Keywords

1 Introduction

The supreme art of war is to subdue the enemy without fighting.

Sun Zsu, 6th century BC

1.1 East Meets West

Western States traditionally focus on the physical military instrument when conceptualising deterrence as a strategic function. The threat of military force, or its actual use, is a preferred modus operandi in Western strategic culture.Footnote 1 For Asian States such as China, force may be perceived differently in terms of instruments used, as well as in its modalities, and in concepts. Force and power may have an economic or diplomatic face, whilst the actual threat or use of military force is less prominent or takes virtual or symbolic shapes. Looking at China’s Belt and Road Initiative, trade relations, loans, (lease) contracts, embassies, harbours, education, culture and indeed the positioning of armed forces, play important roles. Quite early, Chinese strategic thinkers like Sun Zsu, and more recently Qiao Liang and Wang Xiangsui, have stressed the importance of the information environment in strategic issues such as deterrence.Footnote 2 Although rather late, Western strategic interest—accelerated by ever growing opportunities and threats in cyberspace – in this sphere is growing fast.Footnote 3

1.2 Cyberspace as a Strategic Opportunity?

Cyberspace has been described in many ways,Footnote 4 ranging from ‘a consensual hallucination’Footnote 5 to a ‘networked information infrastructure’.Footnote 6 In short, cyberspace covers ‘all entities that are or may potentially be connected digitally’.Footnote 7 Cyberspace is central to the information environment, the sphere where information is presented, found, communicated, processed, handled and used upon which decision-making is based, followed by (in)action. The information environment entails a physical, a cognitive and a virtual dimension. To enable digital connections, cyberspace, as part of the information environment consists of three elements: (1) cyber identities, (2) cyber objects (i.e. software, data and protocols), and (3) the physical network layer entailing cyber infrastructure (i.e. hardware and (electromagnetic) connections).

Cyberspace may be used in a number of ways. First of all, it offers a medium for information and communication. Secondly, it entails capacities that may be used as instruments of power: data, applications, procedures. Thirdly, these instruments may be directed at, or can engage with other actors in cyberspace. In military terms, one may find both weapons and targets, as well as a vector to connect weapons with the targets. In generic terms: cyber capacities may be used as instruments to engage with other cyber capacities in or through cyberspace.Footnote 8

Not surprisingly, cyberspace has become the 5th domain of operations.Footnote 9 In effect, the potency of cyberspace is related to the threat or use of (military) force, but also to the deliberate undermining of the understanding and autonomous decision-making of actors, hence the informational instrument of power.Footnote 10

1.3 Conceptual Considerations for Deterrence in Cyberspace

Is deterrence possible in cyberspace? Cyberspace is not an instrument of power in itself, but an engagement ‘arena’ similar to the land or air domain. However, unlike land, sea and air, people are absent in cyberspaceFootnote 11 and ‘only’ the virtual reflections of humans—cyber identities—engage in cyberspace. The dominant academic thinking tends to conclude that cyberspace is not fit for deterrence as a strategic function for States,Footnote 12 a view that appears at odds with the actual effects of on-line activities of numerous (State sponsored) Advanced Persistent Threats (APTs),Footnote 13 or the considerations of US Cyber Command.Footnote 14

But maybe the question is not whether cyberspace is fit for deterrence, but whether the constituent components of deterrent capabilities are fit for contemporary engagements. Power projection in cyberspace, whether for deterrence purposes or otherwise, is no longer merely focusing on military power, but on all instruments of power, including diplomacy, informational, cultural, financial or legal instruments.

Applying the instruments of power, including military power, (in deterrence contexts) requires the (demonstrated) capacity to perform, the will to act,Footnote 15 but moreover a manner how to channel these capacities.Footnote 16 These commonplace elements—capacities, concepts and will—are also encapsulated in military doctrine.Footnote 17 Creating power presumes the existence and effectiveness of these three components. In case one of these components is underdeveloped or not in place, power fails.

For democratic States, the conceptual component includes an applicable legal framework which enables the use of these power instruments. Their common valuesFootnote 18 dictate to respect and promote international law in their international relations,Footnote 19 and respect for law in general when interacting with non-state actors.

