cyber attacks and the use of force in international law

Upload: nageshkomati

Post on 02-Jun-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    1/101

    !"#$% '(()*+, )-. (/$ 0,$ 12 31%*$4- 5-($%-)(41-)6 7)8

    !"##$ &"'(

    )"*+$,-* ./$*0*

    1#02$,*0+3 (4 5$'*0#60

    7"89'+3 (4 :";

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    2/101

    Tiedekunta/Osasto Fakultet/Sektion Faculty Laitos/Institution Department

    Tekij/Frfattare Author

    Tyn nimi / Arbetets titel Title

    Oppiaine /Lromne Subject

    Tyn laji/Arbetets art Level Aika/Datum Month and year Sivumr/ Sidoantal Number of pages

    Tiivistelm/Referat Abstract

    Avainsanat Nyckelord Keywords

    Silytyspaikka Frvaringstlle Where deposited

    Muita tietoja vriga uppgifter Additional information

    Faculty of Law

    Janne Valo

    International Law

    Masters Thesis January 2014 XIV + 85 p.

    he thesis reviews the issue of cyber attacks and international law in terms of jus ad bellum, the lawconcerning the recourse to force by states. The thesis takes the view that the existing rules on the useof force, namely Articles 2(4) and 51 of the United Nations Charter and the corresponding rules ofcustomary international law apply to attacks regardless of the way they are carried out and thus, they

    apply to cyber attacks as well. Two central examples of different kinds of cyber attacks are presentedo illustrate the issue: the attacks against Estonia in 2007 and Stuxnet, the malware that targetedIranian nuclear facilities and was discovered in 2010.

    Before covering the main question of if and when cyber attacks may constitute uses of force or armedattacks, the thesis takes a brief historical look at how the just war doctrine and the regulation of warhave evolved to their current state. The thesis argues that while cyber attacks are a new phenomenonwith certain unique aspects, they are a part of the evolution and continuum of armed conflict.

    he thesis takes a look at the different approaches (instrument-based, target-based and effects-based) to assessing the question of whether or not a cyber attack crosses the threshold of a use oforce or an armed attack. The effects-based view is found to be most appropriate one. It is argued that

    particularly cyber attacks that cause death, injury, damage or destruction qualify as uses of force. Ascyber operations make it possible to cause severe economic consequences without the use ofphysical force, the question of economic force is discussed as well. The thesis argues that while theprevailing view is that Article 2(4) does not cover the use of economic force, the question may arise inhe context of cyber attacks, and an attack with such consequences may result in a reappraisal of theissue in state practice.

    urning to armed attacks, the thesis argues that cyber operations may also qualify as armed attacks.Accepting the prevailing view that distinguishes between uses of force and armed attacks, the thesisclaims that for a cyber operation to rise to the level of an armed attack, the consequences must besufficiently grave. It is argued that for example a denial-of-service attack does not fulfil the criteria ofan armed attack, but an attack that causes fatalities or severe damage or destruction would cross thehreshold and justify self-defence. The thesis also discusses the question of pre-emptive self-defencein the context of cyber attacks.

    international law, cyber attacks, use of force, jus ad bellum, armed conflict, self-defence

    Cyber Attacks and the Use of Force in International Law

    University of Helsinki Library

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    3/101

    !"#$% '( )'*+%*+,

    D '$* (4 Q3K$, J++"86*@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DI

    F@I@D J++"86* JG"0#*+ L*+(#0" 0# FRRO@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DI

    F@I@F =+9M#$+@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DH

    F@I@I N$E T8+(K$,@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DU

    F@H .$8/#08"' J*>$8+* (4 +/$ J++"86*@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DO

    I N$G9'"+0(# (4 +/$ 1*$ (4 7(,8$@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@FR

    I@D V$#$,"' S(+0(#* JK(9+ P", "#E

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    4/101

    H@U Q/">+$, &"+(,3 =$'4]A$4$#8$@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@UX

    X@X@D B(**0K0'0+3 (4 J#+080>"+(,3 =$'4]A$4$#8$@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@UX

    X@X@F J#+080>"+(,3 =$'4]A$4$#8$ "#E Q3K$, J++"86*@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@U[

    X@U Q(#8'9*0(#* JK(9+ =$'4]A$4$#8$@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@OD

    U B,0#80>'$ (4 S(#]'$ (4 S(#]

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    5/101

    !"#$"%&'()*+

    ,'-(."-/

    Q(#2$#+0(# Y+$CK$, D_RR@

    Q(#2$#+0(# Y$8+0#G +/$ :";* "#E Q9*+(C* (4 P", (# :"#E "#E 0+* "##$M?

    N$G9'"+0(#* Q(#8$,#0#G +/$ :";* "#E Q9*+(C* (4 P", (# :"#E` ./$ 5"G9$` D[ T8+(K$,

    D_RO` 0# 4(,8$ FU !"#9",3 D_DR@

    ./$ V$#$,"' .,$"+3 4(, +/$ N$#9#80"+0(# (4 P",` FO J9G9*+ D_F[@ :S.= 2('@ aQ$ Q(#2$#+0(# (# Q3K$,8,0C$` FI S(2$CK$, FRRD` 0# 4(,8$ D !9'3 FRRH`QL.= S(@ D[X@

    01".-2 4(."%1/ 5-/%$6."%1/

    7-1-'($ 8//-9#$+

    A$8'","+0(# (# +/$ $,"+0(# "C(#G =+"+$* 0# J88(,E"#8$ ;0+/ +/$ Q/",+$, (4 +/$ 1#0+$E S"+0(#*`

    VJ N$*@ FUFX Yaa&Z` FH T8+(K$, D_OR@

    A$40#0+0(# (4 JGG,$**0(#` VJ N$*@ IIDH Yaa

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    6/101

    N$*>(#*0K0'0+3 (4 =+"+$* 4(, +$CK$,

    FRRD@

    N$*('9+0(# DIOI YFRRDZ (4 +/$ =$89,0+3 Q(9#80'` 1S A(8@ =bNL=bDIOI` F[ =$>+$CK$,

    FRRD@

    N$*('9+0(# DHI[ YFRRFZ (4 +/$ =$89,0+3 Q(9#80'` 1S A(8@ =bNL=bDHI[` DH T8+(K$, FRRF@

    N$*('9+0(# DXIR YFRRHZ (4 +/$ =$89,0+3 Q(9#80'` 1S A(8@ =bNL=bDXIR` DD )",8/ FRRH@

    N$*('9+0(# DU_X YFRRUZ (4 +/$ =$89,0+3 Q(9#80'` 1S A(8@ =bNL=bDU_X` DX !9'3 FRRU@

    N$*('9+0(# DU_U YFRRUZ (4 +/$ =$89,0+3 Q(9#80'` 1S A(8@ =bNL=bDU_U` ID !9'3 FRRU@

    N$*('9+0(# DOD[ YFRRUZ (4 +/$ =$89,0+3 Q(9#80'` 1S A(8@ =bNL=bDOD[` DH T8+(K$, FRRU@

    N$*('9+0(# D_OI YFRDDZ (4 +/$ =$89,0+3 Q(9#80'` 1S A(8@ =bNL=bD_OI` DO )",8/ FRDD@

    =.*-' >%;69-1./

    01".-2 4(."%1/

    N$>(,+ (4 +/$ ,$*$#+"+02$ (4 +/$ 1#0+$E =+"+$*

    +( +/$ 1#0+$E S"+0(#* JEE,$**$E +( +/$ B,$*0E$#+ (4 +/$ =$89,0+3 Q(9#80'`

    1S A(8@ =bD_OD_@

    :$++$, A"+$E FX )"3 D__I 4,(C +/$ B$,C"#$#+ N$>,$*$#+"+02$ (4 +/$

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    7/101

    ,$*$#+"+02$ (4 +/$ 1#0+$E =+"+$* (4

    JC$,08" +( +/$ 1#0+$E S"+0(#* "EE,$**$E +( +/$ B,$*0E$#+ (4 +/$ =$89,0+3 Q(9#80'@1S A(8@ =bFRRDb_HU@

    N$>(,+ (4 +/$ $#` ="4$ "#E =$89,$ Q3K$,*>"8$

    Y!T"@$9b0#4(,C"+0(#f*(80$+3b#$;*,((Cb84bE"$bE(89C$#+@84C^E(8f0EgDUUOh@

    4(."%1($ :-;6'".+ :.'(.-&"-/

    70##0*/ =$89,0+3 "#E A$4$#8$ B('083 FRRH`

    e;;;@E$4C0#@40b40'$*bIDDbFXOHfFDURfL#G'0*/fP/0+$f>">$,fFRRHfDf@>E4h@

    70#'"#E-* Q3K$, =$89,0+3 =+,"+$G3 FRDI`e3/+$0*69##"#+9,2"''0*99*@40b$#bC"+$,0"'*bE(8fE(;#'("EbHR]40#'"#E"*]83K$,]*$89,0+3]

    *+,"+$G3hZ@

    ./$ 1#0+$E =+"+$* *#?()@A6*7'*#+():,Z` !9EGC$#+` (,+* D_U_` >@ I@

    E4+47(#@ (): F(#(?4+47(#@ 2=740474*, 4) (): 2G(4),7 64=(#(G%(Y64=(#(G%( 01 .)47*: 87(7*,

    "$ 2?*#4=(Z` !9EGC$#+` (,+* D_[U` >@ DH@

    H*##47"#4(+ B4,@ U@

    &

    http://ec.europa.eu/information_society/newsroom/cf/dae/document.cfm?doc_id=1667http://www.defmin.fi/files/311/2574_2160_English_White_paper_2004_1_.pdfhttp://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber-security-strategyhttp://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber-security-strategyhttp://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdfhttp://ec.europa.eu/information_society/newsroom/cf/dae/document.cfm?doc_id=1667http://www.defmin.fi/files/311/2574_2160_English_White_paper_2004_1_.pdfhttp://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber-security-strategyhttp://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber-security-strategyhttp://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    8/101

    I*G(+47@ "$ 7'* H'#*(7 "# .,* "$ 6%=+*(# L*(@ DU[@

    2#?*: 2=740474*, ") 7'* H*##47"#@ "$ 7'* !")G" -6*N 2>*"'"` D__DZ@

    $,Q(''0#*? S$; j(,6` FRDRZ@

    Q",' 2(# Q'"9*$;0+l` ["? /#4*G*YN(;(/'+? 5"CK9,G` D_UIZ@

    S($' Q(M` H*=')"+"G@ (): I*G(+ 8@,7*?,YJ*/G"+$? 7",#/"C` FRRUZ@

    &

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    9/101

    5$"+/$, 5",,0*(# A0##0**` !@3*# L(#$(#* (): 7'* I(N, "$ L(#YQ"CK,0EG$ 1#02$,*0+3

    B,$**` FRDFZ@

    j(,"C A0#*+$0#`L(#K 2GG#*,,4") (): 8*+$YB*$*)=* YX+/ LE0+0(#` Q"CK,0EG$ 1#02$,*0+3

    B,$**` FRDFZ@

    ./(C"* )@ 7,"#86`;*="%#,* 7" 9"#=* Z 87(7* 2=74") 2G(4),7 H'#*(7, (): 2#?*: 277(=C,

    YQ"CK,0EG$ 1#02$,*0+3 B,$**` FRRFZ@

    .",80*0( V"ll0#0`H'* !'()G4)G ;%+*, ") 7'* .,* "$ 9"#=* 4) R)7*#)(74")(+ I(N

    Y)"#8/$*+$, 1#02$,*0+3 B,$**` FRRXZ@

    Q/,0*+0#$ V,"3`R)7*#)(74")(+ I(N (): 7'* .,* "$ 9"#=* YI,E LE0+0(#` TM4(,E 1#02$,*0+3

    B,$**` FRR[Z@

    :";,$#8$ .@ V,$$#K$,G` =$3C(9, L@ 5(44C"# "#E W$20# !@ =(( 5((`R)$"#?(74") L(#$(#*

    (): R)7*#)(74")(+ I(NYS"+0(#"' A$4$#*$ 1#02$,*0+3? P"*/0#G+(#` A@Q@ D__[Z@

    W",0 5"6">oo` .%,4 C(),(4)0\+4)*) "4C*%,Y."'$#+9C? 5$'*0#60` FRRXZ@

    :"9,0 5"##06"0#$#`F*#*?

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    10/101

    )"'8('C =/";`R)7*#)(74")(+ I(NYI,E LE0+0(#` Q"CK,0EG$ 1#02$,*0+3 B,$**` D__XZ@

    )08/"$' S@ =8/C0++ Y$E@Z` H(++4)) E()%(+ ") 7'* R)7*#)(74")(+ I(N 2(,"+0(#?7"''* Q/9,8/` D___Z@

    !@ S@ =0#G/` .,* "$ 9"#=* %):*# R)7*#)(74")(+ I(NY5",#"C B9K'08"+0(#*? S$; A$'/0`

    D_[HZ@

    L#$6$# .066` W"E,0 W"*6" "#E :00* &0/9'`R)7*#)(74")(+ !@3*# R)=4:*)7, Z I*G(+

    !"),4:*#(74"),YQ((>$,"+02$ Q3K$, A$4$#8$ Q$#+,$ (4 LM8$''$#8$? ."''0##` FRDRZ@

    V,0G(,0p

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    11/101

    N(K0# V$0x "#E 5$##0#G :"/C"##` -7,$$E(C "#E =$89,0+3 0# Q3K$,*>"8$? S(#]7(,80K'$

    Q(9#+$,C$"*9,$* "#E Q(''$8+02$ ./,$"+]B,$2$#+0(#-` 0# W"+/",0#" w0('6(;*60 Y$E@Z`

    F*(=*74?* ;*G4?* $"# 87(7* 2=740474*, 4) !@3*#,(#E0#G +( .,"#*#"+0(#"' .$,,(,0*C 9#E$, +/$ !9* "E k$''9C-` 0#

    )08/"$' S@ =8/C0++ "#E !$'$#" B$p08 Y$E*Z`R)7*#)(74")(+ I(N (): 2#?*: !")$+4=7O

    P_'3 +( A,@ w0('6(;*60-` 0#

    Q@ Ql(**$6` N@ T++0* "#E W@ w0('6(;*60 Y$E*Z` TUaT ^7' R)7*#)(74")(+ !")$*#*)=* ") !@3*#

    !")$+4=7 F#"=**:4)G,YSJ.T QQA QTL B9K'08"+0(#*? ."''0##` FRDFZ` IDDiIDO@

    !((#"* =0>0'o` -B99#$0*+" k"*+0(#$0/0# i =(+" p" /0*+(,0"''0*$+ $*0C$,60+-` 0# !3,0 N"0+"*"'(

    "#E !((#"* =0>0'o Y$E*Z`E%%77%0( ,"7(YS"+0(#"' A$4$#8$ 1#02$,*0+3? 5$'*0#60` FRRXZ`

    FXiXH@

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    12/101

    W",0 ."6"C""` -&$,66(*(E"#6o3#+00# '00++320o 6"#*"0#2o'0*(06$9E$''0*0" (#G$'C0" i

    (06$9E$''0*$# *oo#+$'3# >$,9*+$0E$# 6",+(0+9*+"-` 0# .0C( W(029,(2" Y$E@Z`

    /(),(4)0\+4,7@0\ "4C*%, Z J%'+(C4#W(K ,0*"'* K3 =+"+$*-` DI H'* [4#G4)4( J"%#)(+ "$

    R)7*#)(74")(+ I(NYD_OFZ DiDF@

    A$,$6 P@ k(;$++` -N$>,0*"'* (*"' 4(, "# 9+$, S$+;(,6 J++"86* "#E =$'4]A$4$#*$-` OU .181 6(0(+ L(#!"++*G* R)7*#)(74")(+ I(N 87%:4*, YFRRFZ __iDD_@

    .@ A@ V0''` -./$ .$C>(,"' A0C$#*0(# (4 =$'4]A$4$#8$? J#+080>"+0(#` B,$]$C>+0(#`

    B,$2$#+0(# "#E "#0$* "#E

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    13/101

    )08/"$' V$,2"0*` -Q3K$, J++"86* "#E +/$ :";* (4 P",-` IRM*#C+*@ J"%#)(+ "$ R)7*#)(74")(+

    I(NYFRDFZ XFXiXO_@

    !"C$* J@ V,$$#` -y9$*+0(#0#G +/$ B$,$C>+(,3 =+"+9* (4 +/$ B,(/0K0+0(# (4 +/$ 1*$ (4

    7(,8$-` IFE4='4G() J"%#)(+ "$ R)7*#)(74")(+ I(NYFRDDZ FDXiFXO@

    T(#" 5"+/";"3` N$K$88" Q,((+(4` P0''0"C B$,E9$ "#E B/0'0> :$20+l` -./$ :"; (4 Q3K$,]

    J++"86-` DRR !(+4$"#)4( I(N ;*04*NYFRDFZ [DOi[[X@

    )08/"$' &@ 5"3E$#` -./$ 79+9,$ (4 ./0#G* zQ3K$,z-` X 87#(7*G4= 87%:4*, m%(#7*#+@YDbFRDDZ

    IiO@

    :(90* 5$#60#` -./$ N$>(,+* (4 +/$ A$"+/ (4 J,+08'$ FYHZ J,$ V,$"+'3 LM"GG$,"+$E-`

    UX H'* 2?*#4=() J"%#)(+ "$ R)7*#)(74")(+ I(NYD_ODZ XHHiXH[@

    A9#8"# k@ 5(''0*` -P/3 =+"+$* S$$E "# '$ (4 S(#]0#+$,2$#+0(#-` FFI*4:*)

    J"%#)(+ "$ R)7*#)(74")(+ I(NYFRR_Z IHXiI[D@

    L,08 ."'K(+ !$#*$#` -Q(C>9+$, S$+;(,6 J++"86* (# Q,0+08"' S"+0(#"' +( D_HX i N$*9,,$8+0(# (4 +/$ N$>,0*"' "#E J#+080>"+(,3 =$'4]

    A$4$#*$ A(8+,0#$* 0#

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    14/101

    !"##$ )"'660` -W90#6" *(+" C99++99^-`/",?"/3` -B,(+$"# !9* JE k$''9C-` FOM*#C*+*@ J"%#)(+ "$ R)7*#)(74")(+ I(N

    YFRR_Z FFiXF@

    N$$*$ SG93$#` -S"20G"+0#GJ%, 2: M*++%?0# +/$ JG$ (4 Q3K$, P",4",$-` DRD !(+4$"#)4(I(N ;*04*NYFRDIZ DRO_iDDID@

    k,"E'$3 N"K(0#` -Q(,,$*>(#E0#G L2('9+0(#? ` -Q3K$, P",4",$ T>$,"+0(#*? A$2$'(>C$#+ "#E 1*$ 1#E$, "8$? ./$ W(/ =>$$8/ "#E ."''0##

    )"#9"' !9M+">(*$E-` XH`(#0(#: R)7*#)(74")(+ I(N J"%#)(+ S)+4)* YFRDFZ@

    =8(++ =/"86$'4(,E` -7,(C S98'$", P", +( S$+ P",? J#"'(G0l0#G Q3K$, J++"86* 0#

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    15/101

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    16/101

    J#E3 V,$$#K$,G` -=/(>>0#G 4(, w$,(]A"3*? J B,08$ :0*+ 4(, 5"86$,*- =$8,$+ =(4+;",$

    LM>'(0+*-`9"#3*,` FI )",8/ FRDF`

    e;;;@4(,K$*@8(Cb*0+$*b"#E3G,$$#K$,GbFRDFbRIbFIb*/(>>0#G]4(,]l$,(]E"3*]"#]>,08$]'0*+]

    4(,]/"86$,*]*$8,$+]*(4+;",$]$M>'(0+*bh@

    -uN$E T8+(K$,u A0>'(C"+08 Q3K$, J++"86* %(#:4()` FI J>,0' FRDI`

    e;;;@G9",E0"#@8(@96bK9*0#$**bFRDIb">,bFIb">]+;$$+]/"86];"'']*+,$$+]4,$$4"''h@

    =$"# V"''"G/$,` -=C",+ .(0'$+ &9'#$,"K'$ +( k'9$+((+/ 7'9*/0#G 5"86-` L4#*: X J9G9*+

    FRDI` e;;;@;0,$E@8(@96b#$;*b",8/02$bFRDI]R[bRXb+(0'$+]/"86]"++"86h@

    N"'>/ :"#G#$,` H" /4++ ( !*)7#4$%G* Z 2 H*=')4=(+ 2)(+@,4, "$ L'(7 87%_)*7e, !#*(7"#,

    H#4*: 7" 2='4*0*` S(2$CK$, FRDI` e;;;@'"#G#$,@8(Cb$#b;>]8(#+$#+b9>'("E*bFRDIbDDb.(]

    60'']"]8$#+,049G$@>E4h@

    a

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    17/101

    - .*+/'012+3'*

    !"! $%&'()*+&,(% &( &-. $//*.

