Academia.eduAcademia.edu

Outline

Legal instability in cyberspace and OSCE’s mitigation role

2021, Juridical Tribune

https://doi.org/10.24818/TBJ/2021/11/3.01

Abstract

After the international legal community widely endorsed the application of international law to cyberspace, many open questions remain on the concrete interpretation of existing rights and obligations to the cyber realm. In pursuit of its mandate to promote human rights and conflict prevention, the OSCE can play a major role to support operationalization of international law and application of existing principles to cyberspace. This paper examines some key steps in the aftermath of the creation of norms of behavior, and transparency and confidence-building measures. After a brief analysis of the normcreation process, this piece identifies several pressing cybersecurity challenges on the international landscape, and offers suggestions for consolidating the voluntary non-binding norms States agreed upon. Using lessons learned from other domains, the analysis will focus on mechanisms of building further stability and transparency in cyberspace, in particular by reference to the due dil...

References (89)

  1. 2018, https://www.mkm.ee/sites/default/files/kyberturvalisuse strateegia_2022_eng.pdf; "Strategic Review of Cyber Defence," Repulique Francaise -Secrétariat Général de la Défense et de la Sécurité Nationale, February 2018, http://www.sgdsn.gouv.fr/ uploads/2018/03/revue-cyber-resume-in-english.pdf; "Dutch National Cyber Security Agenda," The Netherlands' Ministry of Justice and Security, April 2018, https://www.enisa.europa.eu/topics/ national-cyber-security-strategies/ncss-map/national-cyber-security-strategies-interactive- map/strategies/national-cyber-security-strategy-1; "The UK National Cyber Security Strategy 2016- 2021," HM Government, 2016, https://assets.publishing.service.gov.uk/government/uploads/system/ uploads/attachment_data/file/567242/natio nal_cyber_security_strategy_2016.pdf; "National Cyber Strategy of the United States of America," The White House, September 2018, Istanbul Final Declaration and Resolution on Cyber Security," OSCE Parliamentary Assembly, June 29-July 3, 2013, https:// www.oscepa.org/meetings/annual-sessions/2013-istanbul-annual- session/2013-istanbul-final-declaration/1652-15; "U.N. Document A/69/723, International Code of Conduct for Information Security", in Letter from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations Secretary-General, January 9, 2015, https://digitallibrary.un.org/record/786846/files/A_69_723- EN.pdf. [all accessed 15.06.2021].
  2. 10 For e.g. the "U.N. General Assembly, Resolution 73/266, Advancing Responsible State Behaviour in Cyberspace in the Context of International Security", A/RES/73/266, December 22, 2018, https://undocs.org/pdf?symbol=en/A/RES/73/266; "London Process", formally called "Global Conference on Cyber Space", Global Forum on Cyber Expertise, https://www.thegfce.com/about/gccs; [accessed 15.06.2021].
  3. 11 For e.g., the two international Codes of Conduct for information security developed by the Shanghai Cooperation Organization, the Budapest Convention on Cybercrime sponsored by the Council of Europe, the Tallinn Manuals developed under the auspices of NATO Cooperative Cyber Defence Centre of Excellence (CCD CoE). See infra15.
  4. Ben Baseley-Walker, "Transparency and Confidence-Building Measures in Cyberspace: Towards Norms of Behaviour," Confronting Cyberconflict (2011): 33, https://citizenlab.ca/cybernorms2012/ BaseleyWalker2011.pdf. [accessed 15.06.2021].
  5. 13 Baseley-Walker, "Transparency and Confidence-Building," 32.
  6. For e.g., the agreement on detailed interpretation of major principles of international law during the 1975 Final Act of the Helsinki Conference on Security and Cooperation in Europe, the CBMs contained in the 1986 Stockholm Accord, and numerous election assistance and monitoring efforts. Baseley-Walker, "Transparency and Confidence-Building," 36; Velimir Radicevic, "Promoting Cyber Stability between States: OSCE Efforts to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies (ICTs) in the Context of Global and Regional Security," OSCE Yearbook, ed. IFSH (2018): 201.
  7. Pawlak et al., "Cyber Conflict Uncoded", note 34 above; Heli Tiirmaa-Klaar, "Two Generations of EU Cybersecurity Strategies," in Handbook on Cybersecurity: The Common Security and Defence Policy of the European Union, ed. Jochen Rehrl (Directorate for Security Policy of the Federal Ministry of Defence of the Republic of Austria, 2019), 18-26. "U.N. Document A/68/98*, Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security," June 24, 2013, http://www.un.org/ga/search/view doc.asp?symbol=A/68/9, [hereinafter GGE 2013 report]; "GGE 2015 report", note 18 above. [accessed 15.06.2021].
