Skip to main content

Pointing with Boneless Finger and Getting Away with it: The Ill-Substantiation Problem in Cyber Public Attribution

  • Chapter
  • First Online:
Revolutionary Approach to International Law

Part of the book series: International Law in Asia ((ILA))

  • 193 Accesses

Abstract

State’s urge to make attribution ensues the suffering from prior foreign malicious cyber operations. Helpful in understanding such attribution practice are three commonly recognized dimensions, respectively, from technical, political, and legal perspectives. Compared to confidentially processed attribution, to publicly blame a state should be better substantiated. But as legal deficiencies in the current body of international law, apart from also some technical obstacles, cannot live up to the political desire of the accuser to make public attribution, the ill-substantiation problem becomes prominent. Debates over the “control test” and misuse of due diligence principle in cyber scenarios extend the responsibility scope of the territorial state. Lack of essential evidentiary requirements cripples the predictability and falsifiability for bringing up accusation. Inculpability for erroneous attribution invites the accusing state’s recklessness. In light of these legal deficiencies, an international norm on responsible state behavior for public attribution could be a promising way forward.

This chapter is a fully revised and expanded article developed with permission from the author's earlier contribution to a research report on Managing U.S.-China Tensions Over Public Cyber Attribution, published by Carnegie Peaceful Endowment in March 2022. The author owes thanks to Carnegie’s research team on cyber public attribution, inter alia, George Perkovich and Ariel Levite, for their earlier comments as well as the support for the reproduction of this lengthier article.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    To clarify, this Article uses the term “cyber operation” to incorporate different categories of cyber activities, including cyberattack which may amount to a use of force or armed attack in the sense of international law, and cyber espionage which refers to the large variety of below the Law of Armed Conflict (LOAC) activities in cyber “grey zone,” and also cyber-criminal activities, which does not trigger state responsibility in the strict and traditional sense, but may be changing in the cyber scenario.

    On another note, this Article focuses on public attribution made by states. Entities other than states can also publicly attribute blame for a cyber operation, but for different aims and subject to different rules, if any. Private corporations, usually cyber security firms, may aim to enhance their influence, cultivate market demands, and ultimately cash out by selling products, services, and solutions on cybersecurity. Media may simply want an eye-catching story and may be easily manipulated by customized feeds of source information provided by enterprises or state organs. Since it falls outside of the purview of international law, the problem with these entities making public attribution merits a separate piece of analysis.

  2. 2.

    Dong et al. (2014). Some commentator coined this as "attribution by indictment," see Keitner (2019).

  3. 3.

    The White House (2021).

  4. 4.

    Among them are the EU, NATO, and UK. See, e.g., Council of the EU (2021, UK Foreign, Commonwealth & Development Office, National Cyber Security Centre, and The Rt Hon Dominic Raab MP (2021), NATO (2021).

  5. 5.

    Brenner (2009).

  6. 6.

    For pioneering work to review the exercise of “matching an offender to an offence … in minimizing uncertainty” on tactical, operational, and strategical levels. See Rid and Buchanan (2015).

  7. 7.

    Alperovitch (2018).

  8. 8.

    The imparity of cyber capabilities among states, including that to attribute, has been assessed and largely validated by many empirical studies. For one example, see The International Institute for Strategic Studies (2021).

  9. 9.

    For chart illustrations covering the period of 2015–2020 verifying this deduction, see Garrett Derian-Toth et al. (2021). Not surprisingly, top five countries that made the most use of public attributions are all from Five Eyes Alliance, and China, Russia, Iran and North Korea have been identified as the responsible actors for 75% of all state-sponsored offensive cyber operations.

  10. 10.

    Egloff and Smeets (2021).

  11. 11.

    Hinck and Maurer (2020).

  12. 12.

    Romanosky and Boudreaux (2020).

  13. 13.

    Schmitt and Vihul (2014).

  14. 14.

    U.S. DOJ Press Conference Transcript (2020). Some describes “the strategic logic of public attribution as a meaning-making process,” see Egloff (2020).

  15. 15.

    Eichensehr (2020).

  16. 16.

    Schmitt M, Vihul L, op. cit. 13.

  17. 17.

    U.S. Office of the Director of National Intelligence (2018).

  18. 18.