    P",* 4,$\9$#+'3 C"6$ 9*$ (4 #$; +$8/#('(G08"' "E2"#8$C$#+*@ ./$3 C0G/+ K$ *C"''$,`

    0#8,$C$#+"' E$2$'(>C$#+* *98/ "* C(,$ "889,"+$ +,"E0+0(#"' 60#$+08 ;$">(#* '06$ ,04'$* (,

    C0**0'$*` (, +/$3 C0G/+ K$ #$; +3>$* (, 0C>,(2$E 2$/08'$* '06$ E,(#$* (, *+$"'+/ K(CK$,*@

    5(;$2$, #$; "#E 0C>,(2$E` +/$*$ 60#E* (4 ;$">(#* K"*08"''3 ",$ C$"#* 4(, "8/0$20#G +/$

    *"C$ G("'* "* K$4(,$ i 0# C"#3 ;"3* 0+ 0* +,020"' ;/$+/$, " C0**0'$ 0* '"9#8/$E 4,(C "

    +,"E0+0(#"' 40G/+$, p$+` " */0> (, "# 9#C"##$E E,(#$ >0'(+$E 4,(C "4",@ ./$*$ E$2$'(>C$#+*

    ,",$'3 ",$ 9#8(#+,(2$,*0"'` $0+/$, 0# " '$G"' (, " C(,"' *$#*$@ ./$ 0#+,(E98+0(# (4 40,$",C*

    ;"* C$+ K3 8"''* (4 8(;",E08$? 0#*+$"E (4 K,"2$'3 C$$+0#G "#E 40G/+0#G ;0+/0# ",C-* "#E

    *;(,E-* '$#G+/` +/$ C9*6$+ "''(;$E 4(, 0#4'08+0#G E$"+/ "#E E"C"G$ 4,(C "4",@D k"''0*+08

    C0**0'$* C"E$ 0+ >(**0K'$ +( *+,06$ +",G$+* K$3(#E +/$ /(,0l(#` "#E #(; C98/ E$K"+$

    ,$2('2$* ",(9#E 9#C"##$E "$,0"' 2$/08'$* "'*( 6#(;# "* E,(#$*@ ./$ '";* (4 ;", "Ep9*+ +(

    +/$ #$; +$8/#08"' E$2$'(>C$#+*@ '(*02$ >,(p$8+0'$* ;$0G/0#G 9#E$, HRR G,"CC$* "#E *0#8$ +/$# #9C$,(9* E044$,$#+

    +,$"+0$* /"2$ K$$# 8(#8'9E$E +( ,$G9'"+$ (, 8(C>'$+$'3 K"# +/$ 9*$ (4 E044$,$#+ 60#E* (4

    ;$">(#*@

    L*>$80"''3 +/$ C(E$,# ;$*+$,# *(80$+0$* ",$ /0G/'3 #$+;(,6$E "#E ,$'0"#+ (# 8(C>9+$,* 0#

    #$",'3 $2$,3+/0#G ,"#G0#G 4,(C /(*>0+"'* +( 4"8+(,0$* "#E 4,(C K"#6* +( #98'$", ,$"8+(,*@

    :$*+ +/$,$ K$ "#3 E(9K+ "K(9+ +/$ >$,2"*02$#$** (4 8(##$8+$E E$208$*` 0# J9G9*+ FRDI +/$

    *$89,0+3 8(C>"#3 .,9*+;"2$ 0**9$E " *$89,0+3 "E20*(,3 "4+$, 0+ 4(9#E " 29'#$,"K0'0+3 0# "

    +(0'$+ *$"+@ k$8"9*$ (4 '"M *$89,0+3` " C"'080(9* 9*$, 8(9'E 9*$ " *C",+>/(#$ +( (>$# (,

    8'(*$ +/$ '0E` 4'9*/ +/$ +(0'$+ (, "8+02"+$ "0,]E,30#G@I./$ 8(##$8+020+3 (4 E$208$* >,(20E$* "#

    "++"86 *9,4"8$ 9#0C"G0#"K'$ p9*+ " 8(9>'$ (4 E$8"E$* "G(@ =+"+$* /"2$ 0#8,$"*0#G'3 >"0E

    "++$#+0(# +( *$89,0#G +/$ 8,0+08"' 0#4,"*+,98+9,$ 4,(C 83K$, "++"86* K9+ "'*( 8(#*0E$,$E +/$

    D 7$'0M N$08/C"##` -./$ B$##*3'2"#0" N04'$? J =(80"' ,$+"+0(# (4 Q/"#G0#G )0'0+",3 .$8/#0\9$*-`

    H'* F*)),@+0()4( E(G(V4)* "$ `4,7"#@ (): M4"G#(

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    18/101

    #$$E 4(, (44$#*02$ 8">"K0'0+0$*@ J *+"+$],9# 83K$, ",C3 ,9##0#G "++"86* ;0+/ E0,$8+

    8(#*$\9$#8$* 0# +/$ >/3*08"' ;(,'E /"* 8(C$ 4", 4,(C +/$ *+$,$(+3>$ (4 +/$ D__R*` "#

    0#E020E9"' C"'080(9* 8(C>9+$, $#+/9*0"*+ (, " G,(9> ;,0+0#G 20,9*$* +( 8'"0C 4"C$ "C(#G

    +/$0, >$$,*@

    L2$# +/(9G/ 83K$, (>$,"+0(#* /"2$ #(+ *( 4", >'"3$E " C"p(, >",+ 0# "#3 '",G$, 8(#4'08+` 0+

    /"* K$$# ;0E$'3 8'"0C$E +/"+ *$2$,"' 8(9#+,0$* ",$ 4"8$E ;0+/ 29'#$,"K'$ *3*+$C* "#E +/"+

    0+ C0G/+ (#'3 K$ " C"++$, (4 +0C$ 9#+0' "# $#$C3 i K$ 0+ " *+"+$ (, " #(#]*+"+$ "8+(, *98/ "*

    " +$,,(,0*+ G,(9> i 9*$* 0+* 83K$, 8">"K0'0+0$* $0+/$, "* +/$ >,0C",3 ;"3 (4 "++"860#G (, "* "

    *9>>'$C$#+",3 ;"3 +( ;,$"6 /"2(8@ ./$ 8(#*$\9$#8$* (4 *98/ "++"86* ",$ K3 #( C$"#*

    '0C0+$E +( +/$ 20,+9"' ;(,'E "#E C"3 2$,3 ;$'' K$ *0G#0408"#+ 4(, K(+/ 8020'0"#* "#E *('E0$,*@

    Q3K$, "++"86* /"2$ *$2$,"' 8/","8+$,0*+08* +/"+ *$>","+$ +/$C 4,(C +,"E0+0(#"' 9*$* (4 4(,8$`

    ;/08/ /"* 0C>'08"+0(#* 4(, ">>'30#G +/$ $M0*+0#G '$G"' 4,"C$;(,6 (# +/$ 9*$ (4 4(,8$ +(

    +/$C@ J 83K$, "++"86 C0G/+ 4(, $M"C>'$ '"*+ (#'3 >(,+0(#* (4 " *$8(#E "#E +/$ *(9,8$ (4 +/$

    "++"86 C0G/+ K$ C"*6$E@ ./$ '$G"' 4,"C$;(,6 /"* 0+* ,((+* 0# +/$ C(,$ +,"E0+0(#"' ;"3* (4

    ;"G0#G ;", K$+;$$# #"+0(#]*+"+$* "#E *(C$ (4 +/$ >,(K'$C* $C"#"+0#G 4,(C 83K$, "++"86*

    4(''(; +/$ *"C$ '0#$* (4 +/(9G/+ "* +/$ 0**9$* ;/08/ /"2$ K$$# E0*89**$E "4+$, +/$ +$,,(,0*+

    "++"86* (4 DD =$>+$CK$, FRRD Y/$,$"4+$, ,$4$,,$E +( "* +/$ _bDD "++"86*Z ,$G",E0#G` "C(#G

    (+/$, +/0#G*` #(#]*+"+$ "8+(,* "#E +/$ >(**0K0'0+3 (4 >,$]$C>+02$ *$'4]E$4$#8$@

    Q3K$, ;",4",$ /"* K$$# " /(+ 0**9$ $*>$80"''3 "4+$, +/$ $2$#+* 0# L*+(#0" 0# FRRO "#E +/$

    E0*8(2$,3 (4 =+9M#$+` K(+/ (4 ;/08/ ;0'' K$ 0#+,(E98$E 0# +/$ 4(''(;0#G >"G$*@ ./$ E"#G$,*

    (4 83K$, "++"86* /"2$ $2$# K$$# 8(C>",$E +( +/$ 8(#*$\9$#8$* (4 #98'$", ;", ;0+/

    /3>$,K('08 +(#$*@HP/0'$ 0+ 0* +,9$ +/"+ +/$ 9'+0C"+$ ;(,*+ 8"*$ 83K$, *8$#",0(* C"3 0#8'9E$

    8(#*$\9$#8$* 8(C>","K'$ $2$# +( #98'$", ;",` 4(89*0#G (# +/$C /"* +/$ +$#E$#83 (4

    C0*G90E0#G +/$ E0*89**0(# 4,(C +/$ ",G9"K'3 C(,$ 8(CC(# "#E C(,$ >,(K"K'$8(#*$\9$#8$* (4 83K$, (>$,"+0(#*@ .( \9(+$ 4(,C$, 1@=@ 0#+$''0G$#8$ 8/0$4 )08/"$'

    5"3E$#` ,",$'3 /"* *(C$+/0#G K$$# *( 0C>(,+"#+ "#E *( +"'6$E "K(9+ ;0+/ '$** 8'",0+3 "#E

    '$** ">>",$#+ 9#E$,*+"#E0#G +/"# +/0* >/$#(C$#(#@X P/0'$ +/$ E0*89**0(# "K(9+ 83K$,

    H 7(, "# (2$,20$; (4 +/$ >,(K'$C* ;0+/ Q('E P", C$+">/(,* ,$G",E0#G 83K$, ;", *$$ S("/ =/"8/+C"#

    "#E B$+$, P@ =0#G$,` -./$ P,(#G P",? ./$ >'30#G Q('E P", )$+">/(,* +(Q3K$,*$89,0+3 '"8$E "#E Q(9#+$,>,(E98+02$- M#""C4)G, R),747%74")` DX J9G9*+ FRDD`

    e;;;@K,((60#G*@$E9b,$*$",8/b",+08'$*bFRDDbR[bDX]83K$,*$89,0+3]*0#G$,]*/"8/+C"#h@X )08/"$' &@ 5"3E$#` -./$ 79+9,$ (4 ./0#G* zQ3K$,z-` X 87#(7*G4= 87%:4*, m%(#7*#+@YDbFRDDZ IiO "+ I@

    F

    http://www.brookings.edu/research/articles/2011/08/15-cybersecurity-singer-shachtmanhttp://www.brookings.edu/research/articles/2011/08/15-cybersecurity-singer-shachtman
  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    19/101

    "++"86* /"* K$$# $*>$80"''3 '02$'3 ,$8$#+'3` +/$ "++"86* "#E +/,$"+* +/$C*$'2$* ",$ #(+ "

    8(C>'$+$'3 #$; >/$#(C$#(#@U J',$"E3 0# D__I !(/# J,\90''" "#E A"20E N(#4$'E+

    $#20*0(#$E +/"+ 0#4(,C"+0(# +$8/#('(G3 ;(9'E K$ +/$ +$8/#('(G08"' K,$"6+/,(9G/ +( K,0#G

    "K(9+ +/$ -#$M+ C"p(, */04+ 0# +/$ #"+9,$ (4 8(#4'08+ "#E ;",4",$-@ O

    ./$ '";* (4 ;", ",$ #(+ +/$ (#'3 "*>$8+ (4 '"; K$0#G 8/"''$#G$E K3 +$8/#('(G08"' 8/"#G$*@ [

    ./$ >(**0K0'0+3 +( C"6$ $M"8+ 8(>0$* (4 E0G0+"' C$E0" "#E $"*0'3 E0**$C0#"+$ +/$C /"*

    8/"''$#G$E +/$ 8(#2$#+0(#"' 8(#8$>+0(#* (4 8(>3,0G/+ "#E +/$ >(**0K0'0+3 +( G"+/$, E"+" 0# "

    *8"'$ 9#0C"G0#"K'$ K$4(,$ >(*$* " #$; 60#E (4 +$*+ 4(, +/$ >,(+$8+0(# (4 >,02"83` p9*+ +(

    #"C$ +;( (K20(9* $M"C>'$*@ T# " ;0E$, *8"'$` +/$ E0C0#9+0(# (4 +/$ *0G#0408"#8$ (4

    #"+0(#"' K(,E$,* K,(9G/+ (# K3 +/$ 0#+$,#$+ C"6$* 0+ C(,$ E044089'+ +( ">>'3 +/$ +,"E0+0(#"'

    8(#8$>+ (4 +$,,0+(,0"' p9,0*E08+0(#@_P/"+$2$, +/$ 8/"''$#G$* C"3 K$` +/$3 #$0+/$, C$"# +/"+

    +/$ +$8/#('(G3 0* 0CC9#$ +( +/$ '$G"' *3*+$C #(, +/"+ +/$ '$G"' *3*+$C 0* 0CC9#$ +( +/$

    +$8/#('(G3@DR./$ *"C$ ">>'0$* +(W%, (: 3*++%?i +/$ '"; 8(#8$,#0#G +/$ ,$*(,+ +( 4(,8$ K3

    *+"+$* i "#E 83K$, (>$,"+0(#*? +/$ $M0*+0#G ,9'$* ">>'3` K9+ +/$3 C"3 #$$E +( K$ 0#+$,>,$+$E

    0# #$; ;"3* "#E *9>>'$C$#+",3 #$; ,9'$* C"3 #$$E +( K$ "G,$$E 9>(#@

    (4 83K$, (>$,"+0(#* "#E 89,,$#+ 0#+$,#"+0(#"'

    '"; 0# +$,C* (4 W%, (: 3*++%?1 70,*+ < */"'' E0*89** +/$ +$,C0#('(G3 ,$G",E0#G +/$ *9Kp$8+

    "#E >,$*$#+ $M"C>'$ 8"*$* ;/08/ < ;0'' '"+$, ,$4$, +(@ < ;0'' +/$# K,0$4'3 >,$*$#+ +/$ /0*+(,3

    "#E $2('9+0(# (4 +/$ ,$G9'"+0(# (4 ;", '$"E0#G 4,(C +/$ 3*++%? W%,7%? E(8+,0#$ +( +/$

    89,,$#+ *3*+$C K90'+ ",(9#E +/$ Q/",+$, (4 +/$ 1#0+$E S"+0(#* DD@ ./$# +/$ C98/ E$K"+$E

    #(+0(#* (4 4(,8$ "# ",C$E "++"86 ;0'' K$ $M"C0#$E` K(+/ (4 ;/08/ ",$ $**$#+0"' +( +/$

    \9$*+0(# (4 '$G"'0+3 (4 C0'0+",3 "8+0(#@ ./$,$ 0* #( "G,$$E 9>(# E$40#0+0(# 4(, $0+/$, (4 +/$

    +$,C*` "#E K(+/ ;0'' K$ E0*89**$E 0# +/$ 8(#+$M+ (4 83K$, (>$,"+0(#*@ ./$ "0C 0* +(

    E$+$,C0#$ 04 "#E ;/$# 83K$, (>$,"+0(#* C"3 8(#*+0+9+$ " 9*$ (4 4(,8$ (, "# ",C$E "++"86@

    U (,"+0(#? ="#+" )(#08"`

    D__OZ` FIiUR "+ FHiFX` ,$>,0#+$E 4,(C DF !"?

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    20/101

    J4+$, +/0*` < ;0'' */(,+'3 "EE,$** +/$ >,0#80>'$ (4 #(#]0#+$,2$#+0(# "#E E0*89** 04 "#E /(; 0+

    8(C>'$C$#+* +/$W%, (: 3*++%?,$G",E0#G (>$,"+0(#* 4"''0#G */(,+ (4 +/$ +/,$*/('E (4 4(,8$@

    70#"''3` 8(#8'9E0#G ,$C",6* "#E *(C$ 20$;* +(;",E* +/$ 49+9,$ (4 +/$ 0**9$ ;0'' K$

    >,$*$#+$E@

    !"0 1.'2,%(3(45

    -Q3K$, ;",4",$- /"* K$8(C$ "# (C0#(9* 8"+8/>/,"*$ 9*$E $*>$80"''3 0# +/$ C$E0" K9+ "'*(

    0# +/$ 8(#+$M+ (4 0#+$,#"+0(#"' '"; 0# " 2",0$+3 (4 8(#+$M+* #(+ "'' (4 ;/08/ ",$ ">>,(>,0"+$

    (, 40++0#G@DF+'3 E$*8,0K$E "* $*>0(#"G$` K$

    +/"+ 8(CC$,80"' (, +",G$+$E "+ C0'0+",3 0#+$''0G$#8$@ !9*+ "* (4+$# 0+ 0* 9*$E 0# E$*8,0K0#G

    "8+020+0$* (4 *C"''$, *8"'$ ;0+/ *98/ 8(#*$\9$#8$* +/"+ +/$3 /"2$ '0++'$ 04 "#3+/0#G +( E(;0+/ ;",4",$` "* 0# +/$ 8"*$ (4 +/$ "++"86* "G"0#*+ L*+(#0" 0# FRRO@ DI< ;0'' G( +/,(9G/ *(C$

    (4 +/$ +$,C0#('(G3 "#E E$40#0+0(#* 9*$E 0# E0*89**0#G +/$ *9Kp$8+ C"++$, "* ;$'' "* ",G9$

    ;/"+ < 8(#*0E$, +( K$ +/$0, *+,$#G+/* "#E ;$"6#$**$*@

    -9+$, #$+;(,6*` "'+/(9G/ 0+ *$$C* +/"+ '"+$'3 +/$ +$,C /"* K$$# C(,$ (, '$** ,$>'"8$E

    K3 40,*+ +/$ #(+0(# (4 -8(C>9+$, #$+;(,6 "++"86*- "#E #(;` K3 -83K$, "++"86*-@ +'3 E$*8,0K$* +/$ K"++'$ (4 ;(,E* "#E 0C"G$*@DH5$#8$` +/$ +$,C /"* C(,$ +(

    E( ;0+/ >,(>"G"#E" +/"# ;0+/ ;/"+ #(; 0* ,$4$,,$E +( "* 83K$, (>$,"+0(#*@ ./0* 0* "'*( /(;

    0#4(,C"+0(# ;",4",$ /"* >,$20(9*'3 "#E ;0E$'3 K$$# 9#E$,*+((E@DX 70++0#G *(C$ (4 +/$

    #$;$, "++"86* "#E E$2$'(>C$#+* 0#+( +/$ 8(#8$>+ (4 0#4(,C"+0(# ;",4",$ 0* >,(K'$C"+08@ "8$ i =(C$ ./(9G/+* (# +/$ t=8/C0++]Q,0+$,0"u 4(, 1*$

    (4 7(,8$- 0# Q@ Ql(**$86` N@ T++0* "#E W@ w0('6(;*60 Y$E*Z` TUaT ^7' R)7*#)(74")(+ !")$*#*)=* ") !@3*#!")$+4=7 F#"=**:4)G,YSJ.T QQA QTL B9K'08"+0(#*? ."''0##` FRDFZ` F_XiIR_ "+ F_U@