  8. 43 Hitchens and Gallagher, "Building Confidence in the Cybersphere," 9.
  9. There are still concerns that its clarification offers opportunities for States to allege more breaches of international law and increase the frequency of countermeasures, which ultimately hamper stabilization of this international law principle in cyberspace. Eric T. Jensen and Sean Watts, "A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destabilizer?," Texas Law Review 95 (2017): 1573.
  10. Once the United States and China adopted a norm against commercial cyberespionage, both Germany and the United Kingdom undertook their own bilateral negotiations with China, and later the entire G-20 followed suit.
  11. Finnemore and Hollis, "Constructing Norms for Global Cybersecurity," 472.
  12. Radicevic, "Promoting Cyber Stability between States," 207.; "OSCE PC Decision 1106," note 39 above.
  13. For e.g., in contrast to the GGE wording, such as "States should consider" and "States could", the OSCE used terms such as "will" and "shall", committing States to certain legal issues. "GGE 2013 report", note 42 above (Section IV, para 26c).
  14. Hitchens and Gallagher, "Building Confidence in the Cybersphere," 7. 50 Id., 5.
  15. Niklas Bremberg, "European Regional Organizations and Climate-related Security Risks: EU, OSCE and NATO," SIPRI Insights on Peace and Security no. 1 (2018): 13, https://www.sipri.org/ publications/2018/sipri-insights-peace-and-security/european-regional-organizations-and-climate- related-security-risks-eu-osce-and-nato. [accessed 15.06.2021].
  16. 52 "Perspectives of the UN & Regional Organizations on Preventive and Quiet Diplomacy, Dialogue Facilitation and Mediation. Common Challenges & Good Practices," Workshop Report OSCE (February 2011), https://peacemaker.un.org/sites/peacemaker.un.org/files/Perspectiveson PreventiveandQuietDiplomacy_OSCE2011_0.pdf [accessed 15.06.2021].
  17. 53 Hitchens and Gallagher, "Building Confidence in the Cybersphere," 2.
  18. Radicevic, "Promoting Cyber Stability between States," 211.
  19. Id., 209; The nominal implementation rate across all CBMs by participating States is high, each State having implemented at least one measure.
  20. In sum, in 2002, a North Korean freighter, transited the Arabian Sea without flying a flag and with a newly painted hull that obscured its name and home port. U.S. intelligence officials asked Spanish marines to board and search the ship as a "stateless" vessel. On board, they discovered missiles
  21. Radicevic, Velimir. "Promoting Cyber Stability between States: OSCE Efforts to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies (ICTs) in the Context of Global and Regional Security." In OSCE Yearbook, edited by IFSH (2018): 201-212.
  22. Schmitt, Michael N. ed. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge: Cambridge University Press, 2017. doi:10.1017/9781316822524.
  23. Stockburger, Peter Z. "From Grey Zone to Customary International Law: How Adopting the Precautionary Principle May Help Crystallize the Due Diligence Principle in Cyberspace" in NATO CCD CoE Publications, eds. T. Minárik, R. Jakschis, and L. Lindström (2018): 245-262.
  24. Tiirmaa-Klaar, Heli. "Two generations of EU cybersecurity strategies." In Handbook on Cybersecurity: The Common Security and Defence Policy of the European Union, edited by Jochen Rehrl, 18-26. Directorate for Security Policy of the Federal Ministry of Defense of the Republic of Austria, 2019.
  25. Bannelier, Karine. "Cyber Diligence: A Low-Intensity Due Diligence Principle for Low- Intensity Cyber Operations?" Baltic Yearbook of International Law 14 (2014): 1-15.
  26. Bannelier, Karine, and Theodore Christakis. "Cyber-Attacks: Prevention-Reactions: The Role of States and Private Actors." Les Cahiers de la Revue Défense Nationale (2017): 7-86.
  27. Baseley-Walker, Ben. "Transparency and Confidence-Building Measures in Cyberspace: Towards Norms of Behaviour." Confronting cyberconflict no. 4 (2011): 31-40. https://citizenlab.ca/cybernorms 2012/Baseley Walker2011.pdf.
  28. Berkes, Antal. "Human Rights Obligations of the Territorial State in the Cyberspace of Areas Outside Its Effective Control." Israel Law Review 52, no. 2 (2019): 197-231.
