement that the U-2’s entry into Soviet airspace without consent was a violation of international law.[141] The ICJ considered the lawfulness of airspace interference in Military and Paramilitary Activities. That case concerned, among other things, various incursions into Nicaraguan airspace attributed to the US, including high-altitude reconnaissance overflights, and low-altitude overflights which emitted ‘sonic booms’.[142] In respect of both kinds of overflights, the Court held that they directly infringed the principle of respect for territorial sovereignty.[143]

Secondly, in relation to territorial sea, there are similarly prominent examples of unlawful interference worth noting. For instance, the US has conducted several ‘Freedom of Navigation’ operations in the South China Sea since 2015, which typically involve the sailing of warships through parts of the sea claimed by China to be within its maritime boundary.[144] China’s Defence Ministry has responded by sending its own naval ships to ward off foreign vessels, and has described the operations as ‘seriously threatening [to] China’s sovereignty and security’.[145] Similarly, in Corfu Channel, the ICJ considered various potential sovereignty violations arising from an incident in which UK warships struck mines in Albanian territorial waters. The Court found that the presence of UK vessels in Albanian waters did not violate international law because of an ‘innocent passage’ exception to Albania’s prima facie claim to territorial sovereignty.[146] However, the subsequent minesweeping operations carried out by the UK in Albanian waters fell outside of this exception, and so constituted a violation of international law.[147]

Thirdly, in relation to land, instances of territorial interference are often less innocuous. For instance, Russia’s interference with the Crimean Peninsula in 2014 was characterised by 42 states in a joint statement to the Human Rights Council as an ‘ongoing violation of Ukraine’s sovereignty and territorial integrity’.[148] Likewise, in Certain Activities, the ICJ held that Nicaragua’s conduct on Costa Rican territory, which included the excavation of three caños and ‘establishing a military presence in parts of that territory’, violated Costa Rica’s territorial sovereignty.[149]

Cumulatively, this state practice and opinio juris provide strong support for the view that, at least in respect of physical space, territorial interference is strictly prohibited. A strict view of territorial sovereignty in physical space is important for the development of an equivalent standard in cyberspace, as the rights and duties that flow from sovereignty should not materially change across domains.[150] International courts commonly have recourse to an analogical methodology when determining rules of customary international law, whereby ‘the rationale of an existing rule is extended to a situation that does not fall within the wording of that rule’ because of a common link or cause between the two situations.[151] This allows the avoidance of pronouncements of non liquet in circumstances where state practice is non-existent or disparate owing to the novelty of a legal question.[152] To illustrate, in the Continental Shelf (Libyan Arab Jamahiriya v Malta) (‘Libya–Malta Continental Shelf’) case, the ICJ found that the ‘distance criterion’, which applied when determining exclusive economic zones, also applied when determining the continental shelf of adjacent states.[153] The Court reasoned that there ‘cannot be an exclusive economic zone without a corresponding continental shelf’ and therefore ‘for juridical and practical reasons, the distance criterion must now apply to the continental shelf as well as to the exclusive economic zone’.[154]

A clear parallel can be drawn to territorial sovereignty in cyberspace. The relevant existing rule is that a state’s territorial sovereignty includes a strict right to have its land, sea and airspace free from external physical interference.[155] A common link can be drawn between physical space and cyberspace because cyberspace is a domain that cannot exist without corresponding cyber infrastructure located on a state’s territory and subject to its jurisdiction. Thus, the ‘juridical and practical’ considerations that seized the Court in the Libya–Malta Continental Shelf case favour applying a strict right of freedom from territorial interference in cyberspace as well as in physical space. Indeed, it would be curious if the rule of territorial sovereignty provided a state’s sovereign cyber infrastructure with less protection from intrusion than a state’s sovereign physical territory.[156]

For completeness, it should be acknowledged that cyberspace is different from physical space in some respects. It is not always possible to demarcate where one state’s cyberspace ends and another state’s cyberspace begins. This ubiquitous quality makes cyberspace immune from exclusive appropriation, in that it cannot be subject to the sovereignty of any single state in the way physical territory can be.[157] Nonetheless, all serious attempts to designate cyberspace as res communis, a global commons, have been abandoned.[158] Moreover, state-based efforts to apply international law to cyberspace have invariably proceeded on the common assumption that standards of appropriate state behaviour in the cyber domain are to be derived from existing international norms and commitments.[159] And if territorial sovereignty is not to be conceptualised under international law in a fundamentally different way for cyberspace than for physical space, doctrinal coherence would seem to require that territorial sovereignty be capable of violation by the cyber equivalent of a 60-second airspace incursion.

The next section of this article considers whether this analogical reasoning is consistent with the state practice and opinio juris that have actually manifested in respect of cyberspace.

B Territorial Sovereignty in Cyberspace

Evidence of state practice and opinio juris in respect of territorial sovereignty in cyberspace has arisen in two ways: first, states have publicly commented on and responded to several significant, recent cyber incidents, sometimes by reference to international law principles; and secondly, states have issued policy statements and strategy documents that express views on their rights and responsibilities in cyberspace. Regarding the former, while non-exhaustive,[160] the cyber incidents analysed here are notable because they were each attributed to a responsible state by one or more other states with a high degree of certainty, and prompted various publicly recorded verbal and physical responses from the international community.

In 2014, North Korea hacked Sony Pictures Entertainment, causing the release of commercially sensitive information, the destruction of data and the loss of functionality to thousands of Sony computers located on US territory.[161] This cyber operation coincided with the impending release of The Interview, a satirical film about the assassination of Kim Jong-un.[162] It also clearly amounted to a violation of territorial sovereignty under the strict inviolability approach. That is, it involved a prima facie interference, being the deletion of data (Scale 4) and the loss of functionality to Sony computers (Scales 5 and 6), and it exceeded the de minimis effects threshold by limiting accessibility to the targeted cyber systems. The US pledged a ‘proportional’ response, imposing various sanctions on North Korea, and allegedly also causing a widespread internet outage in North Korean territory.[163] The Sony hack was never officially characterised by the US as a breach of its territorial sovereignty (or any other rule of international law, for that matter),[164] but the severity of the US response suggests that it was treated as such. This is not surprising. Cyber operations that cause targeted cyber infrastructure to lose functionality are of a high gravity, and there is general agreement that these operations amount to a violation of territorial sovereignty.[165]

In 2016, Russia hacked into the Democratic National Committee’s (‘DNC’) servers during the US presidential election and subsequently published private emails retrieved from those servers.[166] In this instance, the US characterised the cyber operation as a ‘violation of established international norms of behavior’, imposed sanctions against certain Russian individuals and entities, and promised to take a ‘variety of [further] actions [against Russia] ... some of which will not be publicized’.[167] The DNC hack offers an interesting case-study because it provoked a particularly strong US response, despite causing only minor effects in the targeted cyber infrastructure. Indeed, under the strict inviolability approach, the remote surveillance or collection of sensitive data (Scale 1) does not violate territorial sovereignty, as it does not exceed the prima facie interference threshold.[168] It is more likely that the means employed in carrying out the surveillance operation or the overall impact of this hack in the context of the presidential election implicated a rule of international law other than territorial sovereignty, such as the prohibition of non-intervention.[169] It is certainly doubtful that the US would have responded in the same way to the DNC hack if it were conducted against a private actor or outside of the election campaign. As such, despite its high profile, relatively little can be discerned from this cyber operation for present purposes.