This legal framework however, is an area that seems undervalued and less researched, at least in war studies and security studies, despite the fact that the legal framework is a crucial element of the conceptual component for (deterrence) operations in cyberspace or any physical domain. For the purpose of this treatise, the legal framework is considered an integral part of the holistic approach towards deterrence in operations as it should be when conducting research in these areas. Therefore, States will need to organise and structure their legal and institutional framework in order to deter others from engaging, threatening or attacking vital interests, in or through cyberspace.

1.4 Aims and Structure

The primary aim is to supplement the conceptual component of power by adding a concise legal framework for the use of all power instruments, be they military or otherwise, classic or modern. The approach taken departs from the premise that when the legal framework is not in place or underdeveloped, the conceptual component of power is flawed which in turn will have deteriorating impact on power itself. E.g., when offensive cyber capabilities are in place, but actual legal bases have not been analysed, realistic decision-making procedures are lacking, or competent bodies authorising the use of capabilities in response of threats have not been designated, deterrence by punishment is illusive. For deterrence to be effective, credibility and clear communication demonstrating the will and ability to use capabilities is essential. Hence, without a legal framework in place, a deterrence strategy, with whatever means, will not be effective.

While such a framework is essential for the employment of all instruments of power, and certainly in a context of cross domain deterrence (see Chap. 8 by Sweijs and Zilinck), this chapter focuses on the nexus of deterrence and cyberattacks. Taking deterrence against cyber threats as a case, a succinct matrix of options will be presented serving as a conceptual component to generate capabilities to dissuade opponents, offering insight in the available legal bases for each of the power instruments, recognizing the different faces or modalities that may be envisioned. Although at first glance, this approach may appear to focus on deterrence by punishment, it will become evident that deterrence by norms and/or entanglement may also be of relevance.Footnote 20

In addition, to the legal basis, other institutional elements, such as governance issues, will be addressed, involving questions such as ‘who has the authority to decide to make use of the instrument’, who is responsible for the execution, who is accountable (for what part), how is oversight guaranteed, will be (briefly) addressed. As Jakobsen argued, effective coercion requires the demonstrated ability to quickly generate coercive power. Having thought through the appropriate governance framework is instrumental to that. To this end, the situation in the Netherlands’ national legal framework will be used as a demonstration using so-called vignettes.Footnote 21

Combining the international legal bases with the applicable national institutional or governance framework for the use of power instruments, also serves as a demonstration explaining the legal framework outside threats in cyberspace. In fact, it is argued, that the core of this legal framework may be used to prepare for deterrence in cross domain or full dimension situations. Hence, deterrence against opponents using military, economic or other threats, may benefit from this contribution supplementing or reinforcing the conceptual component of deterring power.

This chapter first briefly sets out the instruments of power (Sect. 25.2). Secondly, the components of power and the legal framework as a conceptual element therein are covered (Sect. 25.3). Next, the legal framework itself is analysed in two parts: the legal bases (Sect. 25.4) building on international law and other relevant elements (Sect. 25.5) building on the Netherlands’ institutional arrangements, after which a matrix is presented offering legal options related to the instruments of power (Sect. 25.6).

2 Power Instruments

Power instruments are often briefly summarized as DIME: diplomacy, information, military and economy.Footnote 22 In deterrence literature the military and diplomatic instruments have been dominant in the past. However, contemporary strategic theorists increasingly make use of concepts such as hybrid threats, unrestricted warfare, grey zone activities, information warfare, financial or economic warfare, cultural, ideological, political, virtual and cyber warfare. Other instruments, such as financial, intelligence, legal,Footnote 23 or culture and knowledge, might be added,Footnote 24 to fully grasp the instruments used to exert power in today’s geopolitical arena.

Diplomacy is linked to foreign relations, it is generally about communicating and advocating national or international interests and values. Diplomacy gets a face through the work of diplomats, international governmental organisations but also through international agreements, resolutions, cooperation, coordination, norm development, alliances, treaties, customary law and soft law.Footnote 25

The military instrument, armed forces, may be used in various ways, from (treaty based or ad hoc) peaceful cooperation based on shared values and norms, to armed conflict. The modalities used, the means and methods, may range from classic physical weaponry, to non-kineticFootnote 26 (e.g. training and advisory capacity)Footnote 27 and new information related capabilities, including hard and soft cyber operations.Footnote 28

Economic power, as an instrument may also take various shapes, ranging from consensual (loans) to compulsory (sanctions),Footnote 29 and can be enlarged with the financial instrument of power. It covers both passive elements, e.g. a State’s macro-economic characteristics as well as active measures (assets freeze, investments, etc.). On the institutional side, international economic relations, such as common markets, with its mechanisms and procedures in place, would be another facet.

