Skip to main content

Cyberwar: Building a Normative and Legal-Based Approach for Cyberdeterrence

  • Chapter
Law and Disciplinarity
  • 161 Accesses

Abstract

Since the United Nations (UN) hosted the first conference on Internet governance in 2003, states have convened at national, regional, and international forums to discuss the growing threats posed by the use of Information and Communication Technologies (ICTs) by states and nonstate actors.1 Historically, these discussions avoided the political and legal implications of cyber threats and focused instead on the technical aspects of the Internet’s function. Deterrence in cyberspace as a national strategy, for example, was not a focal point in these forums. Since 2010, however, states have recognized the political ramifications of these decisions and have begun to exercise their authority by actively engaging with the technical community through bilateral, regional, and multilateral initiatives. In 2010, the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (GGE) made recommendations for further dialogue among states and other actors regarding norms pertaining to state use of ICTs to reduce collective risk and protect critical national and international infrastructure. This included discussions on the use of ICTs in conflict.2 The crossfertilization of disciplines and the incorporation of national security issues into the dialogue of Internet governance have proven challenging. Much work remains but the benefits are beginning to be recognized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. David E. Sanger, Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (New York: Crown, 2012): 267.

    Google Scholar 

  2. Gregory A. Raymond, “Problems and Prospects in the Study of International Norms,” Mershon International Studies Review 4.2 (1997): 205–245.

    Article  Google Scholar 

  3. Christopher Joyner and Catherine Lotrionte, “Information Warfare as International Coercion: Elements of a Legal Framework,” European Journal of International Law 12.5 (2001): 825–865;

    Article  Google Scholar 

  4. Michael N. Schmitt, “Computer Network Attacks and the Use of Force in International Law: Thoughts on a Normative Framework,” Columbia Transnational Law Journal 37 (1999): 885–937 (advocating the benefits of fitting cyberattacks within the existing use of force framework).

    Google Scholar 

  5. Michael N. Schmitt, ed., Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge: Cambridge University Press, 2013) (hereafter the Manual), http://www.ccdcoe.org/249.html.

    Google Scholar 

  6. Cordula Droege, “Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians,” International Review of the Red Cross 94.886 (2012): 533–578.

    Article  Google Scholar 

  7. Classic political espionage is a government’s efforts to acquire clandestinely classified or protected information from a foreign government. Although universally criminal under domestic laws, classic espionage does not, by itself, violate international law. See Sean P. Kanuck, “Recent Developments, Information Warfare: New Challenges for Public International Law,” Harvard International Law Journal 37 (1996): 272–293, 276. Economic espionage is a state’s attempt to acquire covertly trade secrets held by foreign private enterprises. No state regards classic espionage as a “use of force” prohibited by the UN Charter.

    Google Scholar 

  8. See Simon Chesterman, “The Spy Who Came in from the Cold War: Intelligence and International Law,” Michigan Journal of International Law 27 (2006): 1071–1130.

    Google Scholar 

  9. Even for classic espionage where there are no written rules under international law, there were red lines that states agreed to within the context of carrying out intelligence operations. See Antonio J. Mendez, The Master of Disguise: My Secret Life in the CIA (New York: William Morrow, 2000).

    Google Scholar 

  10. Herb Lin, “Cyber Conflict and International Humanitarian Law,” International Review of the Red Cross 94.886 (2012): 515–531, 530.

    Article  Google Scholar 

  11. See Catherine Lotrionte, “Use of Force and Cyber Operations,” in Georgetown Journal of International Affairs, Special Issue, International Engagement on Cyber: Establishing Norms and Improving Security (2012): 20. See also Schmitt, Manual, 44, 58.

    Google Scholar 

  12. White House, International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World (Washington, DC: White House, 2011), http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf, 9.

    Google Scholar 

  13. Glenn H. Snyder, Deterrence and Defense: Toward a Theory of National Security (Princeton: Princeton University Press, 1961), 14–16.

    Google Scholar 

  14. Jeffrey W. Knopf, “Wrestling with Deterrence: Bush Administration Strategy after 9/11,” Contemporary Security Policy 29.2 (2008): 229–265;

    Article  Google Scholar 

  15. Ward Wilson, “The Myth of Nuclear Deterrence,” Nonproliferation Review 15.3 (2008): 421–439;

    Article  Google Scholar 

  16. Lawrence Freedman, Deterrence (London: Polity, 2004);

    Google Scholar 

  17. Patrick M. Morgan, “Taking the Long View of Deterrence,” Journal of Strategic Studies 28.5 (2005): 751–763.

    Article  Google Scholar 

  18. Martin C. Libicki, Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND, 2009).

    Google Scholar 

  19. James A. Lewis, Conflict and Negotiation in Cyberspace (Washington, DC: Center for Strategic and International Studies, 2013);

    Google Scholar 

  20. See also Richard J. Harknett, “Information Warfare and Deterrence,” Parameters 26.3 (1996): 93–107;

    Google Scholar 

  21. Lior Tabansky, “Basic Concepts in Cyber Warfare,” Military and Strategic Affairs 3.1 (2001): 75–92.

    Google Scholar 

  22. D. E. Geer, Jr., “The Physics of Digital Law: Searching for Counterintuitive Analogies,” in Cybercrime: Digital Cops in a Networked Environment, ed. J. Balkin, Katz Eddan, James Grimmelmann, Nimrod Kozlovski, Shlomit Wagman, and Tal Zarsky (New York: New York University Press, 2007), 13–36.

