1. Introduction
Cyber incidents have become daily events; moreover, the coronavirus pandemic of 2020 triggered a significant growth in malicious cyber operations. For instance, the FBI reported about a 300 per cent increase in cyber security complaints just in the wake of the pandemic.Footnote 1 Only some of the cyber operations taking place around the world are suspected of being state-sponsored. In 2020 about 88 allegedly interstate operations, mostly espionage, were reported.Footnote 2 According to the Council of Foreign Relations, which has tracked significant cyber operations since 2005, 36 states are suspected of sponsoring cyber operations; in this list China, Russia, Iran and North Korea are designated as responsible for 77 per cent of all cyber operations of this type.Footnote 3
Responses from states that suffer from cyber operations include sanctions, the expulsion of diplomats, criminal indictments under domestic law and, rarely, openly announced ‘hacking back’. The timeline of sanctions following alleged interstate cyber operations contains at least 20 episodes.Footnote 4 It starts with the sanctioning by the US of North Korean entities and individuals arising from the cyber attack on Sony Pictures in January 2015,Footnote 5 and concludes with the US sanctions imposed against virtual currency mixer Tornado Cash in August 2022.Footnote 6
Apart from these episodes, the United States imposed sanctions on North Korea for an attack against crypto-currency exchanges in March 2020;Footnote 7 six Nigerians were sanctioned by the US for business email and romance fraud in June 2020;Footnote 8 the Iranian cyber group APT39, 45 associated individuals, and a front company, Rana Intelligence – which were designated as backed by the Iranian Ministry of Intelligence and Security – were sanctioned by the US for a series of cyber attacks in September 2020.Footnote 9 In addition, the US imposed sanctions against six Iranian individuals and one Iranian entity for alleged attempts to influence the 2020 US presidential election in November 2021.Footnote 10 That said, the greatest number of designations relates to sanctioning Russian individuals and entities, or actors in other jurisdictions (in particular, China), for their involvement in malicious activities conducted by Russian-based actors. US sanctions against Russian ‘cyber actors’ were imposed for the meddling in the US presidential elections in 2016,Footnote 11 the development and distribution of the Dridex malware by Evil Corp in 2019,Footnote 12 phishing campaigns against crypto-currency exchanges in September 2020,Footnote 13 cyber attacks that used Triton malware in October 2020,Footnote 14 the SolarWinds cyber attack and other malicious cyber activities in April 2021,Footnote 15 and the Kaseya incident in November 2021.Footnote 16 US President Biden considers cyber security to be the top priorityFootnote 17 and declared in April 2021 a national emergency to deal with the ‘unusual and extraordinary’ threat of malicious cyber-enabled activities against the US and its allies and partners.Footnote 18 Later, in September 2021, the Updated Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments was released as a part of broader US counter-ransomware strategy,Footnote 19 followed by sanctions imposed on the SUEX virtual currency exchange,Footnote 20 the darknet market Hydra Market, and the Garantex virtual currency exchange, all such entities allegedly being operated out of Russia.Footnote 21
The US, in 2018 and 2019, and the EU, in 2020, used targeted sanctions against Russian citizens and entities for the Petya and NotPetya ransomware,Footnote 22 and North Korean and Chinese citizens for the WannaCry virus.Footnote 23 The EU also imposed sanctions against the Main Centre for Special Technologies of the GRU (the military intelligence wing of the Russian armed forces) and four of its officers for the attempted cyber attack against the Organization for the Prohibition of Chemical WeaponsFootnote 24 and the alleged cyber attack on the Bundestag in October 2020,Footnote 25 and against two Chinese citizens and one legal entity for Operation Cloud Hopper in July 2020.Footnote 26 The UK applied the EU sanctions until the exit date, and implemented its own regime at least twice in March 2022, against (i) eight Russian individuals and one legal entity designated under the urgent procedure by means of a reference to the US decision to sanction these persons for the cyber attack on the Bundestag and spreading disinformation;Footnote 27 and (ii) a Russian-based research institution which was also earlier sanctioned by the US for an alleged cyber attack on a petro-chemical company in August 2017.Footnote 28 Even taking into consideration the average percentage of espionage operations, which are usually not followed by economic sanctions,Footnote 29 the use of this tool could have been conceived as an exception to the rule. However, should these statistics be juxtaposed with the number of cases where states that suffered from alleged interstate cyber operations officially attributed these malicious acts to other states and used other means of response, the role of sanctions becomes significant and is growing. The concept of targeted or ‘smart’ sanctions, which substituted the ‘comprehensive’ sanctions, was operationalised by the United Nations, as well as by the United States and later by other states, by 2010.Footnote 30 Targeted sanctions were used with varying degrees of success for different purposes, including ‘fight with terror’, compliance with the nuclear non-proliferation regime, non-constitutional changes of government, and respect for human rights. However, the question is why states resort to targeted sanctions to meet the threat of cyber intrusions. Is this type of response a forced measure or an effective tool to halt, prevent and punish attacking states?
In economic theory the term ‘sanctions’ generally refers to the deliberate ‘withdrawal, or threat of withdrawal, of customary trade or financial relations’, wherein ‘customary’ indicates those levels of trade and capital flows between the state imposing sanctions (the sender) and the targeted state (the target).Footnote 31 Alongside traditional forms of sanctions such as ‘trade-restricting policies between sovereign nations’Footnote 32 – which include boycotts, embargoes, tariffs and non-tariff barriers, export and/or import restriction such as quotasFootnote 33 – states may also resort to direct financial sanctions and impede the flow of capital, in particular by delaying or interrupting publicly funded loans or grants, or freezing assets controlled by the state that imposes sanctions.Footnote 34 Although sanctions can also take the form of restriction of movement of particular individuals (travel ban), they are predominantly of an economic or financial nature. Contemporary studies typically highlight the political nature and functions of sanctions: they are not viewed as a purely economic phenomenon to be assessed only from an economic perspective.Footnote 35 Sanctions are considered to be ‘politically motivated’Footnote 36 and can be imposed on private actors either working for or having strong ties with the government with the purpose of influencing the decision making of state authorities.Footnote 37
Economic sanctions are common in international politics, and the question of the effectiveness of this tool has been studied for decades. The most authoritative methodological basis for the assessment of the effectiveness of sanctions in general was by Hufbauer and co-authors,Footnote 38 who proposed guidelines for estimating the potential success of sanctions based on indicators that include policy goals and the security, as well as the political or other costs incurred by the sender.Footnote 39 A legal strand of sanction research is represented by inquiries that focus on the legal nature and legality of unilateral sanctions.Footnote 40 The legality of sanctions not authorised by the UN Security Council remains a grey area of international law,Footnote 41 dividing scholars into those who supportFootnote 42 and those who challenge it.Footnote 43 Studies have also been conducted on improving the legal regime and regulatory policies concerning sanctions.Footnote 44 However, sanctions taken in response to malicious cyber operations, although mentioned in general in a number of publicationsFootnote 45 or with respect to particular cases,Footnote 46 have not yet been discussed in detail in the legal literature.
This article contributes to the understanding of how the resort to and effectiveness of economic sanctions implemented in response to cyber operations can be assessed. The research is characterised by two key features. First, the analysis is informed by legal and political theories. The legal analysis represents a positivistic explanation of resorting to sanctions, which outlines the continuum of managerial and consensus-based approaches to the normative framework based on international law. This inquiry was underpinned by the opinions of states with regard to the legal qualification of cyber operations expressed at meetings of the UN Open-Ended Working Group (OEWG) held in 2019 and 2020, and written statements made at those meetingsFootnote 47 or articulated in other official documents. The political methods applied in this research include Mancur Olson's theory of groups and Francesco Giumelli's analytical framework for sanction assessment. Secondly, we address the question of the effectiveness of sanctions as a reaction to cyber activities using examples of the regulation introduced in the United States, the European Union and the United Kingdom, which are the most developed counter-cyber sanction regimes assisted with state practice of sanctions imposition.Footnote 48 The analysis is empirically based on a poll of 20 cases, when sanctions were imposed by the US, the EU and/or the UK in response to alleged interstate cyber operations. This dataset was collected from publicly available sources, including legal acts, press releases and statements available on the websites of the sanctioning states. Finally, we conclude by outlining the prospects for cyber-related sanctions on the basis of the interaction between the legal and extra-legal layers of their assessment.