    Some have noted that different purposes of public attribution relate to different levels of evidence. See Eichensehr K, op. cit. 15, p 558.

  19. 19.

    It is a long-debated question as to when does cyber operations fall within the meaning of “armed attack” in the language of Art. 51 of UN Charter. See, e.g., Dev (2015).

  20. 20.

    Finlay and Payne (2019).

  21. 21.

    China, Russia, et al. (2018).

  22. 22.

    Quoted phrase appeared in the first statement of the US position on evidentiary issues, see Egan (2017). Regarding legal underpinnings of evidentiary issues in cyber attribution, “the U.S., British, French, and Dutch efforts to block the development of customary international law on attribution” have been criticized as “shortsighted.” See Eichensehr K, op. cit. 15, pp 521–598.

  23. 23.

    The Group of Governmental Experts (2021).

  24. 24.

    McKenzie (2017), Fischerkeller and Harknett (2017).

  25. 25.

    White House Press Briefings (2021).

  26. 26.

    Art. 2 of ARSIWA.

  27. 27.

    (28 Jan 2002) General Assembly Resolution on Responsibility of States for internationally wrongful acts, UN Doc (A/RES/56/83). https://undocs.org/en/A/RES/56/83.

  28. 28.

    Crawford (2013).

  29. 29.

    Ibid, pp 146–154.

  30. 30.

    Case concerning Military and Paramilitary Activities in and against Nicaragua (Nicaragua v. USA), Merits, (27 Jun 1986) ICJ Report.

  31. 31.

    Prosecutor v. Tadic, Appeals Chamber, Decision on the Defence Motion for Interlocutory Appeal on Jurisdiction (2 Oct 1995) (ICTY-94–1-AR72).

  32. 32.

    Shackleford and Andres (2010).

  33. 33.

    Lahmann (2020).

  34. 34.

    Prosecutor v. Tadic, paras. 131, 137.

  35. 35.

    The Corfu Channel Case (United Kingdom v. Albania), Merits, ICJ Report, 1949.

  36. 36.

    Shackelford et al. (2016), Jensen and Watts (2021).

  37. 37.

    Mackenzie and Scott (2021), Chircop (2018).

  38. 38.

    Schmitt (2017a), Rule 6. The rule reads: “State must exercise due diligence in not allowing its territory, or territory or cyber infrastructure under its governmental control, to be used for cyber operations that affect the rights of, and produce serious adverse consequences for, other states.”

  39. 39.

    The Group of Governmental Experts, Report on Advancing Responsible State Behavior in Cyberspace in the Context of International Security (Advanced Copy) (2021).

  40. 40.

    See CCDCOE Cyberlaw Wiki, Due diligence. https://cyberlaw.ccdcoe.org/wiki/Due_diligence.

  41. 41.

    Remarks by President Biden on the Economy (2021).

  42. 42.

    Remarks by President Biden in Press Conference (2021).

  43. 43.

    Harding et al. (2021); Goldsmith (2021). Note there are also other viewpoints justifying the US combating ransomware group in Russian territory as “self-help,” instead of as countermeasure as to Russia's breach of due diligence obligation. See Corn (2021).

  44. 44.

    Lahmann H, op. cit. 33, p 91.

  45. 45.

    Report of the Group of Governmental Experts on Advancing Responsible State Behavior in Cyberspace in the Context of International Security (Advanced Copy) (2021).

  46. 46.

    Some commentator deems the evidentiary requirement in legal argument on cyber issues as a deadlock problem, which has no solution, so long as one sticks to an interventionist approach to impose international law on cyber operations. See d'Aspremont (2016).

  47. 47.

    Quoted phrase appeared in the first statement of the US position on evidentiary issues, see Egan BJ, op. cit. 22, p 177. Regarding legal underpinnings of evidentiary issues in cyber attribution, “the U.S., British, French, and Dutch efforts to block the development of customary international law on attribution” have been criticized as “shortsighted.” See Eichensehr K, op. cit. 15, pp 521–598.

  48. 48.

    ARSIWA, Commentaries, Chapter V, p 8.

  49. 49.

    Margulies (2015).

  50. 50.

    Lahmann H, op. cit. 33, pp 93–97.

  51. 51.

