9.1 Cyber Law
9.1 Cyber Law
Law week]
1. ……………..
2. …………….
3. ……………
4. ……………….
5. ………………
6. ………………
7. ………………
8. ……………..
Annexure I
Programme:
B.A., LL.B.
Details of Course offered
Odd Semester (IX) – Academic Year 2018-19
1. Course Objectives
To make students understand the cyber world and cyber law in general and to explain the
various facets of cybercrimes.
To enhance the understanding of problems arising out of online transactions and provoke
them to find solutions.
To clarify the intellectual property issues in the cyberspace and the growth and
development of the law in this regard.
To educate about the regulation of cyberspace at the national and international level.
To understand the existing legal frameworks relating to e-commerce including the
Informational Technology Act, 2000.
2. Teaching methodology
The methodology is not a traditional lecture method but participatory teaching with a
discussion on legal principles and precedents in the classroom. The students are informed in
advance the topic for discussion and the topic of project/assignment they have to prepare. The
students prepare their topics from the sources suggested to them. The students are also
encouraged to do independent research on their respective assignments. In the classroom, every
student is required to present his/her topic and to have his/her doubt cleared through discussion.
The teacher will be helping and guiding the students in their pursuits of legal learning. The
teacher summarizes after the students have completed their discussion, and she clarifies the
doubts, if any, and answer their queries.
Cyber Law as an independent discipline of study is a fast emerging area of law. Well-tried and
traditional legal ideas sometimes prove unequal to the handling of unprecedented problems of
the area. The students are encouraged to access the judgments of the US courts, the Indian
courts, and articles on the subject available in various prestigious international and national
journals. The study materials have been supplied to the students which consist of articles by
experts in the field and case law reports available in various books and journals.
4. Prescribed Readings
1. Chris Reed & John Angel, Computer Law, OUP, New York, (2007).
2. Aparna Vishwanathan, Cyber Law: Indian and International Perspectives, Lexis Nexis
Butterworths Wadhwa, 2012.
3. Steve Hedley, The Law of Electronic Commerce and the Internet in the UK and Ireland,
Taylor & Francis, 2017.
4. Diane Rowland et al., Information Technology Law, Routledge-Cavendish, 2005.
The Course is assessed in 100 marks in total by an examination system comprising of written
exam. There shall be a Mid-Term Exam and End-Semester Exam.
Introduction to E-Commerce
The Concept of E-Contracts
Online Approaches: B2B, B2C & C2C
Online Contracts: Click-Wrap, Shrink-Wrap, and Browse-Wrap
Law in US & EU on E-Contracts
E-Contracts under the I.T Act, 2000
Applicability of the Indian Contract Act, 1872
Tests to determine Jurisdiction in Internet Law cases
Dispute Resolution
Electronic Signatures
Essential Websites
The websites of the ICANN, the MeitY, the Stanford Law School’s Centre for Internet and
Society Blog, Cyberlaw books by Pavan Duggal, Opensource.com, among others, are
important for this Course.
Annexure III
STUDY/READING MATERIAL
+(,121/,1(
Citation:
Kristen E. Eichensehr, The Cyber-Law of Nations, 103
Geo. L.J. 317 (2015)
Copyright Information
KRISTEN E. EICHENSEHR*
TABLE OF CONTENTS
* Visiting Assistant Professor, UCLA School of Law. D 2015, Kristen E. Eichensehr. The author
thanks Raechel Anglin, Jack Balkin, Sarah Cleveland, Ashley Deeks, Oona Hathaway, Harold Hongju
Koh, David Koplow, Richard M. Re, W. Michael Reisman, Michael N. Schmitt, Phil Spector, Peter
Trooboff, Stephen Zamora, and participants in the American Society of International Law Southeast
Interest Group Junior-Senior Workshop for helpful conversations and comments. The author is grateful
for the assistance of Clay Greenberg, Sean Quinn, Justin Simeone, and the editors and staff of
The Georgetown Law Journal for their suggestions and assistance. This Article reflects developments
through November 2014 when it was finalized for publication, and any errors are the author's alone.
317
318 THE GEORGETOWN LAW JOURNAL [Vol. 103:317
. .. . . . . .
III. GOVERNING CYBER: NEW ANSWERS FOR A NEW DOMAIN? 346
A. THE ROLE OF PRIVATE PARTIES: MULTILATERAL VERSUS
MULTISTAKEHOLDER GOVERNANCE ..................... 346
B. MODALITY OF GOVERNANCE .......................... 352
1. No Governance Arrangement .................... 353
INTRODUCTION
breached "nearly 150" organizations in the last seven years.' Mandiant con-
cluded that APTi is likely the Chinese People's Liberation Army (PLA) Unit
61398.2 China strongly denied Mandiant's accusations. 3 After the Mandiant
report, the U.S. government shifted from oblique allusions to openly naming
China as a major source of cyber intrusions.4 Recent disclosures by Edward
Snowden, however, have complicated the issue: reports indicate that the
United States conducted 231 offensive cyber operations in 2011, including
operations against China, Russia, Iran, and North Korea.5 The disclosures also
come on the heels of a December 2012 International Telecommunications
Union (ITU) conference that broke down over disagreements among the United
States, Russia, China, and others about Internet governance.
The release of information about operations has spurred not just mutual re-
criminations, but also potentially constructive developments. The United States
called for dialogue with China to develop rules of the road for behavior in
cyberspace,6 and a U.S.-China governmental working group on cyber issues
held its inaugural meeting in July 2013.' The United Kingdom has called for a
similar formal dialogue with China.8
The path of progress, however, has not been smooth. In May 2014, China
1. MANDIANT, APTI: EXPOSING ONE OF CHINA'S CYBER ESPIONAGE UNITS 2 (2013), available at http://
intelreport.mandiant.com/MandiantAPT1_Report.pdf.
2. Id.
3. David Barboza, China Says Army Is Not Behind Attacks in Report, N.Y. TIMES, Feb. 20, 2013,
http://www.nytimes.com/2013/02/21/business/global/china-says-army-not-behind-attacks-in-report.
html (quoting Chinese Ministry of National Defense spokesman Geng Yansheng as stating that
"Chinese military forces have never supported any hacking activities").
4. See Tom Donilon, Nat'l Sec. Advisor to the President, Remarks at the Asia Society: The United
States and the Asia-Pacific in 2013 (Mar. 11, 2013), available at http://www.whitehouse.gov/the-press-
office/2013/03/11/remarks-tom-donilon-national-security-advisory-president-united-states-a ("Increas-
ingly, U.S. businesses are speaking out about their serious concerns about sophisticated, targeted theft
of confidential business information and proprietary technologies through cyber intrusions emanating
from China on an unprecedented scale. The international community cannot afford to tolerate such
activity from any country. As the President said in the State of the Union, we will take action to protect
our economy against cyber-threats.").
5. Barton Gellman & Ellen Nakashima, U.S. Spy Agencies Mounted 231 Offensive Cyber-Operations
in 2011, Documents Show, WASH. POST, Aug. 30, 2013, http://articles.washingtonpost.com/2013-08-30/
world/41620705_1_computer-worm-former-u-s-officials-obama-administration.
6. Donilon, supra note 4 ("[W]e need China to engage with us in a constructive direct dialogue to
establish acceptable norms of behavior in cyberspace."). The United States has such a formalized
dialogue with India, for example. See Fourth India-US Strategic Dialogue: India-US Fact Sheet on
International Security, MINISTRY EXTERNAL AFF. (June 24, 2013), http://www.mea.gov.in/in-focus-
article.htm?21 864/Fourth + IndiaUS + Strategic + Dialogue+ IndiaUS +Fact+ Sheet+ on+ International
+ Security (discussing the U.S--India Strategic Cyber Policy Dialogue and "whole-of-government
Cybersecurity Consultations").
7. See Joseph Menn, White House Cites Progress in Cyber Talks with China, Russia, REUTERS
(May 14, 2013, 7:38 PM), http://www.reuters.com/article/2013/05/14/us-cyber-summit-international-talks-
idUSBRE94D19R20130514; Tony Romm, U.S.-China Cybersecurity Talks Inching Along, POLITICO
(July 10, 2013, 4:58 AM), http://www.politico.com/story/2013/07/us-china-cybersecurity-93909.html.
8. See Nicholas Watt, David Cameron Challenges China to Be More Open About Cyber-Security,
GUARDIAN (Dec. 3, 2013), http://www.theguardian.com/politics/2013/dec/04/david-cameron-challenges-
china-cyber-security.
320 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
halted its participation in the U.S.-China working group in response to the U.S.
indictment of five Chinese military officials for hacking into U.S. companies
and committing economic espionage and trade secret theft. 9 Shortly thereafter, a
report by the cybersecurity firm CrowdStrike identified another unit of the
PLA-Unit 61486-that has breached U.S. and European satellite and aero-
space companies. o No end is in sight to these disagreements and recrimina-
tions.
Nonetheless, recent events mark a productive shift in how governments
address cyber issues-namely, a shift toward engaging with each other to
address cyber questions that cannot be resolved within a single sovereign state.
Issues such as cyberwar, cyberespionage, and cybercrime transcend the regula-
tory powers of a single state, call for coordination and cooperation among
sovereigns, and raise the possibility of conflict between states over the contested
domain of "cyberspace." Although scholars previously debated whether or to
what extent sovereign states could regulate cyber and the Internet with respect
to their own citizens," current issues demand a new generation of scholarship
on sovereigns' relationships with other sovereigns regarding cyber issues.
Although powerful states seem to agree in general that some dialogue and
agreement on basic rules are necessary, they disagree about almost everything
else. Governments' statements, strategies, and actions suggest that two compet-
ing visions of cyberspace have emerged so far: China and Russia argue that
cyberspace should be subject to sovereign control, whereas the United States,
United Kingdom, and their allies argue that cyberspace should not be subject to
sovereign control. This Article focuses on three fundamental questions and
areas of disagreement that stem from the states' divergent views about sover-
9. See Ting Shi & Michael Riley, China Halts Cybersecurity Cooperation After U.S. Spying
Charges, BLOOMBERG (May 20, 2014, 5:39 AM), http://www.bloomberg.com/news/2014-05-20/china-
suspends-cybersecurity-cooperation-with-u-s-after-charges.html; see also Press Release, U.S. Dep't of
Justice, U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations
and a Labor Organization for Commercial Advantage (May 19, 2014), available at http://www.justice.gov/
opalpr/2014/May/14-ag-528.html. Recent reports have implicated the same Chinese army unit in
breaches of Israeli defense companies. See Brian Krebs, Hackers PlunderedIsraeliDefense Firms That
Built 'Iron Dome' Missile Defense System, KREBS ON SECURITY (July 28, 2014, 10:08 AM), http://
krebsonsecurity.com/2014/07/hackers-plundered-israeli-defense-firms-that-built-iron-dome-missile-
defense-system/ (reporting that Cyber Engineering Services Inc. discovered hacks of Israeli defense
contractors that bear "all of the hallmarks of the 'Comment Crew,"' whose official designation is PLA
Unit 61398).
10. See CROWDSTRIKE, CROWDSTRIKE INTELLIGENCE REPORT: PUTTER PANDA 4 (2014), available at
http://resources.crowdstrike.com/putterpanda. Subsequent reports have tied other cyberespionage opera-
tions to both China and Russia. See FIREEYE, APT28: A WINDOW INTO RUSSIAS CYBER ESPIONAGE
OPERATIONS? 3 (2014), available at https://www.fireeye.com/resources/pdfs/apt28.pdf (alleging Russian
government involvement in cyberespionage against "political and military targets including the country
of Georgia, Eastern European governments and militaries, and European security organizations");
NovETTA, OPERATION SMN: AxioM THREAT ACTOR GROUP REPORT 4 (2014), available at http://www.
novetta.com/files/9714/1446/8199/ExecutiveSummary-Final_1.pdf (alleging with "moderate to high
confidence" that the "Chinese Intelligence Apparatus" is directing cyberespionage operations against a
variety of targets worldwide).
11. See infra section I.B.
2015] THE CYBER-LAW OF NATIONS 321
eignty and cyberspace: the role of private parties in governing cyber (states-only
multilateral model versus multistakeholder model); how cyber should be gov-
erned (no governance system, treaty, or norms); and whether or how to regulate
military activities in the cyber domain (no regulation, demilitarization, or
regulated militarization). These questions provoke strong disagreements be-
tween states about what might be termed the emerging cyber-law of nations. On
the one hand, the United States and its allies argue for a "multistakeholder
model," governance through norms, and regulated militarization. On the other
hand, Russia, China, and their allies argue for a "multilateral model," gover-
nance by treaty, and either no regulation of militarization or partial demilitariza-
tion of cyber.
Although cyberspace is a new domain, the challenges it poses for states are
similar to those that the international community has faced in the past with
regard to other domains, namely the high seas, outer space, and Antarctica.
Some have argued that cyber is similar to these domains because it is a "global
commons." This Article, by contrast, argues that cyber's technical status as a
commons is ultimately not crucial; rather, the most important unifying feature
of the domains from a legal perspective is that they are not currently partitioned
and governed based on traditional Westphalian sovereignty. 12 The absence of
sovereignty as a means for governing the domains creates the need for inter-
sovereign arrangements to coordinate states' use of the domains and to avoid
conflict.
Analysis of the old domains is illuminating because it shows that global
governance of such domains is possible and provides a baseline from which
to analyze various answers to the three fundamental questions for cyberspace.
However, the analogy between cyber and the old domains has limits. The
governance answers were similar across the old domains-multilateral gover-
nance, governance by treaty, and some level of demilitarization. But cyber
differs from the old domains in important ways that suggest the answers for
cyber should be different. This Article therefore argues for multistakeholder
governance, governance through norms, and regulated militarization.
Part I demonstrates that the idea of a cyber domain is a useful analytical
concept and that global governance of that domain is necessary to avoid
conflict. Section L.A explains what states mean in employing the term cyber-
space. Section I.B then traces the evolution of the concept of sovereignty as
related to cyberspace. In the first phase, scholars argued that the Internet was
not subject to control by territorial sovereigns, but second-generation scholars
pushed back, arguing that governments can and should regulate cyber within
their borders. A new generation of scholarship now must confront the intersover-
eign cyber issues. Section I.C describes the move by many states to treat cyber
as a domain in the military sense, like the land, sea, and air. Drawing on a
variety of data points, including statements by government officials, strategy
This Article uses the interchangeable terms cyber and cyberspace, and this
section explains what those terms encompass.
2015] THE CYBER-LAW OF NATIONS 323
13. Yochai Benkler, From Consumers to Users: Shifting the Deeper Structures of Regulation Toward
Sustainable Commons and User Access, 52 FED. COMM. L.J. 561, 562 (2000); see also Lawrence
Lessig, The Architecture of Innovation, Inaugural Meredith and Kip Frey Lecture in Intellectual
Property at Duke University School of Law (Mar. 23, 2001), in 51 DUKE L.J. 1783, 1786 (2002)
(describing Benkler's three layers). But see JONATHAN ZIrrRAIN, THE FUTURE OF THE INTERNET AND How
To STOP IT 67 (2008) (describing the Internet as having three or four layers); Lawrence B. Solum
&
Minn Chung, The Layers Principle: Internet Architecture and the Law, 79 NOTRE DAME L. REv. 815,
816-17 (2004) (arguing for understanding the Internet as made up of six layers, instead of three).
14. Benkler, supra note 13, at 562.
15. Id.; Lessig, supra note 13, at 1786 (describing the logical layer as "the system that controls who
gets access to what, or what gets to run where").
16. Lessig, supra note 13, at 1786; see also Benkler, supra note 13, at 562.
17. Cf Joseph S. Nye Jr., Nuclear Lessons for Cyber Security?, STRATEGIC STUD. Q., Winter 2011, at
18, 19 ("Attacks from the informational realm, where costs are low, can be launched against the
physical domain, where resources are scarce and expensive. Conversely, control of the physical layer
can have both territorial and extraterritorial effects on the informational layer.").
18. See Jack L. Goldsmith, The Internet and the Abiding Significance of Territorial Sovereignty,
5 IND. J. GLOBAL LEGAL STUD. 475, 476 (1998) ("The Internet is not, as many suggest, a separate place
removed from our world. Like the telephone, the telegraph, and the smoke signal, the Internet is a
medium through which people in real space in one jurisdiction communicate with people in real space
in another jurisdiction."); see also JACK GOLDSMITH & TIM Wu, WHO CONTROLS THE INTERNET?: ILLUSIONS
OF A BORDERLESS WORLD 16 (2008) (dismissing the term cyberspace as "an influential and charismatic
metaphor"); Mark Graham, Cyberspace, ZERO GEOGRAPHY (Nov. 3, 2011, 10:42 AM), http://www.
zerogeography.net/2011/11/cyberspace.html ("The Internet is characterised by complex spatialities
which are challenging to understand and study, but that doesn't give us an excuse to fall back on
unhelpful metaphors which ignore the Internet's very real, very material, and very grounded geogra-
phies."); infra text accompanying note 42. But see LAWRENCE LESSIG, CODE: VERSION 2.0, at 298
&
391 n.13 (2006) ("There has been a rich, and sometimes unnecessary, debate about whether indeed
cyberspace is a 'place.' I continue to believe the term is useful . . . ."); David R. Johnson & David Post,
Law and Borders-The Rise of Law in Cyberspace, 48 STAN. L. REV. 1367, 1378 (1996) (suggesting
"conceiving of Cyberspace as a distinct 'place' for purposes of legal analysis by recognizing a legally
significant border between Cyberspace and the 'real world').
19. See infra text accompanying notes 22-28.
324 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
26. U.K. CABINET OFFICE, THE UK CYBER SECURITY STRATEGY: PROTECTING AND PROMOTING THE UK
IN A DIGITAL WORLD 11 (2011), available at https://www.gov.uk/government/publications/cyber-security-
strategy.
27. See ISO/IEC, Standing Document 6 (SD6): Glossary of IT Security Terminology (Oct. 16,
2014), http://www.jtc1sc27.din.de/cmd?level tpl-bereich&menuid 64540&languageid en&cmsare
aid=64540.
28. MINISTRY OF COMMC'N & INFO. TECH., Gov'T OF INDIA, NATIONAL CYBER SECURITY POLICY-2013
(NCSP-2013) (2013), available at http://www.deity.gov.in/sites/uploadfiles/dit/files/National%20Cyber
%20Security%20Policy%20(1).pdf (citing ISO/IEC-27032-2012 and defining cyberspace as "a com-
plex environment consisting of interactions between people, software and services, supported by
worldwide distribution of information and communication technology[,] .. . devices and networks").
For collections of governmental and non-governmental definitions of cyberspace, see Cyber Defini-
tions, COOPERATIVE CYBER DEE CENTER EXCELLENCE, https://www.ccdcoe.org/cyber-definitions.html (last
visited Nov. 30, 2014); Global Cyber Definitions Database, OPEN TECH. INST., http://cyberdefinitions.
newamerica.org/index.html (last visited Nov. 30, 2014); Damir Rajnovic, Cyberspace-What Is It?,
Cisco BLOG (July 26, 2012, 8:25 AM), http:/Iblogs.cisco.com/security/cyberspace-what-is-it/.
29. For brief historical overviews of the development of the Internet, see, for example, Brief History
of the Internet, INTERNET Soc'Y, http://www.internetsociety.org/internet/what-internet/history-intemet/
brief-history-internet (last visited Nov. 30, 2014), or P.W. SINGER & ALLAN FRIEDMAN, CYBERSECURITY
AND CYBERWAR: WHAT EVERYONE NEEDS To KNow 16-21 (2014).
30. The "core element in any definition of sovereignty" is "[t]he assertion of final authority within
a given territory." Goldsmith, supra note 18, at 476 n.5 (quoting Stephen D. Krasner, Sovereignty:
An Institutional Perspective, 21 COMP. POL. STUD. 66, 86 (1988)). Krasner has identified four types
of sovereignty, which "are not logically coupled, nor have they covaried in practice." STEPHEN D.
KRASNER, SOVEREIGNTY: ORGANIZED HYPOCRISY 9 (1999). The four types of sovereignty are: (1) domestic
sovereignty, which refers to "the organization of public authority within a state and to the level of
effective control exercised by those holding authority"; (2) interdependence sovereignty, which refers
to "the ability of public authorities to control transborder movements"; (3) international legal sover-
eignty, which refers to the "mutual recognition of states or other entities"; and (4) Westphalian
sovereignty, which refers to "the exclusion of external actors from domestic authority configurations."
Id. This Article focuses primarily on Westphalian sovereignty and interdependence sovereignty, particu-
larly their weakness or absence in the current cyberspace context. Cf id. at 20 ("The fundamental norm
of Westphalian sovereignty is that states exist in specific territories, within which domestic political
authorities are the sole arbiters of legitimate behavior."); id. at 10 ("Westphalian sovereignty . .
exclusively refer[s] to issues of authority: does the state have the right to exclude external actors . .. ?
Interdependence sovereignty exclusively refers to control: can a state control movements across its own
borders?"). The weakness of Westphalian sovereignty in the globalized context has sparked much
attention in the international relations and international law literature generally in recent years. See,
326 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
and the Internet has shifted dramatically from early conceptions of cyber as
outside the control of sovereigns to descriptive and normative accounts allow-
ing for some regulation of cyber by states. 3 1 This Article argues that the time
has come for the next stage in the relationship between cyber and sovereigns-
namely, agreement among sovereigns on answers to basic governance questions
to address cross-border issues like cyberwar, cyberespionage, and cybercrime.
Governments of the Industrial World, you weary giants of flesh and steel, I
come from Cyberspace, the new home of Mind. On behalf of the future, I ask
you of the past to leave us alone. You are not welcome among us. You have no
sovereignty where we gather.3 2
This Declaration embodied the 1990s view of many Internet organizations and
their allies who believed that sovereignty over the Internet belonged to its users,
not to governments. In other words, the Internet was sovereign unto itself, not
governed by states.
These Internet partisans denied that governments could or should regulate
cyberspace. In a prominent article, David Johnson and David Post argued,
"Global computer-based communications cut across territorial borders, creating
a new realm of human activity and undermining the feasibility-and legiti-
macy-of laws based on geographic boundaries." 33 As a normative matter,
Internet partisans denied that governments should regulate cyberspace, even
if they could. Barlow's declaration of independence asserted that cyberspace
was built "to be naturally independent of the tyrannies [governments] seek to
impose." 34 Johnson and Post argued that "[c]yberspace radically undermines the
e.g., Anne-Marie Slaughter, Sovereignty and Power in a Networked World Order, 40 STAN. J. INT'L L.
283, 284-87 (2004) (noting several fundamental challenges to Westphalian sovereignty and arguing in
favor of "new sovereignty," defined as the idea that "[s]tates can only govern effectively by actively
cooperating with other states and by collectively reserving the power to intervene in other states'
affairs" (emphasis omitted)).
31. See Duncan B. Hollis, Re-Thinking the Boundaries of Law in Cyberspace: A Duty to Hack?, in
CYBERWAR: LAw & ETHICS FOR VIRTUAL CONFLICTS (J. Ohlin et al. eds., forthcoming 2015) (manuscript at
3-7), available at http://papers.ssm.com/sol3/papers.cfmabstractid= 2424230.
32. John Perry Barlow, A Declarationof the Independence of Cyberspace, ELEC. FRONTIER FOUND.
(Feb. 9, 1996), http://w2.eff.org/Censorship/Intemet censorship bills/barlow_0296.declaration; see also
id. ("We must declare our virtual selves immune to your sovereignty, even as we continue to consent to
your rule over our bodies.").
33. Johnson & Post, supra note 18, at 1367; see Timothy S. Wu, Note, Cyberspace Sovereignty?-
The Internet and the InternationalSystem, 10 HARV. J.L. & TECH. 647, 648 (1997) (calling the Elec-
tronic Frontier Foundation, with which Johnson and Post were affiliated, one of the "most outspoken
advocates of 'cyberspace sovereignty"').
34. Barlow, supra note 32.
2015] THE CYBER-LAW OF NATIONS 327
35. Johnson & Post, supra note 18, at 1370 (emphasis omitted); see also id. at 1375 ("The rise of
an electronic medium that disregards geographical boundaries throws the law into disarray by creating
entirely new phenomena that need to become the subject of clear legal rules but that cannot be
governed, satisfactorily, by any current territorially based sovereign.").
36. Barlow, supra note 32 ("Cyberspace does not lie within your borders.... It is an act of nature
and it grows itself through our collective actions.").
37. Johnson & Post, supra note 18, at 1367.
38. The domain name system "associates user-friendly domain names (e.g., www.ntia.doc.gov) with
the numeric network addresses (e.g., 170.110.225.155) required to deliver information on the Internet,
making the Internet easier for the public to navigate." Domain Name System, NAT'L TELECOMMS. & INFO.
ADMIN., http://www.ntia.doc.gov/category/domain-name-system (last visited Nov. 30, 2014).
39. Johnson & Post, supra note 18, at 1388.
40. See Goldsmith, supra note 18, at 476-77; Wu, supra note 33, at 663.
41. GOLDSMITH & Wu, supra note 18, at 16.
42. Id. at 73.
43. See Wu, supra note 33, at 651 ("[W]here widespread usage of the Internet depends on physical
components, a government that controls these components can regulate cyberspace.").
44. Goldsmith, supra note 18, at 488.
45. Examples of computer and Internet-related laws in the United States include: 17 U.S.C.
§ 506(a)(1)(c) (2012) (copyright infringement by making copyrighted work available on public com-
puter network); 18 U.S.C. § 1030 (2012) (Computer Fraud and Abuse Act); 18 U.S.C. §§ 2510-2522
328 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
(2012) (Electronic Communications Privacy Act); and 31 U.S.C. §§ 5361-5367 (2012) (Unlawful
Internet Gambling Enforcement Act). For a compilation of national legislation implementing the
Council of Europe's Budapest Convention on Cybercrime, see Cybercrime Legislation-CountryPro-
files, COUNCIL OF EUR., http://www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/Documents/
CountryProfiles/default en.asp (last visited Nov. 30, 2014).
46. GOLDSMITH & Wu, supra note 18, at viii. For example, "South Korea filters pro-North Korean
sites; China filters material on Tibet, Taiwan, and Tiananmen, as well as mundane mistakes by local
officials." Id.
47. Goldsmith, supra note 18, at 476.
48. GOLDSMITH & Wu, supra note 18, at xiii.
49. Id. at 142.
50. Id. at 145.
51. Id.; see also id. at 156 ("A government's responsibility for redressing local harms caused by a
foreign source does not change because the harms are caused by an Internet communication.").
52. See supra note 45.
53. GOLDSMITH & Wu, supra note 18, at vii.
54. Id. at 164.
55. Id. at 165; see also id. at 173 ("Internet conflicts of laws lead nations to use what tools they
can . . to get what they want. This is a very old story indeed.").
2015] THE CYBER-LAW OF NATIONS 329
In recent years, the United States and other countries, including the United
Kingdom, Israel, and Iran, have declared that cyberspace is a "domain" in the
military context, like land, sea, air, and space. 6 0 Similarly, China's "Electronic
Warfare strategy" declares that electronic warfare "is a vital fourth dimension to
combat and should be considered equally with traditional ground, sea, and air
forces." 6 1
Although there is growing consensus about treating cyber as a separate
domain, states appear to disagree about most other cyber-governance issues.
Most fundamentally, the United States and its allies, particularly in Western
Europe, argue that cyberspace is not and should not be subject to sovereign
control, whereas China, Russia, and others argue that sovereigns should, singly
or in combination, control cyber. These competing views have a number of
implications for particular cyber-governance questions and suggest positions
that adherents of the opposing views will take with respect to issues of
international law for cyberspace going forward.
By piecing together government policies from disparate statements of govern-
ment officials and strategy documents, as well as states' actions in cyberspace
and their response to cyber incidents over the last few years, this Article
suggests that the divergent views with respect to sovereignty are fostering two
competing visions of cyberspace governance. This section constructs, to the
extent possible, the positions of the United States and Western Europe, on the
one hand, and China and Russia, on the other hand, whereas the remainder of
the Article explores the implications and desirability of these positions for
specific cyber-governance questions.
The United States promotes a multistakeholder vision of Internet governance-
governance by and with the input of diverse parties, including governments,
nongovernmental organizations, the private sector, civil society, academia, and
individuals. The U.S. International Strategy for Cyberspace commits the U.S.
government to "[p]romote and enhance multi-stakeholder venues for the discus-
sion of Internet governance issues."62 It also pledges that the United States will
"[p]rioritize openness and innovation on the Internet" in contrast to govern-
ments that "place arbitrary restrictions on the free flow of information or use it
,,63
to suppress dissent or opposition activities. The European Union similarly
supports the continuation of the "present bottom-up, multi-stakeholder model"
and "believes that internet governance and related regulatory issues should
continue to be defined at a comprehensive and multi-stakeholder level."6 4
By contrast, China and Russia, along with other states of the former Soviet
Union, have promoted a sovereign-based vision of Internet governance that has
both domestic and international aspects. On the domestic front, China and
Russia seek to legitimize their efforts to regulate the content of the Internet
available within their countries and to monitor and suppress expression that, in
their view, poses a security threat. On the international plane, they seek to
transfer management of the Internet from the extant civil-society-focused multi-
stakeholder model to a multilateral forum, such as the ITU, which would
increase sovereign states' power over Internet regulation, including content.
The two facets of the sovereign-based vision for the Internet are reflected in a
draft treaty-the "International Code of Conduct for Information Security"-
that China, Russia, Tajikistan, and Uzbekistan proposed at the United Nations in
September 201 1.65 Among other provisions, the draft Code would require states
"[t]o reaffirm all States' rights and responsibilities to protect, in accordance with
relevant laws and regulations, their information space and critical information
infrastructure from threats, disturbance, attack and sabotage."6 6 It would also
require "the establishment of a multilateral, transparent and democratic interna-
tional management of the Internet to ensure an equitable distribution of re-
sources, facilitate access for all and ensure a stable and secure functioning of
6 7
the Internet."
The United States and its allies do not accept this vision and, in particular,
oppose the domestic sovereign control idea on freedom of expression and
association grounds.6 " They also oppose the move to greater sovereign control
functioning of democratic societies worldwide"); Hillary Rodham Clinton, Sec'y of State, Remarks on
Internet Freedom (Jan. 21, 2010), available at http://www.state.gov/secretary/20092013clinton/rm/2010/
01/135519.htm ("[T]he internet is a network that magnifies the power and potential of all others.
And that's why we believe it's critical that its users are assured certain basic freedoms. Freedom of
expression is first among them.").
69. See InternationalProposalsto Regulate the Internet: HearingBefore the Subcomm. on Commc 'ns
& Tech. of the H. Comm. on Energy & Commerce, 112th Cong. 24 (2012) [hereinafter Statement of
Amb. Philip Verveer] (statement of Ambassador Philip Verveer, Deputy Assistant Secretary of State and
United States Coordinator for International Communications and Information Policy), available at
http://www.gpo.gov/fdsys/pkg/CHRG-112hhrg79558/pdf/CHRG-112hhrg79558.pdf.
70. See supra note 7 and accompanying text.
71. See generally China Inst. of Contemporary Int'l Relations (CICIR)-Ctr. for Strategic & Int'l
Studies (CSIS), Bilateral Discussions on Cooperation in Cybersecurity, CENTER FOR STRATEGIC & INT'L
STUD. (June 2012) [hereinafter CICIR-CSIS], http://csis.org/files/attachments/120615 JointStatement
CICIR.pdf.
72. Adam Segal, Chinese Computer Games: Keeping Safe in Cyberspace, FOREIGN AFF., Mar./Apr.
2012, at 14, 15.
73. For background, see Jack Goldsmith, WCIT-12: An OpinionatedPrimer and Hysteria-Debunker,
LAWFARE (Nov. 30, 2012, 6:58 AM), http://www.lawfareblog.com/2012/11/wcit-12-an-opinionated-primer-
and-hysteria-debunker-2/.
74. Robert M. McDowell, The U.N. Threat to Internet Freedom, WALL ST. J., Feb. 21, 2012,
http://online.wsj.com/article/SB10001424052970204792404577229074023195322.html; see also CTR.
FOR DEMOCRACY & TECH., ITU MOVE TO EXPAND POWERS THREATENS THE INTERNET: CIVIL SOCIETY SHOULD
2015] THE CYBER-LAW OF NATIONS 333
tion from governments, including the United States and European Union;
Internet and technology companies, including Google; and civil society groups. '75
In congressional testimony, a State Department official explained that "[g]ov-
ernmental proposals" to "include centralized control over the Internet through a
top-down government approach would put political dealmakers, rather than
innovators and experts, in charge of the future of the Internet," "slow the pace
of innovation, hamper global economic development,... potentially lead to an
era of unprecedented control over what people can say and do online," and
"threaten the ability of the world's citizens to freely connect and express
themselves." 6 The European Parliament and U.S. Congress each adopted a
resolution opposing ITU control over Internet governance and endorsing the
multistakeholder model.