2. Resort to sanctions from a legal perspective
From a legal perspective, sanctions adopted by states in response to cyber operations can take the form of either countermeasures or retorsions. A countermeasure is a means taken by an injured state to induce the state committing the wrongful act to comply with its obligations;Footnote 49 it presupposes that a cyber operation, as an initial act of injury, breaches international law and is subject to requirements, which include the proportionality and reversibility of the response, the ongoing character of the initial wrongful act, and a duty of notification.Footnote 50 A retorsion is defined as ‘unfriendly conduct which is not inconsistent with any international obligation of the state engaging in it’ and, being taken in response to an unfriendly act,Footnote 51 it does not necessitate the qualification of the cyber operation as violating any international legal obligation.
Sanctions taken by the US, the EU and the UK in response to cyber operations point to a clear tendency to shape them as acts of retorsion rather than countermeasures. This can be explained (not excluding the relevance of other perspectives) by different but interconnected legal reasons. There is difficulty in qualifying a cyber operation as an internationally wrongful act under the primary rules, and there is difficulty in applying secondary norms. The latter include international responsibility and countermeasures, and they presuppose the necessity to attribute a malicious cyber act committed by individuals to a particular state – a duty that has a requirement to reach the standard of proof applicable in international law.
2.1. The legal qualification of cyber operations: From managerialism to consensualism
The first set of problems concerns the legal qualification of cyber operations under lex lata. Potentially, interstate cyber operations can breach a number of primary rules, including the obligation to respect the sovereignty of other states, the principle of non-interference in domestic affairs, international human rights law, the prohibition against using force and, when such operations are conducted during an armed conflict, also norms of international humanitarian law. A legal obligation of ‘cyber due diligence’ – requiring states to ensure that ‘their territory is not used as a base for state or non-state hostile cyber operations against another state that cause serious adverse consequences with regard to a right of the target state’Footnote 52 – is still in a nascent form and, despite the positions of some states,Footnote 53 is widely considered lex ferenda.Footnote 54 The lex lata scope of obligations is constrained to the general duty of a state ‘not to allow knowingly its territory to be used for acts contrary to the rights of other States’, as formulated by the International Court of Justice (ICJ) in the Corfu Channel caseFootnote 55 and other positive obligations stemming from the no harm principle, international humanitarian law and international human rights law.Footnote 56 In comparison with this ‘patchwork’ of existing duties,Footnote 57 the application of the ‘cyber due diligence’ norm would have extended the scope of primary behaviour beyond the internationally wrongful acts to cover cyber operations with ‘serious adverse consequences’.
The stance that cyberspace is far from being a ‘wild west’ and is governed by non-cyber-specific norms of international law, and in particular the Charter of the United Nations,Footnote 58 is well represented in legal scholarshipFootnote 59 and – at least, as a matter of principle – affirmed by states.Footnote 60 However, even this level of abstraction is not free from disagreement.Footnote 61 The Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security was unable to adopt final reports in 2016–2017 because of the position articulated by Cuba,Footnote 62 and backed by RussiaFootnote 63 and China.Footnote 64 According to this, the applicability of jus ad bellum and jus in bello (international humanitarian law) may lead to the establishment of the ‘equivalence between the malicious use of [information and communication technologies] and the concept of “armed attack”’Footnote 65 under Article 51 of the UN Charter, and thereby militarise the use of and the response to information and communication technologies (ICTs). The same divergence was found in the positions of states expressed at the OEWG meetings in 2019 and 2020.Footnote 66 While the majority of states confirmed the applicability of international law in its entirety to cyberspace,Footnote 67 it was contested by a group of states that used arguments related to the importance of state consent for the extension of the scope of non-cyber-specific norms, indeterminate thresholds of ‘armed attack’ by cyber means, and the doubtful applicability of international humanitarian law to hybrid warfare and to civilian perpetrators of cyber attacks.Footnote 68 Some states took an intermediate position by appealing to the need to adopt new legally binding instruments.Footnote 69 In its report of 2021 the GGE finally acknowledged the applicability of international humanitarian law, but highlighted that these norms apply ‘only in situations of armed conflict’.Footnote 70 This acknowledgement is ambivalent, as the question of whether a particular operation with the use of ICTs can be qualified as ‘an armed conflict’ remains outside the brackets; hence this issue will continue to raise controversies in the future.
Apart from the question of whether it is uncontested, the question of how international law applies to cyberspace needs clarification. This clarification takes place in the ex cathedra managerial (or interventionist) form of the logical adaptation and the detailing of general norms by experts and scholars,Footnote 71 or originates from state behaviour in shaping either the lawmaking path or that of the interpretation of law (as the subsequent application of the relevant rules). The challenges underpinning the managerial path are well reported and lie either in the thresholds or in the limited scope of the application of lex lata, which lead to their under-inclusivity or inadequacy in respect of allegedly interstate cyber operations,Footnote 72 or in the contested applicability of general, non-cyber-specific rules in a cyber context. Taking into account recently articulated positions of states expressed officially at OEWG sessions and elsewhere, these challenges can be outlined as follows.
The application of the well-established principle of international law to respect sovereigntyFootnote 73 in cyberspace encounters not only the problem of the indeterminacy of its threshold and the scope of protected infrastructure,Footnote 74 but also a split in the official positions of different states with regard to the legal nature of this principle as giving rise to a rule or merely being a fundamental principle. The US and the UK articulated their positions that sovereignty is merely a principle, not a rule.Footnote 75 In contrast, France reserved a maximal wide approach, claiming that its sovereignty would be violated by any cyber attacks at ‘information systems located on its territory’ – including ‘equipment and infrastructure located on national territory; connected objects, logical components and content operated or processed via electronic communication networks which cover the national territory or from an IP address attributed to France’ and ‘domains belonging to national registers’.Footnote 76 The Netherlands explicitly articulated its position supporting the ‘sovereignty as a rule’ approach, appealing to the two-element test in Tallinn 2.0 and the necessity for a minimal threshold.Footnote 77 Finland expressed a comparable position at the first OEWG.Footnote 78
In contrast to sovereignty, the application of the non-interference principle to cyber operations is not contested by states; instead, problems arise from its material scope. This principle can be regarded as captured by the dichotomy between types of intervention, which states do not want to allow in respect of themselves and which they would like to be free to conduct in respect of others. Thus, at the international level, although not contesting the normativity of the non-interference principle, states reserved a very high level of abstraction for it and by the use of the two-pronged test elaborated in the ICJ judgment in the Nicaragua case of 1986Footnote 79 (which consisted of the element of coercion and an interference into domaine réservé) and apply a very broad grid to outlawed behaviour. Therefore, the non-interference principle, which was underinclusive in non-cyber operations, became extremely underinclusive in cyber operations.
There is a strong tendency in the legal literature to problematise the element of coercion as making the non-interference principle almost unworkable in the cyber context (for attacks having malicious or retaliatory aims cannot be qualified as coercive),Footnote 80 but there are also reasons to claim that the first element (domaine réservé) also significantly restricts the applicability of this principle to cyber operations. According to the Nicaragua test, a prohibited intervention must be one bearing on ‘matters in which each State is permitted, by the principle of State sovereignty to decide freely’.Footnote 81 The notion of domaine réservé was and remains bound with realisation by the state of its powers and competences, but cannot be regarded as a ‘shelter, fully covering entire areas of politics’.Footnote 82 For instance, although the election process falls within domaine réservé, this does not mean that all activities related thereto are protected by the non-interference principle. Elections belong to domaine réservé, but this covers only governmental functions related to this process. If we take US election meddling of 2016 as an example, this operation was multilayer, and such actions as reported attempts to hack voting machines, although apparently no votes were affected,Footnote 83 fall within domaine réservé. Other acts, arguably, do not. Among them are hacking by the so-called Cozy Bear and Fancy Bear hacking groups, the subsequent publication on WikiLeaks of the Democratic National Committee emails, hacking the account of John Podesta, chairman of Hillary Clinton's campaign, and a massive informational operation in social networks, based on the use of ‘bots’ and ‘trolls’. This example can serve as an illustration of the very modest role of the non-interference principle.