  29. Besson, Samantha. "Due Diligence and Extraterritorial Human Rights Obligations - Mind the Gap!" ESIL Reflections 9, no. 1 (2020): 1-9. https://esil-sedi.eu/wp- content/uploads/2020/04/ESIL-Reflection-Besson-S.-3.pdf.
  30. Bremberg, Niklas. "European Regional Organizations and Climate-related Security Risks: EU, OSCE and NATO." SIPRI Insights on Peace and Security no. 1 (2018). https://www.sipri.org/publications/2018/sipri-insights-peace-and-security/european- regional-organizations-and-climate-related-security-risks-eu-osce-and-nato.
  31. Corn, Gary P., and Robert Taylor. "Sovereignty in the Age of Cyber." American Journal of International Law Unbound 111 (2017): 207-212. doi:10.1017/aju.2017.57.
  32. Eichensehr, Kristen. "The Cyber-Law of Nations." Georgetown Law Journal 103, no. 2 (2015): 317-380.
  33. Finnemore, Martha, and Duncan B. Hollis. "Constructing Norms for Global Cybersecurity." American Journal of International Law 110, no. 3 (2016): 425-479.
  34. Heupel, Monika. "How do States Perceive Extraterritorial Human Rights Obligations? Insights from the Universal Periodic Review." Human Rights Quarterly 40, no. 3 (2018): 521-546.
  35. Hitchens, Theresa, and Nancy W. Gallagher. "Building Confidence in the Cybersphere: A Path to Multilateral Progress." Journal of Cyber Policy 4, no. 1 (2011): 4-21. http://doi.org/10.1080/23738871.2019.1599032.
  36. Hollis, Duncan B, and Matthew C. Waxman. "Promoting International Cybersecurity Cooperation: Lessons from the Proliferation Security Initiative (PSI)." Temple University Beasley School of Law, Legal Studies Research Paper no. 3 (2018): 1-14.
  37. Jensen, Eric Talbot. "The Tallinn Manual 2.0: Highlights and Insights." Georgetown Journal of International Law 48 (2017): 735-778.
  38. Jensen, Eric T., and Sean Watts. "A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destabilizer?" Texas Law Review 95 (2017): 1555-1577.
  39. Kilovaty, Ido. "An Extraterritorial Human Right to Cybersecurity." Notre Dame Journal of International and Comparative Law" 10, no.1 (2020): 35-55.
  40. Roguski, Przemyslaw. "Application of International Law to Cyber Operations: A Comparative Analysis of States' Views." Policy brief (2020): 1-48.
  41. Schmitt, Michael N. "Grey Zones in the International Law of Cyberspace." The Yale Journal of International Law Online 42, no. 2 (2017).
  42. Schmitt, Michael N. "Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: An Analytical Vade Mecum." Harvard National Security Journal 8, no. 2 (2017): 239-282.
  43. Schmitt, Michael N., and Liis Vihul. "Respect for Sovereignty in Cyberspace." Texas Law Review 95, no. 7 (2017): 1639-1671.
  44. Shackelford, Scott J., Scott Russell, and Andreas Kuehn. "Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors." Chicago Journal of International Law 17, no.1 (2016):1-50.
  45. Moynihan, Harriet. "The Application of International Law to State Cyberattacks: Sovereignty and Non-Intervention." Chatham House Research Paper (2019). https://www.chathamhouse.org/sites/default/files/ publications/research/2019-11-29- Intl-Law-Cyberattacks.pdf.
  46. Pawlak, Patryk, Eneken Tikk, and Mika Kerttunen. "Cyber Conflict Uncoded: The EU and conflict prevention in cyberspace." EUISS Brief 7 (2020).
  47. Pawlak, Patryk and Thomas Biersteker eds. "Laws of gravitation. Due diligence obligations in cyberspace." In EU Cyber Sanctions and Norms in Cyberspace. Chaillot Paper 155 (2019). https://www.iss.europa.eu/sites/ default/files/EUISSFiles/cp155.pdf.
  48. Ponta, Adina. "Cyber Operations Against Medical Facilities During Peacetime." Lawfare Blog, May 1, 2020. https://www.lawfareblog.com/cyber-operations-against- medical-facilities-during-peacetime.
  49. Ponta, Adina, "Hostile Cyberoperations Against Medical Facilities and Their Impunity." Jurist Legal News and Research, May 22, 2020. https://www.jurist.org/commentary/ 2020/05/adina-ponta-hospital-hostile-cyber operations/.
  50. Ponta, Adina. "Security and Human Rights Challenges of Cyber Due Diligence." Harvard International Law Journal Online (2020). https://harvardilj.org/2020/06/ security-and-human-rights-challenges-of-cyber-due-diligence/.