At WCIT, Russia proposed revisions to the ITRs to include the Internet in the
ITU's purview and challenge management of the domain name system by the
nongovernmental Internet Corporation for Assigned Names and Numbers
(ICANN).'7 Specifically, Russia proposed that "Member States shall have equal
rights to manage the Internet, including in regard to the allotment, assignment
and reclamation of Internet numbering, naming, addressing and identification
resources and to support for the operation and development of basic Internet
infrastructure." 7 9
The outcome of WCIT was mixed for both camps. The United States and its
allies succeeded in including in the ITRs a specific disclaimer that the treaty
"do[es] not address the content-related aspects of telecommunications"so
Internet regulation-and defeated the Russian proposal to give the ITU, or the
United Nations more broadly, control of the domain name system. 1 However, a
version of the Russian proposal was adopted (with some procedural contro-
versy 8 2) as a separate resolution attached to the treaty text. The resolution states
that "all governments should have an equal role and responsibility for interna-
tional Internet governance and for ensuring the stability, security and continuity
of the existing Internet and its future development," and invites Member States
to "elaborate on their respective positions on international Internet-related
technical, development and public-policy issues within the mandate of [the]
ITU at various ITU forums." 8 3 The resolution's insistence on an "equal role"
for "all governments" represents "a pretty firm move away from the multi-
stakeholder model that involved mostly NGOs like ICANN and the [Internet
Engineering Task Force]."8 In other words, the resolution "marks a declaration
of conflict (not war-but conflict) between competing visions of internet gover-
nance."
The United States refused to sign the revised treaty, 6 citing the Internet
governance resolution and provisions about spam, which necessarily involve
governments in content regulation. 7 In the end, eighty-nine countries, including
Russia, China, South Africa, many African countries, and most Middle Eastern
countries, signed the revised ITRs." The nonsignatories include the United
States, Canada, Western European countries, Australia, New Zealand, and
India.8 9
The two-bloc description of the debate regarding cyber governance reflects
the positions evidenced by leading states that have weighed in to date, but the
picture will become more complex over time as other states enter the debate.
Importantly, the divergence in approaches to cyberspace and sovereignty is not
necessarily one between democratic and nondemocratic states. Recent reports
indicate that the Indian government plans to oppose the multistakeholder ap-
proach in favor of a mostly multilateral model because it believes the multistake-
82. See Jochai Ben-Avie, WCIT Watch: Just Taking the Temperature?-A Late Night Resolution on
the Internet, ACCESs BLOG (Dec. 12, 2012, 8:13 PM), https://www.accessnow.org/blog/2012/12/12/wcit-
watch-just-taking-the-temperature-a-late-night-resolution-on-the-inter (chronicling that the chair an-
nounced that he "wanted to have the feel of the room"-essentially a straw poll-on the Internet
resolution); Paul Rosenzweig, WCIT Treaty Breakdown-A Summary and Some Analysis, LAWFARE
(Dec. 14, 2012, 10:36 AM), http://www.lawfareblog.com/2012/12/wcit-treaty-breakdown-a-summary-
and-some-analysis/ (explaining that despite the chair's claim to be taking a straw poll, "it appears that
the resolution was actually deemed adopted by the meeting").
83. WCIT Final Acts, supra note 80, Resolution Plen/3, ¶¶ e, 1.
84. Rosenzweig, supra note 82.
85. Id.
86. Media Note, Office of the Spokesperson, U.S. Dep't of State, U.S. Intervention at the World
Conference on International Telecommunications (Dec. 13, 2012), availableat http://www.state.gov/r/pal
prs/ps/2012/12/202037.htm.
87. Id.
88. Signatories of the FinalActs: 89, INT'L TELECOMM. UNION, http://www.itu.int/osg/wcit-12/highlights/
signatories.html (last visited Nov. 30, 2014).
89. Id.; see also Mike Masnick, Who Signed the ITU WCIT Treaty . . And Who Didn't, TECHDIRT
(Dec. 14, 2012, 5:27 PM), http://www.techdirt.com/articles/20121214/14133321389/who-signed-itu-wcit-
treaty-who-didnt.shtml (providing map of signatory and nonsignatory countries).
2015] THE CYBER-LAW OF NATIONS 335
The deep disagreement between states about the relationship between cyber-
space and sovereignty poses challenges for achieving agreement on a gover-
nance regime. Options range from treating cyberspace like sovereign territory to
treating it like a global commons, and each option entails a particular type of
legal regime. When evaluating these or intermediate options, the international
community can make use of past precedents. The same fundamental governance
questions now raised by cyberspace have been answered before, and the ex-
amples on which this Article focuses-the legal regimes for the high seas, outer
space, and Antarctica-show that even where territorial sovereignty does not
exist, global governance is possible.
The Article follows in a long tradition of looking to prior legal regimes
governing earlier-used domains. For example, in considering how to govern the
high seas, scholars looked to governance regimes for land; in designing gover-
nance for airspace, commentators looked to the legal regime for the high seas;
and in designing a legal regime for outer space, lawyers looked to the regime
90. Sandeep Joshi, India to Push for Freeing Internet from U.S. Control, HINDU (Dec. 7, 2013,
11:55 PM), http://www.thehindu.com/sci-tech/technology/internet/india-to-push-for-freeing-internet-from-
us-control/article5434095.ece.
91. Brazil, for example, signed the revised ITRs in 2012, but in 2014, shifted to support the
multistakeholder model, hosting NETmundial, a "Global Multistakeholder Meeting on the Future of
Internet Governance," that produced an outcome document strongly supportive of multistakeholder
governance. See NETMUNDIAL, NETMUNDIAL MULTISTAKEHOLDER STATEMENT (2014), available at http://
netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf; see also
Stewart M. Patrick, Brazil's Internet Summit: Building Bridges to Avoid "Splinternet," COUNCIL ON
FOREIGN REL. (Apr. 22, 2014), http:/Iblogs.cfr.org/patrick/2014/04/22/brazils-internet-summit-building-
bridges-to-avoid-splinternet/ (describing Brazil's shift away from the multilateral model).
336 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
for airspace. 92 As the history of these legal regimes makes clear, consideration
of past regimes need not lead ineluctably to repetition of the same legal regimes
in the new domain. Past governance decisions have value as either positive or
negative referents for designing a new governance system.
In line with this view, section II.A explains different characterizations of
cyberspace and suggests a limited analogy to the high seas, outer space, and
Antarctica. Section II.B provides a brief overview of the international legal
regimes established for these old domains with an eye toward features that are
relevant to governing cyberspace.
92. See STUART BANNER, WHO OWNS THE SKY?: THE STRUGGLE TO CONTROL AIRSPACE FROM THE WRIGHT
BROTHERS ON 45-56, 260-71 (2008).
93. For a chronicle of how the international legal regime for airspace developed, see id. at 42-68.
94. See Convention on International Civil Aviation art. 1, Dec. 7, 1944, 61 Stat. 1180, 15 U.N.T.S.
295 ("[E]very State has complete and exclusive sovereignty over the airspace above its territory.").
95. See Int'l Code of Conductfor Info. Sec., supra note 65 (art. 11(5)) (reaffirming "all States' rights
and responsibilities to protect . . . their information space").
96. But see David E. Sanger, N.S.A. Leaks Make Plan for Cyberdefense Unlikely, N.Y. TIMES,
Aug. 12, 2013, http://www.nytimes.com/2013/08/13/us/nsa-leaks-make-plan-for-cyberdefense-unlikely.
html (reporting that prior to leaks by Edward Snowden, the NSA had lobbied "to deploy the equivalent
of a 'Star Wars' defense for America's computer networks, designed to intercept cyberattacks" before
they reach private-sector targets).
97. There are also normative reasons to prefer maintenance of the status quo over a "Balkanized"
Internet. See, e.g., Charlotte Alfred, Web at 25: Will Balkanization Kill the Global Internet?, HUFF-
INGTON POST (Mar. 19, 2014), http://www.huffingtonpost.com/2014/03/19/web-balkanization-national-
intemet nA4964240.html (noting concerns that undermining the Internet as a single open network
would facilitate greater governmental control of information); Sascha Meinrath, The Future of the
Internet: Balkanization and Borders, TIME (Oct. 11, 2013), http://ideas.time.com/2013/10/11/the-future-
of-the-internet-balkanization-and-borders/ ("[A Balkanized] Internet is in danger of becoming like the
European train system, where varying voltage and 20 different types of signaling technologies force
operators to stop and switch systems or even to another locomotive, resulting in delays, inefficiencies,
and higher costs. Netizens would fall under a complex array of different legal requirements imposing
2015] THE CYBER-LAW OF NATIONS 337
conflicting mandates and conferring mutually exclusive rights. And much like different signaling
hampers the movement of people and the trade of physical goods, an Internet within such a complex
jurisdictional structure would certainly hamper modern economic activity.").
98. See, e.g., U.S. DEP'T OF DEF., STRATEGY FOR HOMELAND DEFENSE AND CIVIL SUPPORT 12 (2005),
available at http://www.defense.gov/news/jun2005/d2OO5O630homeland.pdf; Anupam Chander, The
New, New Property, 81 TEX. L. REV. 715, 749-50 (2003).
99. N. GREGORY MANKIW, PRINCIPLES OF MICROECONoMIcs 224 (6th ed. 2012).
100. Id. See generally Garrett Hardin, The Tragedy of the Commons, 162 SCIENCE 1243 (1968).
101. U.S. DEP'T OF DE., supra note 98, at 12; see also id. at 1-2; U.S. DEP'T OF DE., NATIONAL
DEFENSE STRATEGY 16 (2008), available at http://www.defense.gov/news/2008%20National%20
Defense%20Strategy.pdf (discussing the importance of securing "the global commons" in the context
of "goods shipped through air or by sea, or information transmitted under the ocean or through space").
102. Clinton, supra note 68.
103. Gov'T OF CAN., supra note 24, at 2.
104. See ABRAHAM M. DENMARK ET AL., CTR. FOR A NEW AM. SEC., CONTESTED COMMONS: THE FUTURE
OF AMERICAN POWER IN A MULTIPOLAR WORLD 10 (Abraham M. Denmark & James Mulvenon eds., 2010)
("advocat[ing] a broad and multi-pronged strategy to preserve the openness of the four global
commons: maritime, air, space and cyberspace"); Lawrence Lessig, Code and the Commons, Keynote
Address at Conference on Media Convergence, Fordham Law School 3 (Feb. 9, 1999), http://
cyber.law.harvard.edu/works/lessig/Fordham.pdf ("The internet is a commons: the space that anyone
can enter, and take what she finds without the permission of a librarian, or a promise to pay. The net is
built on a commons-the code of the world wide web, html, is a computer language that lays itself
open for anyone to see-to see, and to steal, and to use as one wants."); see also Chris C. Demchak
&
Peter Dombrowski, Rise of a Cybered Westphalian Age, STRATEGIC STUD. Q., Spring 2011, at 32, 32
(suggesting that cyber has been a global commons but "[s]ooner or later, good fences are erected to
make good neighbors, and so it must be with cyberspace"); Justyna Hofmokl, The Internet Commons:
Towards an Eclectic Theoretical Framework, 4 INT'L J. COMMONS 226 (2010), available at http://dlc.
dlib.indiana.edu/dlc/bitstream/handle/10535/5644/The%20Internet%20commons%20towards%20an
%20eclectic.pdf?sequence= 1 (providing detailed analysis of "the Internet commons"); Roger Hurwitz,
Depleted Trust in the Cyber Commons, STRATEGIC STUD. Q., Fall 2012, at 20, 23-24, available at
338 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
government documents and some of the commentators are not clear about how
they define the commons or, in particular, how they define cyberspace.
Other commentators, moreover, note that the physical hardware supporting
cyber is located within territorial sovereigns and often owned by private parties,
and they regard these facts as fundamentally problematic for the commons
conception of cyber. Some therefore argue that only certain aspects of cyber-
space constitute or could constitute a commons.10 5 Still others reject the com-
mons characterization entirely.106
The question of whether cyber or some parts of it meet the formal require-
ments-nonexcludability and rivalrous consumption-to constitute a commons
is an interesting issue, but ultimately not crucial for the purposes of this Article.
Rather, this Article takes a functional approach to the commons question and
focuses instead on the extent to which cyber, regardless of its formal status as a
commons, poses governance challenges similar to the recognized global com-
mons.10 7 A fundamental similarity unites cyberspace and the old domains: by
108. Treating the high seas and outer space as nonsovereign may be a necessity because it would be
impossible to carve up outer space into sovereign territories and practically impossible to maintain
sovereign control over large parts of the high seas (that is, to maintain sufficient control to exclude
others). The same may not be true with regard to Antarctica, which is a landmass like others that have
been partitioned into sovereign states. Antarctica is by agreement (the Antarctic Treaty), rather than by
necessity, not subject to sovereign claims.
109. See infra section II.B.
110. See Hollis, supra note 31 (manuscript at 11).
111. See, e.g., Jack Clark, Google Cloud Lets Customers Park Their Data in Europe, ZDNET
(Nov. 26, 2012, 6:05 AM), http://www.zdnet.com/google-cloud-lets-customers-park-their-data-in-europe-
7000007900/.
112. Leila Abboud & Peter Maushagen, Germany Wants a German Internet as Spying Scandal
Rankles, REUTERS (Oct. 25, 2013), http://www.reuters.com/article/2013/10/25/us-usa-spying-germany-
idUSBRE99009S20131025.
113. Brazil considered, but ultimately rejected, a data-localization requirement in the wake of
the Snowden disclosures. See id.; see also Paulo Trevisani & Loretta Chao, Brazil Retreats on Plan
That Drew Google's Fire, WALL ST. J., Mar. 20, 2014, http://online.wsj.com/news/articles/
SB20001424052702304026304579449730185773914.
114. Of course, that does not stop states from trying. See Dave Lee, North Korea: On the Net in
World's Most Secretive Nation, BBC NEWS (Dec. 10, 2012, 3:19 AM), http://www.bbc.co.uk/news/
technology-20445632 (describing Kwangmyong, the North Korean intranet that citizens access instead
of the internet).
340 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
is manmade, not naturally occurring. 1 5 Cyber is not a physical space, like the
other domains. In addition, the physical hardware enabling cyber-routers,
servers, cables, etc.-exists within territorial sovereigns and is often privately
owned. 16
Yet analogizing cyber to the recognized global commons provides a helpful
analytical framework for approaching cyber governance. The analogy takes
seriously how at least some states have characterized cyberspace, and it allows
for comparisons across all three governance questions that this Article identifies:
the need to determine who will be included in discussions about the governance
framework, how such a legal framework will be implemented, and what to
do about military activities. The international community's consideration of
and efforts to address the high seas, outer space, and Antarctica as realms of
potential military confrontation renders these domains particularly useful com-
parators for cyberspace. Other cross-border concerns do not pose the militariza-
tion issue that is crucial to addressing the current international tension over
cyberspace.1 1 7
1. High Seas
The high seas have been a domain for transport, trade, and conflict for
thousands of years and have long been regarded as not subject to appropriation
by sovereign states. The customary laws governing the high seas were codified
in a treaty adopted at the first U.N. Conference on the Law of the Sea in April
1958."" The Convention on the High Seas explains that the treaty is "generally
declaratory of established principles of international law." 1 9
Many of the provisions of the Convention on the High Seas were then
incorporated into the U.N. Convention on the Law of the Sea (UNCLOS),
which opened for signature in 1982 and entered into force in 1994.120 UNCLOS
defines the high seas as "all parts of the sea that are not included in the
exclusive economic zone, in the territorial sea or in the internal waters of a
State, or in the archipelagic waters of an archipelagic State." 1 2 1 UNCLOS
affirms the non-sovereignty of the high seas, stating, "No State may validly
purport to subject any part of the high seas to its sovereignty." 1 2 2 It similarly
states that "[t]he high seas are open to all States, whether coastal or land-
locked," and that the "[f]reedom of the high seas," including, inter alia,
navigation, overflight, fishing, and scientific research, may be exercised by all
states "with due regard for the interests of other States in their exercise of the
freedom of the high seas." 1 2 3 UNCLOS added a new and aspirational condition
on the use of the high seas, reserving them for "peaceful purposes." 1 2 4 It also
addressed the treatment of ships on the high seas and recognized that all states
have the right to sail ships under their flag, that ships have the nationality of
their flag state, and that states must exercise jurisdiction and control over ships
flying their flag. 125
The legal regime for the high seas thus ratifies the high seas' immunity from
national appropriation and establishes multilateral governance, governance by
treaty, and a limitation on use to only "peaceful purposes" (though notably not a
ban on all military activity).
118. See Final Act of the United Nations Conference on the Law of the Sea, Held at the European
Office of the United Nations, at Geneva, from 24 February to 27 April 1958, Done at Geneva on
29 April 1958, 450 U.N.T.S. 11.
119. Convention on the High Seas pmbl., opened for signature Apr. 29, 1958, 13 U.S.T. 2312,
450 U.N.T.S. 11 [hereinafter Convention on the High Seas].
120. See United Nations Convention on the Law of the Sea, U.N. TREATY COLLECTION, http://treaties.
un.org/Pages/ViewDetailslll.aspx?&src= TREATY&mtdsg-no=XXI6&chapter 21&Temp mtdsg3
&lang en (last visited Nov. 30, 2014).
121. United Nations Convention on the Law of the Sea art. 86, openedfor signature Dec. 10, 1982,
1833 U.N.T.S. 3 [hereinafter UNCLOS] (misspelling corrected). It is important to note, however, that
UNCLOS reduced the scope of the high seas by, for example, permitting states to claim an exclusive
economic zone. See infra note 171.
122. UNCLOS, supra note 121, art. 89, 1833 U.N.T.S. at 433.
123. Id. art. 87, at 432-33 (misspelling corrected).
124. Id. art. 88, at 433.
125. Id. arts. 90-92, 94, at 433-35 (flagging and jurisdiction); id. arts. 95-96, at 435 (immunity of
warships and noncommercial government ships).
342 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
126. See Neil deGrasse Tyson, The Case for Space: Why We Should Keep Reaching for the Stars,
FOREIGN AFF., Mar./Apr. 2012, at 22, 22.
127. G.A. Res. 1348 (XIII), U.N. Doc. A/4009 (Dec. 13, 1958), available at http://www.oosa.un
vienna.org/oosalen/SpaceLaw/gares/html/gares13_1348.html.
128. G.A. Res. 1472 (XIV), U.N. Doc. A/4351 (Dec. 12, 1959), available at http://www.oosa.un
vienna.org/oosalen/SpaceLaw/gares/html/gares_14_1472.html.
129. M.J. Peterson, The Use of Analogies in Developing Outer Space Law, 51 INT'L ORG. 245,
253-54 (1997).
130. Id. at 254 & n.41.
131. Id. at 254; see also BANNER, supra note 92, at 266.
132. G.A. Res. 1721 (XVI), art. A, ¶ 1(b), U.N. Doc. A/5026 (Dec. 20, 1961) (emphasis added),
available at http://www.oosa.unvienna.org/oosalen/SpaceLaw/gares/html/gares_16_1721.html; see also
G.A. Res. 1962 (XVIII), ¶ 2, U.N. Doc. A/5656 (Dec. 13, 1963), available at http://www.oosa.
unvienna.org/oosalen/SpaceLaw/gares/html/gares_18_1962.html.
133. See Treaty on Principles Governing the Activities of States in the Exploration and Use of
Outer Space, Including the Moon and Other Celestial Bodies, opened for signature Jan. 27, 1967,
18 U.S.T. 2410, 610 U.N.T.S. 205 [hereinafter Outer Space Treaty].
2015] THE CYBER-LAW OF NATIONS 343
means of use or occupation, or by any other means,"1 3 4 and that space activities
shall be conducted in accordance with international law. 13 5
With respect to military issues, the treaty prohibits states from placing in
orbit, installing on celestial bodies, or stationing in outer space nuclear weapons
or other weapons of mass destruction. 13 6 It also declares that "[t]he moon
and other celestial bodies shall be used . .. exclusively for peaceful purposes,"
and prohibits military installations, weapons testing, and military maneuvers on
celestial bodies. 13 7 The treaty assigns states international responsibility for
their governmental and nongovernmental activities in outer space and renders
the launching state liable for damage caused in air or space or on Earth by a
launched object. 1 38
The Outer Space Treaty opened for signature on January 27, 1967, and
entered into force on October 10, 1967, with the ratification of five states,
including the U.S.S.R. and the United States. 13 9 As of January 1, 2014, 103
states have become parties, and another 25 have signed the treaty. 14 0
The issue of control and militarization of outer space bodies was taken up
again in the 1979 Agreement Governing the Activities of States on the Moon
and Other Celestial Bodies (Moon Treaty). 14 1 The treaty specifies that activities
on the moon and other celestial bodies must be "carried out in accordance with
international law, in particular the Charter of the United Nations." 1 4 2 It explic-
itly restricts use of the moon to "peaceful purposes," and prohibits "[a]ny threat
or use of force or any other hostile act or threat of hostile act on the moon" or
use of the moon to threaten or engage in hostile acts with respect to "the earth,
the moon, spacecraft, the personnel of spacecraft or man-made space ob-
jects." 1 4 3 It further prohibits placing or using nuclear or other weapons of mass
destruction on or in orbit around the moon, establishing military bases, or
conducting weapons tests on the moon. 1
The Moon Treaty reiterates that the moon is not subject to sovereignty
claims, 14 5 but also declares that "[t]he moon and its natural resources are the
common heritage of mankind." 1 4 6 This principle has proven controversial be-
cause, to implement it, the treaty obliges states to establish an international
regime to provide for "equitable sharing" of benefits from future exploitation of
the moon. 14 7 As of January 2014, only fifteen states have ratified the Moon
Treaty. 14 8
In sum, the legal regime enshrined in the Outer Space Treaty, along with
the less-accepted Moon Treaty, affirms that space and celestial bodies may not
be assimilated to sovereign states. The regime was developed in multilateral
fora and relies on governance by treaty. The Outer Space Treaty also restricts
militarization by banning nuclear weapons, prohibiting any military activity
on celestial bodies, and limiting activities on celestial bodies to "peaceful
purposes."
3. Antarctica
The nonsovereign status of Antarctica, like that of outer space, was not a
foregone conclusion. In fact, seven states made territorial claims to parts of
Antarctica between 1908 and 1943.149 In 1958, the United States invited the
eleven other countries that had participated in the Antarctic program of the
International Geophysical Year to a conference to discuss an Antarctic treaty.1 5 0
After only six weeks of deliberation, the Antarctic Treaty was signed on
December 1, 1959.151
The treaty freezes1 5 2 preexisting territorial claims and establishes that the
treaty does not constitute a "renunciation or diminution" of existing claims to
territorial sovereignty or prejudice any state's position with regard to any other
state's claim. 153 It further specifies that no acts while the treaty is in force "shall
constitute a basis for asserting, supporting or denying a claim to territorial
sovereignty in Antarctica or create any rights of sovereignty in Antarctica," and
extent to which the context for cyber is similar to and different from the old
domains and offers proposals for the role of private parties, possible modes of
governance, and regulation of military activities.
The questions of "who participates?" and "who controls?" are basic and
defining issues in any governance system. Russia, China, and the United States
each support answers that favor their national interests.
Russia and China endorse a multilateral model in which states interact with
each other and make decisions about policy and permissible actions in the cyber
domain. The state-based model centralizes authority and opens the door to
greater regulation of information, which is a central theme of Russia and
China's proposed cyber treaty.16' The United States and its allies, on the other
hand, embrace a "multistakeholder model" in which Internet governance in-
cludes "all appropriate stakeholders," such as the private sector, civil society,
academia, and individuals, in addition to governments. 1 6 2 The United States has
161. See Int'l Code of Conduct for Info. Sec., supra note 65 (art. 11(3)) (requiring states to "curb[]
dissemination of information which incites terrorism, secessionism, extremism or undermines other
countries' political, economic and social stability, as well as their spiritual and cultural environment").
162. U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 10, 12.
2015] THE CYBER-LAW OF NATIONS 347
Wu, supra note 18, at vii. They note that while activists in the 1990s argued that "it was impossible for
the government to control the Internet," many now "demand[] that the government act to protect the
Internet from perceived threats-whether from telecom firms or foreign governments." Id.
165. See supra note 68 and accompanying text.
166. Cf LENNARD G. KRUGER, CONG. RESEARCH SERV., R42351, INTERNET GOVERNANCE AND THE
DOMAIN NAME SYSTEM: ISSUES FOR CONGRESS 9-10, 19 (2014) (noting criticism of and proposals to
replace U.S. authority over ICANN); Joshi, supra note 90. Relatedly, supporting the multistake-
holder model supports constituencies, like technology companies, that have become increasingly active
in lobbying the U.S. government in recent years. See, e.g., Jeff Bercovici, Tech Companies Seeking
Surveillance Reform Spent $35 Million Lobbying Last Year, FORBES (Dec. 9, 2013, 8:36 AM), http://
www.forbes.com/sites/jeffbercovici/2013/12/09/tech-companies-seeking-surveillance-reform-spent-35-
million-lobbying-last-year/; Data Privacy, Security Drive Tech Lobbying Spending Increase, NETCHOICE
(Apr. 24, 2014), http://netchoice.org/washington-internet-daily-data-privacy-security-drive-tech-lobbying-
spending-increase/.
167. For a stark encapsulation of the possibility of and rejection by states of a predominant role for
private parties, see GOLDSMITH & Wu, supra note 18, at 29-46 (discussing 1997-98 efforts by the
Internet Society and Jon Postel to move Internet policy and root authority away from the U.S.
government and the successful U.S. government assertion of control).
348 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
168. See JAMES CRAWFORD, BROWNLIE'S PRINCIPLES OF PUBLIC INTERNATIONAL LAW 16-17 (8th ed.
2012) ("[T]he power structures within the international system are such that sovereignty and statehood
remain the basic units of currency," but "[i]t is no longer possible to deny that individuals may have
rights and duties in international law . . . .").
169. See supra text accompanying notes 127-40, 150-51.
170. See Outer Space Treaty, supra note 133, art. VI, 18 U.S.T. at 2415, 610 U.N.T.S. at 209
(specifying that states bear international responsibility for activities carried on by nongovernmental
entities and requiring private actors to obtain authorization from their national state, which has a duty to
supervise the private actors); Antarctic Treaty, supra note 151, arts. VII-VIII, 12 U.S.T. at 797-98, 402
U.N.T.S. at 76-78 (requiring states to give notice regarding expeditions by its nationals, stations
occupied by its nationals, and military personnel, and specifying that observers and scientific personnel
on exchanges are subject to the jurisdiction only of their national state).
171. In certain respects, the role of private parties in cyber governance may be similar to the
historical role of private parties in the formation of international law related to the high seas,
specifically the lex mercatoria. In both instances, private parties developed governance mechanisms
without the intervention of states. See Johnson & Post, supra note 18, at 1389-90 (calling the "origin of
the Law Merchant" the "most apt analogy to the rise of a separate law of Cyberspace"); Henry H.
Perritt, Jr., The Internet as a Threat to Sovereignty? Thoughts on the Internet's Role in Strengthening
National and Global Governance, 5 IND. J. GLOBAL LEGAL STUD. 423, 427 (1998) ("Cybemauts most
closely resemble medieval merchants who developed substantive rules and practices to regulate
transnational trade-the lex mercatoria-outsidetraditional political institutions."). For the high seas,
however, states intervened and developed law for issues of state concern; the same result is likely for
cyberspace. The intervention of states in the law of the sea may, in fact, be a cautionary tale for
cyberspace. When states finally codified the law of the sea, they extended the realm of sovereign
control and decreased the scope of the commons (that is, the high seas) by, for example, allowing states
to have an exclusive economic zone extending 200 miles from their baselines. See W. MICHAEL REISMAN
ET AL., INTERNATIONAL LAW IN CONTEMPORARY PERSPECTIVE 656 (2004) (Note 3).
2015] THE CYBER-LAW OF NATIONS 349
172. See generally Mitch Waldrop, DARPA and the Internet Revolution, in DARPA: 50 YEARS OF
BRIDGING THE GAP 78 (2008), available at www.darpa.mil/WorkArea/DownloadAsset.aspx?id=2554.
173. About the IETF, INTERNET ENGINEERING TASK FORCE, http://www.ietf.org/about/ (last visited
Nov. 30, 2014).
174. Getting Started in the IETF, INTERNET ENGINEERING TASK FORCE, http://www.ietf.org/
newcomers.html (last visited Nov. 30, 2014).
175. Id.
176. See Bradner, supra note 20, ¶ 1.2 ("In outline, the process of creating an Internet Standard is
straightforward: a specification undergoes a period of development and several iterations of review by
the Internet community and revision based upon experience, is adopted as a Standard by the appro-
priate body . . . and is published. In practice, the process is more complicated, due to . . . the importance
of establishing widespread community consensus . . . ."); Mission Statement, INTERNET ENGINEERING
TASK FORCE, http://www.ietf.org/about/mission.html (last visited Nov. 30, 2014) (describing the IETF's
"cardinal principles" of "[r]ough consensus and running code").
177. See Articles of Incorporation of Internet Corporationfor Assigned Names and Numbers,
INTERNET CORP. FOR ASSIGNED NAMES & NUMBERS, http://www.icann.org/en/about/governance/articles
(last visited Nov. 30, 2014).
178. See Welcome to ICANN!, INTERNET CORP. FOR ASSIGNED NAMES & NUMBERS, http://www.icann.org/
en/about/welcome (last visited Nov. 30, 2014). The United States announced in March 2014 its intent to
transition its remaining domain name functions to ICANN, and ICANN has convened a multistake-
holder process to develop a transition plan. See Craig Timberg, U.S. to Relinquish Remaining Control
over the Internet, WASH. POST, Mar. 14, 2014, http://www.washingtonpost.com/business/technology/us-
to-relinquish-remaining-control-over-the-internet/2014/03/14/0c7472d0-abb5-1 1e3-adbc-888c8010c799
story.html; see also Administrator of Domain Name System Launches Global Multistakeholder
Accountability Process, INTERNET CORP. FOR ASSIGNED NAMES & NUMBERS (Mar. 14, 2014), https://www.
icann.org/resources/press-material/release-2014-03-14-en.
179. See GOLDSMITH & Wu, supra note 18, at 33-35; ROBERT K. KNAKE, COUNCIL ON FOREIGN
RELATIONS, INTERNET GOVERNANCE IN AN AGE OF CYBER INSECURITY 6 (2010), available at http://www.cfr.org/
terrorism-and-technology/internet-governance-age-cyber-insecurity/p22832.
350 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
providers and web companies accelerate the transition from Internet Protocol
version 4 ('IPv4') to Internet Protocol version 6 ('IPv6')," which the IETF
developed to allow continued growth of the Internet despite exhaustion of the
4.3 billion IP addresses that were available under IPv4.iso The new Internet
protocol was "developed, supported, and largely implemented by non-state
actors." 8 1
Thus, if nonstate parties were cut out of Internet and cyber governance
matters in a shift to a multilateral system, governments or multilateral institu-
tions would need to assume the functions that private parties currently perform.
It is not clear that they could do so or at least that they could do so effec-
tively. 182
Second, private parties are important ongoing users of cyberspace, both
numerically and strategically. There is a preexisting constituency of private
parties that are accustomed to participating in and having a major influence on
cyber policy issues. 18 3 Adopting the multilateral model of cyber governance
that China and Russia advocate is in effect not a question of whether to
enfranchise private parties in cyber governance, but rather whether to disenfran-
chise private parties that have participated in and even controlled governance
for decades. 18 4 Cyber therefore starts from the opposite baseline from the legal
regimes established in particular for outer space, where states operated first
and private parties have only recently begun to operate in ways similar to
governments. 185
Third, private parties own the majority of the underlying infrastructure that
180. David P Fidler, Recent Developments and Revelations Concerning Cybersecurity and Cyber-
space: Implicationsfor InternationalLaw, ASIL INSIGHTS (June 20, 2012), http://www.asil.org/insights/
volume/16/issue/22/recent-developments-and-revelations-concerning-cybersecurity-and. IPv6 increases
the number of possible IP addresses to "approximately 340 undecillion (or trillion, trillion, trillion)." Id.
181. Id.
182. See, e.g., Zoe Baird, Governing the Internet: Engaging Government, Business, and Nonprofits,
FOREIGN AFF., Nov./Dec. 2002, at 15, 15; see also INTERNET Soc'Y, SUBMISSION: ITU WORLD CONFERENCE
ON INTERNATIONAL TELECOMMUNICATIONS REGULATIONS (WCIT-12), at 3 (2012) (arguing that governments
should not "lock-in a regulatory approach that may have significant and unpredictable negative con-
sequences for the ability of networks to evolve, for new services to come about, for new businesses to
be formed worldwide").
183. See Baird, supra note 182, at 15 ("Many of the initial Internet oversight bodies emphasized
self-regulation, bottom-up control, decentralization, and privatization, reflecting a conviction that gov-
ernment would never 'get it' or move fast enough to keep pace with technological change."); Daniel W.
Drezner, The Global Governance of the Internet: Bringing the State Back In, 119 POL. Sn. Q. 477, 481
(2004) ("A cursory review of the nonstate actors involved in the regulation of the Internet [including
the IETF and ICANN] . . suggests the existence of a strong, coherent, epistemic community on these
issues.").
184. See Wu, supra note 33, at 664 ("Because of the pattern of the Internet's growth, most of the
currently existing norms have been established by individuals from the United States and likeminded
countries; thus the norms of those countries can be felt strongly in the higher-level norms and rules of
cyberspace.").
185. For a contemporaneous snapshot of the primacy of states in the early days of outer space
operations, see Nicholas deB. Katzenbach, Sharable and Strategic Resources: Outer Space, Polar
Areas, and the Oceans, 53 AM. Soc'Y INT'L L. PROC. 206, 207 (1959).