Application of jus ad bellum norms of international law is based on the two-threshold approach envisaged in the UN Charter in the duality of the ‘use of force’ and ‘armed attack’,Footnote 84 which was further supported by the ‘scale and effects’ doctrine elaborated by the ICJ in the Nicaragua case.Footnote 85 Although the military paradigm to treat interstate cyber operations received the bulk of attention,Footnote 86 the application of these norms to cyberspace is not free from controversy. The reason for this is not only the ever-used indeterminacy argument in respect of the threshold of ‘use of force’ and ‘armed attack’.Footnote 87 The commonly used logic of applying jus ad bellum to cyber operations is based on the acknowledgement that the prohibition of the use of force may be violated by any use of force, regardless of the type of weapon,Footnote 88 and is underpinned by the permissibility of the consequential use of the analogy with kinetic attacks (causing death, injury or the destruction of physical objects). However, the problem arises from the fact that the chain of consequences launched by a cyber operation might be significantly longer in comparison with the conventional use of force. Not challenging the fact that some cyber operations can take a military form, the use of that analogy can be overstretched to produce results that contrast the well-known refusal of the drafters of the Charter to understand ‘economic coercion’ as falling within the scope of prohibited behaviour.Footnote 89
The OEWG meeting held on 11 February 2020 reflected the affirmation of the applicability of the jus ad bellum norms of international law to cyber operations, underpinned by the consequential logic, as mainstream.Footnote 90 Four states expressed their concerns and doubts. Brazil and India underscored the lack of clarity in respect of the threshold of ‘use of force’ and ‘armed attack’, whereas Pakistan in general noted its concerns on the applicability of Article 51 of the UN Charter to cyber acts; Russia took the most stringent position that this provision can be applied in the context of an armed attack only, and that a cyber attack without this context does not meet this criterion.Footnote 91 Should one not doubt the soundness of the consequentialist approach, the majority of publicly known cyber operationsFootnote 92 do not reach the threshold of ‘use of force’ because of their low intensity.Footnote 93
This explains the desire of some states to extend the scope of the internationally prohibited ‘use of force’ by domestic efforts that count as an indication of state practice and opinio juris. France set forth that a ‘cyber operation without physical effects’ may also be qualified as the use of force and suggested using a not-exhaustive list of criteria – that is,Footnote 94
the circumstances prevailing at the time of the operation, such as the origin of the operation and the nature of the instigator (military or not), the extent of intrusion, the actual or intended effects of the operation or the nature of the intended target.
The Dutch Minister of Foreign Affairs articulated that ‘it cannot be ruled out that a cyber operation with a very serious financial or economic impact may qualify as the use of force’.Footnote 95 Finally, the UK Cyber Primer, although acknowledging the necessity for a cyber operation to cause ‘the same or similar effects as a kinetic attack’, in a footnote included a clarification permitting such a qualification for attacks, like ‘a sustained attack against the UK banking system, which could cause severe financial damage to the state, leading to a worsening economic security situation for the population’.Footnote 96
Turning to the applicability of jus in bello norms to cyber operations, can we truly celebrate that the states answer this question in the affirmative? To begin with, in almost all cases when the application of international humanitarian law is confirmed, we do not know in which source. For instance, 79 states have supported the Paris Call for Trust and Security in Cyber Space, which states laconically that international humanitarian law ‘is applicable to the use of information and communication technologies by States’.Footnote 97 A more or less detailed position has been represented by only a few states, which so far include Australia,Footnote 98 Germany,Footnote 99 the Netherlands,Footnote 100 the UK,Footnote 101 the US,Footnote 102 France,Footnote 103 Finland,Footnote 104 and Israel.Footnote 105
The argument of opponents is that the applicability of international humanitarian law will legitimise militarisation of cyberspace if taken per se, and seems to go against the whole history of the development of jus in bello norms. However, this rebuttal is convincing only if it implies a superficial meaning for the argument of militarisation. Another way is to read it as exposing that without a clear determination of borderlines between cyber operations as a ‘use of force’ or an ‘armed attack’ in jus ad bellum terms and an ‘attack’ or a ‘military operation’ in jus in bello terms, on the one hand, and cyber operations as (ordinary) malicious acts which may take place also during armed conflicts, on the other hand, the shift to international humanitarian law can lead to a misuse of a military legal paradigm of international law. So, at the end of the day it would be jus in bello instead of international human rights law, or national criminal law, which may be well based on numerous international treaties in this respect, as it is not something new when states are sheltering their activities and, on the basis of lex specialis, exclude the application of other regimes.
Finally, the affirmative approach – which is widely endorsed as progressive and pro-humanitarian – can serve to ignore the necessity to adopt cyber-specific norms of international law, although the international humanitarian law regime is full of loose ends and general notions that cannot be seen as self-executing in the cyber context. Hence, the application of international humanitarian law can overstretch such norms, for their material content and design are not tailored for cyberspace.
A collective affirmation of the applicability of international humanitarian law to cyber operations can also lead to disappointment as, besides applicability in abstracto, what deserve close scrutiny are the questions of whether international humanitarian law norms are relevant, adequate and sufficient to deal with military types of cyber operation. There can be identified, at least, three problematic issues. First, what can be highlighted is the scarcity of international humanitarian law provisions applicable to ‘military operations’, even in international armed conflicts. It forms a problem as the majority of cyber operations will not reach the threshold of the international humanitarian law notion of ‘an attack’, and will be qualified as ‘military operations’, if at all. Under Articles 51(1) and 57(1) of the First Additional Protocol the duties of the parties to international armed conflicts are too general and laconic in imposing the general protection of the civilian population and constant care. Let us use France as an example, once again. The French Ministry of Defence has articulated a broad approach to the ‘use of force’ and considered cyber operations without physical damage as falling within this notion, but in the end it had nothing more to do than to admit that ‘most operations, including offensive cyberwarfare operations carried out by France in an armed conflict situation, remain below the attack threshold’ and ‘they remain governed by general principles of IHL’.Footnote 106
The second problem arises when states try to circumvent the limitations of the scope of ‘an attack’ under jus in bello by stretching this notion to embrace more types of cyber operation. For instance, in his remarks of 10 November 2016, US legal adviser Brian Egan opined that, although ‘not all cyber operations rise to the level of an “attack” as a legal matter under the law of armed conflict’, it is still possible to determine such cyber operation as an attack, ‘considering, among other things, whether a cyber activity results in kinetic or non-kinetic effects, and the nature and scope of those effects, as well as the nature of the connection, if any, between the cyber activity and the particular armed conflict in question’.Footnote 107 The use of this method will result in an objective inapplicability of international humanitarian law provisions dedicated to ‘attacks’, simply because they are thought and designed to govern kinetic operations.
The third problem connected with the applicability of international humanitarian law to cyber operations originates from the fact that perpetrators of cyber attacks can be in different densities of alliance with the state or a non-governmental party to the armed conflict. Combined with the different nature of cyber operations, this fact can render the rules and concept of ‘direct participation of hostilities’ in its different incarnations reflected in legal scholarship and jurisprudenceFootnote 108 underinclusive. This outcome results from either a very strict connection with the party to the conflict with regard to classification as a combatant or member of the armed forces, or groups in non-international armed conflicts, or from the requirement of the kinetic-like harm, direct causation, or in some cases a belligerent nexus.