  51. Ruhl, Christian, Duncan Hollis, Wyatt Hoffman, and Tim Maurer. "Cyberspace and Geopolitics: Assessing Global Cybersecurity Norm Processes at a Crossroads." Carnegie Endowment for International Peace Working Paper (2020): 1-25. https://carnegieendowment.org/files/Cyberspace_and_Geopolitics.pdf.
  52. Schmitt, Michael. "The Netherlands Releases a Tour de Force on International Law in Cyberspace: Analysis." Just Security, October 14, 2019. https://www.justsecurity.org/ 66562/the-netherlands-releases-a-tour-de-force-on-international-law-in-cyberspace- analysis/.
  53. Przemyslaw Roguski. "Application of International Law to Cyber Operations: A Comparative Analysis of States' Views." The Hague Program for Cyber Norms Policy brief, March 2020, https://www.thehaguecybernorms. nl/research-and-publication- posts/application-of-international-law-to-cyber-operations-a-comparative-analysis-of- states-views.
  54. Wright, Jeremy. "Cyber and International Law in the 21 st Century." Chatham House Royal Institute (2018). https://www.gov.uk/government/speeches/cyber-and- international-law-in-the-21st-century. IV. Legal and public documents
  55. "Annex to General Assembly Resolution 56/83 of December 12, 2001, corrected by document A/56/49 (Vol. I) /Corr.4." Responsibility of States for Internationally Wrongful Acts, 2001, https://legal.un.org/ilc/texts/ instruments/english/draft_articles/ 9_6_2001.pdf
  56. "Cybersecurity Strategy. Republic of Estonia 2019-2022." Ministry of Economic Affairs and Communications. February 2018. https://www.mkm.ee/sites/default/files/ kyberturvalisuse_strateegia _2022_eng.pdf.
  57. "Declaration by the High Representative Josep Borrell, on behalf of the EU, on malicious cyber activities exploiting the coronavirus pandemic." Press Release 26/120, April 30, 2020. https://www.consilium.europa.eu/en/press/press-releases/2020/04/30/ declaration-by-the-high-representative-josep-borrell-on-behalf-of-the-european-union- on-malicious-cyber-activities-exploiting-the-coronavirus-pandemic/.
  58. "Dutch National Cyber Security Agenda." The Netherlands' Ministry of Justice and Security. April 2018. https://www.enisa.europa.eu/topics/national-cyber-security- strategies/ncss-map/national-cyber-security-strategies-interactive-map/strategies/ national-cyber-security-strategy-1.
  59. European Court of Human Rights. López Ostra v. Spain, Application no. 16798/90 (2004).
  60. European Court of Human Rights. Osman v. The United Kingdom, Case no. 87/1997/871/1083 (1998).
  61. "Global Conference on Cyber Space (GCCS) 2017." Internet Society, November 23-24, 2017. https://www. internetsociety.org/events/gccs-2017/.
  62. "G-8 Declaration Renewed Commitment for Freedom and Democracy." G-8 Summit of Deauville, May 2011. https://www.nato.int/nato_static/assets/pdf/pdf_2011_05/ 20110926_110526-G8-Summit-Deauville.pdf.
  63. "G-20 Leaders' Communique´." Antalya Summit, November 15-16, 2015. http://www.mofa.go.jp/files/00011 1117.pdf.
  64. International Court of Justice. Case Concerning Pulp Mills on the River Uruguay (Argentina v. Uruguay), April 20, 2010.
  65. International Court of Justice. Judgement Certain Activities Carried Out by Nicaragua In the Border Area (Costa Rica V. Nicaragua), December 16, 2015.
  66. "International Covenant on Economic, Social and Cultural Rights." Adopted and opened for signature, ratification and accession December 16, 1966, U.N.G.A Resolution 2200A (XXI) (entered into force Jan. 3, 1976). https://www.ohchr.org/en/ professionalinterest/pages/cescr.aspx.
  67. International Tribunal for the Law of the Sea. Request for Advisory Opinion submitted to the Seabed Disputes Chamber, Responsibilities and Obligations of States Sponsoring Persons and Entities with Respect to Activities in the Area, February 1, 2011.
  68. "London Process", formally called "Global Conference on Cyber Space." Global Forum on Cyber Expertise accessed June 28, 2020. https://www.thegfce.com/about/gccs.