2015] THE CYBER-LAW OF NATIONS 351
supports the cyber domain.1 6 This ownership structure means that private
parties may be responsible for implementing policy choices made by govern-
ments.18 7 Private actors may also suffer harm due to governments' actions, as
some U.S. technology companies assert has occurred in the wake of the
Snowden disclosures. 8 8 Private parties have, in essence, a vested interest in at
least some policy decisions concerning cyberspace.
Finally, a move to a multilateral model would mark a qualitative shift in the
nature of the Internet. The current Internet "embodies a mode of social and
technical organization which is decentralized, cooperative, and layered." 18 9
Shifting to a multilateral model, on the other hand, could facilitate increased
governmental control of content and access to information.1 90 The current
decentralized Internet architecture, dependent on informal associations of pri-
vate parties like the IETF, helps to foster other types of freedom from state
control, including the freedoms of speech and association. The United States
has explicitly tied its advocacy of the multistakeholder model to fostering these
freedoms, arguing that the multistakeholder model "fuels the freedom of expres-
sion and association that enables social and political growth and the functioning
of democratic societies worldwide." 1 9 1
As this discussion makes clear, the debate over the multilateral versus
multistakeholder governance models embodies, in microcosm, a larger clash
about the role of states vis-h-vis individuals. The enfranchisement of private
parties that the current system allows is antithetical to the state control over
private parties upon which some governments depend, and the openness and
freedom that a nonstate-run Internet facilitates jeopardizes that state control.
Goldsmith and Wu have argued that nearly "every debate about Internet gover-
186. See U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 12 ("[I]nfrastructure owners and
operators . . are responsible for the majority of network functionality . . . ."); GOLDSMITH & Wu, supra
note 18, at 73 ("The physical network is by necessity a local asset, owned by phone companies, cable
companies, and other service providers . . . .").
187. See Hearing to Receive Testimony on U.S. Strategic Command and U.S. Cyber Command in
Review of the Defense Authorization Request for Fiscal Year 2014 and the Future Years Defense
ProgramBefore the S. Comm. on Armed Servs., 113th Cong. 2 (2013) (statement of General Keith B.
Alexander, Commander, U.S. Cyber Command) [hereinafter Statement of Keith B. Alexander],
available at http://www.defense.gov/home/features/2013/0713_cyberdomain/docs/Alexander%20
testimony%20March%202013.pdf ("Most networked devices . . are in private hands, and their owners
can deny or facilitate others' cyber operations by how they manage and maintain their networks and
devices."); Austin Ramzy, Google Ends Policy of Self-Censorship in China, TIME (Jan. 13, 2010),
http://content.time.com/time/world/article/0,8599,1953248,00.html (explaining Google's decision to cease
censorship of sensitive topics in China).
188. See Cecilia Kang & Ellen Nakashima, Tech Executives to Obama: NSA Spying Revelations Are
Threatening Business, WASH. POST, Dec. 17, 2013, http://www.washingtonpost.com/business/technology/
2013/12/17/6569b226-6734-11e3-a0b9-249bbb34602c-story.html; Steven Levy, How the NSA Almost
Killed the Internet, WIRED (Jan. 7, 2014, 6:30 AM), http://www.wired.com/2014/01/how-the-us-almost-
killed-the-internet/all/.
189. U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 22.
190. See KNAKE, supra note 179, at 7.
191. U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 22; see also Clinton, supra note 68.
352 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
nance is at bottom a debate about speech governance,"l92 and freedom (or not)
of speech is an important marker differentiating types of governments. Funda-
mentally, the answer to "who controls?" also impacts what and how much
control will be exercised.
When states gathered to establish legal regimes for the old domains, private
parties had neither the preexisting governance role nor the ongoing ownership
of the underlying components in those domains that they have in cyber. Nor did
governance of the old domains implicate the freedoms of speech and association
that cyber involves. These divergences suggest that, although multilateral gover-
nance made sense for the old domains, private parties should be treated differ-
ently with regard to cyberspace. States considering legal regimes for cyber do
not operate on a blank slate, as they essentially did in crafting the treaties for
the old domains. Beginning from the nearly opposite baseline from the old
domains with regard to the role of private parties, cyber cannot and should not
be governed by the same multilateral model. For cyber, a multistakeholder
model represents a compromise between an all-private model, which govern-
ments cannot tolerate, and the states-only multilateral model that China and
Russia advocate.
The next section addresses the best modality or modalities to govern cyber
issues.
B. MODALITY OF GOVERNANCE
The international community has a menu of options for governing the cyber
domain. First, states could do nothing. That is, they could leave the domain
governed only by existing internationally agreed-upon rules that apply regard-
less of location. If no governance mechanism is unacceptable, then alternatives
include a broad, multilateral treaty, narrower treaties, or soft law, such as norms.
For the high seas, outer space, and Antarctica, states ultimately created a
governance structure specific to each of them and agreed on the same general
modality of governance: a broad, multilateral treaty. For cyber, the international
community has not agreed upon treaties, except as to cybercrime. 1 93 The
examples of the treaties addressing the old domains may suggest that treaties
are the ultimate end state for any contested domain that poses similar challenges
to the old domains. Or it may simply be an accident of history that the old
domains are governed via treaty.
This section addresses the relative strengths and weaknesses of several
possible options-no governance arrangement specific to cyberspace, a multi-
lateral treaty, narrower or regional treaties, and agreed or common norms. It
discusses their likelihood and utility for cyber, drawing lessons as appropriate
from the choices made with regard to the old domains.
1. No Governance Arrangement
The first option for a governance structure is not to have one-that is, to have
no governance structure specific to a domain. With the exception of cybercrime
treaties and technical regulations, 1 94 there is no governance mechanism specific
to cyber at present. A no-governance structure is the default absent agreement to
some other mechanism. Importantly, the absence of a domain-specific gover-
nance structure does not mean that no law applies. Generally applicable interna-
tional laws continue to apply to new circumstances, including to states' actions
in cyberspace. 195
In certain circumstances, states might choose not to institute a governance
arrangement specific to a domain. For example, a governance arrangement may
be unnecessary if states have no ability to operate in a domain-for example,
outer space prior to the 1950s-or if customary rules have developed and are
well-accepted. The latter situation prevailed with regard to the high seas prior to
the codification of customary rules in the Convention on the High Seas and
UNCLOS. 1 96 Alternatively, a governance arrangement might be desirable and
necessary but may still not exist just after operation in a domain becomes
possible because of uncertainty about the consequences for states of various
legal rules. 1 97 Outer space in the 1950s might exemplify this situation.198 More
194. See Wu, supra note 33, at 658 (describing the "Internet as an international regime" because
states connected to the Internet "all have implicitly agreed, at a minimum, to a set of technical standards
that facilitate the transmission of data over the Internet," specifically the TCP/IP system).
195. For example, in considering the permissibility under international law of the threat or use of
nuclear weapons, the International Court of Justice made clear that, despite the lack of a treaty
specifically addressing nuclear weapons, states' use of nuclear weapons must comply with the U.N.
Charter restrictions on the use of force and with basic precepts of international humanitarian law.
Legality of Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226, 244 (July 8)
(explaining that Articles 2(4) and 51 of the U.N. Charter "apply to any use of force, regardless of the
weapons employed"); id. at 257-60 (discussing the applicability of the Martens Clause, the principle of
distinction, and the prohibition on use of weapons that cause unnecessary suffering); cf Michael N.
Schmitt, International Law in Cyberspace: The Koh Speech and the Tallinn Manual Juxtaposed,
54 HARV. INT'L L.J. ONLINE 13, 17 (2012), http://www.harvardilj.org/wp-content/uploads/2012/12/HILJ-
Online_54_Schmitt.pdf (explaining that it is "well accepted that a lack of directly applicable treaty law
does not create an international humanitarian law-free zone").
196. See Convention on the High Seas, supra note 119, pmbl., 12 U.S.T. at 2314, 450 U.N.T.S.
at 82.
197. Cf BANNER, supra note 92, at 278 (explaining, with respect to the legal status of outer space
in the 1950s, that "[1]egal uncertainty was useful to those with the power to act in space, on either side
of the cold war"); Franzese, supra note 6, at 38 ("[S]tates might want to wait to enter agreements that
define acceptable and prohibited activity until they obtain a better understanding of cyberspace's
strategic potential."); Wu, supra note 33, at 665 ("At this nascent stage of the Internet's influence on
mainstream society, cyberspace retains a high degree of independence simply for reasons of inertia. The
governments of the world have only begun to express their preferences .... ).
198. Cf BANNER, supra note 92, at 272 (chronicling that U.S. officials did not want an international
agreement on space in the 1950s and early 1960s because the dominant position of the United States
meant that "any rules would necessarily fetter the United States the most"); id. at 275 ("The Soviet
Union, the only other nation with a significant space program, had the same incentive to avoid
committing itself to any view of the law that might restrict its own activities in space.").
354 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
2. Treaty
At the opposite end of the spectrum from no governance arrangement,
treaties enshrine a formal legal agreement about governance of a domain. The
high seas, outer space, and Antarctica all came to be governed by multilateral
199. Cf Fidler, supra note 180 ("Nothing about the Stuxnet or Flame revelations suggests that
states, especially the great powers and, in particular, those concerned about U.S. cyber power, will scale
back cyber espionage activities or development of offensive and defensive cyber capabilities-a
situation not conducive to developing international legal rules on cybersecurity challenges.").
200. For a prediction of when international cooperation will occur, see Wu, supra note 33, at 657
(describing the institutionalist theory as predicting that "international regimes will arise where states
must coordinate their behavior in order to achieve a desired outcome," such as "where uncoordinated
calculations of self-interest will generate a non-Pareto-optimal outcome (such as the classic prisoner's
dilemma) or even lead to disastrous results, or where an issue area is particularly complex," including
such examples as "security regimes" like "arms control agreements or the United Nations Security
Council"). For a call for additional governance of cyber, see Charles J. Dunlap, Jr., Towards a
Cyberspace Legal Regime in the Twenty-First Century: Considerationsfor American Cyber- Warriors,
87 NEB. L. REv. 712, 720 (2009) (recognizing the need for "improved international cooperation to
create legal architecture to better address the level of cyber activities not falling into the category where
established law of war processes readily apply").
201. Int'l Code of Conduct for Info. Sec., supra note 65; U.S. INT'L STRATEGY FOR CYBERSPACE, supra
note 62, at 8; cf Perritt, supra note 171, at 429 ("Internet regulation is a global problem, like
environmental degradation in the ozone depletion or global warming contexts, because no one country
can adequately deal with the problem on its own. Thus, international cooperation is necessary.").
2015] THE CYBER-LAW OF NATIONS 355
treaties,20 2 but so far cyber largely is not.203 Certain states have proposed cyber
treaties for more than a decade, 2 0 4 but significant skepticism exists about the
prospects for a cyber treaty, 2 0 5 with some commentators calling a "worldwide,
comprehensive cybersecurity treaty" a "pipe dream." 20 6
Nonetheless, China, Russia, Tajikistan, and Uzbekistan in September 2011
submitted to the U.N. Secretary-General a draft International Code of Conduct
for Information Security and requested that the Secretary-General provide the
draft to the General Assembly for discussion.20 7 China explained that the
Code's aim was "to reach consensus on the international norms and rules stan-
dardizing the behavior of countries concerning information and cyberspace." 20 8
The Code itself repeatedly emphasizes the need to maintain "international
stability and security." 2 0 9 To further this goal, it would obligate states not to use
cyber technology or networks "to carry out hostile activities or acts of aggres-
sion" and not to "proliferate information weapons and related technologies." 2 10
The Code would also require states to cooperate in "curbing dissemination of
information which incites terrorism, secessionism, extremism or undermines
other countries' political, economic and social stability, as well as their spiritual
and cultural environment." 2 1 1 In line with China and Russia's preferred vision
and as noted above,2 12 the Code would promote sovereign states' control over
202. The use of broad multilateral treaties to govern the old domains may be a reflection of the
historical period in which they were negotiated. The decades following World War II and the
establishment of the United Nations saw the negotiation of numerous multilateral conventions and
raised the prominence of treaties vis-a-vis customary international law. See RESTATEMENT (THIRD) OF THE
FOREIGN RELATIONS LAW OF THE UNITED STATES pt. III, introductory note (1987) ("The law of international
agreements has grown in significance and scope since the Second World War, as international
agreements have assumed a larger place in the life of the international community of states and in
international law."); see also id. pt. I, ch. 1, introductory note.
203. GOLDSMITH & Wu, supra note 18, at 165 ("Internet treaties in particular have proven elusive.");
Tim Wu et al., The Future of Internet Governance, 101 AM. Soc'Y INT'L L. PROC. 201, 213 (2007)
(quoting Wu explaining that "the role of treaties . . . in the regulation of the Internet[] is fairly minimal,
though not non-existent").
204. In 1996, France proposed a "Charter for International Cooperation on the Internet," and the
"French Minister for Information Technology expressed hope that the initiative would lead eventually
to an accord comparable to the international law of the sea." Wu, supra note 33, at 660 & nn.55-56.
Similarly, in the late 1990s, Russia circulated a draft "arms-control treaty for cyberspace" among U.N.
Security Council members, but the United States and its allies dismissed the draft treaty. James Adams,
Virtual Defense, FOREIGN AFF., May/June 2001, at 98, 104; see also KNAKE, supra note 179, at 7.
205. See, e.g., Jack Goldsmith, Cybersecurity Treaties: A Skeptical View, in FUTURE CHALLENGES IN
NATIONAL SECURITY AND LAw (Peter Berkowitz ed., 2011), http://www.hoover.org/taskforces/national-
security/challenges.
206. Adam Segal & Matthew Waxman, Why a Cybersecurity Treaty Is a Pipe Dream, CNN WORLD
(Oct. 27, 2011, 2:01 PM), http://globalpublicsquare.blogs.cnn.com/2011/10/27/why-a-cybersecurity-treaty-
is-a-pipe-dream/; see also Segal, supra note 72, at 15.
207. See Int'l Code of Conduct for Info. Sec., supra note 65.
208. Id.
209. Id.
210. Id. (art. 11(2)); see also id. (art. 11(11)) (requiring states to pledge to "settle any dispute resulting
from the application of this Code through peaceful means and refrain from the threat or use of force").
211. Id. (art. 11(3)).
212. See supra note 66 and accompanying text.
356 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
213. Int'l Code of Conductfor Info. Sec., supra note 65 (art. 11(5)).
214. Id. (art. 11(7)).
215. See U.S. Delegation Statement, supra note 164 ("The United States favors international
engagement to develop a consensus on appropriate cyberspace behavior, based on existing principles of
international law, and we cannot support approaches proposed in the draft Code of Conduct for
Information Security that would only legitimize repressive state practices.").
216. See supra note 202 (noting the prevalence of multilateral treaty negotiations at the time treaties
for the old domains were negotiated).
217. Segal, supra note 72, at 15 ("Washington and Beijing won't agree to a broad treaty governing
cyberspace mainly because they hold fundamentally incompatible views on the Internet and society.");
Segal & Waxman, supra note 206 ("With the United States and European democracies at one end and
China and Russia at another, states disagree sharply over such issues as whether international laws of
war and self-defense should apply to cyber attacks, the right to block information from citizens, and the
roles that private or quasi-private actors should play in Internet governance.").
218. PRC MILITARY AND SECURITY DEVELOPMENTS, supra note 61, at 37.
2015] THE CYBER-LAW OF NATIONS 357
plained the "fundamental difference" in how the countries define cyber threats,
noting that while Russia, China, and Iran "focus on 'cyber influence' and the
risk that Internet content might contribute to political instability and regime
change," "[t]he United States focuses on cyber security and the risks to the
reliability and integrity of our networks and systems."2 1 9 In addition to these
substantive disagreements, states also disagree on the need for new law, with
China, Russia, and others pushing for entirely new legal frameworks, and the
United States arguing that existing international law applies and that law for
cyber is a matter of "applying old questions to the latest developments in
technology." 2 2 0
For the high seas, outer space, and Antarctica, states agreed that the domains
should not be controlled by individual states (or in the case of Antarctica, that
territorial claims would be preserved for later resolution in case international
governance failed). For cyber, there is no similar agreement. Because China,
Russia, and other states believe that cyber should be subject to sovereign states'
control, and the United States and its allies believe cyber should not be
controlled by individual states or states acting in concert, agreement will be
difficult if not impossible.22 1
Second, there is no preexisting system of cyber-specific laws that can be
simply formalized in a treaty. The absence of agreed norms or a modus operandi
makes cyber unlike the high seas. The high seas were first governed formally by
the Convention on the High Seas, which was "generally declaratory of estab-
lished principles of international law." 2 2 2
Third, many and perhaps even all states have a stake in any potential cyber
treaty. The Internet and cyber gain utility from their broad acceptance.22 3 The
number of interested parties who would want to weigh in on and who would
219. Current and Projected National Security Threats to the United States: Hearing Before the
S. Select Comm. On Intelligence, 113th Cong. 18 (2013) (statement for the record of James R. Clapper,
Director of National Intelligence) [hereinafter Statement of James R. Clapper], available at http://
www.intelligence.senate.gov/1 3 1 11 3 pdfs/ 11 389.pdf.
220. Harold Hongju Koh, International Law in Cyberspace, Remarks as Prepared for Delivery to the
USCYBERCOM Inter-Agency Legal Conference (Sept. 18, 2012), in 54 HARV. INT'L L.J. ONLINE 1, 8
(2012), http://www.harvardilj.org/wp-content/uploads/2012/12/Koh-Speech-to-Publishl.pdf.
221. However, the Antarctic Treaty was negotiated despite territorial claims by some states because
those states agreed to freeze their territorial claims during the treaty's existence. See Antarctic Treaty,
supra note 151, art. IV, 12 U.S.T. at 796, 402 U.N.T.S. at 74.
222. Convention on the High Seas, supra note 119, pmbl., 13 U.S.T. at 2314, 450 U.N.T.S. at 82.
223. See DAVID SINGH GREWAL, NETWORK POWER: THE SOCIAL DYNAMICS OF GLOBALIZATION 24-27
(2008); Ti Wu, THE MASTER SWITCH: THE RISE AND FALL OF INFORMATION EMPIRES 282 (Vintage Books
2011) (2010) ("The supreme value of the [World Wide] Web was, and is, its universality."); id. at
318-19 ("[The] network effect, or network externality.... [is the idea that] a network becomes more
valuable as more people use it. . . . And a network that everyone uses is worth fantastically more than
the sum value of one hundred networks with as many users collectively as the one great network.");
Mark A. Lemley & David McGowan, Legal Implications of Network Economic Effects, 86 CALIF. L.
REv. 479, 484 (1998) ("'Metcalfe's Law' asserts that for computers, the value of participation on a
network grows exponentially with the size of the network.").
358 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
224. Antarctic Treaty, supra note 151, pmbl., 12 U.S.T. at 795, 402 U.N.T.S. at 72. For a list of the
seven claimant states, see supra note 149.
225. See Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer
Space, Including the Moon and Other Celestial Bodies, U.S. DEP'T ST., http://www.state.gov/www/globall
arms/treaties/space l.html (last visited Nov. 30, 2014).
226. Cf Hurwitz, supra note 104, at 31 ("[W]hen more parties are involved, especially when the
issues are complex, there will be a greater number of competing claims that take time to reconcile, if
they can be reconciled at all. Negotiations for . . [UNCLOS], which regulates another commons,
lasted a decade despite building on centuries of admiralty law and being more confined to issues of
state sovereignty.").
227. Specific proposals include narrow treaties that would prohibit attacks on the Internet root
and "limit[] state actor penetration into civilian systems that have limited, if any, intelligence value,"
including, for example, power grids. KNAKE, supra note 179, at 23.
228. See Nye, supra note 17, at 34-35 ("The most promising early areas for international coopera-
tion are not bilateral conflicts, but problems posed by third parties such as criminals and terrorists,"
including cybercrime and cyberterrorism.). Nye's suggestion of a cyberterrorism treaty fits the para-
digm of focusing on third parties, but Nye provides no reason to think that the definitional and other
difficulties that have plagued international efforts to achieve agreement with regard to non-cyber
terrorism would be any less problematic in the cyber context.
229. Other proposals suggest protecting the "security and sanctity of root operations" and "ban[ning]
denial-of-service attacks." KNAKE, supra note 179, at 23.
2015] THE CYBER-LAW OF NATIONS 359
force in 2004230 and is open to any state. So far, forty-four states have ratified it,
including non-Council of Europe members such as Australia, Japan, and the
United States.23 1
The Budapest Convention, however, also exemplifies the limits of regional
treaties. China and its allies have not joined and have expressed disapproval of
the Convention on both procedural and substantive grounds.23 2 As a procedural
matter, they appear unwilling to join a Convention that they were not involved
in drafting, and as a substantive matter, they object to the authority the Con-
vention gives law enforcement authorities to access servers outside their home
jurisdiction.23 3 As an alternative, China and Russia have advocated a new
cybercrime treaty, 2 34 which the United States and its European allies have
rejected.235 The United States continues to push for more states to ratify the
Budapest Convention,2 36 but its insistence on the Council of Europe treaty may
actually hinder the development of broader agreement on cybercrime issues.
Developing countries and other non-European countries might be more likely to
sign treaties that they play a part in drafting 237-even treaties that are substan-
230. Treaty Office, Council of Eur., Status Report on Convention on Cybercrime, COUNCIL EUR.,
http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT= 185&CM &DF &CL=ENG (ratifi-
cations as of Nov. 6, 2014).
231. Id.
232. See, e.g., CICIR-CSIS, supra note 71 (explaining China's procedural and substantive objec-
tions).
233. Id. (noting view of CICIR that the Budapest Convention "fails to adequately reflect the
significant concern of the developing world in fighting cybercrime" and that "there exists inevitable
concern over violation of sovereignty and incompatibility with domestic legislations caused by trans-
national collection of evidence"); Mark Ballard, UN Rejects International Cybercrime Treaty, COM-
PUTER WKLY. (Apr. 20, 2010, 3:44 PM), http://www.computerweekly.com/news/1280092617/UN-rejects-
international-cybercrime-treaty (explaining that "developing countries want[] a new treaty drafted by a
global process" and that Russia has opposed the Convention's provisions allowing police "to access
servers in other countries without the permission of the authorities, as long as the system owners
sanction the access" ever since "US police in 2000 hacked computers belonging to two Russian men
who had been defrauding American banks").
234. See Ballard, supra note 233 (explaining that Russia proposed a new cybercrime treaty at a 2010
U.N. conference, but the proposal was rejected in light of U.S. and EU opposition and support for the
Budapest Convention); see also CICIR-CSIS, supra note 71 ("CICIR advocates a new international
convention on cybercrime being drafted through both bilateral and multilateral efforts and by autho-
rized GGE within the UN framework.").
235. See CICIR-CSIS, supra note 71 ("CSIS has stressed the inadequacy of other arrangements for
dealing with cybercrime when compared to the Budapest convention . . . ."); Ballard, supra note 233;
see also U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 20 (stating U.S. policy to advocate for
broader adherence to the Budapest Convention).
236. U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 20.
237. For example, in June 2014, the African Union adopted the African Union Convention on Cyber
Security and Personal Data Protection, which deals in part with cybercrime. African Union Convention
on Cyber Security and Personal Data Protection ch. III, June 27, 2014, AU No. Ex.CL/846(XXV),
available at http://pages.au.int/sites/default/files/en AU%20Convention%20on%20CyberSecurity%20
Pers%20Data%20Protec%20AUCyC%20adopted%2OMalabo.pdf; see also The African Union Conven-
tion on Cybersecurity and Personal Data Protection, ZIMBABWEAN (July 21, 2014, 4:15 PM), http://
www.thezimbabwean.co/news/zimbabwe/72617/the-african-union-convention-on.html (assessing
strengths and weaknesses of the convention).
360 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
238. Cf KNAKE, supra note 179, at 13 ("Instead of trying to cajole former colonies into a treaty put
together by former colonial powers, replicating the Council of Europe Convention on Cybercrime in the
Organization of American States, the African Union, and the Association of Southeast Asian Nations
(ASEAN) may be more effective.").
239. GOLDSMITH & Wu, supra note 18, at 166.
240. For additional discussion of issues related to cyber militarization, see infra section III.C.
241. For example, nuclear arms treaties address the behavior of states and their fundamental
security. See, e.g., Treaty Between the United States of America and the Russian Federation on
Measures for the Further Reduction and Limitation of Strategic Offensive Arms, U.S.-Russ., Apr. 8,
2010, T.I.A.S. No. 11-205.
242. Cf Tod Leaven & Christopher Dodge, The United States Cyber Command: International
Restrictions vs. Manifest Destiny, 12 N.C. J.L. & TECH. ONLINE 1, 3 (2010), http://ncjolt.org/the-united-
states-cyber-command-international-restrictions-vs-manifest-destiny/ (arguing that the United States
should "wait until more information is available to better analyze its position before entering into an
international cyber-warfare treaty"); supra notes 197-98 and accompanying text.
243. See Leaven & Dodge, supra note 242, at 23 ("[T]ying the hands of the United States, with its
premier position in cyber-space, would only cause global harm."); Jack Goldsmith, The New Vulnerabil-
ity, NEw REPUBLIC (June 7, 2010), http://www.newrepublic.com/articlelbooks-and-arts/75262/the-new-
vulnerability (book review) (rejecting proposal by Richard Clarke for a treaty that would ban cyber
attacks against civilian infrastructure but not cyber exploitation on the grounds that China, which
targets U.S. civilian infrastructure, would "have little interest in signing on," and "nations subject to
NSA snooping but not good at snooping themselves would not be interested in a carve-out for
state-sponsored snooping"); cf KNAKE, supra note 179, at 21-22 ("The United States is the most feared
bogeyman in cyberspace, given its historical role in developing the underlying technologies and the
high level of capability within U.S. military and intelligence agencies.").
244. See Nye, supra note 17, at 34 ("[D]ifferences in cultural norms and the impossibility of veri-
fication make such [cyber arms control] treaties difficult to negotiate or implement. Such efforts could
actually reduce national security if asymmetrical implementation put legalistic cultures like the United
States at a disadvantage compared to societies with a higher degree of government corruption.");
Goldsmith, supra note 243.
2015] THE CYBER-LAW OF NATIONS 361
3. Norms
If the absence of a governance regime is unacceptable, but a broad multilat-
eral treaty is impossible, development of norms to govern behavior in the cyber
domain may be the best-or only-option. Unlike a meticulously negotiated
treaty text, norms are general principles, not precise rules.2 45
However, norm development is attractive for several reasons.
First, norms are easier to develop than a treaty and therefore may provide a
faster route to establishing at least a partial governance system. Unlike a treaty,
which requires broad agreement and may take years to negotiate, norms can
arise through states acting individually, bilaterally, regionally, or multilaterally
and without agreement of all states.24 6 Norms may develop through unilateral
policy declarations, such as states' issuance of cyberspace policies or speeches
by government officials.2 47 Norms may also arise through actions and state-
ments of groups of states or simply between two states. Bilateral declarations
might include joint communiqu6s248 or, for example, the addition of cyber
attacks as triggers for the provisions of the U.S.-Australia mutual defense
treaty. 2 4 9 On a regional level, NATO in 2011 issued a "Policy on Cyber
Defence," which makes clear that "NATO will defend its territory and popula-
tions against all threats, including emerging security challenges such as cyber
defence" and that NATO will provide assistance if its members suffer a cyber
attack.2 50 In a declaration accompanying a meeting of heads of state in Septem-
ber 2014, NATO further clarified its position that "international law, including
international humanitarian law and the UN Charter, applies in cyberspace."251
Such declarations have the potential to emerge from groups that are not
245. Stephen D. Krasner, Structural Causes and Regime Consequences: Regimes as Intervening
Variables, in INTERNATIONAL REGIMES 1, 2 (Stephen D. Krasner ed., 1983) (defining norms as "standards
of behavior defined in terms of rights and obligations" and rules as "specific prescriptions or proscrip-
tions for action").
246. See U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 18 (noting that cyberspace issues
have been discussed at, inter alia, the Organization of American States, Organization for Cooperation
and Security in Europe, and African Union); Segal & Waxman, supra note 206 (arguing that progress
for the United States in "promoting a vision of cyber security and freedom" will "be incremental . .
and achieved through multiple arrangements hammered out with a wide array of state and private actors
rather than through a global accord").
247. For an example of such a speech, see Koh, supra note 220.
248. See, e.g., OECD High Level Meeting, The Internet Economy: Generating Innovation and
Growth, Paris, Fr., June 28-29, 2011, Communiqud on Principlesfor Internet Policy-Making, available
at http://www.oecd.org/internet/innovation/48289796.pdf; see also Segal & Waxman, supra note 206
(suggesting that the United States "cultivate allies and like-minded partners through joint policy
declarations, recognizing that Beijing and Moscow are doing likewise" (emphasis omitted)).
249. See Simon Mann, Cyber War Added to ANZUS Pact, SYDNEY MORNING HERALD, Sept. 16, 2011,
http://www.smh.com.au/national/cyber-war-added-to-anzus-pact-20110915- lkbuv.html.
250. NATO, DEFENDING THE NETWORKS: THE NATO POLICY ON CYBER DEFENCE 2 (2011), available at
http://www.nato.int/nato-static/assets/pdf/pdf 2011 09/20111004 110914-policy-cyberdefence.pdf.
251. Press Release, NATO, Wales Summit Declaration Issued by the Heads of State and Government
Participating in the Meeting of the North Atlantic Council in Wales ¶[72 (Sept. 5, 2014), available at
http://www.nato.int/cps/en/natohq/official texts_11 2964.htm?selectedLocale = en.
362 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
simply composed of like-minded allies. For example, in June 2013, the U.N.
Group of Governmental Experts (GGE) on Developments in the Field of
Information and Telecommunications in the Context of International Security
achieved consensus on the very general principle that "[i]nternational law, and
in particular the Charter of the United Nations," applies in cyberspace.25 2
Although the generality of the agreed statement leaves much unclear about the
application of international law in practice, the declaration is significant because
it represents agreement by all fifteen of the GGE member states,25 3 including
Russia and China, which had not previously conceded that international law
applies to cyberspace at all.25 4
The informality and multistage process of norm emergence also has the
potential to provide a greater voice to developing countries and to non-gov-
ernmental actors. In bilateral interactions with, for example, the United States,
United Kingdom, or China, developing countries may be able to exert a stronger
influence on norm development than they would at a single conference to
develop a broad cyber treaty.2 5 5 Enfranchisement of developing countries in
norm creation may promote buy-in to the resulting norms and avoid later
problems, like those surrounding the Budapest Convention,2 56 whereby develop-
ing countries are pressed to accept a fait accompli. Of course, efforts to recruit
developing and other as yet undecided countries to one set of norms or another
may provide an additional arena of competition for the United States and its
allies, and China, Russia, and their allies.25 7
Second, norms can develop through and evolve with state practice. Much
remains unknown about states' capabilities, which change with technological
advances. A treaty aimed at current capabilities risks becoming out-of-date, but
252. U.N. Grp. of Governmental Experts on Devs. in the Field of Info. & Telecomms. in the Context
of Int'l Sec., Rep., transmitted by Note of the Secretary-General, ¶ 19, U.N. Doc. A/68/98 (June 24,
2013) [hereinafter U.N. GGE 2013 Report]; see also Press Statement, Jen Psaki, Spokesperson, U.S.
Dep't of State, Statement on Consensus Achieved by the UN Group of Governmental Experts on Cyber
Issues (June 7, 2013), available at http://www.state.gov/r/palprs/ps/2013/06/210418.htm.
253. The participating states are: Argentina, Australia, Belarus, Canada, China, Egypt, Estonia,
France, Germany, India, Indonesia, Japan, Russia, the United Kingdom, and the United States. U.N.
GGE 2013 Report, supra note 252, Annex.
254. See PRC MILITARY AND SECURITY DEVELOPMENTS, supra note 61, at 37; Ellen Nakashima, U.S.
and Russia Sign Pact to Create Communication Link on Cyber Security, WASH. POST, June 17, 2013,
http://www.washingtonpost.com/world/national-security/us-and-russia-sign-pact-to-create-communica
tion-link-on-cyber-security/2013/06/17/ca57ea04-d788-11e2-9df4-895344cl3c30_story.html.
255. See U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 12 ("[W]e will actively engage the
developing world, and ensure that emerging voices on these issues are heard."); see also Segal, supra
note 72, at 19-20 (arguing that it is "especially important [for the United States] to find common
ground with rising powers such as Brazil, India, Indonesia, and South Africa" because "[a]greements
with them about acceptable behavior would ratchet up the pressure on China, which rarely prefers to
remain an international outlier").
256. See supra text accompanying notes 232-39.
257. Commentators place particular emphasis on establishing technical partnerships with developing
countries and rising Internet powers as a way to counter similar efforts by countries with opposing
views of desirable cyber norms. See Segal, supra note 72, at 20; Segal & Waxman, supra note 206.
2015] THE CYBER-LAW OF NATIONS 363
258. See, e.g., Kanuck, supra note 105, at 1589-90 ("State practice creates a dual-track, recursive
process by which sovereign governments individually or collectively interpret the rules of jus ad bellum
and jus in bello; produce their own national strategies, declaratory policies, military doctrines, and rules
of engagement; and then conduct activities that in turn influence customary international law and the
future application of the U.N. Charter, Geneva Conventions, and other IHL provisions.").
259. Cf Nye, supra note 17, at 29 ("Learning can lead to concurrence in beliefs without coopera-
tion. Governments act in accordance with their national interests, but they can change how they define
their interests, both through adjusting their behavior to changes in the structure of a situation as well as
through transnational and international contacts and cooperation." (emphasis omitted)).