The application of another set of norms – international human rights law – to alleged interstate cyber operations is also theoretically possible in respect of cyber operations, which, inter alia, can intrude into privacy, freedom of expression and association (following the concept of ‘human rights online’).Footnote 109 However, this is dependent on the extent to which the norms of the human rights treatiesFootnote 110 can be applied extraterritorially.Footnote 111 Since the UN Human Rights CommitteeFootnote 112 and later the ICJFootnote 113 admitted a disjunctive approach to the reading of the ‘within its territory and subject to its jurisdiction’ clause of the International Covenant on Civil and Political RightsFootnote 114 and the European Court of Human Rights (ECtHR) has elaborated spatial (control over the territory or a limited spaceFootnote 115) and personal approaches (control and authority over the individualsFootnote 116) to the notion of ‘jurisdiction’,Footnote 117 contained in the Convention on the Protection of Human Rights and Fundamental Freedoms (ECHR), it is possible to extend the application of these treaties to extraterritorial modes of data interception.Footnote 118 At least three cases adjudicated by the ECtHR prove that this is not a purely hypothetical scenario: Weber and Saravia v Germany,Footnote 119 Liberty v United Kingdom,Footnote 120 and Big Brother Watch and Others v United Kingdom.Footnote 121
Nonetheless, extending the scope of international human rights instruments to extraterritorial cyber operations does not predetermine the results of the application of material human rights norms. It is especially relevant in the case of individual (targeted) interception of data or in cases of mass surveillance. The judgments given by the ECtHR Chambers in 2018 in two cases – Centrum för Rättvisa v Sweden Footnote 122 and Big Brother Watch and Others v United Kingdom Footnote 123 – acknowledged that mass surveillance per se does not violate the ECHR. As the Court put it, ‘the decision to operate a bulk interception regime in order to identify hitherto unknown threats to national security’ falls within the wide ‘margin of appreciation’ that states enjoy in choosing ‘how best to achieve the legitimate aim of protecting national security’.Footnote 124 While not outlawing the mass surveillance in the Big Brother Watch case, the Chamber rendered a very detailed judgment, which, alongside paving the way for similar cases in the future, was designed to provide the governments of the Members of the Council of Europe with a ‘road map’ for the legal regulation of the mass interception of data.Footnote 125 On 6 October 2020 the Grand Chamber of the Court of Justice of the European Union (CJEU) delivered two judgments on requests for preliminary rulings in Privacy International v Secretary of State for Foreign and Commonwealth Affairs and Others and La Quadrature du Net and Others v Premier Ministre and Others. The Court in these cases found that the general and indiscriminate retention and transmission of traffic data by providers of electronic communications services to a state authority violated EU law.Footnote 126 However, according on the judgment of the ECtHR Grand Chamber, the enhanced level of international protection of privacy can remain applicable only for the 27 member states of the EU.
Against the backdrop of the problematic application of the lex lata non-cyber-specific provisions, the lawmaking path to concretise how international law applies to cyberspace does not currently play a significant role. First, the overwhelming majority of states at present prefer not to create any new legally binding instruments.Footnote 127 Explicitly articulated grounds for this include references to the sufficiency of the current ‘strategic framework’ for regulating the cyber sphereFootnote 128 or to the danger that the creation of new legally binding instruments will undermine or create uncertainty in respect of existing instruments,Footnote 129 lack of state practiceFootnote 130 or consensus among states,Footnote 131 or the lengthy character of international lawmaking, which contrasts with the speed of technological developments.Footnote 132 Only a minority of states preferred lawmaking,Footnote 133 some of which did so with the reservation that they consider the development of new binding norms as a medium to long-term objective.Footnote 134
Secondly, standard setting – which is a mainstream track at this stage should we consider the content of the standards endorsed by the UN General Assembly, both in its initial (11 non-binding norms of responsible state behaviour)Footnote 135 and in its extended (13 norms)Footnote 136 version – has not brought any ‘added value’ to the qualification of malicious cyber acts compared with existing rules.Footnote 137 This standard-setting track may be important and justified as a political instrument to reaffirm the applicability of international law to cyber-specific interstate relations, but by its substance it is legally tautological in the sense that it does not change anything in the assessment of the legality of interstate cyber operations. Standards that may be relevant for setting the boundaries of outlawed cyber activities are constrained by the reference to lex lata international law and, as a general safeguard, these ‘norms do not seek to limit or prohibit action that is otherwise consistent with international law’.Footnote 138
Thirdly, in interstate relations, states that suffer from cyber attacks tend not to use the language of international law even in situations which could have been qualified as a breach of its rules. States employ either political rhetoric – calling them a ‘cyberwar’,Footnote 139 ‘cyberattacks with a significant effect which constitute an external threat to the [European] Union or its Member States’Footnote 140 or by referring to international law in general terms. These terms are far from being a concrete legal qualification – for example, by designating such incidents as a ‘flagrant disregard of international law’Footnote 141 or ‘international norms’;Footnote 142 or pointing out that they undermine ‘established international norms of behavior’.Footnote 143 Two cases can be regarded as exceptions to the rule: (i) Georgia alleged that the cyber attacks of 2019 infringed its sovereignty,Footnote 144 and (ii) the US declared in April 2021 that cyber operations allegedly conducted by the Russian government were ‘efforts’ ‘to violate well-established principles of international law, including respect for the territorial integrity of states’.Footnote 145
2.2. The attribution of cyber operations to states: A cautious mode
Although the applicability of the secondary rules of international law on the responsibility of states for cyber operations, in contrast to the primary rules, does not encounter any principal objections from states, the challenge lies in the necessity to attribute malicious cyber acts committed by individuals to a particular state under international rules of customary law, which also goes in conjunction with a duty to reach any of the standards of proof applicable in international law.Footnote 146 Taking into account the specificity of cyber infrastructure,Footnote 147 it might be of no surprise that states hastened to safeguard the notion that ‘[they] should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences’, at least as a non-binding ‘norm of responsible State behavior’.Footnote 148
After publicly articulated, although later disavowed, allegations of Russian involvement in the Estonian cyber attacks of 2007,Footnote 149 it was only in 2014 that states started to officially link malicious cyber acts with agencies or officials of particular states, and these allegations have recently become more frequent. These official statements or acts that imposed sanctions pointed to three states: North Korea,Footnote 150 RussiaFootnote 151 and Iran.Footnote 152 Although the EU also imposed sanctions against Chinese nationals for Operation Cloud Hopper in 2020, it did not officially link them to the state.Footnote 153
Until now no state has ever officially called another state responsible for an international cyber operation. The approach taken by states regarding the attribution of cyber operations is typically formulated very cautiously. Let us take an example of the condemnation of cyber attacks allegedly committed by Russia against Georgia. Both Georgia and the UK framed their statement as exposing the author of the attacks and as a condemnation of this behaviour without using the language of the law of international responsibility.Footnote 154 Although the United States and Canada called on Russia to cease such behaviour, they did not qualify such behaviour legally as a breach of international law.Footnote 155 The US pointed to the Russian Foreign Intelligence Service (SVR) in one of the recent cases of sanctions, calling it ‘the perpetrator of the broad-scope cyber espionage campaign that exploited the SolarWinds Orion platform and other information technology infrastructures’.Footnote 156 The EU, joining the condemnation campaign, expressed its concern and that of its Member States about the cyber attack, without saying a word about Russian involvement,Footnote 157 or, without its own assessment, carefully expressed solidarity with the US on the impact of the ‘the SolarWinds cyber operation, which, the United States assesses, has been conducted by the Russian Federation’.Footnote 158
The current trend of ‘cautious attribution’ is characterised by two main features. First, public exposure of the organiser of a malicious cyber act is not linked to a breach of a particular rule of international law. Secondly, these acts are not accompanied by the disclosure of evidence that meets at least one of the standards that may be applicable under international law. For instance, whereas the UK National Cyber Security Centre relied on the assessment ‘with high confidence’ that the GRU was ‘almost certainly responsible’, which is ‘95%+’ for a list of cyber operations,Footnote 159 this evidence remained undisclosed.Footnote 160 Thus, ‘cautious attribution’ reflected a ‘name and shame’ mode and did not represent attribution for the purposes of calling a particular state responsible.
