Hostname: page-component-78c5997874-fbnjt Total loading time: 0 Render date: 2024-11-03T03:36:34.809Z Has data issue: false hasContentIssue false

“Don't Do as I Do”—The US Response to Russian and Chinese Cyber Espionage and Public International Law

Published online by Cambridge University Press:  06 March 2019

Abstract

Core share and HTML view are not available for this content. However, as you have access to this content, a full PDF is available via the ‘Save PDF’ action button.

The Russian government is accused of hacking emails circulating among senior members of Hilary Clinton's campaign team to support President Trump's election in 2016. This was not the first time the United States was the target of massive cyber espionage: The Chinese government is believed to have gained sensitive information on 22.1 million US government employees through “cyber intrusions” in 2014. This Article will examine whether cyber espionage of this kind is unlawful under public international law and will conclude that it is. Specifically, such espionage can result in a violation of territorial sovereignty and will likely violate the principle of non-intervention in the internal affairs of other States. Yet, based on the controversial “clean-hands-doctrine,” past US actions in the realms of cyber espionage and intervention may well invalidate any claims it asserts against Russia or China.

Type
Articles
Copyright
Copyright © 2018 by German Law Journal, Inc. 

References

1 See Cyber Definitions, NATO Cooperative Cyber Defence Centre of Excellence, https://ccdcoe.org/cyber-definitions.html (providing a definition for “cyber espionage” by country); Ella Shoshan, Applicability of International Law on Cyber Espionage Intrusions 1415 (2014) (unpublished Ph.D. dissertation, Stockholm University) (on file with author).Google Scholar

2 See Office of the Director of Nat'l Intelligence, Background to “Assessing Russian Activities and Intentions in recent US Elections:” The Analytical Process and Cyber Incident Attribution (Jan. 6, 2017), https://www.documentcloud.org/documents/3254229-ICA-2017-01.html#document/p1; Luke Harding, Top Democrat's Emails Hacked By Russia After Aide Made Typo, Investigation Finds, The Guardian (Dec. 14, 2016), https://www.theguardian.com/us-news/2016/dec/14/dnc-hillary-clinton-emails-hacked-russia-aide-typo-investigation-finds; Sanger, David E., Obama Strikes Back at Russia for Election Hacking, New York Times (Dec. 29, 2016), https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html?_r=1.Google Scholar

3 See Sanger, David E., Cyberthreat Posed by China and Iran Confounds Whitehouse, New York Times (Sept. 15, 2015), https://www.nytimes.com/2015/09/16/world/asia/cyberthreat-posed-by-china-and-iran-confounds-white-house.html; Ellen Nakashima, Hacks of OPM Databases Compromised 22.1 Million People, Federal Authorities Say, The Washington Post (July 9, 2015), https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/?utm_term=.319beab5403b.Google Scholar

4 See Sanger, supra note 3.Google Scholar

5 The principle of sovereign equality will not be discussed here, as its application does currently not seem relevant to the allegations made against Russia and China; for more details on this issue, see Questions Relating to the Seizure and Detention of Certain Documents and Data (Timor-Leste v. Australia), General List No. 156, Order (March 3, 2014), http://www.icj-cij.org/docket/files/156/18078.pdf (focusing especially on para. 27).Google Scholar

6 James Ball & Nick Hopkins, GCHQ and NSA Targeted Charities, Germans, Israeli PM and EU Chief, The Guardian (Dec. 20, 2013), http://www.theguardian.com/uk-news/2013/dec/20/gchq-targeted-aid-agencies-german-government-eu-commissioner; Patrick Beuth & Kai Biermann, Das Spionage-System Prism und Seine Brüder, Die Zeit (June 13, 2013), http://www.zeit.de/digital/datenschutz/2013-06/nsa-prism-faq.Google Scholar

