forked from rahuldeve/Diversification-Dataset
-
Notifications
You must be signed in to change notification settings - Fork 0
/
36-2-waxman-cyber-attacks-and-the-use-of-force.txt
2822 lines (2053 loc) · 153 KB
/
36-2-waxman-cyber-attacks-and-the-use-of-force.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
Article
Cyber-Attacks and the Use of Force: Back to the
Future of Article 2(4)
Matthew C. Waxman
I.
II.
III.
IV.
V.
INTRODUCTION .............................................................................................................................. 421
ARTICLE 2(4) AND THE MEANING OF FORCE ............................................................................ 426
A.
Historical Divides over Charter Interpretation ............................................................... 427
Force as Armed Violence ..................................................................................... 427
1.
2.
Force as Coercion ................................................................................................ 428
3.
Force as Interference ........................................................................................... 429
B.
Cyber-Threats and Emergent U.S. Interpretation ............................................................ 431
C.
An Interpretive Reorientation ........................................................................................... 437
CYBER-ATTACKS AND CHANGING MODES OF CONFLICT ............................................................ 440
A.
Cold War Conflict and the U.N. Charter ......................................................................... 441
B.
Legal Process, Enforcement Challenges, and Technologies of Conflict .................... 443
THE LAW OF CYBER-WARFARE AND THE DISTRIBUTION OF POWER .......................................... 448
Cold War Power Relations and the U.N. Charter ........................................................... 449
A.
B.
Technology, Power Shifts, and the Strategic Logic of Legal Interpretation ................... 450
C.
Divergent Interests and Implications for Charter Interpretation .................................... 454
CONCLUSION ................................................................................................................................. 458
I.
INTRODUCTION
Suppose that the United States, in opposing Irans suspected development
of nuclear weapons, decides that the best way to halt or slow Irans program is
to undermine the Iranian banking system, calculating that the ensuing financial
pressure would dissuade or prevent Iran from continuing on its current course.
And further suppose that the United States draws up the following four options,
all of which are believed likely to produce roughly the same impact on Irans
financial system and have similar effects on Irans economy and population:
(1) Military air strikes against key Iranian banking facilities to destroy some
of the financial systems physical infrastructure;
Associate Professor, Columbia Law School; Adjunct Senior Fellow, Council on Foreign
Relations; Member of the Hoover Institution Task Force on National Security and Law. I thank the
following for their comments on earlier drafts of this paper: Gabriella Blum, Philip Bobbitt, Jeffrey
Cooper, Ashley Deeks, Joshua Dorosin, Colleen Garcia, Jack Goldsmith, Duncan Hollis, Eric Jensen,
Sean Kanuck, David Kaye, Andrew McLaughlin, Saira Mohamed, Daniel Prieto, Adam Segal, Bo
Simmons, Paul Stephan, Tim Wu, and workshop participants at Columbia Law School and the Hoover
Institution Task Force on National Security and Law.
422
THE YALE JOURNAL OF INTERNATIONAL LAW
[Vol. 36: 421
(2) A regulatory cut-off of Iranian banks from the U.S. financial system,
making it difficult for Iran to conduct dollarized transactions;1
(3) Covert flooding of the Iranian economy with counterfeit currency and
other financial instruments;
(4) Scrambling Iranian banking data by infiltrating and corrupting its
financial sectors computer networks.
Which of these options constitute uses of force, subject to the U.N. Charters
prohibitions and self-defense provisions?
I pose this set of hypothetical options for several reasons. First, it is an
exercise in legal line drawing. The development and deployment of new
technologiesboth their offensive potential and the vulnerabilities they create
for states reliant on those technologiesraise questions about permissible
versus impermissible modes of interstate conduct and conflict. Military attacks
are generally illegal, with exceptions for self-defense or when authorized by the
U.N. Security Council.2 Most economic and diplomatic measures, even if they
exact tremendous costs on target states (including significant loss of life), are
generally not barred by the U.N. Charter, though some of them may be barred
by other legal principles.3 Where along the spectrum of permissible to
impermissible conduct do various types of cyber-attacks lie?
Definitions of cyber-attacks vary, and the range of hostile activities that
can be carried out over information networks is immense, ranging from
malicious hacking and defacement of websites to large-scale destruction of the
military or civilian infrastructures that rely on those networks. By cyber-
attacks I mean efforts to alter, disrupt, or destroy computer systems or
networks or the information or programs on them,4 which is still a broad
category. That breadthencompassing activities that range in target (military
versus civilian, public versus private), consequences (minor versus major,
direct versus indirect), and duration (temporary versus long-term)is part of
what makes international legal interpretation or regulation in this area so
difficult.
Global
through
interconnectedness brought about
For a discussion of this capability, see Juan C. Zarate, Harnessing the Financial Furies:
linked digital
information networks brings immense benefits, but it also places a new set of
offensive weapons in the hands of states and nonstate actors, including terrorist
groups.5 Military defense networks can be remotely disabled or damaged.6
Smart Financial Power and National Security, WASH. Q., Oct. 2009, at 43.
See infra notes 19-31 and accompanying text.
See infra notes 32-36 and accompanying text.
This definition is based heavily on the one used in COMM. ON OFFENSIVE INFO. WARFARE,
NATL RESEARCH COUNCIL, TECHNOLOGY, POLICY, LAW, AND ETHICS REGARDING U.S. ACQUISITION
AND USE OF CYBERATTACK CAPABILITIES 10-11 (2009) [hereinafter NRC COMMITTEE REPORT].