In June 2017, Russia carried out the NotPetya ransomware attack against cyber infrastructure primarily in the Ukraine associated with the financial, energy and government sectors.[170] The ransomware encrypted and prevented access to affected computers, and requested a cryptocurrency payment in exchange for a decryption key.[171] As with all state-sponsored ransomware attacks, NotPetya constituted a violation of territorial sovereignty under the strict inviolability approach. Evidence of a prima facie interference was satisfied by the insertion of malware onto Ukrainian cyber systems (Scale 2) and also by subsequently causing the temporary loss of functionality to those systems (Scale 5). Moreover, the de minimis effects threshold was exceeded because access to targeted cyber systems was restricted until decryption of the ransomware or some other kind of system restoration was possible. The UK was not directly targeted by the NotPetya attack, but it nonetheless denounced Russia’s conduct as demonstrating ‘disregard for Ukrainian sovereignty’.[172] Similarly, the US described NotPetya as ‘reckless’ behaviour that would be met with ‘international consequences’.[173] These verbal responses were notable because they explicitly invoked state sovereignty and contemplated that a proportionate retorsion or countermeasure might be taken. On the other hand, the language used was sufficiently vague as to leave unclear which aspects of Ukraine’s sovereignty were taken to have been disregarded, and whether that disregard violated a specific rule of international law.[174]

Finally, in October 2017, Russia conducted another ransomware attack against Ukraine, this time targeting an airport and underground railway in Kiev.[175] This iteration of ransomware, named Bad Rabbit,[176] also prompted a strong international response. The UK stated that the cyber operation (among others also attributed to Russia at the same time) was a ‘flagrant violation of international law’.[177] Australia observed that Bad Rabbit formed part of a ‘pattern of malicious cyber activity by Russia’ which showed disregard for international law and the norms of responsible state behaviour that apply in cyberspace.[178] These comments left no doubt that, in the view of the commenting states, a violation of international law had occurred. Again though, the particular rule of international law that had allegedly been violated was not identified with precision. This is important because Bad Rabbit targeted, in part, critical national infrastructure, which may have led to its classification as a higher order violation of international law.

In sum, recent practice demonstrates a growing willingness of states to characterise a reasonably wide range of cyber operations as violations of international law, and to respond commensurately with either verbal or physical acts. However, the examples above do not amount to widespread, representative or consistent evidence that the strict inviolability approach has crystallised into a rule of customary international law.[179] While the state responses in each case were decisive, they were not explicitly justified by reference to specific rules of international law, or a particular account of territorial sovereignty. As such, the inferences that might be drawn about the opinio juris of each state are open to doubt. Further, the stark absence of publicly reported state practice in respect of low and moderate intensity cyber operations (Scale 2 to 4) means that the full scope of the strict inviolability approach remains untested.

Additional evidence of state practice and opinio juris can be found in the policy statements and national cyber security documents of states.[180] It is now ‘generally accepted’ that, along with physical conduct, verbal acts can be a manifestation of state will.[181] Moreover, they can be particularly instructive in the context of cyberspace because they allow states to express views on international law unconstrained by the particular circumstances and diplomatic sensitivities that attend a given cyber incident. Perhaps unsurprisingly then, states have increasingly had recourse to their policy statements and strategy documents to communicate their approach to, and the possible content of, territorial sovereignty in cyberspace.

In February 2018, France released its Strategic Review of Cyber Defence, which emphasised the need to ‘fully exercise’ digital sovereignty.[182] Digital sovereignty was defined as the ability ‘to retain in the digital space the autonomous ability of appreciation, decision and action’.[183] This sentiment was echoed in the Paris Call for Trust and Security in Cyberspace, in which France committed, inter alia, to ‘[p]revent activity that intentionally and substantially damages the general availability or integrity of the public core of the Internet’.[184] In a joint statement in 2016, Russia and China advocated respect for, and opposed infringements on, state sovereignty in ‘information space’.[185] China subsequently expanded on this position in its International Strategy of Cooperation on Cyberspace, which asserted that the principle of sovereignty entitled states to ‘protect their ICT [Information and Communications Technology] systems and resources from threat, disruption, attack and destruction’.[186] Finally, in an October 2018 joint statement on information and telecommunications, Canada, Japan, New Zealand and several other countries emphasised that ‘cyber threats should not be used to ... hinder the free flow of information’.[187]

At their highest, these statements can be seen as a reflection of what some states consider to be the minimum rights that flow from their sovereignty (if not territorial sovereignty) over cyberspace: that is, an autonomous, accessible and available cyberspace, free from interferences that undermine the integrity of the domain or that cause destruction. These are some of the same rights that are protected under the strict inviolability approach. Again though, this state practice and opinio juris cannot be seen as conclusive evidence that the strict inviolability approach has crystallised into accepted customary law. In particular, these policy statements and strategy documents contain imprecise language, falling short of ‘recognition that a rule of law or legal obligation is involved’.[188] The density of this kind of state practice is also not sufficiently extensive or uniform.[189] A considerable number of states have refrained from publicly commenting on the nature of territorial sovereignty in cyberspace altogether, and silence may denote agreement, disagreement or indifference depending on the circumstances.[190] There is also, of course, the directly inconsistent position taken by the UK, that territorial sovereignty is not a specific rule of international law capable of independent breach. For the UK, the sovereign rights that states enjoy in respect of cyberspace are limited to those which flow from the principle of non-intervention and the prohibition on the use of force.[191] Thus, the preliminary question of whether territorial sovereignty can be violated in cyberspace will likely require resolution before the question of when territorial sovereignty is violated can be answered.

VI Conclusion

This article has contended that the strict inviolability approach articulates an appropriate and principled standard against which the lawfulness of cyber operations should be measured; specifically, that all state-sponsored cyber operations which interfere with a target state’s cyber infrastructure violate (at least) territorial sovereignty, as long as more than de minimis effects are caused. This approach is consistent with the operation of territorial sovereignty in physical space, and a small but growing body of state conduct in respect of cyberspace. Nonetheless, it has not yet crystallised into a binding rule of customary international law. For this to occur, a greater density of uniform state practice and opinio juris is required, and the prevailing uncertainty as to whether territorial sovereignty amounts to a binding rule of international law capable of independent breach needs to be resolved.

These obstacles appear considerable. Indeed, after state participants to the UN GGE on Cyber Security failed to produce a consensus report in 2017, some commentators questioned whether state cooperation in this area had altogether come to an end.[192] However, states have recently recommitted to collaboratively developing rules and norms of responsible behaviour in cyberspace through international fora.[193] In December 2018, the United Nations General Assembly adopted two resolutions, establishing: a new GGE on Cyber Security to continue the work of previous GGEs, with a view to submitting a final report to the General Assembly in 2021;[194] and, separately, an Open-Ended Working Group made up of the entire UN membership to pursue the same objective as the GGE on Cyber Security, but in a more open and consultative format.[195] If either of these groups achieve the same success as the earlier GGEs on Cyber Security, the status and content of territorial sovereignty in cyberspace may be clarified sooner than expected.


* BA, JD (Melbourne). Research Associate, Program on the Regulation of Emerging Military Technologies. The author would like to thank Rain Liivoja for his feedback on an early iteration of this article. All views are the author&#82[1]s own.

[1] For some influential early articles, see, eg, David R Johnson and David Post, ‘Law and Borders: The Rise of Law in Cyberspace’ (1996) 48(5) Stanford Law Review 1367; Frank H Easterbrook, ‘Cyberspace and the Law of the Horse’ [1996] University of Chicago Legal Forum 207; Henry H Perritt Jr, ‘The Internet as a Threat to Sovereignty? Thoughts on the Internet’s Role in Strengthening National and Global Governance’ (1998) 5(2) Indiana Journal of Global Legal Studies 423; Jack L Goldsmith, ‘The Internet and the Abiding Significance of Territorial Sovereignty’ (1998) 5(2) Indiana Journal of Global Legal Studies 475.

[2] Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, 65th sess, Agenda Item 92, UN Doc A/65/201 (30 July 2010); Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, 68th sess, Agenda Item 94, UN Doc A/68/98* (24 June 2013) (‘GGE Report 2013’); Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, 70th sess, Agenda Item 92, UN Doc A/70/174 (22 July 2015) (‘GGE Report 2015’).

[3] Michael N Schmitt (ed), Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge University Press, 2013) (‘Tallinn Manual 1.0’); Michael N Schmitt (ed), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Cambridge University Press, 2017) (‘Tallinn Manual 2.0’).

[4] Wolff Heintschel von Heinegg, ‘Territorial Sovereignty and Neutrality in Cyberspace’ (2013) 89 International Law Studies 123, 123.

[5] Some scholars refer to these as ‘below the threshold’ cyber operations: Michael N Schmitt, ‘“Below the Threshold” Cyber Operations: The Countermeasures Response Option and International Law’ [2014] VirgJlIntLaw 12; (2014) 54(3) Virginia Journal of International Law 697 (‘Below the Threshold’); Dan Efrony and Yuval Shany, ‘A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice’ (2018) 112(4) American Journal of International Law 583, 587–8.