7 NSA Skandal: US-Abgeordneter Rechtfertigt Lauschangriffe, Der Spiegel (Oct. 27, 2013), http://www.spiegel.de/politik/ausland/us-abgeordneter-peter-king-rechtfertigt-lauschangriffe-a-930292.html (referring to US Representative Peter King, member of the Homeland Security Committee and Chairman of the Sub-Committee on Counterterrorism and Intelligence); Warum die USA Schröder und Merkel Abhörten, Bild Online (Sept. 14, 2014), http://www.bild.de/politik/ausland/nsa/ex-nsa-chef-hayden-warum-die-usa-schroeder-und-merkel-abhoerten-37659540.bild.html (reporting interview with ex-NSA-Chief Hayden).Google Scholar

8 See Weber and Saravia v. Germany, 2006 XI Eur. Ct. H. R. 309, para. 88 (2006); Re Canadian Security Intelligence Service Act, [2009] F.C. 1058 (Can.).Google Scholar

9 See Corfu Channel Case (U.K. v. Alb.), Judgement, 1949 I.C.J. 4, 35 (Apr. 9); see also Armed Activities on the Territory of the Congo (Dem. Rep. Congo v. Uganda), Judgement, 2005 I.C.J. 168, para. 165 (Dec. 19).Google Scholar

10 Islands of Palmas Case (Neth. v. U.S.), 1928 R.I.A.A. 829, 838 (1928).Google Scholar

11 The Case of the S. S. “Lotus” (Fr. V. Turk.), 1927 P.C.I.J. (ser. A) No. 10, at 18 (Sept. 7).Google Scholar

12 For the purposes of the discussion here, it is irrelevant whether the alleged cyber espionage was undertaken by government officials or by private actors at the Russian/Chinese governments' behest.Google Scholar

13 Patrick Beuth, NSA Kann Drei Von Vier E-Mails Mitlesen, Die Zeit (Aug. 21, 2013), http://www.zeit.de/digital/datenschutz/2013-08/nsa-ueberwacht-75-prozent-internet; Charles Arthur, NSA-Scandal: What Data Is Being Monitored and How Does It Work?, The Guardian (June 7, 2013), http://www.theguardian.com/world/2013/jun/07/nsa-prism-records-surveillance-questions.Google Scholar

14 Glenn Greenwald, XKeyscore: NSA Tools Collect “Nearly Everything a User Does on the Internet”, The Guardian (July 31, 2013), http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data; NSA Sucks Realtime Data from Fifty Companies, Daily Mail (June 9, 2013), http://www.dailymail.co.uk/news/article-2338367/NSA-sucks-realtime-data-FIFTY-companies.html.Google Scholar

15 Montevideo Convention on the Rights and Duties of States, Dec. 26, 1933, 165 L.N.T.S. 19.Google Scholar

16 U.N. Charter art. 2, para. 7.Google Scholar

17 Charter of the Organization of American States, Apr. 30, 1948, 119 U.N.T.S. 47; see also Treaty of Friendship, Cooperation and Mutual Assistance art. 8, May 14, 1955, 219 U.N.T.S. 23.Google Scholar

18 G.A. Res. 2131 (XX), Declaration on the Inadmissibility of Intervention in the Domestic Affairs of States and the Protection of their Independence and Sovereignty (Dec. 21, 1965).Google Scholar

20 G.A. Res. 2625 (XXV), Declaration on Principles of International Law concerning Friendly Relations and Cooperation among States in accordance with the Charter of the United Nations (Oct. 24, 1970).Google Scholar

21 Craig Forcese, Spies Without Borders: International Law and Intelligence Collection, 5 J. Nat'l Security L. & Pol'y 179, 198 (2011); Aaron Shull, Cyberespionage and International Law, in GigaNet 8th Annual Symposium 1, 3–4 (2013).Google Scholar

22 Armed Activities on the Territory of the Congo (Dem. Rep. Congo v. Uganda), 2005 I.C.J. 168, para. 162 (Dec. 19).Google Scholar

23 U.K. v. Alb., 1949 I.C.J. at 34–5.Google Scholar

24 Military and Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), Judgement, 1986 I.C.J. 14, para. 202 (June 27); see also Armed Activities on the Territory of the Congo (Dem. Rep. Congo v. Uganda), Judgement, 2005 I.C.J. 168, at paras. 161–65 (Dec. 19).Google Scholar