Estimates vary widely about the threat of cyber-attacks and cyber-war. Former Director of
National Intelligence Michael McConnell argues that [t]he United States is fighting a cyber-war today,
and we are losing. . . . As the most wired nation on Earth, we offer the most targets of significance, yet
our cyber-defenses are woefully lacking. Mike McConnell, To Win the Cyber-War, Look to the Cold
War, WASH. POST, Feb. 28, 2010, at B1. Others experts believe that cyber-espionagestealing
government and corporate secrets through infiltration of information systemsis a major challenge, but
1.
2.
3.
4.
5.
2011]
Cyber-Attacks and the Use of Force
423
Private sector networks can be infiltrated, disrupted, or destroyed.7 Denial of
service attacksflooding an Internet site, server, or router with data requests
to overwhelm its capacity to functioncan be used to take down major
information networks. This method of attack was demonstrated in Estonia (one
of the most wired nations in the world) during a period of diplomatic tensions
with Russia in 2007,8 when such attacks disrupted government and commercial
functions for weeks, including banking, media, and communications.9 More
recently, it has been widely reported that a computer code dubbed Stuxnet,
perhaps created and deployed by the United States or Israel, infected and
significantly impaired Irans uranium enrichment program by disrupting parts
of its control system.10
The London-based International Institute for Strategic Studies recently
highlighted the growing consensus that future conflicts may feature the use
of cyber-warfare to disable a countrys infrastructure, meddle with the integrity
of another countrys internal military data, try to confuse its financial
transactions or to accomplish any number of other possibly crippling aims.11 A
that threat assessments of major cyber-attacks are overblown. See Seymour M. Hersh, The Online
Threat, NEW YORKER, Nov. 1, 2010, at 44, 48.
Many experts assess that terrorist or criminal groups pose cyber-threats, too, but that for now the
greatest potential for damage through cyber-attacks lies with a handful of states. See CTR. FOR
STRATEGIC & INTL STUDIES, SECURING CYBERSPACE FOR THE 44TH PRESIDENCY 13 (2008), available
at http://csis.org/files/media/csis/pubs/081208_securingcyberspace_44.pdf
(Our most dangerous
opponents are the militaries and intelligence services of other nations. They are sophisticated, well
resourced, and persistent. Their intentions are clear, and their successes are notable.); Bill Gertz, China
Bolsters for Cyber Arms Race with U.S., WASH. TIMES, May 12, 2009, at A1 (discussing Russia and
China as the main peers to the United States in cyber-warfare capability). This is not to deny that
terrorist or criminal groups also pose a significant threat. See William J. Lynn III, Defending a New
Domain: The Pentagons Cyberstrategy, FOREIGN AFF., Sept./Oct. 2010, at 97, 101. Thus far, however,
terrorist groups have focused their cyber-activities on propaganda. See War in the Fifth Domain: Are the
Mouse and Keyboard the New Weapons of Conflict?, ECONOMIST, July 1, 2010, at 25, 27. The
possibility that terrorist groups or other nonstate or private actors might resort to cyber-attacks would
also raise questions of state attribution. For example, questions arise as to whether actions by nonstate
actors may legally be imputed to a state that allowed the cyber-attacks to occur in its territory or
supported the attackers in other ways. The fact that a state may use a third-party states territory,
infrastructure, or information systems as part of an offensive or defensive cyber-operation also
implicates a host of self-defense issues and questions under neutrality law. For a discussion of these
issues, see Eric Talbot Jensen, Computer Attacks on Critical National Infrastructure: A Use of Force
Invoking the Right of Self-Defense, 38 STAN. J. INTL L. 207, 232-39 (2002); see also infra note 171
(noting issues involved with attempting to attribute nonstate actors attacks to state supporters).
See Lynn, supra note 5, at 97.
For a discussion of offensive cyber-attack capabilities and scenarios, see id. at 100-01.
See Evgeny Morozov, The Fog of Cyberwar, NEWSWEEK (Apr. 18, 2009), http://www
.newsweek.com/2009/04/17/the-fog-of-cyberwar.html; John Schwartz, When Computers Attack, N.Y.
TIMES, June 24, 2007, at 1; Ian Traynor, Russia Accused of Unleashing Cyberwar To Disable Estonia,
GUARDIAN, May 17, 2007, at 1.
See Scott J. Shackelford, From Nuclear War to Net War: Analogizing Cyber Attacks in
International Law, 27 BERKELEY J. INTL L. 192, 193-94 (2009). According to the Estonian Defense
Minister, All major commercial banks, telcos, media outlets, and name serversthe phone books of the
Internetfelt the impact, and this affected the majority of the Estonian population. This was the first
time that a botnet threatened the national security of an entire nation. Joshua Davis, Web War One,
WIRED, Sept. 2007, at 165, 165 (quoting the Estonian Defense Minister).
E. Sanger, Iran Fights Malware Attacking Computers, N.Y. TIMES, Sept. 26, 2010, at 4.
11. Press Release, John Chipman, Dir.-Gen. & Chief Exec., Intl Inst. for Strategic Studies,
Military Balance 2010Press Statement (Feb. 3, 2010), available at http://www.iiss.org/publications/
military-balance/the-military-balance-2010/military-balance-2010-press-statement/.
10. See Ken Dilanian, Iran and the Era of Cyber War, L.A. TIMES, Jan. 17, 2011, at A1; David
6.
7.
8.
9.
424
THE YALE JOURNAL OF INTERNATIONAL LAW
[Vol. 36: 421
and
creates
U.N.-convened panel of governmental experts recently echoed that conclusion,
noting that existing and potential threats in the sphere of information security
are among the most serious challenges of the twenty-first century. . . . Their
effects carry significant risk for public safety, the security of nations and the
stability of the globally linked international community as a whole.12 In short,
electronic
tremendous
vulnerabilities, and some experts speculate that the United States may be
especially at risk because of its high economic and military dependency on
networked information technology.13
interconnectivity
informational
Computer information system capabilities and vulnerabilities raise
international legal questions of tremendous public policy import. What are the
permissible uses of offensive cyber-capabilities? To what extent is existing
international law adequate to regulate these capabilities today and in the future?