[6] Nicolas Jupillat, ‘From the Cuckoo’s Egg to Global Surveillance: Cyber Espionage That Becomes Prohibited Intervention’ (2017) 42(4) North Carolina Journal of International Law 933, 939; John R Crook (ed), ‘Contemporary Practice of the United States Relating to International Law’ (2013) 107(1) American Journal of International Law 207, 243, 247–8.

[7] Michael N Schmitt, ‘Grey Zones in the International Law of Cyberspace’ (2017) 42(2) Yale Journal of International Law Online 1, 1–2.

[8] Schmitt (ed), Tallinn Manual 2.0 (n 3).

[9] On the known challenges of attribution in the cyber context: see Benedikt Pirker, ‘Territorial Sovereignty and Integrity and the Challenges of Cyberspace’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy (NATO Cooperative Cyber Defence Centre of Excellence, 2013) 189, 211–12; Kubo Mačák, ‘Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors’ (2016) 21(3) Journal of Conflict and Security Law 405, 407–8; Peter Margulies, ‘Sovereignty and Cyber Attacks: Technology’s Challenge to the Law of State Responsibility’ [2013] MelbJlIntLaw 16; (2013) 14(2) Melbourne Journal of International Law 496, 503; Constantine Antonopoulos, ‘State Responsibility in Cyberspace’ in Nicholas Tsagourias and Russell Buchan (eds), Research Handbook on International Law and Cyberspace (Edward Elgar Publishing, 2015) 55, 62; Nicholas Tsagourias, ‘Cyber Attacks, Self-Defence and the Problem of Attribution’ (2012) 17(2) Journal of Conflict and Security Law 229, 233; William Banks, ‘State Responsibility and Attribution of Cyber Intrusions after Tallinn 2.0(2017) 95(7) Texas Law Review 1487.

[10] James R Crawford, Brownlie’s Principles of Public International Law (Oxford University Press, 8th ed, 2012) 447.

[11] Samantha Besson, ‘Sovereignty’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (Oxford University Press, online at April 2011) [3]. See also Andrey L Kozik, ‘The Concept of Sovereignty as a Foundation for Determining the Legality of the Conduct of States in Cyberspace’ (2014) 14 Baltic Yearbook of International Law 93, 94; Jupillat (n 6) 938.

[12] Crawford (n 10) 448.

[13] Charter of the United Nations art 2(1).

[14] Declaration on Principles of International Law concerning Friendly Relations and Co-Operation among States in Accordance with the Charter of the United Nations, GA Res 2625 (XXV), UN GAOR, 25th sess, 1883rd plen mtg, UN Doc A/RES/2625(XXV) (24 October 1970) annex, art 1 (‘Friendly Relations Declaration’).

[15] Corfu Channel (United Kingdom v Albania) (Judgment) [1949] ICJ Rep 4, 35 (‘Corfu Channel’). See also Island of Palmas (Netherlands v United States of America) (Award) (1928) 2 RIAA 829, 838 (‘Island of Palmas’).

[16] Military and Paramilitary Activities in and against Nicaragua (Nicaragua v United States of America) (Merits) [1986] ICJ Rep 14, 111 [212] (‘Military and Paramilitary Activities’).

[17] Island of Palmas (n 15) 838.

[18] Crawford (n 10) 204. See also Malcolm N Shaw, International Law (Cambridge University Press, 6th ed, 2008) 487–8.

[19] Sir Robert Jennings and Sir Arthur Watts (eds), Oppenheim’s International Law (Longman, 9th ed, 1992) vol 1, 563.

[20] Island of Palmas (n 15) 838.

[21] SS ‘Lotus’ (France v Turkey) (Judgment) [1927] PCIJ (ser A) No 10, 18.

[22] Wolff Heintschel von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ in C Czosseck, R Ottis and K Ziolkowski (eds), 4th International Conference on Cyber Conflict (NATO Cooperative Cyber Defence Centre of Excellence, 2012) 7, 8.

[23] Schmitt (ed), Tallinn Manual 2.0 (n 3) 21–3 (Rule 4 Commentary [15]–[20]).

[24] Charter of the United Nations art 2(4); Friendly Relations Declaration, UN Doc A/RES/2625(XXV) (n 14) art 1.

[25] Schmitt (ed), Tallinn Manual 2.0 (n 3) xii–xviii. For the avoidance of doubt, the Tallinn Manual 2.0’s International Group of Experts (‘Experts’) is distinct from the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (‘GGE on Cyber Security’).

[26] Ibid 2.

[27] Ibid 2–3.

[28] See, eg, Banks (n 9); Robert E Barnsby and Shane R Reeves, ‘Give Them an Inch, They’ll Take a Terabyte: How States May Interpret Tallinn Manual 2.0’s International Human Rights Law Chapter’ (2017) 95(7) Texas Law Review 1515; Christian Schaller, ‘Beyond Self-Defense and Countermeasures: A Critical Assessment of the Tallinn Manual’s Conception of Necessity’ (2017) 95(7) Texas Law Review 1619; Patrick Colin, ‘Debugging the Tallinn Manual 2.0’s Application of the Due Diligence Principle to Cyber Operations’ (2019) 28(2) Washington International Law Journal 581.

[29] Schmitt (ed), Tallinn Manual 2.0 (n 3) 2–3. Some scholars have argued, on the basis of subsequent state practice, that the Tallinn Manual 2.0 has not been uniformly accepted as an authoritative restatement of the international law applicable to cyberspace: Efrony and Shany (n 5) 585. For various responses to this position, see Fleur Johns, ‘War without Words’ (2019) 113 AJIL Unbound 67; Nicholas Tsagourias, ‘The Slow Process of Normativizing Cyberspace’ (2019) 113 AJIL Unbound 71; Lianne JM Boer, ‘Lex Lata Comes with a Date; Or, What Follows from Referring to the “Tallinn Rules”’ (2019) 113 AJIL Unbound 76; Kubo Mačák, ‘On the Shelf, But Close at Hand: The Contribution of Non-State Initiatives to International Cyber Law’ (2019) 113 AJIL Unbound 81 (‘On the Shelf, But Close at Hand’); Ido Kilovaty, ‘The Elephant in the Room: Coercion’ (2019) 113 AJIL Unbound 87.

[30] Schmitt (ed), Tallinn Manual 2.0 (n 3) 17 (Rule 4).

[31] Ibid 19 (Rule 4 Commentary [6]).

[32] Ibid 20 (Rule 4 Commentary [11]).

[33] Ibid 20–1 (Rule 4 Commentary [13]).

[34] Ibid 21 (Rule 4 Commentary [14]).

[35] Ibid (Rule 4 Commentary [15]).

[36] Ibid 24 (Rule 4 Commentary [22]).

[37] Ibid 22 n 26. In addition, the following were given as examples of ‘inherently governmental functions’: the delivery of social services; the conduct of elections; the collection of taxes; the conduct of diplomatic activities; the conduct of national defence activities; official communications among a state’s leadership; the payment of government employee salaries; the exercise of law enforcement functions; and the protection of critical governmental data: at 22–3 (Rule 4 Commentary [16]–[19]).

[38] Schmitt, ‘Grey Zones in the International Law of Cyberspace’ (n 7) 6. While the precise meaning of ‘inherently governmental functions’ also warrants further discussion, this article is principally concerned with the violation of sovereignty by territorial interference.

[39] John Perry Barlow, ‘A Declaration of the Independence of Cyberspace’, Electronic Frontier Foundation (Web Page, 8 February 1996) <https://www.eff.org/cyberspace-independence>, archived at <https://perma.cc/PW9X-DT7U>.

[40] GGE Report 2013, UN Doc A/68/98* (n 2) 8 [19]–[20]; GGE Report 2015, UN Doc A/70/174 (n 2) 7 [11], [13].

[41] Schmitt (ed), Tallinn Manual 2.0 (n 3) 11 (Rule 1). See also Schmitt (ed), Tallinn Manual 1.0 (n 3) 15 (Rule 1).

