{"id":13251,"date":"2021-04-16T08:00:27","date_gmt":"2021-04-16T06:00:27","guid":{"rendered":"https:\/\/voelkerrechtsblog.org\/?p=13251"},"modified":"2021-04-20T20:57:45","modified_gmt":"2021-04-20T18:57:45","slug":"cyber-space-sovereignty-and-the-intricacies-of-international-law-making","status":"publish","type":"post","link":"https:\/\/voelkerrechtsblog.org\/de\/cyber-space-sovereignty-and-the-intricacies-of-international-law-making\/","title":{"rendered":"Cyber Space, Sovereignty and the Intricacies of International Law-Making"},"content":{"rendered":"<p>On March 5th, 2021, Germany published its <a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;ved=2ahUKEwif1au299XvAhUH_qQKHQ2mAqMQFjABegQIAxAD&amp;url=https%3A%2F%2Fwww.auswaertiges-amt.de%2Fblob%2F2446304%2F2ae17233b62966a4b7f16d50ca3c6802%2Fon-the-application-of-international-law-in-cyberspace-data.pdf&amp;usg=AOvVaw0Cx_hWT_PzmlEX1F7UnOQO\">position paper<\/a> \u201cOn the application of International Law in Cyberspace\u201d. The inter-ministerial document stipulates Germany\u2019s views on the rules regulating state activity in cyberspace in a concise, well-founded and comprehensive manner. For this, Germany has been applauded by <a href=\"https:\/\/www.justsecurity.org\/75242\/germanys-positions-on-international-law-in-cyberspace\/\">leading scholars<\/a> in the field.<\/p>\n<p>This blogpost highlights and critically assesses two issues raised in the position paper. First, it delves into the multi-layered protection of sovereignty advanced by Germany. Then, the blogpost \u00a0unravels Germany\u2019s methodological approach to the rule of territorial sovereignty. Based on these two assessments, the position paper is situated within the intricate process of shaping the rules protecting sovereignty in cyber space.<\/p>\n<p><strong>Current Developments in the International Law of Cyberspace<\/strong><\/p>\n<p>The rules of international law applicable in cyberspace have been under discussion by states throughout the last years. The majority of negotiations and deliberations take place within the <a href=\"https:\/\/www.un.org\/disarmament\/group-of-governmental-experts\/\">United Nations Group of Governmental Experts on Advancing responsible State behaviour in cyberspace in the context of international security<\/a> (GGE) and <a href=\"https:\/\/www.un.org\/disarmament\/open-ended-working-group\/\">the Open-ended Working Group on developments in the field of information and telecommunications in the context of international security<\/a> (OEWG). The GGE published widely acknowledged and referenced reports in <a href=\"https:\/\/undocs.org\/A\/68\/98\">2013<\/a> and <a href=\"https:\/\/undocs.org\/A\/70\/174\">2015<\/a>. However, the recent sessions of the GGE have <a href=\"https:\/\/www.justsecurity.org\/75278\/germanys-positions-on-international-law-in-cyberspace-part-ii\/\">not yielded results<\/a> due to controversies among the member states. Similarly, the <a href=\"https:\/\/front.un-arm.org\/wp-content\/uploads\/2021\/03\/Final-report-A-AC.290-2021-CRP.2.pdf\">OEWG\u2019s final report<\/a>, published only shortly after the German position paper, is rather thin on international law (paras. 34-40). It briefly restates that international law applies to cyberspace and only calls upon states to deepen their understanding on the matter. It does not contribute to the current contentious questions in the field.<\/p>\n<p>Against the backdrop of this temporary impasse at the multilateral level, states have moved to publish their views on the applicable law in cyberspace unilaterally. Since 2019 alone, <a href=\"https:\/\/www.dfat.gov.au\/publications\/international-relations\/international-cyber-engagement-strategy\/aices\/chapters\/part_4_international_security_and_cyberspace.html\">Australia<\/a>, <a href=\"https:\/\/www.president.ee\/en\/official-duties\/speeches\/15241-president-of-the-republic-at-the-opening-of-cycon-2019\/index.html\">Estonia<\/a>, Finland <a href=\"https:\/\/www.defense.gouv.fr\/content\/download\/567648\/9770527\/file\/international+law+applied+to+operations+in+cyberspace.pdf\">France<\/a>, <a href=\"https:\/\/www.ejiltalk.org\/israels-perspective-on-key-legal-and-practical-issues-concerning-the-application-of-international-law-to-cyber-operations\/\">Israel<\/a>, Iran, <a