SlideShare a Scribd company logo
1 of 30
Download to read offline
1
Cybersecurity and International Law: A Hybrid Proposal to Place Partial Cyberspace
Security Responsibility on Private Infrastructure Providers While Extending the Special
Maritime and Territorial Jurisdiction to Cyberspace
“A hacker needs no passport and passes no checkpoints”1
Bruce Villard
University of Maryland Carey School of Law
May 2012
I. Introduction
Recent incidents involving cross-border intrusions into the Estonian and American
computer systems and corporate entities have brought the nexus of international and
cybersecurity law into the focus of many legal scholars and policy-makers.2
Over a three-week
period in 2007, and shortly after Estonia moved a Russian war memorial away from the center of
Tallinn (Estonia’s capital), Estonian government, banking, health, university, and other computer
systems were overwhelmed by a denial of service attack, specifically “increasingly larger waves
of data requests, rendering them inaccessible for long periods of time.”3
Corporations and government agencies in the United States are also, of course, vulnerable
to cyber attacks, notably from China,4
which has developed specially-trained military units to
mount such attacks.5
But, the Chinese government is not the only state to funnel resources into
preparing to mount offensive cyber attacks. Research performed by the United States’
Government Accounting Office indicates that at least 120 countries are developing or have
already developed such capabilities6
and the U.S. itself attempted to make use of such
capabilities during the Kosovo conflict.7
Given the physical infrastructure risks as well as those denial-of-service attacks, a more
thorough means of dissuading such activity through active prosecution needs to be developed.
The U.S. has noted that laws and international collaboration on cybersecurity issues are not
2
keeping up with technology despite treaties such as the Council of Europe’s Convention on
Cybercrime and various actions taken by the United Nations,8
and one way to address this
problem is with a hybrid solution of incorporating the special maritime and territorial jurisdiction
into the Convention on Cybercrime and placing some burden on private entities to maintain
appropriate levels of security against cyber attacks. After reviewing the existing legal structure
to address cyber attacks and its drawbacks, multiple solutions will be reviewed and analyzed,
including the hybrid private entity burden - special maritime jurisdiction solution.
The events described supra9
illustrate how attacks can damage data, and are often
referred to as “Computer Network Attacks” or “CNAs.”10
Persons who initiate CNAs intend not
only to cause disruption and denial of services (as seen in the cyber attack on Estonian computer
systems), but also actually destroy information in computers and networks themselves.11
Cyber
attacks, in some ways are an improvement over bombs and missiles in that cyber attacks can
cause similar harm12
and do it without actually engaging an adversary in the traditional vision of
a physical conflict.13
Specifically, cyber attacks can physically damage to infrastructure
elements such public water and electric utilities by using a discrete cyber attack to remotely open
a dam, cause a nuclear plant meltdown, or rupture an oil pipeline14
– just like a bomb or a
missile.15
The fact that potential damage can occur to critical infrastructure, as well as data, in
the private and public sectors, points to the need that “we must work towards building the rule of
law, to prevent the risks of logging on from outweighing its benefits.”16
If the proposed solution
is implemented in the future, it should further the work toward building this rule of law.
3
II. International Law Review
While international law is generally based upon the agreement of multiple countries,
there is a blurry line between actions that fall under the auspices of international criminal law
and those that fall under the laws of war or the use of force.17
This section will discuss both, and
will place some focus on jurisdiction and customary law as they play the biggest roles in
cyberspace adjudication. In general, however, international law is that which is either a)
accepted as customary law; b) is agreed to by international treaty or convention; or c) is derived
from common legal principles.18
A. The Law Armed Conflict and Its Application to Cyberspace
i. The Law of Armed Conflict
The Law of Armed Conflict (“LOAC”) is derived principally from United Nations
Charter Articles 2(4)19
and 51,20
as well as the seminal cases of Corfu Channel21
and Military
and Paramilitary Activities In and Against Nicaragua.22
With two exceptions, the U.N. Charter
states that members need to refrain from the using force.23
These exceptions, known as the right-
to-war or jus ad bellum, are 1) when the U.N. Security Council authorizes the use of force
pursuant to U.N. Charter Article 42,24
and 2) individual or collective self-defense under U.N.
Charter Article 51.25
Self-defense can only be used when there is an armed attack26
- the definition of which
engenders considerable tension. Traditionally, an “armed attack” meant that a party used
conventional weapons – not cyber – to attack an adversary.27
However, the International Court
of Justice (“I.C.J.”) has found that Articles (2)4 and 51 apply to the use of cyber, chemical,
biological and similar forms of aggression – the I.C.J. found the type of weapon used to be
irrelevant to its determination of what constituted an “armed attack.”28
Put another way, while
4
the original definition of an “armed attack” focused on the use of kinetic weapons, the standard
changed to a results-oriented approach and instead focused on the effects on life and property.29
Especially noteworthy in the context of cybersecurity is that U.N. Charter Article 2(4)
only applies to States and not to non-state actors.30
Terrorist attacks, for example, are prosecuted
under criminal statutes instead of the laws of armed conflict even when a foreign national
attacker stated that they were waging war against the state they attacked.”31
The distinctions between legitimate use of force in a self-defense contact and what
actions cannot be considered self-defense can be seen in the Corfu Channel32
and Military and
Paramilitary Activities In and Against Nicaragua 33
cases. In Corfu Channel, the Albanian
military fired on two British warships, which were passing through the Corfu Channel off the
coast of Albania in May 1946.34
The British warships were ostensibly asserting their right of
free passage and also wanted to test the Albanian response.35
In October 1946, the British Navy
sent four more ships through the channel and two of the ships struck mines.36
The Royal Navy
commenced mine-clearing operations in November 1946.37
The I.C.J. declared that while the
U.K. violated international law by sending armed ships into Albanian waters to remove mines,
the I.C.J. did not expressly state the action to have violated Article 2(4).38
However, the I.C.J.
did find Albania in violation of Article 2(4) by firing on the British ships because the ships had
not attacked Albania.39
Similarly, in Military and Paramilitary Activities, the I.C.J. found that when Nicaragua
assisted Salvadoran rebels by sending troops across the border from Nicaragua into El Salvador,
the action was considered to be just a threat that the conflict might escalate and not an escalation
itself. 40
At most, the action was considered to be meddling in El Salvador’s internal affairs.41
5
Either way, the I.C.J. held that the U.S. violated international law by assisting El Salvador
because Nicaragua’s actions were not sufficient to warrant El Salvador’s self-defense response.42
ii. Application of the Law of Armed Conflict to Cyberspace
There is tension among legal scholars and policy-makers on whether cybercrime and
cybersecurity are synonymous and whether some actions should be treated under the LOAC or
under criminal law.
One school of thought is that actions should be categorized either as being a cybercrime
or as a cyber attack (in the sense of terrorism or warfare). Scholars of this school say that within
cyberspace, cybercrime is distinguished from cyber warfare by the perpetrator’s intent and
effects of their actions and from this, courts can classify the action as a criminal or terrorist act.43
This distinction is significant because scholars who subscribe to this thinking further believe that
criminal acts, are considered a domestic security issue and should be prosecuted under criminal
statutes. 44
Conversely, cyber activity determined to be terrorism (by the perpetrator’s intent and
effects of the act) can trigger a defensive posture by the attacked country.45
This triggering act
then is considered to be a violation of the LOAC – even though the attack was carried out via
cyber means as opposed to a conventional kinetic attack. 46
The intent and focus of a cyber
terrorist is to destabilize a country and get publicity for their actions.47
This is in contrast to the
intent of a cybercriminal, which, again according to scholars of this school of thought, is usually
financial in nature – the theft of money, fraud, and sometimes the theft of information.48
This
distinction remains in place even if the methods used to effect the attack (e.g., denial of service,
virus, worm, etc.) is the same.49
Sometimes, however, distinguishing between cybercrime and cyber terrorism is difficult
because the descriptive words, specifically “security,” and “defense,” are interchangeable;50
6
therefore, the line between the two is difficult to determine.51
This difficulty has led to the
U.N.’s alternative school of thought, which is that cybercrime and cyberterrorism cannot be
bifurcated, that there is a blurry line between crime and war,52
and that cybercrime and cyber
terrorism issues cannot be separated because they are so interconnected.”53
Advocates for this
school of thought have illustrated how indistinctive the line is between criminal actions and those
that can be classified under the LOAC by highlighting how the military and civilians often work
together to mount cyber attacks in environments (e.g., air-conditioned office buildings) that
hardly resemble what one usually thinks of as a combat.54
Further, attackers do not even need to
come physically close to their targets and can pretty much mount an attack from anywhere, even
from a coffee shop, that has Internet access.55
Further blurring the line between what is
considered to be a criminal act versus an act that falls under the LOAC is that the U.N. only
considers attacks to be acts of war if the parties in conflict were sovereign states.56
For example,
the U.N. does not consider the 2007 denial-of-service attack on Estonian government offices to
be an act of war57
because there is no proof that the attack was initiated by a sovereign state –
even though some view the whole incident as the first cyberwar attack.58
B. International Criminal Law
International criminal law as applied to cyberspace is centered around two pieces of law:
the Computer Fraud and Abuse Act (“CFAA”) in the United States, and the Council of Europe’s
Convention on Cybercrime. Jurisdictional issues are often key factor in many international law
disputes, including in the cybersecurity realm, so after this section’s focus on the CFAA and the
Convention on Cybercrime, the following section59
will also draw a connection to the nexus
between international law jurisdictional principals and cybersecurity.
7
i. Computer Fraud and Abuse Act
The U.S. Computer Fraud and Abuse Act (“CFAA”) was enacted in 1984. The CFAA
prohibits persons from “knowingly” accessing “without authorization or exceeding . . .
authorized access.”60
Further, the CFAA characterizes the entities and types of data that are
protected, including financial records, federal agencies or departments, and protected
computers61
– defined as those affecting interstate or foreign commerce.62
ii. Council of Europe’s Convention on Cybercrime
The Council of Europe’s Convention on Cybercrime (“Convention on Cybercrime”)
came into being much later than the CFAA. The Convention on Cybercrime came into effect on
July 1, 2004, is the lone international treaty which addresses Internet crimes.63
Further, despite
its full name and origins in the Council of Europe, any state may join the Convention. 64
Unlike
the CFAA, the Council of Europe’s Convention on Cybercrime is a non-self-executing treaty
meaning that countries which ratify the treaty need to incorporate its terms into their own
statutory schemes. Specifically, the Convention on Cybercrime mandates that signatories
incorporate specific cybercrime offences into their criminal codes.65
These offenses include not
only illegal access to and interference with a computer system, but also include unlawful data
interception, forgery and fraud committed with the aid of a computer, and copyright
infringement.66
The absence of a reference to terrorist-related acts as being covered by the
Convention on Cybercrime is notable, especially in light of the U.N.’s definition of
“cybercrime,” which includes a reference to such acts - specifically, that even when terrorists use
computers to commit crimes, the acts are covered under the Convention on Cybercrime.67
Although European in origin and name, the Convention on Cybercrime is open to any
country in the world which would like to join.68
Notably, the U.S. has ratified the Convention on
8
Cybercrime, and commenting on the ratification, Richard Beaird, a Department of State official
responsible for international communications and information policy said in an April 2008
speech to the American Bar Association that the Convention on Cybercrime “offers the best legal
framework for the international community.”69
Even more significantly, however, is that Mr.
Beaird of the U.S. State Department also stated that nothing in U.S. statutory law (i.e., the
CFAA), needs changing as a result of ratifying the Convention on Cybercrime.70
However, the Convention on Cybercrime suffers from a similar semantics problem as the
LOAC. As interpreters of the LOAC have a difficult time articulating where the line is between
crime and war, or whether there are any differences at all, so too does the Convention on
Cybercrime have a definitional issue. Here, the major issue with the Convention on Cybercrime
is that each member has a high degree of flexibility in determining what exactly constitutes a
violation of the Convention on Cybercrime and further, because the Convention on Cybercrime
is not self-executing, each member can keep the definitions they place into their own statutory
regimes.71
Just in the European Union, for example, there is a wide range of definitions just for
unauthorized access to a computer system. These include: (1) accessing computer systems
where there has been some effort made to not permit open access; (2) requiring that actual
damage to the penetrated system; to (3) showing a movement from a “basic hacking offense” to
more serious offenses.72
C. The Nexus between Jurisdiction and Cybersecurity
Jurisdiction plays a large role in cybersecurity law. A major difference between the
CFAA and the Council of Europe’s Convention on Cybercrime is that the latter “provides for
extraterritorial jurisdiction.”73
Specifically, article 22(4) requires that signatory countries enact
9
laws that provides jurisdiction over acts that violate the Convention on Cybercrime but which
occur “outside the territory of the country but committed by one of its nationals.”74
How this plays out can be seen by comparing the outcome of the seminal case of Ivanov
v. United States75
under the CFAA and what would have likely occurred had the Convention on
Cybercrime existed at the time. From Russia, Aleksey Ivanov accessed a computer system in
Connecticut that contained credit card and other valuable data.76
Ivanov tried to extort money
from the owners in exchange for “security advice.” Some sources indicate that was sent to the
U.S. by Russia per an extradition request,77
but other, more primary sources indicate he was
convinced to come to the U.S. as part of an F.B.I. undercover operation.78
Regardless, Ivanov
was successfully prosecuted and the prosecution was able to show that Congress intended the
CFAA to apply extraterritorially.79
However, if the CFAA had an explicit clause granting
extraterritorial jurisdiction (as occurred later as part of the PATRIOT Act discussed infra)80
or if
the Convention on Cybercrime, with its extradition requirements, had been ratified by the U.S.,
then the prosecution would not have had to rely as heavily on showing legislative intent and
Russian government cooperation.81
i. The Territorial and Nationality Jurisdictional Principles and Cybersecurity
Two related international jurisdictional principles are the territorial and nationality
principles. Territorial jurisdiction is the most common and is true to its name – that is that if the
offense takes place within a state’s territory, then there is a firm foundation for claiming
jurisdiction.82
In turn, jurisdiction outside of a state’s borders – also called “extraterritorial
jurisdiction” – can be achieved via the nationality principle and is used specifically when a
national commits an offense outside of the prosecuting country.83
The seminal example of the
nationality principle is to prosecute American “sex tourists” who travel outside the U.S. to take
10
advantage of weak enforcement of child exploitation laws in other countries.84
Despite the
offenses occurring outside of the U.S., under U.S. law, American prosecutors can still go after
American nationals who commit these acts outside the U.S.85
and Congress can include
extraterritorial enforcement provisions when creating or amending other laws as well.86
Although the CFAA was interpreted to apply extraterritorially in Ivanov v. U.S.,87
the
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and
Obstruct Terrorism Act of 2001, otherwise known as the PATRIOT Act, explicitly extended the
reach of the CFAA to allow for extraterritorial enforcement88
, and the Council of Europe’s
Convention on Cybercrime also provides for extraterritorial jurisdiction.89
However, semantically, when an action is said to have occurred “extraterritorially,” it
implies that it occurred in a geographic area – just one outside of the prosecuting country.90
But,
cyberspace by its very nature is not confined by geographic boundaries91
and so the problem
with applying territorial or extraterritorial jurisdiction is that “[c]yberspace is nowhere.”92
Significantly, the Internet uses packet switching technology where a piece of communication, for
example an e-mail, is broken up into discreet packets by the sender’s internet service provider
(“ISP”), sent over the Internet, and reassembled by the receiver’s ISP.93
The packets take the
shortest electronic route, which may not be the shortest geographic route, and may cross multiple
national physical borders during transmission, which essentially a space unconstrained by
geographic borders.94
Therefore, trying to artificially overlay the geographical border
implications of extraterritorial jurisdiction over cyberspace would be ineffective.95
ii. The Passive Personality or “Effects-Based” Jurisdictional Principle
On the opposite side of the same coin of the nationality principle is the passive
personality principle. In contrast to the nationality principle, where jurisdiction covers nationals
11
accused of crimes, the passive personality principle covers nationals who are victims of crimes.96
Specifically, the passive personality principle gives jurisdiction to the country on whose citizens
effects were felt. It is often referred to as “effects-based” jurisdiction.97
The S.S. Lotus98
case is
the seminal personality principle or effects-based jurisdiction case where the main controversy
was whether Turkey had to show a rule that granted it permission to arrest a French ship skipper
for alleged crimes, or whether the burden was on France to prove that Turkey was prohibited
from doing so.99
In essence, S.S. Lotus stands for the concept that under international law, actions
that are not specifically prohibited are allowed.100
Applied to cybercrime, the passive personality jurisdictional principle was one of the
critical success factors in the prosecution in the Ivanov case. While the prosecution was able to
show legislative intent that Congress meant for the CFAA to apply extraterritorially, the
prosecution also was able to successfully get jurisdiction through the passive personality
principle by showing that Alexsey Ivanov’s actions had adverse effects on U.S. nationals,101
so
prosecutors do not have to necessarily rely on just one type of jurisdiction to be effective.
iii. The Special Maritime and Territorial Jurisdictional Principle
Significantly, there is a subset of the territorial-nationality jurisdiction called the “special
maritime and territorial jurisdiction.”102
The U.S. has used special maritime and territorial
jurisdiction to extend to other countries’ nationals on ships in other countries’ territorial waters
when the ships have scheduled departures or arrivals in U.S. ports and when the victims were
U.S. nationals.103
iv. Protective Jurisdictional Principle
The protective principle is usually used to establish jurisdiction for espionage, official
document falsification, and immigration and custom conspiracy prosecutions.104
This
12
jurisdictional principle has been interpreted very broadly and does not require a showing of an
adverse affect within the U.S.105
v. Universality Jurisdictional Principle
Universal jurisdiction is closely connected with customary law as it, along with
international agreement, is one of two ways to establish jurisdiction using this principle.106
The
seminal case for customary law is Paquete Habana107
where the court held that fishing vessels
can continue working during wartime and cannot be captured because this it has been the custom
of Navies worldwide for over 600 years to allow fishing vessels to go on with their business
regardless of their nationality.108
Essentially, universal jurisdiction can be used when a law of
“universal concern” or universal agreement is involved. Examples include “piracy, slave trade,
attacks on or hijacking of aircraft,” and so forth.109
For prosecutors to make effective use of universal jurisdiction, they need to ensure that
six factors are met.110
These six factors are: (1) countries uniformly agree that the act is
unlawful; (2) the definition of the act is narrow and universally-accepted; (3) consequences for
the act are consistent across national boundaries; (4) the accused refuses the protection of their
country of citizenship; (5) domestic enforcement of the customary law in the location where the
act occurred is difficult; and, (6) the harm resulting from the act is international in nature and
affects more than one country.111
III. Proposed Solutions
A. Greater Reliance on Customary Law
Customary law is based on parties agreeing that certain acts are unlawful and is
sometimes termed the “Rule of Norms.”112
In the cyberspace arena, a recent White House
13
cyberspace article cited the “Rule of Norms” and noted specifically that common definitions and
understanding could go a long way toward creating the international law that governs
cyberspace.113
In particular, when state actors are involved, some scholars believe that most
countries would agree that state-sponsored cyber attacks are unlawful under customary
international law.114
The unlawfulness of State-sponsored attacks is further highlighted by Corfu
Channel’s key point that States cannot permit actions against other states to originate from their
territory, which although occurring in the early 1900s, can be applied to argue that State-
sponsored cyber attacks are unlawful.115
However, there are two primary drawbacks which preclude the effective application of
customary international law to cybersecurity issues. The first of these is customary law’s
requirement for a common viewpoint and common set of definitions116
and the second is the
focus on state actors and the lack of customary law governance over non-state-actors,117
The need for all parties to have a common viewpoint on what acts are unlawful and have
a common set of definitions is probably the most fatal drawback when trying to apply customary
international law to cybersecurity issues.118
Specifically, a common definition for what exactly
constitutes a cyberspace does not currently exist with sufficient specificity to become part of
customary law.119
Cyberspace has been variously defined as, “an evolving man-made domain
for the organization and transfer of data using various wavelengths of the electromagnetic
spectrum”120
to a place where “exchanges of communications [occur] and content between users
where the content is transported across the infrastructure. . . .”121
The significance of definitional
disagreement in the customary law context is that the arguments of parties relying on customary
law tend to be disregarded.122
Tel-Oren v. Libyan Arab Republic123
is the seminal case where
customer law is shown to be ineffective when there is not a common consensus on key
14
definitions.124
In Tel-Oren, a father charged Libya with responsibility for killing his child on a
civilian bus in Israel as a part of a terrorist act.125
The court dismissed the father’s claim partly
because there was little international agreement as to the definition of terrorism.126
Another drawback of trying to apply customary law to cybersecurity is that customary
law only applies to States or persons acting under the color of states unless the law specifically
covers non-state actors.127
Since non-State or private actors can initiate cyber attacks as well as
states themselves, such a gap in the law is a major drawback to relying on customary law to
prosecute cybercrimes. For example, the FBI believes that Al-Qaeda might attempt to initiate a
cyber attack in the future128
and so the U.S. government might have a difficult time pursuing a
non-state actor such as Al-Qaeda in the courts under traditional customary law.
B. Give the International Criminal Court Exclusive Jurisdiction Over Cybercrimes
This idea has its origins in the Anti-Drug Abuse Act, which while did not provide the
International Criminal Court (“ICC”) in The Hague with jurisdiction of international drug
traffickers directly, did direct the President of the U.S. to begin negotiations on the creation of a
court with this sort of jurisdiction.129
A similar court could be created for the prosecution of
cybercrimes, or jurisdiction could be given to the existing International Criminal Court (“ICC”).
The benefits of this proposal are mostly in the area of concurrent jurisdiction – that is
where two or more States believe they should be able to prosecute a violation – similar to the S.S.
Lotus130
case. Such a court, for example, has been used when the U.K., U.S., and Libya all
wanted jurisdiction over prosecution over Pan Am 103 bomber and the compromise was to have
the case tried in the ICC.131
However, as was the case in with the Pan Am bombing trial, there may be fear that a trial
would not even take place or that the trial would not be effective.132
Additional drawbacks to
15
this solution include that the States to whom the parties of a cybersecurity case might belong
might use the trial for political purposes or that the States might be unwilling to turn over
suspects to the ICC and rather, try to shield them from international adjudication.133
Further,
another major drawback of relying on the ICC is that the United States is not a signatory to the
Rome Statute which established the ICC and therefore decisions from that court are not binding
upon the United States.134
C. Prosecute Cybersecurity Violations under Universal Jurisdiction
While it might be tempting for Convention on Cybercrime members to try and use
universal jurisdiction, given the dispute noted previously on what “unauthorized access”
means,135
the requirement for a uniform definition would be tough to meet in the cybersecurity
context.136
D. Broaden the Definition of “Extraterritorial” to Include “Cyberspace” and
Continue to Prosecute Cybercrimes under Extraterritorial Jurisdiction
Currently, the Convention on Cybercrime as well as the CFAA (via the PATRIOT) Act
explicitly leverage extraterritorial jurisdiction. The principle drawback of relying on this type of
jurisdiction, as discussed supra, is that it implies that an offense occurred within a defined
geographic space,137
but “cyberspace is nowhere,”138
so prosecutions could potentially be
defeated on this ground.
While somewhat simple and perhaps inelegant, one possible solution is to formally define
extraterritorial jurisdiction as including cyberspace, or even more broadly as domains which are
not limited or defined by geographic boundaries so as to possibly account for future
technological developments that use something besides cyberspace.
Advantages of this method include that it might be easier from a procedural standpoint to
amend definitional sections in the U.N. Charter and Title 18 of the U.S. Code (which addresses
16
criminal activity) rather than specific treaties and statutes. This would further have the effect of
applying the expanded definition more broadly to treaties and statues beyond the Convention on
Cybercrime and the CFAA respectively. However, it would have the disadvantage of causing
possible unintended and unknown consequences. This risk could be mitigated by limiting the
expanded definition to just the Convention on Cybercrime and the CFAA.
E. Place Partial Cyberspace Security Burden on Private Infrastructure Providers and
Enforce Administratively
Very recently, General Keith Alexander, the head of Cyberwarfare Command, referred to
unspecified events that warrant the need for private companies that provide critical infrastructure
to bear some of the burden for protecting the U.S. from cyber attacks.139
Gen. Alexander further
discussed how he felt that leaving it to the free market to encourage critical infrastructure
providers to provide this protection themselves probably is not adequate and so implied that the
government needs to legislate enforcement.140
While Gen. Alexander did not refer to a specific
bill, he was likely lending support to the “Homeland Security Cyber and Physical Protection Act
of 2011”141
which, if enacted, will establish a Cybersecurity Compliance Division that in turn
can promulgate regulations requiring critical infrastructure providers to meet certain likely high
standards of cybersecurity protection.142
The advantages of this bill include that it is in line with general administrative law
concepts that detailed rulemaking, especially in technically complex areas, should be left to the
experts.143
Also, if regulations are enacted properly, they would cover domestic, as well as
international cyber threats. The primary disadvantage, of course, is that as Sen. McCain pointed
out, it would increase the regulatory burden on private companies in a struggling economy. This
burden may be mitigated somewhat by section 224(c) of the bill that specifies that regulations
should be made after looking at the risks involved including threats, vulnerabilities, and
17
consequences.144
This implies that rule makers will be tempered somewhat and only make
regulations that truly are needed.
F. Enhance the Convention on Cybercrime with Special Maritime and Territorial
Jurisdiction
Finally, a new proposal is to replace or add to the Council of Europe’s Convention on
Cybercrime’s use of extraterritorial jurisdiction with special maritime and territorial jurisdiction.
The advantage of the latter, is that a prosecuting entity can more easily gain jurisdiction over
persons residing in a country other than the one prosecuting, regardless of who (e.g., a private
person) or entity (e.g., embassy, consulate, or corporation).145
Further, this type of jurisdiction is
generally expressly provided for in a statute leaving less room for dispute on how or should be
applied.
i. Cyber Attacks and Piracy: Parallels and Similarities
The first of two major similarities between cyber attacks and piracy is that, as was seen in
the Estonian case, it can be difficult to trace who exactly perpetrated an intrusion or cyber attack
event.146
Similarly, pirates are difficult to track down because they either do not fly a nation’s
flag (rather the pirates flag), or fly one that is not of their own.147
While this is addressed in the
piracy case by applying universal jurisdiction, extending this thinking to the prosecution of cyber
attack perpetrators is probably not wise given the drawbacks of universal jurisdiction discussed
next.
The second of two major similarities between cybercrime and piracy are that the venues
for these crimes – specifically cyberspace and the high seas respectively – do not belong to or
fall under the territorial jurisdiction of any one country.148
This means that to prosecute these
crimes, forms of jurisdiction not based on territorial boundaries must be explored.149
18
Piracy is covered by universal jurisdiction,150
but applying universal jurisdiction to other
areas of the law is risky and comes with severe drawbacks. The first of these is that it can be
easy for lawmakers to create universal jurisdiction over customary law that truly is not
customary.151
An example are the Terrorism Treaties drawn up in the 1970s and 1980s which
addressed crimes that fall under the heading of “international terrorism” and include airline
hijacking, terrorist bombings, torture, hostage-taking, and crimes that purposely impair maritime
navigation.152
The problem was that there was no foundation for these crimes to be considered a
part of customary law and so really were inappropriately covered under universal jurisdiction in
the treaties153
and given that there are diverging opinions on what constitutes cybercrime and
cyberspace,154
applying universal jurisdiction to here would be unwise.
Another drawback of applying universal jurisdiction to laws beyond piracy is it is easy
for lawmakers to exclude State action. Historically, piracy has always been considered a private
action somewhat purposely to avoid creating conflicts between States.155
Applied to
cybercrimes, it would be very easy to similarly write statutes that fall under universal jurisdiction
but leave out the ability to prosecute States who are often thought to perpetrate cyber attacks.156
ii. Cybercrime and Piracy: Differences
Outside of the U.S., piracy is enforced through the United Nations Convention on the
Law of the Sea.157
However, unlike the Convention on Cybercrime, the United States is not a
signatory of the Law of the Sea convention,158
so by having the Convention in Cybercrime in
place makes actually puts the U.S. in a better position to tackle cybercrime on the international
level because it has the backing of the “best legal framework of the international community” to
help back it up.159
19
iii. Alternative: Special Maritime and Territorial Jurisdiction
Given that Convention of Cybercrime is already in place and at least provides a
foundation for prosecution of cyber attacks on the international level, but that exercise of
universal and extraterritorial jurisdiction have drawbacks, the U.S. could suggest that the
Convention on Cybercrime be modified, or in the alternative, make a reservation to use special
maritime and territorial jurisdiction.
Continuing the analogy to piracy, although U.S. legislation generally provides that
prosecution of piracy falls under universal jurisdiction,160
the U.S. also may prosecute under the
special maritime and territorial jurisdiction.161
The crime of piracy is defined as, “[w]hoever, on
the high seas, commits the crime of piracy as defined by the law of nations . . . ,”162
and the
special maritime and territorial jurisdiction includes the “high seas.”163
And, just as the “high
seas” are not within the territorial jurisdiction of any country164
cyberspace, as discussed
supra,165
the “place” where cybercrime occurs, not being a tangible place,166
also cannot be
governed via traditional territorial jurisdiction.
If the special maritime and territorial jurisdiction were similarly applied to cyber attacks,
it would resolve the problem with extraterritorial jurisdiction being linked to geographic
boundaries. Further, the special maritime jurisdiction does not have the problem of universal
jurisdiction of being tied to customary law and in turn the problem with a range of definitions for
cyber attacks and cyberspace. And, if the special maritime jurisdiction were to be integrated into
the already existing base the U.S. has in being a member of the Convention on Cybercrime,
which has been stated to be a good legal framework, it might be legislatively efficient as making
an amendment is likely less burdensome than creating brand new law.
20
IV. Conclusion: Final Recommendation
Rather than relying on the advantages of one of these single solutions, the best solution is
a hybrid of the latter two – that is placing some burden on private entities that supply critical
infrastructure as well as incorporating the special maritime and territorial jurisdiction into the
Convention on Cybercrime so that their advantages can complement the other while mitigating
the disadvantages of each.
One major advantage is that a hybrid solution contains both the defensive elements of
private infrastructure providers enhancing their security protocols while also providing the
offensive elements of the likely more effective prosecution enabled by incorporating the special
maritime and territorial jurisdiction into the Convention on Cybercrime.
In addition, while Congress may have a difficult time enacting an organic statute that
enables an existing agency to create new regulations as part of the private entity part of the
hybrid solution, by showing that the government is also taking on some burden, specifically
improving how crimes can be prosecuted under the already-existing Convention on Cybercrime,
it will provide regulated businesses with a good faith indication that the government is taking
responsibility as well.
Finally, in addition to the benefits that each solution will provide individually, creating a
public-private hybrid has the possible advantage of leveraging the significant skills of both the
policy- and business- focused skills and resources of government agencies and the private sector,
which could lead to significant efficiencies and creativity in improving existing and developing
new defensive mechanisms as well and continuing to “play offense” effectively when required.
21
ENDNOTES
1
Janet Reno, U.S. Attorney General, Keynote Address on High-Tech and Computer Crime,
Address at the P-8 Senior Experts’ Group on Transnational Organized Crime (Jan. 21, 1995),
available at: http://www.irational.org/APD/CCIPS/agfranc.htm.
2
See Duncan B. Hollis, Why States Need an International Law for Information Operations, 11
LEWIS & CLARK L. REV. 1023,1024 (2007); Katharine C. Hinkle, Countermeasures in the Cyber
Context: One More Thing to Worry About, YALE J. INT’L L.ONLINE 1, 13 (2011).
3
Id. (describing that the cyber attack on Estonia began on April 27, 2007, the day when Estonia
moved a Russian war memorial from the center of Tallinn – Estonia’s capital. Although Estonia
is no longer a part of the now-defunct Soviet Union, the Estonia is still home to a large Russian
population who, along with the Russian government, objected to the move of the war memorial.
Initially, the attack made Estonian government websites, including the Estonian Parliament’s
email system, the President’s and Prime Minister’s offices, as well as the Foreign and Justice
ministries, inaccessible for long periods of time making it a denial of service attack. The attack
lasted three weeks and spread beyond government computers to include those belonging to
financial institutions, Internet service providers, newspapers, television stations, and even
telephone exchanges, which disabled critical “911” fire and rescue numbers.
4
Bradley Graham, Hackers Attack Via Chinese Web Sites, WASH. POST, Aug. 25, 2005, at A1.
5
Adam Levine, Millions spent defending Pentagon computers from attack, CNN (Apr. 7, 2009,
8:43 PM), http://www.cnn.com/2009/POLITICS/04/07/military.computers/index.html
?iref=allsearch.
6
Natasha Solce, The Battlefield of Cyberspace: The Inevitable New Military Branch – The Cyber
Force, 18 ALB. L.J. SCI. & TECH. 293, 297 (2008).
7
Jason Barkham, Information Warfare and International Law on the Use of Force, 34 N.Y.U. J.
INT’L L. & POL. 57, 62 (2001) (citing Elizabeth Becker, Pentagon Sets Up New Center for
Waging Cyberwarfare, N.Y. TIMES, Oct. 8, 1999, at A16) (explaining that General Henry
Shelton, who was chairman of the Joint Chiefs of Staff at the time of the Kosovo conflict,
confirmed that the U.S. attempted to mount a cyber attack on Serbian computer networks.
Further, other U.S. Government officials admitted that U.S. intelligence services mounted cyber
attacks on the President of Yugoslavia’s bank accounts.).
8
Miriam F. Miquelon-Weisman, The Convention on Cybercrime: A Harmonized Implementation
of International Penal Law: What Prospects for Procedural Due Process? 23 J. MARSHALL J.
COMPUTER & INFO. L. 329, 335 (2005) (citing United Nations Crime and Justice Information
Network, International Review of Criminal Policy – United Nations Manual on the Prevention
and Control of Computer Related Crime P 5, available at: http://www.uncjin.org/ Documents/
EighthCongress.html).
9
Supra Section I.
22
10
Davis Brown, 47 HARV. INT’L L. REV. 179, 186 (2006) (citing JOINT CHIEFS OF STAFF, JOINT
PUBL’N NO. 3-13, JOINT DOCTRINE FOR INFORMATION OPERATIONS I-9 TO -10 (Oct. 9, 1998).
11
Id.
12
Hollis, supra note 2, at 1031.
13
SUN TZU, THE ART OF WARFARE 111 (Robert G. Henricks ed., Roger T. Ames trans.,
Ballantine Books 1993).
14
Brown, supra note 10, at 187 (citing Eric Talbot Jensen, Computer Attacks on Critical
National Infrastructure: A use of Force Invoking the Right of Self-Defense, 38 STAN. J. INT’L L.
207, 222 (2002)).
15
See White House, International Strategy for Cyberspace: Prosperity, Security, and Openness in
a Networked World 3 (2011), available at: http://www.whitehouse.gov/sites/default/files/
rss_viewer/international_strategy_for_cyberspace.pdf.
16
See id.
17
See ELLEN S. PODGOR AND ROGER S. CLARK, INTERNATIONAL CRIMINAL LAW 5 (2nd ed.
LexisNexis 2008).
18
RESTATEMENT (THIRD) OF THE FOREIGN RELATIONS LAW OF THE UNITED STATES § 102(1)
(1987).
19
U.N. Charter art. 2, para. 4.
20
U.N. Charter art. 51.
21
Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 22 (Apr. 9).
22
Military and Paramilitary Activities In and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14,
195 (June 27).
23
U.N. Charter art. 2, para. 4 (“All members shall refrain in their international relations from the
threat or use of force against territorial integrity or political independence . . . .”).
24
U.N. Charter art. 42 (There are two ways in which the United Nations permits war. Article 42
of the U.N. Charter is more commonly thought of as when war is authorized by the U.N.
Security Council).
25
U.N. Charter art. 51; See also Sean M. Condron, Getting It Right: Protecting American
Critical Infrastructure in Cyberspace, 20 HARV. J. LAW & TEC 404, 412–13 (2007) (clarifying
how U.N. Charter art. 51 articulates the right of self-defense).
23
26
Sean M. Condron, Getting It Right: Protecting American Critical Infrastructure in
Cyberspace, 20 HARV. J. LAW & TEC 404, 412–13 (2007).
27
Katharine C. Hinkle, Countermeasures in the Cyber Context: One More Thing to Worry
About, YALE J. INT’L L. ONLINE 1, 1 n.1 (2011).
28
Condron, supra note 26, at 413.
29
Barkham, supra note 7, at 72.
30
Id.
31
Id.
32
Corfu Channel, supra note 21 at 22.
33
Military and Paramilitary Activities In and Against Nicaragua, supra note 22, at 195.
34
Barkham, supra note 7, at 70 (citing Corfu Channel, supra note 21 at 31, 50).
35
Id. (citing Corfu Channel, supra note 21 at 14, 28, 30).
36
Id.
37
Id. (citing Corfu Channel, supra note 21 at 19, 35).
38
Id.
39
Barkham, supra note 7, at 70 (citing Corfu Channel, supra note 21 at 19, 35).
40
Id. at 75 (citing Military and Paramilitary Activities In and Against Nicaragua, supra note 22,
at 123).
41
Id. (citing Military and Paramilitary Activities In and Against Nicaragua, supra note 22, at
123).
42
Id. at 76 (citing Military and Paramilitary Activities In and Against Nicaragua, supra note 22,
at 123).
43
Solce, supra note 6, at 300-1 (citing CARLOS A. RODRIGUEZ, CYBERTERRORISM – A RISING
THREAT IN THE WESTERN HEMISPHERE 7 (2006)).
44
Condron, supra note 26, at 408.
45
Id.
24
46
Brown, supra note 10, at 188.
47
Solce, supra note 6, at 301 (citing Barry C. Collin, Inst. for Sec. and Intelligence, The Future
of CyberTerrorism: Where the Physical and Virtual Worlds Converge, Remarks at the 11th
Annual International Symposium on Criminal Justice Issues, http://afgen.com/terrorism1.html
(last visited Apr. 11, 2008) (discussing the differences between cyber terrorists and cyber
criminals)).
48
Brown, supra note 10, at 188.
49
Id.
50
Condron, supra note 26, at 408 (citing Roget’s II: THE NEW THESAURUS 248 (3d ed.
1995)).
51
Id.
52
See Podgor, supra note 17, at 5.
53
M. Gercke, INTERNATIONAL TELECOMMUNICATIONS UNION, UNDERSTANDING CYBERCRIME: A
GUIDE FOR DEVELOPING COUNTRIES, at 17 (2011), available at: http://www.itu.int/ITU-
D/cyb/cybersecurity/docs/ ITU_Guide_A5_14092011_rev.pdf.
54
Brown, supra note 10, at 183.
55
Solce, supra note 6, at 295.
56
Gerke, supra note 53, at 115.
57
Hollis, supra note 2 Lewis & Clark L. Rev. 1025 (citing Newly Nasty, supra note 5; Robert
Anderson et al., US Warns Cyber-attacks Will Increase, Fin. Times, May 18, 2007, at 12.))
58
Gerke, supra note 53, at 115.
59
Infra Section II.B.i.
60
Computer Fraud and Abuse Act of 1986, 18 U.S.C. § 1030(a)(1) (LexisNexis 2012).
61
18 U.S.C. § 1030(a)(2).
62
18 U.S.C. § 1030(a)(6)(A).
63
KU v. Finland, [2008] ECHR 2872/02 (2 December 2008).
64
Id.
25
65
Id.
66
Id.
67
Miquelon-Weisman, supra note 8, at 332.
68
Council of Europe Convention on Cybercrime, art. 36, para. 1.
69
John R. Crook, ed., Contemporary Practice of the United States Relating to International
Law: U.S. Views on Norms and Structures for Internet Governance, 102 A.J.I.L. 648, 650 (2008)
(citing Richard C. Beaird Sr., Deputy Coordinator for Int'l Communications and Information
Policy, Perspectives on Internet Governance--What Might the Future Hold? (Apr. 11, 2008)).
70
Id.
71
Jennifer J. Rho, Blackbeards of the Twenty-First Century: Holding Cybercriminals Liable
under the Alien Tort Statute, 7 CHI. J. INT’L L. 695, 707–08 (2007).
72
Id.
73
Mike Keyser, The Council of Europe Convention on Cybercrime, 12 J. Transnat'l L. & Pol'y
287, 301 (2003).
74
Council of Europe Convention on Cybercrime art. 22, para. 44.
75
United States v. Ivanov, 175 F. Supp. 2d 367 (D. Conn. 2001).
76
Id. at 369.
77
Keyser, supra note 73, at 301.
78
U.S. Dept. of Justice, “Russian Computer Hacker Convicted by Jury” October 10, 2001,
available at: http://www.justice.gov/criminal/cybercrime/press-
releases/2001/gorshkovconvict.htm (noting that Ivanov, along with two other men, one names
Gorshkov, were convinced to travel to the U.S. by the FBI under the pretense of interviewing
and demonstrating their hacking skills for a fake start-up company called “Invita.” Ivanov and
the other men traveled to Seattle where they successfully demonstrated their hacking skills and
were arrested.).
79
Ivanov, supra note 75, at 370.
80
Infra Section II.C.i.
81
Keyser, supra note 73, at 301.
26
82
Podgor, supra note 17, at 18.
83
Id. at 21.
84
Id.
85
Id.
86
Ellen S. Podgor and Roger S. Clark, Understanding International Criminal Law, 14 (2nd ed.
LexisNexis 2008) (explaining that there are two ways in which U.S. laws can be enforced
extraterritorially. One is when Congress expressly states in a statute that it can be enforced
extraterritorially and the other, is when a court finds that Congress intended for the statute to be
enforced extraterritorially even though it was not explicitly stated in the context of the statute.).
87
Ivanov, supra note 75 at 370. In Ivanov, the federal district court found that extraterritorial
jurisdiction can apply even when not explicitly stated in a statute. Here, the court found that the
Ivanov accessed valuable computer files in Connecticut and so first possessed stolen property
taken from a protected computer (as defined by the plain language definition in the CFAA) in the
U.S. before sending it to Russia. Using this data, the Ivanov was able to control data, credit card
numbers, etc. from Russia and so, in addition to possessing stolen property, the theft of data and
credit card numbers had an adverse effect on U.S. nationals.
88
USA PATRIOT Act (U.S. H.R. 3162, P.L. 107-56), Title VIII § 814. Amended Computer
Fraud and Abuse Act of 1986, 18 U.S.C. § 1030(e).
89
Convention on Cybercrime, supra note 74, at art. 38, para. 2.
90
Rho, supra note 71, at 697.
91
Id.
92
Brown, supra note 10, at 180.
93
Ivanov, supra note 75, at 369 (citing Preston Gralla, How the Internet Works 9 (1999)).
94
Condron, supra note 26, at 409, n.47, n.52, n.53.
95
Id. (citing David R. Johnson and David Post, Law and Borders – The Rise of Law in Cyber
space, 48 STAN. L. REV. 1367, 1370 (1996)).
96
Podgor, supra note 17, at 21.
97
Podgor, supra note 86, at 20–1.
98
See S.S. Lotus (Fr. v. Turk.), 1927 P.C.I.J. (ser. A) No. 10 (Sept. 7).
27
99
See id.
100
See id.
101
Ivanov, supra note 75 at 370.
102
Podgor, supra note 86, at 21–2.
103
Podgor, supra note 17, at 19. Note that the special maritime and territorial jurisdiction is
defined statutorily and notably contains the following sections: 18 U.S.C. § 7(1): “The high seas,
any other waters within the admiralty and maritime jurisdiction of the United States and out of
the jurisdiction of any particular State, and any vessel belonging in whole or in part to the United
States or any citizen thereof, or o any corporation created by or under the laws of the United
Sates, or of any State, Territory, District, or possession thereof, when such vessel is within the
admiralty and maritime jurisdiction of the United States and out of the jurisdiction of any
particular State.” 18 U.S.C. § 7(7): “Any place outside the jurisdiction of any nation with respect
to an offense by or against a national of the United States. 18 U.S.C. § 7(8): “To the extent
permitted by international law, any foreign vessel having a scheduled depart from or arrival in
the United States with respect to an offense committee by or against a national of the United
States.”
104
Id. at 22.
105
Id. at 23.
106
Id.
107
The Paquete Habana, 175 U.S. 677 (1899).
108
Id. at 686.
109
Podgor, supra note 17, at 23.
110
Rho, supra note 71, at 709–10.
111
Id.
112
THE WHITE HOUSE, INTERNATIONAL STRATEGY FOR CYBERSPACE: PROSPERITY, SECURITY,
AND OPENNESS IN A NETWORKED WORLD 9 (May 2011) available at:
http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.
pdf.); See also John R. Crook, ed., Contemporary Practice of the United States Relating to
International Law, 105 A.J.I.L. 794, 794 (2011).
113
Id.
28
114
Hinkle, supra note 27, at 16 (citing Press Release, Senator Jim Web, Senate Condemns Cyber
Attack Against Google in China (Feb. 3, 2010), available at: http://webb.senate.gov/
newsroom/pressreleases/2010-01-29-03.cfm).
115
Corfu Channel, supra note 21 at 22. (“States have an obligation ‘not to allow knowingly
[their] territory to be used for acts contrary to the rights of other State.’”)
116
Rho, supra note 71, at 710.
117
Kiobel v. Royal Dutch Petroleum Co., 621 F.3d 111 (2d Cir. 2010) (citing prior history).
118
Rho, supra note 71, at 710.
119
Daniel J. Ryan, et al., International Cyberlaw: A Normative Approach, 42 Geo. J. Int'l L.
1161, 1167 (2011).
120
Id. at 1167, n.28.
121
Id. at 1167-68, n.33.
122
Tel-Oren v. Libyan Arab Republic, 726 F.2d 774, 806 (D.C. Cir. 1984).
123
Id.
124
Id.
125
Id.
126
Id.
127
RESTATEMENT (THIRD) OF THE FOREIGN RELATIONS LAW OF THE UNITED STATES, supra note
18, at § 101.
128
Duncan B. Hollis, An e-SOS for Cyberspace, 52 HARV. INT'L L.J. 373, 390 (2011).
129
M. Cherif Bassiouni and Christopher L. Blakesley, The Need for an International Criminal
Court in the New International World Order, 25 Vand. J. Transnat’l L 151, 156 (1992).
130
See S.S. Lotus (Fr. v. Turk.), 1927 P.C.I.J. (ser. A) No. 10 (Sept. 7).
131
Bassiouni, supra note 129, at 166.
132
Id. at 161.
133
Id.
29
134
Rome Statute of the International Criminal Court, July 17, 1998, U.N. Doc. A/CONF. 183/9;
See alsoAziz v. Alcolac, Inc., 658 F.3d 388, 398 (Md. 2011); See also Madeline H. Morris,
Universal Jurisdiction: Myths, Realities, and Prospects: Universal Jurisdiction in a Divided
World, 35 New Eng. L. Rev. 337, 349–50 (2001).
135
Supra section II.B.ii.
136
Rho, supra note 71, at 709–10.
137
Id. at 697.
138
Brown, supra note 10, at 180.
139
Ellen Nakashima, NSA’s Gen. Alexander: Companies should be required to fortify networks
against cyber attack, Washington Post, Checkpoint Washington Blog, 1:40pm ET, May 4, 2012,
available at: http://www.washingtonpost.com/blogs/checkpoint-washington/post/nsas-gen-
alexander-companies-should-be-required-to-fortify-networks-against-cyber
attack/2012/05/04/gIQA1Snf1T_blog.html (last accessed: May 6, 2012, 1:46pm ET).
140
Id.
141
H.R. 174, 112th Congress (2011).
142
Nakashima, supra note 139.
143
See NLRB v. Hearst Publs., 322 U.S. 111, 130 (1944).
144
H.R. 174 § 224(c), supra note 141.
145
18 USC § 7(9).
146
Supra Section II.a.ii.
147
Hollis, supra note 128, n.270 (citing the United Nations Convention on the Law of the Sea
art. 98, Dec. 10, 1982, 1833 U.N.T.S. 397 which stated that "[e]very State shall require the
master of a ship flying its flag, in so far as he can do so without serious danger to the ship, the
crew or the passengers ... to proceed with all possible speed to the rescue of persons in distress, if
informed of their need of assistance, in so far as such action may reasonably be expected of him .
. . .").
148
Black’s Law Dictionary 1466 (9th ed. 2009) (defining “high seas” as “[t]he seas or ocean
beyond the jurisdiction of any country.”); David S. Weitzel, Where No Lawyer Has Gone
Before? What A Cyberspace Attorney Can Learn from Space Law's Legacy , 10 CommLaw
Conspectus 191, 205 (2002) (citing Black's Law Dictionary 1307 (7th
ed. 1999) (defining “res”
as "an object, interest, or status, as opposed to a person . . . .")).
30
149
Supra Section II.C.
150
Podgor, supra note 86, at 78.
151
Morris, supra note 134, at 339–48.
152
Id. at 347-48.
153
Id. at 348.
154
Supra Section III.A.
155
Morris, supra note 134, at 338.
156
Supra Section I.
157
Law of the Sea Convention, art. 100, 110.
158
157 Cong Rec S 3206 (2011) (Ministerial Arctic Council Meeting where one discussion topic
was that the United States was the only country bordering the Arctic Ocean that was not a
member of the Law of the Sea Convention).
159
Crook, supra note 69, at 650.
160
Podgor, supra note 86, at 78 (citing Alfred P. Rubin, The Law of Piracy (2d ed. 1998)).
161
Id. (citing 18 U.S.C. § 7(1)).
162
18 USC § 1651.
163
18 USC § 7(1).
164
Black’s Law Dictionary, supra note 148, at 1466.
165
Brown, supra note 10, at 180.
166
Weitzel, supra note 148, at 205.

More Related Content

What's hot

source of international humanitarian law
source of international humanitarian lawsource of international humanitarian law
source of international humanitarian lawAshmita Acharya
 
Evolution of International Criminal Law
Evolution of International Criminal LawEvolution of International Criminal Law
Evolution of International Criminal LawNehaTripathi80
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William BoothbyHanah Croft
 
United Nations Convention Against Transnational Organized Crime.
United Nations Convention Against Transnational Organized Crime.United Nations Convention Against Transnational Organized Crime.
United Nations Convention Against Transnational Organized Crime.Minakshi Das
 
Lwn158 seminar 10
Lwn158 seminar 10 Lwn158 seminar 10
Lwn158 seminar 10 hollyranae
 
International criminal-law
International criminal-lawInternational criminal-law
International criminal-lawMainan Ray
 
The International Court of Justice
The International Court of JusticeThe International Court of Justice
The International Court of JusticeVanessa Rae Baculio
 
Jamros Writing Sample
Jamros Writing Sample Jamros Writing Sample
Jamros Writing Sample Caitlin Jamros
 
Lwn158 seminar 6 2016
Lwn158 seminar 6 2016Lwn158 seminar 6 2016
Lwn158 seminar 6 2016hollyranae
 
Defences under International Criminal Law
Defences under International Criminal LawDefences under International Criminal Law
Defences under International Criminal LawUniversity of Rajshahi
 
State Jurisdiction under International Criminal Law
State Jurisdiction under International Criminal LawState Jurisdiction under International Criminal Law
State Jurisdiction under International Criminal LawUniversity of Rajshahi
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi lawsbsookman
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...Ethan S. Burger
 
Law of Treaties - International Law
Law of Treaties  - International LawLaw of Treaties  - International Law
Law of Treaties - International LawA K DAS's | Law
 
Private Military Contractors Role In Iraq March Updated Revision For Publication
Private Military Contractors Role In Iraq March Updated Revision For PublicationPrivate Military Contractors Role In Iraq March Updated Revision For Publication
Private Military Contractors Role In Iraq March Updated Revision For PublicationVincent McNally
 
Llb ii pil u 4.2 state jurisdiction-terrotiry and extradition
Llb ii pil u 4.2 state jurisdiction-terrotiry and extraditionLlb ii pil u 4.2 state jurisdiction-terrotiry and extradition
Llb ii pil u 4.2 state jurisdiction-terrotiry and extraditionRai University
 
Lwn158 seminar 9 2016
Lwn158 seminar 9 2016Lwn158 seminar 9 2016
Lwn158 seminar 9 2016hollyranae
 

What's hot (19)

source of international humanitarian law
source of international humanitarian lawsource of international humanitarian law
source of international humanitarian law
 
Evolution of International Criminal Law
Evolution of International Criminal LawEvolution of International Criminal Law
Evolution of International Criminal Law
 
Dr William Boothby
Dr William BoothbyDr William Boothby
Dr William Boothby
 
United Nations Convention Against Transnational Organized Crime.
United Nations Convention Against Transnational Organized Crime.United Nations Convention Against Transnational Organized Crime.
United Nations Convention Against Transnational Organized Crime.
 
Lwn158 seminar 10
Lwn158 seminar 10 Lwn158 seminar 10
Lwn158 seminar 10
 
CV ATMD Political Science copy
CV ATMD Political Science copyCV ATMD Political Science copy
CV ATMD Political Science copy
 
International criminal-law
International criminal-lawInternational criminal-law
International criminal-law
 
The International Court of Justice
The International Court of JusticeThe International Court of Justice
The International Court of Justice
 
Jamros Writing Sample
Jamros Writing Sample Jamros Writing Sample
Jamros Writing Sample
 
Lwn158 seminar 6 2016
Lwn158 seminar 6 2016Lwn158 seminar 6 2016
Lwn158 seminar 6 2016
 
Defences under International Criminal Law
Defences under International Criminal LawDefences under International Criminal Law
Defences under International Criminal Law
 
State Jurisdiction under International Criminal Law
State Jurisdiction under International Criminal LawState Jurisdiction under International Criminal Law
State Jurisdiction under International Criminal Law
 
Presentation on hadopi laws
Presentation on hadopi lawsPresentation on hadopi laws
Presentation on hadopi laws
 
Crimes Of Sexual Violence
Crimes Of Sexual ViolenceCrimes Of Sexual Violence
Crimes Of Sexual Violence
 
2018 april - aba legal construct for understanding adversarial cyber activit...
2018 april  - aba legal construct for understanding adversarial cyber activit...2018 april  - aba legal construct for understanding adversarial cyber activit...
2018 april - aba legal construct for understanding adversarial cyber activit...
 
Law of Treaties - International Law
Law of Treaties  - International LawLaw of Treaties  - International Law
Law of Treaties - International Law
 
Private Military Contractors Role In Iraq March Updated Revision For Publication
Private Military Contractors Role In Iraq March Updated Revision For PublicationPrivate Military Contractors Role In Iraq March Updated Revision For Publication
Private Military Contractors Role In Iraq March Updated Revision For Publication
 
Llb ii pil u 4.2 state jurisdiction-terrotiry and extradition
Llb ii pil u 4.2 state jurisdiction-terrotiry and extraditionLlb ii pil u 4.2 state jurisdiction-terrotiry and extradition
Llb ii pil u 4.2 state jurisdiction-terrotiry and extradition
 
Lwn158 seminar 9 2016
Lwn158 seminar 9 2016Lwn158 seminar 9 2016
Lwn158 seminar 9 2016
 

Similar to Villard WritingSample Cybersecurity and International Law

Ames -- Memo (Cyber)
Ames -- Memo (Cyber)Ames -- Memo (Cyber)
Ames -- Memo (Cyber)Kyle Ames
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Pranav Gupta
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slidesdondiw
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document LeAnn Rhodes
 
Application of IHL to Computer Network Attacks
Application of IHL to Computer Network AttacksApplication of IHL to Computer Network Attacks
Application of IHL to Computer Network AttacksKonstantin Yakovlev
 
From the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionFrom the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionJeanmarieColbert3
 
Global Security Challenges of the 21st Century: Workshop on Cyber Crimes
Global Security Challenges of the 21st Century: Workshop on Cyber CrimesGlobal Security Challenges of the 21st Century: Workshop on Cyber Crimes
Global Security Challenges of the 21st Century: Workshop on Cyber CrimesMichelle Ribeiro
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseRepentSinner
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseAnonDownload
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense David Sweigert
 
Reliability not Reliance.
Reliability not Reliance.Reliability not Reliance.
Reliability not Reliance.George Briggs
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
 
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxREPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxchris293
 
Take home test il
Take home test ilTake home test il
Take home test ilFAROUQ
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
 

Similar to Villard WritingSample Cybersecurity and International Law (20)

Ames -- Memo (Cyber)
Ames -- Memo (Cyber)Ames -- Memo (Cyber)
Ames -- Memo (Cyber)
 
Self defence & Cyber Terrorism
Self defence & Cyber Terrorism Self defence & Cyber Terrorism
Self defence & Cyber Terrorism
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document CyberSecurity Challenge Decision Document
CyberSecurity Challenge Decision Document
 
Application of IHL to Computer Network Attacks
Application of IHL to Computer Network AttacksApplication of IHL to Computer Network Attacks
Application of IHL to Computer Network Attacks
 
From the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber EspionFrom the Cuckoo’s Egg to Global Surveillance Cyber Espion
From the Cuckoo’s Egg to Global Surveillance Cyber Espion
 
Global Security Challenges of the 21st Century: Workshop on Cyber Crimes
Global Security Challenges of the 21st Century: Workshop on Cyber CrimesGlobal Security Challenges of the 21st Century: Workshop on Cyber Crimes
Global Security Challenges of the 21st Century: Workshop on Cyber Crimes
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Bashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security LawBashar H. Malkawi, The Forum on National Security Law
Bashar H. Malkawi, The Forum on National Security Law
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Dni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefenseDni cyberwar, netwar, cyberdefense
Dni cyberwar, netwar, cyberdefense
 
Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense Cyber war netwar and the future of cyberdefense
Cyber war netwar and the future of cyberdefense
 
Reliability not Reliance.
Reliability not Reliance.Reliability not Reliance.
Reliability not Reliance.
 
Cyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia GCyber Espionage The Silent Crime of Cyberspace Virginia G
Cyber Espionage The Silent Crime of Cyberspace Virginia G
 
1.full
1.full1.full
1.full
 
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docxREPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
REPLY TO EACH POST 100 WORDS MIN EACH1. Throughout th.docx
 
Take home test il
Take home test ilTake home test il
Take home test il
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
 
ECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through BlacECON 202 Written AssignmentDue April 28th Submitted through Blac
ECON 202 Written AssignmentDue April 28th Submitted through Blac
 

Villard WritingSample Cybersecurity and International Law

  • 1. 1 Cybersecurity and International Law: A Hybrid Proposal to Place Partial Cyberspace Security Responsibility on Private Infrastructure Providers While Extending the Special Maritime and Territorial Jurisdiction to Cyberspace “A hacker needs no passport and passes no checkpoints”1 Bruce Villard University of Maryland Carey School of Law May 2012 I. Introduction Recent incidents involving cross-border intrusions into the Estonian and American computer systems and corporate entities have brought the nexus of international and cybersecurity law into the focus of many legal scholars and policy-makers.2 Over a three-week period in 2007, and shortly after Estonia moved a Russian war memorial away from the center of Tallinn (Estonia’s capital), Estonian government, banking, health, university, and other computer systems were overwhelmed by a denial of service attack, specifically “increasingly larger waves of data requests, rendering them inaccessible for long periods of time.”3 Corporations and government agencies in the United States are also, of course, vulnerable to cyber attacks, notably from China,4 which has developed specially-trained military units to mount such attacks.5 But, the Chinese government is not the only state to funnel resources into preparing to mount offensive cyber attacks. Research performed by the United States’ Government Accounting Office indicates that at least 120 countries are developing or have already developed such capabilities6 and the U.S. itself attempted to make use of such capabilities during the Kosovo conflict.7 Given the physical infrastructure risks as well as those denial-of-service attacks, a more thorough means of dissuading such activity through active prosecution needs to be developed. The U.S. has noted that laws and international collaboration on cybersecurity issues are not
  • 2. 2 keeping up with technology despite treaties such as the Council of Europe’s Convention on Cybercrime and various actions taken by the United Nations,8 and one way to address this problem is with a hybrid solution of incorporating the special maritime and territorial jurisdiction into the Convention on Cybercrime and placing some burden on private entities to maintain appropriate levels of security against cyber attacks. After reviewing the existing legal structure to address cyber attacks and its drawbacks, multiple solutions will be reviewed and analyzed, including the hybrid private entity burden - special maritime jurisdiction solution. The events described supra9 illustrate how attacks can damage data, and are often referred to as “Computer Network Attacks” or “CNAs.”10 Persons who initiate CNAs intend not only to cause disruption and denial of services (as seen in the cyber attack on Estonian computer systems), but also actually destroy information in computers and networks themselves.11 Cyber attacks, in some ways are an improvement over bombs and missiles in that cyber attacks can cause similar harm12 and do it without actually engaging an adversary in the traditional vision of a physical conflict.13 Specifically, cyber attacks can physically damage to infrastructure elements such public water and electric utilities by using a discrete cyber attack to remotely open a dam, cause a nuclear plant meltdown, or rupture an oil pipeline14 – just like a bomb or a missile.15 The fact that potential damage can occur to critical infrastructure, as well as data, in the private and public sectors, points to the need that “we must work towards building the rule of law, to prevent the risks of logging on from outweighing its benefits.”16 If the proposed solution is implemented in the future, it should further the work toward building this rule of law.
  • 3. 3 II. International Law Review While international law is generally based upon the agreement of multiple countries, there is a blurry line between actions that fall under the auspices of international criminal law and those that fall under the laws of war or the use of force.17 This section will discuss both, and will place some focus on jurisdiction and customary law as they play the biggest roles in cyberspace adjudication. In general, however, international law is that which is either a) accepted as customary law; b) is agreed to by international treaty or convention; or c) is derived from common legal principles.18 A. The Law Armed Conflict and Its Application to Cyberspace i. The Law of Armed Conflict The Law of Armed Conflict (“LOAC”) is derived principally from United Nations Charter Articles 2(4)19 and 51,20 as well as the seminal cases of Corfu Channel21 and Military and Paramilitary Activities In and Against Nicaragua.22 With two exceptions, the U.N. Charter states that members need to refrain from the using force.23 These exceptions, known as the right- to-war or jus ad bellum, are 1) when the U.N. Security Council authorizes the use of force pursuant to U.N. Charter Article 42,24 and 2) individual or collective self-defense under U.N. Charter Article 51.25 Self-defense can only be used when there is an armed attack26 - the definition of which engenders considerable tension. Traditionally, an “armed attack” meant that a party used conventional weapons – not cyber – to attack an adversary.27 However, the International Court of Justice (“I.C.J.”) has found that Articles (2)4 and 51 apply to the use of cyber, chemical, biological and similar forms of aggression – the I.C.J. found the type of weapon used to be irrelevant to its determination of what constituted an “armed attack.”28 Put another way, while
  • 4. 4 the original definition of an “armed attack” focused on the use of kinetic weapons, the standard changed to a results-oriented approach and instead focused on the effects on life and property.29 Especially noteworthy in the context of cybersecurity is that U.N. Charter Article 2(4) only applies to States and not to non-state actors.30 Terrorist attacks, for example, are prosecuted under criminal statutes instead of the laws of armed conflict even when a foreign national attacker stated that they were waging war against the state they attacked.”31 The distinctions between legitimate use of force in a self-defense contact and what actions cannot be considered self-defense can be seen in the Corfu Channel32 and Military and Paramilitary Activities In and Against Nicaragua 33 cases. In Corfu Channel, the Albanian military fired on two British warships, which were passing through the Corfu Channel off the coast of Albania in May 1946.34 The British warships were ostensibly asserting their right of free passage and also wanted to test the Albanian response.35 In October 1946, the British Navy sent four more ships through the channel and two of the ships struck mines.36 The Royal Navy commenced mine-clearing operations in November 1946.37 The I.C.J. declared that while the U.K. violated international law by sending armed ships into Albanian waters to remove mines, the I.C.J. did not expressly state the action to have violated Article 2(4).38 However, the I.C.J. did find Albania in violation of Article 2(4) by firing on the British ships because the ships had not attacked Albania.39 Similarly, in Military and Paramilitary Activities, the I.C.J. found that when Nicaragua assisted Salvadoran rebels by sending troops across the border from Nicaragua into El Salvador, the action was considered to be just a threat that the conflict might escalate and not an escalation itself. 40 At most, the action was considered to be meddling in El Salvador’s internal affairs.41
  • 5. 5 Either way, the I.C.J. held that the U.S. violated international law by assisting El Salvador because Nicaragua’s actions were not sufficient to warrant El Salvador’s self-defense response.42 ii. Application of the Law of Armed Conflict to Cyberspace There is tension among legal scholars and policy-makers on whether cybercrime and cybersecurity are synonymous and whether some actions should be treated under the LOAC or under criminal law. One school of thought is that actions should be categorized either as being a cybercrime or as a cyber attack (in the sense of terrorism or warfare). Scholars of this school say that within cyberspace, cybercrime is distinguished from cyber warfare by the perpetrator’s intent and effects of their actions and from this, courts can classify the action as a criminal or terrorist act.43 This distinction is significant because scholars who subscribe to this thinking further believe that criminal acts, are considered a domestic security issue and should be prosecuted under criminal statutes. 44 Conversely, cyber activity determined to be terrorism (by the perpetrator’s intent and effects of the act) can trigger a defensive posture by the attacked country.45 This triggering act then is considered to be a violation of the LOAC – even though the attack was carried out via cyber means as opposed to a conventional kinetic attack. 46 The intent and focus of a cyber terrorist is to destabilize a country and get publicity for their actions.47 This is in contrast to the intent of a cybercriminal, which, again according to scholars of this school of thought, is usually financial in nature – the theft of money, fraud, and sometimes the theft of information.48 This distinction remains in place even if the methods used to effect the attack (e.g., denial of service, virus, worm, etc.) is the same.49 Sometimes, however, distinguishing between cybercrime and cyber terrorism is difficult because the descriptive words, specifically “security,” and “defense,” are interchangeable;50
  • 6. 6 therefore, the line between the two is difficult to determine.51 This difficulty has led to the U.N.’s alternative school of thought, which is that cybercrime and cyberterrorism cannot be bifurcated, that there is a blurry line between crime and war,52 and that cybercrime and cyber terrorism issues cannot be separated because they are so interconnected.”53 Advocates for this school of thought have illustrated how indistinctive the line is between criminal actions and those that can be classified under the LOAC by highlighting how the military and civilians often work together to mount cyber attacks in environments (e.g., air-conditioned office buildings) that hardly resemble what one usually thinks of as a combat.54 Further, attackers do not even need to come physically close to their targets and can pretty much mount an attack from anywhere, even from a coffee shop, that has Internet access.55 Further blurring the line between what is considered to be a criminal act versus an act that falls under the LOAC is that the U.N. only considers attacks to be acts of war if the parties in conflict were sovereign states.56 For example, the U.N. does not consider the 2007 denial-of-service attack on Estonian government offices to be an act of war57 because there is no proof that the attack was initiated by a sovereign state – even though some view the whole incident as the first cyberwar attack.58 B. International Criminal Law International criminal law as applied to cyberspace is centered around two pieces of law: the Computer Fraud and Abuse Act (“CFAA”) in the United States, and the Council of Europe’s Convention on Cybercrime. Jurisdictional issues are often key factor in many international law disputes, including in the cybersecurity realm, so after this section’s focus on the CFAA and the Convention on Cybercrime, the following section59 will also draw a connection to the nexus between international law jurisdictional principals and cybersecurity.
  • 7. 7 i. Computer Fraud and Abuse Act The U.S. Computer Fraud and Abuse Act (“CFAA”) was enacted in 1984. The CFAA prohibits persons from “knowingly” accessing “without authorization or exceeding . . . authorized access.”60 Further, the CFAA characterizes the entities and types of data that are protected, including financial records, federal agencies or departments, and protected computers61 – defined as those affecting interstate or foreign commerce.62 ii. Council of Europe’s Convention on Cybercrime The Council of Europe’s Convention on Cybercrime (“Convention on Cybercrime”) came into being much later than the CFAA. The Convention on Cybercrime came into effect on July 1, 2004, is the lone international treaty which addresses Internet crimes.63 Further, despite its full name and origins in the Council of Europe, any state may join the Convention. 64 Unlike the CFAA, the Council of Europe’s Convention on Cybercrime is a non-self-executing treaty meaning that countries which ratify the treaty need to incorporate its terms into their own statutory schemes. Specifically, the Convention on Cybercrime mandates that signatories incorporate specific cybercrime offences into their criminal codes.65 These offenses include not only illegal access to and interference with a computer system, but also include unlawful data interception, forgery and fraud committed with the aid of a computer, and copyright infringement.66 The absence of a reference to terrorist-related acts as being covered by the Convention on Cybercrime is notable, especially in light of the U.N.’s definition of “cybercrime,” which includes a reference to such acts - specifically, that even when terrorists use computers to commit crimes, the acts are covered under the Convention on Cybercrime.67 Although European in origin and name, the Convention on Cybercrime is open to any country in the world which would like to join.68 Notably, the U.S. has ratified the Convention on
  • 8. 8 Cybercrime, and commenting on the ratification, Richard Beaird, a Department of State official responsible for international communications and information policy said in an April 2008 speech to the American Bar Association that the Convention on Cybercrime “offers the best legal framework for the international community.”69 Even more significantly, however, is that Mr. Beaird of the U.S. State Department also stated that nothing in U.S. statutory law (i.e., the CFAA), needs changing as a result of ratifying the Convention on Cybercrime.70 However, the Convention on Cybercrime suffers from a similar semantics problem as the LOAC. As interpreters of the LOAC have a difficult time articulating where the line is between crime and war, or whether there are any differences at all, so too does the Convention on Cybercrime have a definitional issue. Here, the major issue with the Convention on Cybercrime is that each member has a high degree of flexibility in determining what exactly constitutes a violation of the Convention on Cybercrime and further, because the Convention on Cybercrime is not self-executing, each member can keep the definitions they place into their own statutory regimes.71 Just in the European Union, for example, there is a wide range of definitions just for unauthorized access to a computer system. These include: (1) accessing computer systems where there has been some effort made to not permit open access; (2) requiring that actual damage to the penetrated system; to (3) showing a movement from a “basic hacking offense” to more serious offenses.72 C. The Nexus between Jurisdiction and Cybersecurity Jurisdiction plays a large role in cybersecurity law. A major difference between the CFAA and the Council of Europe’s Convention on Cybercrime is that the latter “provides for extraterritorial jurisdiction.”73 Specifically, article 22(4) requires that signatory countries enact
  • 9. 9 laws that provides jurisdiction over acts that violate the Convention on Cybercrime but which occur “outside the territory of the country but committed by one of its nationals.”74 How this plays out can be seen by comparing the outcome of the seminal case of Ivanov v. United States75 under the CFAA and what would have likely occurred had the Convention on Cybercrime existed at the time. From Russia, Aleksey Ivanov accessed a computer system in Connecticut that contained credit card and other valuable data.76 Ivanov tried to extort money from the owners in exchange for “security advice.” Some sources indicate that was sent to the U.S. by Russia per an extradition request,77 but other, more primary sources indicate he was convinced to come to the U.S. as part of an F.B.I. undercover operation.78 Regardless, Ivanov was successfully prosecuted and the prosecution was able to show that Congress intended the CFAA to apply extraterritorially.79 However, if the CFAA had an explicit clause granting extraterritorial jurisdiction (as occurred later as part of the PATRIOT Act discussed infra)80 or if the Convention on Cybercrime, with its extradition requirements, had been ratified by the U.S., then the prosecution would not have had to rely as heavily on showing legislative intent and Russian government cooperation.81 i. The Territorial and Nationality Jurisdictional Principles and Cybersecurity Two related international jurisdictional principles are the territorial and nationality principles. Territorial jurisdiction is the most common and is true to its name – that is that if the offense takes place within a state’s territory, then there is a firm foundation for claiming jurisdiction.82 In turn, jurisdiction outside of a state’s borders – also called “extraterritorial jurisdiction” – can be achieved via the nationality principle and is used specifically when a national commits an offense outside of the prosecuting country.83 The seminal example of the nationality principle is to prosecute American “sex tourists” who travel outside the U.S. to take
  • 10. 10 advantage of weak enforcement of child exploitation laws in other countries.84 Despite the offenses occurring outside of the U.S., under U.S. law, American prosecutors can still go after American nationals who commit these acts outside the U.S.85 and Congress can include extraterritorial enforcement provisions when creating or amending other laws as well.86 Although the CFAA was interpreted to apply extraterritorially in Ivanov v. U.S.,87 the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, otherwise known as the PATRIOT Act, explicitly extended the reach of the CFAA to allow for extraterritorial enforcement88 , and the Council of Europe’s Convention on Cybercrime also provides for extraterritorial jurisdiction.89 However, semantically, when an action is said to have occurred “extraterritorially,” it implies that it occurred in a geographic area – just one outside of the prosecuting country.90 But, cyberspace by its very nature is not confined by geographic boundaries91 and so the problem with applying territorial or extraterritorial jurisdiction is that “[c]yberspace is nowhere.”92 Significantly, the Internet uses packet switching technology where a piece of communication, for example an e-mail, is broken up into discreet packets by the sender’s internet service provider (“ISP”), sent over the Internet, and reassembled by the receiver’s ISP.93 The packets take the shortest electronic route, which may not be the shortest geographic route, and may cross multiple national physical borders during transmission, which essentially a space unconstrained by geographic borders.94 Therefore, trying to artificially overlay the geographical border implications of extraterritorial jurisdiction over cyberspace would be ineffective.95 ii. The Passive Personality or “Effects-Based” Jurisdictional Principle On the opposite side of the same coin of the nationality principle is the passive personality principle. In contrast to the nationality principle, where jurisdiction covers nationals
  • 11. 11 accused of crimes, the passive personality principle covers nationals who are victims of crimes.96 Specifically, the passive personality principle gives jurisdiction to the country on whose citizens effects were felt. It is often referred to as “effects-based” jurisdiction.97 The S.S. Lotus98 case is the seminal personality principle or effects-based jurisdiction case where the main controversy was whether Turkey had to show a rule that granted it permission to arrest a French ship skipper for alleged crimes, or whether the burden was on France to prove that Turkey was prohibited from doing so.99 In essence, S.S. Lotus stands for the concept that under international law, actions that are not specifically prohibited are allowed.100 Applied to cybercrime, the passive personality jurisdictional principle was one of the critical success factors in the prosecution in the Ivanov case. While the prosecution was able to show legislative intent that Congress meant for the CFAA to apply extraterritorially, the prosecution also was able to successfully get jurisdiction through the passive personality principle by showing that Alexsey Ivanov’s actions had adverse effects on U.S. nationals,101 so prosecutors do not have to necessarily rely on just one type of jurisdiction to be effective. iii. The Special Maritime and Territorial Jurisdictional Principle Significantly, there is a subset of the territorial-nationality jurisdiction called the “special maritime and territorial jurisdiction.”102 The U.S. has used special maritime and territorial jurisdiction to extend to other countries’ nationals on ships in other countries’ territorial waters when the ships have scheduled departures or arrivals in U.S. ports and when the victims were U.S. nationals.103 iv. Protective Jurisdictional Principle The protective principle is usually used to establish jurisdiction for espionage, official document falsification, and immigration and custom conspiracy prosecutions.104 This
  • 12. 12 jurisdictional principle has been interpreted very broadly and does not require a showing of an adverse affect within the U.S.105 v. Universality Jurisdictional Principle Universal jurisdiction is closely connected with customary law as it, along with international agreement, is one of two ways to establish jurisdiction using this principle.106 The seminal case for customary law is Paquete Habana107 where the court held that fishing vessels can continue working during wartime and cannot be captured because this it has been the custom of Navies worldwide for over 600 years to allow fishing vessels to go on with their business regardless of their nationality.108 Essentially, universal jurisdiction can be used when a law of “universal concern” or universal agreement is involved. Examples include “piracy, slave trade, attacks on or hijacking of aircraft,” and so forth.109 For prosecutors to make effective use of universal jurisdiction, they need to ensure that six factors are met.110 These six factors are: (1) countries uniformly agree that the act is unlawful; (2) the definition of the act is narrow and universally-accepted; (3) consequences for the act are consistent across national boundaries; (4) the accused refuses the protection of their country of citizenship; (5) domestic enforcement of the customary law in the location where the act occurred is difficult; and, (6) the harm resulting from the act is international in nature and affects more than one country.111 III. Proposed Solutions A. Greater Reliance on Customary Law Customary law is based on parties agreeing that certain acts are unlawful and is sometimes termed the “Rule of Norms.”112 In the cyberspace arena, a recent White House
  • 13. 13 cyberspace article cited the “Rule of Norms” and noted specifically that common definitions and understanding could go a long way toward creating the international law that governs cyberspace.113 In particular, when state actors are involved, some scholars believe that most countries would agree that state-sponsored cyber attacks are unlawful under customary international law.114 The unlawfulness of State-sponsored attacks is further highlighted by Corfu Channel’s key point that States cannot permit actions against other states to originate from their territory, which although occurring in the early 1900s, can be applied to argue that State- sponsored cyber attacks are unlawful.115 However, there are two primary drawbacks which preclude the effective application of customary international law to cybersecurity issues. The first of these is customary law’s requirement for a common viewpoint and common set of definitions116 and the second is the focus on state actors and the lack of customary law governance over non-state-actors,117 The need for all parties to have a common viewpoint on what acts are unlawful and have a common set of definitions is probably the most fatal drawback when trying to apply customary international law to cybersecurity issues.118 Specifically, a common definition for what exactly constitutes a cyberspace does not currently exist with sufficient specificity to become part of customary law.119 Cyberspace has been variously defined as, “an evolving man-made domain for the organization and transfer of data using various wavelengths of the electromagnetic spectrum”120 to a place where “exchanges of communications [occur] and content between users where the content is transported across the infrastructure. . . .”121 The significance of definitional disagreement in the customary law context is that the arguments of parties relying on customary law tend to be disregarded.122 Tel-Oren v. Libyan Arab Republic123 is the seminal case where customer law is shown to be ineffective when there is not a common consensus on key
  • 14. 14 definitions.124 In Tel-Oren, a father charged Libya with responsibility for killing his child on a civilian bus in Israel as a part of a terrorist act.125 The court dismissed the father’s claim partly because there was little international agreement as to the definition of terrorism.126 Another drawback of trying to apply customary law to cybersecurity is that customary law only applies to States or persons acting under the color of states unless the law specifically covers non-state actors.127 Since non-State or private actors can initiate cyber attacks as well as states themselves, such a gap in the law is a major drawback to relying on customary law to prosecute cybercrimes. For example, the FBI believes that Al-Qaeda might attempt to initiate a cyber attack in the future128 and so the U.S. government might have a difficult time pursuing a non-state actor such as Al-Qaeda in the courts under traditional customary law. B. Give the International Criminal Court Exclusive Jurisdiction Over Cybercrimes This idea has its origins in the Anti-Drug Abuse Act, which while did not provide the International Criminal Court (“ICC”) in The Hague with jurisdiction of international drug traffickers directly, did direct the President of the U.S. to begin negotiations on the creation of a court with this sort of jurisdiction.129 A similar court could be created for the prosecution of cybercrimes, or jurisdiction could be given to the existing International Criminal Court (“ICC”). The benefits of this proposal are mostly in the area of concurrent jurisdiction – that is where two or more States believe they should be able to prosecute a violation – similar to the S.S. Lotus130 case. Such a court, for example, has been used when the U.K., U.S., and Libya all wanted jurisdiction over prosecution over Pan Am 103 bomber and the compromise was to have the case tried in the ICC.131 However, as was the case in with the Pan Am bombing trial, there may be fear that a trial would not even take place or that the trial would not be effective.132 Additional drawbacks to
  • 15. 15 this solution include that the States to whom the parties of a cybersecurity case might belong might use the trial for political purposes or that the States might be unwilling to turn over suspects to the ICC and rather, try to shield them from international adjudication.133 Further, another major drawback of relying on the ICC is that the United States is not a signatory to the Rome Statute which established the ICC and therefore decisions from that court are not binding upon the United States.134 C. Prosecute Cybersecurity Violations under Universal Jurisdiction While it might be tempting for Convention on Cybercrime members to try and use universal jurisdiction, given the dispute noted previously on what “unauthorized access” means,135 the requirement for a uniform definition would be tough to meet in the cybersecurity context.136 D. Broaden the Definition of “Extraterritorial” to Include “Cyberspace” and Continue to Prosecute Cybercrimes under Extraterritorial Jurisdiction Currently, the Convention on Cybercrime as well as the CFAA (via the PATRIOT) Act explicitly leverage extraterritorial jurisdiction. The principle drawback of relying on this type of jurisdiction, as discussed supra, is that it implies that an offense occurred within a defined geographic space,137 but “cyberspace is nowhere,”138 so prosecutions could potentially be defeated on this ground. While somewhat simple and perhaps inelegant, one possible solution is to formally define extraterritorial jurisdiction as including cyberspace, or even more broadly as domains which are not limited or defined by geographic boundaries so as to possibly account for future technological developments that use something besides cyberspace. Advantages of this method include that it might be easier from a procedural standpoint to amend definitional sections in the U.N. Charter and Title 18 of the U.S. Code (which addresses
  • 16. 16 criminal activity) rather than specific treaties and statutes. This would further have the effect of applying the expanded definition more broadly to treaties and statues beyond the Convention on Cybercrime and the CFAA respectively. However, it would have the disadvantage of causing possible unintended and unknown consequences. This risk could be mitigated by limiting the expanded definition to just the Convention on Cybercrime and the CFAA. E. Place Partial Cyberspace Security Burden on Private Infrastructure Providers and Enforce Administratively Very recently, General Keith Alexander, the head of Cyberwarfare Command, referred to unspecified events that warrant the need for private companies that provide critical infrastructure to bear some of the burden for protecting the U.S. from cyber attacks.139 Gen. Alexander further discussed how he felt that leaving it to the free market to encourage critical infrastructure providers to provide this protection themselves probably is not adequate and so implied that the government needs to legislate enforcement.140 While Gen. Alexander did not refer to a specific bill, he was likely lending support to the “Homeland Security Cyber and Physical Protection Act of 2011”141 which, if enacted, will establish a Cybersecurity Compliance Division that in turn can promulgate regulations requiring critical infrastructure providers to meet certain likely high standards of cybersecurity protection.142 The advantages of this bill include that it is in line with general administrative law concepts that detailed rulemaking, especially in technically complex areas, should be left to the experts.143 Also, if regulations are enacted properly, they would cover domestic, as well as international cyber threats. The primary disadvantage, of course, is that as Sen. McCain pointed out, it would increase the regulatory burden on private companies in a struggling economy. This burden may be mitigated somewhat by section 224(c) of the bill that specifies that regulations should be made after looking at the risks involved including threats, vulnerabilities, and
  • 17. 17 consequences.144 This implies that rule makers will be tempered somewhat and only make regulations that truly are needed. F. Enhance the Convention on Cybercrime with Special Maritime and Territorial Jurisdiction Finally, a new proposal is to replace or add to the Council of Europe’s Convention on Cybercrime’s use of extraterritorial jurisdiction with special maritime and territorial jurisdiction. The advantage of the latter, is that a prosecuting entity can more easily gain jurisdiction over persons residing in a country other than the one prosecuting, regardless of who (e.g., a private person) or entity (e.g., embassy, consulate, or corporation).145 Further, this type of jurisdiction is generally expressly provided for in a statute leaving less room for dispute on how or should be applied. i. Cyber Attacks and Piracy: Parallels and Similarities The first of two major similarities between cyber attacks and piracy is that, as was seen in the Estonian case, it can be difficult to trace who exactly perpetrated an intrusion or cyber attack event.146 Similarly, pirates are difficult to track down because they either do not fly a nation’s flag (rather the pirates flag), or fly one that is not of their own.147 While this is addressed in the piracy case by applying universal jurisdiction, extending this thinking to the prosecution of cyber attack perpetrators is probably not wise given the drawbacks of universal jurisdiction discussed next. The second of two major similarities between cybercrime and piracy are that the venues for these crimes – specifically cyberspace and the high seas respectively – do not belong to or fall under the territorial jurisdiction of any one country.148 This means that to prosecute these crimes, forms of jurisdiction not based on territorial boundaries must be explored.149
  • 18. 18 Piracy is covered by universal jurisdiction,150 but applying universal jurisdiction to other areas of the law is risky and comes with severe drawbacks. The first of these is that it can be easy for lawmakers to create universal jurisdiction over customary law that truly is not customary.151 An example are the Terrorism Treaties drawn up in the 1970s and 1980s which addressed crimes that fall under the heading of “international terrorism” and include airline hijacking, terrorist bombings, torture, hostage-taking, and crimes that purposely impair maritime navigation.152 The problem was that there was no foundation for these crimes to be considered a part of customary law and so really were inappropriately covered under universal jurisdiction in the treaties153 and given that there are diverging opinions on what constitutes cybercrime and cyberspace,154 applying universal jurisdiction to here would be unwise. Another drawback of applying universal jurisdiction to laws beyond piracy is it is easy for lawmakers to exclude State action. Historically, piracy has always been considered a private action somewhat purposely to avoid creating conflicts between States.155 Applied to cybercrimes, it would be very easy to similarly write statutes that fall under universal jurisdiction but leave out the ability to prosecute States who are often thought to perpetrate cyber attacks.156 ii. Cybercrime and Piracy: Differences Outside of the U.S., piracy is enforced through the United Nations Convention on the Law of the Sea.157 However, unlike the Convention on Cybercrime, the United States is not a signatory of the Law of the Sea convention,158 so by having the Convention in Cybercrime in place makes actually puts the U.S. in a better position to tackle cybercrime on the international level because it has the backing of the “best legal framework of the international community” to help back it up.159
  • 19. 19 iii. Alternative: Special Maritime and Territorial Jurisdiction Given that Convention of Cybercrime is already in place and at least provides a foundation for prosecution of cyber attacks on the international level, but that exercise of universal and extraterritorial jurisdiction have drawbacks, the U.S. could suggest that the Convention on Cybercrime be modified, or in the alternative, make a reservation to use special maritime and territorial jurisdiction. Continuing the analogy to piracy, although U.S. legislation generally provides that prosecution of piracy falls under universal jurisdiction,160 the U.S. also may prosecute under the special maritime and territorial jurisdiction.161 The crime of piracy is defined as, “[w]hoever, on the high seas, commits the crime of piracy as defined by the law of nations . . . ,”162 and the special maritime and territorial jurisdiction includes the “high seas.”163 And, just as the “high seas” are not within the territorial jurisdiction of any country164 cyberspace, as discussed supra,165 the “place” where cybercrime occurs, not being a tangible place,166 also cannot be governed via traditional territorial jurisdiction. If the special maritime and territorial jurisdiction were similarly applied to cyber attacks, it would resolve the problem with extraterritorial jurisdiction being linked to geographic boundaries. Further, the special maritime jurisdiction does not have the problem of universal jurisdiction of being tied to customary law and in turn the problem with a range of definitions for cyber attacks and cyberspace. And, if the special maritime jurisdiction were to be integrated into the already existing base the U.S. has in being a member of the Convention on Cybercrime, which has been stated to be a good legal framework, it might be legislatively efficient as making an amendment is likely less burdensome than creating brand new law.
  • 20. 20 IV. Conclusion: Final Recommendation Rather than relying on the advantages of one of these single solutions, the best solution is a hybrid of the latter two – that is placing some burden on private entities that supply critical infrastructure as well as incorporating the special maritime and territorial jurisdiction into the Convention on Cybercrime so that their advantages can complement the other while mitigating the disadvantages of each. One major advantage is that a hybrid solution contains both the defensive elements of private infrastructure providers enhancing their security protocols while also providing the offensive elements of the likely more effective prosecution enabled by incorporating the special maritime and territorial jurisdiction into the Convention on Cybercrime. In addition, while Congress may have a difficult time enacting an organic statute that enables an existing agency to create new regulations as part of the private entity part of the hybrid solution, by showing that the government is also taking on some burden, specifically improving how crimes can be prosecuted under the already-existing Convention on Cybercrime, it will provide regulated businesses with a good faith indication that the government is taking responsibility as well. Finally, in addition to the benefits that each solution will provide individually, creating a public-private hybrid has the possible advantage of leveraging the significant skills of both the policy- and business- focused skills and resources of government agencies and the private sector, which could lead to significant efficiencies and creativity in improving existing and developing new defensive mechanisms as well and continuing to “play offense” effectively when required.
  • 21. 21 ENDNOTES 1 Janet Reno, U.S. Attorney General, Keynote Address on High-Tech and Computer Crime, Address at the P-8 Senior Experts’ Group on Transnational Organized Crime (Jan. 21, 1995), available at: http://www.irational.org/APD/CCIPS/agfranc.htm. 2 See Duncan B. Hollis, Why States Need an International Law for Information Operations, 11 LEWIS & CLARK L. REV. 1023,1024 (2007); Katharine C. Hinkle, Countermeasures in the Cyber Context: One More Thing to Worry About, YALE J. INT’L L.ONLINE 1, 13 (2011). 3 Id. (describing that the cyber attack on Estonia began on April 27, 2007, the day when Estonia moved a Russian war memorial from the center of Tallinn – Estonia’s capital. Although Estonia is no longer a part of the now-defunct Soviet Union, the Estonia is still home to a large Russian population who, along with the Russian government, objected to the move of the war memorial. Initially, the attack made Estonian government websites, including the Estonian Parliament’s email system, the President’s and Prime Minister’s offices, as well as the Foreign and Justice ministries, inaccessible for long periods of time making it a denial of service attack. The attack lasted three weeks and spread beyond government computers to include those belonging to financial institutions, Internet service providers, newspapers, television stations, and even telephone exchanges, which disabled critical “911” fire and rescue numbers. 4 Bradley Graham, Hackers Attack Via Chinese Web Sites, WASH. POST, Aug. 25, 2005, at A1. 5 Adam Levine, Millions spent defending Pentagon computers from attack, CNN (Apr. 7, 2009, 8:43 PM), http://www.cnn.com/2009/POLITICS/04/07/military.computers/index.html ?iref=allsearch. 6 Natasha Solce, The Battlefield of Cyberspace: The Inevitable New Military Branch – The Cyber Force, 18 ALB. L.J. SCI. & TECH. 293, 297 (2008). 7 Jason Barkham, Information Warfare and International Law on the Use of Force, 34 N.Y.U. J. INT’L L. & POL. 57, 62 (2001) (citing Elizabeth Becker, Pentagon Sets Up New Center for Waging Cyberwarfare, N.Y. TIMES, Oct. 8, 1999, at A16) (explaining that General Henry Shelton, who was chairman of the Joint Chiefs of Staff at the time of the Kosovo conflict, confirmed that the U.S. attempted to mount a cyber attack on Serbian computer networks. Further, other U.S. Government officials admitted that U.S. intelligence services mounted cyber attacks on the President of Yugoslavia’s bank accounts.). 8 Miriam F. Miquelon-Weisman, The Convention on Cybercrime: A Harmonized Implementation of International Penal Law: What Prospects for Procedural Due Process? 23 J. MARSHALL J. COMPUTER & INFO. L. 329, 335 (2005) (citing United Nations Crime and Justice Information Network, International Review of Criminal Policy – United Nations Manual on the Prevention and Control of Computer Related Crime P 5, available at: http://www.uncjin.org/ Documents/ EighthCongress.html). 9 Supra Section I.
  • 22. 22 10 Davis Brown, 47 HARV. INT’L L. REV. 179, 186 (2006) (citing JOINT CHIEFS OF STAFF, JOINT PUBL’N NO. 3-13, JOINT DOCTRINE FOR INFORMATION OPERATIONS I-9 TO -10 (Oct. 9, 1998). 11 Id. 12 Hollis, supra note 2, at 1031. 13 SUN TZU, THE ART OF WARFARE 111 (Robert G. Henricks ed., Roger T. Ames trans., Ballantine Books 1993). 14 Brown, supra note 10, at 187 (citing Eric Talbot Jensen, Computer Attacks on Critical National Infrastructure: A use of Force Invoking the Right of Self-Defense, 38 STAN. J. INT’L L. 207, 222 (2002)). 15 See White House, International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World 3 (2011), available at: http://www.whitehouse.gov/sites/default/files/ rss_viewer/international_strategy_for_cyberspace.pdf. 16 See id. 17 See ELLEN S. PODGOR AND ROGER S. CLARK, INTERNATIONAL CRIMINAL LAW 5 (2nd ed. LexisNexis 2008). 18 RESTATEMENT (THIRD) OF THE FOREIGN RELATIONS LAW OF THE UNITED STATES § 102(1) (1987). 19 U.N. Charter art. 2, para. 4. 20 U.N. Charter art. 51. 21 Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 22 (Apr. 9). 22 Military and Paramilitary Activities In and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J. 14, 195 (June 27). 23 U.N. Charter art. 2, para. 4 (“All members shall refrain in their international relations from the threat or use of force against territorial integrity or political independence . . . .”). 24 U.N. Charter art. 42 (There are two ways in which the United Nations permits war. Article 42 of the U.N. Charter is more commonly thought of as when war is authorized by the U.N. Security Council). 25 U.N. Charter art. 51; See also Sean M. Condron, Getting It Right: Protecting American Critical Infrastructure in Cyberspace, 20 HARV. J. LAW & TEC 404, 412–13 (2007) (clarifying how U.N. Charter art. 51 articulates the right of self-defense).
  • 23. 23 26 Sean M. Condron, Getting It Right: Protecting American Critical Infrastructure in Cyberspace, 20 HARV. J. LAW & TEC 404, 412–13 (2007). 27 Katharine C. Hinkle, Countermeasures in the Cyber Context: One More Thing to Worry About, YALE J. INT’L L. ONLINE 1, 1 n.1 (2011). 28 Condron, supra note 26, at 413. 29 Barkham, supra note 7, at 72. 30 Id. 31 Id. 32 Corfu Channel, supra note 21 at 22. 33 Military and Paramilitary Activities In and Against Nicaragua, supra note 22, at 195. 34 Barkham, supra note 7, at 70 (citing Corfu Channel, supra note 21 at 31, 50). 35 Id. (citing Corfu Channel, supra note 21 at 14, 28, 30). 36 Id. 37 Id. (citing Corfu Channel, supra note 21 at 19, 35). 38 Id. 39 Barkham, supra note 7, at 70 (citing Corfu Channel, supra note 21 at 19, 35). 40 Id. at 75 (citing Military and Paramilitary Activities In and Against Nicaragua, supra note 22, at 123). 41 Id. (citing Military and Paramilitary Activities In and Against Nicaragua, supra note 22, at 123). 42 Id. at 76 (citing Military and Paramilitary Activities In and Against Nicaragua, supra note 22, at 123). 43 Solce, supra note 6, at 300-1 (citing CARLOS A. RODRIGUEZ, CYBERTERRORISM – A RISING THREAT IN THE WESTERN HEMISPHERE 7 (2006)). 44 Condron, supra note 26, at 408. 45 Id.
  • 24. 24 46 Brown, supra note 10, at 188. 47 Solce, supra note 6, at 301 (citing Barry C. Collin, Inst. for Sec. and Intelligence, The Future of CyberTerrorism: Where the Physical and Virtual Worlds Converge, Remarks at the 11th Annual International Symposium on Criminal Justice Issues, http://afgen.com/terrorism1.html (last visited Apr. 11, 2008) (discussing the differences between cyber terrorists and cyber criminals)). 48 Brown, supra note 10, at 188. 49 Id. 50 Condron, supra note 26, at 408 (citing Roget’s II: THE NEW THESAURUS 248 (3d ed. 1995)). 51 Id. 52 See Podgor, supra note 17, at 5. 53 M. Gercke, INTERNATIONAL TELECOMMUNICATIONS UNION, UNDERSTANDING CYBERCRIME: A GUIDE FOR DEVELOPING COUNTRIES, at 17 (2011), available at: http://www.itu.int/ITU- D/cyb/cybersecurity/docs/ ITU_Guide_A5_14092011_rev.pdf. 54 Brown, supra note 10, at 183. 55 Solce, supra note 6, at 295. 56 Gerke, supra note 53, at 115. 57 Hollis, supra note 2 Lewis & Clark L. Rev. 1025 (citing Newly Nasty, supra note 5; Robert Anderson et al., US Warns Cyber-attacks Will Increase, Fin. Times, May 18, 2007, at 12.)) 58 Gerke, supra note 53, at 115. 59 Infra Section II.B.i. 60 Computer Fraud and Abuse Act of 1986, 18 U.S.C. § 1030(a)(1) (LexisNexis 2012). 61 18 U.S.C. § 1030(a)(2). 62 18 U.S.C. § 1030(a)(6)(A). 63 KU v. Finland, [2008] ECHR 2872/02 (2 December 2008). 64 Id.
  • 25. 25 65 Id. 66 Id. 67 Miquelon-Weisman, supra note 8, at 332. 68 Council of Europe Convention on Cybercrime, art. 36, para. 1. 69 John R. Crook, ed., Contemporary Practice of the United States Relating to International Law: U.S. Views on Norms and Structures for Internet Governance, 102 A.J.I.L. 648, 650 (2008) (citing Richard C. Beaird Sr., Deputy Coordinator for Int'l Communications and Information Policy, Perspectives on Internet Governance--What Might the Future Hold? (Apr. 11, 2008)). 70 Id. 71 Jennifer J. Rho, Blackbeards of the Twenty-First Century: Holding Cybercriminals Liable under the Alien Tort Statute, 7 CHI. J. INT’L L. 695, 707–08 (2007). 72 Id. 73 Mike Keyser, The Council of Europe Convention on Cybercrime, 12 J. Transnat'l L. & Pol'y 287, 301 (2003). 74 Council of Europe Convention on Cybercrime art. 22, para. 44. 75 United States v. Ivanov, 175 F. Supp. 2d 367 (D. Conn. 2001). 76 Id. at 369. 77 Keyser, supra note 73, at 301. 78 U.S. Dept. of Justice, “Russian Computer Hacker Convicted by Jury” October 10, 2001, available at: http://www.justice.gov/criminal/cybercrime/press- releases/2001/gorshkovconvict.htm (noting that Ivanov, along with two other men, one names Gorshkov, were convinced to travel to the U.S. by the FBI under the pretense of interviewing and demonstrating their hacking skills for a fake start-up company called “Invita.” Ivanov and the other men traveled to Seattle where they successfully demonstrated their hacking skills and were arrested.). 79 Ivanov, supra note 75, at 370. 80 Infra Section II.C.i. 81 Keyser, supra note 73, at 301.
  • 26. 26 82 Podgor, supra note 17, at 18. 83 Id. at 21. 84 Id. 85 Id. 86 Ellen S. Podgor and Roger S. Clark, Understanding International Criminal Law, 14 (2nd ed. LexisNexis 2008) (explaining that there are two ways in which U.S. laws can be enforced extraterritorially. One is when Congress expressly states in a statute that it can be enforced extraterritorially and the other, is when a court finds that Congress intended for the statute to be enforced extraterritorially even though it was not explicitly stated in the context of the statute.). 87 Ivanov, supra note 75 at 370. In Ivanov, the federal district court found that extraterritorial jurisdiction can apply even when not explicitly stated in a statute. Here, the court found that the Ivanov accessed valuable computer files in Connecticut and so first possessed stolen property taken from a protected computer (as defined by the plain language definition in the CFAA) in the U.S. before sending it to Russia. Using this data, the Ivanov was able to control data, credit card numbers, etc. from Russia and so, in addition to possessing stolen property, the theft of data and credit card numbers had an adverse effect on U.S. nationals. 88 USA PATRIOT Act (U.S. H.R. 3162, P.L. 107-56), Title VIII § 814. Amended Computer Fraud and Abuse Act of 1986, 18 U.S.C. § 1030(e). 89 Convention on Cybercrime, supra note 74, at art. 38, para. 2. 90 Rho, supra note 71, at 697. 91 Id. 92 Brown, supra note 10, at 180. 93 Ivanov, supra note 75, at 369 (citing Preston Gralla, How the Internet Works 9 (1999)). 94 Condron, supra note 26, at 409, n.47, n.52, n.53. 95 Id. (citing David R. Johnson and David Post, Law and Borders – The Rise of Law in Cyber space, 48 STAN. L. REV. 1367, 1370 (1996)). 96 Podgor, supra note 17, at 21. 97 Podgor, supra note 86, at 20–1. 98 See S.S. Lotus (Fr. v. Turk.), 1927 P.C.I.J. (ser. A) No. 10 (Sept. 7).
  • 27. 27 99 See id. 100 See id. 101 Ivanov, supra note 75 at 370. 102 Podgor, supra note 86, at 21–2. 103 Podgor, supra note 17, at 19. Note that the special maritime and territorial jurisdiction is defined statutorily and notably contains the following sections: 18 U.S.C. § 7(1): “The high seas, any other waters within the admiralty and maritime jurisdiction of the United States and out of the jurisdiction of any particular State, and any vessel belonging in whole or in part to the United States or any citizen thereof, or o any corporation created by or under the laws of the United Sates, or of any State, Territory, District, or possession thereof, when such vessel is within the admiralty and maritime jurisdiction of the United States and out of the jurisdiction of any particular State.” 18 U.S.C. § 7(7): “Any place outside the jurisdiction of any nation with respect to an offense by or against a national of the United States. 18 U.S.C. § 7(8): “To the extent permitted by international law, any foreign vessel having a scheduled depart from or arrival in the United States with respect to an offense committee by or against a national of the United States.” 104 Id. at 22. 105 Id. at 23. 106 Id. 107 The Paquete Habana, 175 U.S. 677 (1899). 108 Id. at 686. 109 Podgor, supra note 17, at 23. 110 Rho, supra note 71, at 709–10. 111 Id. 112 THE WHITE HOUSE, INTERNATIONAL STRATEGY FOR CYBERSPACE: PROSPERITY, SECURITY, AND OPENNESS IN A NETWORKED WORLD 9 (May 2011) available at: http://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace. pdf.); See also John R. Crook, ed., Contemporary Practice of the United States Relating to International Law, 105 A.J.I.L. 794, 794 (2011). 113 Id.
  • 28. 28 114 Hinkle, supra note 27, at 16 (citing Press Release, Senator Jim Web, Senate Condemns Cyber Attack Against Google in China (Feb. 3, 2010), available at: http://webb.senate.gov/ newsroom/pressreleases/2010-01-29-03.cfm). 115 Corfu Channel, supra note 21 at 22. (“States have an obligation ‘not to allow knowingly [their] territory to be used for acts contrary to the rights of other State.’”) 116 Rho, supra note 71, at 710. 117 Kiobel v. Royal Dutch Petroleum Co., 621 F.3d 111 (2d Cir. 2010) (citing prior history). 118 Rho, supra note 71, at 710. 119 Daniel J. Ryan, et al., International Cyberlaw: A Normative Approach, 42 Geo. J. Int'l L. 1161, 1167 (2011). 120 Id. at 1167, n.28. 121 Id. at 1167-68, n.33. 122 Tel-Oren v. Libyan Arab Republic, 726 F.2d 774, 806 (D.C. Cir. 1984). 123 Id. 124 Id. 125 Id. 126 Id. 127 RESTATEMENT (THIRD) OF THE FOREIGN RELATIONS LAW OF THE UNITED STATES, supra note 18, at § 101. 128 Duncan B. Hollis, An e-SOS for Cyberspace, 52 HARV. INT'L L.J. 373, 390 (2011). 129 M. Cherif Bassiouni and Christopher L. Blakesley, The Need for an International Criminal Court in the New International World Order, 25 Vand. J. Transnat’l L 151, 156 (1992). 130 See S.S. Lotus (Fr. v. Turk.), 1927 P.C.I.J. (ser. A) No. 10 (Sept. 7). 131 Bassiouni, supra note 129, at 166. 132 Id. at 161. 133 Id.
  • 29. 29 134 Rome Statute of the International Criminal Court, July 17, 1998, U.N. Doc. A/CONF. 183/9; See alsoAziz v. Alcolac, Inc., 658 F.3d 388, 398 (Md. 2011); See also Madeline H. Morris, Universal Jurisdiction: Myths, Realities, and Prospects: Universal Jurisdiction in a Divided World, 35 New Eng. L. Rev. 337, 349–50 (2001). 135 Supra section II.B.ii. 136 Rho, supra note 71, at 709–10. 137 Id. at 697. 138 Brown, supra note 10, at 180. 139 Ellen Nakashima, NSA’s Gen. Alexander: Companies should be required to fortify networks against cyber attack, Washington Post, Checkpoint Washington Blog, 1:40pm ET, May 4, 2012, available at: http://www.washingtonpost.com/blogs/checkpoint-washington/post/nsas-gen- alexander-companies-should-be-required-to-fortify-networks-against-cyber attack/2012/05/04/gIQA1Snf1T_blog.html (last accessed: May 6, 2012, 1:46pm ET). 140 Id. 141 H.R. 174, 112th Congress (2011). 142 Nakashima, supra note 139. 143 See NLRB v. Hearst Publs., 322 U.S. 111, 130 (1944). 144 H.R. 174 § 224(c), supra note 141. 145 18 USC § 7(9). 146 Supra Section II.a.ii. 147 Hollis, supra note 128, n.270 (citing the United Nations Convention on the Law of the Sea art. 98, Dec. 10, 1982, 1833 U.N.T.S. 397 which stated that "[e]very State shall require the master of a ship flying its flag, in so far as he can do so without serious danger to the ship, the crew or the passengers ... to proceed with all possible speed to the rescue of persons in distress, if informed of their need of assistance, in so far as such action may reasonably be expected of him . . . ."). 148 Black’s Law Dictionary 1466 (9th ed. 2009) (defining “high seas” as “[t]he seas or ocean beyond the jurisdiction of any country.”); David S. Weitzel, Where No Lawyer Has Gone Before? What A Cyberspace Attorney Can Learn from Space Law's Legacy , 10 CommLaw Conspectus 191, 205 (2002) (citing Black's Law Dictionary 1307 (7th ed. 1999) (defining “res” as "an object, interest, or status, as opposed to a person . . . .")).
  • 30. 30 149 Supra Section II.C. 150 Podgor, supra note 86, at 78. 151 Morris, supra note 134, at 339–48. 152 Id. at 347-48. 153 Id. at 348. 154 Supra Section III.A. 155 Morris, supra note 134, at 338. 156 Supra Section I. 157 Law of the Sea Convention, art. 100, 110. 158 157 Cong Rec S 3206 (2011) (Ministerial Arctic Council Meeting where one discussion topic was that the United States was the only country bordering the Arctic Ocean that was not a member of the Law of the Sea Convention). 159 Crook, supra note 69, at 650. 160 Podgor, supra note 86, at 78 (citing Alfred P. Rubin, The Law of Piracy (2d ed. 1998)). 161 Id. (citing 18 U.S.C. § 7(1)). 162 18 USC § 1651. 163 18 USC § 7(1). 164 Black’s Law Dictionary, supra note 148, at 1466. 165 Brown, supra note 10, at 180. 166 Weitzel, supra note 148, at 205.