Abstract
Since the United Nations (UN) hosted the first conference on Internet governance in 2003, states have convened at national, regional, and international forums to discuss the growing threats posed by the use of Information and Communication Technologies (ICTs) by states and nonstate actors.1 Historically, these discussions avoided the political and legal implications of cyber threats and focused instead on the technical aspects of the Internet’s function. Deterrence in cyberspace as a national strategy, for example, was not a focal point in these forums. Since 2010, however, states have recognized the political ramifications of these decisions and have begun to exercise their authority by actively engaging with the technical community through bilateral, regional, and multilateral initiatives. In 2010, the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (GGE) made recommendations for further dialogue among states and other actors regarding norms pertaining to state use of ICTs to reduce collective risk and protect critical national and international infrastructure. This included discussions on the use of ICTs in conflict.2 The crossfertilization of disciplines and the incorporation of national security issues into the dialogue of Internet governance have proven challenging. Much work remains but the benefits are beginning to be recognized.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Notes
David E. Sanger, Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (New York: Crown, 2012): 267.
Gregory A. Raymond, “Problems and Prospects in the Study of International Norms,” Mershon International Studies Review 4.2 (1997): 205–245.
Christopher Joyner and Catherine Lotrionte, “Information Warfare as International Coercion: Elements of a Legal Framework,” European Journal of International Law 12.5 (2001): 825–865;
Michael N. Schmitt, “Computer Network Attacks and the Use of Force in International Law: Thoughts on a Normative Framework,” Columbia Transnational Law Journal 37 (1999): 885–937 (advocating the benefits of fitting cyberattacks within the existing use of force framework).
Michael N. Schmitt, ed., Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge: Cambridge University Press, 2013) (hereafter the Manual), http://www.ccdcoe.org/249.html.
Cordula Droege, “Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians,” International Review of the Red Cross 94.886 (2012): 533–578.
Classic political espionage is a government’s efforts to acquire clandestinely classified or protected information from a foreign government. Although universally criminal under domestic laws, classic espionage does not, by itself, violate international law. See Sean P. Kanuck, “Recent Developments, Information Warfare: New Challenges for Public International Law,” Harvard International Law Journal 37 (1996): 272–293, 276. Economic espionage is a state’s attempt to acquire covertly trade secrets held by foreign private enterprises. No state regards classic espionage as a “use of force” prohibited by the UN Charter.
See Simon Chesterman, “The Spy Who Came in from the Cold War: Intelligence and International Law,” Michigan Journal of International Law 27 (2006): 1071–1130.
Even for classic espionage where there are no written rules under international law, there were red lines that states agreed to within the context of carrying out intelligence operations. See Antonio J. Mendez, The Master of Disguise: My Secret Life in the CIA (New York: William Morrow, 2000).
Herb Lin, “Cyber Conflict and International Humanitarian Law,” International Review of the Red Cross 94.886 (2012): 515–531, 530.
See Catherine Lotrionte, “Use of Force and Cyber Operations,” in Georgetown Journal of International Affairs, Special Issue, International Engagement on Cyber: Establishing Norms and Improving Security (2012): 20. See also Schmitt, Manual, 44, 58.
White House, International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World (Washington, DC: White House, 2011), http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf, 9.
Glenn H. Snyder, Deterrence and Defense: Toward a Theory of National Security (Princeton: Princeton University Press, 1961), 14–16.
Jeffrey W. Knopf, “Wrestling with Deterrence: Bush Administration Strategy after 9/11,” Contemporary Security Policy 29.2 (2008): 229–265;
Ward Wilson, “The Myth of Nuclear Deterrence,” Nonproliferation Review 15.3 (2008): 421–439;
Lawrence Freedman, Deterrence (London: Polity, 2004);
Patrick M. Morgan, “Taking the Long View of Deterrence,” Journal of Strategic Studies 28.5 (2005): 751–763.
Martin C. Libicki, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND, 2009).
James A. Lewis, Conflict and Negotiation in Cyberspace (Washington, DC: Center for Strategic and International Studies, 2013);
See also Richard J. Harknett, “Information Warfare and Deterrence,” Parameters 26.3 (1996): 93–107;
Lior Tabansky, “Basic Concepts in Cyber Warfare,” Military and Strategic Affairs 3.1 (2001): 75–92.