25 Nicar. v. U.S., 1986 I.C.J. at para. 205 (emphasis added); see also Shull, supra note 21, at 4.Google Scholar

26 Kirstin Schmalenbach, Casebook Internationales Recht, 29–30 (2nd ed. 2014); Aust, Helmut P., Stellungnahme zur Sachverständigenanhörung am 5. Juni 2014, HU Berlin 16 (2014), https://www.bundestag.de/blob/282870/fc52462f2ffd254849bce19d25f72fa2/mat_a_sv-4-1_aust-pdf-data.pdf; Anne Peters, Surveillance Without Borders? The Unlawfulness of the NSA-Panopticon, Part I, EJIL: Talk! (Nov. 1, 2013), https://www.ejiltalk.org/surveillance-without-borders-the-unlawfulness-of-the-nsa-panopticon-part-i/; Shoshan, supra note 1, at 43–5; Stefan Talmon, Sachverständigengutachten gemäß Beweisbeschluss SV-4 des 1. Untersuchungsausschusses des Deutschen Bundestages der 18. Wahlperiode, Universität Bonn 20–21 (2014), https://www.bundestag.de/blob/282872/2b7b605da4c13cc2bc512c9c899953c1/mat_a_sv-4-2_talmon-pdf-data.pdf. Talmon also bases his view on the ICJ's reasoning in the Nicaragua Case. When dealing with unauthorized fly overs by US planes over Nicaraguan territory, the court concluded that such conduct violated Nicaragua's sovereignty but did not deal with the question of whether these flights also amounted to an unlawful intervention. This argument is unconvincing. The ICJ had no reason to examine whether these reconnaissance flights constituted an unlawful intervention or not. Nicaragua claimed that its sovereignty had been violated by the flights and the court concurred. Therefore, there was no need for the court to further examine US conduct. See Nicar. v U.S., 1986 I.C.J. at paras. 87–91, 251; Stefan Talmon, Das Abhören des Kanzlerhandys und das Völkerrecht, 1 Bonner Rechtsjournal 6, 10 (2014). See also Torsten Stein&; Thilo Marauhn, Völkerrechtliche Aspekte von Informationsoperationen, 60 ZaöRV 1, 22–5 (2000) (providing a more general discussion of the difficulty of distinguishing between acceptable “persuasion” of another State and “coercion”).Google Scholar

27 Nicar. v. U.S., 1986 I.C.J. at para. 205; see also Shull, supra note 21, at 4.Google Scholar

28 Shoshan, supra note 1, at 45–7; Shull, supra note 21, at 6–7; Pål Wrange, Intervention in National and Private Cyberspace and International law, Stockholm Faculty of L. Research Paper Series No. 23 89 (2017). However, Wrange bases this analysis on the assumption that the agent, even when operating remotely from his own country, is violating the domestic laws of the target State, which in turn allows the author to conclude that the agent is guilty of an illegal intervention. Schmalenbach, supra note 26, at 30 (mentioning the same argument but leaving it open to question whether the author agrees with it).Google Scholar

29 Falk, Richard A., Space Espionage and World Order: A Consideration of the Samos-Midas-Program, in Essays on Espionage and International Law 45, 58 (Quincy Wright et al eds.); Alison Pert, Australia's Jakarta Phone-Tapping: Was it Illegal?, Inside Story (Nov. 27, 2013), http://insidestory.org.au/australias-jakarta-phone-tapping-was-it-illegal; Shull, supra note 21, at 5.Google Scholar

30 Schmalenbach, supra note 26, at 30; Shoshan, supra note 1, at 45.Google Scholar

31 Aerial Incident of 3 July 1988 (Iran v. U.S.), Memorial Submitted by the Islamic Republic of Iran 197–204 (July 24, 1990), http://www.icj-cij.org/files/case-related/79/6629.pdf (noting that the Memorial mentions many incidents when the accused State's motives were viewed as irrelevant to the assessment to the legality of that State's actions).Google Scholar