To sum up, the legal considerations outlined in this part of the article expose the necessity for victim states to walk a line between the difficulties connected with the proof and legal qualification of cyber operations, on the one hand, and their desire to punish perpetrators and sponsors and deter further intrusions, on the other. While the instruments provided by international law either cannot be used at all or can hardly be used, unilateral sanctions taking the form of retorsion remain one of the accessible instruments for victim states. When imposing national or supranational sanctions, states are not bound by the standards of proof and the duty to reveal evidence set forth by international law.Footnote 161 The scope of cyber acts that trigger sanctions can be extended to operations which are not necessarily linked to particular foreign states and lie below the threshold of behaviour outlawed at the international level.Footnote 162 Finally, sanctions can be taken in respect of malicious cyber operations that did not necessarily affect the target state; this significantly extends opportunities for a reaction in comparison with the locus standi under the law of international responsibility, providing non-injured states with the right to react only in the case of a violation of obligations of an erga omnes or erga omnes partes character.Footnote 163
3. The US, the EU and the UK counter-cyber sanction regimes and their implementation
The very first episode of cyber-related sanctions occurred in January 2015, when 10 individuals and three entities associated with the North Korean government were sanctioned by the United States under Executive Order 13687 as a result of the Sony Pictures hacking attack.Footnote 164 Three months later, on 1 April 2015, President Obama issued Executive Order 13694, which declared a national emergency to address the ‘unusual and extraordinary threat to the national security, foreign policy, and economy of the United States’ constituted by the ‘increasing prevalence and severity of malicious cyber-enabled activities originating from, or directed by persons located, in whole or in substantial part, outside the United States’.Footnote 165 This Order provided for blocking property located in the US which belongs to persons engaged in or responsible for significant malicious cyber activities; denial of access to US financial markets; prohibiting the provision of funds, goods or services to the sanctioned persons; and denial of entry into the US.Footnote 166 This Executive Order was amended in 2016 to impose sanctions for meddling in the 2016 US presidential elections on two Russian intelligence services, four members thereof, and three companies.Footnote 167
The US cyber-related sanction regime was further codified and supplemented by the Countering America's Adversaries Through Sanctions Act (CAATSA) of 2017. CAATSA imposes new sanctions in respect of Iran, Russia and North Korea, and provides for sanctions related to Russian ‘activities undermining cybersecurity’.Footnote 168 The scope of sanctions contemplated by CAATSA is similar to those authorised in the Executive Orders, although the wording of these enactments differs as CAATSA contains a more detailed description of possible sanctions. The Executive Order sanctions imposed by the Obama administration also remained in effect after CAATSA came into force.
The Biden administration tightened the cyber-related sanctions regime with regard to Russia. Executive Order 14024 and the relevant directive of the Treasury's Office of Foreign Assets ControlFootnote 169 provide for the new sanctions designations and the new prohibitions alongside traditional property blocking and travel bans. US financial institutions are prohibited from (i) participating in the primary market for ruble or non-ruble denominated bonds issued after 14 June 2021 by Russia's Central Bank, National Wealth Fund, and Ministry of Finance; and (ii) lending ruble or non-ruble denominated funds to these three Russian entities.Footnote 170 The measure, however, does not restrict transactions on the secondary market with bonds issued by the named Russian entities.Footnote 171
The EU cyber-related sanctionsFootnote 172 regime is based on a Council DecisionFootnote 173 and the corresponding EU Regulation of 17 May 2019,Footnote 174 which is an act of direct application for all member states. The designation and delisting of persons under sanctions is exercised by the CouncilFootnote 175 in order ‘to ensure consistency with the process for establishing, amending and reviewing’Footnote 176 the annex in which the sanctioned persons are named. The Council is to review the sanction list at least once a year.Footnote 177 Member states specify national authorities that are entitled to authorise, under certain conditions, the release of certain frozen funds and economic resources,Footnote 178 and exchange information related to the implementation of the Regulation with each other and with the EU Commission.Footnote 179 Member states stipulate penalties for infringement of the EU Regulation of 17 May 2019 in such a manner that such penalties were ‘effective, proportionate and dissuasive’.Footnote 180 The legal nature of these penalties can be administrative, civil or criminal, with a range of measures from fines to imprisonment.Footnote 181
The adoption of EU Regulation 2019/796 of 17 May 2019 was specifically promoted by the UKFootnote 182 and the Netherlands,Footnote 183 who were reported to have suffered from significant cyber hacking. The introduction of the Regulation expanded the sanctions toolkit available to the EU and constituted a move from the Cyber Diplomacy Toolbox of 2017 to a legally binding instrument.Footnote 184 The measures that the EU may impose are restricted to preventing the entry of the sanctioned persons into territories of EU member states and the freezing of assets.
The UK implemented the EU sanctions until Brexit, and replaced the EU sanctions regime with its own regime on the exit date when the Cyber (Sanctions) (EU Exit) Regulations 2020 fully came into force.Footnote 185 The power to designate persons involved in cyber activities is vested in the Secretary of State.Footnote 186 Similar to the EU regime, the UK Cyber Regulations 2020 contemplate financial sanctions (asset freezing, prohibiting dealing with sanctioned persons and making funds available to them),Footnote 187 as well as immigration sanctions (travel bans and the cancellation of effective permission to stay in the UK).Footnote 188
All three cyber-related sanction regimes have a number of common features. They are based on the use of targeted, or smart, sanctions as opposed to ‘comprehensive’ sanctions. The regimes contain rather vague and broad definitions of the cyber activities that trigger sanctions and of the criteria for designating persons on whom sanctions should be imposed. At the same time, the approach used in CAATSA – designating ‘significant activities undermining cybersecurity against any person, including a democratic institution, or government’ or are ‘owned or controlled by, or act or purport to act for or on behalf of, directly or indirectly’ by such personFootnote 189 – is wider than the European approach. EU Regulation 2019/796 confines ‘cyber-attacks’ to those that ‘have (or potentially may have) a significant effect on the EU or its member states, in particular to their critical infrastructure, public services (transportation, banking, healthcare, drinking water supply and others), critical state functions such as defence and governance’.Footnote 190 The understanding of cyber-enabled actions is very close in EU Regulation 2019/796 and the UK Cyber Regulations 2020 (access to information systems, interference with information systems, data interference, and data interception).Footnote 191 However, the EU regulation qualifies such actions as cyber attacks if they originate or are carried out from outside the EU and harm the EU or its member states,Footnote 192 while the UK regulations adopt a broader approach: cyber activities are considered a cyber attack if they have consequences not only in the UK but also in any other country, or affect ‘a significant number of persons in an indiscriminate manner’.Footnote 193 Contrary to the US and the EU regimes, the UK Cyber Regulations 2020 do not respond explicitly to external threats and do not focus on the condition that the malicious activities should be conducted or controlled from outside the country.
What differentiates the EU cyber-related sanctions is the procedure for imposing sanctions. US sanctions can be enabled by a stroke of the US President's pen under CAATSA, and the designation of persons sanctioned under Executive Orders falls within the competence of the Secretary of the Treasury. UK sanctions are imposed by the relevant Secretary of State. In the EU, listing and delisting of persons and entities lies within the exclusive jurisdiction of the Council, which should act on the basis of unanimity.Footnote 194 The requirement of unanimity seems to be the main reason why decisions to impose cyber-related sanctions have been taken only twice so far: the objection of particular member states to the imposition of sanctions, considering their political significance, is often motivated by economic ties with the state from which the malicious cyber-enabled actions allegedly originate.
A comparison of cyber-related sanctions with other multilateral and unilateral sanction regimes reveals a number of similarities, as well as a few differences. The econometric studies of smart sanctions reveal that the key determinants of their effectiveness are the target's costs of imposing the sanction, the salience of the issue at stake for the target, the multilateral or unilateral nature of the sanctions regime, endorsement of the sanctions by an international institution, and the institutional structure of the target state and political vulnerability of its regime.Footnote 195 According to these parameters, sanctions in response to cyber attacks possess a combination of features that distinguish them from other regimes. In particular, the existence and amount of costs associated with designing, implementing, monitoring, reflecting and correcting sanctions determine the fact that only significant trespassing and cyber threats are penalised, although the total burden of all threats is felt by society. Therefore, imposing sanctions for the most significant attacks may be attributed de facto to the number of attacks, thus redistributing the costs for the most prominent violators or alleged violators.
Estimations of costs incurred by targets and senders vary (they refer mostly to comprehensive rather than smart sanctions, and present significantly different results). The western economic sanctions imposed on Russia as a result of the Ukraine crisis were particularly subject to calculation. In November 2014, Anton Siluanov, Russia's Finance Minister at the time, estimated Russia's annual losses as a result of geopolitical sanctions at around $40 billion; meanwhile, losses caused by falling oil prices reached as much as $90 billion to $100 billion per year.Footnote 196 The agrifood embargo introduced by Russia as a ‘counter-sanction’ and the decline in volume of Russian–European trade caused sufficient damage to the EU and the economies of some of its member states: the estimation carried out by WIFO in 2016 indicates a sanction-induced decline of EU exports to Russia in 2015 of about EUR 20 billion, or a 0.2 per cent loss in total value added (EUR 17.6 billion) and employment (400,000 jobs) for the EU as a whole.Footnote 197 Estimating the impact of the economic sanctions on the economies of the sender and target is challenging, as it requires distinguishing the sanction-induced economic costs from those caused by other factors (such as oil prices).