And what international legal authority do states have to respond, including with
military force, to cyber-attacks or cyber-threats by states or nonstate actors?
Note that I am concerned here with jus ad bellum issuesincluding whether
cyber-attacks constitute an act of aggression or would justify resort to armed
force in responsebut not jus in bello issues, that is, how the laws of war
would govern the use of cyber-attacks during an ongoing armed conflict.14
Besides illustrating some new interpretive challenges with regard to the
U.N. Charter, another reason I pose the opening hypothetical is to illustrate that
legal line drawing with respect to cyber-attacks will produce winners and
losers, and to illuminate the implications of those disparate effects for
international legal development. States have different capabilities and different
vulnerabilities to those capabilities. Not all states, for example, have the
financial and trade muscle to coerce other states economically, and states have
varying strength to withstand economic pressure. The same is true of cyber-
attack and defense capabilities, so legal rules that affect the costs of using
cyber-attacks have disparate strategic consequences. Legal line drawing with
respect to the use of force and modes of conflict has distributive effects on
power, and is therefore likely to be shaped by power relations.15 For major
in the Context of Intl Sec., 65th Sess., 1, U.N. Doc. A/65/201 (July 30, 2010).
13. See NRC COMMITTEE REPORT, supra note 4, at 18-20; Walter Gary Sharp, Sr., The Past,
Present, and Future of Cybersecurity, 4 J. NATL SECURITY L. & POLY 13 (2010). For a discussion of
early U.S. government concerns about such vulnerabilities during the 1990s, see Charles J. Dunlap, Jr.,
How We Lost the High-Tech War of 2007: A Warning from the Future, WKLY. STANDARD, Jan. 29,
1996, at 22; and Mark Thompson & Douglas Waller, Onward Cyber Soldiers, TIME, Aug. 21, 1995, at
38.
14. For a discussion of jus in bello issues in relation to cyber-attacks, see, for example, NRC
COMMITTEE REPORT, supra note 4, at 262-68. In many future cases, the most vexing legal questions will
not involve whether a cyber-attack alone is legally prohibited or justifies self-defense, but rather whether
cyber-attacks are a legal means of engaging in a conflict that has already erupted. A useful illustration is
Russias alleged cyber-attacks on Georgian public and private information networks during the 2008
conflict amid significant conventional military operations. See 2 REPORT OF THE INDEPENDENT
INTERNATIONAL FACT-FINDING MISSION ON THE CONFLICT IN GEORGIA 217-19 (2009), available at
http://www.ceiig.ch/pdf/IIFFMCG_Volume_II.pdf.
15. For a discussion of the distributive effects of international use of force rules, see Matthew
C. Waxman, Self-Defense and the Limits of WMD Intelligence, in FUTURE CHALLENGES IN NATIONAL
SECURITY AND LAW 14-15 (Peter Berkowitz ed., 2010), available at http://www.hoover.org/taskforces/
12. See Rep. of the Grp. of Governmental Experts on Dev. in the Field of Info. & Telecomm.
2011]
Cyber-Attacks and the Use of Force
425
actors like the United States, aligning legal interpretation with strategic
interests is exceptionally difficult because the future effects of information
technology on power and conflict remain so uncertain.
To better understand contemporary relationships between international
law regulating force and cutting-edge technologies, this Article looks backward
in time to international legal disputes and scholarly debates of the Cold War. A
central theme is that these fundamental issues are not entirely new or unique to
cyber-technology, even if they have new dimensions that make them harder to
solve or navigate. Modes and technologies of conflict change, and the law
adjusts with varying degrees of success to deal with them.16 Throughout the
U.N. Charter regimes sixty-plus years of development, the means by which
states and international actors wage conflict has changed so dramatically that
every so often major international legal figures debate whether the Charters
most basic tenets are dead.17 Cyber-warfare capabilities and vulnerabilities
will strain the Charter and its basic prohibition on force once again, and the
lessons of history can help us understand how.
This Article makes two overarching arguments. First, strategy is a major
driver of legal evolution. Most scholarship and commentary on cyber-attacks
capture only one dimension of this point, focusing on how international law
might be interpreted or amended to take account of new technologies and
threats. The focus here, however, is on the dynamic interplay of law and
strategystrategy generates reappraisal and revision of law, while law itself
shapes strategyand the moves and countermoves among actors with varying
interests, capabilities, and vulnerabilities. The purpose is not to come down in
favor of one legal interpretation or another, and the conclusions are necessarily
speculative because no governments speak in much detail about their cyber-
warfare capabilities and strategies at this point. There are downside risks and
tensions inherent in any plausible approach, though, and this analysis helps in
understanding their implications.
interests
that will pull
Second, it will be difficult to achieve international agreement on legal
interpretation and to enforce it with respect to cyber-attacks.18 The current
trajectory of U.S. interpretation is a reasonable effort to overcome the
translation problems inherent in a U.N. Charter built for a different era of
conflict. However, not only do certain features of cyber-activities make
international legal regulation very difficult, but major actors also have
divergent strategic
their preferred doctrinal
interpretations and aspirations in different directions, impeding formation of a
national-security/challenges.
16. See Yoram Dinstein, Computer Network Attacks and Self-Defense, 76 INTL L. STUD. 99,
114-15 (2002) (The novelty of a weaponany weaponalways baffles statesmen and lawyers, many
of whom are perplexed by technological innovation. . . . [A]fter a period of gestation, it usually dawns
on belligerent parties that there is no insuperable difficulty in applying the general principles and rules
of international law to the novel weapon . . . .).
17. See, e.g., David Wippman, The Nine Lives of Article 2(4), 16 MINN. J. INTL L. 387 (2007).
18.