    Google Scholar 

  23. James A. Lewis, Cross-Domain Deterrence and Credible Threats (Washington, DC: Center for Strategic and International Studies, 2010), 4.

    Google Scholar 

  24. Bernard Brodie, ed., The Atomic Weapon: Atomic Power and World Order (New York: Harcourt, Brace, 1946);

    Google Scholar 

  25. Albert Wohlstetter, “The Delicate Balance of Terror,” Foreign Affairs 37.1 (1959): 211–234;

    Article  Google Scholar 

  26. Lawrence Freedman, “Deterrence: A Reply,” Journal of Strategic Studies 28.5 (2005): 789–801.

    Article  Google Scholar 

  27. Friedrich Kratochwil and John Gerald Ruggie, “International Organization: A State of the Art or an Art of the State,” International Organization 40.4 (1986): 753–775;

    Article  Google Scholar 

  28. John Gerald Ruggie, “What Makes the World Hang Together? Neo-utilitarianism and the Social Constructivist Challenge,” International Organization 52.4 (1998): 855–885;

    Article  Google Scholar 

  29. Jutta Brunnee and Stephen J. Toope, “International Law and Constructivism: Elements of an Interactional Theory of International Law,” Columbia Journal of Transnational Law 39 (2000): 19–74.

    Google Scholar 

  30. Peter J. Katzenstein, Robert O. Keohane, and Stephen Krasner, “International Organization and the Study of World Politics,” International Organization 52.4 (1998): 645–685, 679;

    Article  Google Scholar 

  31. see also Alexander Wendt, “Anarchy Is What States Make of It: The Social Construction of Power Politics,” International Organization 46.2 (1992): 391–425.

    Article  Google Scholar 

  32. Stephen D. Krasner, “Structural Causes and Regime Consequences: Regimes as Intervening Variables,” International Organization 36.2 (1982): 185–205.

    Article  Google Scholar 

  33. Martha Finnemore, National Interests in International Society (Ithaca, NY: Cornell University Press, 1996): 22.

    Google Scholar 

  34. Alexander Wendt, Social Theory of International Politics (Cambridge: Cambridge University Press, 1999), 92–138.

    Book  Google Scholar 

  35. David Dessler, “What’s at Stake in the Agent-Structure Debate?,” International Organization 43.3 (1989): 441–473, 454–458.

    Article  Google Scholar 

  36. Alexander Wendt, “Constructing International Politics,” International Security 20.1 (1995): 71–81, 73–4.

    Article  Google Scholar 

  37. Anthony Clark Arend, Legal Rules and International Society (Oxford: Oxford University Press, 1999), 134–137.

    Google Scholar 

  38. See Emanuel Adler, Communitarian International Relations: The Epistemic Foundations of International Relations (London and New York: Routledge, 2005): 11.

    Google Scholar 

  39. See Christian Reus-Smit, “Constructivism,” in Theories of International Relations, 3rd ed., ed. Scott Burchill, Andrew Linklater, Richard Devetak, Jack Donnelly, Matthew Paterson, Christain Reus-Smit, and Jacqui True (Houndsmills, Basingstoke: Palgrave Macmillan, 2005): 198–199.

    Google Scholar 

  40. Thomas Risse, “‘Let’s Argue!’: Communicative Action in World Politics,” International Organization, 54.1 (2000): 1–39, 4.

    Article  Google Scholar 

  41. National Research Council, Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy (Washington, DC: National Academies Press, 2010).

    Google Scholar 

  42. Martha Finnemore and Kathryn Sikkink, “International Norm Dynamics and Political Change,” International Organization 52.4 (1998): 894–905.

    Article  Google Scholar 

  43. Keith B. Alexander, US Cybersecurity Policy and the Role of US CYBERCOM (Washington, DC: Center for Strategic and International Studies, 2010), http://www.csis.org/event/cybersecurity-discussiongeneral-keith-b-alexander-director-national-security-agency.

    Google Scholar 

  44. Ibid., 13. See also Martha Finnemore, “Cultivating International Cyber Norms,” in America’s Cyber Future: Security and Prosperity in the Information Age, Vol. 2 (Washington, DC: Center for a New American Security, 2011), 91.