Next to classic DIME instruments, others come to the fore: culture as a (soft) power element is often seen in action,Footnote 30 expressions of which are Radio Free Europe, China’s Confucius institutes,Footnote 31 Soros’ Open Society Foundation.Footnote 32 Lawfare, law used strategically as an alternative for the military instrumentFootnote 33 in conflict situations,Footnote 34 is used in legal action: e.g. the US’ indictments of foreign cyber operators,Footnote 35 or litigation between States.Footnote 36

Last but certainly not least, information as a power instrument—including intelligence—can be understood in several ways. First of all, it involves the relative value of information sources itself, whether physical, cognitive or virtual.Footnote 37 These sources may be observed by men and/or machine, upon which understanding and decision-making are based.Footnote 38 Large data sets containing personal information related to (large) groups, or traffic data, are also examples of power resources. This substantive facet may be used to affect other actors, e.g. through marketing.Footnote 39 Secondly, it entails structures to communicate, both in terms of procedures and as a medium or vector. This could be the World Wide Web as part of cyberspace, or the internet and the dark web. (Entry) control over these structures, may be used to exert power. One may think of communication channels (old media), Great Firewalls, but also Internet Exchanges, 5G networks, the glass fibre cable network covering the globe, satellites offering mobile internet to places without physical (cable) connectivity. Thirdly, institutions overseeing, designing, contributing to the flow of information may offer a powerbase as well, e.g. the Internet Corporation for Assigned Names and Numbers (ICANN), or the Internet Engineering Task Force. Fourthly, information has a productive aspect as well: to generate debate, to reproduce and reinforce discourse or messaging, to construct and disseminate new information, whether malevolent or benevolent. Consider the (alleged) role of Facebook, Twitter and WikiLeaks in elections, or ordinary marketing.Footnote 40 As demonstrated, cyberspace is used to gather, transfer, handle and produce information, whilst virtual information (i.e. data, software, protocols) is also used as an instrument, as a vector and as a target to generate effects.

3 The Underrated Conceptual Component: Legal Framework

The commonplace understanding of power is as a capacity or attribute with which an actor is endowed, or as a resource to be exploited to achieve particular end.

David Betz & Tom Stevens

Power, described by Betz and Stevens,Footnote 41 may be applied to promote and to protect the vital interests of States.Footnote 42 As described in Sect. 25.1.3 and mindful of earlier academic and doctrinal work,Footnote 43 power requires (1) capacities, most often the so-called physical components (i.a. manpower, means), (2) a conceptual component (strategy, doctrine, planning), and (3) a moral component (will, resilience, determination) to ensure effectiveness, and thus to be regarded a capability.Footnote 44 Power requires instruments, and capacities, that may only be effective when ‘unlocked’ through strategy.Footnote 45

One essential part of the conceptual component, embedded in strategic notions, democratic principles and procedures, is the legal framework accompanying the foreseeable use of power instruments. In democratic rule-of-law States, the principles of legality demand that the use of power (instruments) by States must be based on such a legal framework. A first element in this legal framework is the legal basis for the legitimate employment of power instruments.Footnote 46 In addition, the legal framework, will also entail decision-making procedures describing the (legal and political) authority for the decision to use the designated assets,Footnote 47 the applicable legal regimes when these assets are used (i.a. rules of engagement),Footnote 48 and accountability and oversight mechanisms.Footnote 49

4 Legal Bases

Without a proper legal bases international action, law abiding, and legitimacy seeking States run the risk of producing (or threatening with) non-credible, thus non-deterrent action. Within the limits posed by international law, States are permitted to use power instruments in their international relations. When the use of these instruments falls short of the threshold on the use of force as defined in Article 2(4) of the UN Charter,Footnote 50 interstate action is governed by the general principles of territorial sovereignty,Footnote 51 and respect for the political independence and territorial integrity, and inviolability of States.Footnote 52

Within this international law framework, various bases for non-forceful and forceful action indeed exist. The legal basis for non-forceful action (e.g. economic sanctions, or declaring diplomats persona non grata) is an essential part of the conceptual component as it offers three legitimate avenues for interaction with other States (and non-state actors). As States will generally seek to secure the (perceived) legitimacy of their acts, they will offer some form of clarification for non-consensual behaviour. Most often, these clarifications, or in other terms, legal bases, will be based on in the international law phenomena such as retorsion, countermeasures, or a plea of necessity.

Though the use of force itself is forbidden, international law relevant to interstate force, the jus ad bellum, offers another three exceptions to this rule that provide a legal basis for forceful (individual or collective) actions:Footnote 53 consent,Footnote 54 UN Security Council authorization, or self-defence (see below).Footnote 55 The legitimacy of these actions strengthens the conceptual component of power as it invigorates the normative justification for the action and moreover, it enhances the will the act. The various legal bases for response action will be described below.

4.1 Consent

Paradoxically as it may seem when considering deterrent capabilities, in some cases States might rely on a consensual basis to make use of its power instruments in international relations. This could be both non-forceful and forceful. International law enforcement cooperation might for instance provide for extraterritorial enforcement mechanisms,Footnote 56 enabling States e.g. to locate or attribute threats. When this information is made public, it could contribute to the legitimacy of the use of other instruments and modalities. A consensual basis could also be envisioned through treaty-based conflict-resolution or enforcement mechanisms, for which the treaty provides. For example, through international law enforcement cooperation to obtain forensic evidence from a foreign internet service provider’s cloud server. Another example could be a Status of Forces Agreement, enabling armed forces operating abroad, to act in designated ways in response of e.g. threats to its forces.Footnote 57

4.2 Retorsion

A second basis States might select is retorsion which is defined as unfriendly, but internationally lawful acts, that do not require a prior violation of international law per se.Footnote 58 Unfriendly refers to the fact that retorsion is “wrongful not in the legal but only in the political or moral sense, or a simple discourtesy”.Footnote 59 Retorsion may be used to enforce (international) law, in case the triggering act was indeed a violation of the law. It may also be used to enforce soft law arrangements.Footnote 60 Notwithstanding its use in interstate relations, retorsion can also be used by and against qualified international organizations.Footnote 61

State practice presents a great variety of measures of retorsion: each legislative, executive, administrative, etcetera measure that is permissible under international law and that “seems suitable to a State to redress the unwelcome, unfriendly, or illegal behaviour of another State”.Footnote 62 Common forms can be found within various power instruments: protest; cancelling State visits; denying ships access to ports or to the exclusive economic zone; summoning ambassadors; declaring diplomats persona non grata;Footnote 63 “downgrading diplomatic intercourse to the technical level; recalling ambassadors for consultations of indefinite duration; severing diplomatic relations; terminating the payment of development aid or the provision of military assistance; unilaterally imposing legally permissible economic sanctions such as an arms embargo; [..] suspending, terminating, or refusing to prolong a treaty; and withdrawing from an international organization in order to protest this organization’s political activities.”Footnote 64

Retorsion by using cyber capabilities would be an option in a response to unfriendly (or unlawful) acts by other States,Footnote 65 e.g. by “limiting or cutting off the other state’s access to servers or other digital infrastructure in its territory”,Footnote 66 or by “misleading a prospective intervening party by providing it with bogus or useless information or otherwise diverting cyber break-ins from their intended targets”.Footnote 67

4.3 Countermeasures

A third basis for response options consists of threatening or taking countermeasures. This involves actions taken in response to another State’s violation of international law.Footnote 68 They may be defined as “pacific unilateral reactions which are intrinsically unlawful, which are adopted by one or more States against another State, when the former considers that the latter has committed an internationally wrongful act which could justify such a reaction”.Footnote 69 Countermeasures are used to induce compliance (and enforcement) of international legal obligations.

Unlike retorsion, countermeasures interfere with the target State’s international legal rights, and are therefore subject to preconditions.Footnote 70 They require (1) a prior internationally wrongful act that (2) can be attributed to a State; (3) with the sole purpose to induce the wrongdoer’s compliance; (4) they are limited to non-forceful and proportionate actions only; and (5) a prior demand to the wrongdoer is required.Footnote 71 Finally, (6) countermeasures are not allowed once the unlawful act has ceased.Footnote 72

In terms of responding to prior cyber incidents that violate international law, countermeasures could be used to actively hack back when the location of the infrastructure is known, e.g. the GRU headquarters, to stop the violation,Footnote 73 or to initiate action against States that should have acted to stop their infrastructure from being to for the violation, but are not willing to do so.Footnote 74

4.4 Plea of Necessity

In addition, States facing ‘grave and imminent peril’ to its ‘essential interests’ might, when the strict conditions are met, rely on a plea of necessity in response. Unlike countermeasures, action based on this plea does not require a prior internationally wrongful act to which it is responding, and the author responsible for this act to could—next to States—also be a non-state or an unknown entity.Footnote 75 Once again, the preconditions are very strict. The threshold is high, as it requires (1) a situation of ‘grave and imminent peril’ to (2) ‘essential interests’ of the Victim State.Footnote 76 Moreover, action may (3) not involve the use of force,Footnote 77 should be (4) proportional, and it (5) requires attribution to the author of the (threatening) act who should be (6) addressed first ordering him/her to desist.

The crucial notion of essential interests of States is “vague in international law”.Footnote 78 What is essential, is contextual and will depend from State to State. Grave and imminent peril to a State’s essential interest, refers to actual harm and to threats: “the damage does not already have to have taken place, but it must be imminent and objectively verifiable”.Footnote 79 Moreover, damage caused or threatened could be physical or non-physical, e.g. “situations in which virtually the entire internet is rendered inaccessible or where there are severe shocks to the financial markets” could be viewed as cases in which necessity may be invoked.Footnote 80 Alongside the strict conditions, the plea also gives leeway, as “establishing the existence of a situation of necessity does not require a State to determine the precise origin of the damage or whether another State can be held responsible for it.”Footnote 81 Nevertheless, the necessity may only be invoked when “no other real possibility of taking action to address the damage caused or threatened exists, and provided there is no interference with the essential interests” of other States “or of the international community as a whole”.Footnote 82

In terms of cyberspace, closing down an intrusive cyber operation (e.g. ransomware) against central medical infrastructure or key financial technology (e.g. iDeal) caused by cyber criminals operating from an unknown jurisdiction so that international law enforcement cooperation is futile, could be a scenario to be used.

4.5 Self-Defence

Next to retorsion, countermeasures and a plea of necessity, States may in extreme situations of an armed attack, resort to yet another self-help mechanism: self-defence.Footnote 83 Before the terrorist attacks of 2001, international law accepted that States that are the victim of violent activities that reach the threshold of an armed attackFootnote 84 may respond with lawful measures of self-defence against the author(s) of that armed attack, “provided it does so in conformity with the other material (necessity and proportionality)Footnote 85 and procedural requirements of exercising self-defence (reporting to the Security Council).”Footnote 86

Whether violent activities or operations qualify as an armed attack ‘depends on its scale and effects’. Based on Article 51 UN Charter and customary law, an armed attack has been defined as “a use of force which originates from outside the target State’s territory, rising above the level of a small scale isolated armed incident or criminal activity, which is directed against a State’s territory, its military vessels or aircraft in international sea or airspace or lawfully present on another State’s territory, or in certain situations directed against its nationals located abroad.”Footnote 87

Analysing its elements, an armed attack, first of all, involves the use of force, normally understood to be military force. It might be ‘produced’ through conventional, nuclear or other means and methods of warfare.Footnote 88 Second, it requires a significant use of force, usually measured in terms of “scale and effects”,Footnote 89 as it is generally viewed as a more serious form of the use of force.Footnote 90 Third is the transnational or cross-border aspect of an armed attack. Normally, armed attacks are conducted by the armed forces of a State, launching or conducting a military operation against targets in or belonging to another State.

In accordance with the principle of necessity, self-defence is a forceful measure of last resort, that is, when no consent could be reached, and collective enforcement measures under Chapter VII of the UN Chapter are in-effective, not feasible or not opportune. Moreover, the self-defence response should be proportional.Footnote 91 In the context of this field of the jus ad bellum, proportionality has a distinct meaning.Footnote 92 Contrary to common misunderstanding, proportionality in self-defence does not require a response in kind. In other words, self-defence is a proper legal basis for cross-domain deterrence, as e.g. a classic armed attack could trigger a self-defence response with cyber capabilities, and vice versa, a digital armed attack could be followed by a conventional military response.

4.6 Self-Defence Post-2001

The classic interpretation of an armed attack however, has evolved as a result of the 9/11 terrorist attacks against the United States, and the 2015 terrorist attacks in France, including the subsequent responses that were based on self-defence. Next to States, non-states actors potentially qualify as the author of an armed attack too.Footnote 93 Moreover, an armed attack could be ‘produced’ or generated by non-military means and alternative methods, such as hijacked airliners. In addition, an armed attack could also comprise a series of smaller attacks, launched by a single author against the same target State, when these attacks are reasonably related in geographic and temporal terms.Footnote 94 These new insights, combined with current practises in cyberspace,Footnote 95 have forced States to review their security strategies and stances in international relations, including international law.

Witnessing the interdependence of societies, economies, households and humans created through and with cyberspace, it is notable that States as well as non-state actors have proven to possess capabilities which can threaten or affect vital interests.Footnote 96 As noted by Boddens Hosang and Ducheine, “launching cyber operations that potentially equal the effects of an armed attack, as was the case on 9/11, either by State or non-state actors, is not just a theoretical chance or risk.”Footnote 97 In recognition of this, the NetherlandsFootnote 98 and France, take the view that cyber-attacks could qualify as armed attack,Footnote 99 including the option of purely non-physical consequences of the attack. France notes that a “cyberattack could be categorised as an armed attack if it caused substantial loss of life or considerable physical or economic damage. That would be the case of an operation in cyberspace that caused a failure of critical infrastructure with significant consequences or consequences liable to paralyse whole swathes of the country’s activity, trigger technological or ecological disasters and claim numerous victims.”Footnote 100 The Netherlands’ government, based on its advisory councils, recognizes that “disruption of the state and/or society, or a sustained attempt thereto, and not merely an impediment to or delay in the normal performance of tasks”Footnote 101 could indeed qualify as an armed attack. Notably, a cyber operation targeting “the entire financial system or prevents the government from carrying out essential tasks” could well be equated with an armed attack.Footnote 102

5 Other Parameters: Institutional Arrangement and Attribution

In addition to the legal basis as part of the legal framework that contributes to the conceptual component of power (instruments), two other legal elements are relevant in order to generate effective capabilities with the designated capacities: the institutional set-up and the ability to attribute. Once again, in case these elements are not in place, producing (or threatening with) action with power instruments would be non-credible and ineffective, as opponents would be (or could be) aware of the missing link to transform capacities into effective capabilities.

Related to the legal basis and to the tasking of responsible State organs, and impacting on the decision-making procedure thereto, is the paradigm governing the potential or real response. So, rules concerning the roles, mandates and responsibilities of services and State organs i.a. the Ministry of Foreign Affairs, Ministry of Trade and Development Aid, Economic Affairs, Police, Public Prosecutors, armed forces etc., ought to be in place. It also entails decision-making procedures describing the (legal and political) authority to order the use of the designated assets.Footnote 103 Moreover, it involves the legal regimes applicable when these assets are to be used, i.a. rules of engagement, should be clear.Footnote 104 Likewise, accountability and oversight mechanisms will have to be in place.Footnote 105

Next, a four-tiered attribution framework, is required.Footnote 106 First, threats or harmful cyber incidents need to be detected. Without adequate detection, States are unaware of threats or actual damaging situations in cyberspace, and therefore unable to respond or deter at all. Detection capacities also require conceptual (i.a. legal) backing, before capabilities emanate. Hence, it should be clear who is tasked with what kind of detection or surveillance responsibilities, as well as how detection is handled and communicated to what authorities. For that reason, surveillance and/or investigative powers should be available to the relevant services. Second, technical attribution is needed: a technical forensic inquiry is required to assess e.g. what malware was used, how it operates, from which IP-address or cyber identity it came from, what path it followed and who authored it and has sent it. Obviously, this will require investigative powers. Third, through legal attribution the actors who bear responsibility for the incident may be designated. This relates to the burden of proof and affiliating the perpetrator e.g. an APT to a State or subject to State control. The so-called Articles on States Responsibility are the key legal concept in this realm. The final part is political attribution in which a State may choose to use political communication to address the responsible State (and author)Footnote 107 and if necessary, seek (legal) retribution.Footnote 108 But this ‘naming and shaming’ will not always follow suit;Footnote 109 it will often be conducted discreetly and not in public especially if the relation with the perpetrator is sensitive or if it is a friend rather than a foe. It should be noted however, that political attribution is not required to stem from digital forensics and/or legal attribution. Often the political attribution is a solitary and unilateral act.Footnote 110

The concepts (and rules) for these three forms of attribution should be available, clear and ready to be used, exercised if possible. In case essential parts of this framework are lacking, outdated, not well known or badly rehearsed, the conceptual component is suboptimal, and credibility, hence also effectiveness, of the deterrent instrument could be at stake. For example, with its Defence Cyber Command, cyber capacities in the Netherlands are available. Moreover, the ambition to use these capacities in a deterrent posture had been expressed publicly. However, when the meaning of what an armed attack entails, is unclear, or when politicalFootnote 111 or operationalFootnote 112 decision-making procedures to actually use these capacities in self-defence would be missing, no credible, hence no effective capability is around. As that would be the same when the political will to actually use the capacities of the Defence’s Cyber Command, is lacking.

6 Instruments—Legal Bases Matrix

While the analysis of the legal framework above was presented in the context of cyber capabilities and threats, this framework is generic and essential to all democratic rule-of-law States. The matrix in Table 25.1 is composed of the various power instruments as previously described. It conveys how states can resort to specific legal bases when considering employing instruments of power. The numbered boxes offer realistic combinations of instruments/modalities and legal basis. The numbering refers to a vignette below. While space restriction precludes covering each of the available options,Footnote 113 a few fictitious examples for the Netherlands’ institutional and constitutional setting, including the EU framework, will serve to demonstrate the logic and value of the matrix.Footnote 114

Table 25.1 Legal bases matrix

In scenario one, based on the Cabinet’s decision, the Minister of Foreign Affairs has ordered a negotiation team on bilateral trade cooperation with State B to pause consultations (see option 2 and Table 25.2).Footnote 115 The decision came after the annual report by one of the Intelligence Services revealed that B was caught in an attempt to exfiltrate stolen intellectual property. The Minister just announced this in Parliament, who have formulated questions to learn more details. Using the matrix, this example can be expressed as the following (see Table 25.2).

Table 25.2 Vignette for option 2—Halt diplomatic consultations (Retorsion)

Another vignette involves a counter-intelligence operation (see option 5, and Table 25.3). Based on authorisation by the Minster of Home Affairs, the General Intelligence and Security Service (AIVD), has taken control over a command and control server located in State B that was used by one of B’s proxies, to steer a large botnet threatening to overload C2000 communications. The Minister has informed the Parliamentary Intelligence Committee (CIVD), and the Review Committee on the Intelligence and Security Services (CTIVD) is aware of the operation and will evaluate the legitimacy of the operation in the coming year.

Table 25.3 Vignette for option 5—Counter-Intelligence operation (countermeasures)

7 Conclusion

Contemporary conflicts are no longer exclusively fought in the military domain, if they ever were. Other arenas and instruments of power have come to the fore. Next to military power, economic, diplomatic, cultural, legal and especially informational means are important in today’s world in which physical confrontation is often absent or less relevant, inter alia due to the emergence of cyberspace as an omnipresent domain of engagement.

In order to effectively apply State power, through whatever instrument, the capacities need to be in place as well as the will to apply them. An often-overlooked factor however is the conceptual component: a clear idea on how to apply the instruments, the relevance of which only increases with the widening set of instruments of power States may consider, or be forced to employ, such as cyber operations.

For democratic States the conceptual component fundamentally includes the legal framework and proper and well established institutional arrangements. The legal framework, often undervalued, generates the conceptual legitimate basis for executing operations, including deterrence operations. It includes the legal basis in terms of proper authority and decision-making procedures, legal regimes, accountability and oversight mechanisms. Moreover, the framework must not merely exist, it must be trained in a cross-domain setting, because in case essential parts of the legal framework are lacking, outdated, not well known or badly rehearsed, the conceptual component is suboptimal, and credibility, hence also effectiveness, of the deterrent instrument could be at stake.

Although this framework was set up within cyberspace and with cyber threats as a starting point, the argument is that in its generic shape, this legal framework is relevant outside cyberspace in expressing the State’s will and for countering outside threats. The framework itself, composed of international legal bases and other national legal elements, is presented here in a matrix, combining all instruments of powers, and applicable legal bases enabling the actual or potential use of those instruments in their various modalities.

The matrix also demonstrates that other strategic functions could benefit from the idea that power entails capacities, concepts to use it, and the actual will to do so. The examples demonstrated that threats from one domain could be countered by responses in another domain. The legal framework thus may empower the ambition to effectuate so-called cross domain deterrence.