Have a personal or library account? Click to login
Retorsion: An Underrated Retaliatory Measure Against Malign Cyber Operations Cover

Retorsion: An Underrated Retaliatory Measure Against Malign Cyber Operations

By: Jakub Spáčil  
Open Access
|Jun 2024

References

  1. Abrams, Abigail. Here’s What We Know So Far About Russia’s 2016 Meddling. (18 April 2019) // https://time.com/5565991/russia-influence-2016-election
  2. Anderson, Troy. “Fitting a Virtual Peg into a Round Hole: Why Existing International Law Fails to Govern Cyber Reprisals.” Arizona Journal of International & Comparative Law 34 (2016): 144.
  3. Banks, William C. “The Bumpy Road to a Meaningful International Law of Cyber Attribution.” AJIL Unbound 113 (2019): 194.
  4. Barnes, Julian E. Begins First Cyberoperation Against Russia Aimed at Protecting Elections (23 October 2018) // https://www.nytimes.com/2018/10/23/us/politics/russian-hacking-usa-cyber-command.html
  5. BBC. US imposes new Russia sanctions over cyber-attacks. (11 June 2018) // https://www.bbc.com/news/world-us-canada-44446449
  6. Braverman, Suella. International Law in Future Frontiers: The Attorney General, the Rt Hon Suella Braverman QC MP, this evening set out in more detail the UK’s position on applying international law to cyberspace. (19 May 2022) // https://www.gov.uk/government/speeches/international-law-in-future-frontiers
  7. Case Concerning Military and Paramilitary Activities in and against Nicaragua (Nica ragua v. United States of America). International Court of Justice (Judgement of 27 June 1986), para. 244–245.
  8. Chesney, Robert. The 2018 DOD Cyber Strategy: Understanding ‘Defense Forward’ in Light of the NDAA and PPD-20 Changes. (25 September 2018) // https://www.lawfareblog.com/2018-dod-cyber-strategy-understanding-defense-forward-light-ndaa-and-ppd-20-changes
  9. Council Decision 2019/797 of 17 May 2019, concerning restrictive measures against cyber-attacks threatening the Union or its Member States.
  10. Council of the European Union. Draft implementing guidelines for the Framework on a Joint EU Diplomatic Response to Malicious Cyber Activities of 9 October 2017 // https://data.consilium.europa.eu/doc/document/ST-13007-2017-INIT/en/pdf
  11. Council Regulation (EU) 2019/796 of 17 May 2019 concerning restrictive measures against cyber-attacks threatening the Union or its Member States.
  12. Council of the European Union. Council Conclusions On A Framework For A Joint EU Diplomatic Response To Malicious Cyber Activities (Cyber Diplomacy Toolbox) of 19 June 2017 // https://data.consilium.europa.eu/doc/document/ST-10474-2017-INIT/en/pdf
  13. Dawidowicz, Martin. Third-Party Countermeasures in International Law. New York: Cambridge University Press, 2017, 29.
  14. Department of the Prime Minister and Cabinet, New Zealand. The Application of International Law to State Activity in Cyberspace // https://dpmc.govt.nz/sites/default/files/2020-12/The%20Application%20of%20International%20Law%20to%20State%20Activity%20in%20Cyberspace.pdf
  15. Dohnalová, Anna, and Radek Bartoníček. Ukrajinských hrdinů. Praha přejmenovala část ulice Korunovační u ruské ambasády. (22 April 2022) // https://zpravy.aktualne.cz/regiony/praha/ukrajinskych-hrdinu-praha/r~92302b02c21411ec8a24ac1f6b220ee8/
  16. Duguin, Stéphane, Pavlina Pavlova. The role of cyber in the Russian war against Ukraine: Its impact and the consequences for the future of armed conflict. (September 2023) // https://www.europarl.europa.eu/RegData/etudes/BRIE/2023/702594/EXPO_BRI(2023)702594_EN.pdf
  17. Egan, Brian J. International Law and Stability in Cyberspace. (10 November 2016) // https://www.justsecurity.org/wp-content/uploads/2016/11/Brian-J.-Egan-International-Law-and-Stability-in-Cyberspace-Berkeley-Nov-2016.pdf
  18. European Parliamentary Research Service. Understanding the EU’s Approach to Cyber Diplomacy and Cyber Defence. (May 2020) // https://www.europarl.europa.eu/RegData/etudes/BRIE/2020/651937/EPRS_BRI(2020)651937_EN.pdf
  19. European Union External Action. EU imposes first ever cyber sanctions to protect itself from cyber-attacks. (30 July 2020) // https://www.eeas.europa.eu/eeas/eu-imposes-first-ever-cyber-sanctions-protect-itself-cyber-attacks_en
  20. Federal Department of Foreign Affairs of Switzerland. Switzerland’s position paper on the application of international law in cyberspace // https://www.eda.admin.ch/dam/eda/en/documents/aussenpolitik/voelkerrecht/20210527-Schweiz-Annex-UN-GGE-Cybersecurity-2019-2021_EN.pdf
  21. Foreign, Commonwealth and Development Office of the United Kingdom. Application of international law to states’ conduct in cyberspace: UK statement // https://www.gov.uk/government/publications/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement
  22. Grant, John P., and Craig J. Barker. Parry & Grant encyclopaedic dictionary of international law. New York: Oxford University Press, 2009, 525.