D. E. Geer, Jr., “The Physics of Digital Law: Searching for Counterintuitive Analogies,” in Cybercrime: Digital Cops in a Networked Environment, ed. J. Balkin, Katz Eddan, James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman, and Tal Zarsky (New York: New York University Press, 2007), 13–36.
James A. Lewis, Cross-Domain Deterrence and Credible Threats (Washington, DC: Center for Strategic and International Studies, 2010), 4.
Bernard Brodie, ed., The Atomic Weapon: Atomic Power and World Order (New York: Harcourt, Brace, 1946);
Albert Wohlstetter, “The Delicate Balance of Terror,” Foreign Affairs 37.1 (1959): 211–234;
Lawrence Freedman, “Deterrence: A Reply,” Journal of Strategic Studies 28.5 (2005): 789–801.
Friedrich Kratochwil and John Gerald Ruggie, “International Organization: A State of the Art or an Art of the State,” International Organization 40.4 (1986): 753–775;
John Gerald Ruggie, “What Makes the World Hang Together? Neo-utilitarianism and the Social Constructivist Challenge,” International Organization 52.4 (1998): 855–885;
Jutta Brunnee and Stephen J. Toope, “International Law and Constructivism: Elements of an Interactional Theory of International Law,” Columbia Journal of Transnational Law 39 (2000): 19–74.
Peter J. Katzenstein, Robert O. Keohane, and Stephen Krasner, “International Organization and the Study of World Politics,” International Organization 52.4 (1998): 645–685, 679;
see also Alexander Wendt, “Anarchy Is What States Make of It: The Social Construction of Power Politics,” International Organization 46.2 (1992): 391–425.
Stephen D. Krasner, “Structural Causes and Regime Consequences: Regimes as Intervening Variables,” International Organization 36.2 (1982): 185–205.
Martha Finnemore, National Interests in International Society (Ithaca, NY: Cornell University Press, 1996): 22.
Alexander Wendt, Social Theory of International Politics (Cambridge: Cambridge University Press, 1999), 92–138.
David Dessler, “What’s at Stake in the Agent-Structure Debate?,” International Organization 43.3 (1989): 441–473, 454–458.
Alexander Wendt, “Constructing International Politics,” International Security 20.1 (1995): 71–81, 73–4.
Anthony Clark Arend, Legal Rules and International Society (Oxford: Oxford University Press, 1999), 134–137.
See Emanuel Adler, Communitarian International Relations: The Epistemic Foundations of International Relations (London and New York: Routledge, 2005): 11.
See Christian Reus-Smit, “Constructivism,” in Theories of International Relations, 3rd ed., ed. Scott Burchill, Andrew Linklater, Richard Devetak, Jack Donnelly, Matthew Paterson, Christain Reus-Smit, and Jacqui True (Houndsmills, Basingstoke: Palgrave Macmillan, 2005): 198–199.
Thomas Risse, “‘Let’s Argue!’: Communicative Action in World Politics,” International Organization, 54.1 (2000): 1–39, 4.
National Research Council, Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy (Washington, DC: National Academies Press, 2010).
Martha Finnemore and Kathryn Sikkink, “International Norm Dynamics and Political Change,” International Organization 52.4 (1998): 894–905.
Keith B. Alexander, US Cybersecurity Policy and the Role of US CYBERCOM (Washington, DC: Center for Strategic and International Studies, 2010), http://www.csis.org/event/cybersecurity-discussiongeneral-keith-b-alexander-director-national-security-agency.
Ibid., 13. See also Martha Finnemore, “Cultivating International Cyber Norms,” in America’s Cyber Future: Security and Prosperity in the Information Age, Vol. 2 (Washington, DC: Center for a New American Security, 2011), 91.
Some commentators have argued that the term “soft law” is nonsensical and even troubling. See Arend, Legal Rules, 25; Jan Klabbers, “The Redundancy of Soft Law,” Nordic Journal of International Law 65.2 (1996): 167–182.
Alan E. Boyle, “Some Reflections on the Relationship of Treaties and Soft Law,” International and Comparative Law Quarterly 48.4 (1999): 901–913, 901–902.