    DI 7(, " E$*8,0>+0(# (4 +/$ $2$#+* *$$ 4)$#("+DI@DH !",0 N"#+">$'6(#$#` -0'o Y$E*Z` 8"7( Z

    7*"#4( W( 7":*++4,%%,O 6\C]C%+?4( ,":() ?%%7"C,**)YS"+0(#"' A$4$#8$ 1#02$,*0+3? 5$'*0#60` FRR[Z"+ UX@

    DX J* "# $M"C>'$` ./$ 70##0*/ =$89,0+3 "#E A$4$#8$ B('083 FRRH E$40#$* 0#4(,C"+0(# ;",4",$ "* +/$ 9*$ (40#4(,C"+0(# $#20,(#C$#+ +( 0#4'9$#8$ E$80*0(#]C"60#G` (>$,"K0'0+3 "#E >9K'08 (>0#0(#@ 70##0*/ =$89,0+3

    "#E A$4$#8$ B('083 FRRH` e;;;@E$4C0#@40b40'$*bIDDbFXOHfFDURfL#G'0*/fP/0+$f>">$,fFRRHfDf@>E4h"+ DUF@

    H

    http://www.defmin.fi/files/311/2574_2160_English_White_paper_2004_1_.pdfhttp://www.defmin.fi/files/311/2574_2160_English_White_paper_2004_1_.pdf
  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    21/101

    0#E9*+,0"' 8(#+,(' *3*+$C* "#E 4(, ;/08/ +/$ (Kp$8+02$* "#E (9+8(C$* ",$ C98/ E044$,$#+@

    J++"86* "G"0#*+ +/$ #$+;(,6 0#4,"*+,98+9,$ ;(9'E 40+ 9#E$, +/$ 8(#8$>+ (4 0#4(,C"+0(#

    ;",4",$ C(,$ $"*0'3` $*>$80"''3 04 +/$0, 9'+0C"+$ "0C 0* +( E0*,9>+ +/$ 4'(; (4 0#4(,C"+0(#@

    "K0'0+0$* (4 0#4(,C"+0(# ;",4",$@ DO./0* 0* "

    ,$"*(#"K'$ 8'"0C 4,(C +/$ >$,*>$8+02$ (4 0#4(,C"+0(# ;",4",$` 3$+ 0+ */(9'E K$ 8'",040$E +/"+

    +/0* */(9'E (#'3 ,$4$, +( +/(*$ 83K$, (>$,"+0(#* ;/(*$ G("'* >$,+"0# +( 0#4(,C"+0(# ;",4",$@

    S(+ "'' 83K$, (>$,"+0(#* /"2$ *98/ G("'*` "#E +/(*$ +/"+ E( #(+ Y*98/ "* "# "++"86 (# +/$ "0,

    +,"4408 8(#+,(' *3*+$C 0#+$#E$E +( 8,"*/ "0,8,"4+ (, "# "++"86 (# 0#E9*+,0"' 8(#+,(' *3*+$C*

    0#+$#E$E +( 8"9*$ "# $M>'(*0(#Z */(9'E #(+ K$ 4(,8$E 0#+( +/$ 8"+$G(,3 (4 0#4(,C"+0(#

    ;",4",$@

    J'*( 4,$\9$#+'3 9*$E 0* +/$ +$,C -8(C>9+$, #$+;(,6 "++"86- Y(, QSJZ@ ./0* 0* (4+$# "#

    ">>,(>,0"+$ "#E ">+'3 E$*8,0>+02$ +$,C` K9+ 0+ "'*( *$$C* 0# *(C$ 8"*$* +(( *+,08+ ,$G",E0#G

    +/$ )*7N"#C >",+@ =(C$ (4 +/$ 8,0+08"' 0#4,"*+,98+9,$ C0G/+ K$ E0*8(##$8+$E 4,(C +/$

    0#+$,#$+ (, "#3 (+/$, #$+;(,6 "* >",+ (4 *$89,0+3 C$"*9,$*` 3$+ +/$*$ *3*+$C* 8"# 2$,3 ;$''

    K$ i "#E /"2$ K$$# i +",G$+$E K3 " 83K$, "++"86@ 7(, $M"C>'$ (#$ (4 +/$ C"0# >,(>"G"+0(#

    C$+/(E* (4 +/$ =+9M#$+ C"';",$ ;/08/ /0+ "# $#$+,"+$ "#(+/$, #"+0(#-* 8(C>9+$,* (, #$+;(,6* 4(, +/$ >9,>(*$* (4 8"9*0#G E"C"G$ (,

    DU =$"# B@ W"#986` -'"#E?N(2"#0$C0 FRRXZ XDOiXH_ "+ XFFiXFI "#E )",8( N(*80#0` -P(,'E P0E$ P",4",$ iJ%, (: 3*++%? "#E +/$

    1*$ (4 Q3K$, 7(,8$-` DHE(_ F+()=C k*(#3""C "$ .)47*: 6(74"), I(NYFRDRZ [XiDIR "+ _D@D[ S08('"* 7"''0$,$` :0"C T )9,8/9 "#E L,08 Q/0$#` -PIF@=+9M#$+ A(**0$,-` 8@?()7*= 8*=%#47@ ;*,(#*$b;/0+$>">$,*b;IFf*+9M#$+fE(**0

    $,@>E4h "+ F_@ 7(, " C(,$ E$+"0'$E E$*8,0>+0(# (4 =+9M#$+ *$$ 4)$#("+ DH@D_ J# (K20(9* $M"C>'$ 0* +/$ 9*$ (4 +/$ +$,C K3 )08/"$' =8/C0++` ;/( 9*$E +/$ +$,C -8(C>9+$, #$+;(,6

    "++"86*- 0# " D___ ",+08'$ Y4)$#(#(+$ L,,(,? N$4$,$#8$ *(9,8$ #(+ 4(9#EZ K9+ /"* *0#8$ 9*$E +/$ +$,C*-83K$, (>$,"+0(#*-` -83K$, "++"86*- "#E -83K$, ;",Y4",$Z- Y*$$ $@G@ 4)$#(#(+$D_RZ@

    X

    http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdfhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdfhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdfhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    22/101

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    23/101

    ./$ +,"#*'"+0(# (4 +/$ ,$'$2"#+ +$,C* >,$*$#+* "#(+/$, +$,C0#('(G08"' 8/"''$#G$ "#E +/$ '"86

    (4 "G,$$E 9>(# +$,C* "#E 8(#8$>+* 8(C>'08"+$* 0#+$,#"+0(#"' 8(](>$,"+0(#@ =98/ 6$3 +$,C*

    "#E 8(#8$>+* "* -83K$, ;",4",$- (, -0#4(,C"+0(# ;",4",$- /"2$ E044$,$#+ C$"#0#G* 0# L#G'0*/`

    N9**0"# "#E Q/0#$*$` "#E +/$,$ ",$ +$,C* 4(, ;/08/ #( 8'$", $\902"'$#+ $M0*+* 0# (+/$,

    '"#G9"G$*@ 7(, $M"C>'$ +/$ N9**0"# +$,C0#('(G3 0#8'9E$* +/$ K,("E #(+0(# (4 "#

    -0#4(,C"+0(# ;$">(#-` ;/08/ ,$4$,* +(` "C(#G (+/$, +/0#G*` C"** C$E0" >,(>"G"#E"@ ./0*

    ,$'"+$* +( +/$ #(+0(# (4 -0#4(,C"+0(# ;",4",$-` ;/(*$ C$"#0#G 0# N9**0"# "#E Q/0#$*$

    E044$,* 4,(C +/$ (#$ 0# L#G'0*/ "#E 0* C(,$ K,("E "#E /('0*+08@ FU=98/ 0**9$* /"2$ C"E$ 0+

    E044089'+ +( "G,$$ (# 8(CC(# E$40#0+0(#*`FO"#E ;(9'E ",G9"K'3 C"6$ 0+ $2$# C(,$ E044089'+

    +( 4(, $M"C>'$ K,0#G "K(9+ " +,$"+3 (# +/$ 0**9$ (4 83K$, "++"86*@

    !"6 7883,+9:,3,&5 (; &-. *3./

    ./$,$ *$$C* +( K$ "# $C$,G0#G 8(#*$#*9* +/"+ $2$# +/(9G/ 83K$, "++"86* /"2$ 8$,+"0#

    *>$80"' 8/","8+$,0*+08* +/"+ *$+ +/$C 0# *(C$ ;"3* ">",+ 4,(C 60#$+08 9*$* (4 4(,8$` +/$

    >,0#80>'$* (4 0#+$,#"+0(#"' '"; ">>'3 +( +/$C "* ;$''@F[./$ ,$**$E 0# +/$ *(]8"''$E )",+$#* Q'"9*$` ;/08/ ;"* 40,*+ 4(,C9'"+$E

    0# +/$ >,$"CK'$ (4 +/$ D[__ 5"G9$ Q(#2$#+0(#

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    24/101

    4,(C $*+"K'0*/$E 89*+(C` 4,(C +/$ >,0#80>'$* (4 /9C"#0+3 "#E 4,(C +/$ E08+"+$* (4 >9K'08

    8(#*80$#8$-@ ./$ 0#0(# "#E *+"+$E +/"+ 0+ /"* >,(2$E +( K$ "# $44$8+02$ C$"#* (4

    "EE,$**0#G +/$ ,">0E $2('9+0(# (4 C0'0+",3 +$8/#('(G3@IF

    =+"+$* /"2$ +"6$# " *0C0'", >(*0+0(# "* ;$''? 4(, $M"C>'$ +/$ 1#0+$E =+"+$* Q3K$, =+,"+$G3

    #(+$* +/"+ $M0*+0#G 0#+$,#"+0(#"' '"; E($* ">>'3 0# 83K$,*>"8$ 0# +0C$* (4 >$"8$ "#E (4

    8(#4'08+ K9+ ,$8(G#0l$* +/$ #$$E 4(, "EE0+0(#"' 8'",0408"+0(# ,$G",E0#G *(C$ (4 +/$ 9#0\9$

    "*>$8+* (4 83K$, (>$,"+0(#*@II./$ *+,"+$G3 "'*( *+"+$* +/"+ +/$ 1#0+$E =+"+$* ;0'' ,$*>(#E +(

    /(*+0'$ "8+* 0# 83K$,*>"8$ "* +( "#3 (+/$, +/,$"+@IH Q/0#" /"* +"6$# " *0C0'", >(*0+0(#`

    >$,/">* C(,$ 9#E$,'0#0#G +/$ #$$E 4(, ,$20*0(# "#E 8'",0408"+0(#@IX

    ./$,$ /"2$ K$$# 8"''* 4(, " *>$80408 8(#2$#+0(# (# 83K$, ;",4",$ Y(, 0#4(,C"+0(# ;",4",$ 0#

    G$#$,"'Z`IU"#E *98/ 8"''* ",$ #(+ $#+0,$'3 ;0+/(9+ C$,0+@ ./$,$ 0* 4(, $M"C>'$ "# $*>$80"''3

    G,$3 ",$" 9#E$, +/$ +/,$*/('E (4 4(,8$ (, "# ",C$E "++"86 "#E ,$G9'"+0#G +/$ "8+* 4"''0#G +(

    +/"+ 8"+$G(,3 ;(9'E 8$,+"0#'3 K$#$40+ 4,(C " #$; 8(#2$#+0(#@ J#(+/$, ",$" +/"+ ;(9'E

    >,(K"K'3 K$#$40+ 4,(C " +,$"+3 0* +/$ 9*$ (4 8020'0"# 8(#+,"8+(,* +( 8",,3 (9+ 83K$, "++"86*@

    ./0*` /(;$2$,` 0* #(+ " \9$*+0(# *>$80408"''3 "#E $M8'9*02$'3 ,$'"+$E +( 83K$, (>$,"+0(#*?

    +/$ 9*$ (4 8(#+,"8+(,* /"* K$$# +/$ *9Kp$8+ (4 " E$K"+$ $*>$80"''3 "4+$, +/$ 9*$ (4 >,02"+$

    C0'0+",3 8(C>"#0$* 0# J4G/"#0*+"# "#E '$+$'3 #$; +,$"+3 *3*+$C 0* K"*$E (# +/$ #(#]>/3*08"' #"+9,$ (4 +/$ 83K$, E(C"0#@I[

    IF 6%=+*(# L*(","@ O[@II ./$ 1#0+$E =+"+$* ," #(+$ II"+ DH@IX :0 w/"#G` -J Q/0#$*$ B$,*>$8+02$ (# Q3K$, P",-` _HR)7*#)(74")(+ ;*04*N "$ 7'* ;*: !#",,YFRDFZ [RDi

    [RO "+ [RH@IU =$$ $@G@ A"#0$' k@ =0'2$,` -Q(C>9+$, S$+;(,6 J++"86 "* " 1*$ (4 7(,8$ 1#E$, J,+08'$ FYHZ-` OU .181

    6(0(+ L(# !"++*G* R)7*#)(74")(+ I(N 87%:4*,YFRRFZ OIi_O "+ _H "#E T(#" 5"+/";"3 N$K$88"Q,((+(4` P0''0"C B$,E9$ "#E B/0'0> :$20+l` -./$ :"; (4 Q3K$,]J++"86- 0# DRR !(+4$"#)4( I(N ;*04*N

    YFRDFZ [DOi[[X "+ [OO "#E C(,$ 0# +/$ 8(#+$M+ (4 '"; (4 ",C$E 8(#4'08+` A"20* k,(;#` -J B,(>(*"' 4(,"# $,"+0(#*- DDI*N4, l

    !+(#C I(N ;*04*NYFRROZ DRFIiDRUD "+ DRI_iDRHR "#E k,"E'$3 N"K(0#` -Q(,,$*>(#E0#G L2('9+0(#?

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    25/101

    =98/ " 20$; (2$,$C>/"l0*$* +/$ E0*8(##$8+ K$+;$$# +/$ 83K$, E(C"0# "#E +/$ 4(9, (+/$,

    E(C"0#* (4 ;",4",$ i '"#E` *$"` "0, "#E *>"8$@ P/0'$ *(C$ (>$,"+0(#* 0#E$$E 8"# K$ 8",,0$E

    (9+ *( +/"+ +/$3 /"2$ 0C>'08"+0(#* $M8'9*02$'3 0# +/$ 83K$, E(C"0#` 0+ 0* >",+089'",'3 +/$

    >/3*08"' 8(#*$\9$#8$* (4 +/$ "++"86* +/"+ /"2$ K$$# "+ +/$ 8$#+,$ (4 +/$ E0*89**0(# "#E 8"#

    8"9*$ *0G#0408"#+ E$2"*+"+0(#@ J#(+/$, 8"'' (4 0#*944080$#83 ,$*+* 9>(# +/$ 8'"0C +/"+ +/$

    1#0+$E S"+0(#* Q/",+$, *3*+$C >'"8$* +(( C98/ ,$'0"#8$ (# +/$ 8(#8$>+* (4 *(2$,$0G#

    8(#+,(' "#E +/$ $*+"K'0*/$E *+"+$ ,$*>(#*0K0'0+3` ;/08/ ",$ *(C$;/"+ >,(K'$C"+08 0# +/$

    8(#+$M+ (4 83K$, (>$,"+0(#*@I_ =98/ " 8'"0C 0* 0#E$$E #(+ 9#4(9#E$E` 3$+ 0+ +(( C98/

    E0*,$G",E* +/$ >(**0K0'0+3 (4 (2$,8(C0#G +/$ 8/"''$#G$* ;0+/0# +/$ 89,,$#+ *3*+$C@ ('0+08"' '$2$' 0# +/$ >(**0K0'0+3 (4 ,$"8/0#G " #$; +,$"+3 "#E (# "

    '$G"' '$2$' 0# +/$ >(**0K0'0+3 (4 40#E0#G " *('9+0(# +/"+ ;(9'E #(+ '$"E (9+ (4 +/$ 4,30#G >"#

    0#+( +/$ 40,$@

    2:?4)4,7#(740* I(N J%:4=4(#@YFRDDZ URFiUU[ "+ UFX@

    I_ =8(++ =/"86$'4(,E` -7,(C S98'$", P", +( S$+ P",? J#"'(G0l0#G Q3K$, J++"86* 0#

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    26/101

    4 56'$6%7%*+ '( 8"/ "*0 )9#%/ :++"2;,

    0"!

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    27/101

    8$,+"0# ,$G0(#*@ ,(4$**0(#"'0l$E ",C0$* /"2$ +"6$# "E2"#+"G$ (4 #$; C0'0+",3 +$8/#('(G3@HH

    ,$*0E$#+ V$(,G$ P@ k9*/ (# +/$ E"3 4(''(;0#G +/$ "++"86*`HO"#E +/$ ,$*>(#*$ ;"*

    '"K$''$E " -;", (# +$,,(,-@H[./$ "++"86* ;$,$ "'*( ,$4$,,$E +( "* -"8+* (4 ;", "G"0#*+ +/$

    1#0+$E =+"+$* (4 JC$,08" "#E 0+* "''0$*- 0# +/$ 1@=@ S"+0(#"' =+,"+$G3 4(, Q(CK"+0#G

    .$,,(,0*C (4 7$K,9",3 FRRI@H_

    P", /"* #(+ (#'3 K$$# 9*$E +( E$*8,0K$ 8(CK"+ K9+ "'*( *+,9GG'$* (4 E044$,$#+ 60#E*` *98/

    "* +/$ ;", (# E,9G*@ A"20E W$##$E3 E0*+0#G90*/$* ;",* (4 8(CK"+ 4,(C ;",* (4 C$+">/(,

    "#E #(+$* +/"+ +/$0, E0*+0#8+0(# /"* K'9,,$E@ J# $M"C>'$ (4 +/0* K'9,,0#G 0* +/$

    "4(,$C$#+0(#$E ;", (# +$,,(,? +/$ (>>(#$#+ 0* C(,$ 0#E$+$,C0#"+$ 3$+ +/$ ;", 0* 4(9G/+

    ;0+/ C0'0+",3 4(,8$@ ./$ E$K"+$ "K(9+ ;/$+/$, +/$ +$,,(,0*+ E$+"0#$$* */(9'E K$ +,$"+$E "*

    >,0*(#$,* (4 ;",` 9#'";49' $#$C3 8(CK"+"#+* (, 8,0C0#"'* 0* "'*( 0#E08"+02$ (4 +/0*@XRJ''

    +/0* >(0#+* +( +/$ 4"8+ +/"+ +/$ +,"E0+0(#"' 8(#8$>+ (4 ;", /"* 4,"GC$#+$E *0#8$ +/$ $#E (4 +/$

    Q('E P", "#E #( 8'$", "#E 9#04(,C 8(#8$>+ /"* $C$,G$E 0# 0+* >'"8$@XD

    ./$ 83K$, ;(,'E /"* (4+$# K$$# E$*8,0K$E "* +/$ 404+/ E(C"0# (4 ;",4",$` +/$ #$;$*+

    "EE0+0(# +( +/(*$ (4 '"#E` *$"` "0, "#E *>"8$@ XF =98/ " 8/","8+$,0l"+0(# 0*` /(;$2$,`

    *(C$;/"+ C0*'$"E0#G@XI>(*0+$` "* 0+ 0* 8'(*$'3 ,$'"+$E +( +/$C "#E 4(,C* "# 0#+$G,"' >",+ (4

    HH !"##$ )"'660` -W90#6" *(+" C99++99^-`/",?"$$8/$* (4 B,$*0E$#+ V$(,G$ P@ k9*/ FRRDiFRR[` eG$(,G$;K9*/]

    ;/0+$/(9*$@",8/02$*@G(2b0#4(89*bK9*/,$8(,EbE(89C$#+*b=$'$8+$Ef=>$$8/$*fV$(,G$fPfk9*/@>E4h"+ U[@

    H_ 1@=@ S"+0(#"' =+,"+$G3 4(, Q(CK"+0#G .$,,(,0*C` 7$K,9",3 FRRI` e;;;@80"@G(2b#$;*]0#4(,C"+0(#b80"]+/$];",](#]+$,,(,0*CbQ(9#+$,f.$,,(,0*Cf=+,"+$G3@>E4h "+ D@

    XR A"20E W$##$E3 S$ L(# (): I(NYB,0#8$+(# 1#02$,*0+3 B,$**` FRRUZ "+ IiH@XD N"0+"*"'(`I\)74)*) ,":() C%0( C@+?\) ,":() W\+C**)`,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    28/101

