Skip to main content
Article
Licensed
Unlicensed Requires Authentication

Disinformation Operations Aimed at (Democratic) Elections in the Context of Public International Law: The Conduct of the Internet Research Agency During the 2016 US Presidential Election

Published/Copyright: January 23, 2020

Abstract

Due to new technologies, the speed and volume of disinformation is unprecedented today. As seen in the 2016 US presidential election, especially with the conduct of the Internet Research Agency, this poses challenges and threats for the (democratic) political processes of internal State affairs, and in particular, (democratic) elections are under increasing risk. Disinformation has the potential to sway the outcome of an election and therefore discredits the idea of free and fair elections. Given the growing prevalence of disinformation operations aimed at (democratic) elections, the question arises as to how international law applies to such operations and how States under international law might counter such hostile operations launched by their adversaries.

From a legal standpoint, it appears that such disinformation operations do not fully escape existing international law. However, due to open questions and the geopolitical context, many States refrain from clearly labelling them as internationally wrongful acts under international law. Stretching current international legal norms to cover the issue does not seem to be the optimal solution and a binding international treaty would also need to overcome various hurdles. The author suggests that disinformation operations aimed at (democratic) elections in the context of public international law will most likely be regulated (if) by a combination of custom and bottom-up law-making influencing and reinforcing each other.


1

© Manuel Rodriguez 2019. The author is a jurist in the Private Security Services Section within the Division for Security Policy at the Swiss Federal Department of Foreign Affairs (FDFA).

This article was prepared by the author in his personal capacity. The views and opinions in this article are the author's own and do not reflect the views and opinions of the Private Security Services Section, the Division for Security Policy, or the Swiss Federal Department of Foreign Affairs (FDFA).


  1. 2

    Richard Gunther, Paul A. Beck, and Erik C. Nisbet, “Fake News May Have Contributed to Trump's 2016 Victory” (study, Ohio State University, 2018), accessed February 5, 2019, https://www.documentcloud.org/documents/4429952-Fake-News-May-Have-Contributed-to-Trump-s-2016.html.

  2. 3

    See e.g. Nils, Melzer, Cyberwarfare and International Law. Geneva: United Nations Institute for Disarmament Research (UNIDIR), 2011; Ugo Pagallo, “Cyber Force and the Role of Sovereign States in Informational Warfare,” Philosophy & Technology 28, no. 3 (2015); Michael N. Schmitt, “Classification of Cyber Conflict,” Journal of Conflict & Security Law 17, no. 2 (2012); Scott J. Shackelford, Scott Russell, and Andreas Kuehn. “Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors,” Chicago Journal of International Law 17, no. 1 (2016).

  3. 4

    Jens D. Ohlin, “Did Russian Cyber Interference in the 2016 Election Violate International Law?” Texas Law Review 95 (2017); Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global; Michael N. Schmitt, ”Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018); Duncan Hollis, “The Influence of War; The War of Influence,” Temple Journal of International & Comparative Law 32 (2018); Barrie Sander, “Democracy Under the Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections,” Chinese Journal of International Law 18 (2019).

  4. 5

    Isabelle Hansen and Darren J. Lim, “Doxing Democracy: Influencing Elections Via Cyber Voter Interference,” Contemporary Politics (2018): Doi: 10.1080/13569775.2018.1493629; Ido Kilovaty, “Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information,” Harvard national Security Journal 9 (2018).

  5. 6

    Ashley in his article argues that disinformation operations such as those aimed at the 2016 US presidential election under the current legal framework, escape the reach of existing international law. According to Ashley, therefore, a multilateral treaty is needed to address the limits of acceptable State behavior on social media, when the use is intended to influence foreign populations. See Nicolas C. Ashley, “Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media,” The Goergtown Law Journal Online 107 (2018).

  6. 7

    Duncan Hollis, “The Influence of War; The War of Influence,” Temple Journal of International & Comparative Law 32 (2018); Ashley, “Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media,” The Georgetown Law Journal Online 107 (2018); Barrie Sander, “Democracy Under the Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections,” Chinese Journal of International Law 18 (2019).

  7. 8

    “Cyber space” can be defined as “[t]he environment formed by physical and non-physical components to store, modify, and exchange data using computer networks.[8] It is all of the computer networks in the world and everything they connect and control. It is not just the Internet.” See John J. Chung, “Nation-States and Their Operations in Planting of Malware in Other Countries: Is it Legal Under International Law,” University of Pittsburgh Law Review 80 (2018): 41.

  8. 9

    “Information space” can be defined as “[t]he sphere of activity connected with the formation, creation, conversion, transfer, use, and storage of information and which has an effect on individual and social consciousness, the information infrastructure, and information itself.” See Daniel Ventre, Information Warfare, 2nd ed. (London: UK ISTE Ltd, and John Wiley & Sons, 2016): 278.

  9. 10

    The “information space,” “cyberspace,” and the “electromagnetic (EM) domain” are embedded in the “information environment.” See Daniel Ventre, Information Warfare, 2nd ed. (London: UK ISTE Ltd, and John Wiley & Sons, 2016): 262.

    The “information environment” can be defined as “the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information. This environment consists of three interrelated dimensions, which continuously interact with individuals, organizations, and systems. These dimensions are known as physical, informational, and cognitive. The physical dimension is composed of command and control systems, key decision makers, and supporting infrastructure that enable individuals and organizations to create effects. The informational dimension specifies where and how information is collected, processed, stored, disseminated, and protected. The cognitive dimension encompasses the minds of those who transmit, receive, and respond to or act on information.” See Joint Chiefs of Staff, Information Operations, JP 3–13 (20 November 2014): ix–x, accessed January 13, 2019, https://www.hsdl.org/?abstract&did=759867.

  10. 11

    In general, an “information operation” can be considered as “the employment of information-related capabilities where the primary purpose is to achieve objectives in or through the information environment.” Definition adapted from: NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 564; Joint Chiefs of Staff, Information Operations, JP 3–13, (November 20, 2014): ix, accessed January 13, 2019, https://www.hsdl.org/?abstract&did=759867.

    Information operations are situated in the information space in general and borrow from cyberspace. Cyberspace (e.g. social media) presents a force multiplier for information operations, amplifying messages or narratives. See Lawrence T. Greenberg, Seymour E. Goodman, and Kevin J. Soo Hoo, Information Warfare and International Law (Washington, DC: National Defense University Press, 1998): 20.

  11. 12

    Ido Kilovaty, “Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information,” Harvard National Security Journal 9 (2018): 152–155; Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 17–21, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf.

    For another useful typology, see Barrie Sander, “Democracy Under the Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections,” Chinese Journal of International Law 18 (2019): paras. 8–26 (distinguishing between “cyber tampering operations” [tampering with voting machines, tampering with voter registration] and “cyber influence operations” [doxing operations and information operations including disinformation operations].

    According to Hollis, an “influence operation” is the “deployment of resources for cognitive ends that foster or change a target audience's behaviour.” See Duncan Hollis, “The Influence of War; The War of Influence,” Temple Journal of International & Comparative Law 32 (2018): 36.

  12. 13

    Isabelle Hansen and Darren J. Lim, “Doxing Democracy: Influencing Elections Via Cyber Voter Interference,” Contemporary Politics (2018): 3, Doi: 10.1080/13569775.2018.1493629.

    Information, whether true or false, is used to influence sovereign citizens to function differently. The goal is to influence the consciousness of the masses and thus steer public opinion and/or State politics. As a result this may damage the State and its apparatus. Furthermore, it is the public apparatus that is being targeted rather than privately owned targets. Thus such operations are highly politically motivated. See Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 8, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf.

  13. 14

    Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 28, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf.

  14. 15

    A “doxing operation” is the selective dissemination of true but confidential information. States may choose to spread non-public information that is verifiable with the aim to influence public opinion, establish political pressure and therefore influence internal or external affairs and political processes of another State. The information might have been gathered as intelligence, stolen by a hack, or obtained in some other way. Such information operations are usually carried out in two steps. First, the intruder hacks into the computer system. This also constitutes a widely used technique of modern espionage. Second, the actor behind the data breach leaks that data, often in bulk and to a platform that hosts theses documents. This leak is the unusual part for a State's foreign policy choice and makes doxing much more hostile than simple cyber espionage. See Isabelle Hansen and Darren J. Lim, “Doxing Democracy: Influencing Elections Via Cyber Voter Interference,” Contemporary Politics (2018): 2–4, Doi: 10.1080/13569775.2018.1493629.

    “Cyber espionage” can be defined as: “a cyber operation to obtain unauthorized access to sensitive information through covert means.” See The EastWest Institute, Critical Terminology Foundations 2: The Russia–U.S. Bilateral on Cybersecurity, eds. James B. Goodwin III et al. (New York, NY: The EastWest Institute, 2014): 40.

  15. 16

    A “propaganda operation” is the selective dissemination of normative arguments. Propaganda operations aim to transport certain ideas or values but may be biased, one sided or even false. Propaganda rarely tells the whole truth and often involves a certain degree of censorship. See Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 20–21, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf; Philip M. Taylor, Munition of the Mind: A History of Propaganda (Manchester University Press, 2003): 10.

    Furthermore, para. 2(c) of the Joint Declaration on Freedom of Expression and Fake News, Disinformation and Propaganda distinguishes between the practice of States spreading “disinformation,” namely “statements which they know or reasonably should know to be false,” and “propaganda,” namely “statements which […] demonstrate a reckless disregard for verifiable information.” See Joint Declaration on Freedom of Expression and “Fake News,” Disinformation and Propaganda. The United Nations (UN) Special Rapporteur on Freedom of Opinion and Expression, the Organization for Security and Co-operation in Europe (OSCE) Representative on Freedom of the Media, the Organization of American States (OAS) Special Rapporteur on Freedom of Expression and the African Commission on Human and Peoples’ Rights (ACHPR) Special Rapporteur on Freedom of Expression and Access to Information (March 3, 2017).

    Today, there also exists the term of “computational propaganda” (also known as digital or online propaganda). See Samuel C. Woolley and Philip N. Howard, “Political Communication, Computational Propaganda, and Autonomous Agents,” International Journal of Communication 10 (2016): 4886. See also Sergey Sanovich, “Computational Propaganda in Russia: The Origins of Digital Misinformation” (working paper no. 2017.3, Oxford Internet Institute, Oxford University, Oxford, 2017), accessed February 27, 2019, http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2017/06/Comprop-Russia.pdf.

    Government-funded Russian media outlets (in particular RT and Sputnik) conducted such propaganda during the 2016 presidential election. See Marle Baezner and Patrice Robin, “Hotspot Analysis: Cyber and Information Warfare in Elections in Europe” (Center for Security Studies [CSS], ETH Zurich, Zurich, 2017): 10; Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D (January 6, 2017): 3–4, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf; Jolanta Darczewska et al., “Russian Analytical Digest,” Center for Security Studies (CSS), ETH Zurich, Zurich, 2017: 7.

  16. 17

    Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 19, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf.

  17. 18

    Don Fallis, “What is Disinformation,” Library Trends 63, no. 3 (2015): 406, 413.

  18. 19

    Ibid ., 415.

  19. 20

    “Misinformation” involves wrongful or bad informing. The truth is not communicated accurately and false information is shared. However, this is not done intentionally. See Adeno Addis, “International Propaganda and Developing Countries,” Vanderbilt Journal of Transnational Law 21 (1988): 510; Edson C. Tandoc Jr., Zheng Wei Lim, and Richard Ling, “Defining Fake News,” Digital Journalism 6, no. 2 (2018): 140.

  20. 21

    The term “fake news” is not a new term nor is it a new phenomenon. It has a long legacy but only recently developed to such a buzzword through mainstream media and lawmakers’ attention. See Tarlach McGonagle, “Fake News: False Fears or Real Concerns?” Netherlands Quarterly of Human Rights 35, no. 4 (2017): 206.

    Disinformation and fake news are often used interchangeably. However, the term fake news is both inadequate and misleading in this context. Inadequate for two reasons: first, because disinformation operations typically involve content that is not completely “fake” but “fabricated information blended with facts”; and second, because disinformation operations often entail practices that extend beyond anything resembling “news” including “automated accounts used for astroturfing, networks of fake followers, fabricated or manipulated videos, targeted advertising, organized trolling, [and] visual memes.” Misleading, because the term “fake news” has been appropriated by certain politicians and their supporters to dismiss media coverage with which they disagree and undermine press freedom. See Rep. of the independent High Level Group on fake news and online disinformation, A Multi-dimensional Approach to Disinformation, European Commission, March, 2018, 10, doi: 10.2759/739290.

  21. 22

    See, for instance, Joint Declaration on Freedom of Expression and “Fake News,” Disinformation and Propaganda, The United Nations (UN) Special Rapporteur on Freedom of Opinion and Expression, the Organization for Security and Co-operation in Europe (OSCE) Representative on Freedom of the Media, the Organization of American States (OAS) Special Rapporteur on Freedom of Expression and the African Commission on Human and Peoples’ Rights (ACHPR) Special Rapporteur on Freedom of Expression and Access to Information (March 3, 2017); Volker Barth and Michael Homberg, “Geschichte und Theorie falscher Nachrichten,” Geschichte und Gesellschaft 44 (2018): 619; David Lazer et al., “The Science of Fake News: Addressing Fake News Requires a Multidisciplinary Effort,” Science 359, March 8, 2018, 2.

  22. 23

    Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 20, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf; Isabelle Hansen and Darren J. Lim, “Doxing Democracy: Influencing Elections Via Cyber Voter Interference,” Contemporary Politics (2018): 2, Doi: 10.1080/13569775.2018.1493629.

    The European Commission defines disinformation as “verifiably false or misleading information that is created, presented and disseminated for economic gain or to intentionally deceive the public, and may cause public harm.” See Communication – Tackling online disinformation: A European approach, European Commission, COM(2018) 236 final (April 26, 2018), 3–4.

  23. 24

    Isabelle Hansen and Darren J. Lim, “Doxing Democracy: Influencing Elections Via Cyber Voter Interference,” Contemporary Politics (2018): 4, Doi: 10.1080/13569775.2018.1493629.

  24. 25

    Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 20, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf; Isabelle Hansen and Darren J. Lim, “Doxing Democracy: Influencing Elections Via Cyber Voter Interference,” Contemporary Politics (2018): 2, Doi: 10.1080/13569775.2018.1493629.

  25. 26

    In 1924, the first Labour government in the UK faced a general election. The British Daily Mail newspaper, four days before the election, published a secret letter, the “Zinoviev Letter.” It was purported that Grigori Zinoviev, president of the Communist International (Comintern) organization in Moscow, had called on British communists to mobilize sympathetic forces in the Labour Party to support the ratification of an Anglo-Soviet treaty (including a large loan to the Soviets), as well as fomenting insurrection among the armed forces. The letter made it look like the Labour Party was in bed with communism. This allegedly helped the Conservative Party to return to power and not to ratify the trade agreement with the Soviet Union. Authentic at the time, historians agree that the letter was a forgery. See Phil Tinline, “The Art of the Big Lie: From the Reichstag Fire to Stalin's Show Trials, the Craft of Disinformation is Nothing New,” New Statesman, March 2018, 34; Dan Lomas, “Book Review Essay: The Zinoviev Letter,” International Affairs 95, no. 1 (2019): 201.