[42] Sean Watts, ‘Low-Intensity Cyber Operations and the Principle of Non-Intervention’ (2015) 14 Baltic Yearbook of International Law 137, 142.

[43] Gary P Corn and Robert Taylor, ‘Sovereignty in the Age of Cyber’ (2017) 111 AJIL Unbound 207. Some scholars have assumed that this view is also held by the United States Department of Defense: Michael N Schmitt and Liis Vihul, ‘Respect for Sovereignty in Cyberspace’ (2017) 95(7) Texas Law Review 1639, 1641–2. See also Kozik (n 11) 95; Gary Corn, ‘Tallinn Manual 2.0: Advancing the Conversation’, Just Security (Blog Post, 15 February 2017) <https://www.justsecurity.org/37812/tallinn-manual-2–0-advancing-conversation>, archived at <https://perma.cc/UD7U-M9MQ>.

[44] Corn and Taylor (n 43) 208.

[45] Ibid.

[46] Jeremy Wright, ‘Cyber and International Law in the 21st Century’ (Speech, Attorney-General’s Office, 23 May 2018) <https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century>, archived at <https://perma.cc/6LRT-AW39>.

[47] See Gary Corn and Eric Jensen, ‘The Technicolor Zone of Cyberspace: Part 2’, Just Security (Blog Post, 8 June 2018) <https://www.justsecurity.org/57545/technicolor-zone-cyberspace-part-2>, archived at <https://perma.cc/5AGQ-4QRF>.

[48] On policy statements and other verbal acts as state practice: see International Law Commission, Report of the International Law Commission on the Work of Its Seventieth Session, UN GAOR, 73rd sess, Agenda Item 82, Supp No 10, UN Doc A/73/10 (2018) ch V(E)(2) (‘Text of the Draft Conclusions on Identification of Customary International Law and Commentaries Thereto’) 133–4 (Conclusion 6 Commentaries [1]–[8]) (‘Draft Conclusions’); Crawford (n 10) 24.

[49] Corn and Taylor (n 43) 208–9; Corn (n 43); Jeremy Wright (n 46); Schmitt and Vihul, ‘Respect for Sovereignty in Cyberspace’ (n 43) 1642–3; Schmitt (ed), Tallinn Manual 2.0 (n 3) 11–12 (Rule 1 Commentary [1]–[3]).

[50] See above Part II(A).

[51] Schmitt and Vihul, ‘Respect for Sovereignty in Cyberspace’ (n 43) 1647; Michael N Schmitt and Liis Vihul, ‘Sovereignty in Cyberspace: Lex Lata Vel Non?’ (2017) 111 AJIL Unbound 213, 214 (‘Sovereignty in Cyberspace’). Cf Jeremy Wright (n 46).

[52] Schmitt and Vihul, ‘Respect for Sovereignty in Cyberspace’ (n 43) 1667; Schmitt and Vihul, ‘Sovereignty in Cyberspace’ (n 51) 214. See also below Part V(A).

[53] Military and Paramilitary Activities (n 16) 111 [212].

[54] Ibid 128 [251].

[55] Certain Activities Carried Out by Nicaragua in the Border Area (Costa Rica v Nicaragua) (Judgment) [2015] ICJ Rep 665, 703 [93] (‘Certain Activities’).

[56] Ibid 704 [97].

[57] Statute of the International Court of Justice arts 38(1)(d), 59.

[58] Draft Conclusions, UN Doc A/73/10 (n 48) 149–50 (Conclusion 13 Commentary [2]–[5]); Crawford (n 10) 37–9.

[59] Schmitt (ed), Tallinn Manual 2.0 (n 3) 17–27 (Rule 4). In the commentary to Rule 4, the Experts refer to violations of sovereignty (which is the language of state responsibility) and acknowledge that countermeasures may be used in response to sovereignty violations: at 18. They also expressly distinguish between sovereignty violations and violations of the non-intervention principle and the prohibition of the use of force: at 20, 22, 24, 26.

[60] Statute of the International Court of Justice art 38(1)(d).

[61] Schmitt, ‘Grey Zones in the International Law of Cyberspace’ (n 7) 4–5.

[62] Schmitt (ed), Tallinn Manual 2.0 (n 3) 6.

[63] Schmitt and Vihul, ‘Respect for Sovereignty in Cyberspace’ (n 43) 1655–65.

[64] Ann Väljataga, ‘Tracing Opinio Juris in National Cyber Security Strategy Documents’ (NATO Cooperative Cyber Defence Centre of Excellence, 2018) 18.

[65] While a number of taxonomies for the classification of cyber operations already exist, they have been developed primarily for technical, not legal, purposes: see, eg, Nong Ye, Clark Newman and Toni Farley, ‘A System-Fault-Risk Framework for Cyber Attack Classification’ (2005) 5(2) Information Knowledge Systems Management 135; Jiankun Hu, Hemanshu R Pota and Song Guo, ‘Taxonomy of Attacks for Agent-Based Smart Grids’ (2014) 25(7) IEEE Transactions on Parallel and Distributed Systems 1886; Wei Jiang, Zhi-hong Tian and Xiang Cui, ‘DMAT: A New Network and Computer Attack Classification’ (2013) 6(5) Journal of Engineering Science and Technology Review 101.

[66] Gary Brown and Keira Poellet, ‘The Customary International Law of Cyberspace’ (2012) 6(3) Strategic Studies Quarterly 126, 131; Jan E Messerschmidt, ‘Hackback: Permitting Retaliatory Hacking by Non-State Actors as Proportionate Countermeasures to Transboundary Cyberharm’ (2013) 52(1) Columbia Journal of Transnational Law 275, 276–7; David Drummond, ‘A New Approach to China’, Google Official Blog (Blog Post, 12 January 2010) <https://googleblog.blogspot.com.au/2010/01/new-approach-to-china.html>, archived at <https://perma.cc/Z4TM-4CKV>.
[67] Brendan I Koerner, ‘Inside the Cyberattack That Shocked the US Government’, Wired (online, 23 October 2016) <https://www.wired.com/2016/10/inside-cyberattack-shocked-us-government/>, archived at <https://perma.cc/HVF7-G54Y>; Ellen Nakashima, ‘Hacks of OPM Databases Compromised 22.1 Million People, Federal Authorities Say’, The Washington Post (online, 10 July 2015) <https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/>, archived at <https://perma.cc/ND5L-N2M6>. See below n 104.
[68] Eric Lipton, David E Sanger and Scott Shane, ‘The Perfect Weapon: How Russian Cyberpower Invaded the US’, The New York Times (online, 13 December 2016) <https://www.nytimes.com/2016/12/13/us/politics/russia-hack-election-dnc.html>, archived at <https://perma.cc/S2YR-C3W2>; April Glaser, ‘Here’s What We Know about Russia and the DNC Hack’, Wired (online, 27 July 2016) <https://www.wired.com/2016/07/heres-know-russia-dnc-hack/>, archived at <https://perma.cc/6VUQ-A2RL>. See below Part V(B).
[69] Eneken Tikk, Kadri Kaska and Liis Vihul, International Cyber Incidents: Legal Considerations (NATO Cooperative Cyber Defence Centre of Excellence, 2010) 19; Sean Watts, ‘Low-Intensity Computer Network Attack and Self-Defense’ (2011) 87 International Law Studies 59, 69–70; Patrick W Franzese, ‘Sovereignty in Cyberspace: Can It Exist?’ (2009) 64 Air Force Law Review 1, 3–4.
[70] Watts, ‘Low-Intensity Computer Network Attack and Self-Defense’ (n 69) 70–2; Franzese (n 69) 4; Tikk, Kaska and Vihul (n 69) 66–90.
[71] Franzese (n 69) 4–5.
[72] ‘NotPetya and WannaCry Call for a Joint Response from International Community’, NATO Cooperative Cyber Defence Centre of Excellence (News Report, 30 June 2017) <https://www.ccdcoe.org/news/2017/notpetya-and-wannacry-call-for-a-joint-response-from-international-community>, archived at <https://perma.cc/LB7F-LHVD>; Jon Henley, ‘“Petya” Ransomware Attack Strikes Companies across Europe and US’, The Guardian (online, 28 June 2017) <https://www.theguardian.com/world/2017/jun/27/petya-ransomware-attack-strikes-companies-across-europe>, archived at <https://perma.cc/QR8Y-TJ2G>; ‘“Bad Rabbit” Ransomware Strikes Ukraine and Russia’, BBC News (online, 24 October 2017) <https://www.bbc.com/news/technology-41740768>, archived at <https://perma.cc/GYG9-2R3U>; Alex Perekalin, ‘Bad Rabbit: A New Ransomware Epidemic Is on the Rise’, Kaspersky Daily (Blog Post, 24 October 2017) <https://www.kaspersky.com/blog/bad-rabbit-ransomware/19887/>, archived at <https://perma.cc/9WZ3-RVDB>. See below Part V(B).
[73] Marco Roscini, ‘Cyber Operations as a Use of Force’ in Nicholas Tsagourias and Russell Buchan (eds), Research Handbook on International Law and Cyberspace (Edward Elgar Publishing, 2015) 233, 244; Schmitt (ed), Tallinn Manual 2.0 (n 3) 21 (Rule 4 Commentary [13]).
[74] Thomas Payne, ‘Teaching Old Law New Tricks: Applying and Adapting State Responsibility to Cyber Operations’ (2016) 20(2) Lewis and Clark Law Review 683, 684; Michael Schmitt, ‘International Law and Cyber Attacks: Sony v North Korea’, Just Security (Blog Post, 17 December 2014) <https://www.justsecurity.org/18460/international-humanitarian-law-cyber-attacks-sony-v-north-korea/>, archived at <https://perma.cc/ZG3L-6SVW>. See below Part V(B).
[75] Roscini (n 73) 243. See also Brown and Poellet (n 66) 131–2; Messerschmidt (n 66) 288–9.