    +/$C? 4(, $M"C>'$ C"#3 60#$+08 ;$">(#* "#E 8(CC9#08"+0(#* *3*+$C* 9+0'0l$ 8(C>9+$,

    #$+;(,6*@XH79,+/$, E0*89**0(# (4 +/$ E$2$'(>C$#+ (4 +/$ 8(#8$>+ "#E E$40#0+0(# (4 ;", 0*

    (9+*0E$ +/$ *8(>$ (4 +/0* +/$*0*` K9+ *94408$ 0+ +( *"3 +/"+ +/$ $C$,G$#8$ (4 83K$, "++"86* 0*

    " >",+ (4 +/$ $2('9+0(# "#E 8(#+0#99C (4 ",C$E 8(#4'08+ "#E ;",4",$@ :06$ (+/$, *0C0'",

    E$2$'(>C$#+*` 0+ +(( /"* 0C>'08"+0(#* 4(, +/$ ,$G9'"+0(# (4 ;",@

    0"0 B,/&('5 9%) 158./ (; C93D9'. 9%) E5:.' 7&&9+F/

    )"'080(9* *(4+;",$` C"';",$ 0# */(,+` /"* $M0*+$E *0#8$ +/$ D_OR* "#E *>,$"E (# 4'(>>3

    E0*6* "#E +/,(9G/ K9''$+0# K(",E *3*+$C* ;$'' K$4(,$ +/$ 0#+$,#$+ ;"* ;0E$'3 9*$E@

    ./$ $",'3 FRRR* *"; *$2$,"' ;0E$*>,$"E 8(C>9+$, 20,9* $>0E$C08* *98/ "* :(2$ :$++$,`

    Q(E$ N$E` S0CE" "#E )3A((C@

    XX

    ./$*$ 20,9*$* ;$,$ (4 2",30#G '$2$'* (4 *(>/0*+08"+0(#"#E G$#$,"''3 +/$0, G("' ;"* +( *>,$"E "* ;0E$ "* >(**0K'$ ;0+/(9+ " *>$80408 +",G$+@ =(C$

    E$'$+$E (, *+('$ E"+" 4,(C 0#4$8+$E C"8/0#$*` *(C$ C"E$ +/$0, $M0*+$#8$ 6#(;# 0# (+/$,

    ;"3* "#E *(C$ ;$,$ ,$'"+02$'3 9#(K+,9*02$@ J#(+/$, 4(,C (4 8(C>9+$, "++"86* ",$ +/$ C(,$

    +",G$+$E *+,06$*` *98/ "* +/$ FRDD "++"86 (# =(#3-* B'"3=+"+0(# S$+;(,6 ;/08/ ,$*9'+$E 0#

    +/$ +/$4+ (4 8,$E0+ 8",E "#E (+/$, 0#4(,C"+0(# (4 (2$, OO C0''0(# 9*$,* "#E "# (9+"G$ (4

    "'C(*+ " C(#+/@XUB(>9'", "++"86* /"2$ 8(#*0*+$E (4 E$4"80#G +/$ >9K'08 ;$K*0+$* (4 #$;*

    (,G"#0l"+0(#* (, G(2$,#C$#+* (, 4"60#G '(G0# *0+$* 0# (,E$, +( G$+ '(G0# 8,$E$#+0"'* 4,(C

    9*$,*@ =(C$ "++"86$,* C0G/+ /"2$ K$$# "4+$, *$#*0+02$ (, 8(#40E$#+0"' 0#4(,C"+0(# ,"#G0#G

    4,(C 8,$E0+ 8",E 0#4(,C"+0(# +( #9E$ >/(+(* (4 8$'$K,0+0$*` *(C$ ;$,$ "4+$, 4"C$@

    ./$*$ 60#E* (4 20,9*$* "#E "++"86* /"2$ G$#$,"''3 K$$# +/$ >,(E98+ (4 0#E020E9"'* (, G,(9>*

    "#E /"2$ #(+ ,$\90,$E 2$,3 C98/ ,$*(9,8$*` ">",+ 4,(C +0C$ "#E *60''@ "*+ 4$; 3$",*

    /(;$2$,` C98/ C(,$ 8",$49''3 8,"4+$E "++"86* /"2$ K$$# E0*8(2$,$E@ =(C$ /"2$ $2$# K$$#

    *( *(>/0*+08"+$E "#E ,$\90,$E *( C98/ ,$*(9,8$* +( E$2$'(> +/"+ 8(C>9+$, *$89,0+3 "#"'3*+*

    "'' K9+ "G,$$ +/"+ +/$3 C9*+ K$ " >,(E98+ (4 " *+"+$ (, "+ '$"*+ +/$ E$2$'(>C$#+ C9*+ /"2$

    K$$# *>(#*(,$E K3 " *+"+$@

    XH !",#( :0C#m''` -A$40#0#G +/$ y9"'0+0$* (4 Q3K$, P",4",$-` 8! E(G(V4)*` DD )",8/ FRDI`e;;;@*8C"G"l0#$@8(CbE$40#0#G]+/$]\9"'0+0$*](4]83K$,];",4",$b",+08'$bF[I_RFbh@

    XX 7(, "# (2$,20$; (4 +/$ E044$,$#+ $>0E$C08* *$$ $@G@ k,0"# W,$K*` -J =/(,+ 50*+(,3 (4 Q(C>9+$, &0,9*$*"#E J++"86*-` H'* L(,'4)G7") F",7 DH 7$K,9",3 FRRI` e;;;@;"*/0#G+(#>(*+@8(Cb;>]

    E3#b",+08'$*bJXRUIU]FRRF!9#FU@/+C'h@XU Q/",'$* J,+/9, "#E W$0+/ =+9",+` -B'"3=+"+0(# S$+;(,6 1*$* 7$",

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    29/101

    j(,"C A0#*+$0# '0*+* 4(9, E044$,$#+ +3>$* (4 8,(**]K(,E$, 83K$, (>$,"+0(#* E$>$#E0#G (#

    ;/( 8",,0$* +/$C (9+? DZ "++"86* 8(#E98+$E K3 0#E020E9"' >$,*(#*` FZ "++"86* 8(#E98+$E K3

    +$,,(,0*+* 9#*9>>(,+$E K3 " *+"+$` IZ "++"86* 8(#E98+$E K3 +$,,(,0*+* (2$,+'3 (, 8(2$,+'3

    *9>>(,+$E K3 " *+"+$ "#E HZ "++"86* 8(#E98+$E K3 (44080"' (,G"#* (4 " *+"+$@ XO./$ 40,*+ +;(

    8"+$G(,0$* ",$ G$#$,"''3 0**9$* 4(, +/$ #"+0(#"' '"; $#4(,8$C$#+ "9+/(,0+0$*` 9#'$** +/$ *+"+$

    ;/$,$ +/$ "++"86* (,0G0#"+$E 4,(C 6#(;0#G'3 "''(;$E 0+* +$,,0+(,3 +( K$ 9*$E 4(, *98/ "8+*@

    ./0* ;(9'E K$ 8(#+,",3 +( +/$ (K'0G"+0(# #(+ +( "''(; *98/ "8+020+3 ",+089'"+$E K3 +/$

    0(#"G$` 8(C>9+$, #$+;(,6 "++"86* ;0+/(9+ /9C"# 8"*9"'+0$* (, *0G#0408"#+

    >,(>$,+3 E"C"G$ "#E 8(C>9+$, #$+;(,6 "++"86* ;0+/ /9C"# 8"*9"'+0$* (, *0G#0408"#+

    >,(>$,+3 E"C"G$@X_

    0"6 "+0(# (4

    L*+(#0" i 4,(C +/$ 8$#+,$ (4 ."''0## +( " #$",K3 C0'0+",3 8$C$+$,3@ ./$ C(2$ *>",6$E C"**

    >,(+$*+* C(*+'3 "C(#G $+/#08 N9**0"#* 0# +/$ 8(9#+,3 "#E ;"* +/$ K"86E,(> 4(, "

    ;0E$*>,$"E 83K$, "++"86 (# L*+(#0"# ;$K*0+$*` 0#8'9E0#G +/(*$ (4 +/$ L*+(#0"# G(2$,#C$#+`

    +/$ >",'0"C$#+` K"#6* "#E #$;*>">$,*@UR.$8/#08"''3 +/$ "++"86* ;$,$ 4"0,'3 *+,"0G/+4(,;",E

    E0*+,0K9+$E E$#0"'](4]*$,208$UD YAA(=Z "++"86*K9+ +/$3 ;$,$ 8",,0$E (9+ 0# " 8((,E0#"+$E

    "#E (,G"#0l$E 4"*/0(# *0C9'+"#$(9*'3 (# *$2$,"' +",G$+*` (# " >,$20(9*'3 9#*$$# *8"'$` "#E

    4(, "# 9#9*9"''3 '(#G >$,0(E (4 +0C$@ ./$,$ /"* K$$# *>$89'"+0(# (4 +/$ 0#2('2$C$#+ (4 +/$

    N9**0"# "9+/(,0+0$* K9+ +/$ W,$C'0# /"* 8(#*0*+$#+'3 E$#0$E "#3 >",+080>"+0(# "#E +/$

    XO j(,"C A0#*+$0#` -Q(C>9+$, S$+;(,6 J++"86* "#E =$'4]A$4$#*$-` OU .181 6(0(+ L(# !"++*G*R)7*#)(74")(+ I(N 87%:4*,YFRRFZ __iDD_ "+ DRIiDRH@

    X[ H'* !"#$% !'())*+ !(,* -./ 01 2+3()4(5` !9EGC$#+` (,+* D_H_` >@ H "+ FF@X_ A0#*+$0#` !"?9+$,* 4'((E0#G +/$ +",G$+ ;0+/ C"'080(9*+,"4408 0# (,E$, +( >,$2$#+ 0+ 4,(C *$,20#G '$G0+0C"+$ 8'0$#+*@ 7(, " 8'(*$, $M>'"#"+0(#` *$$ 4)$#("+ DO@

    DI

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    30/101

    L*+(#0"# "9+/(,0+0$* *+"+$E "4+$, +/$ 0#80E$#+ +/"+ +/$3 /"E #( $20E$#8$ +/"+ +/$ N9**0"#

    G(2$,#C$#+ ;"* K$/0#E +/$ "++"86*@UF

    ./$ "++"86* /"2$ K$$# ;0E$'3 9*$E 0# +/$ C$E0" "* "# $M"C>'$ (4 83K$, ;",4",$`UIK9+

    8"''0#G +/$C "# 0#*+"#8$ (4 ;", 0* "# $M"GG$,"+0(#@ ./$ 40,*+ ;"2$ (4 +/$ "++"86* +",G$+$E

    " G,(9> (4 >9K'08 ;$K*0+$* ;/08/ ;$,$ 0#"88$**0K'$ K$8"9*$ (4 +/$ +,"4408 4'((E@ UH k$0#G

    9#"K'$ +( "88$** " #$;*>">$, ;$K*0+$ 0* C(,$ ">+'3 E$*8,0K$E "* " #90*"#8$ +/"# "# "8+ (4

    ;",@ ./$ "++"86* /"2$ "'*( K$$# E$*8,0K$E "* 83K$, ,0(+*`UX;/08/ *$$C* C(,$ ">>,(>,0"+$@

    ./$ "++"86* E0E "'*( +",G$+ +/$ *$,2$,* ,9##0#G +/$ E(C"0# #"C$ *3*+$C UU(4 0#+$,#$+ *$,208$

    >,(20E$,*@ ./0* 8"9*$E *(C$ E0*,9>+0(# +( +/$ +$,*@

    !"#"! 3'45.6'

    /0*+08"+$E >,(G,"C ;/08/ +",G$+$E (#'3 *>$80408 +3>$* (4

    8(C>9+$,* "#E *$$C* +( /"2$ *>,$"E C"0#'3 +( 8$,+"0# 8(9#+,0$*` ;0+/ "# 9#9*9"''3 /0G/

    >,$2"'$#8$ 0# ,(K"K'$ 0#+$#+0(# (4

    UF -L*+(#0" 5"* S( L20E$#8$ (4 W,$C'0#

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    31/101

    8"9*0#G 20K,"+0(#* +/"+ ;(9'E $0+/$, E$*+,(3 (, *$2$,$'3 E"C"G$ +/$ 8$#+,049G$*@ =+9M#$+

    ">>",$#+'3 *988$$E$E 0# 8"9*0#G *(C$ E$'"3* "#E E0*,9>+0(#* 0# +/$ 9,"#09C $#,08/C$#+

    >,(8$** K9+ 4"0'$E +( 8"9*$ "#3 8"+"*+,(>/08 E"C"G$@U_./$# "G"0#` *9K*$\9$#+ "#"'3*0* /"*

    */(;# +/"+ +/0* C0G/+ /"2$ K$$# +/$ 0#+$#+0(# (4 +/$ 8,$"+(,* (4 =+9M#$+` 4(, +/$ C"';",$

    /"E 8$,+"0# K90'+]0# '0C0+"+0(#* "#E *"4$G9",E* "#E 8(9'E ">>",$#+'3 /"2$ 8"9*$E C(,$

    E"C"G$ ;0+/(9+ +/$C@OR

    +0+0(9* ">>,("8/ "#E *$$C* +( /"2$ *+,02$E +(

    0#8,$"*$ *+,$** (# +/$ 8$#+,049G$ ,(+(,* 0# (,E$, +( */(,+$# +/$0, '04$*>"# ;0+/(9+ 8"9*0#G

    *9*>080(# (4 "#3 4(9' >'"3@ ,$20(9*'3 E$*8,0K$E C(,$

    ;$'' 6#(;# "#E '$** *+$"'+/3 "++"86 ;"* '"9#8/$E@ S$2$,+/$'$**` +/0* +0C$ +(( +/$ "++"86$,

    *$$C* +( /"2$ >,$4$,,$E "# ">>,("8/ (4 *(C$;/"+ '$** E"C"G$ (2$, " '(#G$, >$,0(E (4 +0C$

    8(C>",$E +( " *0C9'+"#$(9* E$*+,98+0(# (4 C(,$ 8$#+,049G$*@ P0+/(9+ +/$ '$** *+$"'+/3

    2$,*0(#` :"#G#$, ",G9$* +/"+ +/$ C"';",$ C0G/+ #$2$, /"2$ K$$# E0*8(2$,$E@OD

    9+$,* 0+ 0#4$8+$E@ .( >9+ +/0* 0#+(

    >$,*>$8+02$` " +/,$"+ 9*0#G $2$# (#$ l$,(]E"3 29'#$,"K0'0+3 0* E$*8,0K$E K3 +/$ 8(C>9+$,

    *$89,0+3 8(C>"#3 =3C"#+$8 "* -\90+$ "# $2$#+-@ 1*0#G 4(9, (4 +/$C 0* /0G/'3 $M+,"(,E0#",3

    "#E 9#0\9$ +( =+9M#$+@OI./$ "++"86 ;"* " ;"6$]9> 8"'' 0# +/$ *$#*$ +/"+ 0+ 9#E$,*8(,$E "#E

    U_ W0C w$++$, -5(; A0G0+"' A$+$8+02$* A$80>/$,$E =+9M#$+` +/$ )(*+ )$#"80#G )"';",$ 0# 50*+(,3-`

    L4#*: O S(2$CK$, FRDD` e;;;@;0,$E@8(Cb+/,$"+'$2$'bFRDDbROb/(;]E0G0+"']E$+$8+02$*]E$80>/$,$E]*+9M#$+b"''bh@ ./$ ",+08'$ ,$4$,* +( +/$ / :"#G#$, H" /4++ ( !*)7#4$%G* Z 2 H*=')4=(+ 2)(+@,4, "$ L'(7 87%_)*7e, !#*(7"#, H#4*: 7" 2='4*0*`S(2$CK$, FRDI` e;;;@'"#G#$,@8(Cb$#b;>]8(#+$#+b9>'("E*bFRDIbDDb.(]60'']"]8$#+,049G$@>E4 h "+ DX@

    OD :"#G#$,` H" /4++ ( !*)7#4$%G*`,%,$20(9*'3 9#6#(;# 29'#$,"K0'0+0$*` C$"#0#G +/$ E$2$'(>$,* /"2$ /"E

    l$,( E"3* +( >"+8/ +/$C@OI :0"C T )9,8/9` -=+9M#$+ 1*0#G ./,$$ JEE0+0(#"' w$,(]A"3 &9'#$,"K0'0+0$*-` 8@?()7*= S$$4=4(+ M+"G

    DH =$>+$CK$, FRDR` e;;;@*3C"#+$8@8(Cb8(##$8+bK'(G*b*+9M#$+]9*0#G]+/,$$]"EE0+0(#"']l$,(]E"3]29'#$,"K0'0+0$*h@

    DX

    http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/http://www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdfhttp://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilitieshttp://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilitieshttp://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/http://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/http://www.langner.com/en/wp-content/uploads/2013/11/To-kill-a-centrifuge.pdfhttp://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilitieshttp://www.symantec.com/connect/blogs/stuxnet-using-three-additional-zero-day-vulnerabilities
  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    32/101

    K,(9G/+ +( +/$ '0C$'0G/+ +/$ 4"8+ +/"+ 0+ ;"* 0#E$$E \90+$ >(**0K'$ 4(, " 83K$, "++"86 +( 8"9*$

    >/3*08"' E"C"G$@ P/$+/$, (, #(+ +/0* E"C"G$ ;"* *944080$#+ +( 8'"**043 +/$ "++"86 "* " 9*$

    (4 4(,8$ (, "# ",C$E "++"86 ;0'' K$ $M"C0#$E 0# +/$ 8(,,$*>(#E0#G 8/">+$,* K$'(;@

    ./$ (,0G0# (4 +/$ C"';",$ /"* #(+ K$$# (44080"''3 8(#40,C$E` "'+/(9G/ *$2$,"' ,$>(,+* 8'"0C

    +/"+ +/$ 1#0+$E =+"+$* "#E (,+$E 0# !9#$ FRDF

    +/"+ =+9M#$+ ;"* " >",+ (4 "# (>$,"+0(# 8(E$#"C$E T'3C>08 V"C$* ;/08/ K$G"# E9,0#G

    +/$ V$(,G$ P@ k9*/ "EC0#0*+,"+0(# "#E /"* *0#8$ K$$# 8(#+0#9$E K3 >,$*0E$#+ TK"C"@

    =$89,0+3 "#"'3*+* >(0#+$E 4"0,'3 \9086'3 "4+$, +/$ "++"86 +/"+ +/$ C"';",$ ;"* *(

    *(>/0*+08"+$E +/"+ 0+* 8,"4+0#G /"E ,$\90,$E 8(#*0E$,"K'$ ,$*(9,8$*` K"*08"''3 (#'3 "2"0'"K'$

    +( " #"+0(#]*+"+$@OH

    !"#"# 768 9)'0:6;

    +0#G (, E$*+,(30#G $0+/$, 8(CC9#08"+0(#*` E"+" (, 9'+0C"+$'3 $2$#

    >/3*08"' (Kp$8+*` N$E T8+(K$, ;"* "# 0#+$''0G$#8$ G"+/$,0#G +(('@ ./$ C"';",$ *>,$"E 20"

    +",G$+$E *>$",>/0*/0#G "++"86*OX"#E 0+ ;"* $M8$>+0(#"' 0# +/$ *$#*$ +/"+ 0+ /"E K$$# "8+02$

    4(, "# 9#9*9"''3 '(#G >$,0(E (4 +0C$` "+ '$"*+ 402$ 3$",*@ ./$ C"0# +",G$+* (4 +/$ "++"86

    0#8'9E$E G(2$,#C$#+*` $CK"**0$* "#E ,$*$",8/ 0#*+0+9+0(#* "#E 208+0C* (4 +/$ C"';",$ ",$

    *>,$"E ",(9#E +/$ ;(,'E@OU

    J* +/$ C"0# 49#8+0(# (4 N$E T8+(K$, *$$C* +( /"2$ K$$# 0#+$''0G$#8$ G"+/$,0#G` " 8'(*$,

    0#*>$8+0(# (4 0+ 0* (9+*0E$ +/$ *8(>$ (4 +/0* *+9E3@ (**0K'$ 83K$, "++"86* "#E "'*( +( >,$*$#+ +/$ 0**9$ (4 >(**0K'$ E044089'+3 0#

    E$+$,C0#0#G +/$ "0C (4 +/$ "++"86 "4+$, " K,$"8/ /"* K$$# E0*8(2$,$E@ N$E T8+(K$, ;"* 0# "