href=\"https:\/\/www.government.nl\/documents\/parliamentary-documents\/2019\/09\/26\/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace\">the Netherlands<\/a>, <a href=\"https:\/\/dpmc.govt.nz\/publications\/application-international-law-state-activity-cyberspace\">New Zealand<\/a>, the <a href=\"https:\/\/www.gov.uk\/government\/speeches\/cyber-and-international-law-in-the-21st-century\">United Kingdom<\/a>, the <a href=\"https:\/\/www.defense.gov\/Newsroom\/Speeches\/Speech\/Article\/2099378\/dod-general-counsel-remarks-at-us-cyber-command-legal-conference\/\">United States<\/a>, and NATO have either published written positions or addressed the issue in public speeches through leading government officials. The German position paper adds to the effort of using unilateral declarations as well as multilateral fora to clarify international law\u2019s application in cyberspace.<\/p>\n<p>In Germany\u2019s view, existing international law <a href=\"https:\/\/www.ejiltalk.org\/old-habits-die-hard-applying-existing-international-law-in-cyberspace-and-beyond\/\">applies<\/a> to state activity in cyberspace. The title already reflects this firm position reading \u201cOn the Applicat<em>ion<\/em>\u201d rather than \u201cOn the Applic<em>ability<\/em>\u201d, rejecting arguments of a \u201c<a href=\"https:\/\/www.justsecurity.org\/67723\/the-application-of-international-law-to-cyberspace-sovereignty-and-non-intervention\/\">legal vacuum<\/a>\u201d in cyberspace. Accordingly, the German position paper comprehensively outlines the content and modalities through which international law applies to cyber operations, covering general International Law, International Humanitarian Law and the Law of State Responsibility. Michael Schmitt has already provided a thorough analysis of these positions within the ongoing discussions (<a href=\"https:\/\/www.justsecurity.org\/75242\/germanys-positions-on-international-law-in-cyberspace\/\">here<\/a> and <a href=\"https:\/\/www.justsecurity.org\/75278\/germanys-positions-on-international-law-in-cyberspace-part-ii\/\">here<\/a>). Therefore, this analysis will take a closer look at two specific issues.<\/p>\n<p><strong>The Multi-Layered Protection of Sovereignty<\/strong><\/p>\n<p>Section II (p. 2 ff.) of the position paper discusses the three rules protecting state sovereignty. The gravest violation of a state\u2019s sovereignty, a violation of the prohibition of the use of force, uncontroversially applies to cyber operations. Germany takes the view that cyber operations constitute a use of force if their \u201cscale and effect\u201d are comparable to the use of kinetic weapons. This is in line with the ICJ\u2019s reasoning in the <a href=\"https:\/\/www.icj-cij.org\/public\/files\/case-related\/70\/070-19860627-JUD-01-00-EN.pdf\">Nicaragua judgment <\/a>(para. 195), where it held that an armed attack could be distinguished from a mere frontier incident based on its scale and effects. Accordingly, the physical impact of a measure is key to determine whether it surpasses the threshold of a prohibited use of force. <a href=\"https:\/\/www.justsecurity.org\/75278\/germanys-positions-on-international-law-in-cyberspace-part-ii\/\">Australia, Finland, the Netherlands, and New Zealand<\/a> have likewise adopted this standard.<\/p>\n<p>The position paper applies the same standard to the second layer of the protection of sovereignty, the prohibition of wrongful intervention. Accordingly, a violation of the prohibition of wrongful intervention can be assumed if the impact of a cyber-operation is \u201ccomparable in scale and effect to coercion in non-cyber contexts\u201d. This in turn implies \u201cthat a State\u2019s internal processes regarding aspects pertaining to its domaine r\u00e9serv\u00e9 are significantly influenced or thwarted and that its will is manifestly bent by the foreign State\u2019s conduct.