Nation-State Cyber Operations Legal Considerations
PDF

Keywords

cyber-attack
cyber defense
Estonia
nation-state cyber operations
prohibition of the use of force

How to Cite

Małecka, A. (2021). Nation-State Cyber Operations Legal Considerations. Safety & Defense, 7(3), 99-108. https://doi.org/10.37105/sd.139

Abstract

States use cyberspace as one of the platforms for pursuing national interests, also in the context of armed conflict. Due to their inherent purpose, certain principles of international law also apply to the activities of entities (state and non-state) in cyberspace. The main research problem was defined as the following question: under what conditions could the terms in international law be used to describe the events in Estonia in 2007 that imply the possibility of eventual responses or demands by victim parties consistent with international standards? In the article, the events in Estonia in 2007 were compared to existing methods of cyber warfare. The main research methods that were used to achieve the essential objective were: analysis of legal documents and critical analysis of the literature on the subject. The analysis is interdisciplinary in nature and will be particularly useful to researchers of international political and/or military relations and those interested in aspects of international security.

https://doi.org/10.37105/sd.139
PDF

References

BBC News. (2007, May 17). The Cyber Raiders Hitting Estonia. http://news.bbc.co.uk/2/hi/europe/6665195.stm

Buchan, R. (2012). Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions? Journal of Conflict and Security Law, 17(2), 212–227. https://doi.org/10.1093/jcsl/krs014

Chung, J. J. (2018). Nation-states and their cyber operations in planting of malware in other countries: Is it legal under international law? University of Pittsburgh Law Review, 80(1), 33–67. https://doi.org/10.5195/lawreview.2018.593

Clark, J. R. (2019). Russia’s Indirect Grand Strategy. Orbis – A Journal of World Affairs, 63(2), 225–39. https://doi.org/10.1016/j.orbis.2019.02.002

Davis, J. (2007, August 21). Hackers Take Down the Most Wired Country in Europe. Wired. https://www.wired.com/2007/08/ff-estonia/

Desouza, K. C., Ahmad, A., Naseer, H., & Sharma, M. (2020). Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT). Computers & Security, 88. https://doi.org/10.1016/j.cose.2019.101606

Estonian Foreign Intelligence Service. (2018). International Security and Estonia 2018. https://www.valisluureamet.ee/doc/raport/2018-en.pdf

Goldsmith, J. (2013). How Cyber Changes the Laws of War. The European Journal of International Law, 24(1), 129–138. https://doi.org/10.1057/9F781137455550_4

Government Office of Estonia. (2007, May 1). Declaration of the Minister of Foreign Affairs of the Republic of Estonia. Government Communication Unit, Government Office of Estonia. https://www.valitsus.ee/en/news/declaration-minister-foreign-affairs-republic-estonia

Haataja, S. (2017). The 2007 cyber attacks against Estonia and international law on the use of force: an informational approach. Journal Law, Innovation and Technology, 9(2), 159–189. https://doi.org/10.1080/17579961.2017.1377914

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), 49-60. http://dx.doi.org/10.5038/1944-0472.4.2.3

Kaldor, M. H. (2012). New & old wars: organized violence in a global era. Stanford University Press.

Koh, H. H. (2012). International Law in Cyberspace. Harvard International Law Journal, 54, 1–12. https://harvardilj.org/2012/12/online_54_koh/

Kostyuk, N., & Zhukov, Y., M. (2019). Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events? Journal of Conflict Resolution, 63(2), 317–347. https://doi.org/10.1177/0022002717737138

Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, I.C.J. Rep. 1996. https://www.refworld.org/cases,ICJ,4b2913d62.html

NATO Strategic Communications Centre of Excellence. (2017). Hybrid Threats: 2007 cyber attacks on Estonia. https://www.stratcomcoe.org/hybrid-threats-2007-cyber attacks-estonia

Nicaragua v. United States of America, I.C.J. Rep. 14 (1986). https://www.refworld.org/cases,ICJ,4023a44d2.html

Ottis, R. (2008). Analysis of the 2007 Cyber Attacks Against Estonia from the Information Warfare Perspective. Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/uploads/2018/10/Ottis2008_AnalysisOf2007FromTheInformationWarfarePerspective.pdf

Pettersson, T., & Öberg, M. (2020). Organized violence, 1989–2019. Journal of Peace Research, 57(4), 597–613. https://doi.org/10.1177/0022343320934986

Prosecutor v. Dusko Tadic aka "Dule", Case No. IT-94-1 Int. Crim. Trib. for the For-mer Yugoslavia (1995). https://www.refworld.org/cases,ICTY,47fdfb520.html

Protocol Additional to the Geneva Conventions of August 12 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I), June 8, 1977.

Rid, T. (2012). Cyber War Will Not Take Place. Journal of Strategic Studies, 35(1), 5–32. https://doi.org/10.1080/01402390.2011.608939

Rid, T., & Buchanan, B. (2015). Attributing Cyber Attacks. Journal of Strategic Studies, 38(1–2), 4–37. https://doi.org/10.1080/01402390.2014.977382

Schmitt, M. N. (1999). Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. The Columbia Journal of Transnational Law, 37(3), XV.

Schmitt, M. N. (2011). Cyber Operations and the Jus Ad Bellum Revisited. Villanova Law Review, 56(3), 569-606. https://ssrn.com/abstract=2184850

Schmitt, M. N. (2012a). 'Attack' as a Term of Art in International Law: The Cyber Operations Context. https://ccdcoe.org/uploads/2012/01/5_2_Schmitt_AttackAsATermOfArt.pdf

Schmitt, M. N. (2012b). Classification of Cyber Conflict. Journal of Conflict and Security Law, 17(2), 245-260. https://doi.org/10.1093/jcsl/krs018

Schmitt, M. N. (Ed.). (2017). Tallinn Manual (2.0) on the international law applicable to cyber operations, second edition, prepared by the International Group of Experts at the Invitation of the NATO. Cambridge University Press.

Tikk, E., Kaska, K., & Vihul, L. (2010). International Cyber Incidents: Legal Considerations. Cooperative Cyber Defence Centre of Excellence. https://ccdcoe.org/uploads/2018/10/legalconsiderations_0.pdf

U.N. Charter art. 2, para. 4.

U.N. Charter art. 51.

Verizon Communications, Inc. (2020). The Verizon Business 2020 Data Breach Investigations Report. https://enterprise.verizon.com/content/verizonenterprise/us/en/index/resources/reports/2020-data-breach-investigations-report.pdf

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.