[76] Kozik (n 11) 98.

[77] Anna-Maria Osula, ‘Transborder Access and Territorial Sovereignty’ (2015) 31(6) Computer Law and Security Review 719, 726. See also von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ (n 22) 11.

[78] Pirker (n 9) 201.

[79] Schmitt (ed), Tallinn Manual 2.0 (n 3) 21 (Rule 4 Commentary [14]); Pirker (n 9) 201; von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ (n 22) 11.

[80] Eric Talbot Jensen, ‘Cyber Sovereignty: The Way Ahead’ (2015) 50(2) Texas International Law Journal 275, 302–3.

[81] Schmitt, ‘Below the Threshold’ (n 5) 698–9. See generally Watts, ‘Low-Intensity Computer Network Attack and Self-Defense’ (n 69); Watts, ‘Low-Intensity Cyber Operations and the Principle of Non-Intervention’ (n 42).

[82] For further explanation on this point, see below Part V(A).

[83] This standard is not directly referable to the Scale Chart, as the touchstone of wrongfulness is effects-based, not any particular degree of cyber interference. Schmitt (ed), Tallinn Manual 2.0 (n 3) 21 (Rule 4 Commentary [14]).

[84] While this is most analogous to a Scale 2 cyber operation, it is a marginally narrower standard in that it does not capture data other than ‘malware’. The Tallinn Manual 2.0 defines ‘malware’ as ‘“Software” ... that may be stored and executed in other software, firmware, or hardware that is designed adversely to affect the performance of a computer system. Examples of malware include Trojan horses, “rootkits”, “viruses” and “worms”’: ibid 566.

[85] Ibid (Rule 4 Commentary [14]).

[86] Ibid. While this is most analogous to a Scale 2 cyber operation, it is a narrower standard in that it only captures data insertions which create a backdoor in the targeted cyber infrastructure.

[87] Ibid.

[88] Ibid.

[89] See Markus Maybaum, ‘Technical Methods, Techniques, Tools and Effects of Cyber Operations’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy (NATO Cooperative Cyber Defence Centre of Excellence, 2013) 103, 126–8.

[90] Schmitt (ed), Tallinn Manual 2.0 (n 3) 21 (Rule 4 Commentary [14]).

[91] Crawford (n 10) 448.

[92] von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ (n 22) 11. See also Pirker (n 9) 201.

[93] Schmitt (ed), Tallinn Manual 2.0 (n 3) 169 (Rule 32 Commentary [5]). See also Jupillat (n 6) 959; Jens David Ohlin, ‘Did Russian Cyber Interference in the 2016 Election Violate International Law?’ (2017) 95(7) Texas Law Review 1579, 1582; Jeffrey H Smith, ‘Keynote Address’ (2007) 28(3) Michigan Journal of International Law 543, 544; Glenn Sulmasy and John Yoo, ‘Counterintuitive: Intelligence Operations and International Law’ (2007) 28 Michigan Journal of International Law 625, 628; Brown and Poellet (n 66) 133; Arie J Schaap, ‘The Development of Cyber Warfare Operations and Analyzing Its Use under International Law’ (2009) 64 Air Force Law Review 121, 139–40; von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ (n 22) 16; Corn and Taylor (n 43) 209; Pirker (n 9) 202; Schmitt, ‘Grey Zones in the International Law of Cyberspace’ (n 7) 8. Cf Asaf Lubin, ‘The Liberty to Spy’ (2020) 61(1) Harvard International Law Journal 185. The means employed to conduct cyber espionage operations are capable of violating international law, and should be assessed independently: Schmitt (ed), Tallinn Manual 2.0 (n 3) 170 (Rule 32 Commentary [6]). For a detailed account of the international law of cyber espionage, see Russell Buchan, Cyber Espionage and International Law (Hart Publishing, 2018).

[94] Russell Buchan, ‘Cyber Espionage and International Law’ in Nicholas Tsagourias and Russell Buchan (eds), Research Handbook on International Law and Cyberspace (Edward Elgar Publishing, 2015) 168, 186.

[95] Jeff Nemerofsky, ‘What Is a “Trifle” Anyway?’ (2001) 37(2) Gonzaga Law Review 315, 323. See also Jennings and Watts (eds) (n 19) 385; Schmitt and Vihul, ‘Respect for Sovereignty in Cyberspace’ (n 43) 1648; Jensen (n 80) 302–3.

[96] See below Part IV(A).

[97] von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ (n 22) 12, quoted in Buchan, ‘Cyber Espionage and International Law’ (n 94) 186 n 90. See also Schmitt and Vihul, ‘Respect for Sovereignty in Cyberspace’ (n 43) 1647; Schmitt (ed), Tallinn Manual 2.0 (n 3) 13–14 (Rule 2 Commentary [3]).

[98] Watts, ‘Low-Intensity Cyber Operations and the Principle of Non-Intervention’ (n 42) 145; Sean Watts, ‘International Law and Proposed US Responses to the DNC Hack’, Just Security (Blog Post, 14 October 2016) <https://www.justsecurity.org/33558/international-law-proposed-u-s-responses-d-n-c-hack/>, archived at <https://perma.cc/J2MM-XXMC>.

[99] Buchan, ‘Cyber Espionage and International Law’ (n 94) 184.

[100] Watts, ‘International Law and Proposed US Responses to the DNC Hack’ (n 98).

[101] Schmitt (ed), Tallinn Manual 2.0 (n 3) 169 (Rule 32 Commentary [5]). An isolated but commonly cited counter-example is a statement given by the President of Brazil to the UN General Assembly following public reporting of the US global cyber espionage program in 2013: at 169 n 384; HE Dilma Rousseff, President of the Federal Republic of Brazil, ‘Opening of the General Debate of the 68th Session of the United Nation’s General Assembly’ (Speech, United Nations General Assembly, 24 September 2013). See also Buchan, ‘Cyber Espionage and International Law’ (n 94) 179–80.