In that regard, I am less sanguine than scholars like Anthony DAmato, who predict[s]
that attacks on the Internet will soon be seen as clearly illegal under international law and suggests that
customary international law [may have] already reached that position. Anthony DAmato,
International Law, Cybernetics, and Cyberspace, 76 INTL L. STUD. 59, 67 (1999).
426
THE YALE JOURNAL OF INTERNATIONAL LAW
[Vol. 36: 421
stable international consensus. U.S. policymakers should therefore prepare to
operate in a highly contested and uncertain legal environment. The prescription
is not to abandon interpretive or multilateral legal efforts to regulate cyber-
attacks; rather, it is to recognize the likely limits of these efforts and to consider
the implications of legal proposals or negotiations in the context of broader
security strategy.
The Article proceeds as follows. Part II dissects a long-running debate
over the meaning of force and armed attack in Articles 2(4) and 51 of the
U.N. Charter, and examines the challenges of fitting cyber-attacks into existing
legal categories. This Part does not offer a doctrinal conclusion about where the
lines should ultimately be drawn, though it discusses the most salient merits
and problems of alternative interpretations. Instead, this Part uses the
hypothetical options laid out above as a way to illustrate the implications of
competing interpretations, which echo past interpretive disputes. It also
describes the general thrust of U.S. government doctrinal thinking about cyber-
warfare and the regulation of force, which emphasizes the effects of cyber-
attacks in analyzing whether they cross the U.N. Charters legal thresholds.
Part III considers parallels between cyber-warfare and the low-intensity
conflict or proxy warfare waged by the superpowers and their clients during
the Cold War. As in that latter context, the low visibility of states moves and
countermoves in cyberspace will slow the process of interpretive development.
This Part draws on Cold War lessons to argue that Article 2(4) will probably be
a weak constraint on offensive cyber-attacks because of, among other reasons,
the difficulty of observing them and attributing them to their sources or
sponsors. Those weaknesses will also likely plague any attempt to negotiate
and enforce new international agreements limiting cyber-warfare.
Part IV draws again on early Charter history to argue that interpretations
of Articles 2(4) and 51 have distributive effects on power and therefore have
strategic consequences. Rather than urging one interpretation or another, this
Part aims to shed light on the strategic logic likely driving U.S. legal thinking,
and it urges a more cautious and multidimensional assessment than is usually
found in this burgeoning scholarly field. Whether emergent U.S. interpretations
of the Charter serve U.S. interests or broader international societal goals of
global order depends on the validity of assumptions about an unpredictable
future security environment.
II. ARTICLE 2(4) AND THE MEANING OF FORCE
Modern legal regulation of the use of force begins with the U.N. Charter,
specifically Article 2(4). That provision directs that [a]ll Members shall
refrain in their international relations from the threat or use of force against the
territorial integrity or political independence of any state, or in any other
manner inconsistent with the Purposes of the United Nations.19 Article 51 of
the Charter then provides that [n]othing in the present Charter shall impair the
19. U.N. Charter art. 2, para. 4.
2011]
Cyber-Attacks and the Use of Force
427
inherent right of individual or collective self-defence if an armed attack occurs
against a Member of the United Nations.20 Although there is significant debate
about the scope of the self-defense right to resort to military force, it is
generally agreed that Article 51 carves out an exception to Article 2(4)s
otherwise strict prohibition of force,21 and it is widely understood that armed
attack is, although closely related, a narrower category than threat or use of
force.22
With respect to offensive cyber-capabilities and the U.N. Charter, then,
these provisions raise two major issues. First, in terms of Article 2(4), might
certain types of cyber-attacks constitute a prohibited use of force? This
question has to do with whether the existing legal framework imposes
significant constraints on hostile cyber-activities. Second, in terms of Article
51, might a cyber-attack give rise to a right to use military force in response?23
This question raises the additional issue of what remedies are available to states
that suffer cyber-attacks or threats of them.
A. Historical Divides over Charter Interpretation
Article 2(4)s express prohibition is both straightforward and ambiguous.
It is direct and absolute on its face, yet, as Oscar Schachter observed, [t]he
paragraph is complex in its structure[,] and nearly all of its key terms raise
questions of interpretation.24 As the opening hypothetical helps illustrate, new
technologies raise interpretive puzzles with echoes of previous eras.
1.
Force as Armed Violence
Id. art. 51.
20.
21. See THOMAS M. FRANCK, RECOURSE TO FORCE: STATE ACTION AGAINST THREATS AND
The dominant view in the United States and among its major allies has
long been that the Article 2(4) prohibition of force and the complementary
Article 51 right of self-defense apply to military attacks or armed violence.25
ARMED ATTACKS 45-52 (2002).
22. See Albrecht Randelzhofer, Article 51, in 1 THE CHARTER OF THE UNITED NATIONS: A
COMMENTARY 788, 796 (Bruno Simma ed., 2d ed. 2002). The U.S. position on this issue, which differs
from that of many states and authorities, is discussed infra Section II.C.
23. For a survey of approaches to these legal questions, see Daniel B. Silver, Computer
Network Attack as a Use of Force Under Article 2(4) of the United Nations Charter, 76 INTL L. STUD.
73 (2002). There is continuing debate about whether there is a gap between Articles 2(4) and 51, insofar
as a use of force prohibited by Article 2(4) might not be sufficient to trigger a right to use military force
in self-defense. See Randelzhofer, supra note 22, at 790.
(1984).