    OH :"#G#$,` H" /4++ ( !*)7#4$%G*`,%bFHb*+9M#$+];(,C]#"+0(#"']"G$#83h "#E W0C w$++$,`

    -k'(86K9*+$, P(,C J0C$E 4(, $",>/0*/0#G "++"86* ",$ *>$80408"''3 +",G$+$E? "# "++"86 C0G/+ 4(, $M"C>'$ K$ 8",,0$E (9+ K3 *$#E0#G "#$]C"0' +( *(C$(#$ 0# +/$ +",G$+ (,G"#0l"+0(# ;0+/ "# 0#4$8+$E "++"8/C$#+ 40'$@ ./$ $]C"0' C"3 K$ C"*6$E

    "* 8(C0#G 4,(C *(C$(#$ 4"C0'0", +( +/$ ,$8$02$, "#E +/$ 8(#+$#+ (4 +/$ C$**"G$ C"3 K$ 89*+(C0l$E +(8("M +/$ ,$8$02$, 0#+( (>$#0#G +/$ C"'080(9* "++"8/C$#+@

    OU -uN$E T8+(K$,u A0>'(C"+08 Q3K$, J++"86*

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    33/101

    *$#*$ " >"**02$ +(('` '9,60#G 0# +/$ K"86G,(9#E "#E G"+/$,0#G 0#4(,C"+0(# "#E >"**0#G 0+

    (#@ ./$(,$+08"''3` +/$ *"C$ 29'#$,"K0'0+0$* +/"+ 0+ 9*$E +( 0#+,9E$ +/$ *3*+$C* 8(9'E /"2$

    K$$# 9*$E +( '"9#8/ " C(,$ "8+02$ >0$8$ (4 C"';",$ ;0+/ C(,$ E$*+,98+02$ 8(#*$\9$#8$*`

    "#E E$>$#E0#G (# +/$ +",G$+$E 8(C>9+$,*` >$,/">* $2$# >/3*08"' E"C"G$*@ ./0*` 8(CK0#$E

    ;0+/ +/$ 4"8+ +/"+ $M"C0#0#G "#E ,$2$,*$ $#G0#$$,0#G +/$ E0*8(2$,$E K,$"8/$* C"3 K$ +0C$]

    8(#*9C0#G` C"3 >(*$ 8/"''$#G$* 4(, >(#E$,0#G +/$ ">>,(>,0"+$ "#E '$G"' ,$*>(#*$ +(

    +/$ "++"86*@

    0"G1.+-%,+93 7/8.+&/ (; &-. 7&&9+F/

    P/0'$ C"#3 (4 +/$ +$8/#08"' E$+"0'* (4 83K$, (>$,"+0(#* ",$ #(+ ,$'$2"#+ +( +/$ ">>'08"+0(#

    (4 0#+$,#"+0(#"' '";` 0+ 0* #$8$**",3 +( (9+'0#$ *(C$ G$#$,"' "*>$8+* ,$G",E0#G +/$+$8/#0\9$* (4 E044$,$#+ "++"86*@ ./$ "4(,$C$#+0(#$E 8"*$* (4 L*+(#0" "#E =+9M#$+ /0G/'0G/+

    +;( 2"*+'3 E044$,$#+ +$8/#08"' 8(#8$>+* K$/0#E 8(C>9+$, "++"86*@ * K$ 8(C>",$E +( *+(,C0#G " +(;# ;0+/ +/(9*"#E* (4

    *('E0$,*` (, >$,/">* +( 40,0#G +/(9*"#E* (4 ",+0''$,3 ,(9#E* 0# +/$ G$#$,"' E0,$8+0(# (4 +/$

    +",G$+@ $,"+0(#* C0**0(# 8",,0$E (9+ K3 " +$"C (4 /0G/'3

    +,"0#$E 0#E020E9"'* ;0+/ E$+"0'$E 0#+$''0G$#8$ (# +/$ +",G$+@ ./(C"* N0E *$$* 83K$, ;$">(#*

    "* *>"##0#G " *>$8+,9C ,$"8/0#G 4,(C G$#$,08 K9+ '(;]>(+$#+0"' +(('* i *98/ "* +/$ (#$*

    9*$E 0# +/$ 8"*$ (4 L*+(#0" i +( *>$80408 K9+ /0G/]>(+$#+0"' (#$* i *98/ "* =+9M#$+ i "#E

    9*$* >"0#+K"'' G9#* "* "# $M"C>'$ (4 +/$ G$#$,08` '(;]>(+$#+0"' 60#E? +/$3 ",$ $"*0'3

    "2"0'"K'$` G$++0#G /0+ 0* /0G/'3 20*0K'$ K9+ +/$ $44$8+* ",$ #(+ $*>$80"''3 >$,C"#$#+@ OO

    ./$ L*+(#0"# ;$K*0+$* ;$,$ /0+ ;0+/ " E0*+,0K9+$E E$#0"'](4]*$,208$ "++"86@ ./$ "0C (4

    " E$#0"'](4]*$,208$ "++"86 0* +( *"+9,"+$ +/$ K"#E;0E+/ "#Eb(, +/$ 8(C>9+0#G 8">"80+3 (4 +/$

    +",G$+ *( +/"+ '$G0+0C"+$ +,"4408 8"##(+ G$+ +/,(9G/@ J *0#G'$ 9*$, ;0+/ " /"#E49' (4

    8(C>9+$,* 8"##(+ E( C98/ E"C"G$ K3 *98/ "++"86*` ;/08/ 0* ;/3 +/$ C(,$ 8(CC(#

    2",0"#+ 0* ":4,7#43%7*:E$#0"'](4]*$,208$ "++"86 8",,0$E (9+ +/,(9G/ " *(]8"''$E K(+#$+@ ./$

    K(+#$+ 8(#*0*+* (4 /9#E,$E* (, +/(9*"#E* (4 C"';",$]0#4$8+$E 8(C>9+$,* ;/(*$ ,$*(9,8$*

    "#E K"#E;0E+/ +/$ "++"86$, 8(#+,('* ,$C(+$'3 +( "++"86 +/$ +",G$+` >$,/">* 9#K$6#(;#*+ +(

    +/$ (;#$, (, 9*$, (4 +/$ 8(C>9+$,@ ./$ "++"86* C"3 "'*( K$ 8((,E0#"+$E *( +/"+ 0#E020E9"'

    OO N0E` !@3*# L(# L4++ 6"7 H(C* F+(=*`,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    34/101

    9*$,* 6#(;0#G'3 +"6$ >",+ 0# " E$#0"'](4]*$,208$ "++"86@ ./0* ,$\90,$* 2$,3 '0++'$ +$8/#08"'

    *60'' (, ,$*(9,8$*` "#E 0# 4"8+ ,$"E3 C"E$ *(4+;",$ 0* "2"0'"K'$ ;/08/ C"6$* +"60#G >",+ 0#

    "# "++"86 "* *0C>'$ "* $#+$,0#G " 1N: "EE,$** Y*98/ "* G((G'$@8(CZ (, "# ,(K'$C* C"0#'3 E9,0#G +/$ "8+02$ "++"86 >/"*$ ;/$# +/$

    +",G$+ *0+$ 0* 0#"88$**0K'$ E9$ +( +/$ C"'080(9* +,"4408@ P/$# +/$ +,"4408 ;(9#E* E(;# +/$

    *0+$ #(,C"''3 *+",+* ,$*>(#E0#G "G"0#@

    )"'080(9* >0$8$* (4 *(4+;",$ (, C"';",$` *98/ "* =+9M#$+` ",$ >,(G,"C* +/"+ +"6$

    "E2"#+"G$ (4 " 29'#$,"K0'0+3 i K"*08"''3 "# $,,(, 0# +/$ 8(E$ i (4 "#(+/$, >0$8$ (4 *(4+;",$

    Y*98/ "* )08,(*(4+ P(,E (, !"2"Z (, "# (>$,"+0#G *3*+$C Y*98/ "* P0#E(;*Z@ ./$

    29'#$,"K0'0+3 "''(;* 4(, "# "++"86$, +( 0#*$,+ +/$ C"';",$ 0#+( +/$ +",G$+$E 8(C>9+$, (, "

    #$+;(,6@ 7,(C /$,$` +/$ C"';",$ C"3 >,(>"G"+$ "9+(#(C(9*'3 +( "#(+/$, 8(C>9+$,* ;0+/

    +/$ *"C$ 29'#$,"K0'0+3@ ./$ C"';",$ C"3 40#E 0+* ;"3 (#+( +/$ 8(C>9+$, 4(, $M"C>'$ 20" "

    C"'080(9* $]C"0' "++"8/C$#+ (, " ;$K*0+$ (, "# 0#4$8+$E 1=k E,02$@ ./$ C"';",$ C0G/+

    "''(; 4(, +/$ "++"86$, +( 9*$ +/$ 8(C>9+$, "* " >",+ (4 " K(+#$+` 0+ C0G/+ "''(; 4(, "88$** +(

    +/$ ;$K8"C (4 +/$ 8(C>9+$,` 0+ C0G/+ E$'$+$ "'' +/$ 40'$* (# +/$ 8(C>9+$, (, 0+ C0G/+ "''(;

    4(, +/$ "++"86$, +( *$#E 89*+(C0l$E 8(CC"#E* +( " 9,"#09C 8$#+,049G$ "+ " #98'$", 4"80'0+3`

    +/$ >(**0K0'0+0$* ",$ >,"8+08"''3 '0C0+'$**@ /0*+08"+$E >0$8$ (4 *(4+;",$

    0#+$#E$E +( 0#4$8+ (#'3 8$,+"0# C"8/0#$*@ '(0+*-`9"#3*,` FI )",8/ FRDF`e;;;@4(,K$*@8(Cb*0+$*b"#E3G,$$#K$,GbFRDFbRIbFIb*/(>>0#G]4(,]l$,(]E"3*]"#]>,08$]'0*+]4(,]/"86$,*]

    *$8,$+]*(4+;",$]$M>'(0+*bh@[R N0E` !@3*# L(# L4++ 6"7 H(C* F+(=*`,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    35/101

    " 8(C>9+$, +/"+ E0E #(+ C"+8/ 8$,+"0# >,(>$,+0$*` 0+ */9+ 0+*$'4 E(;#@[DJ++"86* '06$ 0+ ",$

    "K'$ +( 8"9*$ *0G#0408"#+ E0,$8+ >/3*08"' E"C"G$? *>$$E0#G 9> "#E *'(;0#G E(;#

    8$#+,049G$* C0G/+ *$2$,$ +/$C` (>$#0#G 9> +/$ 4'((EG"+$* (4 " E"C C0G/+ E"C"G$ +/$ E"C

    (, 8"9*$ 4'((E0#G@ J C(,$ 0#E0,$8+ 4(,C (4 >/3*08"' E"C"G$ 0* >(**0K'$ "* ;$''? +0#6$,0#G

    ;0+/ +,"4408 '0G/+* (, +/$ "0, +,"4408 8(#+,(' *3*+$C C0G/+ 8"9*$ "880E$#+*@

    J#(+/$, +$8/#08"' 0**9$ ;(,+/ #(+0#G $*>$80"''3 ,$'"+$E +( 40G9,0#G (9+ +/$ (,0G0# (4

    +/$ "++"86` (, ,$\90,0#G *+"+$* +( K'(86 C"'080(9* +,"4408 4,(C +/$0, #$+;(,6 0#4,"*+,98+9,$` 0*

    +/$ *+,98+9,$ (4 +/$ 0#+$,#$+ "#E +/$3 ;"3 +,"4408 0* ,(9+$E@ $#E0#G (# +/$ #$+;(,6 8(#E0+0(#*` 0+ C0G/+ p9*+ "* ;$'' /$"E *(9+/ +( L*+(#0"` (, 0+

    C0G/+ K$ ,(9+$E +/,(9G/ '"#E]K"*$E 8"K'$* 20" =+@ B$+$,*K9,G@ ./$ E"+" C"3 $"*0'3 >"**

    +/,(9G/ " E(l$# (4 *$,2$,* "'(#G +/$ ;"3` "#E 04 (#$ (4 +/$ *$,2$,* "'(#G +/$ ;"3 ;(9'E

    G$+ E0*8(##$8+$E` +/$ E"+" ;(9'E "9+(C"+08"''3 K$ ,$,(9+$E +/,(9G/ "#(+/$, 8(##$8+0(#@ (**0K'$ +( +,"8$ +/$ +,"4408 K"86 +( 0+* +,9$ (,0G0#@[F

    79''3 *$89,0#G 8(C>9+$,* "G"0#*+ 83K$, "++"86* 0* >,"8+08"''3 0C>(**0K'$@ ./$ */$$,

    8(C>'$M0+3 (4 +/$ *(4+;",$ G9","#+$$* +/"+ +/$ +(+"' >,$2$#+0(# (4 $M>'(0+"K'$

    29'#$,"K0'0+0$* 0* #(+ 4$"*0K'$ 0# >,"8+08$@ J#E "* +/$ *"30#G 0# +/$ 0#E9*+,3 G($*` +/$ "++"86*

    #$2$, G$+ ;(,*$` +/$3 (#'3 G$+ K$++$,@ ./0* 8(CK0#"+0(# "**9,$* +/"+ +/$ ,"8$ K$+;$$#

    +/$ E$2$'(>C$#+ (4 +/$ "++"86* "#E +/$ >,(+$8+0(# 4,(C +/$C ;0'' 8(#+0#9$ "* /$"+$E "*

    $2$,@ k$8"9*$ (4 +/0*` +/$ #(+0(# (4 83K$, ,$*0'0$#8$ /"* 4(9#E 0+* ;"3 0#+( +/$ E0*89**0(#?

    +/"+ 0*` 0# "EE0+0(# +( *$89,0#G +/$ *3*+$C* 4,(C "++"86*` *+"+$* "#E >,02"+$ "8+(,* "0C +(

    >,$>",$ +/$C*$'2$* +( C0+0G"+$ +/$ 8(#*$\9$#8$* (4 >(**0K'$ "++"86* "* 4", "* >(**0K'$@[I

    [D w$++$, `"N B4G47(+ B*7*=740*, B*=4$"# 1#0(#? J# T>$#` ="4$ "#E =$89,$ Q3K$,*>"8$Y!T"@$9b0#4(,C"+0(#f*(80$+3b#$;*,((Cb84bE"$bE(89C$#+@84C^E(8f0EgDUUOh "+ XiO "#E ./$1#0+$E =+"+$*

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    36/101

    < =%>1$"+3'* '( +?% @,% '( A'/2%

    6"! H.%.'93 @(&,(%/ 7:(*& A9' 9%) $&/ >.4*39&,(%

    P",` "88(,E0#G +( +/$ 4"C(9* Q'"9*$;0+l0"# $M>,$**0(#` 0* +/$ 8(#+0#9"+0(# (4 >('0+08* K3

    (+/$, C$"#*@[HJ#E +/"+ 0* ;/"+ ;", ;"* 4(, " '$#G+/3 >$,0(E (4 /9C"# /0*+(,3? " ,$G9'",

    4(,C (4 *+"+$ K$/"20(9,@[X./$ ,9'$* 8(#8$,#0#G ;", ;$,$ 4$; "#E 4", K$+;$$# "#E i 0# +/$

    P$*+$,# 89'+9,$ i E0*89**$E K3 Q/,0*+0"# +/$('(G0"#* *98/ "* =+@ J9G9*+0#$ 0# +/$ +9,# (4

    +/$ X+/ 8$#+9,3 "#E ./(C"* J\90#"* 0# +/$ DI+/ 8$#+9,3@ ./$3 ;$,$ 0#4'9$#+0"' +/0#6$,*

    8(#+,0K9+0#G +( +/$3*++%? W%,7%?E(8+,0#$ ;/08/ *$+ (9+ +/$ 8(#E0+0(#* 4(, " p9*+ ;",@[U ./$

    (,0G0#"' +,"8$* (4 +/$ E0*+0#8+0(# K$+;$$#3*++%? W%,7%?"#E3*++%? 4)W%,7%? '$"E 49,+/$,

    K"86 +( +/$ N(C"# W0#GE(C@[O J88(,E0#G +( J\90#"*` 4(, " ;", +( K$ p9*+` 0+ /"E +( 49'40'

    +/,$$ 8,0+$,0"? 0+ /"E +( K$ 8(#E98+$E 9#E$, +/$ "9+/(,0+3 (4 " *(2$,$0G# Y+/"+ 0*` #(+

    >,02"+$'3Z` +/$,$ /"E +( K$ " p9*+ 8"9*$ 4(, +/$ ;",` "#E +/(*$ ;"G0#G ;", /"E +( /"2$

    +/$ ,0G/+ 0#+$#+0(# +( "E2"#8$ G((E "#E +( "2(0E $20'@[[

    "#0*/ 8('(#0l"+0(# (4 +/$ ",6 4(, +/$ $C$,G$#8$ (4

    C(E$,# 0#+$,#"+0(#"' '"; "+ +/$ 1#02$,*0+3 (4 ="'"C"#8"@[_

    9K'0*/$E` K(+/ (4 ;/08/ E0*89**$E +/$ '";* (4 ;", $M+$#*02$'3 "#E E,$; " E0*+0#8+0(#

    K$+;$$# +/$('(G3 "#E 0#+$,#"+0(#"' '";@_R ./$ B$"8$ (4 P$*+>/"'0" 0# DUH[ C",6$E +/$

    K$G0##0#G (4 +/$ $," (4 +/$ C(E$,#` 0#E$>$#E$#+ #"+0(#]*+"+$* "#E +/$ $#E (4 +/$ ,$'0G0(9*

    ;",* K$+;$$# Q"+/('08 "#E B,(+$*+"#+ 8(9#+,0$*@_D./$ DX+/ "#E DU+/ 8$#+9,0$* ;$,$ "'*( "

    [H Q",' 2(# Q'"9*$;0+l ["? /#4*G*YN(;(/'+` 5"CK9,G` D_UIZ "+ FF@[X W",0 5"6">oo` .%,4 C(),(4)0\+4)*) "4C*%,Y."'$#+9C` 5$'*0#60` FRRIZ "+ HDD@

    [U A0#*+$0#` L(#K 2GG#*,,4") (): 8*+$YB*$*)=*`,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    37/101

    >$,0(E (4 C0'0+",3 ,$2('9+0(# "#E (4 " 8(C>,$/$#*02$ 8/"#G$ (4 +/$ ;/('$ >","E0GC (4 ;",

    K,(9G/+ (# K3 +/$ >,('04$,"+0(# (4 40,$",C* "#E $2$, G,(;0#G ",C0$*@_F

    ./$ p9*+ ;", ,$"*(#0#G K$8"C$ \90+$ $M+$#E$E "#E K(+/ *0E$* (4 8(#4'08+* ;$,$ "K'$ +(

    ,$*(,+ +( 0+ 0# p9*+0430#G +/$0, "8+0(#*@ 7,(C +/$ D[+/ 8$#+9,3 (#;",E* +/$ E0*+0#8+0(#

    K$+;$$# '$G"' "#E 0''$G"' ;",* 4"E$E "#E +/$ p9*+0408"+0(# (4 ;", ,$2('2$E ",(9#E +/$

    0#+$,$*+* (4 +/$ *+"+$` ;/08/ ;$,$ E$40#$E K3 $"8/ *+"+$ +/$C*$'2$*@ _I A9,0#G +/$ D_+/

    8$#+9,3 0+ ;"* +/$ *(2$,$0G# +/"+ ,(*$ +( +/$ 8$#+,$ "#E 8'"0C$E " C(#(>('3 (# $M$,80*0#G

    C0'0+",3 >(;$,@ ./$ '$G"' "#"'3*0* */04+$E "* ;$''` "#E 0+ ;"* +/$ *(2$,$0G# "8+ +/"+ K$8"C$

    +/$ *+",+0#G >(0#+ (4 +/$ "**$**C$#+@_H

    J4+$, +/$ *944$,0#G (4 +/$ 70,*+ P(,'E P",` +/$ Q(2$#"#+ (4 +/$ :$"G9$ (4 S"+0(#*_XY*0G#$E

    0# D_D_Z *$+ 8$,+"0# '0C0+"+0(#* (# ;",` "'+/(9G/ E0E #(+ K"# 0+ "'+(G$+/$,@ ,(20E$ 4(, " C(,$ 8(C>,$/$#*02$ >,(/0K0+0(# (4 ;",@ J* ;0E$'3 "* 0+ ;"*

    ,"+040$E` 0+ 4"0'$E +( >,$2$#+ 4(, $M"C>'$ +/$ "#$*$ 0#2"*0(# (4 )"#8/9,0" 0# D_ID "#E` (4 8(9,*$` 9'+0C"+$'3` +/$ =$8(#E P(,'E P",@

    (*+];", C0'0+",3 +,0K9#"'*@_O

    6"0 I%,&.) @9&,(%/ 9/ &-. J..8.' (; $%&.'%9&,(%93 K.9+.