260. See U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 10, 19-20; see generally EXEC.
OFFICE OF THE PRESIDENT OF THE U.S., ADMINISTRATION STRATEGY ON MITIGATING THE THEFT OF U.S. TRADE
SECRETS (2013), availableat http://www.whitehouse.gov//sites/default/files/omb/IPEC/adminstrategy on
mitigatingtheatheft of u.s._tradetsecrets.pdf.
261. See Nye, supra note 17, at 30 (arguing that Russia and China's tolerance for cybercrime may
decrease as they become more frequent cybercrime targets and explaining that this "independent
learning may pave the way for active cooperation later"); Segal, supra note 72, at 14 (noting
suggestions that broad agreement on cyberspace behavior may be possible because U.S. and Chinese
"long-term interests are aligned," in that "one day China will be as dependent on digital infrastructure
for economic and military power as the United States is today").
262. See supra note 261.
263. See Ashley Deeks, The Geography of Cyber Conflict: Through a Glass Darkly, 89 INT'L L.
STUD. 1, 3 (2013) ("Establishing State-to-State expectations about what types of cyber activities will
trigger what types of responses will provide important incentives for ostensibly neutral States to take
steps to protect their computer networks while minimizing the likelihood of inter-State misunderstand-
ings that lead to unnecessary conflict in the cyber or non-cyber realms."); Koh, supra note 220, at 3
("Developing common understandings about how these rules apply in the context of cyber activities in
armed conflict will promote stability in this area."); cf CICIR-CSIS, supra note 71 ("Both CICIR and
CSIS believe that confidence building measures in the cyberspace are the antidote to strategic
mistrust.").
364 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
conflicting norms may emerge. But even in that circumstance, norms have the
potential to serve a coordinating function and foster valuable clarity about
states' actions. The U.S. International Strategy for Cyberspace advocates norm
development for this reason. The Strategy notes that the world's growing
dependence on cyberspace has "not been matched by clearly agreed-upon
norms for acceptable state behavior in cyberspace." 26 4 It explains that "[i]n
other spheres of international relations, shared understandings about acceptable
behavior have enhanced stability" and brought "predictability to state conduct,
helping prevent the misunderstandings that could lead to conflict."26 5 The
Strategy further asserts that norms "will diminish misperceptions about military
activities and the potential for escalatory behavior." 2 6 6
The United States has recently taken bilateral steps with China and Russia
that explicitly focus on decreasing misperceptions. In June 2013, the United
States and Russia announced an agreement "to reduce the risk of conflict in
cyberspace through real-time communications about incidents of national secu-
,,267
rity concern. The agreement provides for communications and information
sharing between U.S. and Russian computer emergency-response teams, a
direct channel for urgent communications about cyber exercises and incidents, a
direct communications link between the U.S. cyber coordinator and his Russian
counterpart (a repurposing of the Cold War nuclear "hotline"), and a working
group "on issues of threats to or in the use of' information and communications
technologies (ICTs) that will discuss emerging threats and coordinate joint
exercises in order to "strengthen confidence." 2 6 8 The United States and China
also established a working group to discuss cybersecurity issues, though China
suspended its participation in the wake of the May 2014 U.S. indictments of
Chinese military officials for hacking U.S. companies.2 6 9
264. U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 9; see also U.S. DEP'T OF DEF., supra
note 60, at 10 ("DoD will assist U.S. efforts to advance the development and promotion of international
cyberspace norms and principles that promote openness, interoperability, security, and reliability.");
Segal & Waxman, supra note 206 ("[D]ialogue with China, Russia and others should focus not on
reaching legal agreement but on communicating redlines and developing confidence-building mea-
sures . . . ." (emphasis omitted)).
265. U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 9; see also U.S. Delegation Statement,
supra note 164 ("[T]ransparency, confidence-building, and stability measures should be developed . .
to enhance international stability and thereby reduce the risk of conflict in cyberspace.").
266. U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 21.
267. Nakashima, supra note 254.
268. Press Release, White House, Joint Statement by the Presidents of the United States of America
and the Russian Federation on a New Field of Cooperation in Confidence Building (June 17, 2013),
available at http://www.whitehouse.gov/the-press-office/2013/06/17/joint-statement-on-a-new-field-of-
cooperation-in-confidence-building; see also Nakashima, supra note 254 (reporting on the U.S--Russia
pact).
269. See supra notes 7-9 and accompanying text. Although norm development has been the stated
U.S. policy since the International Strategy in 2011, the continuing U.S. commitment to norm
development, at least with China, might reasonably be questioned in light of the U.S. decision to indict
Chinese military officials for cyberespionage despite China's predictable reaction of suspending the
working group, which was intended to serve as an important forum for bilateral discussions on
2015] THE CYBER-LAW OF NATIONS 365
The escalating risk of and rhetoric about conflict due to cyber intrusions
suggest that the current lack of clarity regarding basic principles about state
action in cyberspace is becoming untenable. States must agree on or at least
clarify baseline positions regarding cyber actions in order to avoid conflict in
and stemming from cyberspace. Because fundamental divergences between the
major powers regarding sovereign control over the Internet make an onibus
cyber treaty unlikely, the most promising mechanisms for ordering international
expectations and sovereign actions are piecemeal treaties focused on narrow
issues or negotiated among like-minded groups of states and norms developed
through unilateral, bilateral, and multilateral declarations, and evolving state
practice. The next section turns to the most dangerous area of disagreement and
thus the most crucial area for agreement: the use of military force in and via
cyberspace.
C. MILITARIZATION
cybersecurity issues. See Kristen Eichensehr, The US Needs a New InternationalStrategy for Cyber-
space, JUST SECURITY (Nov. 24, 2014, 10:28 AM), http://justsecurity.org/17729/time-u-s-international-
strategy-cyberspacel.
270. Antarctic Treaty, supra note 151, art. 1(1), 12 U.S.T. at 795, 402 U.N.T.S. at 72.
366 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
271. Outer Space Treaty, supra note 133, art. IV, 18 U.S.T. at 2413-14, 610 U.N.T.S. at 208.
272. Id.
273. Moon Treaty, supra note 141, art. 3, 1363 U.N.T.S. at 23.
274. UNCLOS, supra note 121, art. 88, 1833 U.N.T.S. at 433.
275. Antarctic Treaty, supra note 151, art. I(1), 12 U.S.T. at 795, 402 U.N.T.S. at 72.
276. Outer Space Treaty, supra note 133, art. IV, 18 U.S.T. at 2413-14, 610 U.N.T.S. at 208.
277. Id.
278. See UNCLOS, supra note 121, art. 88, 1833 U.N.T.S. at 433.
279. Int'l Code of Conductfor Info. Sec., supra note 65 (art. I).
280. Id. (art. 11(2)).
2015] THE CYBER-LAW OF NATIONS 367
net)," including "pledges not to use cyber warfare and refrain from developing a
cyber range and cyber weapons." 2 81
Several characteristics of cyberspace and cyberconflict could make demilitar-
ization or limits on militarization desirable.
First, no state can completely control the Internet and other systems and
networks or even effectively defend its cyber borders.2 82 In an age of advanced
persistent threats, even supposedly secure or air-gapped systems can be
breached.2 8 3 Similar uncertainty about defensive capabilities and offensive
dominance existed when states agreed to prohibit militarization of the moon
and, to a lesser extent, outer space. When the Outer Space Treaty was negoti-
ated, the United States and the U.S.S.R. were the only nations that had the
capacity to act in space, and they were in a space "race" with an unclear winner.
Neither knew if it would be the first to develop a space weapon. The inability or
uncertainty about a state's ability to control a domain militarily creates an
opportunity for coordination. This is particularly clear in the context of the
Outer Space Treaty. Each state's preferred outcome is to control the domain
itself, and each state's worst outcome is for its adversary to control the domain.
In that circumstance, the uncertainty for each state about its ability to control
the domain if both states militarize creates an incentive to cooperate and agree
that neither state will militarize, an outcome that allows each state to avoid its
worst case scenario-military control of the domain by its adversary. 28 4 Thus,
as a general matter, states may agree to demilitarize domains when it is unclear
whether any state (or if any state then which state) would be able to achieve
military dominance (or at least the securest defenses).
Second, military conflict in the cyber domain poses a great risk of unintended
consequences. The interconnected nature of civilian networks with networks
and systems that would be legitimate military targets creates difficulties in
limiting the effects of attacks to military networks.2 85 In addition, the complex-
281. CICIR-CSIS, supra note 71. CICIR further proposed to "[i]ncrease mutual trust through
pledges not to use cyber warfare and refrain from developing a cyber range and cyber weapons." Id.
282. See Nye, supra note 17, at 20 ("The largest powers are unlikely to be able to dominate this
domain as much as they have others like sea, air, or space."); supra note 96 and accompanying text.
283. See, e.g., Lynn, supra note 60, at 97 (explaining that classified U.S. military networks were
breached when a flash drive was inserted into a computer and malware infiltrated the network of U.S.
Central Command); David E. Sanger & Thom Shanker, N.S.A. Devises Radio Pathway into Computers,
N.Y. TIMES, Jan. 14, 2014, http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-
connected-to-internet.html; Sanger, supra note 60 (explaining that the Stuxnet worm breached an
air-gapped network at Iran's Natanz nuclear facility).
284. See Goldsmith & Levinson, supra note 59, at 1827 (discussing how international relations
"sometimes seem to follow the logic of coordination games" and in that circumstance, international law
can act as a "focal point for coordination" that allows states to escape a prisoners' dilemma).
285. See Kanuck, supra note 105, at 1595; Koh, supra note 220, at 8 (listing as an "[u]nresolved
[q]uestion" what to do about "dual-use infrastructure," explaining that "[p]arties to an armed conflict
will need to assess the potential effects of a cyber attack on computers that are not military objec-
tives . . but may be networked to computers that are valid military objectives," and stating that
"[p]arties will also need to consider the harm to the civilian uses of such infrastructure in performing
the necessary proportionality review").
368 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
ity of coding creates the possibility that even narrowly targeted worms or
viruses can spread beyond their intended targets,2 86 or that a hacker may cause
extensive damage through sheer incompetence.28 7 Similar fear of unintended
consequences from conflict in outer space and Antarctica may have helped to
motivate the treaties that restricted military activities in those domains.
Third, increased investment in and dependence on the Internet and cyber
more generally increase a state's vulnerability to attack. As many have noted,
cyber is an "offense-dominant environment," where attacks are comparatively
easy to mount but assets are difficult to defend. 28 8 Therefore, "because of
greater dependence on networked computers and communication, the United
States is more vulnerable to attack than many other countries." 28 9 This fact
has not escaped notice: according to the U.S. Department of Defense, a key
principle of China's information operations strategy is that "potential Chinese
adversaries, in particular the United States, are seen as 'information depen-
dent. "'290 The Chinese military itself, however, is becoming increasingly technol-
ogy dependent. 2 91 Taking the long view, China may calculate that its future
vulnerabilities could match or exceed those of the United States, which may
make demilitarization more attractive in the short term.
On the positive side, demilitarization could decrease the risk and create
favorable conditions for increased investment in cyber. A similar rationale
may have contributed to the decision to limit militarization in outer space. At
the time of the Outer Space Treaty, space was little used, but since that time,
satellites have become much more prevalent for communications, global position-
ing systems, and other everyday as well as national security uses, to the point
that certain orbits are now cluttered.2 9 2 Assurance that space would not be
militarized freed countries to invest in technologies in and dependent on the
domain.
Despite these rationales supporting demilitarization of cyber, several determi-
native circumstances make such demilitarization unlikely.
First, a sufficient condition to prevent demilitarization of cyber is that the
United States and the United Kingdom have rejected the idea of a treaty
286. See Sanger, supra note 60 (explaining that the Stuxnet worm spread beyond Iran's Natanz
nuclear facility due to a programming error); see also Statement of James R. Clapper, supra note 219,
at 19 (noting that radical hacktivist groups may "accidentally trigger unintended consequences that
could be misinterpreted as a state-sponsored attack").
287. See Jim Finkle, 'Irrational'Hackers Are Growing U.S. Security Fear, REUTERS (May 22,
2013), http://www.reuters.com/article/201 3/05/22/us-cybersecurity-usa-infrastructure-idUSBRE94
L13R20130522 (reporting concerns from security experts that hackers may unintentionally damage
critical infrastructure).
288. Lynn, supra note 60, at 99; Nye, supra note 17, at 21 ("Because the Internet was designed for
ease of use rather than security, the offense currently has the advantage over the defense.").
289. Nye, supra note 17, at 20.
290. PRC MILITARY AND SECURITY DEVELOPMENTS, supra note 61, at 10.
291. Id. at 11, 33.
292. See generally Space Debris, EUR. SPACE AGENCY, http://www.esa.int/Our Activities/Operations/
SpaceDebris/About space-debris (last visited Nov. 30, 2014).
2015] THE CYBER-LAW OF NATIONS 369
293. See Kanuck, supra note 105, at 1588 n.80 (detailing U.S. and U.K. submissions to the U.N.
Secretary-General opposing the idea of an international treaty addressing cyber conflict).
294. OFFICE OF MGMT. & BUDGET, EXEC. OFFICE OF THE PRESIDENT, STATEMENT OF ADMINISTRATION
POLICY H.R. 4310-NATIONAL DEFENSE AUTHORIZATION ACT FOR FY 2013, at 4 (2012), available at
http://www.whitehouse.gov/sites/default/files/omb/legislative/sap/112/saphr431or 20120515.pdf; see also
Segal, supra note 72, at 17-18 ("The United States' strategy in cyberspace has always been about more
than just defense; as Chinese officials are quick to note, it was the United States that first set up a cyber
command and thus, in their view, militarized cyberspace.").
295. Some have deemed Stuxnet to cross the Rubicon into an age of cyber conflict. See Demchak
&
Dombrowski, supra note 104, at 32; Sanger, supra note 60 (quoting former CIA head Michael V.
Hayden as stating that Stuxnet was "the first attack of a major nature in which a cyberattack was used to
effect physical destruction," and with it, "[s]omebody crossed the Rubicon"). The United Kingdom has
also sought to develop offensive cyber capabilities. Espiner, supra note 60.
296. Lynn, supra note 60, at 99.
297. Statement of Keith B. Alexander, supra note 187, at 3 (explaining that the United States can
deter cyber attacks by states because "foreign leaders believe that a devastating attack on the critical
infrastructure and population of the United States by cyber means would be correctly traced back to its
source and elicit a prompt and proportionate response," but recognizing that "some future regime or
cyber actor could misjudge the impact and certainty of our resolve," suggesting that deterrence against
nonstate actors may not work); Statement of James R. Clapper, supra note 219, at 17 ("Advanced cyber
actors-such as Russia and China-are unlikely to launch such a devastating attack against the United
States outside of a military conflict or crisis that they believe threatens their vital interests," but
"isolated state or nonstate actors might deploy less sophisticated cyber attacks as a form of retaliation
or provocation.").
298. Nye, supra note 17, at 20; see also id. at 22 ("[B]ecause of the commercial predominance and
low costs, the barriers to entry to cyber are much lower for nonstate actors.").
370 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
als." 2 99 U.S. officials have noted that "some terrorist organizations have height-
ened interest in developing offensive cyber capabilities," although they may be
"constrained by inherent resource and organizational limitations and com-
peting priorities."3 00 In light of the threat from nonstate actors, states have less
incentive to demilitarize cyber: even if states agreed among themselves to
restrict military activities in cyberspace, such an agreement would not restrain
nonstate actors, who may already have or will almost certainly acquire military
capabilities in cyberspace. 3 0 1 The potential for nonstate actors to act militarily
in cyberspace is a notable departure from the circumstances in which the Outer
Space Treaty and the Antarctic Treaty militarization provisions were negotiated-
circumstances in which the major and virtually only actors in the domains
were states, and those states could be certain of restricting military activities by
agreeing among themselves.30 2
Fourth, the current context of the debate between the United States,
United Kingdom, and their allies, and Russia, China, and their allies over
militarization of cyberspace lacks the strategic clarity that the Cold War frame-
work provided for the agreements to regulate militarization in the old domains.
The Cold War bipolar system provided predictability about the identity of
adversaries and a mechanism (deterrence) for avoiding conflict. Cyber, by con-
trast, presents a broader range of possible adversaries and increased difficulty
identifying attackers.30 3 In other words, in the cyber domain there are chal-
lenges of both attribution and deterrence, which are interrelated.
The extent of the attribution problem is unclear and debated. Some argue
that attribution is not a significant problem as a technical matter 3 0 4 or as a
strategic matter.3 05 Others, however, argue that attribution problems pose signifi-
299. Statement of Keith B. Alexander, supra note 187, at 3; cf. Statement of James R. Clapper, supra
note 219, at 17 (noting that for the next two years the ability to cause a major cyber attack "will be out
of reach for most actors").
300. Statement of James R. Clapper, supra note 219, at 19; see also id. (noting that hacktivist groups
might "inflict more systemic impacts-such as disrupting financial networks-or accidentally trigger
unintended consequences that could be misinterpreted as a state-sponsored attack"); Finkle, supra
note 287 (reporting House Intelligence Committee Chairman Mike Rogers' statement that terrorists are
seeking, but do not yet have the ability, to launch cyber attacks "on U.S. infrastructure").
301. See Statement of Keith B. Alexander, supra note 187, at 4 ("[W]orldwide terrorist organizations
like al Qaeda and its affiliates have the intent to harm the United States via cyber means," but "so far,
their capability to do so has not matched their intent.").
302. See Katzenbach, supra note 185, at 207 (explaining that for the then-foreseeable future, govern-
mental entities were likely to be the only ones operating in outer space).
303. See KNAKE, supra note 179, at 13 (explaining that attribution is difficult because both the origin
of cyberattacks and identity of an attacker are hard to determine).
304. See Panetta, supra note 60 (asserting that the U.S. Department of Defense has made "signifi-
cant advances" in attribution and therefore that "[p]otential aggressors should be aware that the United
States has the capacity to locate them and to hold them accountable for their actions").
305. See KNAKE, supra note 179, at 14 (arguing that the attribution problem "should not be over-
stated" because "at most twenty groups worldwide" have "the ability to wage anything that rises to the
level of 'war' in cyberspace," and thus, "[i]n the event of a major attack, the list of potential suspects
will be small"); Nye, supra note 17, at 33 (arguing that "[i]nterstate deterrence through entanglement
and denial still exists even when there is inadequate attribution," and noting that because of entangled
2015] THE CYBER-LAW OF NATIONS 371
networks, China would "lose from an attack that severely damaged the American economy, and vice
versa"); id. at 34 (noting that "reputational damage" caused by "credible" rumors about an attacker's
identity or a state's "reputation for offensive capability" and policy of retaliation can contribute to
deterrence).
306. See Kanuck, supra note 105, at 1596 ("Without positive attribution, there is no ability to
monitor, verify, or signal in the traditional Cold War sense," which "raises the question of whether or
not cyber deterrence is even possible at this juncture.").
307. Cf Adams, supra note 204, at 102 ("Unlike during the Cold War, when the nuclear standoff
produced its own understandable rules of the game that included a sophisticated deterrence mechanism,
no legal or de facto boundaries inhibit cyber-aggressions. Instead, information warfare is a free-for-all,
with more and more players hurrying to join the scrimmage.").
308. Lynn, supra note 60, at 99; see also Finkle, supra note 287 (reporting that U.S. national
security experts are increasingly concerned "that 'irrational' cyber actors-such as extremist groups,
rogue nations or hacker activists-are infiltrating U.S. systems to hunt for security gaps").
309. See Nye, supra note 17, at 34 ("[N]onstate actors are harder to deter, and improved defenses
such as preemption and human intelligence become important in such cases.").
310. See Chuck Hagel, Sec'y of Def., Remarks at Retirement Ceremony for General Keith Alexan-
der (Mar. 28, 2014), available at http://www.defense.gov/Speeches/Speech.aspxSpeechID = 1837 (not-
ing that the U.S. "modem cyber force . . . is enhancing our ability to deter aggression in cyber space");
Panetta, supra note 60 ("In addition to defending the department's networks, we also help deter attacks.
Our cyber adversaries will be far less likely to hit us if they know that we will be able to link [them] to
the attack or that their effort will fail against our strong defenses."); Vice Adm. Michael S. Rogers,
Advance Questions for Vice Admiral Michael S. Rogers, USN, Nominee for Commander, U.S. Cyber
Command (Mar. 11, 2014), http://www.armed-services.senate.gov/imo/medialdoc/Rogers_03-11-
372 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
officials believe that "'rational' super powers like China or Russia ... may have
the ability to destroy critical U.S. infrastructure with the click of a mouse, but
they are unlikely to do so, in part because they fear Washington would retali-
ate." 3 11 But for purposes of assessing the likelihood that states will agree to
demilitarize cyber, the incomplete and uncertain nature of deterrence creates a
lack of clarity about risks and incentives that undermines states' ability to
bargain toward demilitarization or perhaps even more limited arms control.3 12
In sum, unlike Antarctica and outer space at the time restrictions on militariza-
tion were adopted for those domains, the ship has already sailed with regard to
militarizing cyberspace. Walking back militarization would be difficult, par-
ticularly in light of the spread of cyber weapons beyond states. The differences
between cyber and the old domains about timing of militarization and the
proliferation of military capabilities suggest that a different outcome is likely
for cyber, but a different outcome may in fact be desirable.
14.pdf; U.S. INT'L STRATEGY FOR CYBERSPACE, supra note 62, at 13 ("The United States will ensure that
the risks associated with attacking or exploiting our networks vastly outweigh the potential benefits. We
fully recognize that cyberspace activities can have effects extending beyond networks; such events may
require responses in self-defense."); supra note 297; cf. Segal, supra note 72, at 17 (arguing that
"Chinese intrusions into U.S. power grids or other critical infrastructure, especially when evidence is
left behind," help China "send a message of deterrence").
311. Finkle, supra note 287.
312. Cf Goldsmith, supra note 243 (arguing that the "main reason" that "true international co-
operation on cyber security" is unlikely is that "attribution of any attack is slow and uncertain, and thus
verification of a cyber-attack ban is hard if not impossible," and noting that "[u]nless the attribution
problem can be fixed, which few think is possible, it is hard to imagine nations (including the United
States) giving up significant offensive capabilities").
313. See Lynn, supra note 60, at 108; Nye, supra note 17, at 22.
314. Lynn, supra note 60, at 108 ("The cyberthreat does not involve the existential implications
ushered in by the nuclear age . . . ").
2015] THE CYBER-LAW OF NATIONS 373
return us to the Stone Age." 3 15 In other words, cyberwar, even cyberwar gone
wrong, may pose less of a downside risk than conflict in other domains or by
other means that the international community has prohibited.
Cyberconflict also has potential upside as compared to conventional warfare.
In particular, cyber weapons have the potential to be more discriminate than
conventional arms because they can be designed to harm only precise targets.
Stuxnet is the best example so far of a highly targeted weapon. It was precisely
designed to sabotage Iranian nuclear centrifuges. Of course, Stuxnet also shows
the difficulty of engineering a cyber weapon with the precision that is theoreti-
cally possible: its existence was revealed after coding errors allowed it to
infiltrate systems other than its targets.3 16 Nevertheless, cyber weapons have at
least the potential to achieve hyper-specific targeting that can achieve military
objectives while avoiding loss of life.317 Improved precision in targeting may
even lead to tightening for cyber weapons of the protections that the principle of
distinction affords to civilians under the law of armed conflict.3 18
Relatedly, cyber weapons may also be targeted to deploy destruction in a
more calibrated way than is possible with conventional arms and may therefore
better effectuate the law-of-war principle of proportionality. 31 9 The ability to
precisely control the effects of cyber weapons could enable states more accu-
rately to effectuate the rule that any harm to civilians from military action may
not be "excessive in relation to the concrete and direct military advantage
anticipated." 3 2 0
Because of the nonexistential downside risk of cyberwar and the upside
3. Regulated Militarization
The lack of an overarching agreement to demilitarize cyber does not mean
that states are free to act militarily at will or without limits in the domain or that
smaller-bore agreements are impossible. Standards-based limitations on types of
actions and rules-based prohibitions on types of weapons can helpfully regulate
cyber militarization. 3 2 1 The first category involves applying or translating the
existing laws of armed conflict to cyberspace.322 The second category, which
has been used for conventional weapons but has not yet received much attention
with respect to cyber, would involve banning particular types of cyber weapons.
Unlike the application of the existing laws of armed conflict, extant weapons
bans cannot simply be translated into the cyber context.
321. Michael Reisman describes jus in bello as comprised of two parts: the first "consists of
principles to be applied in determining the proper use and quantum of force in specific cases," while the
second "contains a set of absolute prohibitions," including, for example, "the use of poison gas or
dumdum bullets, the initiation of aggressive war, [and] . . the intentional killing of non-combatants."
W. MICHAEL REISMAN, THE QUEST FOR WORLD ORDER AND HUMAN DIGNITY IN THE TWENTY-FIRST CENTURY:
CONSTITUTIVE PROCESS AND INDIVIDUAL COMMITMENT 422 (2012).
322. For a critical view of "law by analogy," see Hollis, supra note 31 (manuscript at 20-30).
323. See, e.g., William H. Boothby, Methods and Means of Cyber Warfare, 89 INT'L L. STUD. 387
(2013); Jack Goldsmith, How Cyber Changes the Laws of War, 24 EUR. J. INT'L L. 129 (2013); Eric
Talbot Jensen, Cyber Attacks: Proportionalityand Precautions in Attack, 89 INT'L L. STUD. 198 (2013);
Michael N. Schmitt, Classification of Cyber Conflict, 89 INT'L L. STUD. 233 (2013); Sean Watts,
Combatant Status and Computer Network Attack, 50 VA. J. INT'LL. 391 (2010).
324. See, e.g., CICIR-CSIS, supra note 71 ("CSIS and CICIR agreed that the threshold for calling an
event in cyberspace an attack should be high-not everything bad that happens in cyberspace is an
attack or the use of force."); Oona A. Hathaway et al., The Law of Cyber-Attack, 100 CALIF. L. REV. 817,
826 (2012) (proposing that cyber attack should be defined as "any action taken to undermine the
functions of a computer network for a political or national security purpose"); Matthew C. Waxman,
Cyber-Attacks and the Use of Force: Back to the Future ofArticle 2(4), 36 YALE J. INT'L L. 421, 431-37
(2011).
2015] THE CYBER-LAW OF NATIONS 375
law, nor does it render existing international norms obsolete."32 5 But the
Strategy nonetheless recognizes that "unique attributes of networked technology
require additional work to clarify how these norms apply and what additional
understandings might be necessary to supplement them." 3 2 6
More specifically, in September 2012, State Department Legal Adviser Har-
old Hongju Koh laid out the U.S. position that certain basic international law
rules apply to cyberspace.3 27 Koh explained that "the law of armed conflict ...
contemplates that its existing rules will apply to [technological] innovation," 32 8
but acknowledged that the challenge is to "articulate and build consensus
around how it applies and reassess from there whether and what additional
understandings are needed." 3 2 9 Koh took the first steps to build such consensus
by setting out the U.S. position on basic issues, like what constitutes an armed
attack in cyberspace. He explained, "[C]yber activities that proximately result
in death, injury, or significant destruction would likely be viewed as a use of
force." 330 In other words, "if the physical consequences of a cyber attack work
the kind of physical damage that dropping a bomb or firing a missile would, that
cyber attack should equally be considered a use of force." 3 3 1 Koh also clarified
that an actual or threatened cyber attack can trigger "[a] state's national right of
self-defense, recognized in Article 51 of the UN Charter." 3 32 Turning to jus in
bello rules, he further explained that the response to a cyber armed attack need
not "take the form of a cyber action, as long as the response meets the re-
quirements of necessity and proportionality." 3 3 3 Moreover, Koh declared that
the principle of distinction between military and civilian objects also constrains
military cyber actions, 3 3 4 and states are responsible, as they are in non-cyber
domains, for "'proxy actors,' who act on the state's instructions or under its
direction or control." 3 3 5
China also has recently taken preliminary steps to articulate its views about
international law and cyberspace, after refusing for some time to agree that any
international law applies to the domain.336 In June 2013, China joined consen-
sus at the United Nations on the principle that "[i]nternational law, and in
particular the Charter of the United Nations" applies in cyberspace.33 7 Even in
the wake of this development, however, it remains unclear whether China will
agree that more specific legal provisions, such as the law of armed conflict,
apply to cyberspace.
State declarations about the applicability of the law of armed conflict may be
influenced by recent nongovernmental efforts to address these issues under the
auspices of the NATO Cooperative Cyber Defense Center of Excellence in
Tallinn, Estonia. A group of international legal experts convened to consider the
applicability of the laws of armed conflict to cyberspace and drafted the Tallinn
Manual on the InternationalLaw Applicable to Cyber Warfare, which contains
rules, adopted by consensus of the experts, that reflect customary international
law. 3 3 8 The Tallinn Manual's proposed rules are largely consistent with U.S.
policy, as articulated in Koh's speech.33 9 In particular, the Tallinn Manual con-
cludes that existing jus ad bellum and jus in bello rules apply in cyberspace,34 0
looks to the physical effects of a cyber action to determine if it constitutes a
use of force, 34 1 recognizes that a cyber attack can trigger the right of self-
supra note 310 ("[W]e can respond to cyber attacks in any domain. . . ."); Rogers, supra note 310
("The law of war principles of military necessity, proportionality and distinction will apply when
conducting cyber operations.").
334. Koh, supra note 220, at 5; see also Rogers, supra note 310.
335. Koh, supra note 220, at 6 (emphasis omitted).
336. See PRC MILITARY AND SECURITY DEVELOPMENTS, supra note 61, at 37 ("Although China has not
yet agreed with the U.S. position that existing mechanisms, such as international humanitarian law,
apply in cyberspace, Beijing's thinking continues to evolve.").
337. U.N. GGE 2013 Report, supra note 252, ¶ 19; see also Psaki, supra note 252.
338. TALLINN MANUAL ON THE INTERNATIONAL LAw APPLICABLE TO CYBER WARFARE 6 (Michael N.
Schmitt ed., 2013) [hereinafter TALLINN MANUAL], available at http://www.ccdcoe.org/tallinn-manual.
html.
339. Schmitt, supra note 195, at 15 ("The relative congruency between the U.S. Government's
views, as reflected in the Koh speech, and those of the International Group of Experts is striking. This
confluence of a state's expression of opinio juris with a work constituting 'the teachings of the most
highly qualified publicists of the various nations' significantly enhances the persuasiveness of common
conclusions.").
340. TALLINN MANUAL, supra note 338, at 5; id. at 75 (Rule 20) ("Cyber operations executed in the
context of an armed conflict are subject to the law of armed conflict." (emphasis omitted)); Schmitt,
supra note 195, at 17 ("[T]he Experts rejected any characterization of cyberspace as a distinct domain
subject to a discrete body of law.").
341. TALLINN MANUAL, supra note 338, at 45 (Rule 11) ("A cyber operation constitutes a use of force
when its scale and effects are comparable to non-cyber operations rising to the level of a use of force."
(emphasis omitted)); see also id. at 54-55; Schmitt, supra note 195, at 19-20.
2015] THE CYBER-LAW OF NATIONS 377
342. TALLINN MANUAL, supra note 338, at 54 (Rule 13); Schmitt, supra note 195, at 21.
343. TALLINN MANUAL, supra note 338, at 61 (Rule 14) ("A use of force involving cyber operations
undertaken by a State in the exercise of its right of self-defence must be necessary and proportionate."
(emphasis omitted)); id. at 110 (Rule 31) (distinction); id. at 159 (Rule 51) (proportionality); see
Schmitt, supra note 195, at 21, 25-28.
344. Persuading other states to utilize the Tallinn Manual's analysis may be more difficult. China,
for example, has criticized the Tallinn Manual on several grounds. Adam Segal, Axiom and the
Deepening Divide in U.S.-China Cyber Relations, COUNCIL ON FOREIGN REL. (Oct. 29, 2014), http://
blogs.cfr.org/cyber/2014/10/29/axiom-and-the-deepening-divide-in-u-s-china-cyber-relations/. For
additional discussion and critique of the Tallinn Manual, see Kristen E. Eichensehr, Book Review,
108 AM. J. INT'L L. 585 (2014) (reviewing THE TALLINN MANUAL ON THE INTERNATIONAL LAw APPLICABLE
To CYBER WARFARE (Michael N. Schmitt ed., 2013)).
345. Deeks, supra note 263, at 6-8 (providing a detailed analysis of how the law of neutrality
applies to cyberspace); Hathaway et al., supra note 324, at 856 (describing the applicability of
neutrality law to cyberspace as "unusually complex"); Kanuck, supra note 105, at 1593 (discussing
how neutrality might apply to cyberspace and the complications caused by cyber's arguable status as a
"commons"); Koh, supra note 220, at 9 (listing "the implications of sovereignty and neutrality law" as
among the "difficult and important questions about the application of international law to activities in
cyberspace").
346. See, e.g., Kanuck, supra note 105, at 1595; Koh, supra note 220, at 8 (explaining that
belligerents must, as part of a proportionality review, consider effects on civilian computers that may be
"networked to computers that are valid military objectives"). But see TALLINN MANUAL, supra note 338,
at 134 (Rule 39) ("An object used for both civilian and military purposes-including computers,
computer networks, and cyber infrastructure-is a military objective." (emphasis omitted)).