[102] Buchan, ‘Cyber Espionage and International Law’ (n 94) 168–9; Ellen Nakashima and William Wan, ‘US Announces First Charges against Foreign Country in Connection with Cyberspying’, The Washington Post (online, 19 May 2014) <https://www.washingtonpost.com/world/national-security/us-to-announce-first-criminal-charges-against-foreign-country-for-cyberspying/2014/05/19/586c9992-df45-11e3-810f-764fe508b82d_story.html>, archived at <https://perma.cc/KF56-MAKF>; Department of Justice, US Attorney’s Office, Western District of Pennsylvania, ‘US Charges Five Chinese Military Hackers for Cyber Espionage against US Corporations and a Labor Organization for Commercial Advantage’ (Press Release, 19 May 2014) <https://www.justice.gov/usao-wdpa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and>, archived at <https://perma.cc/U3AC-WTXS> (‘DOJ Summary of Indictment against Chinese Military Hackers’). See generally Mandiant, APT1: Exposing One of China’s Cyber Espionage Units (Report, 18 February 2013) <https://www.fireeye.com/content/dam/fireeye-www/services/pdfs/mandiant-apt1-report.pdf>, archived at <https://perma.cc/4QPS-KYMH>.

[103] Nakashima and Wan (n 102); ‘DOJ Summary of Indictment against Chinese Military Hackers’ (n 102).

[104] Tim McCormack, ‘The Sony and OPM Double Whammy: International Law and Cyber “Attacks”’ (2015) 18(4) Science and Technology Law Review 379, 379–80 (‘The Sony and OPM Double Whammy’); Stephanie Gootman, ‘OPM Hack: The Most Dangerous Threat to the Federal Government Today’ (2016) 11(4) Journal of Applied Security Research 517; Nakashima (n 67). An alternative explanation is that states accept that cyber espionage operations violate territorial sovereignty, but that the practice of espionage is so widespread that a customary international law exception has emerged in relation to the primary rule: see Buchan, Cyber Espionage and International Law (n 93) ch 7; Schmitt and Vihul, ‘Respect for Sovereignty in Cyberspace’ (n 43) 1645.

[105] Tim McCormack, ‘International Humanitarian Law and the Targeting of Data’ (2018) 94 International Law Studies 222, 223, 230. See generally Samuli Haataja, ‘The 2007 Cyber Attacks against Estonia and International Law on the Use of Force: An Informational Approach’ (2017) 9(2) Law, Innovation and Technology 159, 179; Randall R Dipert, ‘The Ethics of Cyberwarfare’ (2010) 9(4) Journal of Military Ethics 384, 386, 397.

[106] McCormack, ‘International Humanitarian Law and the Targeting of Data’ (n 105) 223.

[107] Haataja (n 105) 180, citing Massimo Durante, ‘Violence, Just Cyber War and Information’ (2015) 28(3) Philosophy and Technology 369, 382–3.

[108] McCormack, ‘International Humanitarian Law and the Targeting of Data’ (n 105) 223.

[109] von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ (n 22) 9; Franzese (n 69) 33; Jensen (n 80) 296.

[110] Schmitt (ed), Tallinn Manual 2.0 (n 3) 11 (Rule 1 Commentary [1]); von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ (n 22) 9–10; Jupillat (n 6) 944; GGE Report 2013, UN Doc A/68/98* (n 2) 8 [20]; GGE Report 2015, UN Doc A/70/174 (n 2) 12 [28(a)].

[111] Schmitt (ed), Tallinn Manual 2.0 (n 3) 20 (Rule 4 Commentary [11]); Kozik (n 11) 98; Osula (n 77) 726; Pirker (n 9) 200–1; von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ (n 22) 11.

[112] Jupillat (n 6) 944; Schmitt (ed), Tallinn Manual 2.0 (n 3) 11 (Rule 1 Commentary [1]).

[113] Schmitt (ed), Tallinn Manual 2.0 (n 3) 11–12 (Rule 1 Commentary [1], [4]).

[114] Ibid 13 (Rule 2 Commentary [2]). Sixty-eight states have become signatories to the Convention on Cybercrime and in doing so committed to domestically criminalising cybercrime: Convention on Cybercrime, opened for signature 23 November 2001, 2296 UNTS 167 (entered into force 1 July 2004) arts 2–13. ‘Chart of Signatories and Ratifications of Treaty 185’, Council of Europe: Treaty Office (Web Page) <https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures>, archived at <https://perma.cc/7BC9-QGJS>.

[115] See Buchan, Cyber Espionage and International Law (n 93) 54.

[116] Schmitt (ed), Tallinn Manual 2.0 (n 3) 12 (Rule 1 Commentary [4]).

[117] Rob Crossley, ‘Where in the World Is My Data and How Secure Is It?’, BBC News (online, 9 August 2016) <https://www.bbc.com/news/business-36854292>, archived at <https://perma.cc/BMS5-U2DV>; Brett Neilson, Ned Rossiter and Tanya Notley, ‘Where Is Your Data? It’s Not Actually in the Cloud, It’s Sitting in a Data Centre’, ABC News (online, 31 August 2016) <https://www.abc.net.au/news/2016-08-31/your-data-is-not-in-the-cloud-its-in-a-data-centre/7801350>, archived at <https://perma.cc/DA32-EVHZ>.

[118] Embracing Innovation in Government: Global Trends 2018 (Report, Organisation for Economic Co-operation and Development, 11 February 2018) 42–4 <http://www.oecd.org/gov/innovative-government/embracing-innovation-in-government-2018.pdf> , archived at <https://perma.cc/PW3D-57VK>.

[119] Watts, ‘Low-Intensity Cyber Operations and the Principle of Non-Intervention’ (n 42) 138. See also Schmitt, ‘Below the Threshold’ (n 5) 698–9.

[120] Watts, ‘Low-Intensity Cyber Operations and the Principle of Non-Intervention’ (n 42) 138.

[121] Schmitt, ‘Grey Zones in the International Law of Cyberspace’ (n 7) 2–3.

[122] Ibid; Banks (n 9) 1511–12.

[123] See, eg, Schmitt, ‘Grey Zones in the International Law of Cyberspace’ (n 7) 20.

[124] Eric Talbot Jensen and Sean Watts, ‘A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destabilizer?’ (2017) 95(7) Texas Law Review 1555, 1568–75.

[125] Schmitt, ‘Grey Zones in the International Law of Cyberspace’ (n 7) 21; Watts, ‘Low-Intensity Cyber Operations and the Principle of Non-Intervention’ (n 42) 138; Watts, ‘Low-Intensity Computer Network Attack and Self-Defense’ (n 69) 61.

[126] Terry D Gill, ‘Non-Intervention in the Cyber Context’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy (NATO Cooperative Cyber Defence Centre of Excellence, 2013) 217, 228. See also Ruth Teitelbaum, ‘Recent Fact-Finding Developments at the International Court of Justice’ (2007) 6 Law and Practice of International Courts and Tribunals 119, 124–6; Roscini (n 73) 250–1.

[127] See, eg, Crook (ed) (n 6) 247; Jupillat (n 6) 939.

[128] Statute of the International Court of Justice art 38(1)(b); North Sea Continental Shelf (Federal Republic of Germany v Denmark) (Merits) [1969] ICJ Rep 3, 43 [74] (‘North Sea Continental Shelf’); Military and Paramilitary Activities (n 16) 97–8 [184]–[186].

[129] See above n 9.

[130] Responsibility of States for Internationally Wrongful Acts, GA Res 56/83, UN GAOR, 56th sess, 85th plen mtg, Agenda Item 162, Supp No 49, UN Doc A/RES/56/83 (28 January 2002, adopted 12 December 2001) annex, art 2; International Law Commission, Report of the International Law Commission on the Work of Its Fifty-Third Session, UN GAOR, 56th sess, Agenda Item 162, Supp No 10, UN Doc A/56/10 (2001) ch IV(E)(2) (‘Draft Articles on Responsibility of States for Internationally Wrongful Acts with Commentaries’) art 2 (Commentary [1]–[6]); United States Diplomatic and Consular Staff in Tehran (United States of America v Iran) (Judgment) [1980] ICJ Rep 3, 29 [56]; Military and Paramilitary Activities (n 16) 117–18 [226].

[131] See generally Michael N Schmitt and Sean Watts, ‘The Decline of International Humanitarian Law Opinio Juris and the Law of Cyber Warfare’ (2015) 50(2) Texas International Law Journal 189, 211; Mačák, ‘On the Shelf, But Close at Hand’ (n 29) 82; Efrony and Shany (n 5) 631–2; Banks (n 9) 1497.