Jutta Brunnee and Stephen J. Toope, Legitimacy and Legality in International Law: An Interactional Account (New York: Cambridge University Press, 2010).
Kenneth W. Abbott and Duncan Snidal, “Hard and Soft Law in International Governance,” International Organization 54.3 (Summer 2000): 421–456, 423.
See Richard A. Clarke and Robert Knake, Cyber War: The Next Threat to National Security and What to Do about It (New York: Harper Collins, 2010).
Nina Tannenwald, The Nuclear Taboo: The United States and the Nonuse of Nuclear Weapons since 1945 (Cambridge: Cambridge University Press, 2007).
Eric Talbot Jensen, “Cyber Warfare and Precautions against the Effects of Attacks,” Texas Law Review 88.7 (2010): 1533–1569, 1534.
See, for example, Adam Segal, “China, International Law and Cyber Space” (blog, Council on Foreign Relations, October 2, 2012), http://blogs.cfr.org/asia/2012/10/02/china-international-law-and-cyberspace/. See also Li Zhang, “A Chinese Perspective on Cyber War,” International Review of the Red Cross 94.886 (2012): 801–807, 804 (arguing that the Chinese do view the UN Charter and IHL as applicable in cyber conflict). Droege, “Get Off My Cloud,” 5.
Andrew Hurrell, “International Society and the Study of Regimes: A Reflective Approach,” in Regime Theory and International Relations, ed. Volker Rittberger (New York: Oxford University Press, 1993): 72.
Lon L. Fuller, The Morality of Law, rev. edition (New Haven, CT: Yale University Press, 1969); See also
Martha Finnemore, “Are Legal Norms Distinctive?” New York University Journal of International Law and Politics 32 (2000): 699–705.
Rosalyn Higgins argued that international law functions purely on the basis of reciprocal obligations rooted in interests. See Rosalyn Higgins, Problems and Process: International Law and How We Use It (Oxford: Clarendon Press, 1994), 16.
Myers S. McDougal and Harold D. Lasswell, “The Identification and Appraisal of Diverse Systems of Public Order,” Yale Law Review 53.1 (1959): 1–29, 22.
Myers S. McDougal, Harold D. Lasswell, and W. Michael Reisman, “Theories about International Law,” International Law Essays 43.92 (1981): 56.
According to James March and Johan Olsen, decisions can be grounded based on two different logics: “logics of consequence” where decisions are purely instrumental and “logics of appropriateness,” which focuses on social norms. According to the logic of appropriateness, actors ask themselves, “What should I do in this situation?” James G. March and Johan P. Olsen, Rediscovering Institutions (New York: Free Press, 1989).
Milton L. Mueller, Networks and States: The Global Politics of Internet Governance (Cambridge, MA: MIT Press, 2010), 164.
John Arguilla and David Ronfeldt, “The Advent of Netwar: Analytic Background,” Studies in Conflict & Terrorism 22.3 (1999): 193–206, 202;
Kathryn Sikkink, “Human Rights, Principled Issue-Networks, and Sovereignty in Latin America,” International Organization 47.3 (1993): 411–441.
See Manual, 29–36. See also Catherine Lotrionte, “State Sovereignty and Self-defense in Cyberspace: A Normative Framework for Balancing Legal Rights,” Emory International Law Review 26 (2012): 825–919;
Margaret E. Keck and Kathryn Sikkink, Activists beyond Borders: Advocacy Networks in International Politics (Ithaca, NY: Cornell University Press, 1998).
Editor information
Copyright information
© 2013 Robert J. Beck
About this chapter
Cite this chapter
Lotrionte, C. (2013). Cyberwar: Building a Normative and Legal-Based Approach for Cyberdeterrence. In: Beck, R.J. (eds) Law and Disciplinarity. Palgrave Macmillan, New York. https://doi.org/10.1057/9781137318107_4
Download citation
DOI: https://doi.org/10.1057/9781137318107_4
Publisher Name: Palgrave Macmillan, New York
Print ISBN: 978-1-349-44182-2
Online ISBN: 978-1-137-31810-7
eBook Packages: Palgrave Political & Intern. Studies CollectionPolitical Science and International Studies (R0)