    J4+$, +/$ =$8(#E P(,'E P", "#E +/$ 4"0'9,$* (4 +/$ W$''(GGik,0"#E B"8+ "#E +/$ :$"G9$ (4

    S"+0(#*` XD *+"+$* 0# D_HX 4(,C$E +/$ 1#0+$E S"+0(#* Y1SZ` "# (,G"#0l"+0(# ;/(*$

    >9,>(*$* "88(,E0#G +( J,+08'$ D (4 +/$ 1S Q/",+$, 0#8'9E$ +/$ C"0#+$#"#8$ (4 0#+$,#"+0(#"'

    >$"8$ "#E *$89,0+3 "#E +/$ E$2$'(>C$#+ (4 4,0$#E'3 ,$'"+0(#* "C(#G #"+0(#*@ J* +/$ +/,$"+*

    +( 0#+$,#"+0(#"' >$"8$ "#E *$89,0+3 /"2$ +9,#$E C(,$ +( 0#+,"]*+"+$ 8(#4'08+* ;/08/ +/$

    Q/",+$, E($* #(+ $M>'080+'3 E$"' ;0+/` +/$ Q/",+$, *3*+$C /"* $2('2$E +/,(9G/ 0#+$,>,$+"+0(#

    _F !((#"* =0>0'o` -B99#$0*+" k"*+0(#$0/0# i =(+" p" /0*+(,0"''0*$+ $*0C$,60+- 0# !3,0 N"0+"*"'( "#E !((#"*

    =0>0'o Y$E*Z`E%%77%0( ,"7(YS"+0(#"' A$4$#8$ 1#02$,*0+3? 5$'*0#60` FRRXZ` FXiXX "+ HRiHD@_I )"'"#8l96 i J6$/9,*+ 2C*'%#,7e, E":*#) R)7#":%=74") 7" R)7*#)(74")(+ :";`,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    38/101

    "#E +/$ E$2$'(>C$#+ (4 #$; ,9'$* "#E 8(#8$>+* *98/ "* >$"8$6$$>0#G` ;/08/ /"* K$8(C$

    "# 0C>(,+"#+ >",+ (4 +/$ (>$,"+0(# (4 +/$ 1#0+$E S"+0(#*@ ./0* >,(8$** /"* K3 #( C$"#*

    K$$# $"*3 #(, /"* +/$,$ "';"3* K$$# " 8'$", 8(#*$#*9* (# /(; +( ">>'3 +/$ $M0*+0#G ,9'$* 0#

    #$; *0+9"+0(#*@

    ./$ C"0#+$#"#8$ (4 0#+$,#"+0(#"' >$"8$ "#E *$89,0+3 K90'E* ",(9#E J,+08'$ FYHZ (4 +/$

    Q/",+$,@ (,+"#+ *(9,8$ (4 ,9'$* ,$G",E0#G +/$ 9*$ (4 4(,8$ 0* 89*+(C",3 0#+$,#"+0(#"' '";@

    =(C$ (4 +/$ 89*+(C",3 0#+$,#"+0(#"' '"; ,9'$* 8(,,$*>(#E +( +/(*$ (4 +/$ 1S Q/",+$,` K9+

    +/$ ,$'"+0(#*/0> K$+;$$# +/$ +;( 0* #(+ "';"3* 8'$",@ J,+08'$* FYHZ "#E XD "#E +/$

    8(,,$*>(#E0#G ,9'$* (4 89*+(C",3 0#+$,#"+0(#"' '"; ;0'' K$ C(,$ 8'(*$'3 $M"C0#$E '"+$, (#@

    J,+08'$ II "'(#G ;0+/ +/$ ,$*+ (4 Q/">+$, &< (4 +/$ Q/",+$, "0C* +( $#*9,$ +/"+ *+"+$* ;0''

    *$++'$ +/$0, E0*>9+$* >$"8$49''3@ ./$ J,+08'$ (K'0G$* >",+0$* (4 "#3 E0*>9+$ ;/(*$

    8(#+0#9"#8$ 0* '06$'3 +( $#E"#G$, +/$ C"0#+$#"#8$ (4 0#+$,#"+0(#"' >$"8$ "#E *$89,0+3 +(

    40,*+ (4 "'' *$$6 " *('9+0(# K3 #$G(+0"+0(#` C$E0"+0(# (, (+/$, >$"8$49' C$"#*@

    ./$ ,9'$* (4 89*+(C",3 0#+$,#"+0(#"' '"; "#E +/$ 1S Q/",+$, ">>'3 +( *+"+$* "#E C"3 (#'3

    ">>'3 +( #(#]*+"+$ "8+(,* 04 +/$0, "8+0(#* ",$ "++,0K9+"K'$ +( *+"+$*@ ./$ (#*0K0'0+3 (4 =+"+$* 4(,

    +$, +0(# (, (+/$,

    ">>,(>,0"+$ "8+0(#-@DRR ./$ \9$*+0(# (4 "++,0K9+0(# ;0'' K$ +(98/$E 9>(# '"+$,` "#E ;/0'$

    " E$+"0'$E $M"C0#"+0(# (4 +/$ 0**9$ 0* (9+*0E$ +/$ *8(>$ (4 +/0* *+9E3` *94408$ 0+ +( #(+$ "+

    _[ '$ K$$# 8"''$E -+/$ /$",+ (4 +/$ 1S Q/",+$,-` *$$ :(90* 5$#60#` -./$ N$>(,+* (4 +/$ A$"+/(4 J,+08'$ FYHZ J,$ V,$"+'3 LM"GG$,"+$E-` UX H'* 2?*#4=() J"%#)(+ "$ R)7*#)(74")(+ I(NYD_ODZ XHHi

    XH[ "+ XHH@__ N$>(,+ (4 +/$

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    39/101

    +/0* >(0#+ +/"+ 04 8$,+"0# 8(#E0+0(#* ",$ C$+` 0+ 0* $#+0,$'3 >(**0K'$ 4(, +/$ "8+* (4 #(#]*+"+$

    "8+(,* +( K$ "++,0K9+$E +( " *+"+$ 0# +/$ 8(#+$M+ (4 83K$, (>$,"+0(#* "* ;$''@

    6"6 $%&.'8'.&9&,(% (; &-. >*3./ (; $%&.'%9&,(%93 L9D

    ./$ 1#0+$E S"+0(#* Q/",+$, 0* " 8$#+,"' E(89C$#+ ,$G",E0#G +/$ ,9'$* (4W%, (: 3*++%?@ ./$

    ",+08'$* (4 +/$ Q/",+$, ",$` "* ;$ */"'' *$$ (# +/$ 4(''(;0#G >"G$*` #(+ 9#"CK0G9(9* "#E

    8"#` "* #$",'3 $2$,3 +,$"+3 +$M+` K$ 0#+$,>,$+$E 0# E044$,$#+ ;"3*@ ./$ &0$##" Q(#2$#+0(# (#

    +/$ :"; (4 .,$"+0$*DRD Y&Q:.Z` *0G#$E 0# D_U_` (44$,* ,9'$* "#E G90E"#8$ "* +( +/$

    0#+$,>,$+"+0(# (4 +,$"+0$*@ J,+08'$ H (4 +/$ &Q:. *+"+$* +/"+ +/$ Q(#2$#+0(# (#'3 ">>'0$* +(

    +,$"+0$* 8(#8'9E$E "4+$, +/$ $#+,3 0#+( 4(,8$ (4 +/$ Q(#2$#+0(#` ;/08/ /">>$#$E 0# !"#9",3

    D_[R@ 5(;$2$,` +/0* E($* #(+ >,$2$#+ ">>'30#G +/$ ,9'$* (4 +/$ &Q:. +( +/$ 1S Q/",+$,` "*+/$ ,9'$* (4 +/$ Q(#2$#+0(# "'*( 8(,,$*>(#E +( 89*+(C",3 0#+$,#"+0(#"' '";@DRF

    ./$,$ ",$ +/,$$ K"*08 ">>,("8/$* +( +/$ 0#+$,>,$+"+0(# (4 0#+$,#"+0(#"' +,$"+0$*? (#$ 4(89*$*

    (# +/$ +$M+ (4 +/$ +,$"+3` *$8(#E (# +/$ 0#+$#+0(# (4 +/$ "E(>+0#G >",+0$* "#E +/$ +/0,E C(,$

    ;0E$'3 (# +/$ (Kp$8+ "#E >9,>(*$ (4 +/$ +,$"+3@DRI./$ >,("8/$*@

    J88(,E0#G +( J,+08'$ ID "#E 0+* G$#$,"' ,9'$ (4 +,$"+3 0#+$,>,$+"+0(#` +/$ +,$"+3 */"'' K$

    0#+$,>,$+$E 0# G((E 4"0+/ 0# "88(,E"#8$ ;0+/ +/$ (,E0#",3 C$"#0#G +( K$ G02$# +( +/$ +$,C*

    0# +/$0, 8(#+$M+ "#E 0# '0G/+ (4 +/$ (Kp$8+ "#E >9,>(*$ (4 +/$ +,$"+3@ ","G,">/ I (4 +/$ J,+08'$` "#3 *9K*$\9$#+ "G,$$C$#+ K$+;$$# +/$ >",+0$* ,$G",E0#G +/$

    0#+$,>,$+"+0(# (4 +/$ +,$"+3 "#E "#3 *9K*$\9$#+ >,"8+08$ 0# +/$ ">>'08"+0(# (4 +/$ +,$"+3

    $*+"K'0*/0#G +/$ "G,$$C$#+ (4 +/$ >",+0$* ,$G",E0#G +/$ 0#+$,>,$+"+0(# */"'' K$ +"6$# 0#+(

    "88(9#+@ ,"8+08$ C"3 "'*( *0G#043

    " 8/"#G$ 0# +/$ '$G"' ,$'"+0(#*/0> K$+;$$# +/$ >",+0$* +( +/$ +,$"+3@DRX

    DRD &0$##" Q(#2$#+0(# (# +/$ :"; (4 .,$"+0$*` FI )"3 D_U_` 0# 4(,8$ FO !"#9",3 D_[R@ DDXX 1S.= IID@

    DRF H*##47"#4(+ B4,@ U "+ >"," HD@J'*(` V$(,G N$**` -,$+"+0(#- 0# k,9#( =0CC" Y$E@Z` H'* !'(#7*# "$ 7'* .)47*: 6(74"), Z

    2 !"??*)7(#@K ["+%?* RYF#E LE0+0(#` TM4(,E 1#02$,*0+3 B,$**` FRRFZ` DIiIF "+ D[@DRI =/";`R)7*#)(74")(+ I(N`,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    40/101

    J,+08'$ IF (4 +/$ &Q:. E$"'* ;0+/ +/$ *9>>'$C$#+",3 C$"#* (4 0#+$,>,$+"+0(#@ J88(,E0#G +(

    0+` *9>>'$C$#+",3 C$"#* *98/ "* +/$ >,$>","+(,3 ;(,6 (4 +/$ +,$"+3 Z 7#(0(%_

    / K "'*(

    *+"+$* +/"+ +/$ *9>>'$C$#+",3 C$"#* C"3 K$ 9*$E 0# 0#+$,>,$+"+0(# 04 +/$ ,$*9'+ (+/$,;0*$

    8(C$* 9> C"#04$*+'3 "K*9,E (, 9#,$"*(#"K'$@ P/0'$ 9*$49' 0# *(C$ 8"*$*` +/$,$ ",$ "'*(` +(

    \9(+$ =+$4"# W"E$'K"8/` G((E ,$"*(#* +( /"#E'$ +/$ E,"4+0#G C"+$,0"'* ;0+/ ,$'98+"#8$@DRU

    ,"8+08$ (4 4(, $M"C>'$ +/$ 1S

    =$89,0+3 Q(9#80' C"3` $*>$80"''3 0# 8"*$* (4 9#"#0C0+3` K$ +0$E K"86 +( +/$ C$CK$, *+"+$*@

    +0#G +/$ >,"8+08$ (4 (,G"#* ;0+/(9+ E9$ ,$G",E 4(, +/$ >,(8$E9,$

    K$/0#E +/$C C"3 0# ;(,*+ 8"*$* '$"E +( +/$ *(]8"''$E +3,"##3 (4 +/$ C"p(,0+3` K9+ +/0* C"3

    K$ "2(0E$E K3 " 8"*$]K3]8"*$ "#"'3*0* "#E +/$ "88$>+"#8$ (4 8(#*0*+$#+ "#E ;0E$'3

    "88$>+$E >,"8+08$@DRO

    J#E 0# >,"8+08$ *(4+ '"; 0#*+,9C$#+* ",$ K$0#G 9*$E 4(, "9+/(,0+"+02$0#+$,>,$+"+0(# (4 +,$"+0$*` "'*( 0# +/$ 8(#+$M+ (4 +/$ 9*$ (4 4(,8$@DR[ J#(+/$, \9$*+0(# 0*

    ;/$+/$, 4(, $M"C>'$ +/$ >,"8+08$ (4 +/$ =$89,0+3 Q(9#80' 0* (4 *98/ 9#04(,C0+3 +/"+ 0+

    ;(9'E 0# +/0* *$#*$ 8(9#+ (, K$ 9*$49'@

    DRU =+$4"# W"E$'K"8/` -,$+"+0(# (4 +/$ Q/",+$,- 0# k,9#( =0CC"` A"#0$']L,"*C9* W/"#` V$(,G S('+$"#E J#E,$"* B"9'9* Y$E*Z` H'* !'(#7*# "$ 7'* .)47*: 6(74"), Z 2 !"??*)7(#@K ["+%?* RYI,E LE0+0(#`

    TM4(,E 1#02$,*0+3 B,$**` FRDFZ` ODiDRR "+ [[i[_@DRO W"E$'K"8/`R)7*#

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    41/101

    B C/'?3#3+3'* '( +?% @,% '( A'/2% 3* +?% )'*+%D+'( )9#%/ EF%/"+3'*,

    G"! 7'&,+3. 0MGN (; &-. I%,&.) @9&,(%/ E-9'&.'

    J,+08'$ FYHZ (4 +/$ 1#0+$E S"+0(#* Q/",+$, *+"+$* +/"+

    2++ E*?3*#, ,'(++ #*$#(4) 4) 7'*4# 4)7*#)(74")(+ #*+(74"), $#"? 7'* 7'#*(7 "# %,*

    "$ $"#=* (G(4),7 7'* 7*##47"#4(+ 4)7*G#47@ "# ('0+08"' 0#E$>$#E$#8$ (4 " *+"+$` K9+ +/$*$ */(9'E #(+` "88(,E0#G +(

    +/$ C(,$ 8(CC(# 20$;` K$ ,$"E "* " ,$*+,08+0(# (# +/$ *8(>$ (4 +/$ K"#@ DDR ",+ (4 +/$ *$#+$#8$ 0#8'9E$* " 8"+8/]"'' >,(/0K0+0(# (#

    +/$ 9*$ (, +/,$"+ (4 4(,8$ 0# "#3 (+/$, C"##$, 0#8(#*0*+$#+ ;0+/ +/$ >9,>(*$* (4 +/$ 1#0+$E

    S"+0(#*@

    ./$ #(+0(# (4 -4(,8$- 0* #(+ E$40#$E 0# +/$ Q/",+$,` 3$+ 0+ 0* 8,980"' +( +/$ 8(#+$#+ (4 +/$

    J,+08'$@ ,0*$` +/$#` +/"+ +/$,$ ",$ *(C$ 2",30#G 20$;* (# ;/08/ 60#E (4 "8+*

    J,+08'$ FYHZ 8(2$,*@ ./$ Q/",+$, 0#8'9E$* " ,"#G$ (4 +$,C* ;/(*$ 9*"G$ 0* #(+ $#+0,$'3

    9#"CK0G9(9*@ J* C$#+0(#$E` J,+08'$ FYHZ K"#* +/$ 9*$ (4 -4(,8$- ;/$,$"* +/$ B,$"CK'$ (4

    +/$ Q/",+$, *>$"6* "K(9+ -",C$E 4(,8$- "#E J,+08'$ XD G9","#+$$* +/$ ,0G/+ +( *$'4]E$4$#8$ 0#

    8"*$* (4 "# -",C$E "++"86-@ ./$ E$40#0+0(# "#E 8(#+$#+ (4 +/$ +$,C* 4(,8$ "#E ",C$E "++"86

    */"'' K$ $M"C0#$E C(,$ 8'(*$'3 K$'(;@ ,0#80>'$ (4 #(#]0#+$,2$#+0(# (, (+/$,

    DR_ =/";`R)7*#)(74")(+ I(N`,%"#3? J'E$,*/(+` D__FZ "+ FX@

    FX

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    42/101

    4"8$+* (4 0#+$,#"+0(#"' '";@ ./$*$ +(( ;0'' K$ C(,$ 8'(*$'3 $M"C0#$E (# +/$ 4(''(;0#G

    >"G$*@

    G"0 E*/&(29'5 $%&.'%9&,(%93 L9D

    -:-'-0. 0. '>6 ?+6 0@ A0;)6 -. B4+'0C(;DE.'6;.('-0.(F G(H

    J,+08'$ I[YDZ (4 +/$ =+"+9+$ (4 +/$ (,+ (4 +/$ '$* (4

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    43/101

    P/0'$ +/$ Q(9,+ 8(#*0E$,$E +/$ $M0*+$#8$ (4 ","8+08$ i (4 " 89*+(C",3 '"; #(,C 0* C0**0#G^ +$E +( p9*+043 +/$0, "8+0(#* 0# +$,C* (4 *$'4]E$4$#8$ 0#*+$"E (4 8'"0C0#G +/"+

    J,+08'$ FYHZ (, " 89*+(C",3 '"; #(,C ;0+/ +/$ *"C$ 8(#+$#+ ;(9'E K$ 0#2"'0E@ DDO ,$**0(# (4 ">$"' +( +/$

    $M8$>+0(#* +( +/$ ,9'$` +/$ *0G#0408"#8$ (4 +/$ "++0+9E$ 8(#40,C* ,"+/$, +/"# ;$"6$#* +/$

    ,9'$` $2$# 04 +/$ 8(#E98+ (4 +/$ *+"+$ 0* #(+ 0# ,$"'0+3 p9*+040"K'$ (# *98/ K"*0*@ DD[

    J#(+/$, \9$*+0(# 0* +/$ 8(#+$#+ (4 +/$ 89*+(C",3 0#+$,#"+0(#"' '"; ,9'$ 2$,*9* +/$ 8(#+$#+

    (4 J,+08'$ FYHZ@ ` +/$3 *+0'' ;(9'E C"0#+"0# +/$0, *$>","+$ 0E$#+0+0$*@DFR

    j(,"C A0#*+$0# ",G9$*+/"+ +/$ >,$*$#+ 4(,C (4 +/$ ,9'$ (4 89*+(C",3 0#+$,#"+0(#"' '"; 0* -$**$#+0"''3 " ,$>'08"- (4

    J,+08'$ FYHZ` K9+ ,$C0#E* +/"+ 0+ 0* 0C>,(K"K'$ +/"+ +/$ 8(,,$'"+0(# ;0'' #(+ E$2$'(> (2$, +/$

    3$",*@DFD

    ./$ 89*+(C",3 '"; >,(/0K0+0(# 0*` +( *0C>'043 +/$ 0**9$` >(+$#+0"''3 C(,$ K,("E 0# 0+* *8(>$

    K9+ $2('2$* C(,$ ,0G0E'3 +/,(9G/ *+"+$ >,"8+08$ "#E "$,/">* K$ C(,$ #0CK'3 0#+$,>,$+$E` 3$+ +/$ +$M+ (4 +/$ +,$"+3 "#E +/$ ,9'$*