[132] See, eg, Brown and Poellet (n 66) 131–2; Ryan Goodman, ‘International Law and the US Response to Russian Election Interference’, Just Security (Blog Post, 5 January 2017) <https://www.justsecurity.org/35999/international-law-response-russian-election-interference>, archived at <https://perma.cc/2PYE-FFC5>.

[133] Efrony and Shany (n 5) 584.

[134] See below Part V(A).

[135] While the earliest publicly recorded state-sponsored cyber operation arguably occurred in 1982, when a trans-Siberian pipeline explosion was allegedly caused by US computer malware, the majority of states have been meaningfully engaged in international law discourse in respect of cyberspace since the distributed denial-of-service attacks against Estonia in 2007: Brown and Poellet (n 66) 130.

[136] See below Part V(B).

[137] Crawford (n 10) 203; Jennings and Watts (eds) (n 19) 572–3.

[138] ‘Estonia Says Russian Aircraft Violated Airspace Again’, Radio Free Europe/Radio Liberty (Blog Post, 6 September 2016) <https://www.rferl.org/a/russia-estonia-airspace-violated/27970888.html>, archived at <https://perma.cc/4KNX-FT88>; ‘Russian Aircraft Violates Estonian Airspace’, ERR News (online, 13 March 2018) <https://news.err.ee/689163/russian-aircraft-violates-estonian-airspace>, archived at <https://perma.cc/Z586-S5F8>.

[139] ‘Estonia Says Russian Aircraft Violated Airspace Again’ (n 138); ‘Russian Aircraft Violates Estonian Airspace’ (n 138).

[140] Quincy Wright, ‘Legal Aspects of the U-2 Incident’ (1960) 54(4) American Journal of International Law 836, 836, cited in Julius Stone, ‘Legal Problems of Espionage in Conditions of Modern Conflict’ in Roland J Stanger (ed), Essays on Espionage and International Law (Ohio State University Press, 1962) 29, 32.

[141] Schmitt and Vihul, ‘Respect for Sovereignty in Cyberspace’ (n 43) 1656; Oliver J Lissitzyn, ‘Some Legal Implications of the U-2 and RB-47 Incidents’ (1962) 56(1) American Journal of International Law 135, 137.

[142] Military and Paramilitary Activities (n 16) 52–3 [91].

[143] Ibid 128 [251].

[144] Eleanor Freund, Freedom of Navigation in the South China Sea: A Practical Guide (Report, June 2017) <https://www.belfercenter.org/publication/freedom-navigation-south-china-sea-practical-guide>, archived at <https://perma.cc/M264-WUBK>; Ankit Panda, ‘South China Sea: 2 US Navy Destroyers Conduct Freedom of Navigation Operation in Spratlys’, The Diplomat (online, 6 May 2019) <https://thediplomat.com/2019/05/south-china-sea-2-us-navy-destroyers-conduct-freedom-of-navigation-operation-in-spratlys/>, archived at <https://perma.cc/VPH2-DBTL>.

[145] ‘China Condemns US for South China Sea Freedom of Navigation Operation’, Reuters (online, 2 October 2018) <https://www.reuters.com/article/us-usa-china-military/china-condemns-u-s-for-south-china-sea-freedom-of-navigation-operation-idUSKCN1MC04F>, archived at <https://perma.cc/ED9D-JNHV>; Sam Bateman, ‘South China Sea: Paracels in the Spotlight’, The Interpreter (Blog Post, 30 May 2018) <https://www.lowyinstitute.org/the-interpreter/south-china-sea-paracels-spotlight>, archived at <https://perma.cc/Q37N-DWNQ>.

[146] Corfu Channel (n 15) 27–32.

[147] Ibid 34–5.

[148] Paula Schriefer, ‘Joint Statement by 42 States at the Human Rights Council on the Situation in Ukraine’ (Media Statement, US Mission to International Organizations in Geneva, 26 March 2014) <https://geneva.usmission.gov/2014/03/26/joint-statement-by-42-states-at-the-human-rights-council-on-the-situation-in-ukraine>, archived at <https://perma.cc/96WU-PV8H>.

[149] Certain Activities (n 55) 703 [93]. Some of these examples of territorial interference, as well as several others, are cited and expanded upon in Schmitt and Vihul, ‘Respect for Sovereignty in Cyberspace’ (n 43) 1650–65.

[150] Buchan, Cyber Espionage and International Law (n 93) 54.

[151] Stefan Talmon, ‘Determining Customary International Law: The ICJ’s Methodology between Induction, Deduction and Assertion’ (2015) 26(2) European Journal of International Law 417, 426.

[152] Ibid 422–3.

[153] Continental Shelf (Libyan Arab Jamahiriya v Malta) (Judgment) [1985] ICJ Rep 13, 33 [34].

[154] Ibid (emphasis added).

[155] Island of Palmas (n 15) 838; Corfu Channel (n 15) 35; Military and Paramilitary Activities (n 16) 111 [212]. See also the state practice and opinio juris set out in this Part V(A).

[156] Buchan, Cyber Espionage and International Law (n 93) 54.

[157] von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ (n 22) 9–10.

[158] Nicholas Tsagourias, ‘The Legal Status of Cyberspace’ in Nicholas Tsagourias and Russell Buchan (eds), Research Handbook on International Law and Cyberspace (Edward Elgar Publishing, 2015) 13, 24–8.

[159] GGE Report 2013, UN Doc A/68/98* (n 2) 8 [16]; GGE Report 2015, UN Doc A/70/174 (n 2) 7 [11].

[160] For comprehensive online registers of significant state-sponsored cyber incidents: see ‘Cyber Operations Tracker’, Council on Foreign Relations (Web Page, 2020) <https://www.cfr.org/interactive/cyber-operations>, archived at <https://perma.cc/Z4DM-YMQ8>; ‘Significant Cyber Incidents’, Center for Strategic and International Studies (Web Page, 2020) <https://www.csis.org/programs/technology-policy-program/significant-cyber-incidents>, archived at <https://perma.cc/J2HE-BVP4>.

[161] Payne (n 74) 684; McCormack, ‘The Sony and OPM Double Whammy’ (n 104) 379–80; Schmitt, ‘International Law and Cyber Attacks: Sony v North Korea’ (n 74).

[162] The Interview (Columbia Pictures, 2014). See Payne (n 74) 684.

[163] Payne (n 74) 684; Dan Roberts, ‘Obama Imposes New Sanctions against North Korea in Response to Sony Hack’, The Guardian (online, 3 January 2015) <https://www.theguardian.com/us-news/2015/jan/02/obama-imposes-sanctions-north-korea-sony-hack-the-interview>, archived at <https://perma.cc/SMZ5-GDFC>.

[164] Danny Yadron, Devlin Barrett and Julian E Barnes, ‘US Struggles for Response to Sony Hack’, The Wall Street Journal (online, 18 December 2014) <https://www.wsj.com/articles/u-s-struggles-for-response-to-sony-hack-1418950806>, archived at <https://perma.cc/A8JQ-EREG>.

[165] Schmitt (ed), Tallinn Manual 2.0 (n 3) 20 (Rule 4 Commentary [11]); Kozik (n 11) 98; Osula (n 77) 726; Pirker (n 9) 200–1; von Heinegg, ‘Legal Implications of Territorial Sovereignty in Cyberspace’ (n 22) 11.

[166] Ohlin (n 93) 1579–80; Steven J Barela, ‘Cross-Border Cyber Ops to Erode Legitimacy: An Act of Coercion’, Just Security (Blog Post, 12 January 2017) <https://www.justsecurity.org/36212/cross-border-cyber-ops-erode-legitimacy-act-coercion/>, archived at <https://perma.cc/UKH6-JDSQ>; Banks (n 9) 1487.

[167] Barack Obama, ‘Statement by the President on Actions in Response to Russian Malicious Cyber Activity and Harassment’ (Press Release, The White House, Office of the Press Secretary, 29 December 2016) <https://obamawhitehouse.archives.gov/the-press-office/2016/12/29/statement-president-actions-response-russian-malicious-cyber-activity>, archived at <https://perma.cc/A7NR-7RB3>.