347. Cf Koh, supra note 220, at 11 ("[W]e will be safer, the more that we can rally other states to
the view that these established principles do impose meaningful constraints, and that there is already an
existing set of laws that protect our security in cyberspace.").
378 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
348. The Tallinn Manual states, "It is forbidden to employ cyber booby traps associated with certain
objects specified in the law of armed conflict." TALLINN MANUAL, supra note 338, at 146 (Rule 44)
(emphasis omitted). It defines a booby trap, in line with the definition in the Amended Mines Protocol
to the Convention on Certain Conventional Weapons, as "any device or material which is designed,
constructed or adapted to kill or injure, and which functions unexpectedly when a person disturbs or
approaches an apparently harmless object or performs an apparently safe act." Id. at 146-47. Although
this rule has some similarities with a weapons ban, it differs from such bans, see infra notes 350-59,
because it prohibits a particular use of a weapon, not a weapon itself. For example, a conventional
prohibition on booby traps forbids attaching explosives to medical equipment or children's toys, but it
does not prohibit explosives in general. See Protocol on Prohibitions or Restrictions on the Use of
Mines, Booby-Traps and Other Devices as Amended on 3 May 1996 (Protocol II as Amended on 3 May
1996) Annexed to the Convention on Prohibitions or Restrictions on the Use of Certain Conventional
Weapons Which May be Deemed to be Excessively Injurious or to Have Indiscriminate Effects art.
7(1), adopted May 3, 1996, S. TREATY Doc. No. 105-1, 2048 U.N.T.S. 93 (entered into force Dec. 3,
1998).
349. See Detlev F. Vagts, The Hague Conventions and Arms Control, 94 AM. J. INT'L L. 31, 31
(2000) (distinguishing between "quantitative" arms control, which "permit[s] a given category of
weapons" but limits the number states may have, and "qualitative" arms control, which involves
"prohibitions on the use of specified items"); see also R. R. Baxter, Conventional Weapons Under Legal
Prohibitions, 1 INT'L SECURITY 42, 47-48 (1977) (describing three criteria for deeming particular
weapons to be illegal: (1) "whether the weapon causes unnecessary suffering or superfluous injury";
(2) "whether the weapon has indiscriminate effects"; and (3) "whether the weapon kills through
treachery").
350. See Declarationof St. Petersburg, 1868, 1 AM. J. INT'L L. SUPPLEMENT: OFFICIAL DOCUMENTS 95,
95-96 (1907). For an overview of the adoption of weapons prohibitions through 2000, see Vagts, supra
note 349, at 31-40; see also Baxter, supra note 349, at 42-44.
351. Convention with Respect to the Laws and Customs of War on Land, with Annex of Regula-
tions, art. 23, July 29, 1899, 32 Stat. 1803.
352. Declarationon the Use of Bullets Which Expand or Flatten Easily in the Human Body; July 29,
1899, YALE L. SCH. AVALON PROJECT, http://avalon.law.yale.edu/l9th-century/dec99-03.asp (last visited
Nov. 30, 2014); see also Vagts, supra note 349, at 34-35 (explaining origin of the term "dum-dum"
bullets).
353. Declarationon the Use of Projectilesthe Object of Which is the Diffusion of Asphyxiating or
Deleterious Gases; July 29, 1899, YALE L. SCH. AVALON PROJECT, http://avalon.law.yale.edul19th-century/
dec99-02.asp (last visited Nov. 30, 2014). Interestingly, the United States voted against the prohibitions
on both dum-dum bullets and asphyxiating gases. See JOHN FABIAN Wirr, LINCOLN'S CODE: THE LAWS OF
WAR IN AMERICAN HISTORY 350-52 (2012).
354. Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and
of Bacteriological Methods of Warfare, June 17, 1925, 26 U.S.T. 571, 94 L.N.T.S. 65.
355. Id.
2015] THE CYBER-LAW OF NATIONS 379
356. Convention on the Prohibition of the Development, Production, Stockpiling and Use of
Chemical Weapons and on Their Destruction, openedfor signature Jan. 13, 1993, S. TREATY Doc. No.
103-21, 1974 U.N.T.S. 45.
357. Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriologi-
cal (Biological) and Toxin Weapons and on Their Destruction, opened for signature Apr. 10, 1972, 26
U.S.T. 583, 1015 U.N.T.S. 163.
358. Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-
Personnel Mines and on Their Destruction, openedfor signature Sept. 18, 1997, 2056 U.N.T.S. 211.
359. Convention on Cluster Munitions, opened for signature Dec. 3, 2008, 48 I.L.M. 357, available
at http://treaties.un.org/doc/Publication/CTC/26-6.pdf.
360. Cf. Vagts, supra note 349, at 32 (explaining, with regard to the Hague Conferences, that
military officials were willing to prohibit "weapons that threatened to get out of control").
361. Cf Bond v. United States, 134 S. Ct. 2077, 2083 (2014) (explaining that the "devastation"
caused by use of mustard gas in World War I "led to an overwhelming consensus in the international
community that toxic chemicals should never again be used as weapons against human beings," a
prohibition now codified in the Convention on Chemical Weapons); WiT, supra note 353, at 3 ("Laws
of war typically come in the dismayed aftershock of conflict, not in the impassioned heat of battle....
Humanitarians usually fight the last war when they make rules for the next one.").
362. See Sanger, supra note 60 (reporting that the Obama Administration "was resistant to develop-
ing a 'grand theory for a weapon whose possibilities they were still discovering').
363. Nye, supra note 17, at 26.
364. See Goldsmith, supra note 205, at 6 (arguing that a "weapons ban is . . hard to articulate" in
part due to secrecy surrounding states' capabilities).
380 THE GEORGETOWN LAw JOURNAL [Vol. 103:317
CONCLUSION
The last two years have marked a crucial turning point for sovereigns and
cyberspace. The accusations and mutual recriminations between the United
States and China about cyber intrusions have increased; the fundamental diver-
gence of views about Internet governance has sharpened, as evidenced by the
collapse of the WCIT conference; and states and scholars have clarified their
legal positions about whether and how international law applies to cyberspace.
These developments show both the need for and the difficulty of achieving
agreement on the fundamental governance questions this Article has addressed.
As the histories of the high seas, outer space, and Antarctica show, however,
states can develop governance mechanisms for domains that, by necessity or
agreement, are not partitioned and governed by traditional territorial sover-
eignty. For this reason, study of the legal regimes established for the past
domains provides encouraging signs that chaos and conflict are not inevitable
and that stable legal regimes can be developed over time.
Examination of the legal regimes for the old domains provides further
guidance because, this Article has argued, understanding how cyber differs from
the old domains suggests how, not just that, states can address the cyber issues
that require international coordination. First, in contrast to states' dominance of
the old domains, the historical and ongoing role of private parties in the
governance, use, and ownership of the Internet and its underlying architecture
suggests that the multistakeholder model is preferable to a purely multilateral
model. Second, in the absence of existing customary law (as with UNCLOS) or
a limited group of motivated states (as with Antarctica and outer space), an
omnibus cyber treaty will be more difficult to achieve in general, and impos-
sible in light of the current gulf between the sovereignty-focused conception of
cyber espoused by Russia and China, and the multistakeholder view espoused
by the United States and its allies. In this situation, norm development provides
a workable path forward and the promise of fostering some of the stability that a
treaty would create by allowing states to coordinate their behavior to avoid
conflict. And finally, because the risks of treating cyber as a legal black hole
have become clear, and existing military capacity suggests demilitarization is
unlikely, states must regulate militarization by translating existing laws of
armed conflict to cyber and considering additional cyber-specific rules.
Answering the fundamental questions this Article has addressed is the first
step in a long process of establishing the cyber-law of nations. It took time for
states to figure out how to deal with the challenges of the Internet within their
borders and as related to their citizens. The intersovereign issues posed by cyber
are more complicated and will probably take even longer to solve. But the
process is crucial.
+(,121/,1(
Citation:
Kenneth D. Katkin, Cyber Law: Problems of Internet
Governance, 28 N. Ky. L. Rev. 656 (2001)
Copyright Information
Assistant Professor of Law, Salmon P. Chase College of Law, Northern Kentucky University;
J.D., 1996, Northwestern University School of Law; A.B., 1987, Princeton University.
2 See Frank H. Easterbrook, Cyberspace and the Law of the Horse, 1996 U. CI. LEGAL F. 207
(1996).
3 Id. at 208 (borrowing a phrase originating with Karl Llewellyn and used in a speech by University
of Chicago Dean Gerhard Casper concerning teaching methods).
4
1d. at 207.
5
Id.
2001] SYMPOSIUM INTRODUCTION 657
statutes that prohibit grand larceny more generally.6 Thus, an attorney seeking to
prosecute or defend an alleged horse rustler would be better advised to study
general criminal law than to focus on equestrian law.
But the opposite can also be true. I am unaware, for example, of any
principle of tort law or commercial law that would resolve the question whether a
person who receives injuries while nursing an injured thoroughbred race horse is
entitled to receive workers' compensation benefits. The answer to this question
- that no such benefits obtain - may be derived only from specific doctrines
pertaining to the "law of the horse."' Similarly, general principles of taxation
may not be sufficient to prescribe whether sales tax must be paid when a
thoroughbred race horse is sold. In Kentucky, no such tax need generally be paid
on livestock sales.8 But under "the law of the horse," thoroughbreds are not
livestock, "since we Kentuckians do not customarily consume horseflesh at the
dinner table." 9 Thus, under unique "law of the horse" principles, the livestock
exemption does not apply, and sales tax must be paid after all."
The "law of the horse" also extends to the regulatory arena. In Kentucky,
horses are subject to pervasive regulation by the Kentucky Racing Commission's
Division of Racing and Security. The Racing Commission is a streamlined
division of the Kentucky Public Protection and Regulation Cabinet. It is charged
with enforcement of Ch. 230 of the Kentucky Revised Statutes (which govern
horse racing). Since last year, the Racing and Security division has done the
work that was formerly done by the three separate Divisions of Thoroughbred
Racing, Standardbred and Quarter Horse Racing, and Security."
So the law of the horse may in fact be more complex and comprehensive
than Judge Easterbrook first thought. Indeed, studying the "law of the horse"
directly - and not just in the context of broader legal norms of general
applicability - may actually be necessary if one really wants to understand the
law about horses. But can the same be said about the law of the Internet?
On February 3, 2001, the Northern Kentucky Law Review held a symposium
which demonstrated that the answer is yes. 2 On that day, recognized experts in
the evolving field of Cyberlaw discussed solutions to new legal problems that
have arisen - or will arise - solely out of the operation of the Internet. Some
6 Ky. REv STAT. ANN. § 514.030. See, e.g., Smith v. Commonwealth, 112 S.W. 615 (Ky. Ct. App.
1908).
7 Cf.Michael v. Cobos, 744 S.W.2d 419 (Ky. 1987) (denying compensation claim, on ground that
conditioning and exercising of race horses which had returned to farm for rehabilitation from injury
constituted "agricultural" activity, exempt from workers' compensation).
8 Shadowlawn Farm v. Revenue Cabinet, Com. of Ky., 779 S.W.2d 232, 233 (Ky. Ct. App. 1989).
9id. (citing Stoner Creek Stud, Inc. v. Revenue Cabinet, 746 S.W.2d 73 (Ky. Ct. App. 1987)).
1OId.
11See Ky. Exec. Order Note: 2000 c 84, § I (eff. July 14, 2000) (confirming Ky. Exec. Order No.
98-1566 (Nov. 25, 1998)); see also Tni-City Turf Club, Inc. v. Public Protection and Regulation
Cabinet, 806 S.W.2d 394, 394-95 (Ky. Ct. App. 199 1) (discussing former regulatory regime).
12 For a greater elaboration on this theme, see generally Lawrence Lessig, The Law of the Horse:
What Cyberlaw Might Teach, 113 HARV. L. REV. 501 (1999) (surveying ways that Internet
architecture regulates human behavior, and suggesting that studying such "regulation-by-code" can
yield fresh insights about regulation by instruments of law).
NORTHERN KENTUCKY LAW REVIEW [Vol. 28:4
of these problems have no analogue in the physical world. Others shed new light
on old problems, in much the same way that studying a foreign language often
yields fresh insights into the structure and descriptive limitations of one's own
native tongue. This issue of the Northern Kentucky Law Review gathers the
insights of each of these speakers, as well as one student author, in full length
analysis of the issues.
Professor Phil Weiser's article discusses the evolving mechanisms of Internet
governance. 3 In response to the oft-recited canard that the government should
not regulate the Internet, Prof. Weiser observes that the Internet is, and always
has been, pervasively regulated and government-financed. Thus, the question is
not whether to regulate, but how government can best foster the growth and
beneficial usage of the Internet as a tool for human and commercial interaction.
In response to this question, Prof. Weiser suggests that the very novelty of the
Internet offers a unique opportunity for experimentation with new regulatory
models, including hybrid models that combine private standard setting and
industry self-regulatory organizations with conventional statutory governance
enforced by courts or administrative agencies.
Picking up on Prof. Weiser's suggestion, Rosemary Harold, Esq., addresses
one especially significant challenge to the federal government's historical model
of telecommunications regulation: technological convergence. For historical
reasons, Congress and the FCC have always regulated conventional telephony as
a "common carrier" service, while subjecting cable television to an entirely
different set of regulations as a quasi-broadcast service. Today, however, these
historical regulatory distinctions are being eradicated by technological
convergence, as telephone lines and cable television lines are competing against
each other to deliver the same broadband Internet services to residential and
small business users. This competition has led to increasing calls for regulatory
parity across technologies. In this context, Ms. Harold illuminates the highly
politicized debate over whether competitive non-facilities-based Internet service
providers should be entitled to obtain "open access" to proprietary cable
facilities, in symmetry with their existing rights to obtain such "open access" to
proprietary telephone common carrier facilities. 4
The commentary of Dennis R. Williams discusses the open access/forced
access debate in light of a recent case, Comeast Cablevision Inc., v. Broward
County, Florida,5 and gives consideration to the First Amendment issues
presented.
Professor Ethan Katsch, writes about new, and highly efficient, approaches to
dispute resolution that the Internet has already generated. As e-commerce
becomes increasingly popular, commercial e-disputes will likely proliferate as
well. But e-disputes may be easier to resolve than flesh-and-blood disputes,
through inexpensive online dispute resolution. Indeed, online dispute resolution
may be desirable even for resolving controversies originating in the "physical"
13 See Phil Weiser, Internet Governance, Standard Setting, and Self-Regulation, 28 N. Ky. L. REv.
822 (2001).
14 See Rosemary Harold, Cable-Based Internet Access. Exorcising the Ghosts of "Legacy"
16 See Ethan Katsch, Online Dispute Resolution: Lessons from the E-Commerce Revolution, 28 N.
Ky. L. REv. 810 (2001).
17See Mathias Strasser, Beyond Napster: How the Law Might Respond to a Changing Internet
Architecture 28 N. KY. L. REv. 660 (2001).
+(,121/,1(
Citation:
Mary Ellen O'Connell, Cyber Security without Cyber War,
17 J. Conflict & Sec. L. 187 (2012)
Copyright Information
Abstract
Which government agency should have primary responsibility for the Internet?
The USA seems to have decided this question in favour of the military-the US
military today has the largest concentration of expertise and legal authority with
respect to cyberspace. Those in the legal community who support this develop-
ment are divided as to the appropriate legal rules to guide the military in its
oversight of the Internet. Specialists on the international law on the use of
force argue that with analogy and interpretation, current international law can
be applied in a way that allows great freedom without sending the message that
the USA is acting lawlessly when it comes to the Internet. Others reject this
argument as unnecessary and potentially too restrictive. The USA need not ob-
serve international law rules, especially not with respect to the Internet. The way
forward is to follow the Cold War strategy of threatening enemies with over-
whelming force and preparing to act on these threats. This article also questions
the application of international law on the use of force to the Internet. Rather
than rejecting international law in general, however, the thesis here is that inter-
national law rules governing economic activity and communications are the rele-
vant ones for activity on the Internet. Moving away from military analogy in
general and Cold War deterrence in particular, will result in the identification
and application of rules with a far better chance of keeping the Internet open
and safer for all.
1. Introduction
'Cyber' is one of the most frequently used terms in international security dis-
cussions today. It is certainly a word of increasing importance in the interna-
tional lawyer's lexicon. It is not a new term in international law. International
lawyers have been discussing computers and the law governing their use for
several decades.1 For specialists in the area of international law on the use of
Robert and Marion Short Chair in Law and Research Professor of International
Dispute Resolution-Kroc Institute, University of Notre Dame, Notre Dame, IN,
USA. Email: MaryEllenOConnell@nd.edu. With thanks for research assistance to
Cate Behles, Max Gaston, and Conor McGuinness.
Scholarly articles on the international law of cyberspace began to appear in the
mid-1990s. These would, of course, have reflected developments and discussions of
the previous years. See, eg, A Mefford, 'Lex Informatica: Foundations of Law on the
Internet' (1997/1998) 5 Ind J Global Legal Studies 211 and DR Johnson and D Post,
'Law and Borders-The Rise of Law in Cyberspace' (1996) 48 Stanford L Rev 1367.
..............................................................................
Journalof Conflict & Security Law (2012), Vol. 17 No. 2, 187-209
188 Mary Ellen O'Connell
force, however, certain developments since at least 2007 have pushed the term
and what it stands for to a top position on their agendas. 2 Within the broader
discussion, the key issue is how to achieve security on the Internet.
Governments, organizations, and commercial interests want people to have
access to the Internet and all that it offers but not to be harmed by it.
Achieving security is, in turn, leading to the question of how to characterize
the Internet under international law. It could be characterized primarily as a
sphere of economic and communication activity where civil law enforcement
officials have primary jurisdiction. The Internet could, alternatively, be charac-
terized as primarily under the jurisdiction of military defence authorities.
In 2007, Estonia experienced extensive computer hacking attacks that lasted
several weeks. 3 Since then, support has been growing to give priority to military4
solutions to cyber security concerns. Soon after the attacks on Estonia, NATO
began developing policies and capacity aimed at cyber security.5 In 2008, during
the brief Georgia-Russia War over South Ossetia, Georgia experienced
cyber-attacks similar to those suffered by Estonia in the previous year.6 In
2009, the USA began releasing a number of policies on cyber security that
were predominantly military in orientation.7 More tangibly, the USA
announced in 2009 that it would establish Cyber Command as a subunit of
Strategic Command, one of its nine combat commands, within the
Department of Defense.8 Also, in 2009, computer malware, known as the
Stuxnet worm, was released apparently by one or more governments, most
likely the USA and Israel, to slow the progress of Iran's nuclear program, a
problem otherwise being addressed by the Security Council and through nego-
tiations. 9 In 2010, commentators began to reference the Cold War security
policy of threatening massive retaliation to achieve deterrence as a policy to
2 See, eg, R Brust, 'Cyberattacks: Computer Warfare Looms as the Next Big Conflict in
International Law' (1 May 2012) <http://www.abajournal.com/mobile/article/cyberat
tackscomputer -warfare-looms as-next-big-conflict> (accessed 20 June 2012). See
further R Buchan, 'Cyber Attacks: Unlawful Uses of Force or Prohibited
Interventions?' and N Tsagourias, 'Cyber Attacks, Self-Defence and the Problem of
Attribution' in this volume.
3 See s 2.A below and accompanying notes.
4 The North Atlantic Treaty Organization was founded in 1949 for the collective
self-defence of Western European states, the USA and Canada. See <www.nato.
int> (accessed 20 June 2012).
5 According to the NATO website: 'Cyber attacks continue to pose a real threat to
NATO and cyber defence will continue to be a core capability of the Alliance.'
<http://www.nato.int/cps/en/natolive/75747.htm> (accessed 20 June 2012).
6 See s 2.B below and accompanying notes.
7 See, eg, M Clayton, 'The New Cyber Arms Race' ChristianScience Monitor (7 March
2011), <http://www.csmonitor.com/USA/Military/2011/0307/The-new-cyber-arms-
race> (accessed 20 June 2012). See also ns 51-53 and accompanying text.
8 See n 51 and accompanying text.
9 See s 2.C and accompanying notes.
Cyber Security without Cyber War 189
apply by analogy to Internet security.1a In 2011, the USA Congress began debat-
ing new legislation that would give even more authority to the Department of
Defense for cyber security, at the expense of the Department of Homeland
Security (DHS). 11
Within the debate over security in cyberspace, it should be recognized as a
preliminary matter that cyber space is international space. Activity in cyber-
space and domestic legislation with respect to it must comply with the relevant
international law. Some looking to the military to defend cyberspace are seeking
to exclude considerations of international law either because they are interna-
tional law sceptics in general or they believe international law cannot be applied
to the Internet as a practical matter. Stewart Baker, a Washington DC lawyer
who was an Assistant Secretary for Policy and Technology in the DHS in the
Bush administration, dismisses international law in general and its role in cyber
security in particular. In an online debate sponsored by the American Bar
Association in 2012, he indicated scant regard for the use of international law
'norms' respecting cyberspace and went on to argue: 'Lawyers across the [US]
government have raised so many show-stopping legal questions about cyberwar
that they've left our military unable to fight, or even plan for, a war in cyber-
space'. 12 In 2011, Baker voiced13a similar position in the respected international
affairs journal, Foreign Policy.
Other scholars who apparently understand that international law is generally
the relevant law for cyber security questions may still argue that it is difficult to
fit cyber problems into the rules on international law with respect to the use of
force. 14 Instead of concluding, therefore, that it is necessary to look at other
10 See, eg, M McConnell, 'To Win the Cyber-War, Look to the Cold War' Washington
Post (Washington, 28 February 2010) at BI. (The op-ed's online version has a different
title: 'How to Win the Cyber War We Are Losing' <http://www.washingtonpost.coml
wp-dyn/content/article/2010/02/25/AR2010022502 4 > (accessed 20 June 2012).) For a
law journal article advocating a return to Cold War thinking about cyber security and
international law, see M Waxman, 'Cyber-Attacks and the Use of Force: Back to the
Future of Article 2(4)' (2011) 36 Yale J Intl L 421, eg at 425-26.
11 See ns 55-59 and accompanying text.
12 SA Baker and CJ Dunlap Jr, 'What is the Role of Lawyers in Cyberwarfare?' (1 May
2012) <http://www.abajournal.com/magazine/article/what is the-role-of-lawyers-in-
cyberwarfare> (accessed 20 June 2012).
13 Writing in a recent online edition of the main stream international affairs journal,
Foreign Policy, Baker wrote that 'State Department and National Security Council
lawyers are implementing an international cyber war strategy that relies on interna-
tional law "norms" to restrict cyberwar.' S Baker, 'Denial of Service, Against
Cyberwar with Arcane Rules and Regulations' Foreign Policy (30 September 2011)
<http://www.foreignpolicy.com/articles/2011/09/30/denial of-service?hidecomments=
yes> (accessed 20 June 2012).
14 See, eg, Waxman, who takes issue with both Schmitt's attempt to devise criteria that
could equate cyber attacks with the armed attack necessary to trigger UN Charter art
51 and Dinstein who is confident that the Internet can be regulated under existing
weapons conventions and other rules. Waxman (n 10) fns 156-61 and accompanying
text (Schmitt) and fn 64 and accompanying text (Dinstein), citing MN Schmitt,
'Computer Network Attack and the Use of Force in International Law: Thoughts
190 Mary Ellen O'Connell
cyber security. Even if some cyber incidents could fit a solid definition of what
constitutes an armed attack, responding to such an attack will rarely be lawful or
prudent if the response is a use of force. The emphasis, therefore, in terms of
legal norms and commitment of resources should be in the non-military sphere.
In the USA and other States where the thinking is in conventional military
terms respecting responses to cyber problems, the advocates of such thinking
appear to be trapped by an ideology of militarism. The vast majority of cyber
security incidents are carried out not by government-sponsored hackers causing
deaths and brick and mortar destruction. The major challenge to Internet
security is by private criminals interested in private gain. International law
supports cyber security that is achieved through law enforcement cooperation,
supported by shared legal norms governing the use of the Internet. Resources
devoted to developing a comprehensive treaty on cyber security that
de-militarizes cyberspace and emphasizes law enforcement cooperation, im-
proved international governance, especially through the International
Telecommunications Union, as well as good computer and network defences
will go much farther than military force towards keeping the Internet open and
available for peaceful communication and commerce.
Security concerns are as old as the Internet itself. Jeffrey Carr describes an
organized attack by some 3000 Chinese hackers in 1998 on Indonesian govern-
ment sites to protest anti-Chinese riots in the country. 19 Since then tens of
thousands of attempts to hack into major computer networks belonging to
defence ministries, banks, the media and the like are occurring daily. Most of
these cyber intrusions have espionage or theft as the purpose and are typically
categorized as 'computer network exploitation' or 'CNE'. 20 A smaller number
have involved 'computer network attacks' or 'CNA'. The 2007 attacks on
Estonia, NATO's response, and the attacks during the 2008 Russia-Georgia
conflict are described below because they are regularly cited in military security
discussions. These cases have undoubtedly influenced the turn to thinking about
military solutions for cyberspace problems. A third CNA event, the use of the
Stuxnet worm against Iran involved a destructive use of the Internet to address
what had been approached as a diplomatic problem. The use of this malware
19 j Carr, Inside Cyberwarfare (O'Reilly 2010) 2.
20 For a helpful, general discussion of the current issues respecting cyber security, see
Brookings Institution, 'The Cybersecurity Agenda: Policy Options and the Path
Forward' (26 October 2011) <http://www.brookings.edu/topics/cybersecurity.aspx>
(accessed 20 June 2012); Brookings Institution, 'Deterrence in Cyberspace:
Debating the Right Strategy with Ralph Langner and Dmitri Alperovitch' (20
September 2011) <http://www.brookings.edu/topics/cybersecurity.aspx> (accessed 20
June 2012); SM Hersh, 'The Online Threat, Should We Be Worried About a Cyber
War?' New Yorker (1 November 2010) 44.
192 Mary Ellen O'Connell
A. Estonia and NA TO
In response to the moving of a Soviet war memorial from the city of Tallinn in
Estonia to its suburbs, hackers began attacking Estonian government websites
through distributed denial of service (DDOS) attacks in April of 2007.21 Seen as
an affront to the memory of Soviet soldiers who died during the Second World
War, the removal of the statue set off a series of riots within Estonia, while
hackers attacked the government's websites by defacing them and redirecting
users to images of Soviet soldiers. 22 These attacks lasted about a month. Attacks
lasting several days were directed at Estonia's biggest bank as well as at several
newspapers and reached the point of coming 'close to shutting down the coun-
try's digital infrastructure'.2 3 Estonia's defence minister said the hacking had
caused a national security situation and compared the attacks with the closing of
all the country's ports.24 Other officials have called the episode 'cyberwar'. 5
Estonia has claimed that the Russian government instigated the attacks, while
Russia has denied any involvement. 26 To support its charges, Estonia enlisted
the aid of NATO, the EU, the USA and Israeli Internet experts to trace the
attacks to their origin and to gather other information. However, despite the fact
that a number of the computers initiating the attacks had Russian IP addresses,
the hackers had hijacked computers around the globe to send the attacks. It
remains uncertain from where exactly the attacks originated.27 The Estonian
experience raised serious questions about how governments can defend against
cyber-attacks since governments do not control the Internet. Some argued that
Estonia was attacked in a way that triggered the North Atlantic Treaty's Article
5. Article 5 commits NATO to respond to attacks on any member of the
Alliance as permitted under the United Nations Charter provision in Article
28
51 for collective self-defence 'if an armed attack occurs'.
21 'The Cyber Raiders Hitting Estonia' BBC News (17 May 2007) <http://news.bbc.co
.uk/2/hi/europe/6665195.stm> (accessed 20 June 2012).
22 'Estonia Fines Man for Cyber War' BBC News (25 January 2008) <http://news.bbc.co
.uk/2/hi/technology/7208511.stm> (accessed 20 June 2012).
23 M Landler and J Markoff, 'Digital Fears Emerge After Data Siege in Estonia' New
York Times (New York, 29 May 2007) <http://www.nytines.com/2007/05/29/technol-
ogy/29estonia.html?ref=estonia> (accessed 20 June 2012).
24 ibid.
25 ibid.
26 ibid.
27 J Davis, 'Hackers Take Down the Most Wired Country in Europe' Wired Magazine
(21 August 2007) <http://www.wired.compolitics/security/magazine/15-09/ffestonia?
currentPage=all> (accessed 20 June 2012).
28 ibid.
Cyber Security without Cyber War 193
NATO did not respond to the Estonia attacks with a counter-attack, but did
establish an Internet defence facility in Estonia, called the Cooperative Cyber
Defence Centre of Excellence (CCDCOE). 29 Estonia itself has created a
volunteer unit of cyber-experts akin to the US National Guard and has
become a leader in determining ways to defeat online attacks.
B. Georgia-Russia
The first known use of the Internet during a conventional armed conflict to
interfere with civilian use of the Internet occurred in the 2008 conflict over
the Georgian province of South Ossetia. 30 Georgia triggered the conflict by
attacking Russian soldiers who were part of a peacekeeping contingent in
South Ossetia under the terms of a Georgia-Russia treaty of 1991. In the
night of 7-8 August, Georgia attacked, killing about a dozen Russian soldiers
and wounding many others. Russia counter-attacked pushing to within 35 miles
of the Georgian capital, Tbilisi. Georgia claimed that Russia initiated DDoS
attacks against a number of Georgian websites, including government sites,
media sites and commercial sites. 31 The computer attacks lasted nearly a
month. The physical fighting had lasted about a week.
Under international law, Russian forces in South Ossetia would certainly
have had the right to defend themselves personally from direct attack by
Georgian forces. It is more questionable whether they had the right to
defend their positions in South Ossetia since Georgia's attack clearly spelled
the end of its consent to the 1991 treaty. On the other hand, Russian forces
would arguably have a right to remain in the enclave until the treaty was
terminated lawfully. The Russian move beyond South Ossetia into Georgia
was excessive in relation to either the clearly lawful goal of immediate defence
of self or even the more questionable goal of maintaining control of the en-
clave. Attacks on Georgian computer networks directly connected with its
attacks on Russian troops would be typical of the type of objects that may
be targeted during armed conflict hostilities under the law of armed conflict.
29 j Benitz, 'Baltic States Urge NATO to Bolster Cyber-Defense' NATO Alliance (27
May 2011) <http://www.acus.org/natosource/baltic-states-urge-nato-bolster-cyber-
defense> (accessed 20 June 2012).
30 For details of the computer network attacks that occurred during the South Ossetia
conflict, see S Watts, 'Combatant Status and Computer Network Attack' (2010) 50
Virginia J Intl L 391, 397-98.
31 J Swaine, 'Georgia: Russia "conducting cyber war"' The Telegraph (London, 11
August 2008) <http://www.telegraph.co.uk/news/worldnews/europe/georgia/2539157/
Georgia-Russia-conducting-cyber-war.html> (accessed 20 June 2012). See also E
Tikk and others, 'Cyber Attacks Against Georgia: Legal Lessons Identified'
(Cooperative Cyber Defence Centre of Excellence 2008) 1, 4-15 at <http://www.car-
lisle.army.mil/DIME/documents/Georgia%201%200.pdf> (accessed 20 June 2012).
194 Mary Ellen O'Connell
C. Stuxnet
Code analysis makes it clear that Stuxnet is not about sending a message
or providing a concept. It is about destroying its targets with utmost
determination in military style .... Stuxnet is the key for a very specific
lock. In fact, there is only one lock in the world that it will open.... The
whole attack is not at all about stealing data but about manipulation of a
specific industrial process at a specific moment in time. This is not gen-
38
eric. It is about destroying that process.
develop further [its] ability to prevent, detect, defend against and recover
from cyber-attacks, including by using the NATO planning process to
enhance and coordinate national cyber-defence capabilities, bringing
all NATO bodies under centralized cyber protection, and better integrat-
ing NATO cyber awareness, warning and response with member
nations .... 4 2
Just as our military is prepared to respond to hostile acts on land, air and
sea, we must be prepared to respond to hostile acts in cyberspace.
Accordingly, the United States reserves the right, under the laws of
armed conflict, to respond to serious cyber-attacks, with a proportional 50
and justified military response, at the time and place of its choosing.
Cyber Command has been given a wide mandate. It not only has responsibil-
ity for defending DOD information networks, it must 'prepare to, and when
directed, conduct full-spectrum military cyberspace operations in order to
enable actions in all domains, ensure US/Allied
51
freedom of action in cyberspace
and deny the same to our adversaries'.
Singer and Schachtman believe that the DOD's cyber strategy is based on
conceiving of cyber security in a way similar to the USA's Cold War strategy.
They relate that the classified version of the cyber strategy presents
46 ibid 8-9; see also 'NATO Launches Cyber Defence Centre in Estonia' (n 43).
47 'Working with the Private Sector to Deter Cyber Attacks' (n 41).
4s ibid.
49 'US Department of Defense, Cyber Command Fact Sheet (21 May 2010) <http://
www.stratcom.milfactsheets/CyberCommand/> (accessed 20 June 2012).
50 W Lynn, Former Deputy Secretary of Defense, 'Announcement of the Department of
Defense Cyberspace Strategy at the National Defense University' (14 July 2011)
<http://www.pentagonchannel.mil/onestory-popup.aspx?pid=FttPuXny5i7D8plhC
rgnXrveieDVeMW> (accessed 20 June 2012).
5' ibid.