\u201d This clear position is notable. With regard to the prohibition of the use of force, the scale and effect doctrine draws on the reasoning of the Nicaragua judgment and is largely accepted as the pertinent standard for determining a use of force. In contrast, no international judgment or authoritative resolution establishes a standard for the determination of coercion. The Nicaragua judgment merely affirms that the prohibition of wrongful intervention protects the right of a state to decide freely on matters pertaining to its domaine r\u00e9serv\u00e9 (para. 205). Consequently, several contradictory theories (<a href=\"https:\/\/www.nyujilp.org\/wp-content\/uploads\/2020\/01\/NYI101.pdf\">here<\/a> and <a href=\"https:\/\/www.peterlang.com\/view\/title\/65662?format=EPDF\">here<\/a>) on measuring coercion exist and states rarely explain what standard they apply when determining whether a state is thwarted from deciding freely on a manner in its domaine r\u00e9serv\u00e9. Placing the scale and effect of a measure of interference \u2013 and thus its impact on the exercise of a state\u2019s free will \u2013 at the center of an assessment of coercion, is only one of the possible options. Other approaches focus on the intent of the influencing state, the means of influence employed, and\/or the reaction of the influenced state (find an excellent overview <a href=\"https:\/\/www.nomos-shop.de\/rombach-wissenschaft\/titel\/?tx_girashop_f210_1%5Bproduct%5D=68102&amp;tx_girashop_f210_1%5Baction%5D=show&amp;tx_girashop_f210_1%5Bcontroller%5D=Product&amp;cHash=8451db854be76ce7e72b38d48e6d82e9\">here<\/a>). Therefore, Germany\u2019s clear position on this question is significant both in the cyber context and beyond.<\/p>\n<p>Germany demonstrates the pertinence of the \u201cscale and effect\u201d standard with regard to the controversial question of foreign electoral interference (p.5). The conduct of elections is without doubt an aspect pertaining to a states domaine r\u00e9serv\u00e9. However, influences in electoral processes have been <a href=\"https:\/\/www.cambridge.org\/core\/journals\/israel-law-review\/article\/information-operations-and-the-question-of-illegitimate-interference-under-international-law\/60096A88BD9BBCEF8CF15ADE0EF89B5D\">common, manifold and to some extent accepted<\/a> throughout history. Dividing illegal interventions from legal influences is, hence, a difficult task. According to Germany, for an interference to pass the threshold of coercion, it must \u201csignificantly imped[e] the orderly conduct of an election\u201d. The three envisioned modalities are, first, the impairment of electoral infrastructure that significantly modifies electoral results, second, disinformation campaigns via the internet that incite violent political upheaval, riots or civil strife, and, third, cyber activities that substantively disturb the political system by i.e. disenfranchising significant groups of citizens from voting. The impact of these three measures is sufficiently grave that the electoral process does not result in the proper expression of the electorate\u2019s will. Therefore, a state cannot exercise its sovereign right to freely determine its own government. Its sovereignty is thwarted. Requiring a significant impediment of the conduct of an election is thus a pertinent application of the coercion threshold to electoral interference.<\/p>\n<p><strong>The Rule of Territorial Sovereignty<\/strong><\/p>\n<p>Additionally, Germany envisions a third rule protecting sovereignty in cyberspace below the prohibition of wrongful intervention. According to the rule of territorial sovereignty all states have the exclusive right to fully exercise their authority on their territory. Germany considers cyber operations to violate this rule if they produce \u201cphysical effects and harm\u201d or cause \u201cfunctional impairments\u201d to <a href=\"https:\/\/voelkerrechtsblog.org\/de\/eye-on-the-spy\/\">cyber infrastructure on the territory of a state<\/a>, particularly if this infrastructure is considered critical.<\/p>\n<p>Viewing sovereignty not only as a principle but also as a rule has <a href=\"https:\/\/www.justsecurity.org\/75242\/germanys-positions-on-international-law-in-cyberspace\/\">gained traction<\/a> among states in recent years. Its conception is a reaction to the realities of state interaction in cyber space, where most state cyber operations do not breach the threshold of a use of force or coercion. Nonetheless, states wish to outlaw operations that disrupt or impair their cyber infrastructure, even if the exercise of their free will is not significantly impaired. To this end, they have been advocating for the recognition of the rule of territorial sovereignty. While this seems reasonable at first glance, a rule of territorial sovereignty can dilute the prohibition of wrongful intervention if the scope of the rule is not sufficiently restricted. This could be a critical development, as an extensive understanding of coercion could prohibit other low intensity interferences, such as democracy promotion, which Germany frequently engages in. The delimitation between the rule of territorial sovereignty and the prohibition of wrongful intervention thus merits a closer look.