    (4 0+* 0#+$,>,$+"+0(# *$+ 8$,+"0# '0C0+*@ (**0K'$ 4(, " ,9'$ (4 89*+(C",3

    0#+$,#"+0(#"' '"; +( $C$,G$ ,$G",E0#G *>$80408"''3 83K$, (>$,"+0(#* "#E +/$ 9*$ (4 4(,8$`

    K9+ "+ +/0* >(0#+ +/$,$ 0* #(+ *944080$#+ $20E$#8$ (4 *98/ " #(,C@DFF./$ *"C$ 8"# K$ *"0E

    DDO A0#*+$0#`L(#K 2GG#*,,4") (): 8*+$YB*$*)=*`,%","@ D[U@DD_64=(#(G%(`,%","@ DOO@DFD A0#*+$0#` L(#K 2GG#*,,4") (): 8*+$YB*$*)=*`,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    44/101

    ;0+/ ,$G",E +( (+/$, 0**9$* "* ;$''` "* +/$ \9$*+0(# (4 +/$ $2('2$C$#+ (4W%, (: 3*++%?0* (4

    8(9,*$ #(+ '0C0+$E +( 83K$, (>$,"+0(#*@ C$#+* *98/ "* +/$ ,0*$ (4 G'(K"' +$,,(,0*C "#E +/$

    E0C0#0*/0#G $44$8+ (4 G'(K"'0l"+0(# (# +/$ *(2$,$0G#+3 (4 *+"+$*@DFI

    -:-'-0. 0@ '>6 ?+6 0@ A0;)6 (+ ( =6;6CI'0;D J0;C

    '$-

    (4 " ,9'$ +/"+ /"* -+/$ 8/","8+$, (4W%, ="G*),-@DFH./$ $,$C>+(,3 #(,C "* -" #(,C "88$>+$E "#E

    ,$8(G#0l$E K3 +/$ 0#+$,#"+0(#"' 8(CC9#0+3 (4 =+"+$* "* " ;/('$ "* " #(,C 4,(C ;/08/ #(

    E$,(G"+0(# 0* >$,C0++$E "#E ;/08/ 8"# K$ C(E040$E (#'3 K3 " *9K*$\9$#+ #(,C (4 G$#$,"'

    0#+$,#"+0(#"' '"; /"20#G +/$ *"C$ 8/","8+$,-@ ./0* /"* K$$# G$#$,"''3 "88$>+$E "* +/$

    E$40#0+0(# 4(, " >$,$C>+(,3 #(,C@DF[Q(CC(# $M"C>'$* (4 >$,$C>+(,3 #(,C* 0#8'9E$ +/$

    >,(/0K0+0(# (4 G$#(80E$DF_"#E +/$ >,(/0K0+0(# (4 +(,+9,$`DIRK9+ +/$ >,(/0K0+0(# (4 +/$ 9*$ (4

    4(,8$ /"* "'*( K$$# ;0E$'3 9*$E "* "# (K20(9* $M"C>'$ (4 *98/ " #(,C@ DIDP/0'$ " 8'(*$,

    $M"C0#"+0(# (4 +/$ \9$*+0(# 0* (9+*0E$ +/$ *8(>$ (4 +/0* *+9E3` 0+ 0* ;(,+/ "86#(;'$EG0#G

    *(C$ (4 +/$ 8,0+0\9$ "#E >(**0K'$ >,(K'$C* ,$G",E0#G (9+,0G/+ 8'"**0430#G +/$ ;0E$, K"# (#

    +/$ 9*$ (4 4(,8$ "*W%, ="G*),@

    DFI =$"# A@ )9,>/3 -B,(+$"#J%, 2: M*++%?-` FOM*#C*+*@ J"%#)(+ "$ R)7*#)(74")(+ I(NYFRR_Z FFiXF "+ FI@

    DFH N$>(,+ (4 +/$ ,(/0K0+0(# (4 0#+$,2$#+0(# \9"'040$* "* " #(,C (4 W%, ="G*),@

    DF[ :"9,0 5"##06"0#$#`F*#*?

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    45/101

    k3 E$40#0+0(#` >$,$C>+(,3 #(,C* "''(; 4(, #( E$,(G"+0(#` 3$+ +/$ >,(/0K0+0(# (4 +/$ 9*$ (4

    4(,8$ "* '"0E (9+ 0# +/$ Q/",+$, (4 +/$ 1#0+$E S"+0(#* 0#8'9E$* +;( 9#8(#+$*+$E $M8$>+0(#*?

    +/$ 9*$ (4 4(,8$ 0# *$'4]E$4$#8$` ;/08/ 0* "'*( "86#(;'$EG$E +( K$ >",+ (4 89*+(C",3

    0#+$,#"+0(#"' '";` "#E +/$ 9*$ (4 4(,8$ ;0+/ +/$ "9+/(,0l"+0(# (4 +/$ =$89,0+3 Q(9#80'@ T#$

    8(CC(# ">>,("8/ 0* +( 20$; +/$W%, ="G*),>,(/0K0+0(# "* " ;0E$, #(,C $#8(C>"**0#G +/$

    ,0G/+ +( *$'4]E$4$#8$@DIF./0*` /(;$2$,` '$"E* +( (+/$, >,(K'$C*` *98/ "* "CK0G90+3 "* +( +/$

    8(#+$#+ (4 +/$ ,0G/+ +( *$'4]E$4$#8$@DIIT#$ (4 +/$ 20,+9$* (4 +/$ (+/$, W%, ="G*), #(,C* 0*

    +/$0, 8'",0+3? +(,+9,$ 0* >,(/0K0+$E ;0+/(9+ $M8$>+0(#*` "* 0* G$#(80E$ Y+/$0, E$40#0+0(#* 8"#

    (4 8(9,*$ K$ E$K"+$EZ@ ./0* 0* #(+ +/$ 8"*$ ;0+/ +/$ K"# (# +/$ 9*$ (4 4(,8$` ;/08/ 0#8'9E$*

    *(C$;/"+ "CK0G9(9* $M8$>+0(#* ;/08/ ",$ 0# 8(#*+"#+ $2('9+0(#` "* E$C(#*+,"+$E K3 4(,

    $M"C>'$ +/$ $C$,G$#8$ (4 +/$ 8(#8$>+ (4 ,$*>(#*0K0'0+3 +( >,(+$8+ YNFBZ "#E +/$ E0*89**0(#

    (4 >,$]$C>+02$ *$'4]E$4$#8$@J* !"C$* J@ V,$$# #(+$*` +/$ ,$"'0+3 (4 +/$ E$2$'(>C$#+ (4

    W%, (: 3*++%?E($* #(+ 40+ ;$'' 0#+( +/$ *+"+08 "#E *+"K'$ #"+9,$ >,$*9C$E 4,(C " W%, ="G*),

    #(,C@DIH

    J K$++$, "'+$,#"+02$ 0* +( E$40#$ +/$W%, ="G*),#(,C C(,$ >,$80*$'3 "* " K"# (4 "GG,$**0(#

    (, "GG,$**02$ 4(,8$@ ./0* 0* +/$ ">>,("8/ ,$4$,,$E +( K3 +/$ +$E K3 +/$ 1#0+$E

    S"+0(#* V$#$,"' J**$CK'3 0# D_OH E$40#$* "GG,$**0(# "* -+/$ 9*$ (4 ",C$E 4(,8$ K3 " =+"+$

    "G"0#*+ +/$ *(2$,$0G#+3` +$,,0+(,0"' 0#+$G,0+3 (, >('0+08"' 0#E$>$#E$#8$ (4 "#(+/$, =+"+$` (, 0#

    "#3 (+/$, C"##$, 0#8(#*0*+$#+ ;0+/ +/$ Q/",+$, (4 +/$ 1#0+$E S"+0(#*-@DIO

    DIF 7(, "# $M"C>'$ (4 *98/ " 4(,C9'"+0(#` *$$ 1'4 :0#E$,4"'6` -./$ L44$8+ (4J%, !"G*),S(,C*? P/($2$,T>$#$E B"#E(,"-* k(M` A0E j(9 L2$, ./0#6 JK(9+ +/$ Q(#*$\9$#8$*^-` D[H'* P%#"

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    46/101

    G"6 @(&,(% (; OP('+.O

    J,+08'$ FYHZ (4 +/$ 1S Q/",+$, K"#* +/$ +/,$"+ (, +/$ 9*$ (4 -4(,8$-` K9+ +/$,$ 0* #( $M>'080+

    E$40#0+0(# (4 ;/"+ 8(#*+0+9+$* 4(,8$@ ./$ '080+'3 E$40#$ +/$*$` +/$ p9EGC$#+

    (44$,* *(C$ 0#E08"+0(# "* +( ;/"+ $"8/ 8"+$G(,3 8(C>,0*$*@ 70,*+'3` +/$ Q(9,+ E,$;

    " E0*+0#8+0(# K$+;$$# +/$ -C(*+ G,"2$ 4(,C* (4 +/$ 9*$ (4 4(,8$-` +/"+ 0* ",C$E "++"86*

    ,$4$,,$E +( 0# J,+08'$ XD (4 +/$ Q/",+$,` "#E -(+/$, '$** G,"2$ 4(,C*-@ DI_ ./0* E0*+0#8+0(#

    ,$>,$*$#+* +/$ >,$2"0'0#G 20$;` K9+ 0+ /"* K$$# E0*>9+$E "* ;$''@DHR./$ ,$'"+0(#*/0> K$+;$$#

    J,+08'$ FYHZ "#E J,+08'$ XD ;0'' K$ 49,+/$, E0*89**$E K$'(; 0# 8/">+$, X@F@F0# p9#8+0(# ;0+/

    +/$ #(+0(# (4 "# -",C$E "++"86-@ =$8(#E'3` +/$ Q(9,+ E,$; " E0*+0#8+0(# K$+;$$# "8+*

    K,$"8/0#G +/$ >,0#80>'$ (4 #(#]0#+$,2$#+0(# "#E +/(*$ 8(#*+0+9+0#G " 9*$ (4 4(,8$? -"8+*

    8(#*+0+9+0#G " K,$"8/ (4 +/$ 89*+(C",3 >,0#80>'$ (4 #(#]0#+$,2$#+0(# ;0'' "'*(` 04 +/$3

    E0,$8+'3 (, 0#E0,$8+'3 0#2('2$ +/$ 9*$ (4 4(,8$` 8(#*+0+9+$ " K,$"8/ (4 +/$ >,0#80>'$ (4 #(#]

    9*$ (4 4(,8$ 0# 0#+$,#"+0(#"' ,$'"+0(#*-@DHD./$ Q(9,+ "'*( ,$4$,,$E +( "# (>$,"+0(# -8'"**040$E

    "* "# ",C$E "++"86 ,"+/$, +/"# "* " C$,$ 4,(#+0$, 0#80E$#+-DHF"#E +( +/$ 7,0$#E'3 N$'"+0(#*

    A$8'","+0(#` ;/08/ >(*0+* -" E9+3 +( ,$4,"0# 4,(C "8+* (4 ,$>,0*"' 0#2('20#G +/$ 9*$ (4 4(,8$-@

    ./$ >,0#80>'$ (4 #(#]0#+$,2$#+0(# ;0'' K$ *9CC",0'3 E0*89**$E 0# 8/">+$, U@DK$'(;@

    P/0'$ +/$ +$,C -4(,8$- 0* #(+ >,$8$E$E K3 -",C$E-` 0+ 0* ;0E$'3 "86#(;'$EG$E +/"+ -4(,8$-

    ,$4$,* >",+089'",'3 +( ",C$E 4(,8$ "#E +/9* $M8'9E$* 4(, $M"C>'$ $8(#(C08 4(,8$@ DHI=(C$

    "9+/(,* /"2$ +"6$# " 8(#+,",3 >(*0+0(# "#E ",G9$E +/"+ +/$ >,(/0K0+0(# 0* ;0E$, "#E E($*

    0#E$$E 0#8'9E$ (+/$, 4(,C* (4 4(,8$ "* ;$''? 4(, $M"C>'$ 5"#* W$'*$# ",G9$* +/"+ +/$

    #(+0(# (4 4(,8$ 0* C$"#+ +( 0#8'9E$ "#3 0''$G"' "8+0(# (4 " *+"+$ +/"+ 20('"+$* +/$ 0#+$,$*+* (4

    "#(+/$,` #(+ p9*+ ",C$E 4(,8$@DHHL2$# +/(9G/ $*>$80"''3 4,(C +/$ 20$;>(0#+ (4 >((, *+"+$*

    DI[ )8Q(9K,$3 "#E P/0+$`R)7*#)(74")(+ I(N (): 2#?*: !")$+4=7,%","@ D_D@

    DHR J'K,$8/+ N"#E$'l/(4$, -J,+08'$ XD- 0# k,9#( =0CC" Y$E@Z` H'* !'(#7*# "$ 7'* .)47*: 6(74"), Z2 !"??*)7(#@K ["+%?* RYF#ELE0+0(#` TM4(,E 1#02$,*0+3 B,$**` FRRFZ` O[[i[RU "+ O_RiO_D@

    DHD 64=(#(G%(`,%","@ D_X@

    DHI N"#E$'l/(4$,`2#74=+* T-^5`,%(,+` D_XHZ "+XX` XO@ 7(, "# (2$,20$; (4 *98/ 8(CC$#+",3 *$$ k$'"+8/$; J*,"+`F#"'43474") "$ 9"#=* .):*# 7'* .6

    IR

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    47/101

    +/$,$ C0G/+ K$ 8(C>$''0#G ,$"*(#* +( +,$"+ /",*/ $8(#(C08 >,$**9,$ "* 4(,8$` +/$,$ *$$C* +(

    K$ '0++'$ *9>>(,+ "2"0'"K'$ 4(, *98/ "# 0#+$,>,$+"+0(# K9+ 0#*+$"E C98/ *+,(#G$, ",G9C$#+*

    *9>>(,+0#G +/$ (>>(*0+$ 20$;@DHXJC(#G +/$*$ 0* +/$ ,$p$8+0(# (4 " >,(>(*"' 0#+,(E98$E K3

    k,"l0' "+ +/$ ="# 7,"#80*8( Q(#4$,$#8$ 0# D_HX +( K,("E$# +/$ K"# +( 0#8'9E$ $8(#(C08

    8($,80(#@ ./$ 0**9$ ;"* "'*( ,"0*$E E9,0#G +/$ 8(CC0++$$ ;(,6 '$"E0#G +( +/$ 7,0$#E'3

    N$'"+0(#* A$8'","+0(#` K9+ +/$ 20$; (4 '0C0+0#G +/$ #(+0(# (4 4(,8$ +( C0'0+",3 4(,8$

    >,$2"0'$E "#E +/$ A$8'","+0(# ,$4$,* +( C$"*9,$* (4 $8(#(C08 8($,80(# 0# +/$ 8(#+$M+ (4 +/$

    >,0#80>'$ (4 #(#]0#+$,2$#+0(# 0#*+$"E (4 +/$ >,0#80>'$ (4 #(#]9*$ (4 4(,8$@DHU./$ *"C$ 60#E

    (4 " 8(#8'9*0(# ;"* ,$"8/$E ;0+/ +/$ A$8'","+0(# (# +/$ L#/"#8$C$#+ (4 +/$ L44$8+02$#$**

    (4 +/$ B,0#80>'$ (4 N$4,"0#0#G 4,(C +/$ ./,$"+ (, 1*$ (4 7(,8$ 0# ","G,">/ ","G,">/ OZ "#E $8(#(C08 (, (+/$, 8($,80(# Y>","G,">/ ","G,">/ [Z@ ,0#80>'$ (4 #(#]

    0#+$,2$#+0(#@DH[./$ \9$*+0(# (4 $8(#(C08 4(,8$ ;0'' K$ "EE,$**$E 0# C(,$ E$+"0' "#E 0# +/$

    8(#+$M+ (4 83K$, "++"86* 0# 8/">+$, H@X@

    J,+08'$ FYHZ K"#* +/$ 9*$ (4 4(,8$ "G"0#*+ +/$ +$,,0+(,0"' 0#+$G,0+3 (, >('0+08"' 0#E$>$#E$#8$

    (4 "#3 *+"+$` (, 0# "#3 (+/$, C"##$, 0#8(#*0*+$#+ ;0+/ +/$ >9,>(*$* (4 +/$ 1#0+$E S"+0(#*@./$ >,$2"0'0#G 20$; 0* +/"+ +/$ '"#G9"G$ 0* #(+ 0#+$#E$E +( ,$*+,08+ +/$ *8(>$ (4 +/$

    >,(/0K0+0(# "#E +/"+ 0+ K"*08"''3 8(2$,* "'' 9*$* (4 4(,8$ i $*>$80"''3 ;0+/ +/$ 8"+8/]"''

    >,(20*0(# 0# +/$ $#EDH_i $M8$>+ +/$ (#$* "9+/(,0l$E K3 +/$ Q/",+$,@ DXR./$ 1#0+$E W0#GE(C

    ",G9$E E9,0#G +/$ (,"' >,(8$$E0#G* (4 +/$ !"#$% !'())*+ 8"*$ +/"+ +/$ C0#$*;$$>0#G

    8",,0$E (9+ K3 +/$ N(3"' S"23 0# +/$ +$,,0+(,0"' ;"+$,* (4 J'K"#0" E0E #(+ K,$"8/ J,+08'$

    FYHZ K$8"9*$ 0+ ;"* #(+ E0,$8+$E "+ +/$ +$,,0+(,0"' 0#+$G,0+3 (, >('0+08"' 0#E$>$#E$#8$ (4

    !'(#7*# Z 2 87%:@ "$ 2#71 T-^5Y

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    48/101

    J'K"#0"@DXD./$ (>9'", $M"C>'$ (4 " 4(,8$49'

    #(#]C0'0+",3 "8+ 0* +/$ (>$#0#G (4 +/$ 4'((EG"+$* (4 " E"C` 8"9*0#G *$2$,$ 4'((E0#G

    E(;#*+,$"C@ J 89,0(9* $M8$>+0(# +( +/$ >,$2"0'0#G 20$; 0*` /(;$2$,` +/$ 9*$ (4 #(#]

    C0'0+",3 4(,8$ ;/(*$ $44$8+* ,0*$ +( +/$ '$2$' (4 "# ",C$E "++"86@ +"K'$ (#'3 0# $M+,$C$ 8"*$*@ DXI J#E "* ;0+/

    $8(#(C08 4(,8$` $2$# +/(9G/ +/$ "8+* ;(9'E #(+ K$ 0''$G"' 9#E$, J,+08'$ FYHZ` +/$3 2$,3

    ;$'' C0G/+ K$ 9#'";49' K"*$E (# "#(+/$, #(,C (4 0#+$,#"+0(#"' '";@DXH

    7(, "# "8+ +( K$ 8(#*0E$,$E " 9*$ (4 4(,8$` 0+ E($* #(+ #$8$**",0'3 /"2$ +( K$ E0,$8+` *98/ "*

    "# "++"86 8",,0$E (9+ K3 +/$ C0'0+",3 4(,8$* (4 " *+"+$@ ./$ ","C0'0+",3 "8+0(#* "G"0#*+

    >,0C",0'3 L' ="'2"E(,` K9+ (# " *C"''$, *8"'$ "G"0#*+ Q(*+" N08"` 5(#E9,"* "#E V9"+$C"'"

    "* ;$''` "#E +/"+ +/$ S08","G9"# C0'0+",3 /"E $#G"G$E 0# "++"86* (# 5(#E9,"# "#E Q(*+"

    N08"# +$,,0+(,3@DXU./$ (#*` #"C$'3 +/(*$ +/"+ E( #(+ 0#2('2$ "#3 $M>'(*02$ $44$8+`*98/ "* K"8+$,0('(G08"'` K0('(G08"' "#E 8/$C08"' ;$">(#*` ;"* "EE,$**$E K3 ","@ DF[@DXO 64=(#(G%(`,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    49/101