  26. 27

    The Nazis tried to pin the Reichstag fire on the communists and communists in return pinned it on the Nazis. See Phil Tinline, “The Art of the Big Lie: From the Reichstag Fire to Stalin's Show Trials, the Craft of Disinformation is Nothing New,” New Statesman, March 2018, 34–37.

  27. 28

    In the show trials of 1936 Stalin dragged his rivals through this process, accusing them of ludicrous crimes and actions. See Phil Tinline, “The Art of the Big Lie: From the Reichstag Fire to Stalin's Show Trials, the Craft of Disinformation is Nothing New,” New Statesman, March 2018, 34–37.

  28. 29

    Phil Tinline, “The Art of the Big Lie: From the Reichstag Fire to Stalin's Show Trials, the Craft of Disinformation is Nothing New,” New Statesman, March 2018, 34, 37.

  29. 30

    Don Fallis, “What is Disinformation,” Library Trends 63, no. 3 (2015): 402; Anya Schiffrin, “Disinformation and Democracy: The Internet Transformed Protest but did not Improve Democracy,” Journal of International Affairs 71, no. 1 (2017): 120.

  30. 31

    Alina Bargaoanu and Loredana Radu, “Fake News or Disinformation 2.0: Some Insights into Romanians’ Digital Behaviour,” Romanian Journal of European Affairs 18, no. 1 (2018): 26.

  31. 32

    Ibid ., 27.

  32. 33

    Ibid ., 27.

  33. 34

    Ibid ., 27.

  34. 35

    Ibid ., 27.

  35. 36

    Technology today offers the ability to distort the reality on a different level. Images, audios, and videos of real people saying and doing things they have never done or said can be created. “Deep fakes” are the hyper-realistic digital falsification of images, videos, and audios. Imagine for instance a fake video released shortly before an election of a politician making inflammatory statements. See Bobby Chesney and Danielle Citrone, “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security,” (July 14, 2018), California Law Review 107 (2019, forthcoming): 3, available at SSRN: https://ssrn.com/abstract=3213954; James Vincent, “New AI Research Makes It Easier to Create Fake Footage of Someone Speaking,” The Verge, July 12, 2017, https://www.theverge.com/2017/7/12/15957844/ai-fake-video-audio-speech-obama.

    Researchers at the University of Washington offer a very prominent example. They created a video of former President Barack Obama that made it appear he was saying things that he had not said in that very context. Combining this with voice recreation technology offers a wide range of applications and the potential misuse of deep fakes. See Bobby Chesney and Danielle Citrone, “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security” (July 14, 2018), California Law Review 107 (2019, forthcoming): 6, available at SSRN: https://ssrn.com/abstract=3213954.

  36. 37

    Phil Tinline, “The Art of the Big Lie: From the Reichstag Fire to Stalin's Show Trials, the Craft of Disinformation is Nothing New,” New Statesman, March 2018, 34–37.

  37. 38

    Marle Baezner and Patrice Robin, “Hotspot Analysis: Cyber and Information Warfare in Elections in Europe” (Center for Security Studies [CSS], ETH Zurich, Zurich, 2017): 10.

  38. 39

    Center for European Policy Analysis (CEPA), “Techniques,” accessed January 5, 2019, http://infowar.cepa.org/Techniques.

  39. 40

    A “bot” or web robot is an autonomous program that can interact with computer systems or users, designed to spread a message automatically. A bot account is non-human and can for instance tweet and retweet on Twitter based on a set of programmed rules. Enough bots working together can quickly start a trend or take over a trend. See Jarred Prier, “Commanding the Trend: Social Media as Information Warfare,” Strategic Studies Quarterly 11, no. 4 (2017): 54–55.

  40. 41

    Jarred Prier, “Commanding the Trend: Social Media as Information Warfare,” Strategic Studies Quarterly 11, no. 4 (2017): 52–53.

  41. 42

    Ibid ., 53.

  42. 43

    Soroush Vosoughi, Deb Roy, and Sinan Aral, “The Spread of True and False News Online,” SCIENCE, March 8, 2018.

  43. 44

    Phil Tinline, “The Art of the Big Lie: From the Reichstag Fire to Stalin's Show Trials, the Craft of Disinformation is Nothing New,” New Statesman, March 2018, 34, 37; Anya Schiffrin, “Disinformation and Democracy: The Internet Transformed Protest but did not Improve Democracy,” Journal of International Affairs 71, no. 1 (2017): 123; David M. Howard, “Can Democracy Withstand the Cyber Age: 1984 in the 21st Century,” Hastings Law Journal 69 (2018): 1371–1372.

  44. 45

    Bobby Chesney and Danielle Citrone, “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security” (July 14, 2018), California Law Review 107 (2019, forthcoming): 21, available at SSRN: https://ssrn.com/abstract=3213954.

  45. 46

    Dov H. Levin, “When the Great Power Gets a Vote: The Effects of Great Power Electoral Interventions on Election Results,” International Studies Quarterly 60 (2016): 189.

  46. 47

    Bobby Chesney and Danielle Citrone, “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security” (July 14, 2018), California Law Review 107 (2019, forthcoming): 22, available at SSRN: https://ssrn.com/abstract=3213954; Paul Baines and Nigel Jones, “Influence and Interference in Foreign Elections,” The RUSI Journal 163, no. 1 (2018): 14–15.

  47. 48

    Marle Baezner and Patrice Robin, “Hotspot Analysis: Cyber and Information Warfare in Elections in Europe” (Center for Security Studies [CSS], ETH Zurich, Zurich, 2017): 9.

  48. 49

    Some argue that this was the actual – or at least original – goal of the Russian influence campaign in the 2016 US presidential election. See Jon White, “Dismiss, Distort, Distract, and Dismay: Continuity and Change in Russian Disinformation,” Institute for European Studies: Vrije Universiteit Brussel, May 13, 2016, https://www.ies.be/node/3689.

  49. 50

    For a more detailed discussion on threats posed by disinformation operations see Bobby Chesney and Danielle Citrone, “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security” (July 14, 2018), California Law Review 107 (2019, forthcoming): 21–29, available at SSRN: https://ssrn.com/abstract=3213954.

  50. 51

    A “campaign” can be defined as “a planned group of especially political, business, or military activities that are intended to achieve a particular aim.” See Cambridge Dictionary, s.v. “campaign,” accessed April 1, 2019, https://dictionary.cambridge.org/de/worterbuch/englisch/campaign.

  51. 52

    Since 2014 Russia has been researching about the US electoral process including the related equipment and technology. During the presidential election in 2016 Russian intelligence accessed various elements of state or local electoral boards. See Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (January 6, 2017): 3, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf; Massimo Calabresi, “Hacking the Voter: What's Behind Russia's Effort to Influence the US Election,” Time, October 10, 2016: 33.

  52. 53

    The Russian intelligence services conducted cyber operations against both major U.S. political parties, and collected information about think tanks, lobbying groups, and other organizations taking part in the process of U.S. policy making. Starting at least in March 2016, the Main Intelligence Directorate (GRU) gained unauthorized access (to “hack”) to the US presidential campaign of Hillary Clinton, including the campaign's chairman John Podesta. By in or around April 2016 the GRU hacked into the computer network of the Democratic Congressional Campaign Committee (DCCC) and the Democratic National Committee (DNC). By in or around June 2016 the GRU staged and released tens of thousands of stolen emails and documents. This was done by using fictitious online personas, including “DCLeaks” and “Guccifer 2.0.” This was done to hide the identity of the main perpetrator using a network of computers around the world and paying the infrastructure with crypto currencies. The ODNI Report with “high confidence” found that the GRU used Guccifer 2.0 persona, DCLeaks.com, WikiLeaks, and the media to release the stolen data to the public. See US v. Viktor Borisovich Netyksho, et al. (1:18-cr-215, District of Columbia); Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (January 6, 2017): 2–3, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.

    In July 2018, Special Counsel Robert Mueller indicted twelve Russian nationals for their alleged roles in computer hacking conspiracies aimed at interfering in the 2016 U.S. elections. The indictment charges eleven officers of the GRU (the “Conspirators”) with crimes (e.g. count eleven: “Conspiracy to commit an offense against the United States”) with regard to the hack and leak of the Clinton Campaign, DNC, and DCCC during the 2016 presidential election. See US v. Viktor Borisovich Netyksho, et al. (1:18-cr-215, District of Columbia); Andrew Prokop, “All of Robert Mueller's Indictments and Plea Deals in the Russia Investigation So Far,” Vox, January 25, 2019, https://www.vox.com/policy-and-politics/2018/2/20/17031772/mueller-indictments-grand-jury.

  53. 54

    Another term, which is used to describe operations conducted by Russian security services aimed at influencing the course of international affairs are “active measures.” See U.S. Department of Justice, Report on the Investigation into Russia Interference in the 2016 Presidential Election: Volume I of II, Washington D.C. (March 2019): 14, accessed April 19, 2019, https://www.justice.gov/storage/report.pdf.

  54. 55

    Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 10, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf; Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (6 January 2017): 2–4, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.

  55. 56

    A “covert action” is “conduct that is officially unacknowledged by the responsible State, reflecting secrecy on the narrow issue of attribution” and which includes “unacknowledged operations intended too influence events in another country, conducted by any State agency or actor, or other entity acting on behalf of a State.” See Alexandra H. Perina, “Black Holes and Open Secrets: The Impact of Covert Action on International Law,” Columbia Journal of Transnational Law 53 (2015): 511–512.

  56. 57

    Scott Shane, “Russia Isn't the Only One Meddling in Elections: We Do It, Too,” The New York Times, February 17, 2018, https://www.nytimes.com/2018/02/17/sunday-review/russia-isnt-the-only-one-meddling-in-elections-we-do-it-too.html; Ishaan Tharoor, “The Long History of the US Interfering with Elections Elsewhere,” Washington Post, October 13, 2016, https://www.washingtonpost.com/news/worldviews/wp/2016/10/13/the-long-history-of-the-u-s-interfering-with-elections-elsewhere/?utm_term=.c7547589f5b0.

  57. 58

    Dov H. Levin, “Partisan Electoral Interventions by the Great Powers: Introducing the PEIG Dataset,” Conflict Management and Peace Science 36, no. 1 (2019): 94.

  58. 59

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 32.

  59. 60

    Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (January 6, 2017), accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf [hereinafter ODNI Report].

  60. 61

    The report states that “the Russian government interfered in the 2016 presidential election in a sweeping and systematic fashion.” See U.S. Department of Justice, Report on the Investigation into Russia Interference in the 2016 Presidential Election: Volume I of II, Washington D.C. (March 2019): 1, accessed April 19, 2019, https://www.justice.gov/storage/report.pdf. [hereinafter Mueller Report]. The author notes that the report was only released on April 18 in a redacted form.

  61. 62

    “High confidence generally indicates that judgments are based on high-quality information from multiple sources.” See Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (January 6, 2017): 13, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.

  62. 63

    Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (January 6, 2017): ii, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.

  63. 64

    Ibid ., ii.

  64. 65

    “A troll is a person submitting provocative statements or articles to an Internet discussion in order to create discord and drag more people into it.” See Marle Baezner and Patrice Robin, “Hotspot Analysis: Cyber and Information Warfare in Elections in Europe” (Center for Security Studies [CSS], ETH Zurich, Zurich, 2017): 17.

    Trolls do not limit themselves to their own country, but collaborate with other trolls around the world who have similar views, which further amplifies the disinformation. See Marle Baezner and Patrice Robin, “Hotspot Analysis: Cyber and Information Warfare in Elections in Europe” (Center for Security Studies [CSS], ETH Zurich, Zurich, 2017): 10.

  65. 66

    Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D (January 6, 2017): ii, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.

  66. 67

    Jarred Prier, “Commanding the Trend: Social Media as Information Warfare,” Strategic Studies Quarterly 11, no. 4 (2017): 74.

  67. 68

    Richard Gunther, Paul A. Beck, and Erik C. Nisbet, “Fake News May Have Contributed to Trump's 2016 Victory” (study, Ohio State University, 2018), accessed February 5, 2019, https://www.documentcloud.org/documents/4429952-Fake-News-May-Have-Contributed-to-Trump-s-2016.html.

    The author acknowledges that the study has not been peer reviewed but it certainly offers an insight on how disinformation may affect voter choices. Another study has suggested that the average level of disinformation was higher in swing states than in uncontested states. See Philip N. Howard et al., “Social Media, News and Political Information During the US Election: Was Polarizing Content Concentrated in Swing States?” (study, Oxford University, 2017), accessed February 27, 2019, https://arxiv.org/ftp/arxiv/papers/1802/1802.03573.pdf.

  68. 69

    One of the emails stolen from John Podesta (former chairman of the 2016 Hillary Clinton presidential campaign) was used as the base for a conspiracy theory called Pizzagate. The story caught traction on social media platforms including Twitter, YouTube, Reddit, and 4Chan. It was claimed that Podesta was a paedophile and that he, Hillary Clinton, and a restaurant owner ran a child sex-trafficking ring from the basement of a pizzeria in Washington D.C. A 28-year-old armed man stormed into the pizzeria on a mission to save the children. Even after the arrest of the man, the conspiracy theory of Pizzagate lived on. See Jarred Prier, “Commanding the Trend: Social Media as Information Warfare,” Strategic Studies Quarterly 11, no. 4 (2017): 72–73.

  69. 70

    Massimo Calabresi, “Hacking Democracy: Inside Russia's Social Media War on America,” Time, May 29, 2017: 34.

  70. 71

    Craig Silverman, “This Analysis Shows How Viral Fake Election News Stories Outperformed Real News on Facebook,” BuzzFeed, November 16, 2016, https://www.buzzfeednews.com/article/craigsilverman/viral-fake-election-news-outperformed-real-news-on-facebook#.wkLAZDD3pa.

  71. 72

    Jarred Prier, “Commanding the Trend: Social Media as Information Warfare,” Strategic Studies Quarterly 11, no. 4 (2017): 74.

  72. 73

    U.S. Department of Justice, Report on the Investigation into Russia Interference in the 2016 Presidential Election: Volume I of II, Washington D.C. (March 2019): 15, accessed April 19, 2019, https://www.justice.gov/storage/report.pdf; Olivia Solon and Sabrina Siddiqui, “Russia-backed Facebook posts reached 126m Americans during US election,” The Guardian, March 26, 2019, https://www.theguardian.com/technology/2017/oct/30/facebook-russia-fake-accounts-126-million.

  73. 74

    U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 6; Oliver Carroll, “St. Petersburg Troll Farm had 90 Dedicated Staff Working to Influence US Election Campaign,” Independent, October 17, 2017, https://perma.cc/BL34-WK9F.

  74. 75

    U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 6.