25. See NRC COMMITTEE REPORT, supra note 4, at 253 (Traditional [law of armed conflict]
emphasizes death or physical injury to people and destruction of physical property as criteria for the
definitions of use of force and armed attack.); Tom J. Farer, Political and Economic Coercion in
Contemporary International Law, 79 AM. J. INTL L. 405, 408-09 (1985) (describing two main
interpretations of Articles 2(4) and 51, and arguing that only the one wherein the only justification for
force is prior (or imminent) armed force by ones adversary is logically sound); Albrecht Randelzhofer,
Article 2(4), in 1 THE CHARTER OF THE UNITED NATIONS: A COMMENTARY, supra note 22, at 112, 117
(noting that the term force, as used in Article 2(4) is, according to the correct and prevailing view,
limited to armed force); Bert V. A. Roling, The Ban on the Use of Force and the U.N. Charter, in THE
CURRENT LEGAL REGULATION OF THE USE OF FORCE 3, 3 (A. Cassese ed., 1986) (It seems obvious to
24. Oscar Schachter, The Right of States To Use Armed Force, 82 MICH. L. REV. 1620, 1624
428
THE YALE JOURNAL OF INTERNATIONAL LAW
[Vol. 36: 421
The plain meaning of the text supports this view, as do other structural aspects
of the U.N. Charter. For example, the Charters preamble sets out the goal that
armed force . . . not be used save in the common interest.26 Similarly,
Articles 41 and 42 authorize, respectively, the Security Council to take actions
not involving armed force and, should those measures be inadequate, to
escalate to armed force.27 Moreover, Article 51 speaks of self-defense against
armed attacks.28 There are textual counter-arguments, such as that Article
51s more specific limit to armed attacks suggests that drafters envisioned
prohibited force as a broader category not limited to particular methods.
However, the discussions of means throughout the Charter and the documents
negotiating history strongly suggest the drafters intention to regulate armed
force differently and more strictly than other coercive instruments.29 This
interpretation has generally prevailed over alternatives outlined below.
Under the strictest version of this approach, only the first scenario
described abovea military strike against Iranian banking facilitiescould
violate Article 2(4) (unless it were authorized by the Security Council or
justified as self-defense) or could itself give rise to a right of armed self-
defense.30 The other scenarios (financial regulatory measures, covert economic
disruptions, or computer network attacks) may or may not be unlawful under
international law for other reasons,31 but only the first involves an attack with
military violence.
2.
Force as Coercion
Id. arts. 41-42.
Id. art. 51.
Another view of Article 2(4) reads its purpose more expansively and
looks not at the instrument used but its general effect: that it prohibits coercion.
Armed force is only one instrument of coercion, and the easiest to identify.
This interpretation of Article 2(4) stresses its purpose over its text. At various
times, some statesusually those of the developing world, and, during the
Cold War, often with Soviet bloc support32pushed the notion that force
the present writer that the force referred to in Art. 2(4) is military force.).
26. U.N. Charter pmbl. (emphasis added).
27.
28.
29. See Michael N. Schmitt, Computer Network Attack and the Use of Force in International
Law: Thoughts on a Normative Framework, 37 COLUM. J. TRANSNATL L. 885, 905 (1999); see also
Marco Roscini, World Wide WarfareJus ad Bellum and the Use of Cyber Force, 14 MAX PLANCK
Y.B. UNITED NATIONS L. 85, 105 (2010) (noting that early Charter history and [t]he travaux
preparatoires also reveal that the drafters did not intend to extend the prohibition to economic coercion
and political pressures.).
30. Although this example raises a separate legal question as to whether such an attack on
civilian infrastructure would violate the jus in bello principle of distinction, as previously mentioned this
Article focuses on jus ad bellum issues.
31. See infra note 60; see also Military and Paramilitary Activities in and Against Nicaragua
(Nicar. v. U.S.), 1986 I.C.J. 14, 202 (June 27) (The principle of non-intervention involves the right of
every sovereign State to conduct its affairs without outside interference. . . . Expressions of an opinio
juris regarding the existence of this principle . . . are numerous . . . .).
32. For an influential Soviet perspective, see GRIGORI TUNKIN, LAW AND FORCE IN THE
INTERNATIONAL SYSTEM (Progress Publishers trans., 1985). Tunkin wrote that [i]n the literature of
socialist states on international law a broad interpretation of force is defended, while a narrow
interpretation of that concept prevails in the literature of capitalist states according to which force in
2011]
Cyber-Attacks and the Use of Force
429
includes other forms of pressure, including political and economic coercion
threatening to state autonomy.33 Debates similar to that over the definition of
force and armed attack in Articles 2(4) and 51 have played out in the U.N.
General Assembly over the definition of aggression, with the United States
and its Western allies pushing a narrow definition focused on military attacks,
and developing states pushing an expansive definition including other forms of
coercion or economic pressure.34
Under this approach, any or all of the four hypothesized scenarios could
conceivably constitute prohibited force. Each is intended and is likely to
exert coercive pressure on Iran to forego its nuclear ambitions by exacting or
threatening crippling costs to its financial sector. A further extension of this
approach might go so far as to say that economic coercion could be so intense
as to justify armed force in self-defense under Article 51.35 One problem with
this approach has always been the difficulty of distinguishing unlawful
coercion from lawful pressure. After all, coercion in a general sense is ever-
present in international affairs and a part of everyday diplomacy and
statecraft.36
3.
Force as Interference
A third possible approach to interpreting Articles 2(4) and 51 would focus
on the violation and defense of rightsspecifically, a states right of sovereign
dominion. Such an approach ties the concept of force to improper interference
with the rights of other states, focusing on the object and specific character of a
states actions rather than a narrow set of means or their coercive effect.37 The
the sense employed in the United Nations Charter refers only to armed force. Id. at 82. He went on to
write that [t]here is no doubt that the use of economic force, for example, by one or more states against
one or more other states may represent a very considerable threat to the political independence of states,
particularly if they are small, and may produce a significant destabilisation of international relations
. . . . Id. However, the Soviet bloc did not always side with the developing world on these questions:
[I]n the realm of force two groupings (socialist and developing countries) tend to agree only up to a
point, whereas on certain issues the goals and interests of the USSR coincide with those of the U.S. and
a few Western Great Powers. Antonio Cassese, Return to Westphalia? Considerations on the Gradual
Erosion of the Charter System, in THE CURRENT LEGAL REGULATION OF THE USE OF FORCE, supra note
25, at 505, 508.
