About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

1 1 (June 25, 2024)

handle is hein.crs/goveppr0001 and id is 1 raw text is: Use of Force in Cyberspace
Introduction
There are presently no internationally accepted criteria for
determining whether a nation state cyberattack is a use of
force equivalent to an armed attack, which could trigger a
military response. Likewise, no international, legally
binding instruments have yet been drafted explicitly to
regulate inter-state relations in cyberspace. Self-defense and
countermeasures for armed attacks are permitted in
international law when a belligerent violates international
law during peacetime, or violates the law of armed conflict
(LOAC) during wartime. However, the term armed attack
has no universally accepted definition with respect to
cyberattacks. In addition to what constitutes an armed
attack in cyberspace, questions remain over which
provisions of existing international law govern the conduct
of war in cyberspace.
Relevant Treaty Provisions
North Atlantic Treaty Article 4: The Parties will consult
together whenever, in the opinion of any of them, the
territorial integrity, political independence or security of any
of the Parties is threatened.
North Atlantic Treaty Article 5: The Parties agree that
an armed attack against one or more of them in Europe or
North America shall be considered an attack against them all
and consequently they agree that, if such an armed attack
occurs, each of them, in exercise of the right of individual or
collective self-defence recognised by Article 51 of the Charter
of the United Nations, will assist the Party or Parties so
attacked by taking forthwith, individually and in concert with
the other Parties, such action as it deems necessary, including
the use of armed force, to restore and maintain the security
of the North Atlantic area.
United Nations Charter Article 51: Nothing in the
present Charter shall impair the inherent right of individual or
collective self-defence if an armed attack occurs against a
Member of the United Nations, until the Security Council has
taken measures necessary to maintain international peace and
security.
United States Doctrine
In September 2012, the State Department took a public
position on whether cyber activities could constitute a use
of force under Article 2(4) of the United Nations (U.N.)
Charter and customary international law. According to
State's then-legal advisor, Harold Kok Cyber activities
that proximately result in death, injury, or significant
destruction would likely be viewed as a use of force.
Examples included triggering a meltdown at a nuclear
plant, opening a dam and causing flood damage, and
causing airplanes to crash by interfering with air traffic
control. By focusing on the ends achieved rather than the

Updated June 25, 2024

means with which they are carried out, this definition of
cyber war arguably fits within existing international legal
frameworks. If an actor employs a cyber weapon to produce
kinetic effects that might replicate fire power under other
circumstances, then the use of that cyber weapon rises to
the level of the use of force. However, the United States
recognizes that cyberattacks without kinetic effects are also
an element of armed conflict under certain circumstances.
Koh explained that cyberattacks on information networks in
the course of an ongoing armed conflict would be governed
by the same principles of proportionality that apply to other
actions under the LOAC. These principles include
retaliation in response to a cyberattack with a proportional
use of kinetic force. In addition, computer network
activities that amount to an armed attack or imminent threat
thereof' may trigger a nation's right to self-defense under
Article 51 of the U.N. Charter. The 2011 International
Strategy for Cyberspace affirmed that when warranted, the
United States will respond to hostile acts in cyberspace as
we would to any other threat to our country. The 2024
International Cyberspace & Digital Policy Strategy states
that the United States is working to advance responsible
state behavior based on a U.N.-endorsed framework on the
applicability of existing international law, adherence to
globally accepted and voluntary norms of state behavior in
peacetime, development and implementation of confidence-
building measures to reduce the risk of conflict in
cyberspace. It refers to the 2023 Department of Defense
(DOD) Cyber Strategy goal to reinforce responsible state
behavior by encouraging adherence to international law and
internationally recognized cyberspace norms. Chapter XVI
of the DOD Law of War Manual notes that the United
States strives to work with other states to clarify not
whether international law applies to cyberspace, but how.
Both the Departments of State and Defense contend that
cyberattacks rising to the level of an armed attack may
trigger mutual defense treaty obligations, though an armed
attack in cyberspace remains undefined.
NATO Doctrine
In 2009, the North Atlantic Treaty Organization (NATO)
Cooperative Cyber Defense Center convened an
international group of independent experts to draft a manual
on the law governing cyber conflict. The first Tallinn
Manual, as it is known, was published in 2013 and offers
95 black letter rules addressing sovereignty, state
responsibility, the LOAC, humanitarian law, and the law of
neutrality. The Tallinn Manual is an academic text and as
such nonbinding. The February 2017 Tallinn Manual 2.0
expands upon the first and offers 154 black letter rules
governing cyber operations, including in peacetime. In the
provisions of Article 5 of the North Atlantic Treaty, an
attack on one member is considered an attack on all,
affording military assistance in accordance with Article 51

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Already a HeinOnline Subscriber?

profiles profiles most