Cyber Security without Cyber War 197
The United States is fighting a cyber-war today, and we are losing. It's
that simple.... What is the right strategy for this most modern of wars?
Look to history. During the Cold War, when the United States faced an
existential threat from the Soviet Union, we relied on deterrence to pro-
tect ourselves from nuclear attack. Later, as the East-West stalemate
ended and nuclear weapons proliferated, some argued that preemption
made more sense in an age of global terrorism. The cyber-war mirrors the
52 Singer and Schachtman (n 16).
53 T Carney, 'The Rise of the Cybersecurity Industrial Complex' The Examiner (22 April
2011) <http://washingtonexaminer.com/politics/2Oll/04/rise-cybersecurity-industrial-
complex/113362> (accessed 20 June 2012).
4 Hunton & Williams LLP, 'Senators Introduce Cybersecurity Act of 2012' Association
of Corp Counsel (22 February 2012) <http://www.lexology.com/library/detail.
aspx?g=d9fce9l9-5bc4-486b-a92a-685884ec9ea4> (accessed 20 June 2012).
5 'McCain Promises GOP Alternative to "Super Regulator" Cybersecurity Bill' The
Daily Caller (20 February 2012) <http://dailycaller.com/2012/02/20/mccain-promises-
gop-alternative-to-super-regulator-cybersecurity-bill/> (accessed 20 June 2012).
56 ibid.
57 ibid.
198 Mary Ellen O'Connell
As already indicated at the outset of this article, the emphasis on cyber space as
battle space is in tension with the international law governing the use of force.
Some prefer to dismiss international law from the discussion altogether. Others
do not exclude international law, but interpret it any way that it is in effect
excluded. In May 2011, President Obama indicated that international law
would play a role in US cyber security planning, indicating, however, that it
would be international law as interpreted by those who advocate a broad-
nearly unfettered-right of the USA to resort to force. In International
Strategy for Cyberspace,60 the White House announced:
When warranted, the United States will respond to hostile acts in cyber-
space as we would to any other threat to our country. All states possess an
inherent right to self-defense, and we recognize that certain hostile acts
conducted through cyberspace could compel actions under the commit-
ments we have with our military treaty partners. We reserve the right to
use all necessary means -diplomatic, informational, military, and
economic-as appropriate and consistent with applicable international
law, in order to defend our Nation, our allies, our partners, and our
interests. In so doing, we will exhaust all options before military force
whenever we can; will carefully weigh the costs and risks of action against
the costs of inaction; and will act in a way that reflects our values and
strengthens our legitimacy, seeking broad international support whenever
61
possible.
58 McConnell (n 10).
59 Singer and Schachtman (n 16).
60 'International Strategy for Cyberspace: Prosperity, Security, and Openness in a
Networked World' (May 2011) <http://www.whitehouse.gov/sites/default/files/rss
viewer/international_strategyjorcyberspace.pdf> (accessed 20 June 2012).
(Emphasis added).
61 ibid.
Cyber Security without Cyber War 199
62 See Baker (n 13); see also J Crawford, Manley 0 Hudson Award Lecture ASIL 2012
(on file with the author).
63 Numerous examples come readily to mind: the continuing operation of the prison at
Guant~inamo Bay, Cuba; the continuing use of military commissions; the failure to
enforce the Geneva Convention prohibition on torture, the failure to enforce the
Convention Against Torture's obligations and the campaign of targeted killing far
from zones of armed conflict hostilities, to name a few. See ME O'Connell, 'Adhering
to Law and Values against Terrorism' (2012) Notre Dame J Intl & Comp Law
(forthcoming).
64 Schmitt (n 14).
200 Mary Ellen O'Connell
65 M Roscini, 'World Wide Warfare-Jus Ad Bellum and the Use of Force' (2010) 14
Max Planck UN YBk 85. See also Cl Dunlap, Jr, 'Perspectives for Cyber Strategies on
Law for Cyberwar' (Spring 2011) Strategic Studies Q 81, 81.
66 See generally R Buchan, 'Cyber Attacks: Unlawful uses of Force or Prohibited
Interventions?' in this volume.
67 UN Charter Art 2(4): 'All Members shall refrain in their international relations from
the threat or use of force against the territorial integrity or political independence of
any State, or in any other manner inconsistent with the Purposes of the United
Nations'.
Article 39: 'the Security Council is given authority to 'determine the existence of any
threat to the peace, breach of the peace, or act of aggression' and the responsibility to
'maintain or restore international peace'. It may do so by authorizing the use of force
by member states'.
Article 51: 'Nothing in the present Charter shall impair the inherent right of individual
or collective self-defense if an armed attack occurs against a member of the United
Nations, until the Security Council has taken measures necessary to maintain inter-
national peace and security. Measures taken by members in the exercise of this right
of self-defense shall be immediately reported to the Security Council and shall not in
any way affect the authority and responsibility of the Security Council under the
present Charter to take at any time such action as it deems necessary in order to
maintain or restore international peace and security.'
68 D Bowett, Self-Defence in International Law (Manchester University Press 1958) 3,
184-85.
Cyber Security without Cyber War 201
armed attack occurs by saying, 'there is no explanation of this curious proviso "if
an armed attack occurs" ,.69 He then develops an argument for self-defence with-
out an armed attack according to the 1841 correspondence over the sinking by
British forces of an American ship called the Caroline.The correspondence con-
firmed that the customary international law of the time permitted the use of force
in self-defence if the necessity was 'instant', 'overwhelming' and leaving 'no
moment' for deliberation. Despite the clear deficiencies as a matter of legal
analysis with Bowett's argument, it is still cited with impressive fidelity by a
minority of scholars, mostly in the USA and UK.
Brownlie soon provided a point-by-point response to Bowett, inspiring the
strict interpreters of the Charter ever since. Brownlie warned against the
tendency by writers to claim justifications for the use of force found in the cus-
tomary law prior to the 1920s. He singles out for particular criticism attempts
to base rights of self-defence on the 1841 correspondence over the Caroline.He
took a strict position on interpreting Article 51, ruling out resort to force in
anticipatory self-defence or against actions not involving armed force. He points
to the conditions on the exercise of self-defence beyond the Charter, namely, the
principles of necessity and proportionality. He defended his strict stance saying,
'[T]he dominant policy of the law and of the United Nations is to maintain
international peace and to avoid creating possibilities of breaches of the
peace, in the form of vague and extensive justifications for resort to force or
70
otherwise.'
The International Court of Justice in six cases relevant to the Charter rules on
the use of force has supported Brownlie's understanding respecting interpret-
ation. Not only must an armed attack or armed attack equivalent be in evidence
to use military force in self-defence, the attack must be significant; it must be
attributable to the state where the self-defence is being carried out; the use of
force must be a last resort and must be likely to succeed in achieving defence,
and must be proportional to the injury suffered.
Attempting to apply these conditions to cyber force actions is difficult, if not
impossible -even for the followers of Bowett. First, in the three cases described
earlier in the article, it is difficult to make the case that the computer network
provocations amounted to an armed attack equivalent. No lives were lost dir-
ectly. Damage to tangible objects occurred only in the case of the Stuxnet attack
on Iran. This sort of damage does not meet the condition that an armed attack
must be significant to trigger Article 51: 'The prohibition of armed attacks may
apply to the sending by a State of armed bands to the territory of another State,
if such an operation, because of its scale and effects would have been classified
as an armed attack rather than a mere frontier incident had it been carried out
by a regular armed forces.' 71 The ICJ made similar assessments of 'scale and
69 ibid.
70 1 Brownlie, International Law and the Use of Force by States (OUP 1963) 428-36.
71 Military and Paramilitary Activities in and Against Nicaragua (Nicararagua v US)
[1986] ICJ Rep 14, 103-4 (the Nicaragua case).
202 Mary Ellen O'Connell
72 73
effects' of violent action in the Oil Platforms case, the Wall advisory opinion
and the DRC v Uganda case.74 The Stuxnet attack while unlawful was not the
equivalent of an Article 51 armed attack.
Second, attribution has not been affirmed at the international evidentiary
standard in any of the three cases. State practice indicates the case for attribu-
tion would have to be made with clear and convincing evidence. 75 In the case of
cyber-attacks generally, convincing evidence is hard to find:
while not triggering rights of a victim State under Article 51.78 In support, the
court has referenced the UN General Assembly's Declaration on Friendly
Relations,79 the OAS Convention on the Rights and Duties of States in the
Event of Civil Strife,80 and other authoritative
81
sources for the existence and
content of the non-intervention principle.
International law raises substantial barriers to both using cyber weapons and
defending cyber space from cyber-attacks through the use of force. In general,
international law supports regulating cyber space as an economic and commu-
nications sphere and contains coercive means of responding lawfully to cyber
provocations of all types. The same sort of coercive measures that are lawful to
use against economic wrongs and violations of arms control treaties will gener-
ally be lawful to use in the case of a cyber-attack. In the economic sphere,
responses to violations tend to be known as 'countermeasures'; in the arms
control sphere, they are known as 'sanctions'. 8 2 Both are the coercive enforce-
ment measures, not involving the use of significant military force, available to
States acting in response to an internationally wrongful act. In addition, various
arms control treaties, such as the Nuclear Non-Proliferation Treaty and the
Chemical Weapons Convention, provide for the Security Council to take
action in the case of a violation. Despite the availability of these alternatives
to the use of military force, it is important to reiterate that protecting cyber
space, keeping it viable for economic and communication uses, will generally
require defensive measures, not offensive ones. Good computer security cannot
be replaced by countermeasures, let alone military measures.
78 Nicaragua paras 187-201.
79 See Declaration on Principles of International Law Concerning Friendly Relations
and Cooperation Among States in Accordance with the Charter of the United
Nations, GA Res 2625 (XXV), UN Doc N8028 (1970).
80 1928 OAS Convention on the Rights and Duties of States in the Event of Civil Strife
134 LNTS 45.
81 See Nicaragua para 203 (citing Declaration on the Inadmissibility of Intervention in
the Domestic Affairs of States and the Protection of their Independence and
Sovereignty, GA Res 2131 (XX), UN Doc A/EES/36/103 (9 December 1981)). The
Court also referred to the principle of State sovereignty under article 2(1) of the UN
Charter, noting its close connection to the principles of the prohibition on the use of
force and of non-intervention; Nicaragua para 212-14.
82 The definitions of the terms 'countermeasures' and 'sanctions' are not a settled matter
in international law. White and Abass, for example, define countermeasures as
non-forcible measures taken by States and sanctions as non-forcible measures taken
by organizations. This would be a helpful distinction but for the fact that the USA, for
example, labels its unilateral, non-forcible coercive measures 'sanctions'. See gener-
ally, N White and A Abass, 'Countermeasures and Sanctions' in M Evans (ed),
International Law (3rd edn, OUP 2010) 531.
204 Mary Ellen O'Connell
4. Its purpose must be to induce the wrongdoing State to comply with its
obligations under international law, and the measure must therefore be
reversible.
If a State is the victim of a cyber-attack or cyber espionage, and it has clear
and convincing evidence that the wrong is attributable to a foreign sovereign
83 In the USA the leading scholar in the area of the Internet is Lawrence Lessig of
Harvard Law School. Lessig does comment on international and foreign law but his
background and training are plainly in the area of US domestic law. Even Jack
Goldsmith, also Harvard Law School, while being called the future of international
law at the school is plainly from the domestic law arena. This is revealed by his
comment that law governing military use of the Internet, is uncertain.
This fact about cyber scholars is changing, however, as intellectual property scholars,
such as Graham Dinwoodie, with strong backgrounds in international and domestic
law relevant to cyber space regulation.
84 A number of scholars have already been cited working in the area of international law
and the use of force, who have analysed military force in cyber space: see eg, Schmitt
(n 14); Dinstein (n 14); Graham (n 77); and Dunlap (n 12).
8 As White and Abass point out, it is also the case that international law scholars have
paid relatively little attention to countermeasures and sanctions and the rules govern-
ing their use. White and Abass (n 83) 531. But see ME O'Connell, The Power and
Purpose of International Law, Insights from the Theory and Practiceof Enforcement
(OUP 2008, paperback 2011) chs 4 and 5 and the citations therein.
86 O'Connell (n 86) 264.
Cyber Security without Cyber War 205
State, the victim State may itself commit a wrong against the attacking state, so
long as the wrong is commensurate with the initial wrong (proportionality) and
so long as the response is aimed at inducing an end to the initial wrong (neces-
sity) or the provision of damages. In most cases of cyber wrongs, the evidence
that a foreign State is behind a particular act, will be found only after the act is
over or the damage is done. This fact indicates that most countermeasures aimed
at cyber wrongs will be a demand for money damages. The international cyber
community appears to be adept at estimating the amount of money to repair
damage caused by a wrongful cyber event. Thus, a victim State should be able to
meet the elements of lawful countermeasures in way comparable with States
suffering trade injuries and having the right under WTO rules to apply counter-
measures against the wrongdoing state.
deputy secretary of the Russian Security Council, laid out what he described as
Russia's bedrock positions on disarmament in cyberspace. Russia's proposed
treaty would ban a country from secretly embedding malicious codes or circuitry
that could be later activated from afar in the event of war.
The USA, however, has resisted proposals for a treaty. This may relate to US
plans to use the Internet for offensive purposes as it is believed to have done
regarding the Stuxnet worm. US officials claim publicly that Cyber Command is
primarily defensive, but the reluctance to entertain the idea of a cyberspace
disarmament treaty is raising questions as the true US position. '[T]he
Russian government [has] repeatedly introduced resolutions calling for cyber-
space disarmament treaties before
91
the United Nations. The United States [has]
consistently opposed the idea.'
Whatever the reasons for the US position, drafting a treaty on disarmament and
alternatives to military force for regulating cyberspace are essential for the
future. In addition to establishing clear rules for national rights and duties on
the Internet, a treaty can clarify what is permissible for individuals. A treaty can
specify the sort of conduct that all States need to regulate through national law
enforcement agencies and in cooperation with other national and international
agencies. A model for this part of a comprehensive treaty is already available in
the form of the Budapest Convention on Cybercrime. 92 Most cyber security
breaches are caused by private criminals.
At the end of the day, countermeasures, sanctions and even law enforcement
cannot substitute for frontline computer and network security measures. An
essential step in maintaining a good cyber defence is applying best practices
and educating everyone legitimately using the Internet on good network
hygiene. In this respect, the analogy is better made to stopping pandemics
than to crime or war.
The Internet has made it easier for hackers to steal information remotely.
This is largely due to 'the proliferation of smartphones and the inclination of
employees to plug their personal devices into workplace networks and cart
proprietary information around'.93 As a result standards for cyber hygiene94
have elevated, especially for those who have access to vital information.
93 N Perlroth, 'Travelling Light in a Time of Digital Thievery' New York Times (New
York, 10 February 2012) <http://www.nytimes.com/2012/02/11/technology/electronic
-security-a-worry-in-an-age-of-digital-espionage.html?_r=2&pagewanted=l&ref=
technology> (accessed 20 June 2012).
94 ibid.
95 M Borrett, 'Cyber Strategies Revealed' IBM Institute for Advanced Security (11
December 2011) <http://www.instituteforadvancedsecurity.com/expertblog/2011/12/
11/cyber-strategies-revealed/> (accessed 20 June 2012).
96 C Nott and others, 'Cyber Security: Protecting the Public Sector' IBM Institute for
Advanced Security (September 2011) <http://www.instituteforadvancedsecurity.com/
docs/CyberSecurity-protectingthePublicSector.pdf> (accessed 20 June 2012) 1, 7.
97 L Daniel, 'Cyber Command Synchronizes Services' Efforts' US Department of
Defense (9 July 2010) <http://www.defense.gov/news/newsarticle.aspx?id=59965>
(accessed 20 June 2012) (emphasis added).
98 ibid.
99 ibid.
10o 'Much of cyberspace is owned and used by private companies. [Thus i]t is businesses
that will drive the innovation required to keep pace with security challenges.' Borrett
(n 96).
208 Mary Ellen O'Connell
manufacture most of the nation's arms. They produce most of the software and
hardware for the computers the government uses. Corporations, under contract
with the government, carry out many other security functions, including the
101
collection and processing of intelligence and the conduct of covert operations.
However, much of the business community strongly resists implementing cyber
security per government mandate, 10 2 let alone international organization over-
sight.1 0 3 Governments and organizations will need to find incentives to get pri-
vate corporate cooperation and to lead in terms of promoting and supporting
international cooperation, especially through international organizations such as
the ITU. 1° 4 This might be done by shifting resources away from the military
sector to the Internet sector, both private commercial and international organ-
izational. Best practices and promotion of a culture of security can be carried out
most effectively for the Internet through a holistic approach that includes all
actors with an interest in maintaining access to a safe Internet. The International
101 A Etzioni, 'Private Sector Neglects Cyber Security' The National Interest (29
November 2011) <http://nationalinterest.org/commentary/private-sector-neglects-
cyber-security-6196> (accessed 20 June 2012).
102 ibid.
103 The attitude of many in the private commercial cyber sector is captured in this open-
5. Conclusion
To date, the problem of Internet security has been the domain of international
law scholars with expertise in use of force questions. They have sent the message
that the Internet may be protected through military force or the threat of mili-
tary force, analogizing to Cold War deterrence strategy. Governments have
followed this modelling, pouring resources into the military for keeping the
Internet safe and for taking advantage of what it offers to attack opponents.
Doing so has required strained analogies of cyber-attacks to conventional kin-
etic attacks. The Internet is now far less secure than before there was a Cyber
Command or a NATO CCDCOE. It is time, therefore, to turn to cyber dis-
armament and a focus on peaceful protection of the Internet. The motto should
be: a good cyber defence is good cyber defence.
+(,121/,1(
Citation:
T. Noble Foster; Christopher R. Greene, Legal Issues of
Online Social Networks and the Workplace, 18 J. L. Bus.
& Ethics 131 (2012)
Copyright Information
Abstract
Millions enjoy the benefits of using social media every day, but
Facebook, MySpace, Linked/n, and Twitter, among others, have also been
involved in a significant number of legal issues, many of which have ended in
litigation.
As the current undisputed leader of the Online Social Network (OSN)
industry, Facebopk has registered over 600 million users world-wide within a
few short years. Almost any enterprise with that kind of growth trajectory
would understandably attract the attention of government officials. The fact
that Facebook, Twitter, Linked/n, and the other online social networks (also
referredto collectively as "socialmedia") provide a nearly cost-free tool that
empowers ordinary citizens by giving them direct access to an extremely
powerful mass communications network is enough to make government
leaders curious, envious, and fearful.
In this paper, we summarize the different types of legal claims and
remedies associated with OSNs that are currently available under state and
federal statutes and the common law. One of the most frequently reported
types of cases are those arising in the context of employer-employee relations.
For that reason, our findings are based to a large extent on our examination
of legal issues associated with the use of social media in the workplace.
*Assistant Professor of Business Law. Albers School of Business and Economics, Seattle University.
**Attorney at Law. Seattle. Washington.
The authors gratefully thank Shelby Gagnon, Seattle University MBA student, and James Blazey, Esq.,
Seattle area attorney, for their outstanding research assistance.
1. Daniel Bates, Facebook Fatigue Sets in for 100,000 Brits: Users Bored with Site Deactivate
Accounts Amid Privacy Fears, THE DAILY MAIL. June 14. 2011.
http://www.dailymail.co.uk/sciencetech/article-2003131/Facebook-I0Ok-Brits-bored-site-deactivate-
accounts-amid-privacy-fears.html.
2. See Socialcapital.com, Twitter, Facebook and YouTube's Role in Afiddle East Uprising,
http://socialcapital.wordpress.com/2011/01/26/twitter-facebook-and-youtubes-role-in-tunisia-uprising/
(last visited March 7, 2011). (The governments of Egypt, Tunisia, Bahrain, Libya, and Iran can be used
as examples. Each of them tried to suppress, disrupt. or completely shutdown online social networks
when large and publicly open anti-regime demonstrations began. The government of China is doing a
more thorough job online social network suppression). See also. Scott Shane. SpotlightAgain Falls on
Web Tools and Change, NEW YORK TIMES, Jan. 29, 2011,
http://www.nytimes.com/2011/01/30/weekinreview/30shane.html.
131
INTRODUCTION
Facebook and other online social networks (OSNs) have quickly attracted a
large and growing following and are now firmly established on the internet scene.
At the time of this writing, Facebook is estimated to have 600+ million users
worldwide.3
A nationwide research report indicates that U.S. internet users spend
906,000,000 hours per month on social networks and blogs.4 According to Neilsen,
a recent Pew Research Center study found that more than half of U.S. Internet
users between ages 18-45 had a profile on a social networking site. In contrast, 30
percent of baby boomers under age 65 had profiles and only 6 percent of people
over 65 had profiles. 5 Also, Neilsen, having tracked 200,000 Internet users and
compared usage from June 2009 to that of June 2010, found that of the total time
spent in online social networks, 85 percent of the time is spent on Facebook, with
Myspace (5.6%), Twitter (1.10%), and Blogger (1.1 %) rounding out the top four.
While time spent on e-mail, portals and instant messaging has declined, there was a
43 percent increase in time spent on social networking and a 10 percent increase on
games, with an overall 32.9 percent of Internet time in June 2010 spent on social
networks and online games. According to another recent survey, Facebook
dominates the social network space: 92% of OSN users are on Facebook; 29% use
7
MySpace, 18% used LinkedIn and 13% use Twitter.
The early adopters of Facebook and other OSNs were individual computer
users, seeking to connect digitally with online "friends." More recently however,
social media has become a powerful tool for enterprises across the globe.
Businesses, nonprofits, and government entities are using Facebook proactively for
recruiting, marketing, fundraising, and for public awareness messaging. A 2010
Burson-Marsteller study showed that, "of the Fortune Global 100 companies, 65
3. David Kirkpatrick, Address at Elliot Bay Bookstore on The Facebook Effect: The Inside Story
of the Company That Is Connecting the World (June 21, 2010). See also, Bates, supre note 1.
4. Scott Duke Harris, Multi-Tasking Sites like Facebook Boom at Expense of Stand-Alone
Networks, Seattle Times, August 3, 2010 (citing What Americans Do Online: Social Media And Games
Dominate Activity, http://blog.nielsen.com/nielsenwire/online mobile/what-americans-do-online-
social-media-and-games-dominate-activity/).
5. Id.
6. Id.
7. Keith N. Hampton. Lauren Sessions Goulet, Lee Rainier. & Kristen Purcell. Social Networking
Sites and Our Lives: How People's Trust, PersonalRelationships, and Civic and PoliticalInvolvement
are Connected to Their Use of SocialNetworking Sites and other Technologies, Pew Research Center's
Internet & American Life Project, (June 16, 2011), http://pewinternet.org/Reports/2011 /Technology-
and-social-networks.aspx.
2012 Online Social Networks and the Workplace 133
percent have active Twitter accounts, 54 percent have Facebook fan pa es, 50
percent have YouTube video channels and 33 percent have corporate blogs."
Although individual and business users of OSNs derive some perceived
benefits from the time they spend online, many also have experienced unexpected,
unintended, and unpleasant consequences, sometimes resulting in litigation. A
recent survey reported that more than 5 million U.S. households experienced some
type of abuse on Facebook in the past year, including computer virus infections,
identity theft, and bullying of children.9
For purposes of our analysis, we have identified three general categories of
such problems, which we describe briefly according to their principle
characteristics.
The first category relates to the sorts of problems encountered by the early
adopters-mostly individual users. This category we call Type I and its primary
distinguishing characteristic is the "self-inflicted injury" element, i.e., a situation in
which the user himself or herself created and then posted some content in the form
of remarks, photos, jokes, etc. on a webpage, not thinking and/or not caring that it
could be seen by an unintended viewer. Primarily, these cases involve claims made
by employees for wrongful termination and center around the issue that somehow
their privacy was violated.
A typical example of this is the case in which a flight attendant posted a
photo of herself on her blog, alongside text containing humorous comments about
her workday experiences. While her intention was to amuse her friends, whom she
expected would visit her blog and MySpace page. However, her MySpace page
was unfortunately also visited by an unintended viewer, her employer. Instead of
being amused, the employer was greatly distressed, due to the photo of the
employee, dressed in the official company uniform, posing for the camera in a way
10
that could be construed by some as suggestive.
In another example, a group of employees started a MySpace page and
posted numerous comments for their own amusement, including: sexual remarks
about management and customers of the company; jokes about some of the
specifications that the company had established for customer service and quality;
and references to violence and illegal drug use. However, company managers were
less than amused after gaining access to the website, and the employees were
terminated.'
In the time since these early cases were reported, there are near-weekly
reports of new cases of this type:
A teenaged office worker was fired when the office manager visited her
Facebook page and found posted remarks about her menial job which she had
,,12
described as "boring.
An employee posted messages to her Facebook page during a workday
after she had "called in sick." The page was accessed by a co-worker, who
informed colleagues at the office. When the boss found out, the "sick" worker was
fired.
A blogger, with the pseudonym "Pitt Girl," felt compelled to disclose her
true identity when several people seemed close to figuring out who she really was.
The nature of her postings included poking fun at the mayor. When Pitt Girl
14
revealed her true identity, she was fired from her job at a nonprofit organization.
A professor posted humorous comments on her Facebook page, joking
about "not wanting to kill" any students that day. On another presumably bad day,
she requested assistance in finding a "discrete hit-man." After a student reported
the remarks, the professor was suspended immediately.
A Georgia school district allegedly forced a high school English teacher to
resign over postings on her Facebook page. Apparently, the school district objected
to photos of the teacher on a European vacation holding wine and beer, as well as a
post indicating that she was "headed out to play Crazy Bitch Bingo" at a local bar.
The school district stated that it was acting in response to a complaint from a parent,
but, according to the teacher, her Facebook page was private and she hadn't
"friended" any of her students. The teacher subsequently sued the school district,
16
alleging violations of state labor law.
Another high school English teacher was suspended with pay from her job
in Pennsylvania, even though what she wrote was "meant only to serve as
amusement for herself, her husband and seven of her friends who read" her blog. In
one post, she advised students to obtain jobs with the local trash company. In
another, she calls them "rude, disengaged, lazy whiners." In a third post, she stated
flatly, "There's no other way to say this: I hate your kid."
Enterprises are using social media in many functional areas of the business
and are enjoying numerous tangible benefits such as increasing brand
recognition, sales, search engine optimization (SEO), web traffic, customer
satisfaction, and revenue.23 In addition, rapid feedback and insight from
consumers provide a mechanism for executives to assess consumer opinion
and use this information to improve products, customer service and
perception.
Enterprises have also discovered that they are able to monitor the market,
their competition and their customers via social media outlets. This allows
engaged enterprises to be on top of any changes that may be needed and to
proactively make appropriate adjustments to strategies, products or
services. The ability to search for and communicate with potential
employees is another area that has seen great enhancement via sites such as
LinkedIn and Plaxo. Also, enterprise use of social media tools usually
24
requires no additional technology to implement.
On the other hand, there are numerous risks to the business enterprise
associated with these new uses of OSNs.25
21. Jennifer Kavur, Smart Recruiting Through Social Networks, NETWORK WORLD, Feb. 23,
2009, http://www.networkworld.com/news/2009/022309-smart-recruiting-through-social.html.
22. Information Systems Audit and Control Association (ISACA), Social Media: Business
Benefits and Security, Governance and Assurance Perspectives (2010). (Abstract: "Initiated as a
consumer-oriented technology, social media is increasingly being leveraged as a powerful, low-cost
tool for enterprises to drive business objectives such as enhanced customer interaction, greater brand
recognition and more effective employee recruitment. While social media affords enterprises many
potential benefits, information risk professionals are concerned about its inherent risks such as data
leakage, malware propagation and privacy infringement. Enterprises seeking to integrate social media
into their business strategy must adopt a cross-functional, strategic approach that addresses risks,
impacts and mitigation steps, along with appropriate governance and assurance measures." (ISACA, at
1).
23. Id. at 5 (citing ENGAGEMENTdb, The World's Most Valiable Brands. Who's Most
Engaged? Ranking the Top 100 Global Brands,
www.engagementdb.com/downloads/ENGAGEMENTdb Report 2009.pdf).
24. Id.
25. Id. at 5, 7-8. (The risks cited include: Data leakage/theft "Owned" systems (zombies): System
2012 Online Social Networks and the Workplace 137
In its 2009 annual study, Internet security firm Proofpoint, Inc. reports that
of the 220 companies surveyed, each with more than 1000 employees, 45 percent
are "highly concerned" about the risk of information leakage via posts to social
26
networking sites like Facebook and LinkedIn. Further, 17 percent of those
companies had disciplined employees for violating social networking policies in the
27
past year and 8 percent had terminated an employee for a violation. The
percentage of such terminations is up from just 4 percent last year, suggesting that
corporate America appears to be steadily increasing tracking of their employee's
28
online activities and cracking down on violators.
The Proofpoint study also shows that 41% of companies surveyed are
highly concerned about information leaks through Twitter and similar short
message services.2 9 No figures are provided for Twitter-related discipline or firings
in the past year. Figures for blogs and message boards are similar to those for
social networking sites: 46% of the companies surveyed are highly concerned about
information leaks through these avenues, 17% disciplined employees for violating
blog or message board policies in the past year, and 9% terminated an employee for
a violation.3 0
We note that the ISACA's list of potential problems is not just an imagined
collection of "worst case scenarios" but is based upon actual cases. Consider the
following selected examples:
downtime; Resources required to clean systems; Customer backlash/adverse legal actions; Exposure of
customer information; Reputational damage; Targeted phishing attacks on customers or employees;
Enterprise's loss of control/legal rights of information posted to the social media sites; Customer
dissatisfaction with the responsiveness received in this arena, leading to potential reputational damage
for the enterprise and customer retention issues; Regulatory sanctions and fines; Adverse legal actions)
26. Careful What You Email, Post, Upload and Tweet: US Businesses Embrace Aggressive
Preventative Measures Wire, ECMCONNECTION.COM.
http://www.ecmconnection.com/article.mvc/Careful-What-Email-Post-Upload-And-Tweet-000 1),
(Aug. 10. 2009).
27. Id.
28. Sam Bayard, Employers Are Freaking Out About Twitter and Facebook, Study Shows,
CITIZEN MEDIA LAW PROJECT, (Aug. 10, 2009), http://www.citmedialaw.org/blog/2009/employers-
are-freaking-out-about-twitter-and-facebook-study-shows.
29. Careful What You Email, Post, Upload and Tweet, supra note 26.
30. Bayard. supra note 28.
31. Crispin v. Christian Audigier. Inc.. 717 F. Supp. 2d 965. at 968 (2010).
138 JOURNAL OF LAW, BUSINESS & ETHICS VOL. 18
injunction in federal court to prevent the defendant from posting any further
criticism or materials online, the plaintiffs also brought claims for defamation, false
light, intentional interference with economic advantage, breach of contract
(including publication of trade secrets), and breach of covenant of good faith. 32
In June 2008, Too Much Media, LLC (TMM), a software company that
services the online adult entertainment business, brought claims in New Jersey state
court for defamation, false light, invasion of privacy, and trade libel against a
Washington-based blogger. TMM sued the blogger after she posted comments on
Oprano.com, an online forum for those in the online adult entertainment industry,
33
regarding a security breach in TMM's software product.
A former employee used company computers to gain access to trade secrets and
then used the information to divert business away from former employer to a new
business entity started by the former employee.
An online "lifestyle publisher" sued its former manager and several other
former employees for, among other claims, copyright infringement,
misappropriation of trade secrets and unfair competition. According to the
complaint, the defendant "made and took possession of unauthorized copies of
electronic information stored on the company's password-protected computers and
servers," including the source code for the websites and trade secrets, which
included contact information for advertising clients.
Target Corporation, the large national retailer, filed a lawsuit for copyright
infringement and misappropriation of trade secrets against an initially unknown
Internet user with the "handle" (online pseudonym) "Target Sucks." Based on the
information it received by subpoenaing internet service providers, Target identified
the user as Charles Emmerson William Harris and claimed he posted in-house
Target Corporate information on various retail-employee forums and blogs. Harris
32. Arthur Bright. Deep Blue Marine v. Krajewski, Citizen MEDIA LAW PROJECT. July 30. 2008.,
http://www.citmedialaw.org/threats/deep-blue-marine-v-krajewski (citing Deep Blue Marine v.
Krajewski, No. 2:08-cv-00405-TC (U.S. Dist. filed May 20. 2008)).
33. Citizen Media Law Project, Too Much Media, LLC v. Hale, (April 28, 2009),
http://www.citmedialaw.org/threats/too-much-media-llc-v-hale (citing Too Much Media, LLC v. Hale,
No. L2736-08 (Superior Court of New Jersey, Monmouth County)).
34. Blank, supra note 19, at 491(citing Ameriwood Indus., Inc. v. Liberman, No. 4:06CV524-DJS,
2007 WL 5110313, at I (E.D. Mo. July 3, 2007).
35. Citizen Media Law Project, Hamptons Online v. Florio, (June 16. 2010).
http://www.citmedialaw.org/threats/hamptons-online-v-florio (citing Hamptons Online v. Florio, No.
2:10-cv-01865, Complaint 34 (U.S. Dist. April 27, 2010)).
2012 Online Social Networks and the Workplace 139
allegedly posted Target's "Asset Protection Directives," an in-house theft
prevention manual, on several websites critical of Target, all of which he had
obtained from a recently terminated Target employee.