33. See AHMED M. RIFAAT, INTERNATIONAL AGGRESSION: A STUDY OF THE LEGAL CONCEPT
120, 234 (1980); Hans Kelsen, General International Law and the Law of the United Nations, in THE
UNITED NATIONS: TEN YEARS LEGAL PROGRESS 1, 5 (1956) (It is . . . quite possible to interpret this
provision to mean the Members are forbidden not only to use armed force, but also non-armed force
constituted by an illegal action directed against another Member without its consent . . . .);
Randelzhofer, supra note 22, at 118 (The developing countries and formerly the Eastern bloc countries
have repeatedly claimed that the prohibition of the use of force also comprises other forms of force, for
instance, political and, in particular, economic coercion.).
34. See JULIUS STONE, CONFLICT THROUGH CONSENSUS 115-36 (1977).
35. See Oscar Schachter, In Defense of International Rules on the Use of Force, 53 U. CHI. L.
REV. 113, 121-44 (1986) (discussing pressures to revise the limits on self-defense drawn by the U.N.
Charter but arguing against moves to do so).
36. See Farer, supra note 25, at 406; Alexander L. George, Coercive Diplomacy: Definition
and Characteristics, in THE LIMITS OF COERCIVE DIPLOMACY 7, 7-11 (Alexander L. George & William
E. Simons eds., 2d ed. 1994).
37. As Quincy Wright explained in 1960:
Domain, like property in systems of national law, implies the right to use, enjoy and
transfer without interference from others, and the obligation to each state to respect the
430
THE YALE JOURNAL OF INTERNATIONAL LAW
[Vol. 36: 421
issue of subversive intervention, or interference with other states political
systems, was of particular concern in the U.N. General Assembly during the
early Cold War.38 States advocating expansive interpretations of prohibited
force that would include subversion sought to hermetically seal their domestic
system from outside interference while still participating in the broader
international political community. In a similar way, some states today want the
benefits of international informational connectivity while insulating their
computer and communication networks from outside influences or intrusions
deemed hostile or undermining.
Reading Article 2(4)s prohibition of force to include such intrusion into
another sovereigns domain would lead to the conclusion that the fourth
scenario abovecyber-attackis equally prohibited as the first and third
military attacks and covert financial intrusion.39 The secondfinancial
sanctionsmight be excluded from the prohibition on the ground that the
United States has its own sovereign right to choose with whom it wants to
conduct commerce.
Like past efforts to define Article 2(4) force as coercion, efforts to
expand its coverage beyond armed force so as to include violations of
sovereign domain such as propaganda or political subversion never gained
significant traction.40 Pragmatic considerations precluded the much broader
interpretation,41 though this alternative approach raises the question of whether
cyber-attacks might be analogized to other covert efforts, like propaganda
campaigns, to undermine political or economic systems.42
domain of others. The precise definition of this obligation is the major contribution which
international law can make toward maintaining the peaceful co-existence of states.
Quincy Wright, Subversive Intervention, 54 AM. J. INTL L. 521, 528 (1960).
38. See Declaration on the Inadmissibility of Intervention into the Domestic Affairs of States
and the Protection of Their Independence and Sovereignty, G.A. Res. 2131, 1-2, U.N. GAOR, 20th
Sess., Supp. No. 14, U.N. Doc. A/6014, at 12 (Dec. 21, 1965) ([A]ll . . . forms of interference or
attempted threats against the personality of the State or against its political, economic and cultural
elements, are condemned. . . . No State may use or encourage the use of economic, political or any other
type of measures to coerce another State in order to obtain from it the subordination of the exercise of its
sovereign rights or to secure from it advantages of any kind.).
To be sure, the United States and other states were not always completely consistent in their
interpretations, especially in light of the geostrategic context. An early crisis for the United States
involved alleged Yugoslavian, Albanian, and Bulgarian support for guerrilla movements inside U.S.-
allied Greece. In seeking U.N. Security Council consideration of the issue, the U.S. ambassador
explained that [i]nvasion by organized armies is not the only means for delivering an attack against a
countrys independence. Force is effectively used today through devious methods of infiltration,
intimidation and subterfuge. U.N. SCOR, 2d Year, 147th mtg. at 1120, U.N. Doc. S/360 (1947).
Doc. A/CN.4/25 (discussing whether fomenting civil strife could constitute aggression).
40. Wright, supra note 37, at 529 (It is clear that [its provisions] prohibit only the threat or
use of armed force or an armed attack. They cannot be construed to include other hostile acts such as
propaganda, infiltration or subversion.).
41. See FRANCK, supra note 21, at 75 ([D]uring the Cold War, a fairly bright line may be said
to have been drawn between . . . a states export of revolution by direct or indirect military action . . .
and . . . a states export of revolution by propaganda, cultural subversion, and other non-military
assistance.); Wright, supra note 37, at 529-30.
42. For a discussion of international law regulating covert political and economic activities,
see Lori Fisler Damrosch, Politics Across Borders: Nonintervention and Nonforcible Influence over
Domestic Affairs, 83 AM. J. INTL L. 1 (1989).