32 Christine Gray, International Law and the Use of Force 203 (3d ed. 2008); Antonio Cassese, International Law 299–302 (2d ed. 2005); W. Michael Reisman, The Raid on Bagdad: Some Reflections on its Lawfulness and Implications 5 Eur. J. Int'l L. 120 (1994).Google Scholar

33 See, e.g., U.N. Secretary-General, Implementing the Responsibility to Protect, U.N. Doc. A/63/677, (Jan. 12, 2009).Google Scholar

34 Pert, supra note 29, at 2; Stein, supra note 26, at 24; Baker, Christoph D., Tolerance of International Espionage: A Functional Approach, 19 Am. U. Int'l L. Rev. 1091, 1097 (2003).Google Scholar

35 See, e.g., Bright, Martin, Ed Vulliamy & Peter Beaumont, Revealed: US Dirty Tricks to Win Vote on Iraq, The Guardian (Mar. 2, 2003), http://www.theguardian.com/world/2003/mar/02/usa.iraq. The authors refer to a memo describing the US spying on UN diplomats that represent then-sitting States of the Security Council. The authors further explain that:Google Scholar

The memo is directed at senior NSA officials and advises them that the agency is “mounting a surge” aimed at gleaning information not only on how delegations on the Security Council will vote on any second resolution on Iraq, but also “policies,” “negotiating positions,” “alliances” and “dependencies”—the “whole gamut of information that could give US policymakers an edge in obtaining results favourable to US goals or to head off surprises.”

Id. Google Scholar

36 Craig Forcese, The “Hacked” US Election: Is International Law Silent, Faced with the Clatter of Cyrillic Keyboards?, Just Security (Dec. 16, 2016), https://www.justsecurity.org/35652/hacked-election-international-law-silent-faced-clatter-cyrillic-keyboards/.Google Scholar

37 Tallinn Manual on the International Law Applicable to Cyber Warfare 45 (Schmitt, Michael N. ed., 2013).Google Scholar

38 A definition was provided by Judge Hudson in his Individual Opinion in the River Meuse Case before the PCIJ: “It would seem …that where two parties have assumed an identical or a reciprocal obligation, one party which is engaged in a continuing non-performance of that obligation should not be permitted to take advantage of a similar non-performance of that obligation by the other party.” See Diversion of Water from the River Meuse (Neth. v. Belg.), Judgement, 1937 P.C.I.J. (ser. A/B) No. 70, at para. 323 (June 28).Google Scholar

39 Schmalenbach, supra note 26, at 30–4 (mentioning this and some closely related arguments); Romero, Jorge H., Cyberespionage 2010: Is the Current Status of Espionage under International Law Applicable in Cyberspace? 19 (Storming Media 2011).Google Scholar

40 Glenn Greenwald, No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State (2014); Marcel Rosenbach & Holger Stark, Der NSA Komplex (2015).Google Scholar

41 James Crawford (Special Rapporteur), Second Report on State Responsibility, para. 330–34, U.N. Doc. A/CN.4/498/Add.2 (Apr. 30, 1999); James Crawford, Brownlie's Principles of Public International Law 701 (8th ed., 2012).Google Scholar

42 Quincy Wright, Espionage and the Doctrine of Non-Intervention in Internal Affairs, in 3 Essays on Espionage and International Law 21 (Quincy Wright et al eds., Leopold Classic Library, 1962); Schmalenbach, supra note 26, at 304.Google Scholar

43 Nina Agrawal, The US is No Stranger to Interfering in the Elections of Other Countries, Los Angeles Times (Dec. 21, 2016), http://www.latimes.com/nation/la-na-us-intervention-foreign-elections-20161213-story.html.Google Scholar

44 Agrawal, supra note 43; Markar Melkonian, US Meddling in 1996 Russian Elections in Support of Boris Yeltsin, Global Research (Jan. 13, 2017), http://www.globalresearch.ca/us-meddling-in-1996-russian-elections-in-support-of-boris-yeltsin/5568288.Google Scholar

45 Robert Bridge, Election-meddling Fiasco Hits US-Russia Relations, Russia Today (Dec. 9, 2011), https://www.rt.com/politics/russia-us-elections-clinton-putin-2012-usaid-427/.Google Scholar