At the same time, the imposition of sanctions in response to cyber attacks so far seems not to have led to substantial costs for the target states. When sanctions are imposed in the coercive logic, the key benefit for the sender is a change in the target's behaviour in line with the sender's demands (the target's ‘costs’ – economic losses – are not necessary ‘benefits’ for the sender). In the case of constraining sanctions, the costs that the target incurs in carrying on the opposed actions might be considered benefits for the sender. The example of sanctions against Russian individuals and their affiliate companies, however, raises concerns about whether the measures employed actually influence the behaviour of Russia in cyberspace. The absence of any evidential signs of such an influential role of cyber-related sanctions inclines towards the conclusion of their predominantly signalling function, as will be discussed below.
There are some similarities between cyber-related sanctions and other sanctions regimes. By their nature, the US and UK regimes are unilateral; the EU regime represents one of a multilateral, institutionalised nature. At the same time, the possibility of the US imposing secondary sanctions on those who violate the primary sanctions (even if this is a purely hypothetical scenario), together with an overlap between the US and the EU sanctions regimes in response to cyber attacks, allows the former to benefit from the advantages of both unilateral and multilateral formats. What also significantly distinguishes this type of targeted sanction is the salience of the issue at stake. The ability of target states to conduct covert cyber operations, taking into account their low costs and significant effects, makes the salience extremely high.
4. How to measure the effectiveness of sanctions
Since January 2015, the US, and later the EU and the UK, have sanctioned more than 200 individuals and legal entities from North Korea, Russia, Nigeria, Iran and China for cyber hacking. The scale of cyber threats (including presumably those emanating from these countries) has not diminished over the past six years. However, it would be premature to suggest that cyber-related sanctions are not effective as such without having established how to measure their effectiveness. Sanctions, although having primarily economic content, have always been a political issue.Footnote 198 Realising the danger of a biased approach to their assessment caused by the political beliefs of the researchers, we suggest looking at the effectiveness of cyber-related sanctions – namely, their ability to reach the goals of their imposition – from two different approaches: Mancur Olson's theory of groups, and Francesco Giumelli's comprehensive analytical framework for the assessment of sanctions.
4.1. Identifying the goals of the imposition of cyber-related sanctions
Before proceeding to the evaluation of the effectiveness of sanctions as a response to cyber operations, it is instructive to address the objectives of sanctions, of which there are three generally acknowledged goals: (i) coercion (modifying the target's behaviour); (ii) constraint (reducing the target's capacity to take discretionary action); and (iii) signalling and/or stigmatising (notifying the target and, in some cases, third parties of the sender's intended course of action if the target continues the objectionable behaviour).Footnote 199 The assessment of their effectiveness consists of the analysis of how they achieve the goal(s) intended by the sender.
Both the policymaking on general (non-cyber) sanctions and the scientific discussion around such political responses are based largely on the assumption that the main purpose of sanctions is to change the target's behaviour.Footnote 200 While the US cyber-related sanctions instruments (namely, Executive Order 13694, Executive Order 14024, CAATSA) do not indicate any objectives in implementing sanctions, except for the necessity to respond to cyber incidents that threaten national security, political documents issued in relation to sanctions imposition in some cases shed light on the sender's intentions. Thus, the Fact Sheet published by the White House in connection with the adoption of Executive Order 14024 indicates the explicit intention of the Biden administration to ‘signal that the United States will impose costs in a strategic and economically impactful manner on Russia if it continues or escalates its destabilizing international actions’.Footnote 201 The EU Council states in its Sanctions Guidelines a different aim: to coerce the target to change its objectionable course of action.Footnote 202 According to the Council, the EU imposes restrictive measures ‘to bring about a change in policy or activity by the target country, part of the country, government, entities or individuals, in line with the objectives set out in the [Common Foreign and Security Policy] Council Decision’.Footnote 203 The particular legal instruments that implement sanctions are intended, in general, to incentivise the required change in the target's policy or activity and, at the same time, clearly indicate the specific objective of the imposed restrictive measures in line with the general goal of coercion.Footnote 204 Interestingly, the EU Regulation 2019/796 indicates the necessity ‘to deter and respond to cyber-attacks’ as the goals of establishing the framework for EU targeted cyber security-restrictive measures.Footnote 205 The goals of the EU cyber-related sanctions regime, at least as they are stated in the applicable policy tools, are not limited to coercion but include also constraining and deterrent effects. The UK Cyber Regulations 2020 do not specify the goal of sanctions imposition, while the relevant guidance rather cautiously formulates it as ‘prevention of relevant cyber activity’.Footnote 206
Although coercion could be among the major reasons for the imposition of sanctions, travel restrictions imposed on particular individuals or limitations on commercial relations with them have a limited coercive impact on the states that are accused of orchestrating cyber operations. It is doubtful that North Korean citizens or Russian intelligence officers have substantial assets in the US, the EU or the UK, or participate in commercial activities with the relevant counterparties.Footnote 207 It is questionable whether Russia, China, Iran or North Korea (even if we presume that these states actually stood behind the relevant cyber operations) would abstain from further acts of that nature because of targeted sanctions imposed on a number of individuals.
The objective of constraining the targets in their capacity to engage in further malicious cyber-enabled activities can be achieved if the sanctioned persons are deprived of assets required for their activities or continuing their malicious activities becomes too costly for them. Raising awareness of the target's cyber-enabled activities probably contributes to the constraining effect of sanctions. When imposing sanctions on the Iranian cyber threat group APT39 in September 2020, the US Department of the Treasury and FBI advisory released particular sets of malware employed by a front company, allegedly controlled by the Iranian Ministry of Intelligence and Security, to conduct cyber intrusions against foreign citizens, companies, institutions and governments globally.Footnote 208 By making the code public, the US authorities aimed to hinder ‘the ability [of the Iranian Ministry of Intelligence and Security] to continue their campaign, ending the victimization of thousands of individuals and organizations around the world’.Footnote 209 That said, none of the episodes of sanctions analysed contemplates the seizure of computers or server systems for obvious reasons: in the case of external cyber attacks, they can be located on the territory of a third party state or their location might not be established at all. Another aspect of constraining – the limitation of sources of financing by denying access to US capital markets and financial institutions – also has a limited impact. North Korean hacking groups or Russian security services are unlikely to use sources of funding from abroad (in particular, because of restrictions in national legislation). The denial of access to foreign capital, therefore, would not significantly raise the costs of the targets’ activities in cyberspace.
The sanctions associated with cyber operations send certain signals to the targeted actors and the states of their residency, as well as to third parties. The signals can differ: from ‘naming and shaming’ to the articulation of a principal position on the inviolability of international norms in cyberspace. The rhetoric around sanctions also enhances the significance of the signalling and stigmatising role of the sanctions. As an example, the imposition of sanctions on the Russian intelligence agencies GRU and FSB, and a number of their officers and affiliated companies, was accompanied by evaluative, often quite harsh, statements at various levels. Republican senators John McCain and Lindsey Graham in their joint statement said: ‘Ultimately, [the sanctions] are a small price for Russia to pay for its brazen attack on American democracy’,Footnote 210 while President Obama pointed out that ‘[t]he United States and friends and allies around the world must work together to oppose Russia's efforts to undermine established international norms of behaviour, and interfere with democratic governance’.Footnote 211 Moreover, the stigmatising targeted sanctions may precede prosecution, including criminal, under the national law of the state with which the sanctioned individual is associated. Thus, in January 2022 the Russian agency FSB dismantled REvil,Footnote 212 a notorious hacking group believed to mastermind ransomware hacks against Colonial Pipeline and Kasey, which caused the imposition of US sanctions.Footnote 213 The arrest of 14 members of the hacking group followed several requests by the US administration, and President Biden's appeal to President Putin to cooperate in fighting cyber attacks and ransomware when the two met in Geneva in June 2021.Footnote 214
The coercive and constraining effects of cyber-related sanctions are limited, which in certain cases is acknowledged by the states that impose the sanctions. Following a massive cyber attack against multiple US federal agencies from March to December 2020,Footnote 215 allegedly originating from Russia,Footnote 216 US President-elect Biden's team called for a ‘strong response’ that should go ‘beyond sanctions’.Footnote 217 The choice of the new administration, apart from financial sanctions, could include revenge cyber attacks on Russian institutions and potentially cut off Russia from the SWIFT system of international funds transfers and bank communication.Footnote 218
The limited prospects to coerce and constrain the target by way of sanctions do not mean that the policy of sanctions in response to cyber attacks is itself a failure; nor does the primary signalling role make sanctions a symbolic gesture. It is essential, however, that the assessment of sanction effectiveness is conducted with a consideration of their objectives. Research carried out by the Targeted Sanctions Consortium (TSC), headed by Thomas Biersteker, in respect of general (rather than cyber-related) sanctions, indicates that ‘sanctions intended to constrain or to signal targets are nearly three times as effective (27 per cent) as sanctions intended to coerce a change in behaviour (10 per cent)’.Footnote 219 In the absence of statistically significant data on cyber-related sanctions it does not seem possible to conduct a similar calculation in relation to them. Still, as the studies on general sanctions show, the significance of the objectives of sanctions should not be underestimated.