39. Cf. Summary Records of the 56th Meeting, [1950] 2 Y.B. INTL L. COMMN 123-24, U.N.
2011]
Cyber-Attacks and the Use of Force
431
B. Cyber-Threats and Emergent U.S. Interpretation
To whatever extent Article 2(4)s meaning was settled and stable by the
end of the Cold War, and to the extent that this meaning generally favored a
narrow focus on military violence, cyber-warfare will challenge and test the
Charters bounds. Offensive cyber-attack capabilities, such as inserting
malicious computer code to take down public or private information systems or
functions that rely on them, bear some similarities to kinetic military force,
economic coercion, and subversion. At the same time, cyber-attacks also have
unique characteristics and are evolving rapidly and in unpredictable ways.
To deal with these challenges, some scholars and policy experts
emphasize the need for clarity in interpreting Articles 2(4) and 51s application
to cyber-attacks.43 Government officials considering offensive and defensive
options need to understand legal bounds and risks, the argument often goes.44
Others emphasize the need for new legal instruments, reasoning that the
ambiguity or indeterminacy of Charter provisions and jus ad bellum doctrine as
applied in this context is best solved through more specific treaty law.45 Such
efforts might build on the International Convention on Cybercrime, adopted in
2001 by the Council of Europe and open to nonmember states, which requires
parties to develop criminal laws against hacking and other illicit cyber-
activities like computer fraud.46 A new treaty might, for example, prohibit
certain additional categories of hostile cyber-activities or provide for particular
remedies.
The United States government has not publicly articulated a general
position on cyber-attacks and Articles 2(4) and 51.47 In the meantime, there is
considerable momentum among American scholars and policy experts behind
the idea that some cyber-attacks ought to fall within Article 2(4)s prohibition
of force or could constitute an armed attack, at least insofar as those terms
should be interpreted to cover attacks with features and consequences closely
resembling conventional military attacks or kinetic force. A National Research
43. See, e.g., LAWRENCE T. GREENBERG, SEYMOUR E. GOODMAN & KEVIN J. SOO HOO,
INFORMATION WARFARE AND INTERNATIONAL LAW 14-19 (1998); James A. Lewis, Multilateral
Agreements To Constrain Cyberconflict, ARMS CONTROL TODAY, June 2010, at 16 (arguing that states
should develop mutual understandings on what actions can be considered a violation of sovereignty, on
what constitutes an act of war, and what actions are seen as escalatory).
International Coercion: Elements of a Legal Framework, 12 EUR. J. INTL L. 825, 863-64 (2001).
45. See, e.g., ROBERT K. KNAKE, COUNCIL ON FOREIGN RELATIONS, INTERNET GOVERNANCE
IN AN AGE OF CYBER INSECURITY 21-23 (2010) (recommending that the United States pursue
international legal agreements to limit cyber-attacks); Duncan B. Hollis, Why States Need an
International Law for Information Operations, 11 LEWIS & CLARK L. REV. 1023 (2007) (arguing that
new international legal regimes or instruments are needed to regulate cyber-operations); Silver, supra
note 23, at 94 (calling for a new international convention to regulate cyber-attacks).
46. Convention on Cybercrime, Council of Europe, done Nov. 21, 2001, E.T.S. No. 185
(entered into force Jan. 7, 2004). A list of Council of Europe member states as well as nonmember states
that have signed or ratified the Convention (including the United States) is available at Convention on
Cybercrime, CETS No.: 185, COUNCIL OF EUROPE, http://conventions.coe.int/Treaty/Commun/
ChercheSig.asp?NT=185&CM=8&DF=28/10/2010&CL=ENG (last visited Apr. 23, 2011).
legal determinations developed through the interagency process.
47. However, one would presume that the U.S. governments actions are guided internally by
44. See, e.g., Christopher C. Joyner & Catherine Lotrionte, Information Warfare as
432
THE YALE JOURNAL OF INTERNATIONAL LAW
[Vol. 36: 421
Council committee charged with studying the issue concluded that cyber-
attacks should be judged under the U.N. Charter and customary jus ad bellum
principles by incorporating analysis of whether the effects of cyber-attacks are
tantamount to a military attack.48 Michael Schmitt, in an influential article on
the topic, proposes that whether a cyber-attack constitutes force depends on
multiple factors derived from what historically made military force special in
international law, including severity, immediacy, directness, invasiveness,
measurability, and presumptive legitimacy.49 Some policy experts have come to
similar conclusions regarding U.S. defensive doctrine against cyber-attacks,
emphasizing that the permissibility and appropriateness of military responses to
cyber-attacks should turn at least in part on their effects or consequences.50
Statements by senior U.S. government officials have either hinted
strongly that the United States would regard some cyber-attacks as prohibited
force or declined to rule out that possibilitythough the U.S. government has
not formalized a definitive public position on the issue or articulated clear lines
or standards.51 This suggests that at least one prong of the U.S. strategy may
involve a classic military defense and deterrence model, in which the United
States would consider the first use of some types of cyber-attacks generally off-
limits except in self-defense, and would consider military responses to some
cyber-attacks by others.52 A 1999 Defense Department Assessment of
48. See NRC COMMITTEE REPORT, supra note 4, at 33-34; see also Abraham D. Sofaer, David
Clark & Whitfield Diffie, Cyber Security and International Agreements, in PROCEEDINGS OF A
WORKSHOP ON DETERRING CYBERATTACKS: INFORMING STRATEGIES AND DEVELOPING OPTIONS FOR
(2010), available at http://www.nap.edu/openbook.php?record_id
U.S. POLICY 179, 185
=12997&page=179 ([T]he right of states to exercise self-defense or to take countermeasures in
response to such attacks would depend on their potential consequences.).