    Google Scholar 

  45. Some commentators have argued that the term “soft law” is nonsensical and even troubling. See Arend, Legal Rules, 25; Jan Klabbers, “The Redundancy of Soft Law,” Nordic Journal of International Law 65.2 (1996): 167–182.

    Article  Google Scholar 

  46. Alan E. Boyle, “Some Reflections on the Relationship of Treaties and Soft Law,” International and Comparative Law Quarterly 48.4 (1999): 901–913, 901–902.

    Article  Google Scholar 

  47. Jutta Brunnee and Stephen J. Toope, Legitimacy and Legality in International Law: An Interactional Account (New York: Cambridge University Press, 2010).

    Book  Google Scholar 

  48. Kenneth W. Abbott and Duncan Snidal, “Hard and Soft Law in International Governance,” International Organization 54.3 (Summer 2000): 421–456, 423.

    Google Scholar 

  49. See Richard A. Clarke and Robert Knake, Cyber War: The Next Threat to National Security and What to Do about It (New York: Harper Collins, 2010).

    Google Scholar 

  50. Nina Tannenwald, The Nuclear Taboo: The United States and the Nonuse of Nuclear Weapons since 1945 (Cambridge: Cambridge University Press, 2007).

    Book  Google Scholar 

  51. Eric Talbot Jensen, “Cyber Warfare and Precautions against the Effects of Attacks,” Texas Law Review 88.7 (2010): 1533–1569, 1534.

    Google Scholar 

  52. See, for example, Adam Segal, “China, International Law and Cyber Space” (blog, Council on Foreign Relations, October 2, 2012), http://blogs.cfr.org/asia/2012/10/02/china-international-law-and-cyberspace/. See also Li Zhang, “A Chinese Perspective on Cyber War,” International Review of the Red Cross 94.886 (2012): 801–807, 804 (arguing that the Chinese do view the UN Charter and IHL as applicable in cyber conflict). Droege, “Get Off My Cloud,” 5.

    Article  Google Scholar 

  53. Andrew Hurrell, “International Society and the Study of Regimes: A Reflective Approach,” in Regime Theory and International Relations, ed. Volker Rittberger (New York: Oxford University Press, 1993): 72.

    Google Scholar 

  54. Lon L. Fuller, The Morality of Law, rev. edition (New Haven, CT: Yale University Press, 1969); See also

    Google Scholar 

  55. Martha Finnemore, “Are Legal Norms Distinctive?” New York University Journal of International Law and Politics 32 (2000): 699–705.

    Google Scholar 

  56. Rosalyn Higgins argued that international law functions purely on the basis of reciprocal obligations rooted in interests. See Rosalyn Higgins, Problems and Process: International Law and How We Use It (Oxford: Clarendon Press, 1994), 16.

    Google Scholar 

  57. Myers S. McDougal and Harold D. Lasswell, “The Identification and Appraisal of Diverse Systems of Public Order,” Yale Law Review 53.1 (1959): 1–29, 22.

    Google Scholar 

  58. Myers S. McDougal, Harold D. Lasswell, and W. Michael Reisman, “Theories about International Law,” International Law Essays 43.92 (1981): 56.

    Google Scholar 

  59. According to James March and Johan Olsen, decisions can be grounded based on two different logics: “logics of consequence” where decisions are purely instrumental and “logics of appropriateness,” which focuses on social norms. According to the logic of appropriateness, actors ask themselves, “What should I do in this situation?” James G. March and Johan P. Olsen, Rediscovering Institutions (New York: Free Press, 1989).

    Google Scholar 

  60. Milton L. Mueller, Networks and States: The Global Politics of Internet Governance (Cambridge, MA: MIT Press, 2010), 164.

    Book  Google Scholar 

  61. John Arguilla and David Ronfeldt, “The Advent of Netwar: Analytic Background,” Studies in Conflict & Terrorism 22.3 (1999): 193–206, 202;

    Article  Google Scholar 

  62. Kathryn Sikkink, “Human Rights, Principled Issue-Networks, and Sovereignty in Latin America,” International Organization 47.3 (1993): 411–441.

    Article  Google Scholar 

  63. See Manual, 29–36. See also Catherine Lotrionte, “State Sovereignty and Self-defense in Cyberspace: A Normative Framework for Balancing Legal Rights,” Emory International Law Review 26 (2012): 825–919;

    Google Scholar 

  64. Margaret E. Keck and Kathryn Sikkink, Activists beyond Borders: Advocacy Networks in International Politics (Ithaca, NY: Cornell University Press, 1998).

    Google Scholar 

Download references

Authors

Editor information

Robert J. Beck

Copyright information

© 2013 Robert J. Beck

About this chapter

Cite this chapter

Lotrionte, C. (2013). Cyberwar: Building a Normative and Legal-Based Approach for Cyberdeterrence. In: Beck, R.J. (eds) Law and Disciplinarity. Palgrave Macmillan, New York. https://doi.org/10.1057/9781137318107_4

Download citation

Publish with us

Policies and ethics