As these Type 11 cases illustrate, employers have good reason to be
concerned about potential harm to company interests at the hands of their
employees and their use of social media.
A third category of issues arises in cases in which users are adversely
affected by the OSN provider: either directly or via the provider's linkage to a third-
party service provider. These cases we have called Type III and the defining
characteristic of this type of case is found in the actions taken, or not taken, by the
provider itself, and the damage is suffered by the user through no fault of their own.
The facts of the following two cases illustrate the situation.
Facebook/Beacon
36. Citizen Media Law Project, Target Corp. v. Doe, (June 19, 2009),
http://www.citmedialaw.org/threats/target-corp-v-doe (citing Target Corp. v. Doe, No. 1:06-CV-02116-
CC, (U.S. Dist. Sept. 5. 2006)).
37. Class Action Complaint at 5, Lane et al. v. Facebook, Inc. et al., No. 5:08-cv-03845-RS (N.D.
Cal. Aug. 12, 2008).
38. Id. at 27.
140 JOURNAL OF LAW. BUSINESS & ETHICS VOL. 18
that he purchased a ring. Sean, like the other plaintiffs in the resulting class action,
39
had not given his consent for this information to be sent out via Facebook.
This case ended in a settlement agreement, in which Facebook agreed to
completely terminate the Beacon program, to pay $9.5 million to fund a to-be-
established nonprofit Privacy Foundation, to compensate plaintiffs, and to pay
40
attorneys fees and costs.
Facebook founder Mark Zuckerberg later acknowledged that the Beacon
program was a mistake that damaged the reputation of his company, and that "We
didn't react quickly enough because we were just so used to people complaining
about [privacy] things and then eventually being right."4
More recently, in 2010, Facebook instituted another innovation: this time,
the new feature was more descriptively named "Like." Accompanied by a simple
"Thumbs up" icon, the "Like" feature enables Facebook users to click on the icon
whenever and wherever it appears on the screen (usually following a story).
Whenever a user clicks on "Like", the action is recorded in the Facebook database.
When a large number of users click on the same "Like," the aggregated total can be
compared with other "Likes," and those posted articles or photos that generate
higher "Like" totals trigger a number of consequential actions. One of those actions
is the showing of ads to a user's "Friends" which contain actual posts by those
friends as part of the ad itself.
According to one industry observer, "Like" is deceptively similar to
Beacon:
Facebook is not the only company to have become a litigation target. In 2009 a
similar case was filed against another online social network provider, "Tagged,
Inc.," a smaller and less well-known San Francisco-based social networking site
that claimed to have some 80 million members. In their complaint, plaintiffs
alleged violations of federal and California state statutes, as well as unjust
enrichment.
The complaint focused on the way in which Tagged "harvested" the
contents of the email address books of its member users without their knowledge or
consent and then sent out unsolicited commercial email messages to the harvested
email addresses disguised as personal emails from actual acquaintances.4 5 The
solicitation invited recipients to open the email and click on a link to see some
photos. But clicking the link did not lead to the promised photos alone, it also
automatically registered the unwitting friend as another Tagged member, thereby
setting up another iteration of the misrepresentation and another round of
unsolicited emails.46
Like the Facebook/Beacon, the Tagged case resulted in a settlement
agreement. Tagged was ordered to purge its database of all harvested email
addresses, to provide Tagged members with a clear and conspicuous manner for
cancelling their accounts, to provide third-party verification of compliance with
these measures, to pay each named plaintiff $10,000 and to pay plaintiffs
attorneys' fees and costs.
Type III cases illustrate another significant point: Facebook users may not
fully understand their relationship with the company that provides the online social
network service. Users are not Facebook's customers, rather, the users' identity
and personal information is what Facebook sells to its real customers, its
advertisers. In actual practice, the users are the product.
43. Complaint at 2, 4, Slater et al. v. Tagged, Inc. et al. No. CV 093697 (N.D. Cal. filed Aug 12,
2009).
44. Id. at 1-2.
45. Id. at 2.
46. Id. at 4-5.
47. Principle Terms of Settlement Agreement, Slater et al. v. Tagged, Inc. et al. No. CV 093697
(N.D. Cal. Jan. 7. 2010).
142 JOURNAL OF LAW, BUSINESS & ETHICS VOL. 18
employee's use of online social networks (Type 11 cases), and injuries caused to the
user by the online social network (Type III cases).
The different legal theories for recovery are wide-ranging but also
piecemeal, with some remedies originating in broad and well-recognized common
law principles, and others enacted seriatim through specific pieces of legislation,
each one targeted at a particular issue. The resulting legal landscape is a complex
patchwork, with no central organizational or operational framework.
State Law
Under the common law of torts, the list of available legal theories of
recovery includes defamation, wrongful disclosure of confidential information or
trade secrets, and invasion of privacy.
In the employment law area, cases have been styled as wrongful
termination or wrongful discharge suits. Sometimes in an at-will employment
situation, plaintiffs also rely on exceptions to the general at-will doctrine, including:
an implied or express contract; implied covenant of good faith and fair dealing; or a
violation of public policy, such as a violation of free speech or an invasion of
privacy.
State statutory protections include, among others, off-duty statutes, which
protect certain activities, including the use of lawful consumable products while not
at work.
Common law contractual remedies have been the basis for some cases that
have been based on alleged violations of Terms of Service agreements between
users and website operators.
In the next section, we examine each of these legal theories in more detail.
Defamation
Under the common law tort of defamation, employers could incur liability for
defamatory remarks posted by employees or "friends" on the employer's online
social network. Pursuant to the doctrine of Respondeat Superior, employers may
be liable if the employee makes defamatory statements on the employer's online
social network while acting within the course and scope of employment.
This scenario raises two issues: (1) whether an employee's posts are indeed
created while acting within course and scope of employment and (2) what level of
control an employer had over access to the site for editing/posting comments? 48
Employers' liability also could arise from a defamatory statement posted
by a well-meaning "overzealous company cheerleader," on a blog that identifies his
employer, "promoting the company's products or services at the expense of
defaming the company's competitors."
48. Gundars Kaupins & Susan Park. Legal and Ethical Implicationsof CorporateSocial Networks,
22 Employee Responsibilities and Rights Journal 79 (2010).
49. Scott R. Grubman, Note. Think Twice Before You Type: Blogging Your Way to
Unemployment, 42 GA. L. REV. 615. 628. 623 (2008).
2012 Online Social Networks and the Workplace 143
Disclosure of Confidential Information/Trade Secrets
57. Ian Byrnside, Six Clicks of Separation: The Legal Ramifications of Employers Using Social
Networking Sites to Research Applicants, 10 VAND. J. ENT. & TECH. L. 445, 461 (2008).
58. Id. (quoting Martha Irvine, When MySpace Become's Everyone's Space, Globe & Mail
(Toronto), Dec. 30, 2006, at R12).
59. Id. at 462 (quoting George's Employment Blawg, Employer's Using Facebook for
Background Checking. Part I, http://www.collegerecruiter.com/weblog/archives/2006/09/employers
using.php (last visited Dec. 5, 2006)).
60. Grubman. supra note 49, at 626 (citing Rafael Gely & Leonard Bierman. Workplace Blogs and
Workers'Privacy,66 LA. L. REV. 1079, 1091 (2006)).
61. Id. at 628 (quoting Charles Muhl, The Employment-at Will Doctrine: Three Major Exceptions,
MONTHLY LAB. REV., Jan. 2001, at 7).
2012 Online Social Networks and the Workplace 145
62
contract may exist. If there is a handbook and it does not address employee
63
actions while online, there may be inadequate grounds for termination.
According to various court decisions, an employee is not considered an at-
will employee if an express or implied contract with the employee was formed by
64
the employer. In this situation, an employer may be liable for wrongful
termination if the employee is fired for posting an item on the employer's OSN site
that is not found to be contrary to the employer's interest and/or is unrelated to the
65
employee's work.
62. Id.
63. See id. at 628-629.
64. Kaupins & Park. supra note 48.
65. Id.
66. Grubman, Supra note 49, at 627 (quoting Gregory S. Fischer, A Brief Analysis of After-
Acquired Evidence in Employment Cases: A Proposed Model for Alaska (and Points South), 17
ALASKA L. REv. 271. 282 (2000)).
67. Id. at 628.
68. Pietrylo, 2008 U.S. Dist. LEXIS 108834, at 14 (citing Pierce v. Ortho Pharm. Corp., 417 A.2d
505 (N.J. 1980)).
146 JOURNAL OF LAw, BUSINESS & ETHICS VOL. 18
fired and, according to some courts, the termination must implicate more than just
private interests of the parties.69
69. Id. at 14 (citing DeVries v. McNeil Consumer Prod. Co.. 250 N.J. Super. 159, 593 A.2d 819
(App. Div. 1991)).
70. Id. at 14 (citing American Mfrs. Mut. Ins. Co. v. Sullivan, 526 U.S. 40, 49-50 (1999)).
71. Id. at 15 (citing Azzaro v. County of Allegheny, 110 F.3d 968, 976 (3d Cir. 1997)).
72. Id. at 15 (citing Curinga v. City of Clairton, 357 F.3d 305, 310-11 (3d Cir. 2004)).
73. Id. at 16 (citing Connick v. Myers. 461 U.S. 138. 146, 103 S.Ct. 1684 (1983)).
74. Pietryo, 2008 U.S. Dist. LEXIS 108834, at 16 (citing Baldassare v. New Jersey, 250 F.3d 188,
195 (3d Cir. 2001)).
75. Id. at 16 (citing Baldassare v. New Jersey, 250 F.3d 188, 195 (3d Cir. 2001)).
76. Id. at 17, 18 (citing Hennessy v. Coastal Eagle Point Oil Co.. 129 N.J. 81. 609 A.2d 11(1992),
Borse v. Pierce. 963 F.2d 611, 628 (3d. Cir. 1992)).
2012 Online Social Networks and the Workplace 147
violation of a public policy favoring freedom of speech; and a violation of a public
policy against the invasion of privacy. 7 Because there was an issue of material fact
on the counts involving an invasion of privacy both the tort and public policy
claims, plaintiffs survived a motion for summary judgment. However, on the count
for a violation of a public policy favoring freedom of speech, summary judgment
was granted because plaintiffs could not show that the speech in question was a
"matter of public concern."78
California
77. Pietrylo v. Hillstone Rest. Grp., No. 06- 5754 (FSH), 2008 U.S. Dist. LEXIS 108834 (D.N.J.
July 25, 2008).
78. Id.
79. John S. Hong. Can Blogging and Employment Co-Exist?41 U.S.F.L.
REV. 445, 461 (2007).
80. Id. at 461 n.88 (citing Rafael Gely & Leonard Bierman, Workplace Blogs and Workers'
Privacy,66 LA. L. REV. 1079, 1099 (2006)).
81. CAL. LAB CODE § 96(k) (West 2003).
82. Robert Sprague. Emerging Technology and Employee Privacy. Rethinking Information
Privacy in an Age of Online Transparency, 25 HOFSTRA LAB. & EMP. L.J. 395, 413 (2008) (quoting
CAL. LAB. CODE § 96(k) (West 2003)).
148 JOURNAL OF LAW, BUSINESS & ETHICS VOL. 18
Colorado
Connecticut
New York
A New York labor law statute bans" employers from discriminating against
employees on the basis of their legal political activities, legal use of consumable
products, and legal recreational activities." 92 However, those activities must be
"off-site, during non-work hours and without the use of employer's property."93
The protection offered by the law specifically prohibits activity which "creates a
material conflict of interest related to the employer's trade secrets, proprietary
information or other proprietary or business interest." 94 Note that the term "legal
recreational activities" does not include romantic relationships or extramarital
North Dakota
Facebook: "You understand that... the Service and Site are available for
your personal, non-commercial use only." 99
MySpace: "The MySpace Services are for the personal use of Members
only and may not be used in connection with any commercial endeavors except
those that are specifically endorsed or approved by MySpace.com." 100
Employers that engage in checking online social network profiles for the
purpose of making employment decisions may commit a direct violation of terms of
101
service by using the service for commercial purposes. Nevertheless, the practice
is widespread, and Facebook has taken the position that employers doing
95. Sprague, supra note 82, at 414 (citing McCavitt v. Swiss Reinsurance Am. Corp., 237 F.3d
166. 168 (2d. Cir. 2001)).
96. Id. at 415 (quoting Cavanaugh v. Doherty, 675 N.Y.S.2d 143, 149 (App. Div. 1998)).
97. Id. (quoting N.D. CENT. CODE § 12-02.4-03 (2004)).
98. Id. (quoting Hougum v. Valley Mem'1 Homes, 574 N.W.2d 812, 820-821 (N.D. 1998)).
99. Byrnside, supra note 57. at 466 (quoting Facebook.com, Terms of Use,
http://www.facebook.com/terms.php).
100. Id. at 466 (quoting MySpace. Com, Terms of Use Agreement,
http://www.myspace.com/Modules/Common/Pages/TermsConditions.aspx).
101. Id.at466.
150 JOURNAL OF LAW, BUSINESS & ETHICS VOL. 18
background checks do not violate the terms of service if the person conducting the
background check is a reFistered Facebook user and is not violating privacy settings
of applicant/employee.10
Arguably, a clearer violation would occur if an employer gained access to
the site by fraudulently misrepresenting their affiliation to the user or the website,
by threatening or coercing employees into disclosing their 1Rasswords or access
codes, or by using another's account to investigate applicants.
Federal Law
102. Id.
103. See id. at 466. 467; sea, e.g., Pietrylo v. Hillstone Rest. Grp., No. 06- 5754 (FSH), 2008 U.S.
Dist. LEXIS 108834 (D.N.J. July 25. 2008).
104. Electronic Communications Privacy Act (ECPA), Pub.L. No. 99-508, 100 Stat. 1848 (1986).
105. Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 874 (9th Cir. 2002) (citing Electronic
Communications Privacy Act (ECPA), Pub.L. No. 99-508, 100 Stat. 1848 (1986)). The Wiretap Act
and SCA have since been amended by the Uniting and Strengthening America by Providing
Appropriate Tools Required to Intercept and Obstruct Terrorism Act (USA PATRIOT Act, Pub.L. No.
107-56, 115 Stat. 272 (October 26, 2001)).
106. Wiretap Act. 18 U.S.C. §§ 2510-2522 (2004).
107. The Stored Communications Act (SCA), 18 U.S.C. §§ 2701-2711 (2003).
108. Konop, 302 F.3d at 874.
2012 Online Social Networks and the Workplace 151
anyone, including an employer, of wire, oral, or electronic communications is
unlawful and a federal crime.109 However, there are statutory exceptions for
"business use in the ordinary course of business," "providers of communication
systems," and "consent." 1 0
Although case law so far primarily focuses on interpreting the interception
of telephone conversations, it is useful to consider because it is likely to be
similarly applied to electronic communications.1 I For instance, in Fischer v. Mt.
Olive Lutheran Church,112 Fischer, an employee, claimed that an employer
eavesdropped on personal telephone conversations, allegedly of an explicit, sexual
nature, made on a work telephone. Fischer claimed Mt. Olive violated Title I of the
113
ECPA. As a defense, Mt. Olive asserted the business use exception, which
would permit the telephone conversation interception as long as it was in the
"ordinary course of its business," on the basis that the conversations may have
114
included counseling and been part of the minister's job function. Fischer's claim
survived summary judgment when the court held that his "telephone conversation
was not in the ordinary course of business because it was not a business call and
monitoring a personal call was not justified by valid business concerns."115
Also, in Sanders v. Robert Bosch Corp., the court held that, in spite of
bomb threats to the security office of Bosch, the taping of security guards' phone
calls was not covered by the business-use exception. The court reasoned that the
security guards could have been informed of the recording and it did not further the
security office's business.11
Title 11 of the ECPA created the Stored Communications Act (SCA), which
was intended to "address access to stored wire and electronic communications and
transactional records."" 8 The SCA makes it unlawful and a federal crime for
anyone to "access" without "authorization", or in excess of authorization, a "facility
providing electronic communication services and thereby obtaining access to a wire
or electronic communication while it is in electronic storage."1 19 Title 11 includes
exceptions for "providers of communications" 12 0 and "conduct authorized . . . by a
109. Gail Lasprogata, Nancy J. King & Sukanya Pillay. Regulation of Electronic Employee
Monitoring: Identifying Fundamental Principles of Employee Privacy Through a Comparative Study of
Data Privacy Legislation In the European Union, United States, and Canada, 2004 STAN. TECH. L.
REV. 4, 72 (2005) (citing The Wiretap Act. 18 U.S.C. §§ 2510-2522 (2004)).
110. Id. at 73.
111. Laura Evans, Monitoring Technology in the American Workplace: Would Adopting English
Privacy Standards Better Balance Employee Privacy and Productivity, 95
CALIF. L. REV. 1115. 1124
(2007).
112. Fisher v. Mt. Olive Lutheran Church. 207 F. Supp. 2d 914 (W.D. Wis. 2002).
113. Lasprogata. supranote 109, at 75 (citing Fisher, 207 F. Supp. 2d at 922-923).
114. Id.
115. Id. at 75 n.223 (citing Fisher, 207 F. Supp. 2d at 923).
116. Sanders v. Robert Bosch Corp., 38 F.3d 736 (4th Cir. 1994).
117. Evans, supra note 111, at 1124 (citing Sanders, 38 F.3d at 738, 740).
118. Konop v. Hawaiian Airlines, Inc., 302 F.3d 868. 874 (9th Cir. 2002) (citing S.Rep. No. 99-
541. at 3 (1986). reprinted in 1986 U.S.C.C.A.N. 3555. 3557).
119. Lasprogata, supra note 109, at 72 (citing The Stored Communications Act (SCA), 18 U.S.C §§
2701-2711 (2003)).
120. Id. at 73.
152 JOURNAL OF LAW, BUSINESS & ETHICS VOL. 18
user of that service with respect to a communication intended for that user."' 21 A
common issue with SCA cases is the question of whether the user gave consent
"authorizing" that person to access the communications and, further, whether that
122
consent was freely given or given under duress. There has been no guidance
123
from Congress on the definition of "conduct authorized" and federal courts have
equated "consent" under the Wiretap Act with "authorization" under Stored
Communications Act.124
Konop v. Hawaiian Airlines is one of the few cases to involve electronic
communications and claims of both Title I and Title II violations. Among other
allegations, Robert Konop, a pilot, alleged that Hawaiian Airlines, his employer,
accessed his personal website by using the passwords of other pilots. 26 In
upholding a lower court's dismissal of Konop's Title I claims, the court held that
the unauthorized access of Konop's private, secured website by Hawaiian Airlines
was not an "unlawful interception of an electronic communication while it was in
,127
transit." Under Title I of the ECPA, an "interception" of an electronic
communication is only prohibited when it occurs while the communication is in
128
transit. In terms of Konop's Title 11 claims, the court held that Hawaiian Airlines
may have violated Title II, the SCA, because the two pilots whose passwords
Hawaiian Airlines managers used may not have actually used the website;129 the
130
pilots were effectively not "users" who could authorize access.
Whistle Blowing
The U.S. Department of Labor through the Occupational Safety and Health
Administration (OSHA) provides overall protection for federal workers via the
Office of the Whistleblower Protection Program. The office administers a total of
twenty-one different statutes affecting the rights of workers in numerous industries.
121. Pietrylo v. Hillstone Restaurant Grp., 2008 U.S. Dist. LEXIS 108834, at *8 (D.N.J. July 25.
2008) (quoting 18 U.S.C. § 2701(c)(2)).
122. Id.at*10.
123. Konop, 302 F.3d at 880.
124. Pietrylo, 2008 U.S. Dist. LEXIS 108834, at *9 (citing In re DoubleClick, Inc. v. Privacy
Litigation, 154 F.Supp. 2d 497, 514 (S.D.N.Y. 2001)).
125. Konop, 302 F.3d at 874 (9th Cir. 2002).
126. Evans, supra note Ill, at 1125 (citing Konop, 302 F.3d at 872).
127. Lasprogata, supra note 109, at 77 n.228 (citing Konop, 302 F.3d at 876-879).
128. Id. at 77.
129. Evans. supra note 111, at 1125.
130. Lasprogata. supra note 109, at 76 n.227 (citing Konop, 302 F.3d at 879-880).
2012 Online Social Networks and the Workplace 153
safety, health care reform, nuclear, pipeline, public transportation agency,
railroad, maritime and securities laws.
131. TheoWhistleblower Protection Program, THE U.S. DEPT. OF LABOR (July 16. 2011)
http://www.whistleblowers.gov; Asbestos Hazard Emergency Response Act (AHERA). 15 U.S.C. §
2651; Clean Air Act (CAA), 42 U.S.C. § 7622; Comprehensive Envtl. Response, Comp. & Liab. Act
(CERCLA), 42 U.S.C. § 9610: Consumer Fin. Prot. Act of 2010 (CFPA), Section 1057 of the Dodd-
Frank Wall St. Reform and Consumer Prot. Act of 2010, 12 U.S.C.A. § 5567; Consumer Prod. Safety
Improvement Act (CPSIA). 15 U.S.C. § 2087; Energy Reorganization Act (ERA). 42 U.S.C. § 5851;
Fed. R.R. Safety Act (FRSA), 49 U.S.C. § 20109; Fed. Water Pollution Control Act (FWPCA), 33
U.S.C. § 1367; Int'l Safe Container Act (ISCA), 46 U.S.C. § 80507; Nat'l Transit Sys. Sec. Act
(NTSSA), 6 U.S.C. § 1142; Section I1(c) of the Occupational Safety & Health Act, 29 U.S.C. § 660;
Pipeline Safety Improvement Act (PSIA), 49 U.S.C. § 60129: Safe Drinking Water Act (SDWA), 42
U.S.C. § 300j-9(i); Sarbanes-Oxley Act (SOX), 18 U.S.C.A. § 1514; Seaman's Prot. Act, 46 U.S.C. §
2114 (SPA), as amended by Section 611 of the Coast Guard Auth. Act of 2010, P.L. 111-281; Solid
Waste Disposal Act (SWDA), 42 U.S.C. § 6971; Surface Transp. Assistance Act (STAA), 49 U.S.C. §
31105; Wendell H. Ford Aviation nv. & Reform Act for the 21st Century (AIR21), 49 U.S.C. § 42121;
Section 1558 of the Affordable Care Act (ACA), P.L. 111-148; Amendments to SOX, enacted July 21,
2010 - Sections 922 and 929A of the Dodd Frank Act (DFA); Section 402 of the FDA Food Safety
Modernization Act (FSMA), P.L. 111-353; Surface Transportation Assistance Act (STAA), 49 U.S.C.
§31105: Toxic Substances Control Act (TSCA), 15 U.S.C. §2622.
132. Sarbanes-Oxley Act of 2002. Pub. L. No. 107-204 § 1. 116 Stat. 745 (codified in scattered
sections of 11, 15, 18, 28, and 29 U.S.C.).
133. Grubman, Supra note 49, at 645 (quoting Sarbanes-Oxley Act § 806; 18 U.S.C. § 1514A(a)
(Supp. 2002).
134. Id. at 645.
154 JOURNAL OF LAW, BUSINESS & ETHICS VOL. 18
Labor Relations
Discrimination
Under Title VII of the 1964 Civil Rights Act,145 employers cannot "fail or
refuse to hire or to discharge any individual, or otherwise to discriminate against
any individual with respect to his compensation, terms, conditions, or privileges of
employment, because of such individual's race, color, religion, sex, or national
,,46
origin."
While many employers do not ask job applicants specific questions about
religion, national origin, or race in the formal application process, employers can
and increasingly do use social media to find out more about applicants online.' 4
Through this informal process, it is possible for employers to ferret out information
about an applicant that is not in accord with the intent of Title VII, and it is of
course possible for employers to make decisions about employment based on such
information. Employment decisions made in this manner may in fact discriminate
(ADEA), although neither Act contains provisions relating specifically to the use
of information about the applicant which has been made public by the applicant or
by others.
The Americans with Disabilities Act (ADA) prohibits discrimination in
employment decisions against "an individual with a disability who, with or without
reasonable accommodation, can perform the essential functions of the employment
position that such individual holds or desires." 59 In addition to broadly prohibiting
160
questions directly or indirectly related to a disability, employers are also
prohibited by the ADA from questioning applicants regarding the "existence or
161
nature" of possible disabilities. The ADA does not specifically address the
situation in which information about the disability might be found via the
applicant's own online postings, or information about the applicant posted online
by others.
According to the Age Discrimination in Employment Act (ADEA), it is
against the law for an employer "to fail or refuse to hire or to discharge any
individual or otherwise discriminate against any individual . .. because of such
162
individual's age." Again, the ADEA does not specifically address the situation in
which information about the applicant's age might be found via the applicant's own
online postings, or information about the applicant posted online by others.
The greater role that a [OSN] user plays in publishing the information, the
more likely it is that courts will view the user as an original publisher....
The most obvious scenario in which the [OSN] user could enjoy immunity
would be if a third party posted defamatory statements in the user's
"Comments" section. In this case, the user would have republished the
statements in a completely passive manner, much like the AOL and
169
CompuServe 'republish' statements made on their forums.
174. Byrnside, supra note 57, at 450 (quoting 15 U.S.C. § 1681d (1994)).
175. 18 U.S.C. § 1030 (2000 & Supp. 2002).
176. Byrnside, supra note 57, at 468 (quoting George's Employment Blawg, Employer's Using
Facebook for Background Checking, Part 1, http://www.collegerecruiter
.com/weblog/archives/2006/09/employers using.php (last visited Dec. 5, 2006)).
177. Byrnside, supra note 57. at 468 (citing 18 U.S.C. § 1030).
178. Id. at 468 (citing 18 U.S.C. § 1030).
179. 18 U.S.C. §§ 1831-1839 (2000 & Supp. 2002).
180. Grubman, supra note 49, at 621 (quoting 18 U.S.C. § 1832(a)).
181. Id. at 621 (quoting 18 U.S.C. § 1832(a)).
182. Id. at 621 (citing 18 U.S.C. § 1832(a)).
160 JOURNAL OF LAW, BUSINESS & ETHICS VOL. 18
Securities and Exchange Commission (SEC) Rule 10b-5
Under SEC Rule 1Ob-5,1 83 it is unlawful for an individual "to make any
untrue statement of material fact or to omit to state a material fact necessary in
order to make the statements made, in the light of the circumstances under which
they were made, not misleading."
If, when the stock price is fluctuating, an employee discloses material
nonpublic information on an online social network, the employee may subject their
employer to suit under the SEC Rule 1Ob-5.185
190. Staff Discussion Draft, H.R. Res. , 11Ith Cong. (2010). According to the Boucher Privacy
Discussion Draft Executive Summary, the Boucher bill contained the following key provisions:
Disclosure of privacV practices: Any company that collects personally identifiable information about
individuals must conspicuously display a clearly-written, understandable privacy policy that explains
how information about individuals is collected, used and disclosed.
Collection and use of information: As a general rule, companies may collect information about
individuals unless an individual affirmatively opts out of that collection. Opt-out consent also applies
when a website relies upon services delivered by another party to effectuate a first party transaction,
such as the serving of ads on that website.
No consent is required to collect and use operational or transactional data-the routine web logs or
session cookies that are necessary for the functioning of the website-or to use aggregate data or data
that has been rendered anonymous.
Companies need an individual's express opt-in consent to knowingly collect sensitive information
about an individual, including information that relates to an individual's medical records, financial
accounts, Social Security number, sexual orientation, government-issued identifiers and precise
geographic location information.
Disclosure of information to unaff iliated parties: An individual has a reasonable expectation that a
company will not share that person's information with unrelated third parties. If a company wants to
share an individual's personally-identifiable information with unaffiliated third parties other than for an
operational or transactional purpose, the individual must grant affirmative permission for that sharing.
Many websites work with third-party advertising networks, which collect information about a person or
an IP address from numerous websites, create a profile and target ads based on that profile. The bill
creates an exception to the opt-in consent requirement for third-party information sharing by applying
opt-out consent to the sharing of an individual's information with a third-party ad network if there is a
clear, easy-to-find link to a webpage for the ad network that allows a person to edit his or her profile,
and if he chooses, to opt out of having a profile. provided that the ad network does not share the
individual's information with anyone else.
Implementation and enforcement: The Federal Trade Commission would adopt rules to implement
and enforce the measure. States may also enforce the FTC's rules through State attorneys general or
State consumer protection agencies.
191. Kerry Monroe. Stearns is Reworking Draft Boucher-Stearns Online Privacy Bill,
INSIDEPRIVACY (Jan. 21, 2011), http://www.insideprivacy.com/united-states/steams-is-reworking-
draft-boucher-stearns-online-privacy-bill/.
162 JOURNAL OF LAW, BUSINESS & ETHICS VOL. 18
Edward Markey (D-MA) and Joe Barton (R-TX), Co-Chairmen of the House Bi-
Partisan Privacy Caucus, stated that they planned "to convene a Caucus hearing to
discuss industry practices as they relate to online privacy."192 According to one
political observer:
"Anyone with ten minutes, $25 and a Facebook user's phone number and
address and no other information can obtain a breathtaking amount of
information about that Facebook user - and that Facebook user's family,
friends, neighbors and landlord," the senators wrote. "Combined with a
targeted Google search, these two pieces of information can allow someone
to obtain almost all of the information necessary to complete a loan or
credit card application. It is hard to contemplate all the different ways in
which this information could be abused."194
192. Josephine Liu, Congressional Scrutiny of Privacy Issues Likely to Continue, INSIDEPRIVACY
(March 18, 2011), http://www.insideprivacy.com/united-states/congress/congressional-scrutiny-of-
privacy-issues-likely-to-continue/.
193. Erin Egan, Privacy Bills Begin Dropping in Congress; More to Follow, INSIDEPRIVACY (Feb.
18, 2011), http://www.insideprivacy.com/united-states/congress/privacy-bills-begin-dropping-in-
congress-more-to-follow/.
194. Sens. Franken, Schumer, Whitehouse, Blumenthal Warn New Facebook Plan May Reveal
Sensitive User Information, Increasing Risk For Fraud, Theft And Abuse: Senators Ask Zuckerberg to
Block Third Parties' Easy Access to Users' Mobile Phone and Home Address Information, AL
FRANKEN, U.S. SENATOR FOR MINNESOTA, http://franken.senate.gov/?p=press release&id=1374.
195. Jennifer Valentino-Devries & Emily Steel, White House to Push Privacy Bill,
WALL STREET JOURNAL (March 16, 2011),
http://online.wsj.com/article/SB10001424052748704662604576202971768984598.html?mod=WSJ hp
2012 Online Social Networks and the Workplace 163
Meanwhile, Facebook itself is reportedly quite aware of the looming
prospect of new federal laws and regulations targeted at its operations. The
company has already taken strategic steps to protect its interests by ramping up its
"executive, legal, policy, and communications ranks with high-powered politics
from both parties, beefing up its firepower for battles in Washington and beyond."
196
IMPLICATIONS
LEFTWhatsNewsCollection.
196. Miguel Helft & Matt Richtel, Facebook Prepares to Add Friends in Washington, NEW YORK
TIMES (March 29, 2011). http://www.nytimes.com/2011/03/29/technology/29facebook.html.
197. Brian Solis, 21 Twitter Tips From Socially Sawy Companies FAST COMPANY (April 23.
2010), http://www.fastcompany.com/article/21 -twitter-tips-from-socially-savvy-
companies?page=0%2C4. For example, Zappos, Dell, and Starbucks all report success via use of social
media.
164 JOURNAL OF LAw, BUSINESS & ETHICS VOL. 18
The following proposed checklist of social media policies, compiled from a
198
number of sources, covers both restrictive and moderate approaches.
A Restrictive Approach
Employers should:
198. Daliah Saper, Saper Law Offices, Presentation: The Legal Implications of Social Media
(transcript available athttp://www.saperlaw.com).
199. How to Bypass a Firewall or Internet Filter WIKIHOW.COM
http://www.wikihow.com/Bypass-a-Firewall-or-Internet-Filter (last visited May 27, 2011).
2012 Online Social Networks and the Workplace 165
AModerate Approach
Employers should:
* Keep in mind that employees may have a legal right to post online
comments, even unfavorable comments, about their employer.
Recently, a terminated employee sued following her termination
for making vulgar comments on Facebook about her supervisor.
The National Labor Relations Board found that "Facebook posts
are legally protected speech, even for employees who write
negative things about their employers," and that "company social
media policies that prohibit making negative remarks about one's
CONCLUSION
compliance with federal legal requirements will require considerable attention and
effort on the part of social network providers as well as from employers who seek
to keep workplace policies up to date.
Technological advances205 will no doubt continue to outpace the law and
company policies on social media. Therefore, the best company policies will be
those that are based on broad principles and not geared to specific types of
technological devices or systems.
205. What Has Privacy Got to Do with Social Networking?, ACTIANCE (Apr. 8, 2011),
http://blog.actiance.com/2011/04/08/what-has-privacy-got-to-do-with-social-networking/ (For example,
new social networking sites are gaining popularity such as Google+1 which provides some aspects of
privacy by default that differ significantly from Facebook's approach).
168
+(,121/,1(
Citation:
Maneela, Cyber Crimes: The Indian Legal Scenario, 11
US-China L. Rev. 570 (2014)
Copyright Information
Dr., Department of Law, D.A.V. (P.G.) College, Muzaffarnagar (U.P.), C.C.S. University, Merrut
(U.P.), India. Research fields: Labour Laws and Cyber Laws.