49. See Schmitt, supra note 29, at 914-15; see also Horace B. Robertson, Jr., Self-Defense
Against Computer Network Attack Under International Law, 76 INTL L. STUD. 121, 140 (2002) ([T]he
term armed attack may also include attacks upon computer networks solely by electronic means if the
consequences of such attacks include either substantial harm to vital civil or military networks, or loss of
human life, or both.). For an Estonian view along similar lines, which is interesting because of the
countrys experience in this area, see Erik Kodar, Computer Network Attacks in the Gray Areas of Jus ad
Bellum and Jus in Bello, 9 BALTIC Y.B. INTL L. 133, 139 (2009) (The consequences of [computer
network attacks] should be assessed case-by-case to ascertain whether they are similar to the
consequences of an armed attack or whether consequences stay below the level of threshold for use of
force.).
50. See, e.g., RICHARD A. CLARKE & ROBERT K. KNAKE, CYBER WAR 178 (2010) (proposing
a doctrine of cyber equivalency, in which cyber attacks are to be judged by their effects, not their
means. They would be judged as if they were kinetic attacks, and may be responded to by kinetic
attacks, or other means.); Lewis, supra note 43, at 16 (Agreement on what constitutes an act of war in
cyberspace would be helpful. This could be defined as any action that produced an effect equivalent to
an armed attack using kinetic weapons.); Silver, supra note 23, at 92-93 (discussing effects-based
analysis); David Tubbs, Perry G. Luzwick & Walter Gary Sharp, Sr., Technology and Law: The
Evolution of Digital Warfare, 76 INTL L. STUD. 7, 15 (2002) (Until a legal regime matures that
comprehensively address State activities in cyberspace . . . legal advisers must principally conduct an
effects-based analysis of international law to determine the lawfulness of State activities in
cyberspace.).
IN
ADDRESSING GLOBAL CYBERSECURITY AND GOVERNANCE 38-39 (2010); see also William Matthews,
DoD Expanding Domestic Cyber Role, DEFENSENEWS (Oct. 20, 2010), http://www.defensenews.com/
story.php?i=4939254&c=POL&s=TOP (discussing legal and conceptual uncertainties about
cyber-attacks inside the U.S. defense establishment).
52. See Mark Clayton, The New Cyber Arms Race, CHRISTIAN SCI. MONITOR (Mar. 7, 2011),
http://www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-race (quoting former U.S.
51. See GOVT ACCOUNTABILITY OFFICE, UNITED STATES FACES CHALLENGES
2011]
Cyber-Attacks and the Use of Force
433
International Legal Issues in Information Operations noted:
If we focused on the means used, we might conclude that electronic signals
imperceptible to human senses dont closely resemble bombs, bullets or troops.
On the other hand, it seems likely that the international community will be
more interested in the consequences of a computer network attack than in its
mechanism.53
The report went on to suggest that cyber-attacks could constitute armed attacks
giving rise to the right of military self-defense.54
More recent U.S. government statements amplify that reports logic.
Secretary of State Hillary Clinton in 2010 declared the United Statess intention
to defend its cyber-security in terms similar to those usually used to discuss
military security and self-defense:
States, terrorists, and those who would act as their proxies must know that the
United States will protect our networks. . . . [Those who] engage in cyber
attacks should face consequences and international condemnation. In an
interconnected world, an attack on one nations networks can be an attack on
all.55
In testifying before the Senate Committee considering his nomination to head
the new Pentagon Cyber Command, Lieutenant General Keith Alexander
explained that [t]here is no international consensus on a precise definition of a
use of force, in or out of cyberspace. Consequently, individual nations may
assert different definitions, and may apply different thresholds for what
constitutes a use of force.56 He went on to suggest, however, that [i]f the
President determines a cyber event does meet the threshold of a use of
force/armed attack, he may determine that the activity is of such scope,
duration, or intensity that it warrants exercising our right to self-defense and/or
the initiation of hostilities as an appropriate response.57
government officials stating U.S. intentions to respond to some cyber-attack scenarios with armed
force).
53. U.S. DEPT OF DEF., AN ASSESSMENT OF INTERNATIONAL LEGAL ISSUES IN INFORMATION
OPERATIONS 18 (1999), available at http://www.au.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf,
reprinted in 76 INTL L. STUD. 459, 483 (2002). The document goes on to conclude:
It is far from clear the extent to which the world community will regard computer
network attacks as armed attacks or uses of force, and how the doctrines of self-
defense and countermeasures will be applied to computer network attacks. The outcome
will probably depend more on the consequences of such attacks than on their
mechanisms.
54. See U.S. DEPT OF DEF., supra note 53, at 25.
55. Hillary Rodham Clinton, U.S. Secy of State, Remarks at the Newseum in Washington,
Id. at 25; see also John Markoff, Step Taken To End Impasse Over Cybersecurity Talks, N.Y. TIMES,
July 17, 2010, at A7 (quoting a foreign diplomat, who stated that [t]he U.S. put forward a simple notion
that we hadnt said before . . . [that] [t]he same laws that apply to the use of kinetic weapons should
apply to state behavior in cyberspace.).
D.C. (Jan. 21, 2010), available at http://www.state.gov/secretary/rm/2010/01/135519.htm.
56. Advance Questions for Lieutenant General Keith Alexander, USA Nominee for
Commander, United States Cyber Command: Before the S. Armed Services Comm., 111th Cong. 11
(Apr. 15, 2010), available at http://armed-services.senate.gov/statemnt/2010/04%20April/Alexander
%2004-15-10.pdf.
Id. at 12; see also Military Asserts Right To Return Cyber Attacks, CBS NEWS (Apr. 14,
(quoting
2010),
Lieutenant General Alexander as asserting that while this right has not been specifically established by
legal precedent to apply to attacks in cyberspace, it is reasonable to assume that returning fire in
http://www.cbsnews.com/stories/2010/04/14/ap/cabstatepent/main6394031.shtml
57.
434
THE YALE JOURNAL OF INTERNATIONAL LAW
[Vol. 36: 421