  75. 76

    Ibid ., at 6; Oliver Carroll, “St. Petersburg Troll Farm had 90 Dedicated Staff Working to Influence US Election Campaign,” Independent, October 17, 2017, https://perma.cc/BL34-WK9F; U.S. Department of Justice, Report on the Investigation into Russia Interference in the 2016 Presidential Election: Volume I of II, Washington D.C. (March 2019): 1, 4, accessed April 19, 2019, https://www.justice.gov/storage/report.pdf.

  76. 77

    U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 17.

  77. 78

    “A troll farm or factory is a place running around the clock to produce trolling messages and posts.” See Marle Baezner and Patrice Robin, “Hotspot Analysis: Cyber and Information Warfare in Elections in Europe” (Center for Security Studies [CSS], ETH Zurich, Zurich, 2017): 17.

  78. 79

    U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia); at 3; Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (6 January 2017): 3–4, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.

  79. 80

    U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 3.

  80. 81

    Ibid ., at 6.

  81. 82

    Philip N. Howard, Bharath Ganesh, and Dimitra Liotsiou, The IRA, Social Media and Political Polarization in the United States, 2012-2018 (Oxford, UK: Oxford Internet Institute, 2019): 3. The report was prepared by the Oxford Internet Institute at Oxford University with data provided by social media firms to the Senate Select Committee on Intelligence (SSCI).

  82. 83

    Oliver Carroll, “St. Petersburg Troll Farm had 90 Dedicated Staff Working to Influence US Election Campaign,” Independent, October 17, 2017, https://perma.cc/BL34-WK9F.

  83. 84

    U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 14.

  84. 85

    Philip N. Howard, Bharath Ganesh, and Dimitra Liotsiou, The IRA, Social Media and Political Polarization in the United States, 2012-2018 (Oxford, UK: Oxford Internet Institute, 2019): 3.

  85. 86

    Jon Swaine, “Twitter Admits Far More Russian Bots Posted On Election Than It Had Disclosed,” The Guardian, January 20, 2018, https://www.theguardian.com/technology/2018/jan/19/twitter-admits-far-more-russian-bots-posted-on-election-than-it-had-disclosed.

  86. 87

    U.S. Department of Justice, Report on the Investigation into Russia Interference in the 2016 Presidential Election: Volume I of II, Washington D.C. (March 2019): 15, accessed April 19, 2019, https://www.justice.gov/storage/report.pdf.

  87. 88

    U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 3.

  88. 89

    Ibid ., at 15–16.

  89. 90

    Mikayla Bouchard, “The Russia Investigation Is Completed: Here's What It All Means,” The New York Times, May 16, 2018, https://www.nytimes.com/2018/05/16/us/politics/russia-investigation-guide.html.

  90. 91

    David Lazer et al., “The Science of Fake News: Addressing Fake News Requires a Multidisciplinary Effort,” Science 359, March 8, 2018, 3.

  91. 92

    Massimo Calabresi, “Hacking Democracy: Inside Russia's Social Media War on America,” Time, May 29, 2017: 34. Twitter identified approximately 50,000 bots connected to the Russian government, which tweeted more than a million times in the ten weeks before the U.S. presidential election. See U.S. Department of Justice, Report on the Investigation into Russia Interference in the 2016 Presidential Election: Volume I of II, Washington D.C. (March 2019): 29, accessed April 19, 2019, https://www.justice.gov/storage/report.pdf.

  92. 93

    Bence Kollanyi, Philip N. Howard, and Samuel C. Woolley, “Bots and Automation over Twitter During the US Election” (study, Oxford University, 2016), accessed February 27, 2019, http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2016/11/Data-Memo-US-Election.pdf.

  93. 94

    Jolanta Darczewska et al., “Russian Analytical Digest,” Center for Security Studies (CSS), ETH Zurich, Zurich, 2017: 7.

  94. 95

    Ibid ., 7; Massimo Calabresi, “Hacking Democracy: Inside Russia's Social Media War on America,” Time, May 29, 2017: 32.

  95. 96

    For instance: “You know, a great number of black people support us saying that #HillaryClintonIsNotMyPresident”; “Hillary Clinton has already committed voter fraud during the Democrat Iowa Caucus”; “Hillary is a Satan, and her crimes and lies had proved just how evil she is.” See U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 20.

  96. 97

    U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 4.

  97. 98

    The IRA used the false US persona, , to send an email to Campaign Official 1 at that donaldtrump.com email account, which read in part:

    Hello [Campaign Official 1], [w]e are organizing a state-wide event in Florida on August 20 to support Mr. Trump. Let us introduce ourselves first. “Being Patriotic” is a grassroots conservative online movement trying to unite people offline. [W]e gained a huge lot of followers and decided to somehow help Mr. Trump get elected. You know, simple yelling on the Internet is not enough. There should be real action. We organized rallies in New York before. Now we're focusing on purple states such as Florida.

    See U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 28.

  98. 99

    Ibid ., at 4, 21.

  99. 100

    Ibid .; Andrew Prokop, “All of Robert Mueller's Indictments and Plea Deals in the Russia Investigation So Far,” Vox, January 25, 2019, https://www.vox.com/policy-and-politics/2018/2/20/17031772/mueller-indictments-grand-jury.

  100. 101

    U.S. Department of Justice, Report on the Investigation into Russia Interference in the 2016 Presidential Election: Volume I of II, Washington D.C. (March 2019): 14, accessed April 19, 2019, https://www.justice.gov/storage/report.pdf.

  101. 102

    Press Release, White House, Statement by the President on Actions in Response to Russian Malicious Cyber Activity and Harassment (December 29, 2016), accessed February 9, 2019, https://perma.cc/3XXD-8K5C [hereinafter Obama Press Release].

  102. 103

    S.S. Lotus (Fr. v. Turk.), 1927 P.C.I.J. (ser. A) No. 10, at 18 (September 7); Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, para. 269 (June 27); Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226, para. 21 (July 8).

  103. 104

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, general commentary, para. 1, U.N. Doc. A/56/10, at 31 (2001).

  104. 105

    Ibid ., art. 2.

  105. 106

    For a discussion on self-determination and the right to privacy with regard to the 2016 presidential election see Jens D. Ohlin, “Did Russian Cyber Interference in the 2016 Election Violate International Law?” Texas Law Review 95, (2017); Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018); Barrie Sander, “Democracy Under the Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections,” Chinese Journal of International Law 18 (2019).

  106. 107

    The author notes that there is the debate about whether sovereignty is a primary rule of international law or a foundational principle from which the primary rule emanates. The author follows the view that sovereignty is both a principle and a primary rule of international law. This is in accordance with the approach taken by the U.N. Group of Governmental Experts on Developments in the Field of Information and Telecommunications (U.N. GGE) and the International Group of Experts (IGE) that prepared the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. See Rep. of the Group of Governmental Experts on Dev. in the Field of Info. and Telecomm. in the Context of Int'l Security, para. 15, U.N. Doc. A/70/174 (July 22, 2015) [hereinafter U.N. GGE 2015 Report]; NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 11–12, 17. For an opposing view see Gary P. Corn and Robert Taylor, “Sovereignty in the Age of Cyber,” AJIL Unbound 111, (2017): 207–212.

    Schmitt and Vihul in their article also concluded that sovereignty for decades has been treated as a primary rule of international law. They surveyed treatment of the matter by international tribunals, States, international organizations, and academics. They could not identify a basis for treating the concept of sovereignty differently in the context of cyberspace. See Michael N. Schmitt and Liis Vihul, “Respect for Sovereignty in Cyberspace,” Texas Law Review 95 (2017).

    It needs to be noted that this position does not mean that every cyber operation and/or information operation contravening the target State's domestic law also amounts to a violation of sovereignty (e.g. cyber espionage violating domestic law does not violate international law). Furthermore, sovereignty as a primary rule of international law does not constitute an absolute bar to cyber and/or information operations conducted by other States. See Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 42.

  107. 108

    Island of Palmas (Neth. v. U.S.), 2 R.I.A.A. 829, 838 (Perm. Ct. Arb. 1928). See also Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 43 (individual opinion of Judge Alvarez) (April 9).

    Sovereignty has also been described as “the supreme authority of every State within its territory.” See Lassa Oppenheim, Oppenheim's International Law, ed. Sir Robert Jennings and Sir Arthur Watts, 9th ed. (London: Longmans, 2008): 564.

  108. 109

    The term “cyberspace operation” is an umbrella term. Several scholars (including the International Group of Experts in the Tallinn 2.0) use the term in accordance with the definition of the Department of Defense (DoD) of the US. The DoD defines cyberspace operations as “[t]he employment of cyber capabilities where the primary purpose is to achieve objectives in or through cyberspace.” See U.S. Department of Defense (U.S. DoD), Memorandum for Chiefs of the Military Services: Joint Terminology for Cyberspace Operations (n.d.): 8, accessed January 5, 2019, https://www.hsdl.org/?abstract&did=734860; NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 564.

  109. 110

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 43.

    The author notes that there is a difference between internal sovereignty (rights and obligations of a State in domestic affairs) and external sovereignty (rights and obligations of a State in international affairs). This thesis focuses on internal sovereignty only since this is the relevant domain possibly touched in the 2016 US presidential election and more generally by disinformation operations aimed at (democratic) elections.

  110. 111

    Military and Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, para. 205 (June 27); NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 18.

  111. 112

    Wolff Heintschel von Heinegg, “Territorial Sovereignty and Neutrality in Cyberspace,” International Law Studies 89 (2013): 124.

  112. 113

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 11.

    The Tallinn Manual 2.0 represents lex lata, the law as (the International Group of Experts believe) it is, as opposed to lex ferenda, the law as it ought to be. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 2–3.

  113. 114

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 43; Sean Watts and Theodore Richard, “Baseline Territorial Sovereignty and Cyberspace,” Lewis & Clark Law Review 22, no. 3 (2018): 818.

  114. 115

    The Tallinn Manual 2.0 extends the notion of damage to loss of functionality since it should not matter whether targeted systems are physically damaged or simply rendered inoperative. In both cases, the effect is the same, the system no longer works. For example, this includes the Shamoon virus that required repair or replacement of thousands of Saudi Aramco's (Saudi Arabia's oil company) hard drives in 2012. Treating the loss of functionality as the equivalent of physical damage comports with the object and purpose of the rule of sovereignty: to afford the territorial State control over consequential activities on its territory. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 20–21.

    However, caution needs to be taken with the precise meaning of “loss of functionality.”

  115. 116

    Michael N. Schmitt, ”Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 43.

  116. 117

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 21.

  117. 118

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 45.

  118. 119

    Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, para. 263 (June 27).

  119. 120

    Michael N. Schmitt and Liis Vihul, “Sovereignty in Cyberspace: Lex Lata vel Non,” AJIL Unbound 111, (2017): 216.

  120. 121

    While State “interference” with other States’ governmental functions recalls the principle of non-intervention, the Tallinn Manual 2.0 clarifies that where an intervention requires coercion, a mere violation of sovereignty does not. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 24.

  121. 122

    “Usurpation” of inherently governmental functions deals with inherently governmental functions. It differs from intervention because intervention involves the domaine réseré. The concepts overlap but they are not identical. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 24.

  122. 123

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 21.

  123. 124

    Ibid ., 22.

  124. 125

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 45–46.

  125. 126

    International Code of Conduct for Information Security (Letter dated 9 January 2015 from the Permanent Representative of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the UN addressed to the Secretary-General), UN Doc. A/69/723 (January 13, 2015), stating that each State pledges:

    (3) Not to use information and communications technologies and information and communications networks to interfere in the internal affairs of other States or with the aim of undermining their political, economic and social stability;

    (6) To reaffirm the rights and responsibilities of all States, in accordance with the relevant norms and rules, regarding legal protection of their information space and critical information infrastructure against damage resulting from threats, interference, attack and sabotage.

  126. 127

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 26.

  127. 128

    Ibid ., 26.

  128. 129

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 47.

  129. 130

    Ibid ., 47.

  130. 131

    The global commons consist of “international waters and airspace, space, and cyberspace.” See U.S. Department of Defense (U.S. DoD), Strategy for Homeland Defense and Civil Support: Version 2.0” (2007): ES – 3, accessed February 11, 2019, https://www.jcs.mil/Portals/36/Documents/Doctrine/concepts/joc_hld.pdf?ver=2017-12-28-162017-823; Beatrice A. Walton, “Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law,” The Yale Law Journal 126 (2017): 1475.

  131. 132

    James Crawford and Ian Brownlie, Brownlie's Principles of Public International Law, 8th ed. (2012): 251–252.

  132. 133

    Beatrice A. Walton, “Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law,” The Yale Law Journal 126 (2017): 1475.

  133. 134

    Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, paras. 202, 205, 251 (June 27).

    Oppenheim furthermore states that the prohibition of intervention “is the corollary of every State's right to sovereignty, territorial integrity and political independence.” See Lassa Oppenheim, Oppenheim's International Law, ed. Sir Robert Jennings and Sir Arthur Watts, 9th ed. (London: Longmans, 2008): 428.

  134. 135

    Armed Activities on the Territory of the Congo (Dem. Rep. Congo v. Uganda), 2005 I.C.J. 168, paras. 161–165 (December 19); Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, para. 202 (June 27); NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 312.

    Despite frequent breaches of the non-intervention norm in State practice, the International Court of Justice has observed that “[it] is not to be expected that in the practice of State the application of the rules in question should have been perfect, in the sense that States should have refrained, with complete consistency, from […] intervention in each other's internal affairs.” See Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, para. 186 (June 27).

  135. 136

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 312.

    Due to the accepted customary character of the norm of non-intervention, the norm extends to State's actions in cyberspace. See Sean Watts, “Low-Intensity Cyber Operations and the Principle of Non-Intervention,” in Cyber War: Law and Ethics for Virtual Conflicts, ed. Jens D. Ohlin, Kevin Govern, and Claire Finkelstein (Oxford, UK: Oxford University Press, 2018): 253.

  136. 137

    Rep. of the Group of Governmental Experts on Dev. in the Field of Info. and Telecomm. in the Context of Int'l Security, at 12, U.N. Doc. A/70/174 (July 22, 2015).

  137. 138

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 313.

  138. 139

    Terry D. Gill, “Non-Intervention in the Cyber Context,” in Peacetime Regime for State Activities in Cyberspace, ed. Katharina Ziolkowski (Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence, 2013): 217.

  139. 140

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 313–314.

  140. 141

    Nationality Decrees Issued in Tunis and Morocco, Advisory Opinion, 1923 P.C.I.J (ser. B) No. 4, at 24 (February 7); NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 314.

  141. 142

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 49.

  142. 143

    Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, para. 205 (June 27). See also Friendly Relations Declaration, G.A. Res. 2525 (XXV), princ. 3, U.N. Doc. A/RES/25/2625 (October 24, 1970); Declaration on the Inadmissibility of Intervention and Interference in the Internal Affairs of States, G.A. Res. 36/103, I(b), U.N. Doc. A/RES/36/103 (December 9, 1981).

  143. 144

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 49.

  144. 145

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 315.