4.2. Mancur Olson's theory of groups
The theory of collective action and group behaviour developed by Mancur OlsonFootnote 220 is among the most promising for the assessment of the effectiveness of sanctions. The taxonomy of groups suggested by Olson (including small and large, or ‘latent’, groups, depending not only on the number of their participants but also the benefit that each member obtains from the collective good and the importance of their contribution to the group objective) can be used in the context of cyber sanctions. Among 20 cases of cyber-related sanctions, there is a special group of US sanctions imposed not on perpetrators, legal entities or institutions, but on an elite group. Following the adoption of CAATSA in August 2017, the US Congress instructed the Trump administration to prepare and deliver a list of Russia's ‘most significant senior foreign political figures and oligarchs … as determined by their closeness to the Russian regime and their net worth’ with an obligatory ‘assessment of the relationship between individuals’ and ‘President Vladimir Putin or other members of the Russian ruling elite’, and the measurement of their corruption.Footnote 221 The list was intended to become the basis for a new package of sanctions against Russia for alleged election meddling and interference in Ukraine's internal affairs. As a result of the administration efforts, the notorious ‘Kremlin Report’ was released in January 2018. It included the names of the top officials of the Russian government and the presidential administration (almost all top officials except for the President himself) and 96 billionaires on the Forbes list. The imposition of sanctions against the entire political and economic elite of Russia was neither possible nor reasonable, and sanctioning under the ‘Kremlin Report’ remained an idle threat until April 2018 when sanctions were imposed against six Russian oligarchs ‘with ties to Putin as well as to the Russian government’Footnote 222 for ‘profiting from’ malicious cyber activities allegedly conducted by the Russian authorities.Footnote 223 The sanctioning was accompanied by harsh rhetoric: ‘The Russian government operates for the disproportionate benefit of oligarchs and government elites’, said US Treasury Secretary, Steven Mnuchin, in March 2018; ‘Russian oligarchs and elites who profit from this corrupt system will no longer be insulated from the consequences of their government's destabilizing activities’.Footnote 224 It was openly admitted that the sanctions were aimed to reach President Putin's inner circle: ‘Today's sanctions send a clear message to Putin and his cronies that there will be a high price to pay for Russia's … attempts to undermine Western democracies, including our own’, McCain said.Footnote 225
The upper echelons of the targeted state's political elite could be viewed in line with the theory of Mancur Olson as a small group with a properly defined stimulus system punishing those who deviate from group profit-maximising behaviour.Footnote 226 Participants of a small group have common interests, economic and social incentives, and each is aware of this commonality of interests and of the degree of their contribution towards their achievement. When the number of participants is large, and the group obtains the features of a latent group, its typical participants recognise that they cannot make a noticeable contribution to any group effort or influence the outcome in any way.Footnote 227 Consequently, they have little incentive to contribute (which constitutes the ‘free rider’ problem). On the contrary, there is no free rider problem in small and well-organised groups in which the members, at less cost, can observe whether any individual contributes or deviates, and impose sanctions on the deviating party. It is empirically proven that in a variety of constituencies – either private or public, including national states – ‘action taking’ groups and subgroups tend to be much smaller than ‘non-action taking’ groups and subgroups.Footnote 228 These well-organised action-taking groups and subgroups have a significant advantage over the poorly organised, latent masses and have a better negotiating position.
Economic sanctions imposed on key businesspersons of Russia can be viewed in the light of Olson's theory as an attempt by the US administration to use financial leverage against Russian political and business elites to alter their incentives in the communication with the Russian government. The economic pressure on persons close to the Russian upper echelons is presumably based on the beliefs that (i) the sanctioned persons have ‘ties’ with the government and personally with the President; (ii) they represent an interest group consolidated with common economic incentives; and (iii) they influence the decision-making process in the target country.
Based on the assumption that the group can exert pressure either in favour of or against the continuation of the policy of malicious cyber activities, the sanctioning state might seek to make it more costly to support such a policy. The distinct way is to make the group face the decrease in income resulting from sanctions. There are publicly available calculations of the economic impact of sanctions on the business and wealth of targeted persons. The losses of Oleg Deripaska, a major shareholder of United Co RUSAL PLC (Rusal), one of the world's largest aluminium producers, are calculated by Forbes as $3.1 billion,Footnote 229 while Deripaska himself indicated losses of more than $7.5 billion, or approximately 81 per cent of his net wealth, in the lawsuit against the US Department of Treasury.Footnote 230
That said, the assessment of the effectiveness of sanctions should not be narrowed down to numbers. Kaempfer and Lowenberg use a threshold model of collective action to examine the ways in which external economic pressure influences the political potency of elites within the target country.Footnote 231 One of the mechanisms described is an ‘increase in reputational benefits awarded to individuals who support certain domestic interest groups, by increasing the effectiveness of those groups in rewarding their supporters with selective incentives’ produced by foreign sanctions.Footnote 232 The post factum analysis shows that neither the elite group has rallied around the flag, nor the malicious activity in cyberspace ascribed to Russia has somewhat decreased significantly as a result of sanctioning oligarchs. It questions the extent to which the circle of businesspersons on whom sanctions were imposed actually represents part of the ‘action-taking’ subgroup and influences the decision-making process, as well as the capacity of sanctions to encourage opposition to the cyber-related policy, either through a decrease in income or reputational costs. Examples of elite reactions to other sanction regimes – including the withdrawal of several of Russia's richest people from Russian citizenship after February 2022 under unprecedented sanctions pressure – suggest that economic sanctions per se have such a potential. However, the introduction of cyber-related sanctions in 2018 did not have such an effect, which leads to the assumption that the degree of establishment of the link between the weakening financial position of Russian oligarchs and the potential limits of alleged Russian malicious cyber activities is insufficient.
4.3. Francesco Giumelli's four-step analysis
The four-step process of evaluating the impact of sanctions designed by Francesco GiumelliFootnote 233 represents a comprehensive analytical framework suitable for the assessment of cyber-related sanctions.Footnote 234 Understanding the logic of sanctions is at the heart of Giumelli's approach. Considering the potential goals of sanction implementation (coercion, constraint and signalling, as discussed above), assessing their success is built on the determination of whether imposing sanctions adds value to the sender in these three dimensions.
The first step of the analysis is to identify the position of sanctions in the context of the sender's overall foreign policy.Footnote 235 As sanctions are implemented alongside other political tools, the objective of the first step is to determine their relative significance in the entire foreign policy of the sender. The study of episodes of cyber-related restrictive measures shows that sanctions are integrated into the overall political response. In the episode related to the meddling in the US 2016 presidential elections, the US, in conjunction with implementing sanctions, also designated 35 Russian intelligence operatives located in the Russian embassy in Washington and the consulate in San Francisco as personae non gratae and ordered them to leave the country within 72 hours; access to Russian compounds in New York and Maryland was denied as they were claimed to be used ‘for intelligence-related purposes’;Footnote 236 ten personnel were expelled from the Russian diplomatic mission in Washington following the adoption of Executive Order 14024 in April 2021.Footnote 237 Indictments of Korean hackers claimed to be involved in the attack against Sony Pictures not only indicated the willingness of US authorities to prosecute those individuals criminally, but also revealed that North Korean citizens and intelligence groups have become subjects of long-standing and timely FBI forensic analysis.Footnote 238 When sanctions are considered in the overall context of the sender's reaction to cyber-enabled actions, it creates obstacles to separating the effect caused by sanctions and to evaluating their contribution to the achievement of the sender's objectives.