<\/p>\n<p>To establish the rule of territorial sovereignty, the German position paper refers to the sovereign right of every state to freely choose its political, social, economic, and cultural system, which includes the field of information and communication technologies. This assertion is without doubt correct. However, it is precisely the definition employed by the Nicaragua judgment (para. 205) and the Friendly Relations Declaration for the domaine r\u00e9serv\u00e9 of states. Germany only restricts the rule of territorial sovereignty with regard to the intensity of physical effects and functional impairments, excluding negligible impacts from violating the rule. This restriction, being something of a coercion \u201clight\u201d standard, barely restricts the scope of the rule of territorial sovereignty vis-\u00e0-vis the prohibition of wrongful intervention. <em>Ratione materiae<\/em> both rules overlap, operating with a different standard of coercion. This would entail a <a href=\"https:\/\/verfassungsblog.de\/grenzenlose-souveranitat-im-cyberspace\/\">dilution<\/a> of the prohibition of wrongful intervention.<\/p>\n<p>The delimitation between the rule of territorial sovereignty and the prohibition of territorial sovereignty should focus on the <em>ratione materiae <\/em>application of the rule of territorial sovereignty. It is conceivable that some limited aspects of state authority should remain free of any outside influence. However, this area should be significantly smaller than the domaine r\u00e9serv\u00e9. If both rules\u2019 scope of application are equal, as the German argument suggests, the validity of the coercion criteria is drawn into doubt. This would however contradict the ICJ\u2019s jurisprudence whereby coercion is the \u201cvery essence of, prohibited intervention\u201d and could furthermore constitute an undesirable development, as outlined above.<\/p>\n<p><strong>The Intricacies of International Law-Making<\/strong><\/p>\n<p>Germany\u2019s stance on the rule of territorial sovereignty further raises methodological questions. Before the cyber debate kicked off, any attempt to establish a rule protecting sovereignty beneath the threshold of coercion was futile. Paradigmatically, a UN General Assembly <a href=\"https:\/\/digitallibrary.un.org\/record\/27066\">resolution<\/a> from 1981 titled \u201cDeclaration on the Inadmissibility of Intervention <em>and<\/em> <em>Interference<\/em> in the Internal Affairs of States\u201d was thoroughly rejected by Western states and has not been able to shape the development of the (customary) international law protecting sovereignty. Accordingly, the rule of territorial sovereignty does not build on a prior established rule of customary international law and would require a settled state practice and corollary <em>opinio juris<\/em> to come into existence. To date, such settled practice does not exist.<\/p>\n<p>Nonetheless, Germany is very firm on its stance that the rule of territorial sovereignty exists and forms part of positive international law. Germany avoids dealing with the problem of scarce state practice by framing its analysis of the rule of territorial sovereignty as an interpretation of the United Nations Charter. The section heading for the rule reads \u201cObligations of States derived from the United Nations Charter\u201d (<a href=\"https:\/\/www.auswaertiges-amt.de\/blob\/2446304\/2ae17233b62966a4b7f16d50ca3c6802\/on-the-application-of-international-law-in-cyberspace-data.pdf\">p. 2<\/a>) and the applicable methods of interpretation cited later in the paper are arts. 31 et seq of the Vienna Convention on the Law of Treaties. However, art. 2 para. 1 of the United Nations Charter only contains the principle of sovereign equality. Likewise, the cases cited in favor of the rule of territorial sovereignty by Germany exclusively deal with the protection of sovereignty in customary international law (<a href=\"https:\/\/legal.un.org\/riaa\/cases\/vol_II\/829-871.pdf\">Island of Palmas Arbitration<\/a>, <a href=\"https:\/\/www.icj-cij.org\/en\/case\/1\/judgments\">Corfu Channel Case<\/a>). Framing the matter as an interpretation of the United Nations Charter is thus a smoke screen to distract from the missing state practice in the field.