  145. 146

    The Declaration on the Inadmissibility of Intervention and Interference provides certain parameters with respect to permissible State behavior. According to the Declaration States must “refrain from any action or attempt to destabilize the political system” and “refrain fro the promotion, encouragement or support, direct or indirect, of any action which seeks to disrupt the unity or undermine or subvert the political order of other States.” However, it needs to be noted that the Declaration is not necessarily declaratory of customary international law. See Declaration on the Inadmissibility of Intervention and Interference in the Internal Affairs of States, G.A. Res. 36/103, II(e)–(f), U.N. Doc. A/RES/36/103 (December 9, 1981).

  146. 147

    Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, para. 205 (June 27).

  147. 148

    Ibid ., para. 205.

  148. 149

    The author notes that there is a current debate about the scope of the definition of coercion. Traditionally, coercion has been defined narrowly. Oppenheim for example, defines coercion as an act that is “forcible or doctorial, or otherwise coercive, in effect depriving the State intervened against of control over the matter in question.” See Lassa Oppenheim, Oppenheim's International Law, ed. Sir Robert Jennings and Sir Arthur Watts, 9th ed. (London: Longmans, 2008): 432.

    In recent years, however, a broader view of coercion has begun to garner support within international scholarship. According to this broader reading, coercion encompasses conduct that disrupts, compromises or weakens the authority of the State. See, for example, Russell Buchan, “The International Legal Regulation of State–Sponsored Cyber Espionage,” in International Cyber Norms: Legal, Policy & Industry Perspectives (Tallinn, NATO CCD COE Publications, 2016): 78 (“conduct which compromises or undermines the authority of the state should be regarded as coercive”).

    Support for this approach can also be found in the Friendly Relations Declaration, which provides that no State has “the right to intervene, directly or indirectly, for any reason whatever, in the internal or external affairs of any other State.” See Friendly Relations Declaration, G.A. Res. 2525 (XXV), U.N. Doc. A/RES/25/2625 (October 24, 1970).

  149. 150

    According to the Friendly Relations Declaration, “[no] State may use or encourage the use of economic political or any other type of measures to coerce another State in order to obtain from it the subordination of the exercise of its sovereign rights and to secure from it advantage of any kind.” See Friendly Relations Declaration, G.A. Res. 2525 (XXV), princ. 3, U.N. Doc. A/RES/25/2625 (October 24, 1970).

  150. 151

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 317.

  151. 152

    Ibid ., 318.

  152. 153

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 50.

  153. 154

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 318.

    Although the International Convention Concerning the Use of Broadcasting in the Cause of Peace, in Article 3, prohibits propaganda that is “likely to harm good international understanding,” the Convention can not be considered as customary international law. See International Convention Concerning the Use of Broadcasting in the Cause of Peace, art. 3, Sept. 23, 1936, L.N.T.S 186, at 301 (entered into force April 2, 1938).

  154. 155

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 50.

  155. 156

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 318–319.

  156. 157

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 52.

  157. 158

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 319; Pierre Thielbörger and Robin Ramsahye, “Hybrid Warfare: Zwischen Cyber-Attacken und Manipulation von Informationen,” Die Friedens-Warte 90, no. 1/2 (2015): 96.

    The argument behind is that non-forcible techniques that are equally intrusive should be equally prohibited. See Ido Kilovaty, “Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information,” Harvard National Security Journal 9, (2018): 172. McDougal and Feliciano determining whether an act is coercive and therefore could amount to an unlawful intervention, suggest three dimensions of “consequentiality.” These three dimensions include: i) “the importance and number of values affected,” ii) “the extent to which such values are affected,” and iii) “the number of participants whose values are so affected.”[158] Applied to cyber and/or information operations, their dimensions might consider: “the nature of State interests affected by the cyber and/or information operation, ii) “the scale of effects the operation produces in the target State,” iii) and “the reach in terms of number of actors involuntarily affected by the cyber and/or information operation in question. This approach advocates that considering coercion one needs to look beyond the mere degree of intensity. See Sean Watts, “Low-Intensity Cyber Operations and the Principle of Non-Intervention,” in Cyber War: Law and Ethics for Virtual Conflicts, ed. Jens D. Ohlin, Kevin Govern, and Claire Finkelstein (Oxford, UK: Oxford University Press, 2018): 257; McDougal, Myres S., and Florentino P. Feliciano, “International Coercion and World Public Order: The General Principles of the Law of War,” Yale Law Journal 67 (1958).

  158. 159

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 51.

  159. 160

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 320.

  160. 161

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 52.

  161. 162

    By aggregating actions or omissions they can result in the internationally wrongful act (e.g. genocide). Therefore, a State can breach an international obligation through a series of (individually not reaching the necessary threshold to infringe the particular obligation, e.g. killing one person is not enough to commit genocide, a systematic element is required) actions or omissions. For a composite act (i.e. an act defined in aggregate as wrongful) the cumulative conduct constitutes the essence of the wrongful act. The composite act is not merely a succession of isolated acts. It reveals itself after the series of acts or omissions have taken place. See International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, paras. 3, 4, and 7 of commentary to art. 15, U.N. Doc. A/56/10, at 31 (2001).

  162. 163

    Pierre Thielbörger and Robin Ramsahye, “Hybrid Warfare: Zwischen Cyber-Attacken und Manipulation von Informationen,” Die Friedens-Warte 90, no. 1/2 (2015): 97; Sean Watts, “Low-Intensity Cyber Operations and the Principle of Non-Intervention,” in Cyber War: Law and Ethics for Virtual Conflicts, ed. Jens D. Ohlin, Kevin Govern, and Claire Finkelstein (Oxford, UK: Oxford University Press, 2018): 256.

  163. 164

    Oil Platforms (Iran v. U.S.), 1998 I.C.J. 190, Counter-Claim (Order of March 10).

  164. 165

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 51.

  165. 166

    Harold H. Koh, “The Trump Administration and International Law,” Washburn Law Journal 56 (2017): 450.

  166. 167

    Ido Kilovaty, “Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information,” Harvard National Security Journal 9 (2018): 172.

  167. 168

    Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 44 (individual opinion of Judge Alvarez) (April 9).

  168. 169

    S.S. Lotus (Fr. v. Turk.), 1927 P.C.I.J. (ser. A) No. 10, at 88 (Moore, J., dissenting) (September 7); Island of Palmas (Neth. v. U.S.), 2 R.I.A.A. 829, 839 (Perm. Ct. Arb. 1928); Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 22 (April 9).

    Note that the principle of due diligence does not include an obligation to take material preventive steps to ensure that a State's territory is not used in violation of this norm. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 44; Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43, para. 431 (February 26).

  169. 170

    Island of Palmas (Neth. v. U.S.), 2 R.I.A.A. 829, 839 (Perm. Ct. Arb. 1928); Ian Yuying Liu, “State Responsibility and Cyberattacks: Defining Due Diligence Obligations,” Indonesian Journal of International & Comparative Law 4 (2017): 199–201.

  170. 171

    Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 22 (April 9).

    The author wants to note that according to the Tallinn Manual 2.0 the duty of due diligence extends extraterritorially. One case in which it applies, is if the State exercises actual control over government cyber infrastructure located abroad (i.e. it is the government which controls the infrastructure). This can be the case if the government operates the infrastructure or if the said infrastructure is on territory, premises, or objects it factually controls. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 32–33.

  171. 172

    Convention on Biological Diversity art. 3, June 5, 1992, 1760 U.N.T.S. 79 (acknowledging the right of States to exploit their natural resources but also their duty not to cause damage to the environments of other States); United Nations Framework Convention on Climate Change art. 2, May 9, 1992, 1771 U.N.T.S. 107 (recognizing the duty of States to refrain from causing harm to the natural environments of other States); Convention on Long-Range Transboundary Air Pollution art. 2, Nov. 13, 1979, 1302 U.N.T.S. 217 (agreeing to limit and reduce air pollution that emanates from one State and causes harm in another).

  172. 173

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 31.

    With its argumentation, the Tallinn Manual 2.0 follows the approach adopted by the International Court of Justice in the Nuclear Weapons advisory opinion. See Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. para. 39 (8 July).

    It needs to be noted that the United Nations Group of Experts (U.N. GGE) advocated that the application of the duty of due diligence with regard to cyber operations has not achieved lex lata status. They stated that States “should” engage in due diligence and not that they “must.” See Rep. of the Group of Governmental Experts on Dev. in the Field of Info. and Telecomm. in the Context of Int'l Security, paras. 13(c), 28(e), U.N. Doc. A/70/174 (July 22, 2015).

    However, the U.N. GGE have themselves acknowledged that principles of international law that flow from that of sovereignty are binding in the cyber context. See Rep. of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, U.N. Doc. A/68/98 (June 24, 2013).

    Rep. of the Group of Governmental Experts on Dev. in the Field of Info. and Telecomm. in the Context of Int'l Security, para. 27, U.N. Doc. A/70/174 (July 22, 2015).

    This is the case for the principle of due diligence. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 31.

    It also needs to be noted that certain scholars also contest the status of due diligence as a primary rule of international law. For instance, Walton points out that “due diligence appears to exist not as an independent obligation within customary international law, giving rise to state responsibility, but instead as a standard of care owed with respect to certain primary duties in international law.” See Beatrice A. Walton, “Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law,” The Yale Law Journal 126 (2017): 1496.

  173. 174

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 32.

  174. 175

    Ibid ., 43–44.

  175. 176

    Ibid ., 34.

  176. 177

    Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 22 (April 9).

  177. 178

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 34.

  178. 179

    Ibid ., 35.

  179. 180

    An example provides international environmental law. In the Trail Smelter arbitral award it was stated that States have an obligation that their territory is not used by private companies who produce cross-border environmental damage. See Trail Smelter (U.S. v. Can.), 3 R.I.A.A. 1905, 1963 (Arb. Trib. 1941).

  180. 181

    The victim State needs to establish that a harmful cyber and/or information operation has been launched from the territory of another State. Furthermore, the victim State also needs to establish that the cyber and/or information operation would breach a legal obligation had it been attributable to a State (e.g. prohibited intervention). See Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 54.

  181. 182

    The Trail Smelter arbitral award acknowledges that “the real difficulty often arises rather when it comes to determine what, pro subjecta materie, is deemed to constitute an injurious act.” See Trail Smelter (U.S. v. Can.), 3 R.I.A.A. 1905, 1963 (Arb. Trib. 1941).

  182. 183

    This standard is adapted following the application of the due diligence duty in international environmental law. In the context of international environmental law usually the damage sustained by the affected State must meet a certain threshold. The Trail Smelter arbitral award holds that “no State has the right to use or permit the use of its territory in such a manner as to cause injury by fumes in or to the territory of another or the properties or person therein, when the case is of serious consequence […].” See Trail Smelter (U.S. v. Can.), 3 R.I.A.A. 1905, 1965 (Arb. Trib. 1941).

    In addition to “serious”other terms such as “significant” or “substantial” have been used in the context of international environmental law. See International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Prevention of Transboundary Harm from Activities, Art. 2, para. 4 of commentary, U.N. Doc. A/56/10, at 148 (2001).

  183. 184

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 37.

  184. 185

    Ibid ., 37–38, 40.

  185. 186

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 55.

  186. 187

    James Crawford and Ian Brownlie, Brownlie's Principles of Public International Law, 8th ed. (2012): 543; Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 44–45 (individual opinion of Judge Alvarez) (April 9).

  187. 188

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 40.

    The author notes that in the Corfu Channel case Albania denied that it had actual knowledge of the minefield laid in its territorial waters. The ICJ nevertheless concluded that in the circumstances Albania “must have known” of the mining and that thereby the knowledge requirement was satisfied. See Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 20 (April 9).

  188. 189

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 41.

  189. 190

    Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 44 (individual opinion of Judge Alvarez) (April 9); Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43, para. 432 (February 26).

    The author acknowledges that the constructive knowledge standard is somewhat controversial in international law. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 41.

  190. 191

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 43.

  191. 192

    Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43, paras. 430–431 (February 26); Armed Activities on the Territory of the Congo (Dem. Rep. Congo v. Uganda), 2005 I.C.J. 168, para. 301 (December 19).

  192. 193

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, Art. 12, paras. 11–12 of commentary, U.N. Doc. A/56/10, at 31 (2001); Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43, para. 430 (February 26).

  193. 194

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 55.

  194. 195

    U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 6.

  195. 196

    Ibid ., at 3; Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (January 6, 2017): 3–4, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.

  196. 197

    Philip N. Howard, Bharath Ganesh, and Dimitra Liotsiou, The IRA, Social Media and Political Polarization in the United States, 2012-2018 (Oxford, UK: Oxford Internet Institute, 2019): 3.

    The report was prepared by the Oxford Internet Institute at Oxford University with data provided by social media firms to the Senate Select Committee on Intelligence (SSCI).

  197. 198

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 55; Barrie Sander, “Democracy Under the Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections,” Chinese Journal of International Law 18, (2019): paras. 46–48.

  198. 199

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, general commentary, para. 1, U.N. Doc. A/56/10, at 31 (2001); James Crawford and Ian Brownlie, Brownlie's Principles of Public International Law, 8th ed. (2012): 540.

    Although the ILC Articles have not (or not yet) been translated into a treaty, they have been much cited and have acquired increasing authority as an expression of the customary law of state responsibility. By 2012, the Articles and accompanying commentary had been cited 154 times by international courts, tribunals, and other bodies. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 79.

  199. 200

    Ibid ., 80.

  200. 201

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, art 2, U.N. Doc. A/56/10, at 31 (2001).

  201. 202

    Ibid ., art 2.

  202. 203

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 63–66.

  203. 204

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 85.

  204. 205

    Luke Chircop, “A Due Diligence Standard of Attribution in Cyberspace,” International and Comparative Law Quarterly 67 (2018): 645–646; Christian Payne and Lorraine Finlay, “Addressing Obstacles to Cyber-Attribution: A Model Based on State Response to Cyber-Attack,” The George Washington International Law Review 49 (2017): 559.

  205. 206

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, art 4(1), U.N. Doc. A/56/10, at 31 (2001).

  206. 207

    Ibid ., art 7.

  207. 208

    Ibid ., art 31.

  208. 209

    Ibid ., art 4(2).

  209. 210

    Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43, para. 392 (February 26).

  210. 211

    Ibid ., para. 393.

  211. 212

    The Mueller indictment charges eleven officers of the GRU (the “Conspirators”) with crimes (e.g. count eleven: “Conspiracy to commit an offense against the United States”) regarding the hack and leak of the Clinton Campaign, DNC, and DCCC during the 2016 presidential election. See U.S. v. Viktor Borisovich Netyksho, et al. (1:18-cr-215, District of Columbia); Andrew Prokop, “All of Robert Mueller's Indictments and Plea Deals in the Russia Investigation So Far,” Vox, January 25, 2019, https://www.vox.com/policy-and-politics/2018/2/20/17031772/mueller-indictments-grand-jury.

  212. 213

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, para. 6 of commentary to art. 8, U.N. Doc. A/56/10, at 31 (2001).

  213. 214

    Ibid ., para. 6 of commentary to art. 8.

  214. 215

    Ibid ., chapeau to Chapter II of Part one, paras 2–3, para. 7 of commentary to art. 8.