[168] The release of data gathered by means of cyber espionage would also not typically implicate territorial sovereignty.

[169] See, eg, Barela (n 166). One scholar has suggested that the hack might have constituted a violation of the right to self-determination: Ohlin (n 93) 1596. A further possibility is that the DNC hack constituted a violation of US sovereignty for usurping one of its inherently governmental functions: Schmitt (ed), Tallinn Manual 2.0 (n 3) 21–2 (Rule 4 Commentary [15]).

[170] ‘NotPetya and WannaCry Call for a Joint Response from International Community’ (n 72); Henley (n 72).

[171] Henley (n 72).

[172] Foreign and Commonwealth Office, National Cyber Security Centre and Lord Ahmad of Wimbledon, ‘Foreign Office Minister Condemns Russia for NotPetya Attacks’ (Press Release, 15 February 2018) <https://www.gov.uk/government/news/foreign-office-minister-condemns-russia-for-notpetya-attacks>, archived at <https://perma.cc/6ZLM-NRGE>.

[173] Sarah Marsh, ‘US Joins UK in Blaming Russia for NotPetya Cyber-Attack’, The Guardian (online, 16 February 2018) <https://www.theguardian.com/technology/2018/feb/15/uk-blames-russia-notpetya-cyber-attack-ukraine>, archived at <https://perma.cc/CQ4R-S5GD>.

[174] Recall the UK’s position that sovereignty does not constitute a primary rule of international law capable of independent breach: see above Part II(C).

[175] ‘“Bad Rabbit” Ransomware Strikes Ukraine and Russia’ (n 72); Perekalin (n 72).

[176] ‘“Bad Rabbit” Ransomware Strikes Ukraine and Russia’ (n 72).

[177] National Cyber Security Centre, ‘Reckless Campaign of Cyber Attacks by Russian Military Intelligence Service Exposed’ (Press Release, 3 October 2018) <https://www.ncsc.gov.uk/news/reckless-campaign-cyber-attacks-russian-military-intelligence-service-exposed>, archived at <https://perma.cc/E42N-9TWK>.

[178] Scott Morrison, Prime Minister of Australia, ‘Attribution of a Pattern of Malicious Cyber Activity to Russia’ (Press Release, Government of Australia, 4 October 2018) <https://www.pm.gov.au/media/attribution-pattern-malicious-cyber-activity-russia>, archived at <https://perma.cc/RM3F-AG43>. New Zealand also attributed Bad Rabbit to Russia, but did not go so far as to characterise the cyber operation as a violation of international law: Government Communications Security Bureau, ‘Malicious Cyber Activity Attributed to Russia’ (Press Release, Government of New Zealand, 4 October 2018) <https://www.gcsb.govt.nz/news/malicious-cyber-activity-attributed-to-russia>, archived at <https://perma.cc/SKA3-SV8P>.

[179] Draft Conclusions, UN Doc A/73/10 (n 48) 135–6 (Conclusion 8). See also North Sea Continental Shelf (n 128) 43 [74]; Fisheries Jurisdiction (United Kingdom v Iceland) (Merits) [1974] ICJ Rep 3, 23–6 [52]–[58]; Military and Paramilitary Activities (n 16) 108–9 [207].

[180] Crawford (n 10) 24; Draft Conclusions, UN Doc A/73/10 (n 48) 133 (Conclusion 6(2)).

[181] Draft Conclusions, UN Doc A/73/10 (n 48) 133 (Conclusion 6 Commentary [2]).

[182] Secrétariat Général de la Défense et de la Sécurité Nationale [Secretariat-General for Defence and National Security], Strategic Review of Cyber Defence (Report, February 2018) 10 <http://www.sgdsn.gouv.fr/uploads/2018/03/revue-cyber-resume-in-english.pdf> , archived at <https://perma.cc/XK97-FYXP>.

[183] Ibid.

[184] Ministère de L’Europe et des Affaires Étrangères [Ministry for Europe and Foreign Affairs], ‘Paris Call for Trust and Security in Cyberspace’ (Press Release, 12 November 2018) <https://www.diplomatie.gouv.fr/IMG/pdf/paris_call_text_-_en_cle06f918.pdf>, archived at <https://perma.cc/4K4R-84NY>.

[185] Xi Jinping and Vladimir Vladimirovich Putin, ‘The Joint Statement between the Presidents of the People’s Republic of China and the Russian Federation on Cooperation in Information Space Development’, China Daily (online, 26 June 2016) <https://www.chinadaily.com.cn/china/2016-06/26/content_25856778.htm>, archived at <https://perma.cc/EEK2-QFFD>.

[186] For an unofficial English translation: see ‘International Strategy of Cooperation on Cyberspace’, Xinhua Net (online, 2 March 2017) <http://www.xinhuanet.com//english/china/2017-03/01/c_136094371.htm> , archived at <https://perma.cc/8K2U-KD2B>.

[187] Government of Canada, ‘Joint Statement on Information and Telecommunications in the Context of International Security’ (Press Release, 26 October 2018) <https://www.international.gc.ca/world-monde/international_relations-relations_internationales/un-onu/statements-declarations/2018-10-26-info_telecommunications.aspx?lang=eng>, archived at <https://perma.cc/FC2L-D7LF>. In full, the joint statement was made on behalf of Australia, Canada, Chile, Estonia, Japan, the Netherlands, New Zealand, the Republic of Korea and the UK.

[188] North Sea Continental Shelf (n 128) 43 [74].

[189] Crawford (n 10) 24–5; Draft Conclusions, UN Doc A/73/10 (n 48) 135 (Conclusion 8); North Sea Continental Shelf (n 128) 43 [74].

[190] Crawford (n 10) 25; Draft Conclusions, UN Doc A/73/10 (n 48) 141–2 (Conclusion 10 Commentary [8]); Sovereignty over Pedra Branca v Pulau Batu Puteh, Middle Rocks and South Ledge (Malaysia v Singapore) (Judgment) [2008] ICJ Rep 12, 50–1 [121], citing Delimitation of the Maritime Boundary in the Gulf of Maine Area (Canada v United States of America) (Judgment) [1984] ICJ Rep 246, 305 [130].

[191] Jeremy Wright (n 46).

[192] Arun M Sukumar, ‘The UN GGE Failed. Is International Law in Cyberspace Doomed as Well?’, Lawfare (Blog Post, 4 July 2017) <https://www.lawfareblog.com/un-gge-failed-international-law-cyberspace-doomed-well>, archived at <https://perma.cc/BSD2-DYY8>; Elaine Korzak, ‘UN GGE on Cybersecurity: The End of an Era?’, The Diplomat (online, 31 July 2017) <https://thediplomat.com/2017/07/un-gge-on-cybersecurity-have-china-and-russia-just-made-cyberspace-less-safe>, archived at <https://perma.cc/LWR3-VP66>; Geneva Internet Platform, ‘Digital Policy Trends in June’ (30 June 2017) Digital Watch Newsletter 1, 6 <https://dig.watch/sites/default/files/DWnewsletter22.pdf>, archived at <https://perma.cc/W8PV-RKEK>.

[193] See generally ‘Developments in the Field of Information and Telecommunications in the Context of International Security’, United Nations Office for Disarmament Affairs (Web Page, 26 March 2019) <https://www.un.org/disarmament/ict-security>, archived at <https://perma.cc/DL7X-VDYF>; Developments in the Field of Information and Telecommunications in the Context of International Security: Report of the Secretary-General, 74th sess, Agenda Item 93, UN Doc A/74/120 (24 June 2019).

[194] Advancing Responsible State Behaviour in Cyberspace in the Context of International Security, GA Res 73/266, UN GAOR, 73rd sess, 65th plen mtg, Agenda Item 96, Supp No 49, UN Doc A/RES/73/266 (2 January 2019, adopted 22 December 2018) para 3.

[195] Developments in the Field of Information and Telecommunications in the Context of International Security, GA Res 73/27, UN GAOR, 73rd sess, 45th plen mtg, Agenda Item 96, Supp No 49, UN Doc A/RES/73/27 (11 December 2018, adopted 5 December 2018) 5 paras 5–6.


AustLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.austlii.edu.au/au/journals/MelbJlIntLaw/2019/14.html