  23. Giegerich, Thomas. “Retorsion”. In: Rüdiger Wolfrum, ed., Max Planc Encyclopedia of Public International Law. Oxford: OUP, 2017.
  24. Government of the Kingdom of the Netherlands. Appendix: International law in cyberspace // https://www.government.nl/binaries/government/documents/parliamentary-documents/2019/09/26/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace/International+Law+in+the+Cyberdomain+-+Netherlands.pdf
  25. Haataja, Samuli. Cyber Attacks and International Law on the Use of Force: The Turn to Information Ethics. Oxfordshire: Routledge, 2020, 180–181.
  26. International Law Commission. Yearbook of the International Law Commission: Draft articles on Responsibility of States for Internationally Wrongful Acts, with commentaries. Vol. II, part two (2001): 71–86 (hereinafter also ARSIWA).
  27. Jibilian, Isabella, and Katie Canales. The US is readying sanctions against Russia over the SolarWinds cyber attack. Here’s a simple explanation of how the massive hack happened and why it’s such a big deal. (15 April 2021) // https://www.businessinsider.com/solarwinds-hack-explained-government-agencies-cyber-security-2020-12
  28. Kosseff, Jeff. “Retorsion as a Response to Ongoing Malign Cyberoperations”: 15. In: T. Jančárková, L., Lindström, M., Signoretti, I., Tolga, G., Visky, eds., 2020 12th International Conference on Cyber Conflict. Tallinn: NATO CCDCOE Publications, 2020.
  29. Lahmann, Henning. Unilateral Remedies to Cyber Operations: Self-Defence, Countermeasures, Necessity, and the Question of Attribution. Cambridge: Cambridge University Press, 2020.
  30. Lotrionte, Catherine. “Reconsidering the Consequences for State-Sponsored Hostile Cyber Operations Under International Law.” The Cyber Defense Review 3 (2018): 92.
  31. McDonald, Neil, and Anna McLeod. “Antisocial Behaviour, Unfriendly Relations: Assessing the Contemporary Value of the Categories of Unfriendly Acts and Retorsion in International Law.” Journal of Conflict & Security Law 26 (2021): 423.
  32. Morello, Carol, and Ellen Nakashima. U.S. imposes sanctions on North Korean hackers accused in Sony attack, dozens of other incidents. (13 September 2019) // https://www.washingtonpost.com/national-security/us-sanctions-north-korean-hackers-accused-in-sony-attack-dozens-of-other-incidents/2019/09/13/ac6b0070-d633-11e9-9610-fb56c5522e1c_story.html
  33. Moret, Erica, and Patryk Pawlak. The EU Cyber Diplomacy Toolbox: towards a cyber sanctions regime? (12 July 2017) // https://www.iss.europa.eu/content/eu-cyber-diplomacy-toolbox-towards-cyber-sanctions-regime
  34. Nakashima, Ellen, and Paul Sonne. U.S. military carried out secret cyberstrike on Iran to prevent it from interfering with shipping. (28 August 2019) // https://www.washingtonpost.com/national-security/us-military-carried-out-secret-cyber-strike-on-iran-to-prevent-it-from-interfering-with-shipping/2019/08/28/36202a4e-c9db-11e9-a1fe-ca46e8d573c0_story.html
  35. Roguski, Przemyslaw. Application of International Law to Cyber Operations: A Comparative Analysis of States’ Views // https://ruj.uj.edu.pl/xmlui/bitstream/handle/item/153989/roguski_application_of_international_law_to_cyber_operations_2020.pdf?sequence=1&isAllowed=y
  36. Ruys, Tom. “Sanctions, Retorsions and Countermeasures: Concepts and International Legal Framework”: 24. In: Larissa van den Herik, ed., Research Handbook on UN Sanctions and International Law. Cheltenham: Edward Elgar Publishing, 2017.