  215. 216

    Ibid ., art. 8. Article 8 of the Draft Articles on Responsibility of States has also been recognized as customary international law by the International Court of Justice. See Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43, para. 398 (February 26).

  216. 217

    Ibid ., para. 7 of the commentary to art. 8.

  217. 218

    Ibid ., para. 2 of commentary to art. 8.

  218. 219

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 95–96; Thomas Payne, “Teaching Old Law New Tricks: Applying and Adapting State Responsibly to Cyber Operations,” Lewis & Clark Law Review 20, no. 2 (2016): 705.

  219. 220

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 96. See also Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, para. 115 (June 27); Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43, para. 400 (February 26).

  220. 221

    “[I]t is not necessary to show that the persons who performed the acts alleged to have violated international law were in general in a relationship of complete dependence on the respondent State; it has to be proved that they acted in accordance with that States instructions or under its effective control. It must however be shown that this effective control was exercised, or that the States instructions were given, in respect of each operation in which the alleged violations occurred, not generally in respect of the overall actions taken by the persons or groups of persons having committed the violations.” See Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43, para. 400 (February 26).

  221. 222

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 96.

  222. 223

    Ibid ., 97.

  223. 224

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, paras. 7–8 of commentary to art. 8, U.N. Doc. A/56/10, at 31 (2001).

  224. 225

    Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (January 6, 2017): ii, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.

  225. 226

    Ibid ., 2.

  226. 227

    Andrey Ostroukh, “Putin Tells U.S. to Send Evidence of Vote Meddling,” Reuters, March 3, 2018, https://www.reuters.com/article/us-usa-trump-putin-reaction/putin-tells-u-s-to-send-evidence-of-vote-meddling-idUSKCN1GF0AS.

  227. 228

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 58; David E. Sanger and Martin Fackler, “N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say,” The New York Times, January 18, 2015, https://www.nytimes.com/2015/01/19/world/asia/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html.

  228. 229

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 83.

    However, the U.N. GGE has encouraged States to provide such evidence when cyber operations are at issue. See Rep. of the Group of Governmental Experts on Dev. in the Field of Info. and Telecomm. in the Context of Int'l Security, para. 15, U.N. Doc. A/70/174 (July 22, 2015).

  229. 230

    Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (January 6, 2017): ii, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.

  230. 231

    U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia): at 6.

  231. 232

    Ibid ., at 6.

  232. 233

    Ibid ., at 3; Office of the Director of National Intelligence (ODNI), Assessing Russian Activities and Intentions in Recent US Elections, ICA 2017-01D, (January 6, 2017): 3–4, accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.

  233. 234

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 96.

  234. 235

    For instance, Shackelford and Andres point out the drawbacks of the effective control test (i.e. the standard of effective control is too high in practice). See Scott J. Shackelford and Richard B. Andres, “State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem,” Georgetown Journal of International Law 42, (2011): 987–988.

  235. 236

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 81.

    For a discussion regarding the burdens, standards, and methods of proof see Marco Roscini, “Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations,” in Cyber War: Law and Ethics for Virtual Conflicts, ed. Jens Ohlin, Kevin Govenr, and Claire Finkelstein (Cambridge, UK: Cambridge University Press, 2015). Doi: 10.1093/acprof:oso/9780198717492.001.0001.

  236. 237

    The author notes that users have the option of using proxy servers or onion-routing tools such as Tor to mask their IP addresses when acting online. Users can also “spoof” their IP address. Therefore, attributing an action gets more difficult. See Larry Greenemeier, “Seeking Address: Why Cyber Attacks are so Difficult to Trace Back to Hackers,” Scientific American (June 11, 2011), https://www.scientificamerican.com/article/tracking-cyber-hackers/; Delbert Tran, “The Law of Attribution: Rules for Attribution the Source of a Cyber Attack,” The Yale Journal of Law & Technology 20 (2018): 386–391. See also David D. Clark and Susan Landau, “Untangling Attribution,” Harvard Journal of Law and Technology 2 (2011): 531.

    For example, the series of alleged Russian cyber-attacks on Estonia in 2007 have been reported to originate from at least 177 countries, and as well from within Estonia itself. See Michael N. Schmitt, “Cyber Operations and the Jus Ad Bellum Revisited,” Villanova Law Review 56, no. 3 (2011): 569–570.

  237. 238

    Brian J. Egan, “International Law and Stability in Cyberspace,” Berkeley Journal of International Law 35 (2017): 176.

  238. 239

    Peter W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (Oxford, UK: Oxford University Press, 2014): 73.

  239. 240

    Press Release, White House, Statement by the President on Actions in Response to Russian Malicious Cyber Activity and Harassment (December 29, 2016), accessed February 9, 2019, https://perma.cc/3XXD-8K5C; David E. Sanger, “Obama Strikes Back at Russia for Election Hacking,” The New York Times, December 29, 2016, https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html.

  240. 241

    Peter Baker, “White House Penalizes Russians over Election Meddling and Cyberattacks,” The New York Times, March 16, 2018, https://www.nytimes.com/2018/03/15/us/politics/trump-russia-sanctions.html.

  241. 242

    Laura Smith-Spark and Radina Gigova, “Russia to Expand American Blacklist After New US Sanctions,” CNN, March 16, 2018, https://perma.cc/DY52-LW48.

  242. 243

    U.S. Department of State, Section 231 of CAATSA, (n.d.), accessed February 26, 2019, https://www.state.gov/t/isn/caatsa/.

  243. 244

    Michael N. Schmitt, “Peacetime Cyber Response and Wartime Cyber Operations Under International Law: An Analytical Vade Mecum,” Harvard National Security Journal 8 (2017).

  244. 245

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, chapeau to Chapter II of Part three, para. 3 of commentary, U.N. Doc. A/56/10, at 31 (2001).

  245. 246

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 64.

  246. 247

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, art. 22, U.N. Doc. A/56/10, at 31 (2001).

  247. 248

    Ibid ., chapeau to Chapter II of Part three, para. 1 of commentary, U.N. Doc. A/56/10, at 31 (2001); Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, para. 249 (June 27); Gabčíkovo-Nagymaros Project (Hung./Slovk.), 1997 I.C.J. 7, paras. 82–83 (September 25); Case Concerning the Air Service Agreement of 27 March 1946 (U.S. v. Fr.), 18 R.I.A.A. 417, paras. 80–96 (Arb. Trib. 1979).

  248. 249

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 112–113.

    It needs to be noted that recommendations made and measures imposed by the Security Council pursuant to Chapter VII of the UN Charter do not qualify as countermeasures. The Council's powers render them lawful ab initio. Furthermore, if a treaty includes a requirement to resort to specific means of dispute resolution, this usually bars countermeasures. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 114–115.

  249. 250

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, para. 3 of commentary to art. 49, U.N. Doc. A/56/10, at 31 (2001).

  250. 251

    Michael N. Schmitt, ”Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 64.

  251. 252

    i) The purpose of the countermeasure is to end the unlawful action or omission of a responsible State, ii) countermeasures may not be taken in response to an internationally wrongful act that has ended, is unlikely to be repeated, and regarding which reparation and assurances or guarantees, where appropriate, have been provided, iii) usually the State invoking countermeasures must notify the responsible State of its intent to do so. However, in certain circumstances where the injured State needs to act immediately in order to preserve its rights and avoid further injury, the injured State may launch “urgent countermeasures” without notification of its intent to do so, vi) countermeasures may not include actions that affect fundamental human rights, amount to prohibited belligerent reprisals, violate a peremptory norm, or amount to the level of an armed attack (in the context of self-defense), v) and countermeasures must be proportionate. See NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 116–125; International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, art. 49–52, U.N. Doc. A/56/10, at 31 (2001).

  252. 253

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, art. 49(2), art. 53, U.N. Doc. A/56/10, at 31 (2001).

  253. 254

    Ibid ., para. 1 of commentary to art. 25.

  254. 255

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 135.

    Necessity has been cited in many contexts. See, e.g., Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory, Advisory Opinion, 2004 I.C.J. 136, para. 140 (9 July); Rainbow Warrior (N.Z. v. Fr.), 20 R.I.A.A. 217, para. 78 (Arb. Trib. 1990).

  255. 256

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 135; International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, para. 2 of commentary to art. 25, U.N. Doc. A/56/10, at 31 (2001).

  256. 257

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 137–138.

  257. 258

    Ibid ., 135; International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, para. 15 of commentary to art. 25, U.N. Doc. A/56/10, at 31 (2001).

  258. 259

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 136–137.

  259. 260

    Gabčíkovo-Nagymaros Project (Hung./Slovk.), 1997 I.C.J. 7, para. 54 (September 25).

  260. 261

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 138–139.

  261. 262

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, art. 25(1)(b), U.N. Doc. A/56/10, at 31 (2001).

  262. 263

    Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory, Advisory Opinion, 2004 I.C.J. 136, para. 140 (9 July); International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, para. 15 of commentary to art. 25, U.N. Doc. A/56/10, at 31 (2001).

  263. 264

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 65.

  264. 265

    Ibid ., 66.

    Since Hillary Clinton lost the Presidency by 77,744 votes cast in the key states of Pennsylvania, Michigan, and Wisconsin – just 0.6% of the votes cast in those states – even a modest impact of disinformation could have been decisive. See Richard Gunther, Paul A. Beck, and Erik C. Nisbet, “Fake News May Have Contributed to Trump's 2016 Victory” (study, Ohio State University, 2018), accessed February 5, 2019, https://www.documentcloud.org/documents/4429952-Fake-News-May-Have-Contributed-to-Trump-s-2016.html. The author acknowledges that the study has not been peer reviewed but it certainly offers an insight into how disinformation may affect voter choices.

  265. 266

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 339.

  266. 267

    Ibid ., 339.

  267. 268

    International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, para. 6 of commentary to art. 21, U.N. Doc. A/56/10, at 31 (2001).

  268. 269

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 342.

  269. 270

    Michael N. Schmitt, “Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law,” Chicago Journal of International Law 19, no. 1 (2018): 64.

  270. 271

    Luke Chircop, “A Due Diligence Standard of Attribution in Cyberspace,” International and Comparative Law Quarterly 67 (2018): 652–653.

  271. 272

    Michael N. Schmitt, “Grey Zones in the International Law of Cyberspace,” The Yale Journal of International Law Online 42 (2017): 3, available at SSRN: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3180687.

  272. 273

    James Crawford and Ian Brownlie, Brownlie's Principles of Public International Law, 8th ed. (2012): 16.

  273. 274

    Ido Kilovaty, “Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information,” Harvard National Security Journal 9 (2018): 170.

  274. 275

    See for example: Beatrice A. Walton, “Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law,” The Yale Law Journal 126 (2017); Ido Kilovaty, “Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information,” Harvard National Security Journal 9 (2018); Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 34–35, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf.

  275. 276

    Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 35–37, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf.

  276. 277

    For a detailed discussion of the four risks see Eric Talbot Jensen and Sean Watts, “A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destablizier,” Texas Law Review 95 (2017): 1568 et seq.

  277. 278

    Other examples for disinformation operations aimed at elections can be found in Freedom House, Freedom on the Net 2017: Manipulating Social Media to Undermine Democracy (2017), accessed March 7, 2019, https://freedomhouse.org/sites/default/files/FOTN_2017_Final.pdf.

  278. 279

    Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 37, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf.

  279. 280

    Jack Goldsmith, “Cybersecurity Treaties: A Sceptical View” (paper, Hoover Institution at Stanford University, 2011), 12, accessed March 6, 2019, http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf.

    However, like-minded States also drove non-proliferation of weapons of mass destruction first before other nations adopted this norm of international behavior. See James A. Lewis, “Multilateral Agreements to Constraint Cyberconflict,” Arms Control Today 40 (2010): under “The Way Ahead,” accessed March 6, 2019, https://www.armscontrol.org/act/2010_06/Lewis.

  280. 281

    Ugo Pagallo, “Cyber Force and the Role of Sovereign States in Informational Warfare,” Philosophy & Technology 28, no. 3 (2015): 416; Jack Goldsmith, “Cybersecurity Treaties: A Sceptical View” (paper, Hoover Institution at Stanford University, 2011), 8, accessed March 6, 2019, http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf. Interestingly, Professor Muir has proposed a trilateral cyber treaty between China, Russia, and the United States. See Lawrence L. Muir Jr., “Combatting Cyber-Attacks Through National Interest Diplomacy: A Trilateral Treaty with Teeth,” Washington & Lee Law Review Online 68 (2012).

  281. 282

    Jack Goldsmith, “Cybersecurity Treaties: A Sceptical View” (paper, Hoover Institution at Stanford University, 2011), 6, accessed March 6, 2019, http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf.

  282. 283

    Stephan Moore, “Cyber Attacks and the Beginnings of an International Cyber Treaty,” North Carolina Journal of International Law and Commercial Regulation 39 (2013): 251.

    This crucial difference in interests was for instance shown in the proposed International Code of Conduct for Information Security by representatives of China, Russia, Tajikistan, and Uzbekistan in 2011 and 2015. The Code addresses cyber security but also calls on States to reduce the dissemination of information, which undermines other countries' political, economic, and social stability. A big question mark is the different perspectives on human rights in the online domain. See Sarah McKune, “An Analysis of the International Code of Conduct for Information Security,” The Citizen Lab, September 28, 2015, https://citizenlab.ca/2015/09/international-code-of-conduct/.

  283. 284

    Irène Couzigou, “Securing Cyber Space: The Obligation of States to Prevent Harmful International Cyber Operations,” International Review of Law, Computers & Technology 32, no. 1 (2018): 54; Jacqueline Van De Velde, “The Law of Cyber Interference in Elections” (paper, Yale Law School, 2017), 37, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf; Louise Arimatsu, “A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations” (paper presented at the 4th International Conference on Cyber Conflict, NATO CCD COE Publications, Tallinn, 2012); Logan Hamilton, “Beyond Ballot-Stuffing: Current Gaps in International Law Regarding Foreign State Hacking to Influence a Foreign Election,” Wisconsin International Law Journal 35 (2017); Christina Lam, “A Slap on the Wrist: Combatting Russia's Cyber Attack on the 2016 U.S. Presidential Election,” Boston College Law Review 59 (2018).

  284. 285

    Scott J. Shackelford, Scott Russell, and Andreas Kuehn, “Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors,” Chicago Journal of International Law 17, no. 1 (2016): 5.

  285. 286

    Convention on Cybercrime, Nov. 23, 2001, 2296 U.N.T.S. 167 [hereinafter Budapest Convention].

  286. 287

    Jack Goldsmith, “Cybersecurity Treaties: A Sceptical View” (paper, Hoover Institution at Stanford University, 2011), 3, accessed March 6, 2019, http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf.

  287. 288

    Ibid ., 6.

  288. 289

    Louise Arimatsu, “A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations” (paper presented at the 4th International Conference on Cyber Conflict, NATO CCD COE Publications, Tallinn, 2012): 101.