  69. "Maastricht Principles on the Extra-Territorial Obligations of States in the area of Economic, Social and Cultural Rights." (2011). https://www.ciel.org/wp- content/uploads/2015/05/Maastricht_ETO_ Principles_21Oct11.pdf.
  70. "National Cyber Strategy of the United States of America." The White House. September 2018. https://www. whitehouse.gov/wp-content/uploads/2018/09/National- Cyber-Strategy.pdf.
  71. "OSCE Permanent Council Decision 1039." April 26, 2012. https://www.osce.org/ pc/90169.
  72. "OSCE Permanent Council Decision 1106." December 2013. http://www.osce.org/pc /109168.
  73. "OSCE Permanent Council Decision 1202." March 10, 2016. http://www.osce.org/pc /227281.
  74. "Perspectives of the UN & Regional Organizations on Preventive and Quiet Diplomacy, Dialogue Facilitation and Mediation. Common Challenges & Good Practices." Workshop Report OSCE (2011). https://peacemaker. un.org/sites/peacemaker.un.org/ files/PerspectivesonPreventiveandQuietDiplomacy_OSCE2011_0.pdf.
  75. Regulation (EU) 2016/679 of the European Parliament and of the Council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, Official Journal of the European Union, L 119/1 (April 27, 2016).
  76. Speech, President Kersti Kaljulaid. "President of the Republic at the opening of CyCon 2019." May 29, 2019. https://www.president.ee/en/official-duties/speeches/15241- president-of-the-republic-at-the -opening-of-cycon-2019/index.html.
  77. "Stay Smart. Stay Safely Connected." Cybersecurity Tech Accord. (May 2020). https://cybertech accord.org/.
  78. "Strategic Review of Cyber Defence." Repulique Francaise -Secrétariat Général de la Défense et de la Sécurité Nationale. February 2018. http://www.sgdsn.gouv.fr/uploads/ 2018/03/revue-cyber-resume-in-english.pdf.
  79. "The UK National Cyber Security Strategy 2016-2021." HM Government, 2016. https://assets.publishing. service.gov.uk/government/uploads/system/uploads/attachment_data/file/567242/natio nal_cyber_security_strategy_2016.pdf.
  80. "The 9 Principles." Paris Call, December 11, 2018. https://pariscall.international/ en/supporters.
  81. "U.N. Document A/56/10." International Law Commission: Prevention of Transboundary Harm from Hazardous Activities with commentaries, Article 3, commentary (9) (2001). https://legal.un.org/ilc/texts/instruments/english/ commentaries/9_7_2001.pdf.
  82. "U.N. Document A/68/98*." Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. June 24, 2013. http://www.un.org/ga/search/view_ doc.asp?symbol=A/68/9.
  83. "U.N. Document A/69/723, International Code of Conduct for Information Security." in Letter from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations Secretary- General, January 9, 2015. https://digitallibrary.un.org/record/78684 6/files/A_69_723- EN.pdf.
  84. "U.N. Document A/70/174. Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security.", July 22, 2015. https://undocs.org/A/70/174.
  85. "U.N. Document CCPR/C/21/Rev.1/Add. 1326." International Covenant on Civil and Political Rights. General Comment No. 31." Human Rights Committee (HRC), May 2004. http://docstore.ohchr.org/Self Services/Files Handler.ashx?enc=6QkG1d%2 FPPRiCAqhKb7yhsjYoiCfMKoIRv2FVaVzRkMjTnjRO%2Bfud3cPVrcM9YR0iW6T xaxgp3f9kUFpWoq%2FhW%2FTpKi2tPhZsbEJw%2FGeZRASjdFuuJQRnbJEaUhby 31WiQPl2mLFDe6ZSwMMvmQGVHA%3D%3D.
  86. " U.N. Document E/C.12/2000/4." CESCR General Comment No. 14: The Right to the Highest Attainable Standard of Health (Art. 12) August, 11, 2000.
  87. "U.N. General Assembly, Resolution 73/266, Advancing Responsible State Behaviour in Cyberspace in the Context of International Security." A/RES/73/266 (December 22, 2018). https://undocs.org/pdf?Symbol=en/A/ RES/73/266.
  88. "U.N. Reports of International Arbitral Awards, 2006 Permanent Court of Arbitration." Trail smelter case (United States v. Canada). https://legal.un.org/riaa/cases/ vol_III/1905-1982.pdf.
  89. "2013 Istanbul Final Declaration and Resolution on Cyber Security." OSCE Parliamentary Assembly, June 29-July 3, 2013, https://www.oscepa.org/meetings/ annual-sessions/2013-istanbul-annual-session/2013-istanbul-final-declaration/1652-15.