<\/p>\n<p>However, in order to achieve its goal of establishing the rule of territorial sovereignty, Germany has to take an assertive stance on this question. Only if Germany is firm on this question will its statement be considered <em>opinio juris<\/em> and <a href=\"https:\/\/legal.un.org\/ilc\/documentation\/english\/a_cn4_672.pdf\">potentially<\/a> verbal state practice. Accordingly, Germany can only contribute to the emergence of the rule, if it prematurely argues that this rule already positively exists. This intricacy of international law-making thus explains the methodological backward bend taken with regard to the rule of territorial sovereignty.<\/p>\n<p><strong>What Next?<\/strong><\/p>\n<p>The foregoing analysis demonstrates the timeliness and importance of the German position paper. As international law in cyber space is under development at the moment, it is important for states to take a firm stance on the open questions, in order to advance the clarification (and creation) of international law. With regard to the protection of sovereignty in cyber space, it would be preferable if the rule of territorial sovereignty were delineated <em>ratione materiae<\/em> from to the prohibition of wrongful intervention. The position paper suggests an extensive overlap between the two rules, which would contradict standing customary international law and constitute a critical dilution of the coercion standard.<\/p>\n<p>Ideally, the refinement of Germany\u2019s position can take place within the GGE. Consultations and deliberations on the final report are scheduled for <a href=\"https:\/\/dig.watch\/processes\/un-gge\">May 2021<\/a>. The Biden Administration\u2019s <a href=\"https:\/\/fcw.com\/articles\/2021\/02\/22\/biden-munich-global-cyber.aspx\">renewed push<\/a> on this matter could provide a decisive impulse, paving the way for the 25-member body to adopt a report by consensus. However, if consensus cannot be reached, it will be up to individual states to publish their views in the form Germany just has, to further develop and clarify the international law applicable in cyberspace.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On March 5th, 2021, Germany published its position paper \u201cOn the application of International Law in Cyberspace\u201d. The inter-ministerial document stipulates Germany\u2019s views on the rules regulating state activity in cyberspace in a concise, well-founded and comprehensive manner. For this, Germany has been applauded by leading scholars in the field. This blogpost highlights and critically [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6639],"tags":[],"authors":[5701],"article-categories":[6000],"doi":[],"class_list":["post-13251","post","type-post","status-publish","format-standard","hentry","category-uncategorized","authors-florian-kriener","article-categories-article"],"acf":{"subline":"Reflections on Germany\u2019s Position Paper on International Law in Cyberspace"},"meta_box":{"doi":"10.17176\/20210416-100920-0"},"_links":{"self":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/13251","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/comments?post=13251"}],"version-history":[{"count":7,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/13251\/revisions"}],"predecessor-version":[{"id":13340,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/posts\/13251\/revisions\/13340"}],"wp:attachment":[{"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/media?parent=13251"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/categories?post=13251"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/tags?post=13251"},{"taxonomy":"authors","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/authors?post=13251"},{"taxonomy":"article-categories","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/article-categories?post=13251"},{"taxonomy":"doi","embeddable":true,"href":"https:\/\/voelkerrechtsblog.org\/de\/wp-json\/wp\/v2\/doi?post=13251"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}