  289. 290

    Jack Goldsmith, “Cybersecurity Treaties: A Sceptical View” (paper, Hoover Institution at Stanford University, 2011), 10–11, accessed March 6, 2019, http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf.

  290. 291

    Almost all treaties risk becoming out-dated as times and norms change. See Rebecca Crootof, “International Cybertorts: Expanding State Accountability in Cyberspace,” Cornell Law Review 103 (2018): 642.

  291. 292

    John Cerone, “A Taxonomy of Soft Law: Stipulating a Definition,” in Tracing the Roles of Soft Law in Human Rights, ed. Lagoutte, Stéphanie, Lagoutte, Thomas Gammeltoft-Hansen, and John Cerone, 15 (Oxford: Oxford University Press, 2016). Doi: 10.1093/acprof:oso/9780198791409.003.0002.

  292. 293

    A first group adopts a binary approach, where something is either law or not law. Here, soft law refers to rules of positive law that are recognized as such, but nonetheless may be considered soft in their commands. The softness might be attributable to, for instance, vague language or non-justifiable formulations. See e.g. Prosper Weil, “Towards Relative Normativity in International Law,” American Journal of International Law 77, no. 3 (1983): 414.

    A second group rejects the binary approach and sees a broader spectrum of law than what is formulated in Article 38 of the ICJ Statute. This approach views law as more of a continuum (i.e. a spectrum of normativity and behavior-influencing capacity). In the technical sense, soft law may not be legally binding but it is a type of law since it is typically formulated as rules and is intended to, and often does, guide behavior. The softness of a norm, formulation, or instrument could for example be due to specificity, enforceability, justifiability, normativity, or bindingness. See e.g. Gregory C. Shaffer and Mark A. Pollack, “Hard Versus Soft Law in International Security,” Boston College Law Review 52 (2011): 1160; Cristine M. Chinkin, “The Challenge of Soft Law: Development and Change in International Law,” International and Comparative Law Quarterly 38, no. 4 (1989): 851.

    A third group does not regard soft law as law at all. A rule is described as “soft” because it is not itself law. However, this rule is still referred to as “law” since it may have an influence on law or may achieve some of the effects that law seeks to achieve. See e.g. Jan Klabbers, “The Redundancy of Soft Law,” Nordic Journal of International Law 65 (1996); John Cerone, “A Taxonomy of Soft Law: Stipulating a Definition,” in Tracing the Roles of Soft Law in Human Rights, ed. Lagoutte, Stéphanie, Lagoutte, Thomas Gammeltoft-Hansen, and John Cerone, 16–17, Oxford: Oxford University Press, 2016. Doi: 10.1093/acprof:oso/9780198791409.003.0002.

    Another variation in the usage of the term soft law is that it is also used to describe a category of instruments. In general, it describes instruments that are adopted in an intergovernmental setting and that set fourth rules of behavior or other normative standards, but that are not legally binding. See Jan Klabbers, “The Redundancy of Soft Law,” Nordic Journal of International Law 65 (1996): 168.

    Soft law as used to describe these instruments overlaps with the second and third approach. However, it needs to be noted that the usages are not coextensive. See John Cerone, “A Taxonomy of Soft Law: Stipulating a Definition,” in Tracing the Roles of Soft Law in Human Rights, ed. Lagoutte, Stéphanie, Lagoutte, Thomas Gammeltoft-Hansen, and John Cerone, 17 (Oxford: Oxford University Press, 2016). Doi: 10.1093/acprof:oso/9780198791409.003.0002.

  293. 294

    John Cerone, “A Taxonomy of Soft Law: Stipulating a Definition,” in Tracing the Roles of Soft Law in Human Rights, ed. Lagoutte, Stéphanie, Lagoutte, Thomas Gammeltoft-Hansen, and John Cerone, 18 (Oxford: Oxford University Press, 2016). Doi: 10.1093/acprof:oso/9780198791409.003.0002.

  294. 295

    Ibid ., 18.

  295. 296

    Ibid ., 21.

  296. 297

    Ibid ., 23.

  297. 298

    Ibid ., 24.

  298. 299

    The 2015 International Code of Conduct for Information Security contains a norm, which would cover disinformation operations aimed at elections. Paragraph 3 of the Code states that States voluntarily subscribe and pledge: “Not to use information and communications technologies and information and communications networks to interfere in the internal affairs of other States or with the aim of undermining their political, economic and social stability.” See International Code of Conduct for Information Security (Letter dated January 9. 2015 from the Permanent Representative of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan, and Uzbekistan to the UN addressed to the Secretary-General), UN Doc. A/69/723 (January 13, 2015).

  299. 300

    Sarah McKune, “An Analysis of the International Code of Conduct for Information Security,” The Citizen Lab, September 28, 2015, https://citizenlab.ca/2015/09/international-code-of-conduct/.

  300. 301

    EU Code of Practice on Disinformation (Sept. 2018), https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation.

  301. 302

    Rep. of the independent High level Group on fake news and online disinformation, A Multi-dimensional Approach to Disinformation, European Commission, March, 2018, doi: 10.2759/739290.

  302. 303

    The Sounding Board, The Sounding Board's Unanimous Final Opinion on the So-Called Code of Practice, September 24, 2018, https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation.

  303. 304

    Barrie Sander, “Democracy Under the Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections,” Chinese Journal of International Law 18 (2019): para. 7.

  304. 305

    Janet Koven, “Bottom-up International Lawmaking: Reflections on the New Haven School of International Law,” The Yale Journal of International Law 32 (2007).

  305. 306

    Ricardo Pisillo-Mazzeschi, “The Due Diligence Rule and the Nature of International State

    Responsibility,” German Yearbook of International Law 36 (1993): 26–27, 48.

    As explained by the International Law Commission, a State “should possess a legal system and sufficient resources to maintain an adequate administrative apparatus to control and monitor [detrimental] activities” for the rights of other States. See International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Prevention of Transboundary Harm from Activities, Art. 3, para. 17 of commentary, U.N. Doc. A/56/10, at 148 (2001).

  306. 307

    Responsibilities and Obligations of States Sponsoring Persons and Entities with Respect to Activities in the Area, Case No. 17, Advisory Opinion of Feb. 1, 2011, ITLOS Reports 10, para. 110.

    The ICJ further specified the scope of an obligation of conduct and stated: “it is clear that the obligation in question is one of conduct and not one of result, in the sense that a State cannot be under an obligation to succeed, whatever the circumstances, in preventing the commission of genocide: the obligation of States parties is rather to employ all means reasonably available to them, so as to prevent genocide as far as possible.” See Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43, para. 430 (February 26).

  307. 308

    NATO Cooperative Cyber Defence Centre of Excellence, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, ed. Michael N. Schmitt and Liis Vihul, 2nd ed. (Cambridge, UK: Cambridge University Press, 2017): 48–49.

  308. 309

    Article 2 for instance states that “[e]ach Party shall adopt such legislative and other measures as may be necessary to establish as criminal offences under its domestic law.” See Convention on Cybercrime, Nov. 23, 2001, 2296 U.N.T.S. 167, Chapter II, Section 1.

  309. 310

    Irène Couzigou, “Securing Cyber Space: The Obligation of States to Prevent Harmful International Cyber Operations,” International Review of Law, Computers & Technology 32, no. 1 (2018): 51.

  310. 311

    18 U.S.C. § 1030(a)(1) (1984).

  311. 312

    U.S. Department of Justice, Production Company Registers Under the Foreign Agent Registration Act as Agent for the Russian Government Entity Responsible for Broadcasting RT (November 13, 2017), https://www.justice.gov/opa/pr/production-company-registers-under-foreign-agent-registration-act-agent-russian-government.

    Congress passed FARA in 1938. The purpose of the Act is to ensure that the American public and lawmakers know the source of information coming from a foreign principal, where that information may be intended to influence U.S. public opinion, policy and laws. See 22 U.S.C. § 611–621 (1938).

  312. 313

    Colin Lecher, “Senators Announce New Bill That Would Regulate Online Political Ads,” The Verge, October 19, 2017, https://www.theverge.com/2017/10/19/16502946/facebook-twitter-russia-honest-ads-act.

  313. 314

    Daniel Funke, “A Guide to Anti-Misinformation Actions Around the World,” Poynter, (n.d.), accessed March 11, 2019, https://www.poynter.org/ifcn/anti-misinformation-actions/.

  314. 315

    Ashley S. Deeks, “Confronting and Adapting: Intelligence Agencies and International Law,” Virginia Law Review 102, no. 3 (2016): 613–614.

  315. 316

    Logan Hamilton, “Beyond Ballot-Stuffing: Current Gaps in International Law Regarding Foreign State Hacking to Influence a Foreign Election,” Wisconsin International Law Journal 35 (2017): 198.

  316. 317

    Rebecca Crootof, “International Cybertorts: Expanding State Accountability in Cyberspace,” Cornell Law Review 103 (2018): 642; Thomas Payne, “Teaching Old Law New Tricks: Applying and Adapting State Responsibly to Cyber Operations,” Lewis & Clark Law Review 20, no. 2 (2016): 689.

  317. 318

    International Law Commission, Report on the Work of Its Seventieth Session, Draft Conclusion on Identification of Customary International Law with Commentaries, Conclusion 8 and Conclusion 9, U.N. Doc. A/73/10, at 122 (2018).

  318. 319

    Scott J. Shackelford, Scott Russell, and Andreas Kuehn, “Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors,” Chicago Journal of International Law 17, no. 1 (2016): 5–7.

  319. 320

    Luke Chircop, “A Due Diligence Standard of Attribution in Cyberspace,” International and Comparative Law Quarterly 67 (2018): 667–668. See e.g. Estonia 2007 (Russia); Georgia 2007 (Russia); Agent.btz 2008 (United States and Russia); DDoS attacks against the U.S. and South Korea 2009 (United States); Stuxnet 2010 (United States); Google Hack 2010 (China); U.S. Department of Defense Hack 2012 (United States); Sony Hack 2014 (United States); U.S. Office of Personnel Management Hack 2014 (United States and China); DNC Hack 2016 (United States and Russia).

    How the influence on custom by the most affected States plays out can be seen in the Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. (8 July).

  320. 321

    How such a change in custom may develop can be seen in the development of the norms regarding sovereignty in the sea. For hundreds of years the British claimed a three-mile territorial sea. Russia in 1927 claimed twelve miles, which became the norm. Further, President Truman in 1945 issued two proclamations relating to the sea, claiming rights regarding the continental shelf and the contiguous zone. Other States followed the proclamation and the norm was later codified. As a response to the Truman Proclamations, certain South American States declared a 200-mile zone with exclusive fishing rights, which also became customary international law. See Tommy T. B. Koh, “The Origins of the 1982 Convention on the Law of the Sea,” Malaya Law Review 29 (1987): 9–11.

  321. 322

    John J. Chung, “Nation-States and Their Operations in Planting of Malware in Other Countries: Is it Legal Under International Law,” University of Pittsburgh Law Review 80 (2018): 66.

  322. 323

    Ibid ., 66.

  323. 324

    In a quantitative study by Dov H. Levin he found that the US and the USSR/Russia between 1946 and 2000 made 117 electoral interventions. This means that one of every nine competitive elections since World War II has been the target of such an electoral intervention either by the US or the USSR/Russia. See Dov H. Levin, “Partisan Electoral Interventions by the Great Powers: Introducing the PEIG Dataset,” Conflict Management and Peace Science 36, no. 1 (2019): 94.

  324. 325

    Martin Libicki, “The Coming of Cyber Espionage Norms” (paper presented at the 9th International Conference on Cyber Conflict, NATO CCD COE Publications, Tallinn, 2017): 12.

  325. 326

    On May 23, 2018 the former Attorney General of the UK Jeremy Wright in a speech set out the UK's view on how to apply international law to cyberspace. According to his speech, the UK considers hostile cyber operations to manipulate the electoral system to alter the results of an election in another State (which arguably would include disinformation operations) as a breach of the prohibition on intervention in the domestic affairs of States. In his speech he stated that “[t]he international law prohibition on intervention in the internal affairs of other states is of particular importance in modern times when technology has an increasing role to play in every facet of our lives, including political campaigns and the conduct of elections. As set out by the International Court of Justice in its judgment in the Nicaragua case, the purpose of this principle is to ensure that all states remain free from external, coercive intervention in the matters of government which are at the heart of a state's sovereignty, such as the freedom to choose its own political, social, economic and cultural system. The precise boundaries of this principle are the subject of on-going debate between states, and not just in the context of cyber space. But the practical application of the principle in this context would be the use by a hostile state of cyber operations to manipulate the electoral system to alter the results of an election in another state, intervention in the fundamental operation of Parliament, or in the stability of our financial system. Such acts must surely be a breach of the prohibition on intervention in the domestic affairs of states.” See Attorney General's Office of the UK, Speech by the Attorney General Jeremy Wright on Cyber and International Law in the 21st Century (May 23, 2018), accessed April 4, 2019, https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century.

  326. 327

    On December 29, 2016 former President Obama issued a statement that the Russian interference violated “established international norms of behaviour.” However, neither the Obama administration nor the Trump administration asserted that the actions conducted during the 2016 presidential election violate any primary rule of international law. This raises the question of the legal character regarding the actions aimed at (democratic) elections. See Press Release, White House, Statement by the President on Actions in Response to Russian Malicious Cyber Activity and Harassment (December 29, 2016), accessed February 9, 2019, https://perma.cc/3XXD-8K5C.

  327. 328

    See e.g. Rep. of the independent High Level Group on fake news and online disinformation, A Multi-dimensional Approach to Disinformation, European Commission, March, 2018, doi: 10.2759/739290.

  328. 329

    See e.g. EEZ development.

  329. 330

    That which international law does not prohibit it permits. See S.S. Lotus (Fr. v. Turk.), 1927 P.C.I.J. (ser. A) No. 10, at 18 (September 7); Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, para. 269 (June 27).

  330. 331

    Duncan Hollis, “The Influence of War; The War of Influence,” Temple Journal of International & Comparative Law 32 (2018): 46.

  331. 332

    Nicolas C. Ashley, “Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media,” The Georgetown Law Journal Online 107 (2018).

  332. 333

    Duncan Hollis, “The Influence of War; The War of Influence,” Temple Journal of International & Comparative Law 32 (2018): 44.

  333. 334

    Attorney General's Office of the UK, Speech by the Attorney General Jeremy Wright on Cyber and International Law in the 21st Century (May 23, 2018), accessed April 4, 2019, https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century.

Part 7: Bibliography

Literature

Addis Adeno . “International Propaganda and Developing Countries.” Vanderbilt Journal of Transnational Law21 (1988): 491548.Search in Google Scholar

Arimatsu Louise . “A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations.” Paper presented at the 4th International Conference on Cyber Conflict, NATO CCD COE Publications, Tallinn, 2012: 91109.Search in Google Scholar

Ashley Nicolas C. Taming the Trolls: The Need for an International Legal Frame work to Regulate State Use of Disinformation on Social Media.” The Georgetown Law Journal Online107 (2018): 3662.Search in Google Scholar

Baezner Marle , and PatriceRobin. ”Hotspot Analysis: Cyber and Information Warfare in Elections in Europe.” Center for Security Studies (CSS), ETH Zurich, Zurich, 2017.Search in Google Scholar

Baines Paul , and NigelJones. “Influence and Interference in Foreign Elections.” The RUSI Journal163, no. 1 (2018): 1219.Search in Google Scholar

Bargaoanu Alina , and LoredanaRadu. “Fake News or Disinformation 2.0: Some Insights into Romanians’ Digital Behaviour.” Romanian Journal of European Affairs18, no. 1 (2018): 2438.Search in Google Scholar

Baker Peter . “White House Penalizes Russians over Election Meddling and Cyberattacks.” The New York Times, March 16, 2018, https://www.nytimes.com/2018/03/15/us/politics/trump-russia-sanctions.html.Search in Google Scholar

Barth Volker , and MichaelHomberg. “Geschichte und Theorie falscher Nachrichten.” Geschichte und Gesellschaft44 (2018): 619642.Search in Google Scholar

Bouchard Mikayla . “The Russia Investigation Is Completed: Here's What It All Means.” The New York Times, May 16, 2018, https://www.nytimes.com/2018/05/16/us/politics/russia-investigation-guide.html.Search in Google Scholar

Buchan Russell . “The International Legal Regulation of State-Sponsored Cyber Espionage.” in International Cyber Norms: Legal, Policy & Industry Perspectives, 6586, Tallinn, NATO CCD COE Publications, 2016.Search in Google Scholar

Calabresi Massimo . “Hacking Democracy: Inside Russia's Social Media War on America.” Time, May 29, 2017.Search in Google Scholar

Calabresi Massimo . “Hacking the Voter: What's Behind Russia's Effort to Influence the U.S. Election.” Time, October 10, 2016.Search in Google Scholar

Carroll Oliver . “St. Petersburg Troll Farm had 90 Dedicated Staff Working to Influence US Election Campaign.” Independent, October 17, 2017, https://perma.cc/BL34-WK9F.Search in Google Scholar

Center for European Policy Analysis (CEPA). “Techniques.” Accessed January 5, 2019, http://infowar.cepa.org/Techniques.Search in Google Scholar

Cerone John . “A Taxonomy of Soft Law: Stipulating a Definition.” in Tracing the Roles of Soft Law in Human Rights. Edited by LagoutteStéphanie, LagoutteThomas Gammeltoft-Hansen, and JohnCerone, 1524, Oxford: Oxford University Press, 2016. Doi: 10.1093/acprof:oso/9780198791409.003.0002.Search in Google Scholar

Chesney Bobby , and DanielleCitrone. “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security.” July 14, 2018, California Law Review 107, 2019, forthcoming. Available at SSRN: https://ssrn.com/abstract=3213954.Search in Google Scholar

Chinkin Cristine M. The Challenge of Soft Law: Development and Change in International Law.” International and Comparative Law Quarterly38, no. 4 (1989): 850866.Search in Google Scholar

Chircop Luke . “A Due Diligence Standard of Attribution in Cyberspace.” International and Comparative Law Quarterly67 (2018): 643668.Search in Google Scholar

Chung John J. Nation-States and Their Operations in Planting of Malware in Other Countries: Is it Legal Under International Law,” University of Pittsburgh Law Review80 (2018): 3367.Search in Google Scholar

Clark David D. , and SusanLandau. “Untangling Attribution.” Harvard Journal of Law and Technology2 (2011): 531562.Search in Google Scholar

Corn Gary P. , and RobertTaylor. “Sovereignty in the Age of Cyber.” AJIL Unbound111 (2017): 207212.Search in Google Scholar

Couzigou Irène . “Securing Cyber Space: The Obligation of States to Prevent Harmful International Cyber Operations.” International Review of Law, Computers & Technology32, no. 1 (2018): 3757.Search in Google Scholar

Crawford James , and IanBrownlie. Brownlie's Principles of Public International Law. 8th ed. (2012).Search in Google Scholar

Crootof Rebecca . “International Cybertorts: Expanding State Accountability in Cyberspace.” Cornell Law Review103 (2018): 565644.Search in Google Scholar

Darczewska Jolanta , PiotrZochowski, Robert W.Orttung, MarleneLaruelle, and GemmaPörzge. ”Russian Analytical Digest.” Center for Security Studies (CSS), ETH Zurich, Zurich, 2017.Search in Google Scholar

Deeks Ashley S. Confronting and Adapting: Intelligence Agencies and International Law.” Virginia Law Review102, no. 3 (2016): 599685.Search in Google Scholar

Egan Brian J. International Law and Stability in Cyberspace.” Berkeley Journal of International Law35 (2017): 169180.Search in Google Scholar

Fallis Don . “What is Disinformation?Library Trends63, no. 3 (2015): 401426.Search in Google Scholar

Freedom House. Freedom on the Net 2017: Manipulating Social Media to Undermine Democracy. (2017), accessed March 7, 2019, https://freedomhouse.org/sites/default/files/FOTN_2017_Final.pdf.Search in Google Scholar

Funke Daniel . “A Guide to Anti-Misinformation Actions Around the World.” Poynter, (n.d.), accessed March 11, 2019, https://www.poynter.org/ifcn/anti-misinformation-actions/.Search in Google Scholar

Gill Terry D. Non-Intervention in the Cyber Context.” in Peacetime Regime for State Activities in Cyberspace. Edited by KatharinaZiolkowski, Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence, 2013.Search in Google Scholar

Goldsmith Jack . “Cybersecurity Treaties: A Sceptical View.” Paper, Hoover Institute at Stanford University, 2011, accessed March 6, 2019, http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf.Search in Google Scholar

Greenberg Lawrence T. , Seymour E.Goodman, and Kevin J.Soo Hoo. Information Warfare and International Law. Washington, DC: National Defense University Press, 1998.Search in Google Scholar

Greenemeier Larry . “Seeking Address: Why Cyber Attacks are so Difficult to Trace Back to Hackers.” Scientific American (June 11, 2011), https://www.scientificamerican.com/article/tracking-cyber-hackers/.Search in Google Scholar

Gunther Richard , Paul A.Beck, and Erik C.Nisbet. “Fake News May Have Contributed to Trump's 2016 Victory.” Study, Ohio State University, 2018, accessed February 5, 2019, https://www.documentcloud.org/documents/4429952-Fake-News-May-Have-Contributed-to-Trump-s-2016.html.Search in Google Scholar

Hamilton Logan . “Beyond Ballot-Stuffing: Current Gaps in International Law Regarding Foreign State Hacking to Influence a Foreign Election.” Wisconsin International Law Journal35 (2017): 179204.Search in Google Scholar

Hansen Isabelle , and Darren J.Lim. “Doxing Democracy: Influencing Elections Via Cyber Voter Interference.Contemporary Politics (2018): 2. Doi: 10.1080/13569775.2018.1493629.Search in Google Scholar

Hollis Duncan . “The Influence of War; The War of Influence,Temple Journal of International & Comparative Law32 (2018): 3146.Search in Google Scholar

Howard David M. Can Democracy Withstand the Cyber Age: 1984 in the 21st Century.” Hastings Law Journal69 (2018): 13551378.Search in Google Scholar

Howard Philip N. , BharathGanesh, and DimitraLiotsiou. The IRA, Social Media and Political Polarization in the United States, 2012-2018. Oxford, UK: Oxford Internet Institute, 2019.Search in Google Scholar

Howard Philip N. , BenceKollanyi, SamanthaBradshaw, and Lisa-MariaNeudert. “Social Media, News and Political Information During the US Election: Was Polarizing Content Concentrated in Swing States?” Study, Oxford University, 2017, accessed February 27, 2019, https://arxiv.org/ftp/arxiv/papers/1802/1802.03573.pdf.Search in Google Scholar

Jensen Eric Talbot , and SeanWatts. “A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destablizier.Texas Law Review95 (2017).Search in Google Scholar

Joint Chiefs of Staff. Information Operations. JP 3–13. (20 November 2014), accessed January 13, 2019, https://www.hsdl.org/?abstract&did=759867.Search in Google Scholar

Kilovaty Ido . “Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information.” Harvard National Security Journal9 (2018): 146179.Search in Google Scholar

Klabbers Jan . “The Redundancy of Soft Law.” Nordic Journal of International Law65 (1996): 168182.Search in Google Scholar

Koh Harold H. The Trump Administration and International Law,Washburn Law Journal56 (2017): 413469.Search in Google Scholar

Koh Tommy T. B. The Origins of the 1982 Convention on the Law of the Sea,Malaya Law Review29 (1987): 117.Search in Google Scholar

Kollanyi Bence , Philip N.Howard, and Samuel C.Woolley, “Bots and Automation over Twitter During the U.S. Election,” (study, Oxford University, 2016), accessed February 27, 2019, http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2016/11/Data-Memo-US-Election.pdf.Search in Google Scholar

Koven Janet . “Bottom-up International Lawmaking: Reflections on the New Haven School of International Law.” The Yale Journal of International Law32 (2007): 393420.Search in Google Scholar

Lam Christina . “A Slap on the Wrist: Combatting Russia's Cyber Attack on the 2016 U.S. Presidential Election.Boston College Law Review59 (2018): 21672201.Search in Google Scholar

Lazer David , MatthewBaum, YochaiBenkler, AdamBerinsky, KellyGreenhill, FilippoMenczer, MiriamMetzger, BrendanNyhan, GordonPennycook, DavidRothschild, MichaelSchudson, StevenSloman, CassSunstein, EmilyThorson, DuncanWatts, and JonathanZittrain. “The Science of Fake News: Addressing Fake News Requires a Multidisciplinary Effort.” Science359, 8 March 2018.Search in Google Scholar

Lecher Colin . “Senators Announce New Bill That Would Regulate Online Political Ads.” The Verge, October 19, 2017, https://www.theverge.com/2017/10/19/16502946/facebook-twitter-russia-honest-ads-act.Search in Google Scholar

Levin Dov H. Partisan Electoral Interventions by the Great Powers: Introducing the PEIG Dataset.Conflict Management and Peace Science36, no. 1 (2019): 88106.Search in Google Scholar

Levin Dov H. When the Great Power Gets a Vote: The Effects of Great Power Electoral Interventions on Election Results.” International Studies Quarterly60 (2016): 189202.Search in Google Scholar

Lewis James A. Multilateral Agreements to Constrain Cyberconflict.Arms Control Today40, (2010). Accessed March 6, 2019, https://www.armscontrol.org/act/2010_06/Lewis.Search in Google Scholar

Libicki Martin . “The Coming of Cyber Espionage Norms.” Paper presented at the 9th International Conference on Cyber Conflict, NATO CCD COE Publications, Tallinn, 2017.Search in Google Scholar

Liu Ian Yuying . “State Responsibility and Cyberattacks: Defining Due Diligence Obligations.” Indonesian Journal of International & Comparative Law4 (2017): 191260.Search in Google Scholar

Lomas Dan . “Book Review Essay: The Zinoviev Letter.” International Affairs95, no. 1 (2019): 201206.Search in Google Scholar

McDougal Myres S. , and Florentino P.Feliciano. “International Coercion and World Public Order: The General Principles of the Law of War.” Yale Law Journal67 (1958): 771845.Search in Google Scholar

McGonagle Tarlach . “Fake News: False Fears or Real Concerns?Netherlands Quarterly of Human Rights35, no. 4 (2017): 203209.Search in Google Scholar

McKune Sarah . “An Analysis of the International Code of Conduct for Information Security.” The Citizen Lab, September 28, 2015, https://citizenlab.ca/2015/09/international-code-of-conduct/.Search in Google Scholar

Melzer Nils . Cyberwarfare and International Law. Geneva: United Nations Institute for Disarmament Research (UNIDIR), 2011.Search in Google Scholar

Moore Stephan . “Cyber Attacks and the Beginnings of an International Cyber Treaty.” North Carolina Journal of International Law and Commercial Regulation39 (2013): 223257.Search in Google Scholar

Muir Lawrence L. Jr. Combatting Cyber-Attacks Through National Interest Diplomacy: A Trilateral Treaty with Teeth.Washington & Lee Law Review Online68, (2012): 73106.Search in Google Scholar

NATO Cooperative Cyber Defence Centre of Excellence. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Edited by Michael N.Schmitt, and LiisVihul. 2nd ed.Cambridge, UK: Cambridge University Press, 2017.Search in Google Scholar

Office of the Director of National Intelligence (ODNI). Assessing Russian Activities and Intentions in Recent US Elections. ICA 2017-01D, (6 January 2017), accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.Search in Google Scholar

Ohlin Jens D. Did Russian Cyber Interference in the 2016 Election Violate International Law?Texas Law Review95 (2017): 15791598.Search in Google Scholar

Oppenheim Lassa . Oppenheim's International Law. Edited by Sir RobertJennings and Sir ArthurWatts, 9th ed.London: Longmans, 2008.Search in Google Scholar

Ostroukh Andrey . “Putin Tells U.S. to Send Evidence of Vote Meddling.” Reuters, March 3, 2018, https://www.reuters.com/article/us-usa-trump-putin-reaction/putin-tells-u-s-to-send-evidence-of-vote-meddling-idUSKCN1GF0AS.Search in Google Scholar

Pagallo Ugo . “Cyber Force and the Role of Sovereign States in Informational Warfare.” Philosophy & Technology28, no. 3 (2015): 407425.Search in Google Scholar

Payne Christian , and LorraineFinlay. “Addressing Obstacles to Cyber-Attribution: A Model Based on State Response to Cyber-Attack.” The George Washington International Law Review49 (2017): 535568.Search in Google Scholar

Payne Thomas . “Teaching Old Law New Tricks: Applying and Adapting State Responsibility to Cyber Operations.” Lewis & Clark Law Review20, no. 2 (2016): 683715.Search in Google Scholar

Perina Alexandra H. Black Holes and Open Secrets: The Impact of Covert Action on International Law.Columbia Journal of Transnational Law53 (2015): 507583.Search in Google Scholar

Pisillo-Mazzeschi Ricardo . “The Due Diligence Rule and the Nature of International State Responsibility.” German Yearbook of International Law36 (1993): 951.Search in Google Scholar

Prier Jarred . “Commanding the Trend: Social Media as Information Warfare.” Strategic Studies Quarterly11, no. 4 (2017): 5585.Search in Google Scholar

Prokop Andrew . “All of Robert Mueller's Indictments and Plea Deals in the Russia Investigation So Far.” Vox, January 25, 2019, https://www.vox.com/policy-and-politics/2018/2/20/17031772/mueller-indictments-grand-jury.Search in Google Scholar

Roscini Marco . “Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations” in Cyber War: Law and Ethics for Virtual Conflicts. Edited by JensOhlin, KevinGovenr, and ClaireFinkelstein, 215273Cambridge, UK: Cambridge University Press, 2015. Doi: 10.1093/acprof:oso/9780198717492.001.0001.Search in Google Scholar

Sander Barrie . “Democracy Under the Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections.Chinese Journal of International Law18 (2019).Search in Google Scholar

Sanger David E. “Obama Strikes Back at Russia for Election Hacking.” The New York Times, December 29, 2016, https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html.Search in Google Scholar

Sanger David E. , and MartinFackler. “N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say.” New York Times, January 18, 2015, https://www.nytimes.com/2015/01/19/world/asia/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html.Search in Google Scholar

Sanovich Sergey . “Computational Propaganda in Russia: The Origins of Digital Misinformation.” Working paper no. 2017.3, Oxford Internet Institute, Oxford University, Oxford, 2017, accessed February 27, 2019, http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2017/06/Comprop-Russia.pdf.Search in Google Scholar

Schiffrin Anya . “Disinformation and Democracy: The Internet Transformed Protest but did not Improve Democracy.” Journal of International Affairs71, no. 1 (2017): 117125.Search in Google Scholar

Schmitt Michael N. Classification of Cyber Conflict.” Journal of Conflict & Security Law17, no. 2 (2012): 245260. Doi:10.1093/jcsl/krs018.Search in Google Scholar

Schmitt Michael N. Cyber Operations and the Jus Ad Bellum Revisited,Villanova Law Review56, no. 3 (2011): 569606.Search in Google Scholar

Schmitt Michael N. Grey Zones in the International Law of Cyberspace.The Yale Journal of International Law Online42 (2017). Available at SSRN: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3180687.Search in Google Scholar

Schmitt Michael N. Peacetime Cyber Response and Wartime Cyber Operations Under International Law: An Analytical Vade Mecum.” Harvard National Security Journal8 (2017): 239280.Search in Google Scholar

Schmitt Michael N. Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law.Chicago Journal of International Law19, no. 1 (2018): 3067.Search in Google Scholar

Schmitt Michael N. , and LiisVihul. “Respect for Sovereignty in Cyberspace.” Texas Law Review95 (2017): 16391670.Search in Google Scholar

Schmitt Michael N. , and LiisVihul. “Sovereignty in Cyberspace: Lex Lata vel Non.” AJIL Unbound111 (2017): 213218.Search in Google Scholar

Shackelford Scott J. , and Richard B.Andres. “State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem.” Georgetown Journal of International Law42 (2011): 9711016.Search in Google Scholar

Shackelford Scott J. , ScottRussell, and AndreasKuehn. “Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors.Chicago Journal of International Law17, no. 1 (2016): 150.Search in Google Scholar

Shaffer Gregory C. , and Mark A.Pollack. “Hard Versus Soft Law in International Security.” Boston College Law Review52 (2011): 11471241.Search in Google Scholar

Shane Scott . “Russia Isn't the Only One Meddling in Elections: We Do It, Too.” The New York Times, February 17, 2018, https://www.nytimes.com/2018/02/17/sunday-review/russia-isnt-the-only-one-meddling-in-elections-we-do-it-too.html.Search in Google Scholar

Silverman Craig . “This Analysis Shows How Viral Fake Election News Stories Outperformed Real News on Facebook.” BuzzFeed, November 16, 2016, https://www.buzzfeednews.com/article/craigsilverman/viral-fake-election-news-outperformed-real-news-on-facebook#.wkLAZDD3pa.Search in Google Scholar

Singer Peter W. , and AllanFriedman. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford, UK: Oxford University Press, 2014.Search in Google Scholar

Smith-Spark Laura , and RadinaGigova. “Russia to Expand American Blacklist After New US Sanctions.” CNN, March 16, 2018, https://perma.cc/DY52-LW48.Search in Google Scholar

Solon Olivia , and SabrinaSiddiqui. “Russia-backed Facebook posts reached 126m Americans during US election.” The Guardian, March 26, 2019, https://www.theguardian.com/technology/2017/oct/30/facebook-russia-fake-accounts-126-million.Search in Google Scholar

Swaine Jon . “Twitter Admits Far More Russian Bots Posted On Election Than It Had Disclosed.” The Guardian, January 20, 2018, https://www.theguardian.com/technology/2018/jan/19/twitter-admits-far-more-russian-bots-posted-on-election-than-it-had-disclosed.Search in Google Scholar

Tandoc Edson C. Jr. , Zheng WeiLim, and RichardLing. “Defining Fake News.Digital Journalism6, no. 2 (2018): 137153.Search in Google Scholar

Taylor Philip M. Munition of the Mind: A History of Propaganda. Manchester University Press, 2003.Search in Google Scholar

Tharoor Ishaan . “The Long History of the U.S. Interfering with Elections Elsewhere.” Washington Post, October 13, 2016, https://www.washingtonpost.com/news/worldviews/wp/2016/10/13/the-long-history-of-the-u-s-interfering-with-elections-elsewhere/?utm_term=.c7547589f5b0.Search in Google Scholar

The EastWest Institute, Critical Terminology Foundations 2: The Russia–U.S. Bilateral on Cybersecurity. Edited by James B.GoodwinIII, AndreyKulpin, Karl F.Rauscher, and ValeryYaschenko. New York, NY: The EastWest Institute, 2014.Search in Google Scholar

Thielbörger Pierre , and RobinRamsahye. “Hybrid Warfare: Zwischen Cyber-Attacken und Manipulation von Informationen.” Die Friedens-Warte90, no. 1/2 (2015): 81112.Search in Google Scholar

Tinline Phil . “The Art of the Big Lie”: From the Reichstag Fire to Stalin's Show Trials, the Craft of Disinformation is Nothing New.” New Statesman, March 2018.Search in Google Scholar

Tran Delbert . “The Law of Attribution: Rules for Attribution the Source of a Cyber Attack.” The Yale Journal of Law & Technology20 (2018): 376441.Search in Google Scholar

U.S. Department of Defense. Memorandum for Chiefs of the Military Services: Joint Terminology for Cyberspace Operations. (n.d.): 1–16, accessed January 5, 2019, https://www.hsdl.org/?abstract&did=734860.Search in Google Scholar

U.S. Department of Justice. Production Company Registers Under the Foreign Agent Registration Act as Agent for the Russian Government Entity Responsible for Broadcasting RT. (November 13, 2017), https://www.justice.gov/opa/pr/production-company-registers-under-foreign-agent-registration-act-agent-russian-government.Search in Google Scholar

U.S. Department of Justice, Report on the Investigation into Russia Interference in the 2016 Presidential Election: Volume I of II, Washington D.C. (March 2019): 1, accessed April 19, 2019, https://www.justice.gov/storage/report.pdf.Search in Google Scholar

U.S. Department of State, Section 231 of CAATSA (n.d.), accessed February 26, 2019, https://www.state.gov/t/isn/caatsa/.Search in Google Scholar

Van De Velde Jacqueline . “The Law of Cyber Interference in Elections.” Paper, Yale Law School, 2017, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf.Search in Google Scholar

Ventre Daniel . Information Warfare. 2nd ed.London: UK ISTE Ltd, and John Wiley & Sons, 2016.Search in Google Scholar

Vincent James . “New AI Research Makes It Easier to Create Fake Footage of Someone Speaking.” The Verge, July 12, 2017, https://www.theverge.com/2017/7/12/15957844/ai-fake-video-audio-speech-obama.Search in Google Scholar

Von Heinegg Wolff Heintschel . “Territorial Sovereignty and Neutrality in Cyberspace.” International Law Studies89 (2013): 123156.Search in Google Scholar

Vosoughi Soroush , DebRoy, and SinanAral. “The Spread of True and False News Online.” Science, March 9, 2018.Search in Google Scholar

Walton Beatrice A. Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law.” The Yale Law Journal126 (2017): 14601518.Search in Google Scholar

Watts Sean . “Low-Intensity Cyber Operations and the Principle of Non-Intervention,” in Cyber War: Law and Ethics for Virtual Conflicts, edited by Jens D.Ohlin, KevinGovern, and ClaireFinkelstein, 249284, Oxford: Oxford University Press, 2018.Search in Google Scholar

Watts Sean , and TheodoreRichard. “Baseline Territorial Sovereignty and Cyberspace.” Lewis & Clark Law Review22, no. 3 (2018): 771840.Search in Google Scholar

Weil Prosper . “Towards Relative Normativity in International Law.” American Journal of International Law77, no. 3 (1983): 413442.Search in Google Scholar

White Jon . “Dismiss, Distort, Distract, and Dismay: Continuity and Change in Russian Disinformation.” Institute for European Studies: Vrije Universiteit Brussel, 13 May 2016, https://www.ies.be/node/3689.Search in Google Scholar

Woolley Samuel C. , and Philip N.Howard, “Political Communication, Computational Propaganda, and Autonomous Agents,International Journal of Communication10 (2016): 48824890.Search in Google Scholar

Treaties

Charter of the United Nations, 24 Oct., 1945, 1 U.N.T.S. 16 [U.N. Charter]Search in Google Scholar

Convention on Biological Diversity, June 5, 1992, 1760 U.N.T.S. 79Search in Google Scholar

Convention on Cybercrime, Nov. 23, 2001, 2296 U.N.T.S. 167 [Budapest Convention]Search in Google Scholar

Convention on Long-Range Transboundary Air Pollution, Nov. 13, 1979, 1302 U.N.T.S. 217Search in Google Scholar

United Nations Framework Convention on Climate Change, May 9, 1992, 1771 U.N.T.S. 107Search in Google Scholar

Cases

Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43 (February 26)Search in Google Scholar

Armed Activities on the Territory of the Congo (Dem. Rep. Congo v. Uganda), 2005 I.C.J 168 (December 19)Search in Google Scholar

Case Concerning the Air Service Agreement of 27 March 1946 (U.S. v. Fr.), 18 R.I.A.A. 417 (Arb. Trib. 1979)Search in Google Scholar

Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4 (April 9)Search in Google Scholar

Gabčíkovo-Nagymaros Project (Hung./Slovk.), 1997 I.C.J. 7 (September 25)Search in Google Scholar

Island of Palmas (Neth. v. U.S.), 2 R.I.A.A. 829 (Perm. Ct. Arb. 1928)Search in Google Scholar

Legal Consequences of the Construction of a Wall in the Occupied PalestinianSearch in Google Scholar

Territory, Advisory Opinion, 2004 I.C.J. 136 (9 July)Search in Google Scholar

Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226 (8 July)Search in Google Scholar

Nationality Decrees Issued in Tunis and Morocco, Advisory Opinion, 1923 P.C.I.J. (ser. B) No. 4 (February 7)Search in Google Scholar

Oil Platforms (Iran v. U.S.), 2003 I.C.J. 161 (6 November)Search in Google Scholar

Oil Platforms (Iran v. U.S.), 1998 I.C.J. 190, Counter-Claim (Order of 10 March)Search in Google Scholar

Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J 14 (June 27)Search in Google Scholar

Rainbow Warrior (N.Z. v. Fr.), 20 R.I.A.A. 217 (Arb. Trib. 1990).Search in Google Scholar

Responsibilities and Obligations of States Sponsoring Persons and Entities with Respect to Activities in the Area, Case No. 17, Advisory Opinion of Feb. 1, 2011, ITLOS Reports 10.Search in Google Scholar

Responsibility of Germany for Damage Caused in the Portuguese Colonies in the South of Africa (Naulilaa Arbitration) (Port. v. Ger.), 2 R.I.A.A. 1011 (Arb. Trib. 1928)Search in Google Scholar

S.S. Lotus (Fr. v. Turk.), 1927 P.C.I.J. (ser. A) No. 10, at 18 (September 7)Search in Google Scholar

Trail Smelter (U.S. v. Can.), 3 R.I.A.A. 1905 (Arb. Trib. 1941)Search in Google Scholar

U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia)Search in Google Scholar

U.S. v. Viktor Borisovich Netyksho, et al. (1:18-cr-215, District of Columbia)Search in Google Scholar

Documents

Attorney General's Office of the UK, Speech by the Attorney General Jeremy Wright on Cyber and International Law in the 21st Century (May 23, 2018), accessed April 4, 2019, https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century.Search in Google Scholar

Communication – Tacking online disinformation: A European approach, European Commission, COM (2018) 236 final (April 26, 2018)Search in Google Scholar

Declaration on the Inadmissibility of Intervention and Interference in the Internal Affairs of States, G.A. Res. 36/103, U.N. Doc. A/RES/36/103 (December 9, 1981)Search in Google Scholar

EU Code of Practice on Disinformation (Sept., 2018), https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation.Search in Google Scholar

Friendly Relations Declaration, G.A. Res. 2525 (XXV), U.N. Doc. A/RES/25/2625 (October 24, 1970)Search in Google Scholar

International Code of Conduct for Information Security (Letter dated January 9, 2015 from the Permanent Representative of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the UN addressed to the Secretary-General), UN Doc. A/69/723 (January 13, 2015)Search in Google Scholar

International Code of Conduct for Information Security (Letter dated September 12, 2011 from the Permanent Representative of China, the Russian Federation, Tajikistan and Uzbekistan to the UN addressed to the Secretary-General), UN Doc. A/66/359 (September 14, 2011)Search in Google Scholar

International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Prevention of Transboundary Harm from Activities, U.N. Doc. A/56/10, at 148 (2001)Search in Google Scholar

International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, U.N. Doc. A/56/10, at 31 (2001)Search in Google Scholar

International Law Commission, Report on the Work of Its Seventieth Session, Draft Conclusion on Identification of Customary International Law with Commentaries, U.N. Doc. A/73/10, at 122 (2018)Search in Google Scholar

Joint Declaration on Freedom of Expression and “Fake News,” Disinformation and Propaganda. The United Nations (UN) Special Rapporteur on Freedom of Opinion and Expression, the Organization for Security and Co-operation in Europe (OSCE) Representative on Freedom of the Media, the Organization of American States (OAS) Special Rapporteur on Freedom of Expression and the African Commission on Human and Peoples’ Rights (ACHPR) Special Rapporteur on Freedom of Expression and Access to Information (March 3, 2017)Search in Google Scholar

Press Release, White House, Statement by the President on Actions in Response to Russian Malicious Cyber Activity and Harassment (December 29, 2016), accessed February 9, 2019,https://perma.cc/3XXD-8K5C.Search in Google Scholar

Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, U.N. Doc. A/70/174 (July 22, 2015)Search in Google Scholar

Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, U.N. Doc. A/68/98 (June 24, 2013)Search in Google Scholar

Report of the independent High Level Group on fake news and online disinformation, A Multi-dimensional Approach to Disinformation, European Commission, March, 2018, doi: 10.2759/739290.Search in Google Scholar

The Sounding Board, The Sounding Board's Unanimous Final Opinion on the So- Called Code of Practice, September 24, 2018, https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation.Search in Google Scholar

Domestic statutes

Computer Fraud and Abuse Act, 18 U.S.C. § 1030(a)(1) (1984)Search in Google Scholar

Foreign Agents Registration Act, 22 U.S.C. § 611–621 (1938)Search in Google Scholar

Published Online: 2020-01-23
Published in Print: 2019-12-01

Copyright © The Author(s) 2020

Downloaded on 21.4.2026 from https://www.degruyterbrill.com/document/doi/10.1017/jli.2019.28/html
Scroll to top button