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    50/101

    (**0K'$ *$2$,$

    $8(#(C08 8(#*$\9$#8$* (4 " 83K$, (>$,"+0(# C"3 >(*$ 8/"''$#G$* 4(, +/$ $M8'9*0(# (4

    $8(#(C08 4(,8$ 4,(C +/$ >,(/0K0+0(# (4 J,+08'$ FYHZ` 8$,+"0# +3>$* (4 83K$, (>$,"+0(#* E(

    ;0+/(9+ " E(9K+ 40+ 0#+( +/$ #(+0(# (4 ",C$E 4(,8$@

    /"*0l0#G +/$ E0*+0#8+0(# (4 +*_ +(7(` +/$ '"; "* 0+ 89,,$#+'3 $M0*+* "#E +*_

    $*#*):(` +/$ >(**0K'$ '"; 0# +/$ 49+9,$@ ,(/0K0+0#G +/$ 9*$ (4 4(,8$ 8(9'E K$ $M>"#E$E +( 0#8'9E$ *98/

    "++"86*@ ,$*$#+$E 04 0+ E044$,* 4,(C +/$ $M0*+0#G '";@ ./$ E0*89**0(#*

    ,$G",E0#G 83K$, (>$,"+0(#* C(*+'3 ",$` /(;$2$,` "K(9+ ">>'30#G +/$ 89,,$#+ '"; 0#83K$,*>"8$@DUI

    (;()'6;-+'-)+ 0@ BD:6; 9I6;('-0.+

    ./$ (#* ;"* 0C>$,"+02$ 0#

    ">>'30#G +/$ Q/",+$, '"; +( +/$ 8"*$ "+ /"#E@ DUHJ88(,E0#G'3` +/$ 9#0\9$ 8/","8+$,0*+08* (4

    83K$, (>$,"+0(#* C9*+ K$ +"6$# 0#+( "88(9#+ ;/$# ">>'30#G +/$ W%, (: 3*++%? +( +/$C@./$,$ ",$ *$2$,"' ;"3* (4 E$*8,0K0#G "#E 8"+$G(,0l0#G +/$*$ 8/","8+$,0*+08*` "#E 5$"+/$,

    5",,0*(# A0##0** >,(20E$* (#$ $M"C>'$@ =/$ 0E$#+040$* 4(9, 8/","8+$,0*+08* (4 83K$,

    (>$,"+0(#* +/"+ E0*+0#G90*/ +/$C 4,(C 8(#2$#+0(#"' "++"86* 0# +$,C* (4 +/$ 4,"C$;(,6 (4

    DUF )",8( k$#"+", -./$ 1*$ (4 Q3K$, 7(,8$? S$$E 4(, :$G"' !9*+0408"+0(#^- 0# D >"*774)G*) J"%#)(+ "$

    R)7*#)(74")(+ I(NYFRR_Z IOXiI_U "+ I_F@DUI w0('6(;*60`R%, (: 3*++%? 4) !@3*#,

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    51/101

    +/$ 9*$ (4 4(,8$? 0#E0,$8+#$**` 0#+"#G0K0'0+3` '(89* "#E ,$*9'+@DUX =(C$ (4 +/$ 0**9$* /"2$

    "',$"E3 K$$# +(98/$E 9>(# "#E *(C$ ;0'' K$ E0*89**$E 0# 49,+/$, E$+"0' '"+$,@ P/"+ 4(''(;*

    0* " *9CC",3 (4 +/$ 0**9$* K"*$E (# +/$ 4(9, E0*+0#G90*/0#G 8/","8+$,0*+08* K$4(,$ +9,#0#G +(

    +/$ \9$*+0(# (4 ;/$# 83K$, (>$,"+0(#* \9"'043 "* 9*$* (4 4(,8$@

    (+$#+0"''3 E0*+0#G90*/0#G 4"8+(,? *$2$,"' +3>$* (4 83K$,

    (>$,"+0(#* ,$\90,$ 49,+/$, "8+0(# K3 " *$8(#E "8+(, "4+$, +/$ 0#0+0"' "8+@ LM"C>'$* (4 *98/

    0#8'9E$ "# "++"86 (# +/$ +",G$+0#G *3*+$C (4 " C0**0'$` (, E0*"K'0#G "0, +,"4408 8(#+,('

    *3*+$C*@DUUA0,$8+ 83K$, "++"86* ",$ >(**0K'$ "* ;$''@ T#$ $M"C>'$ 0* +/$ K,$"8/ (4 " 8(#+,('

    *3*+$C (4 " E"C "#E +/$ (>$#0#G (4 4'((EG"+$*@ ./$ (#

    9*$E C0G/+ #(+ $M0*+ 0# " >/3*08"' '$2$'@ ./$ E"C"G$ C0G/+ K$ 0#+"#G0K'$ "* ;$''` "* 0# +/$

    8"*$ (4 "# "++"86 (# " *+(86 $M8/"#G$@DU[ L2$# "++"86* +/"+ 9'+0C"+$'3 ,$*9'+ 0# >/3*08"'

    8(#*$\9$#8$* +",G$+ +/$ 0#4(,C"+0(# ,$*0E$#+ 0# 8(C>9+$,*@ 7(, $M"C>'$ +/$ =+9M#$+ "++"86

    C(E040$E +/$ *>0##0#G 4,$\9$#80$* (4 +/$ 8$#+,049G$*` ;/08/ E0,$8+'3 ,$*9'+$E 0# >/3*08"'

    E"C"G$ +( +/$C@DU_ )(,$ E044089'+ ",$ +/$ 8"*$* ;/$,$ +/$ +",G$+ 0* +/$ E$*+,98+0(# (,

    "'+$,0#G (4 +/$ 0#4(,C"+0(# 0+*$'4@ =98/ "++"86*` +((` C0G/+ '$"E +( >/3*08"' 8(#*$\9$#8$*`

    K9+ ;0+/ " '$** E0,$8+ #$M9*@DOR

    ./$ '(89* 4"8+(, +"6$* 0#+( 8(#*0E$,"+0(# +/$ 4"8+ +/"+ 0# *(C$ 8"*$* 0+ C"3 K$ E044089'+ +(

    "*8$,+"0# +/$ (,0G0# (4 +/$ "++"86@DOD ./$ "++"86 C"3 K$ ,(9+$E +/,(9G/ *$2$,"' >(0#+* 0#

    E044$,$#+ 8(9#+,0$* 0# (,E$, +( /0E$ +/$ +,9$ *(9,8$` (, +/$ C"'080(9* +,"4408 C"3 8(C$ 4,(C

    DUX 5$"+/$, 5",,0*(# A0##0**` !@3*# L(#$(#* (): 7'* I(N, "$ L(#YQ"CK,0EG$ 1#02$,*0+3 B,$**` FRDFZ"+ UX@

    DUU A0##0**` !@3*# L(#$(#* (): 7'* I(N, "$ L(#,%","* D_X` FRX` FF[@

    DU[ A0##0**` !@3*# L(#$(#* (): 7'* I(N, "$ L(#K ,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    52/101

    *$2$,"' 8(9#+,0$*@ A9,0#G +/$ "++"86* (# L*+(#0" 0# FRRO +/$ +,"4408 (,0G0#"+$E 4,(C DO[

    8(9#+,0$*@DOF/3*08"'

    E$*+,98+0(# 0* ",G9"K'3 +/$ C(*+ 8/"''$#G0#G 4"8+(, 0# 8"+$G(,0l0#G 0# ">>'30#G +/$ ,9'$* (#

    +/$ 9*$ (4 4(,8$ +( 83K$, "++"86*@DOI ./$ ,$*9'+* C0G/+ 0# *(C$ 8"*$* "'*( K$ C(,$

    9#>,$E08+"K'$ +/"# 0# +/$ 8"*$ (4 60#$+08 4(,8$@ J 8(CC(# $M"C>'$ (4 *98/ " 8"*$ 0* "

    83K$, "++"86 (# " *+(86 $M8/"#G$ (, " K"#6@DOH

    $,"+0(# C"3 \9"'043 "* 4(,8$ 04 +/$ ;$">(# 9*$E *944080$#+'3 ,$*$CK'$* +/$

    8(#2$#+0(#"''3 9*$E (#$*@ ./$ +",G$+]K"*$E ">>,("8/ +,$"+* "#3 (>$,"+0(# +",G$+0#G 8,0+08"'

    0#4,"*+,98+9,$ "* "# ",C$E "++"86 Y"#E +/9*` "'*(` "* 4(,8$Z@ ./$ $44$8+*]K"*$E ">>,("8/ 9*$*

    +/$ (2$,"'' $44$8+* (4 +/$ (>$,"+0(# "* +/$ E$+$,C0#0#G 4"8+(,@DOXS(#$ (4 +/$*$ ">>,("8/$* 0*

    ;0+/(9+ 0**9$*`DOUK9+ +/$ C(*+ >,$2"'$#+ (4 +/$ ">>,("8/$* *$$C* +( K$ +/$ $44$8+*]K"*$E

    (#$` "'*( "E(>+$E K3 +/$ ."''0## )"#9"'@DOO ./$ )"#9"' ,$4$,* +( +/$ -*8"'$ "#E $44$8+*-

    "**$**C$#+ 9*$E K3 +/$

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    53/101

    *$#E0#G (4 ",C$E K"#E* K3 " *+"+$ +( "#(+/$, *+"+$ C"3 8'"**043 "* "# ",C$E "++"86 04 +/$

    *8"'$ "#E $44$8+* (4 +/$ "++"86 ",$ *98/ +/"+ 0+ ;(9'E /"2$ 8(#*+0+9+$E "# ",C$E "++"86 04 0+

    ;$,$ 8",,0$E (9+ K3 ,$G9'", ",C$E 4(,8$*@DO[./$ $,*(#* (, E"C"G$

    (, E$*+,(3 (Kp$8+* ",$ 9#"CK0G9(9*'3 9*$* (4 4(,8$-@ .(;",E* +/$ (+/$, $#E (4 +/$

    *>$8+,9C` +/$ )"#9"' *+"+$* +/"+ #(#]E$*+,98+02$` >*38/('(G08"' 83K$, (>$,"+0(#* 0#+$#E$E

    *('$'3 +( 9#E$,C0#$ 8(#40E$#8$ 0# " G(2$,#C$#+ (, $8(#(C3 E( #(+ \9"'043 "* 9*$* (4

    4(,8$@D[RJ* ,$G",E* (+/$,` C(,$ "CK0G9(9* 8"*$*` +/$ )"#9"' #(#]$M/"9*+02$'3 '0*+* $0G/+

    4"8+(,* ;/08/ ",$ 8(#*0E$,$E +( K$ 0#4'9$#+0"' ;/$# *+"+$* "**$** ;/$+/$, " 83K$, (>$,"+0(#

    8(#*+0+9+$* " 9*$ (4 4(,8$@D[D./$*$ 8,0+$,0" ",$ *$2$,0+3` 0CC$E0"83 E0,$8+#$**` 0#2"*02$#$**

    C$"*9,"K0'0+3 (4 $44$8+*` C0'0+",3 8/","8+$,` *+"+$ 0#2('2$C$#+ "#E >,$*9C>+02$ '$G"'0+3@

    ./$3 ",$ K"*$E (# +/$ (#$* *9GG$*+$E K3 )08/"$' =8/C0++ 40,*+ 0# D___ "#E ",$ #(+`

    "88(,E0#G +( +/$ )"#9"'` C$"#+ "* '$G"' 8,0+$,0"@D[FS$0+/$, ",$ +/$ 8,0+$,0" C$"#+ +( G02$ "

    K0#",3 "#*;$, +( ;/$+/$, (, #(+ " 8$,+"0# "8+ \9"'040$* "* 4(,8$` "#E *98/ " 8'"0C ;(9'E (4

    8(9,*$ K$ (2$,,$"8/0#G@ ./$ 8,0+$,0" E(` /(;$2$,` C"6$ 0+ >(**0K'$ +( $M"C0#$ "# (>$,"+0(#

    (# " *'0E0#G *8"'$@ =98/ "# ">>,("8/ 0* p9*+040$E@ LM"8+ ,9'$* "#E +/$0, "9+(C"+08 ">>'08"+0(#

    0*` "* #(+$E K3 )",++0 W(*6$##0$C0` >,(K'$C"+08 K$8"9*$ (4 +/$0, (2$,] "#E 9#E$,]

    0#8'9*02$#$**@D[I ./$ $M+,$C$ 2",0$+3 (4 >(**0K'$ 83K$, (>$,"+0(#* "#E +/$ 9#8$,+"0#+3

    ,$G",E0#G +/$ ;/('$ 40$'E $C>/"*0l$* +/0* >(0#+ $2$# 49,+/$,@

    ./$ ."''0## )"#9"' $M>,$**'3 *+"+$* +/"+ +/$ >,$*$#+$E 8,0+$,0" ",$ C$"#+ +( K$ 4"8+(,*

    0#4'9$#80#G +/$ 9*$ (4 4(,8$ "**$**C$#+* K3 *+"+$* "#E #(+ '$G"' 8,0+$,0"@ D[H ./0* 0* " K0+

    C(,$ /$*0+"#+ 20$; +/"# +/$ (#$ >,$*$#+$E K3 =8/C0++ 0# /0* $",'0$, ",+08'$ 0# D___ "#E 0+

    DO[ 64=(#(G%(`,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    54/101

    /"* K$$# +/$ +",G$+ (4 *(C$ 8,0+0\9$@D[X =8/C0++ /0C*$'4 #(+$E +/"+ /0* ">>,("8/ 0*

    0#4'9$#8$E K3 +/$ S$; 5"2$# =8/((' "#E 0+* >('083](,0$#+$E 20$;@D[UP/0'$ +/$ 8,0+$,0" (4

    +/$ ."''0## )"#9"' i *(C$+0C$* "'*( ,$4$,,$E +( "* +/$ =8/C0++ 8,0+$,0" i E( (44$, " K"*0*

    4(, +/$ $2"'9"+0(# (4 "# (>$,"+0(#` +/$ E$+$,C0#"+0(# *$$C* +( 0# C"#3 8"*$* K(0' E(;# +(

    +/$ *$2$,0+3 8,0+$,0(# "#E " *$$C0#G'3 *0C>'$ ,$*9'+? 04 " 83K$, (>$,"+0(# >,(E98$* >/3*08"'

    E"C"G$ +( >$,*(#* (, >,(>$,+3 8(C>","K'$ +( +/"+ >,(E98$E K3 " 60#$+08 "++"86` +/$

    (>$,"+0(# 8(9#+* "* 4(,8$@D[O W"+/",0#" w0('6(;*60 ">>,("8/$* +/$ 0**9$ 4,(C " *0C0'",

    20$;>(0#+ "#E ",G9$* +/"+ +/$,$ 0* #( #$$E 4(, *>$80"' 8,0+$,0" K$3(#E 4(89*0#G (# +/$

    $44$8+*@D[[ P/"+ 60#E (4 >/3*08"' E"C"G$ *94408$*` 0*` (4 8(9,*$` "#(+/$, \9$*+0(#@ ./$

    ."''0## )"#9"' #(+$* +/"+ +/$ *$2$,0+3 8,0+$,0(# 0* *9Kp$8+ +( ":* ?4)4?4, ,9'$@D[_=98/ "

    ,9'$ */(9'E 0#E$$E K$ ">>'0$E 0# +/$ E$+$,C0#"+0(# "* 83K$, "++"86* ",$ "'*( 8">"K'$ (4

    8"9*0#G #$G'0G0K'$ >/3*08"' E"C"G$` *98/ "* E"C"G$ +( " /",E E,02$ (4 " *0#G'$ 8(C>9+$,

    ;/08/ */(9'E #(+ K3 0+*$'4 8(9#+ "* " 9*$ (4 4(,8$@

    T#$ >,(K'$C ;0+/ +/$ ."''0## )"#9"' 8,0+$,0" 0* ,$'"+$E +( +/$0, "CK0G90+3 "#E C"''$"K0'0+3`

    ;/08/ /"* "'*( K$$# "86#(;'$EG$E K3 )08/"$' =8/C0++@D_R./$3 /"2$ K$$# 9*$E +( ",G9$

    +/"+ +/$ FRRO "++"86* (# L*+(#0" ,$"8/$E +/$ +/,$*/('E (4 4(,8$@ D_D ./$ ",G9C$#+ 0*`

    /(;$2$,` #(+ 8(#20#80#G ;0+/(9+ *9K*8,0K0#G +( +/$ 20$; +/"+ +/$ #(+0(# (4 4(,8$ 0#8'9E$*

    $8(#(C08 4(,8$ i "#E $2$# +/$# 0+ 8(9'E K$ "*6$E ;/$+/$, (, #(+ +/$ "++"86* 8"9*$E *(C98/ $8(#(C08 E"C"G$ "* +( 8(#*+0+9+$ 4(,8$@ ./$ *"C$ 8,0+$,0" 8"#` C(,$ 8(#20#80#G'3`

    "'*( K$ 9*$E +( ",G9$ +/"+ +/$ "++"86* E0E 0# 4"8+ #(+ 8(#*+0+9+$ " 9*$ (4 4(,8$@ D_F./$ ;0E$]

    ,"#G0#G 8,0+$,0" "''(; 4(, K,("E 0#+$,>,$+"+0(# +( ;/08/$2$, E0,$8+0(# ;"#+$E@D_I ./$#

    D[X =$$ $@G@ w0('6(;*60`R%, (: 3*++%? 4) !@3*#,,$*$#+* "# 0#8(#+,(2$,+0K'$ ,$*+"+$C$#+ (4 0#+$,#"+0(#"' '";;(9'E K$ "# $M"GG$,"+0(#-@ =8/C0++ Y$E@Z` H(++4)) E()%(+,%

  • 8/11/2019 Cyber Attacks and the Use of Force in International Law

    55/101

    "G"0#` +/$ 8,0+$,0" ",$` "* *+"+$E 0# +/$ ."''0## )"#9"'` C$"#+ "* 4"8+(,* +/"+ 0#4'9$#8$ +/$

    "**$**C$#+* (4 *+"+$* 0#*+$"E (4 >9,$'3 '$G"' 8,0+$,0"@D_H

    J,+08'$ HD (4 +/$ Q/",+$, *+"+$* +/"+ +/$ =$89,0+3 Q(9#80' C"3 E$80E$ ;/"+ C$"*9,$* )"7

    0#2('20#G +/$ 9*$ (4 4(,8$ C"3 K$ $C>'(3$E` "#E +/"+ +/$*$ C"3 0#8'9E$ 0#+$,,9>+0(# (4

    $8(#(C08 ,$'"+0(#* "#E (4 >(*+"'` +$'$G,">/08` ,"E0( "#E (+/$, C$"#* (4 8(CC9#08"+0(#@

    ./9*` (# +/$ K"*0* (4 *98/ 4(,C9'"+0(# 0+ 8"# K$ *9,C0*$E +/"+ +/$ C$,$ 0#+$,,9>+0(# (4

    8(CC9#08"+0(# ;(9'E #(+ 8(#*+0+9+$ " 9*$ (4 4(,8$@ ./0* *9>>(,+* +/$ E$+$,C0#"+0(#

    4(''(;0#G 4,(C +/$ $44$8+*]K"*$E 20$; +/"+ 4(, $M"C>'$ E$#0"'](4]*$,208$ "++"86* E( #(+

    8(#*+0+9+$ 9*$* (4 4(,8$@

    (#*$*@ P"'+$,

    V",3 =/",>` =,@ ",G9$* +/"+ +/$ C$,$ >$#$+,"+0(# K3 " *+"+$ +( 8,0+08"' 8(C>9+$, *3*+$C*

    ;/08/ ",$ 0C>(,+"#+ +( +/$ "K0'0+3 (4 " *+"+$ +( E$4$#E 0+*$'4 ;(9'E E$C(#*+,"+$ *98/ /(*+0'$

    0#+$#+ +/"+ 0+ ;(9'E p9*+043 +/$ 9*$ (4 4(,8$ 0# *$'4]E$4$#8$@D_X=98/ " 20$;` /(;$2$,` 0* #(+

    ,$"*(#"K'$@ V"0#0#G 9#"9+/(,0l$E "88$** +( " 8(C>9+$, *3*+$C C"3 ;$'' K$ " 8,0C0#"'

    (44$#8$ 4(, "# 0#E020E9"'` K9+ 0+ E($* #(+ K3 0+*$'4 8(#*+0+9+$ " 9*$ (4 4(,8$ $2$# 0# +/$ 8"*$(4 " 8,0+08"' *3*+$C@ L,08 ."'K(+ !$#*$# ",G9$* +/"+ +/$ +,"E0+0(#"' 4,"C$;(,6 (# +/$ 9*$ (4

    4(,8$ "#E *$'4]E$4$#8$ E($* #(+ (44$, *944080$#+