    Oil Platforms (Iran v. U. S.), ICJ Judgment of 6 November 2003, Separate Opinion of Judge Higgins, para. 33.

  52. 52.

    Green (2009).

  53. 53.

    Rome Statute of the International Criminal Court, Article 66(3).

  54. 54.

    Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosnia and Herzegovina v. Serbia and Montenegro), Judgment, ICJ Reports 2007, p. 90, para. 209.

  55. 55.

    The Land, Island and Maritime Frontier Dispute (El Saldavor/Honduras), ICJ Judgment of 11 September 1992, para. 248; Sovereignty over Pedra Branca/Pulau Batu Puteh, Middle Rocks and South Ledge (Malaysia/Singapore), ICJ Judgment of 23 May 2008, para. 86.

  56. 56.

    Military and Paramilitary Activities in and against Nicaragua (Nicaragua v. U. S.), ICJ Judgment of 27 June 1986, paras. 106, 109, 115, 135, 207; Armed Activities on the Territory of the Congo (Democratic Republic of the Congo v. Uganda), ICJ Judgment of 2005, ICJ Reports (2005), paras. 72, 91, 136.

  57. 57.

    O’Connell (2002); Eichensehr K, op. cit. 15, pp 559–562.

  58. 58.

    Teitelbaum (2007).

  59. 59.

    See Schmitt (2011).

  60. 60.

    Brunner et al. (2019).

  61. 61.

    Eichensehr K, op. cit. 15, pp 576–586.

  62. 62.

    Rid T, Buchanan B, op. cit. 6, p 28.

  63. 63.

    Eichensehr K, op. cit. 15, pp 571–572.

  64. 64.

    Bin Cheng first put forward the notion of "instant" international customary law in a discussion on outer space law. See Bin Cheng, United Nations Resolutions on Outer Space: ‘Instant’ International Customary Law? In: Bin Cheng (1997).

  65. 65.

    Rid T, Buchanan B, op. cit. 6, p 32.

  66. 66.

    Milanovic (2020).

  67. 67.

    Sklerov (2009).

  68. 68.

    The White House (2012).

  69. 69.

    Schmitt (2017b).

  70. 70.

    ARSIWA, Commentaries, art. 49(3).

  71. 71.

    Lahmann H, op. cit. 33, pp 97–109.

  72. 72.

    Shany and Schmitt (2020).

  73. 73.

    Eichensehr (2019).

  74. 74.

    Report of the Group of Governmental Experts on Advancing Responsible State Behavior in Cyberspace in the Context of International Security, (Advanced Copy) (2021).

  75. 75.

    Art. 4, Understanding on rules and procedures governing the settlement of disputes, Annex 2 of the WTO Agreement.

  76. 76.

    Art. 2 of ARSIWA.

  77. 77.

    France’s Cyber Strategy (2008); French Cyber Defense Strategic Review (2018).

  78. 78.

    Guillaume Poupard, the head of the French cybersecurity agency (ANSSI), revealed APT31 modus operandi attack campaign targeting France. https://www.linkedin.com/feed/update/urn:li:activity:6823528088136105984; https://www.cert.ssi.gouv.fr/ioc/CERTFR-2021-IOC-003.

  79. 79.

    Desforges and Géry (2021).

  80. 80.

    According to Antiy Tech Group, a Chinese cyber security firm, multiple cyberattacks targeting Chinese defense and military units have been captured this year alone, allegedly all from India. See Huanqiu News (2021).

References

Download references

Acknowledgements

The author would extend the deepest appreciation to George Perkovich, Ariel Levite, Jon Bateman, Scott Collard, June Lee from Carnegie Endowment for International Peace, to Chuanying Lu, Manshu Xu from Shanghai Institute for International Studies, and to Yan Li from China Institutes of Contemporary International Relations, for their insightful critiques on earlier drafts of this Article.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fan Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Yang, F. (2023). Pointing with Boneless Finger and Getting Away with it: The Ill-Substantiation Problem in Cyber Public Attribution. In: Lee, E.Y.J. (eds) Revolutionary Approach to International Law. International Law in Asia. Springer, Singapore. https://doi.org/10.1007/978-981-19-7967-5_14

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-7967-5_14

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-7966-8

  • Online ISBN: 978-981-19-7967-5

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics