SlideShare a Scribd company logo
1 of 18
Download to read offline
The Tallinn Manual: Identifying the International Law
Applicable to Cyber Operations
Suits and Spooks
11 January 2017
International Law in Cyberspace
• The Tallinn Process
• Responding to Cyber Attacks
Tallinn Manual
Events of 2007 & 2008
Tallinn Manual 2.0
• Broader	scope
• New	group	of	experts
• More	international
• External	drafting
• Peer	review
• State	involvement
– “Hague	Process”
Key Question for States
What can a State do in response to harmful
cyber operations beyond criminal law
enforcement?
If State involved?
If no State involved or involvement uncertain?
Self-defense
Nothing in the present Charter shall impair the
inherent right of individual or collective self-defense
if an armed attack occurs…” UN Charter, art. 51
• Shoot back kinetically OR with cyber
• Unclear whether applies to non-State actors
Application to Cyber?
Key: Is cyber op an “armed attack”?
• High threshold
• Tallinn Manual Suggested Answer: cyber op
intended to directly cause significant physical
damage to tangible objects or injury to humans
• Severe, non-destructive consequences?
• Political decision
“Below the Threshold”
Responses?
Tallinn 2.0
Option 1: Countermeasures
• States responsible for “internationally
wrongful acts”
• E.g., intervening by cyber means into internal
affairs of State (manipulating election returns)
• Opens door to countermeasures
• Response to cyber operation that would otherwise
be unlawful
• E.g., non-destructive “hack-back”
Countermeasures
• Only State actions or actions of non-State
actors legally attributable to States
• Designed only to get other side to stop
• No “in-kind” requirement OR requirement to
strike only attacker
• Must be proportionate
Internationally Wrongful Acts
• Cyber breach of sovereignty
• Physical damage
• Making a system do something not intended to
do?
• Placement of malware causing no damage, e.g.,
malware used to monitor activities?
• Due diligence obligation
• If harmful activities & does nothing, but could
• Opens door to response v. non-State actor ops
• Duty to monitor? Take action to prevent?
Internationally Wrongful Acts
• Cyber intervention
• Domaine Réservée
• Coercion
• State compelled to do something would not
otherwise do
• DNC hack & release to influence elections
• Cyber espionage
• Not unlawful…per se
• Method may be unlawful
• Consequence may be unlawful
Attribution
Non-State actors
• “On instructions of”
• Performing particular functions; auxiliary
• E.g., identifying vulnerabilities in cyber
infrastructure that State exploits
• “Direction or control”
• Acting on State’s behalf;
• Determines the execution and course of
cyber operations
• Not financial support, providing malware
Who May Conduct?
• No collective countermeasures
• E.g., NATO cannot engage in countermeasures
• Private entities may not conduct
countermeasures
• But State may turn to private industry to
conduct on its behalf
Examples
• State A violates State B’s sovereignty with cyber op
damaging private cyber infrastructure
• State B responds with cyber ops v. A’s government or private
sites
• Group under “effective control” of A does same
• B responds with cyber ops v. group or A’s government or
private industry
• Group in A not under A’s control does same
• Is State A in violation of due diligence obligations?
• If so, strike back at group or cyber infrastructure in A
Option 2: Plea of Necessity
• Only in exceptional cases
• Protection of essential interests of a State
against grave & imminent peril
• Shall not seriously impair essential interests
of affected States
• Opens door to hack-back
• Available in response to non-State actor
cyber ops OR technical attribution unreliable
Option 3:
Traditional Lawful Responses
• Domestic criminal law enforcement
• International criminal law enforcement
• Civil remedies
• Resort to international tribunals
• Negotiation & diplomacy
• Arbitration or mediation
• Retorsion (unfriendly, but lawful responses)
• E.g., shutting off access to cyber infrastructure
Conclusions
• It’s complicated, but…there is law
• Watch this space

More Related Content

What's hot

SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
sum of subset problem using Backtracking
sum of subset problem using Backtrackingsum of subset problem using Backtracking
sum of subset problem using BacktrackingAbhishek Singh
 
Amortized Analysis of Algorithms
Amortized Analysis of Algorithms Amortized Analysis of Algorithms
Amortized Analysis of Algorithms sathish sak
 
DSA (Data Structure and Algorithm) Questions
DSA (Data Structure and Algorithm) QuestionsDSA (Data Structure and Algorithm) Questions
DSA (Data Structure and Algorithm) QuestionsRESHAN FARAZ
 
Link list presentation slide(Daffodil international university)
Link list presentation slide(Daffodil international university)Link list presentation slide(Daffodil international university)
Link list presentation slide(Daffodil international university)shah alom
 
Queue as data_structure
Queue as data_structureQueue as data_structure
Queue as data_structureeShikshak
 
2 3 Trees Algorithm - Data Structure
2 3 Trees Algorithm - Data Structure2 3 Trees Algorithm - Data Structure
2 3 Trees Algorithm - Data StructureTish997
 
Introductory Digital Image Processing using Matlab, IIT Roorkee
Introductory Digital Image Processing using Matlab, IIT RoorkeeIntroductory Digital Image Processing using Matlab, IIT Roorkee
Introductory Digital Image Processing using Matlab, IIT RoorkeeVinayak Sahai
 
Software Security (Vulnerabilities) And Physical Security
Software Security (Vulnerabilities) And Physical SecuritySoftware Security (Vulnerabilities) And Physical Security
Software Security (Vulnerabilities) And Physical SecurityNicholas Davis
 
Steganography Project Research Ideas
Steganography Project Research  IdeasSteganography Project Research  Ideas
Steganography Project Research IdeasMatlab Simulation
 
Fractional Knapsack Problem
Fractional Knapsack ProblemFractional Knapsack Problem
Fractional Knapsack Problemharsh kothari
 
Data type list_methods_in_python
Data type list_methods_in_pythonData type list_methods_in_python
Data type list_methods_in_pythondeepalishinkar1
 
Lec 17 heap data structure
Lec 17 heap data structureLec 17 heap data structure
Lec 17 heap data structureSajid Marwat
 

What's hot (20)

Steganography
SteganographySteganography
Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
sum of subset problem using Backtracking
sum of subset problem using Backtrackingsum of subset problem using Backtracking
sum of subset problem using Backtracking
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Linked lists
Linked listsLinked lists
Linked lists
 
Amortized Analysis of Algorithms
Amortized Analysis of Algorithms Amortized Analysis of Algorithms
Amortized Analysis of Algorithms
 
DSA (Data Structure and Algorithm) Questions
DSA (Data Structure and Algorithm) QuestionsDSA (Data Structure and Algorithm) Questions
DSA (Data Structure and Algorithm) Questions
 
Data Structure (Queue)
Data Structure (Queue)Data Structure (Queue)
Data Structure (Queue)
 
Link list presentation slide(Daffodil international university)
Link list presentation slide(Daffodil international university)Link list presentation slide(Daffodil international university)
Link list presentation slide(Daffodil international university)
 
Queue as data_structure
Queue as data_structureQueue as data_structure
Queue as data_structure
 
2 3 Trees Algorithm - Data Structure
2 3 Trees Algorithm - Data Structure2 3 Trees Algorithm - Data Structure
2 3 Trees Algorithm - Data Structure
 
Mask R-CNN
Mask R-CNNMask R-CNN
Mask R-CNN
 
Introductory Digital Image Processing using Matlab, IIT Roorkee
Introductory Digital Image Processing using Matlab, IIT RoorkeeIntroductory Digital Image Processing using Matlab, IIT Roorkee
Introductory Digital Image Processing using Matlab, IIT Roorkee
 
BINARY SEARCH TREE
BINARY SEARCH TREEBINARY SEARCH TREE
BINARY SEARCH TREE
 
Software Security (Vulnerabilities) And Physical Security
Software Security (Vulnerabilities) And Physical SecuritySoftware Security (Vulnerabilities) And Physical Security
Software Security (Vulnerabilities) And Physical Security
 
Steganography Project Research Ideas
Steganography Project Research  IdeasSteganography Project Research  Ideas
Steganography Project Research Ideas
 
Fractional Knapsack Problem
Fractional Knapsack ProblemFractional Knapsack Problem
Fractional Knapsack Problem
 
Data type list_methods_in_python
Data type list_methods_in_pythonData type list_methods_in_python
Data type list_methods_in_python
 
Lec 17 heap data structure
Lec 17 heap data structureLec 17 heap data structure
Lec 17 heap data structure
 

Similar to Tallinn manual 2.0 Prof. Michael Schmitt

Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 
Revisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurityRevisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurityMaarten Van Horenbeeck
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?Mercatus Center
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...Benjamin Ang
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technologyorrenprunckun
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...MIT Startup Exchange
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinAFCEA International
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of GovernmentsRobbie Mitchell
 
ILG CERT Presentation Final
ILG CERT Presentation FinalILG CERT Presentation Final
ILG CERT Presentation FinalJon Praed
 
2019 Youth ResearchEdge Competition Winners
2019 Youth ResearchEdge Competition Winners2019 Youth ResearchEdge Competition Winners
2019 Youth ResearchEdge Competition WinnersOECD Governance
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentInternet Law Center
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its DiscontentsMsifry
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14ACFCS
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 

Similar to Tallinn manual 2.0 Prof. Michael Schmitt (20)

Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 
Revisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurityRevisiting the state: why governments are interested in cybersecurity
Revisiting the state: why governments are interested in cybersecurity
 
Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?What Should We Do about Cyber Attacks?
What Should We Do about Cyber Attacks?
 
International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...International Cooperation to Impose Consequences for Malicious Cyber Activity...
International Cooperation to Impose Consequences for Malicious Cyber Activity...
 
Chapter14
Chapter14Chapter14
Chapter14
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
Building Trust in a Tense Information Society, Daniel Weitzner, Director, MIT...
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
An Internet of Governments
An Internet of GovernmentsAn Internet of Governments
An Internet of Governments
 
ILG CERT Presentation Final
ILG CERT Presentation FinalILG CERT Presentation Final
ILG CERT Presentation Final
 
2019 Youth ResearchEdge Competition Winners
2019 Youth ResearchEdge Competition Winners2019 Youth ResearchEdge Competition Winners
2019 Youth ResearchEdge Competition Winners
 
Cyber Security Agenda for 45th President
Cyber Security Agenda for 45th PresidentCyber Security Agenda for 45th President
Cyber Security Agenda for 45th President
 
Internet Freedom and its Discontents
Internet Freedom and its DiscontentsInternet Freedom and its Discontents
Internet Freedom and its Discontents
 
Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14Gac, money flow, ds, ar, 2 26-14
Gac, money flow, ds, ar, 2 26-14
 
Internet Censorship
Internet CensorshipInternet Censorship
Internet Censorship
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Cyber2
Cyber2Cyber2
Cyber2
 

Recently uploaded

Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书irst
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdfTodd Spodek
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理e9733fc35af6
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理A AA
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理F La
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理Airst S
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理bd2c5966a56d
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaYash
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理F La
 

Recently uploaded (20)

Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
一比一原版(KPU毕业证书)加拿大昆特兰理工大学毕业证如何办理
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
 
Reason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in IndiaReason Behind the Success of Law Firms in India
Reason Behind the Success of Law Firms in India
 
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
一比一原版(TheAuckland毕业证书)新西兰奥克兰大学毕业证如何办理
 

Tallinn manual 2.0 Prof. Michael Schmitt

  • 1. The Tallinn Manual: Identifying the International Law Applicable to Cyber Operations Suits and Spooks 11 January 2017
  • 2. International Law in Cyberspace • The Tallinn Process • Responding to Cyber Attacks
  • 4. Tallinn Manual 2.0 • Broader scope • New group of experts • More international • External drafting • Peer review • State involvement – “Hague Process”
  • 5. Key Question for States What can a State do in response to harmful cyber operations beyond criminal law enforcement? If State involved? If no State involved or involvement uncertain?
  • 6. Self-defense Nothing in the present Charter shall impair the inherent right of individual or collective self-defense if an armed attack occurs…” UN Charter, art. 51 • Shoot back kinetically OR with cyber • Unclear whether applies to non-State actors
  • 7. Application to Cyber? Key: Is cyber op an “armed attack”? • High threshold • Tallinn Manual Suggested Answer: cyber op intended to directly cause significant physical damage to tangible objects or injury to humans • Severe, non-destructive consequences? • Political decision
  • 9. Option 1: Countermeasures • States responsible for “internationally wrongful acts” • E.g., intervening by cyber means into internal affairs of State (manipulating election returns) • Opens door to countermeasures • Response to cyber operation that would otherwise be unlawful • E.g., non-destructive “hack-back”
  • 10. Countermeasures • Only State actions or actions of non-State actors legally attributable to States • Designed only to get other side to stop • No “in-kind” requirement OR requirement to strike only attacker • Must be proportionate
  • 11. Internationally Wrongful Acts • Cyber breach of sovereignty • Physical damage • Making a system do something not intended to do? • Placement of malware causing no damage, e.g., malware used to monitor activities? • Due diligence obligation • If harmful activities & does nothing, but could • Opens door to response v. non-State actor ops • Duty to monitor? Take action to prevent?
  • 12. Internationally Wrongful Acts • Cyber intervention • Domaine Réservée • Coercion • State compelled to do something would not otherwise do • DNC hack & release to influence elections • Cyber espionage • Not unlawful…per se • Method may be unlawful • Consequence may be unlawful
  • 13. Attribution Non-State actors • “On instructions of” • Performing particular functions; auxiliary • E.g., identifying vulnerabilities in cyber infrastructure that State exploits • “Direction or control” • Acting on State’s behalf; • Determines the execution and course of cyber operations • Not financial support, providing malware
  • 14. Who May Conduct? • No collective countermeasures • E.g., NATO cannot engage in countermeasures • Private entities may not conduct countermeasures • But State may turn to private industry to conduct on its behalf
  • 15. Examples • State A violates State B’s sovereignty with cyber op damaging private cyber infrastructure • State B responds with cyber ops v. A’s government or private sites • Group under “effective control” of A does same • B responds with cyber ops v. group or A’s government or private industry • Group in A not under A’s control does same • Is State A in violation of due diligence obligations? • If so, strike back at group or cyber infrastructure in A
  • 16. Option 2: Plea of Necessity • Only in exceptional cases • Protection of essential interests of a State against grave & imminent peril • Shall not seriously impair essential interests of affected States • Opens door to hack-back • Available in response to non-State actor cyber ops OR technical attribution unreliable
  • 17. Option 3: Traditional Lawful Responses • Domestic criminal law enforcement • International criminal law enforcement • Civil remedies • Resort to international tribunals • Negotiation & diplomacy • Arbitration or mediation • Retorsion (unfriendly, but lawful responses) • E.g., shutting off access to cyber infrastructure
  • 18. Conclusions • It’s complicated, but…there is law • Watch this space