  37. Sanger, David E. Obama Strikes Back at Russia for Election Hacking. (29 December 2016) // https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html
  38. Schmitt, Michael N. “The Law of Cyber Warfare: Quo Vadis?” Stanford Law and Policy Review 25 (2014): 287.
  39. Schmidt, Julia. “The Legality of Unilateral Extra-territorial Sanctions under International Law.” Journal of Conflict & Security Law 27 (2022): 73.
  40. Schmitt, Michael N., et al. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013, 40.
  41. Schmitt, Michael N. et al. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, 2017, 82.
  42. Schmitt, Michael N. “Below the Threshold Cyber Operations: The Countermeasures Response Option and International Law.” Virginia Journal of International Law 54 (2015): 701.
  43. Schmitt, Michael N. “Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: an Analytical Vade Mecum.” Harvard National Security Journal 8 (2017).
  44. Schmitt, Michael N. Terminological Precision And International Cyber Law. (29 July 2021) // https://lieber.westpoint.edu/terminological-precision-international-cyber-law
  45. Spáčil, Jakub. “Plea of Necessity: Legal Key to Protection Against Unattributable Cyber Operations.” Masaryk University Journal of Law and Technology 16 (2022): 218.
  46. Spáčil, Jakub. “Animus Aggressionis: The Role Of Intent in the Analysis of Armed Attack in Cyberspace.” Czech Yearbook of Public & Private International Law 13 (2022): 58–59.
  47. The Federal Government of Germany. On the Application of International Law in Cyberspace // https://www.auswaertiges-amt.de/blob/2446304/32e7b2498e10b-74fb17204c54665bdf0/on-the-application-of-international-law-in-cyberspace-data.pdf
  48. The NATO Cooperative Cyber Defence Centre of Excellence. CCDCOE to Host the Tallinn Manual 3.0 Process. // https://ccdcoe.org/news/2020/ccdcoe-to-host-thetallinn-manual-3-0-process/
  49. The NATO Cooperative Cyber Defence Centre of Excellence. European Union Equipping Itself against Cyber Attacks with the Help of Cyber Diplomacy Toolbox // https://ccdcoe.org/incyder-articles/european-union-equipping-itself-against-cyber-attacks-with-the-help-of-cyber-diplomacy-toolbox/
  50. The White House. Fact Sheet: Actions in Response to Russian Malicious Cyber Activity and Harassment. (29 December 2016) // https://obamawhitehouse.archives.gov/the-press-office/2016/12/29/fact-sheet-actions-response-russian-malicious-cyber-activity-and
  51. U. S. Department of State. Holding Russia To Account. (15 April 2021) // https://www.state.gov/holding-russia-to-account/
  52. U.S. Department of the Treasury. Treasury Sanctions Russian Cyber Actors for Interference with the 2016 U.S. Elections and Malicious Cyber-Attacks. (15 March 2018) // https://home.treasury.gov/news/press-releases/sm0312
  53. U.S. Department of the Treasury. Treasury Sanctions North Korean State-Sponsored Malicious Cyber Groups. (13 September 2019) // https://home.treasury.gov/news/press-releases/sm0312
  54. UN General Assembly Resolution 2625 from 24 October 1970. “The Declaration on Principles of International Law concerning Friendly Relations and Co-operation among States”.
  55. United Nations. Official compendium of voluntary national contributions on the subject of how international law applies to the use of information and communications technologies by States submitted by participating governmental experts in the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security established pursuant to General Assembly resolution 73/266 of 13 July 2021, UN Doc. A/76/136. // https://front.un-arm.org/wp-content/uploads/2021/08/A-76-136-EN.pdf
  56. Valuch, Jozef, and Ondrej Hamuľák. “Use of Force in Cyberspace.” International and Comparative Law Review 20 (2020): 174–191.
  57. von Heinegg, Wolff Heintschel. “Territorial Sovereignty and Neutrality in Cyberspace.” International Law Studies 89 (2013): 123.
  58. Wallace, David, and Marc Visger. “The Use of Weaponized “Honeypots” under the Customary International Law of State Responsibility.” Cyber Defense Review 3 (2018): 38.
Language: English
Page range: 46 - 69
Submitted on: Sep 4, 2023
|
Accepted on: Feb 19, 2024
|
Published on: Jun 26, 2024
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2024 Jakub Spáčil, published by Faculty of Political Science and Diplomacy and the Faculty of Law of Vytautas Magnus University (Lithuania)
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.