570
2014 THE INDIAN LEGAL SCENARIO 571
INTRODUCTION
Since, the independence of India, i.e., August 15th, 1947, it has been
struggling through to make its stand in the world. Many new technologies
were brought and many new are still to be found. One such revolution was
brought about by the introduction of the Internet, which is considered as the
pool of knowledge. But who could think of the time when this rich source of
knowledge will be misused for criminal activities.
There are many such disturbing activities that occurred in past and
demanded for some rules and regulations urgently, some set definite
patterns that can be put forward while carrying out any business transaction
over the net, ranging from simple friendly e-mail to carrying out the whole
set of work, without which it may go wild and beyond control and it can be
used as a tool for the destruction of mankind. New forms and manifestations
of cyber crimes are emerging every day. Therefore, to control cyber crimes
new legislative mechanisms are required.
The largest challenge to the law is to keep pace with technology. The
march of technology demands the enactment of newer legislation both to
regulate the technology and also to facilitate its growth. It was at this point
of time that the government of India felt the need to enact the relevant cyber
laws which can regulate the Internet in India. Internet and cyberspace need
to be regulated and a regulated cyberspace would be the catalyst for the
future progress of mankind. Here lay the seeds of origin of cyber law in
India.
This research paper is an honest attempt to examine the cyber crimes
and their impact on the present legal scenario in India. Part I of this research
paper summarizes Actus Reus in cyber crimes, Part II explains mens rea in
cyber crimes, Part III investigates classification of various types of cyber
crimes, Part IV examines comparative scanning of cases registered and
persons arrested under Information Technology Act, Part V deals with
changes brought by the Information Technology (Amendment) Act 2008
and Part VI discusses at length suggestions to tackle cyber crimes.
be termed as a crime can be said to have taken place when a person is:'
(a). trying to make a computer function;
(b). trying to access data stored on a computer or from a computer, which
has access to data stored outside.
There are two vital ingredients for Mens Rea to be applied to a cyber
criminal 2 :
(a). The access intended to be secured must have been unauthorized; and
(b). The offender should have been aware of the same at the time he or she
tried to secure access.
Mens Rea does not enquire into the mental attitude of the wrong doer
but it simply means that the mens rea is judged from the conduct by
applying an objective standard. The act is not judged from the mind of the
wrong-doer, but the mind of the wrong-doer is judged from the acts. An act
which is unlawful can not be excused in law on the ground, that it was
committed with a good motive.
To be guilty of cyber crime in India, a person must act voluntarily and
willfully. For example, a person who deliberately sends Virii online is guilty
of cyber crime but a person who forwards an e-mail without realizing it
contains a virus or spreads a virus when his/her account is hacked is not
guilty. This means that to constitute a cyber crime in India mens-rea is an
essential element along with actus reus. Section 43 (c) read with S/66 amply
clears the above point. S/43 mentions penalty and compensation for damage
to computer, computer system, etc. whereas S/66 mentions punishment and
fine for computer related offences.
NANDAN KAMATH, LAW RELATING TO COMPUTERS, INTERNET & E-COMMERCE 269 (Universal Law
Publishing Co., New Delhi 2000).
2 Ibid.
2014 THE INDIAN LEGAL SCENARIO 573
(b). Online sale of illegal articles
(c). Online gambling
(d). Digital forgery
(e). Cyber defamation
(f). Cyber stalking
(g). Phishing
(h). Cyber terrorism
(i). Cyber conspiracy etc.
These cyber crimes will be discussed one by one. (This list is not
exhaustive)
Money is the most common motive behind all crime. The same is also
true for cyber crime. More and more cyber crimes are being committed for
financial motives rather than for "revenge" or for "fun". There are various
fraudulent schemes envisaged over the Internet from which the criminals
benefit financially. Various Internet frauds include online auctions, Internet
access devices, work-at-home plans, information/adult services,
travel/vacations, advance fee loan, prizes etc. Payment method varies from
credit/debit card to cheque to even sending cash. Financial crimes include
cyber cheating, credit card frauds, money laundering, hacking into bank
servers, computer manipulation, accounting scams etc. Internet offers
certain unique advantages, which no other medium has, like anonymity and
speed. The Internet also offers a global marketplace for consumers and
business. 3 These factors together work up to make up a haven for any
fraudulent activities online.
The IT Act deals with the crimes relating to Internet fraud and online
investment fraud in Sections 43(d), 65 and 66. Under the Indian Penal Code,
Internet fraud would be covered by Sections 415 to 420 which relates to
cheating .4
Internet is being used now to sell articles which otherwise are not
permitted to be sold under the law of a country. This would include sale of
narcotics, weapons and wildlife, pirated software or music and distribution
of data on private persons and organizations etc. by information on websites,
auction websites or simply by using email communication. In December
2004, the CEO of Bazee.com was arrested in connection with sale of a CD
with objectionable material on the website. The CD was also being sold in
the markets in Delhi. The Mumbai City Police and the Delhi Police5 got into
action. The CEO was later released on bail by the Delhi High Court.
Online sale of illegal articles are governed by Section 8 of the Narcotic
Drugs and Psychotropic Substances Act, 1985 which prohibits sale or
purchase of any narcotic drug or psychotropic substance. Section 7 of the
Arms Act, 1959 prohibits sale of any prohibited arms and ammunition,
whereas Section 9B of the Indian Explosive Act, 1884 makes sale of any
explosive an offence. Wild
6
Life (Protection) Act, 1972 prohibits sale of
banned animal products.
C. Online Gambling
D. DigitalForgery
E. Cyber Defamation
This occurs when defamation takes place with the help of computers or
the Internet. In comparison of offline attempt of defamation, online
defamation is more vigorous and effective. Quantitatively, the number of
people a comment defaming a person might reach is gigantic and hence
would effect the reputation of the defamed person much more than would an
ordinary publication. Recently cyber defamation came into highlight, when
fraud profiles of several high politicians (L.K. Advani 13 , Miss Mayawati 14 ,
Dr. Manmohan Singh 15) appeared on the social networking site "Orkut".
Cyber defamation is covered under Section 499 of IPC read with
Section 4 of the IT Act. While Section 499 of IPC provides provision for
defamation, Section 4 of IT Act gives legal recognition to electronic
records. 16
F. Cyber Stalking
10S.K. VERMA & RAMAN MITTAL, LEGAL DIMENSIONS OF CYBER SPACE 235 (ILI Publications, 2004).
11S.C. No-430/2002 (Crime No-545/00).
12 Supra note 4.
13Amar Ujala dated August 29, 2007, Regional Daily Newspaper.
14 Amar Ujala dated August 28, 2007, Regional Daily Newspaper.
15 Amar Ujala dated August 29, 2007, Regional Daily Newspaper.
16 Supra note 4.
576 US-CHINA LAW REVIEW Vol. It: 570
G. Phishing
1' http://www.cybervictims.org.
19Supra note 4.
2014 THE INDIAN LEGAL SCENARIO 577
gain access to the accounts. 20 The term "phishing" is derived from "fishing"
where bait is offered to fish.2 1
The Delhi High Court in the case of NASSCOM v Ajay Sood
elaborated upon the concept of "phishing". The defendants were operating a
placement agency involved in head-hunting and recruitment. In order to
obtain personal data, they could use for purposes of head-hunting, the
defendants composed and sent e-mails to third parties in the name of
NASSCOM. 2 2 The plaintiff had filed the suit inter alia praying for a decree
of permanent injunction restraining the defendants from circulating
fraudulent e-mails purportedly originating from the plaintiff. The court
declared "phishing" on the Internet to be a form of Internet fraud and hence,
an illegal act. This case had a unique bend since it was filed not by the one
who was cheated but by the organization who was being wrongly
represented that is NASSCOM. The court held the act of phishing as passing
off and tarnishing the plaintiff's image.
An alternate form of phishing is by installing malicious code on your
machine without your knowledge and permission. This code works secretly
in the background monitoring all the sites you visit and passwords you type
in. It then passes this information to the identity thieves.
Apart from loosing peace of mind, a victim of phishing is robbed of his
identity. This means the fraudsters have access to all the bank and credit
card information and can make purchases or withdraw cash itself from the
victim's account.
The increasing use of electronic channels for payments has posed a
new security problem for banks. India's largest bank, the State Bank of
India, has reported an attempt at phishing to the Indian Computer
23
Emergency Response Team (CERT-In).
Other banks like HDFC, IDBI, ICICI Bank Home Loans, HSBC,
Standard Chartered, ABN Personal Loans, Bank of India and Kotak
Mahindra have their phishing sites. The site called www.hadfcbank.com is
very much similar to the URL of the actual HDFC Bank's website
www.hdfcbank.com. Similarly, the phishing site for IDBI Bank comes with
an extra i-www.idbiibank.com.
Sections of IPC and IT Act which are applicable
24
to Internet fraud and
online investment fraud covers phishing as well.
20http://www.us.cert.gov.
21Economic Times, June, 2006, National Daily Newspaper.
22119 (2005) DLT 596, 2005 (30) PTC 437 (Del).
23http://infotech.indiatimes.com.
24 Supra note 4.
578 US-CHINA LAW REVIEW Vol. 11: 570
H. Cyber Terrorism
bomb, making new members for terrorist activities, raising funds for
terrorist attacks and other heinous motives. 29 Arizona University's "Dark
Web Project" claims that on Internet 50 crore pages, 10 lakh pictures, 15
thousand videos, 300 forums related to terrorist activities and more than
30,000 terrorist members exist.
In India alone, 300 websites are hacked every month. The majority 30
of
hacked websites are that of govt. organizations, V.I.P.'s and celebrities.
Information Technology Act 2000 completely missed any provision
regarding prevention of Cyber terrorism but IT (Amendment) 31
Act, 2008 has
severely dealt with cyber terrorism under Section 66/F.
L. Cyber Conspiracy
Cyber crimes may be spiralling but the country is grappling with poor
conviction rates in courts. Scanning of data of cases registered and persons
arrested under Information Technology Act bears testimony to this fact. The
following data 35 shows that controlling cyber crimes needs immediate
attention of the authorities at the helm of affairs.
illustration bears testimony to the fact. Offences like Fraud (S/423), Forgery
(S/191) and Counterfeiting (S/464) are registered under IPC.
Cyber Crimes/Cases Registered and Persons Arrested
under Indian Penal Code during 2007-2011
Cases Registered.
*3 2007 E 2008 0 2009 0 2010 ] 2011
300-
259
250-
217
C/1
200-
U 15o
u ri00- e0 79
4 9 41
50- 2
0 0 0 3 0o 3
0
Public Sewant False electronic Destruction of Forgery Criminal Breach of Countefeiting
Offences by/ Against evidence electronic evidence Trust/Fraud
277
129
30c 2s
Jo 01 0 0 1
0j4 4 0 00 0
-ubift.- Of~n
f- n es seeetoni Dsru inof
F,rry -- Bre.ch f co... f--ig
Tru./Fr-d
582 US-CHINA LAW REVIEW Vol. It: 570
A. Main Amendments
It requires cops specially suited and trained to deal with it. Detection of
cyber crimes requires Internet research skills, necessary court orders
including search warrants of premises and electronic surveillance.
The absolutely poor rate of cyber crime conviction in the country has
also not helped the cause of regulating cyber crimes. There have only been
few cyber crime convictions in the whole country, which can be counted on
fingers. There is a need to ensure specialized procedures associated with
expertise manpower for prosecution of cybercrime cases so as to tackle
them on a war footing. Investigators and judges should be sensitized to the
nuances of the system. It must be ensured that the system provides for
stringent punishment of cyber crime and cyber criminals so that the same
acts as a deterrent for others. This is necessary so as to win the faith of the
people in the ability of the system to tackle cyber crime. Special and fast
track courts should be set up to settle cases of cyber crimes expeditiously.
Harmonization of cyber laws across the globe is needed, so that
investigating agencies like Central Bureau of investigation (CBI) have more
teeth for tackling hi-tech crimes. Although the Department of Information
Technology (DIT) has a computer emergency response team (Cert-in) for
assisting the combat efforts of law enforcing agencies, it needs to be
developed further.
Quick response to the Interpol references and bilateral requests, liberal
sharing of forensic technology and more cross-country training exchange
programmes besides timely alert could prove a deterrent against the cyber
menace. Mobile Hi-tech crime detecting units must be established.
Cooperation in investigation from other countries and extradition should be
secured for tackling cyber crime.
Internet security does not seem to be a priority with Indian Internet
companies. On an average, Indian companies spend less than 1% of their
funds on security. This is considerably lower than the worldwide average of
5% and needs to be increased considerably. It requires sincere and effective
efforts in this direction.
CONCLUSION
Copyright Information
ABSTRACT
This paper delineates the legislative response to cyber crime in India with an analysis
of the InformationTechnology (Amendment) Act, 2008 focussing on the new crimes
introduced by the amendment, on the touchstone of cyber crime legislative standards
acrossjurisdictions. Thus, a brief look at the jurisprudentialbasisfor criminalisation
of cyberspace activities has been undertaken, following which, the new crimes have
been examined section-wise. The paper uses the theoretical framework set out in the
first section to probe the various problems that the Amendment Act poses in light of
bad drafting and lack of understanding in the area.
TABLE OF CONTENTS
. INTRODUCTION .................................. 104
II. REGULATION OF CYBERSPACE .......... ............ 105
A. Need for regulation of cyberspace activities ............... 105
B. Need for criminalisation of offences in cyberspace . .......... 106
C. Types of offences to be criminalised.................... 107
III. NEW CRIMES UNDER THE INFORMATION
TECHNOLOGY (AMENDMENT) ACT, 2008 ............. 108
A. An overview of changes under section 66 and 67 . .......... 108
B. Critical analysis of the new offences introduced by
the Amendment Act ......................... ..... 109
C. The Void for Vagueness Doctrine ............... ...... 118
IV CONCLUSION ........................ ................ 119
The author is a fourth year student at the National Law School of India University, Bangalore. He
may be contacted at mohanty.amlan@gmail.com.
104 THE INDIAN JOURNAL OF LAW AND TECHNOLOGY [Vol, 7
I. INTRODUCTION
The Bill was passed by the Rajya Sabha on December 23, 2008, and received
Presidential assent in early 2009. However, even after this, the Act did not
come into force until October 26, 2009, when it was notified by the Central
Government. The Act though passed in such a rush did not come into effect
until a year later. This time could have been used to discuss the Bill and address
the various problems with it.
This essay looks at the new offences introduced by the Amendment Act as
a legislative response to the increasing threat of cyber crime in India today, and
analyses these offences in light of similar provisions in other jurisdictions. The
essay first looks at the jurisprudential basis for criminalisation of activities over
the internet. In this section, the essay looks at self-regulation as an adequate
means ot policing the internet and whether government intervention and
criminalisation of cyberspace activities isnecessary. The section concludes with
a brief framework which is used in the analysis of the provisions in the rest of
the essay. Various new offences introduced by the Act have then been studied
section-wise, using the framework as explained in the first section. The scope
of this essay is thus limited to the new crimes introduced by the amendment
and determining the adequacy of the legislative response to the growing need
Pavan Duggal, IT Act Amendments - Perspectives by Mr. Pavan Duggal, CYBERLAWS.NET, http://
www.cyberlaws.net/new/pd-onITAinendnents.php (last visited Jan. 23, 2010).
Karen M. Sanaro & Christyne Ferri, India's New Information Technology Law Impacts Outsourcing
Transactions, ST. B GA.,June, 2009, http://www.technologybar.org/2009/06/indias-new-information-
technology- law- impacts-outsourcing- transactions/ (last visited Jan. 23, 2010).
Press Release, Ministry of Communications & Information Technology (October 27, 2009),
PIB.NIC.IN, http://pib.nic.in/release/release.asp?relid= 53617 (last visited Jan. 23, 2010).
2011] AMLAN MOHANTY 105
for a legislation that brings within its fold emerging forms of cyber crime. The
essay concludes by looking at the various problems that the Amendment Act
poses in light of bad drafting and lack of understanding in this area.
Entrusting the internet community with the power to create legal rules and
institutions will overcome inherent difficulties associated with geographical
determinacy and territorial enforcement and evolve into a mechanism to govern
a wide range of new phenomena that have no clear parallel in the non-virtual
world,6 thus saving the legislature the time and energy to draft laws to deal with
such situations. The proponents of self-regulation draw credibility from their claim
that State laws enacted to deal with cyberspace activities have been unsuccessful,
and that existing laws and methods of lawmaking are inadequate,' and so, the
internet should be self-regulated. The underlying principle entrenched in these
views is that cyberspace is the antithesis of regulations and the impracticalities of
regulation by external forces including law enforcement forces are too compelling
to make such an attempt. The dispensability of government intervention is
intimately twined with the complicated nature of social relationships in cyberspace,
wherein criminal acts are reprimanded by third party Internet users who impose
community defined sanctions on offenders as a form of punishment akin to State
law enforcement mechanisms that seek to penalise the same crimes by utilising
additional State resources with less than desired effects.
6 David R. Johnson & David Post, Law and Borders: The Rise of Law in Cyberspace, 48 (5) STAN. L.
REv. 1367 (May, 1996).
Jason Kay, Sexuality, Live Without A Net: RegulatingObscenity And Indecency On The Global Network,
4CAL. INTERDISCIPLINARY L.J. 355 (1995).
Keith J.Epstein & Bill Tancer, Enforcement of Use Limitations By Internet Services Providers: How To
Stop That Hacker, Cracker, Spammer, Spoofer, Flamer, Bomber, 9 HASTINGS COMM. & ENT. L.J. 661-
664 (1997).
S.V. JOGA Rio, LAW OF CYBER CRIMES AND INFORMATION TECHNOLOGY L-AW 10 (2004).
o Based on terms and conditions of access and use, imposedby service providers, commonly referred to
as 'netiquette'.
2011] AMLAN MOHANTY 107
that the stream of anti-governmentalism has been laid to rest in view of the fact
that the internet has quite simply become too mainstream, and being the
preferred platform for electronic commerce, the need for governmental regulation
cannot be ignored." Perhaps the greatest argument in favour of criminalising
unlawful conduct on the internet is its distinctiveness from territorial crime.
The very fact that cyber crimes are easier to learn how to commit, require fewer
resources relative to the potential damage caused, can be committed in a
jurisdiction without being physically present in it and the fact that they are
often not clearly illegal 2 make criminalisation of such conduct not only
important, but essential. The conclusion that must be reached is that the State
must step in with some level of regulation of cyberspace.
There are essentially four main types of conduct that a domestic legislation
should penalise - (1) offences against the confidentiality, integrity and availability
of computer data and systems, (2) computer-related offences with the intention
to defraud, (3) content related offences, and (4) offences related to infringements
of copyright and related rights.14 In order to acquire a jurisprudential
understanding of cyber crimes in general, and to gain a critical insight into the
nature of offences introduced by the amendment and whether they serve the
function expected of them, it is important to comprehend why these particular
forms of conduct are criminalised across jurisdictions. Further, it is also essential
to understand the range of unlawful conduct that involves computers. With
Robert Shaw, Should the Internet be Regulated, 2(4) IFo INSTITUTE FOR EcoNoMIC RESEARCH AT THE
UNIVERSITY OF MUNICH 42 (October, 2000), http://www.ifo.de/DocCIDL/Forum4Ol-pcl.pdf (last
visited December 14, 2009).
MACCONELL INTERNATIONAL, CYBER CRIME... AND PUNISHMENT? ARCHAIC LAWS THREATEN OLOBAL
INFORMATION, (World Information Technology and Services Alliance, 2000), http://www.witsa.org/
papers/McConnell-cybercrime.pdf (last visited December 1, 2009).
David S. Wall, Cybercrimes: New Wine, No Bottles?, in INVISIBLE CRIMES: THEIR VICTIMS AND THEIR
RECULATION ( Pam Davies, Peter Francis &Victor Jupp eds., 1999).
14 European Convention on Cybercrime, Guidelines for member states, 2001, http://
conventions.coe.int/Treaty/EN/Treaties/Htnl/185.htm (last visited December 12, 2009).
108 THE INDIAN JOURNAL OF LAW AND TECHNOLOGY [Vol, 7
the first, second and fourth type of conduct, private individuals may not be able
to detect and proceed against the perpetrators and it therefore falls upon the
State to intervene and impose criminal sanctions. It is necessary to criminalise
acts falling within the third category as they are offences that shock the
conscience of society and threaten public morality.
0 Section 66A: Any person who sends, by means of a computer resource or a communication device,-
a) any information that is grossly offensive or has menacing character; or
b) any information which he knows to be false, but for the purpose of causing annoyance,
inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill
will, persistently by making use of such computer resource or a communication device,
c) any electronic mail or electronic mail message for the purpose of causing annoyance or
inconvenience or to deceive or to mislead the addressee or recipient about the origin of such
messages, shall be punishable with imprisonment for a term which may extend to three years
and with fine.
See, S.1(a)(i), MAucIoUS COMMUNICATIONs ACT, 1988, (United Kingdom) http://www.harassment-
law.co.uk/law/act.htm , and relevant sections, S. andS.4, PROTECTION mOm HARASSMENT ACT, 1997,
and CRIINAL CODE (STALKING) AMENDMENT
atailableathttp://www.harassment-law.co.uk/law/act.htm,
ACT, 1999, (Australia) available at www.1egislation.qld.gov.au/LEGISLTN/ACTS/1999/
99AC018.pdf.
110 THE INDIAN JOURNAL OF LAW AND TECHNOLOGY [Vol, 7
The fundamental problem with the section, moving on to clauses (b) and
(c), is simply that several of the words used in the section such as 'inconvenience',
'annoyance', 'obstruction' or 'ill will' are not defined either in the primary or
Amendment Act, leading to uncertainty in interpretation and increasing the
possibility of misuse of the provision, a possible reason for some statutes drafting
defences to the charge, within the section itself.2 However, the efforts of the
legislature to address developing situations of cyber crime such as threat mails,
e-mail and SMS spamming, cyber stalking and phishing, must be commended.
Title 47, Section 223(e), CommuNicATIONs DECENcY AcT, 1997 (United States of America), available
at http://www.cybertelecom org/cda/47usc223.htm.
Section 66B: Whoever dishonestly receives or retains any stolen computer resource or communication
device knowing or having reason to believe the same to be stolen computer resource or communication
device, shall be punished with imprisonment of either description for a term which may extend to
three years or with fine which may extend to rupees one lakh or with both.
4 Naavi, Is ITA 2000 Stringent Enough on Cyber Criminals?, NAAV7I.ORG PORTAL ON INDIAN CYBER LAW
(February, 2009), http://www.naavi.org/cleditorial09/editjan27itaaanalysis12deterrance.htm (last
visited December 12, 2009).
Section 411, INDIAN PENAL CODE, 1860: Whoever dishonestly receives or retains any stolen property,
knowing or having reason to believe the same to be stolen property, shall be punished with imprisonment
of either description for a term which may extend to three years, or with fine, or with both.
Section 2(1)(k), INFORMATION TECHNOLOGY ACT, 2000: "computer resource" means computer,
computer system, computer network, data, computer data base or software.
2011] AMLAN MOHANTY 111
Naavi, Information Technology Act 2000 Amendment Details unveiled, NAAVI.ORG PORTAL ON INDIAN
CYBER LAw (December, 2008), http://www.naavi.org/cleditorial08/editdec25itaaanalysis1.htm (last
visited December 12, 2009).
Statement of Objects and Reasons of the Information Technology Act, 2000, available at http://
naavi.org/ita2008/objects2008.htm and Statement of Objects and Reasons of the Information
Technology Amendment Act, 2006, availableat http://naavi.org/ita_2008/index.htm (last visited
December 12, 2009).
Supra note 11.
Neal K. Katyal, Criminal Law in Cyberspace, 149 (4) U. PA. L. REN. 1027 (2001).
112 THE INDIAN JOURNAL OF LAW AND TECHNOLOGY [Vol, 7
versions of the same crime merely involve the use of computers with similar
consequences, for example, logging into someone's account and making a
defamatory statement, online shopping using someone else's credit card etc.
Prior to the amendment act, the crime of identity theft was forcibly brought
under S.66 within the ambit of 'hacking', which presupposes that there was
an infiltration of a computer resource involving 'alteration,deletion or destruction'
of the information residing therein, facilitating the crime of identity theft.
However, under the new provision, S.66C, the means by which the identifying
information is accessed is discounted and only the act of making fraudulent or
dishonest use of the information itself is criminalised. The benefit of separating
the two offences cannot be overemphasised, given that a separate criminal
provision exists for extraction of such data through fraudulent means.
Section 66, IT ACT, 2000: (1) Whoever with the intent to cause or knowing that he is likely to cause
wrongful loss or damage to the public or any person destroys or deletes or alters any information
residing in a computer resource or diminishes its value or utility or affects it injuriously by any means,
commits hacking.
Section 66C, ITAA, 2008: Whoever, fraudulently or dishonestly makes use of the electronic signature,
password or any other unique identification feature of any other person, shall be punished with
imprisonment of either description for a term which may extend to three years and shall also be liable
to fine with may extend to rupees one lakh.
Section 43 under the IT Act imposes civil penalties for such acts, but after notification of the IT
(Amendment) Act, 2008, under Section 66, it is a criminal offence if niens rea exists.
Section 66D: Whoever, by means for any communication device or computer resource cheats by
personating, shall be punished with imprisonment of either description for a term which may extend
to three years and shall also be liable to fine which may extend to one lakh rupees.
See Vineeta Pandev, Cell Abuse: SMS Spoofing's Forgery, THE TIMEs OF INDIA, July 185 2004, http://
timesofindia.indiatimes.com/india/Cell-abuse-SMS-spoofings-forgery,/articleshow/782197.cms (last
visited December 16, 2009).
2011] AMLAN MOHANTY 113
the idea of a 'unique' identification feature of an individual, and not fitting the
definition of 'computer resource' or 'communication device' under S.2(1) (k)
and (ha), may lie outside the scope of both, S.66C and S.66D, which is a
serious concern for cyber crime officials.
6 See Identity Theft and Assumption Deterrence Act of 1998, Pub. L. No. 105-318, § 1028 112 Stat.
3007 (1998).
See Identity Theft and Assumption Deterrence Act of 1998, Pub. L. No. 105-318, § 1028(b)(3)(A)
112 Stat. 3007 (1998).
S See Identity Theft and Assumption Deterrence Act of 1998, Pub. L. No. 105-318, § 1028(b)(4) 112
Stat. 3007 (1998).
" See Identity Theft and Assumption Deterrence Act of 1998, Pub. L. No. 105-318, § 1028 (b)(1)(D)
112 Stat. 3007 (1998).
40 See Identity Theft and Assumption Deterrence Act of 1998, Pub. L. No. 105-318, § 1028(b) 112
Stat. 3007 (1998).
4 MINISTRY OF INFORMATION TECHNOLOGY, REPORT OF THE EXPERT COMMITTEE, http://www.mit.gov.in/
download/ITAct.doc (last visited December 16, 2009).
114 THE INDIAN JOURNAL OF LAW AND TECHNOLOGY [Vol, 7
prescribes imprisonment for a period of three years but similar fine of rupees two
lakh. However, it does not make mention of compensation to the victim which
was explicitly recommended by the Expert Committee, to the tune of rupees
twenty five lakhs.42
The issue that immediately springs up on an analysis of the provision is
whether it is appropriate to refer to the wrongful conduct represented in the
section as 'voyeurism' in the literal sense since 'observation' of the 'private
area' of persons is not criminalised. While this is understandable if one assumes
the circumstances under which the offence was introduced in the Bill<4 as not
requiring such a provision, since it was not observation as such, which was the
concern at the time, but rather, capturing, transmitting and publishing the
image of private parts of an individual.
42 Id.
4 One of the main circumstances for the introduction of this provision was the DPS MMS scandal.
The scandal involved a video clip featuring two students from Delhi Public School, one of whom
recorded the video on his cellphone, distributed it to his friends, which was further forward to the
others, eventually finding its way on to the internet and being listed for sale online. The episode
resulted in criminal proceedings being launched against the CEO of Baazee.com. See Avnish Bajaj v.
State, 2008 150 D.L.T. 769.
4 MINISTRY OF INFORMATION TECHNOLOGY, REPORT OF THE STANMING COMMITTEE (2006), 3 and 6,
available at http://www.naavi.org/cleditorial07/standingCommitteereportita2006.pdf (last visited
December 16, 2009).
2011] AMLAN MOHANTY 115
An analysis of this section can be fractioned into the first and second clause,
the subject matter of each being considerably dissimilar with their own particular
complications. The section is comprehensive in that sub-clause (A) first
enumerates the methods by which the act is committed, the wrongful conduct,
as it were,4 8 and then proceeds to describe the potential damage that may be
caused by such acts. However, in the portion describing the likely damage, the
definition is restricted to cases linked to destruction of property or death of
individuals." While the clause also speaks of damage to essential supplies and
critical information infrastructure, there is no mention of damage to private
property. Using the generally accepted definition of cyber terrorism,5o it is clear
that damage need not be restricted to property belonging to the government.
So long as it induces fear in the minds of people, it may be regarded as terrorism.
Also, being a provision specific to cyber terrorism, it is surprising that the term
4 Section 67(1): A person commits an offence if- (a) for the purpose of obtaining sexual gratification,
he observes another person doing a private act, and (b) he knows that the other person does not
consent to being observed for his sexual gratification....
6 Section 162(1): Every one commits an offence who, surreptitiously, observes - including by
mechanical or electronic means - or makes a visual recording of a person who is in circumstances
that give rise to a reasonable expectation of privacy....
4 Supra note 9, at 62.
4 See Section 66F 1(A) (i), (ii) and (iii).
4 Section 66F 1(A):...and by means of such conduct causes or is likely to cause death or injuries to
persons or damage to or destruction of property or disrupts or knowing that it is likely to cause
damage or disruption of supplies or services essential to the life of the community or adversely affect
the critical information infrastructure....
so 'Unlawful attacks against computers, networks and the information stored therein, when done to
intimidate or coerce a government or its people in furtherance of political or social objective', Peter
Grabosky & Michael Stohl, Cyberterrorism, 82 REFORM 8 (Autumn, 2003).
116 THE INDIAN JOURNAL OF LAW AND TECHNOLOGY [Vol, 7
5 Virtual property may include accounts, websites, virtual currency, virtual housing spaces and other
real estate in cyberspace, virtual pets, weapons and characters etc.
5 See Naavi, ITA 2000 Amendment Bill defines Cyber Terrorism, prescribes life sentence, BLOGGER NEWS
NETWORK (December, 2008), http://www.bloggernews.net/1 19157 (last visited December 10, 2009).
5 Section 66F 1(B):... knowingly or intentionally penetrates or accesses a computer resource without
authorisation.. any restricted information, data or computer database... so obtained may be used to
cause or likely to cause injury to the interests of the sovereignty and integrity of India, the security of
the State....
5 Naavi, IT Acts Amendments and Cyber Terrorism, MERI NEWS (December, 2008), http://
www. merinews.com/article/it- act- amendments- and- cyber- terrorism/152449.shtmi (last visited
December 8, 2009).
2011] AMLAN MOHANTY 117
(vi) Sexually Explicit Content and Child Pornography (S.67A and S.67B)
5 E.g., in Australia, § 100.2(2)(h) and (i) of the Criminal Code Act (Cth), include the term
'electronic communication', to stress on the increasing use of computers as a medium in terrorist
activities. The Criminal Code Act was amended by the Security Legislation Amendment (Terrorism)
Act, 2002.
5 Yee F. Lim, CYBERSPACE LAW: COMMENTARIES AND MATERIALS 353 (2007).
5 See Section 66F(2) of the IT (Amendment) Act, 2008 and Section 101.1(1) Criminal Code Act
(Cth).
5 Supra note 56, at 355.
118 THE INDIAN JOURNAL OF LAW AND TECHNOLOGY [Vol, 7
the prohibited conduct as envisaged under the statute, and what class of persons
the law seeks to regulate, for lack of definiteness, the law may be regarded as
'void for vagueness'. 6 The objective of a criminal statute is fairly simple, allowing
citizens to organise the affairs of their lives with the knowledge of acts that are
forbidden by the law, and the negation of this should logically be considered an
infirmity of the legal system.
The researcher has used the example of this doctrine to buttress the argument
that a criminal statute must be drafted with precision, leaving no room for
ambiguity, particularly with reference to phrases that enumerate classes of persons,
acts constituting an offence or a generic term that may be susceptible to multiple
interpretations. Thus, for example, the phrase 'gangster' when used in a penal
statute, may render the statute void, since the phrase is open to wide-ranging
interpretations, both by the court and the enforcing agencies.6 4
While there exist several such instances, the author would like to limit the
illustrations to this one specific case, merely to demonstrate the fact that mere
uncertainty in a single phrase of a hastily drafted statute could render the law
unconstitutional and void, thereby necessitating precaution in the framing ot
penal statutes that are bound to affect a majority of citizens, as is certainly the
case with a statute regulating activities on the internet in a country as large as
ours.
IV. CONCLUSION
6 A. G. A., The Void for Vagueness Doctrine in the Supreme Court, 109(1) U. PA. L. REv. 67
(1960).
6 Lanzettav. NewJersev, 306 U.S. 451 (1939); Edelmanv. California, 344 U.S. 357 (1953).
120 THE INDIAN JOURNAL OF LAW AND TECHNOLOGY [Vol, 7
certain liberties in action that make it easier to transgress laws, and with such
characteristics inherent to the environment, any regulatory mechanism or
legislative measure must seek to be comprehensive, clear and narrow in
interpretive scope.