The second step is to draw out the logic of sanctions.Footnote 239 Two indicators of ex ante analysis are taken into consideration: (i) the expected direct impact of the sanctions, and (ii) the feasibility of demands. If the sender's goal is to impose material costs on the target (for instance, to make any line of behaviour that differs from the line required by the sender too costly for the target), then coercive and constraining sanctions would be more efficient than those of a signalling nature. Otherwise, if the sender does not expect to have a material impact on the sender, signalling sanctions are the preferable choice. Travel bans – one of the two most common restrictive cyber-related measures in the US, the EU and the UK regimes – do not entail any significant material costs on the targets. Asset freezes might have material impact if the sanctioned persons actually possess assets or economic resources within the jurisdiction of the sender (which is presumably not the case with most cyber-related sanctions applied to date, except for the sanctions against Russian oligarchs). Constraining business operations between the sanctioned persons and US residents might entail either direct costs for the targets (for example, when they had effective commercial contracts at the time of sanction imposition) or indirect costs (the loss of expected profits), but again this is rarely relevant for the known episodes of sanctioning in response to cyber hacking. The second factor – the feasibility of demands – indicates the possibility of the target's compliance with the sender's demands. The feasibility of demands in Giumelli's concept appears to be a distinctive feature of coercive sanctions as opposed to constraining sanctions: imposing coercive measures means that the target has freedom to decide whether to comply with the sender's demands, and ‘this voluntary decision that does not affect their [targets’] political existence’.Footnote 240 When sanctions are imposed in the logic of constraining, the targets generally do not have this freedom of choice: they have to change their behaviour as prescribed by the sender. In the case of cyber-related sanctions, the feasibility of demands seems to be a secondary factor of the ex ante analysis as cyber-related sanctions tend to be mostly of a signalling and stigmatising nature rather than coercive or constraining.
The third step of the analysis is an ex post estimation of the sanctions’ impact and effects,Footnote 241 the assessment of their factual consequences – intended or not. This evaluation often includes a cost-benefit analysis, but should not be limited to this. Although sanctions can have a calculable material impact, the assessment of their effectiveness should also include an analysis of effects other than economic costs, the first of which are the political consequences of sanctions. Thus, President Trump, who openly opposed the adoption of CAATSA, argued that the US Congress was making a mistake in introducing new sanctions against Russia. ‘Our relationship with Russia is at an all-time & very dangerous low’, he wrote on Twitter.Footnote 242 The authoritative Carnegie Endowment for International Peace estimates US-Russian relations to be ‘at the lowest point since the Cold War’ with no ‘signs that the relationship will improve in the near future’.Footnote 243 The US sanctions policy, in particular the episode related to Russia's alleged meddling in the 2016 presidential elections, has undoubtedly contributed to the growing tension in relations between the two states.
Finally, the fourth step is to consider possible alternative tools to sanctions, taking into account the specifics of the situation in which they have been applied.Footnote 244 This analysis estimates whether sanctions were the sender's best choice in the particular circumstances. It seeks to understand whether ‘sanctions bring about effects that could not have been caused by other foreign policy tools and at a minor cost’.Footnote 245 The imposition of cyber-related sanctions can be associated with certain costs for the sender (both in a strictly economic sense, meaning losses incurred by the sender, and in a political sense, that is the weakening of power positions and/or an increase in political risks). Still, sanctions remain a readily accessible instrument. However, the widespread practice of imposing sanctions can limit the further use of this measure: according to US National Security Advisor Robert O'Brien, the US has imposed so many sanctions against Russia and Iran that it has little opportunity left to impose new sanctions, and must look at other possible deterrents.Footnote 246
The analytical framework developed by Giumelli represents a nuanced approach to the assessment of sanction effectiveness in comparison with the mainstream assessment. Although changing the target's behaviour can be among the sender's objectives, it is not the only one. An estimation of the impact of sanctions through the lens of their goal(s) might provide a clearer understanding of the position of sanctions amid other foreign policy tools and their relative, as opposed to absolute, impact.
5. Concluding remarks: Prospects for cyber-related sanctions
Starting with the application of a positivistic legal approach to the question of why states make use of the tool of targeted, or smart, sanctions in response to the threat of malicious cyber operations, we have demonstrated that states are being pushed to resort to self-help, and sanctions represent one of its forms. States are pushed to its application by the conundrum of problems surrounding the legal basis for the qualification of the initial malicious cyber operation as a breach of international law and, consequently, a possible appeal to the law of international responsibility in response to it. In contrast, national or supranational law on sanctions – as in the cases of the US, the EU and the UK – provides the possibility to extend the scope of cyber activities for almost all types of cyber act without looking back to the issues of the applicability, normativity and thresholds of non-cyber-specific rules of international law in cyberspace. The use of sanctions helps to avoid the duty to disclose evidence and connect the perpetrators with a concrete state, and provides freedom from the pressure of the standards of proof applicable in international law.
However, the comfort of using this instrument to fight malicious cyber operations allegedly sponsored by other states, being below the threshold of international law, is not unlimited. The scope of measures, which may be used as a response, is restricted because once sanctions themselves breach the international legal obligations of the sending states, they may be legal only if they either meet all criteria set forth for counter measures or fall within one of the defences provided by the law of international responsibility. Abuse of sanctions – which can stream from each of its elements, including the scope of the malicious acts, the designation of the sanctions’ targets, and the determination of the volume and length of the restrictions – may involve a spiral of sanctions and counter-sanctions, provided that they can be deployed with comparable speed and volume by the targeted state. Therefore, there is an incentive for senders not to go too close to the ‘red lines’ set by international law or exploit its immanent indeterminacy. The increasing popularity of sanctions will, although as a by-product, raise the inevitable question of the permissibility of cyber sanctions (sanctions consisting of the use of cyber means), and this could motivate states to strive for normativity in cyberspace.Footnote 247
The use of extralegal analytical tools in the assessment of the efficiency of cyber-related sanctions has revealed their limited capacity to coerce targets to modify their behaviour or to constrain them by reducing their potential to conduct new operations. Though the use of cyber-related sanctions has not led to any visible changes in the number and intensity of malicious cyber acts, these restrictive measures are efficient in fulfilling the purpose of signalling to the alleged organiser of the cyber operation and third parties of the sender's intended course of action, as well as stigmatisation.
To achieve these aims, states should take into consideration a number of general and cyber-specific factors. Among them, first of all, is the risk that economically designed sanctions may inflict economic costs on many states (and not only on the sender and target states). Secondly, empirical studies on ‘general’ (rather than cyber-related) economic sanctions reveal that they lose much of their effectiveness after the first and second year, which accounts for 55 per cent of successful sanction episodes,Footnote 248 as a result of adjustment by the target to the restrictions caused by the sanctions. As the process of adjustment and the reallocation of capital requires time, and as targeted states tend to adjust their economies under sanctions irrespective of the grounds for their implementation, the gradual decline of sanction-caused damage is relevant for cyber-related sanctions. Thirdly, the effectiveness of sanctions is contingent on their credibility and consistency; this stresses the impact of due procedure, the sufficiency of evidence, legal certainty and the predictability of imposing sanctions, which is a crucial psychological factor.Footnote 249 Fourthly, the impact of cyber-related sanctions should be measured in conjunction with other tools, which include various acts of reaction in the realm of diplomacy, the initiation of criminal cases against individual perpetrators, and political statements. The overall context of the sender's foreign policy and the stance of third-party states are also to be taken into consideration.
Funding statement
The article was prepared within the framework of the Academic Fund Program at the National Research University Higher School of Economics (HSE University), Moscow (Russia) in 2020 (Grant No 20-04-020) and within the framework of the Russian Academic Excellence Project ‘5-100’.
Competing interests
The authors declare none.