Hostname: page-component-586b7cd67f-2plfb Total loading time: 0 Render date: 2024-11-26T09:27:50.540Z Has data issue: false hasContentIssue false

Introduction to Symposium on Sovereignty, Cyberspace, and Tallinn Manual 2.0

Published online by Cambridge University Press:  22 August 2017

Tom Ginsburg*
Affiliation:
Leo Spitz Professor of International Law, Ludwig and Hilde Wolf Research Scholar, and Professor of Political Science, University of Chicago Law School, AJIL Board of Editors.
Rights & Permissions [Opens in a new window]

Abstract

Type
Introduction
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright
Copyright © 2017 by The American Society of International Law and Tom Ginsburg

In February 2017, a group of nineteen scholars, working as the International Group of Experts under the auspices of NATO's Cooperative Cyber Defense Centre of Excellence, released .Footnote 1 This followed Tallinn 1.0, released in 2013, which had focused more narrowly on the law of armed conflict and the question of cyber warfare. Tallinn 2.0 extends the project by grappling with cyber activities that do not rise to the level of the use of force or intervention, thresholds that trigger well-known bodies of international law.

This AJIL Unbound Symposium features contributions that address some of the major questions raised by the Manual, with a focus on the role of sovereignty. Just as cyberspace poses fundamental challenges to the territorial conception of the world order, so it also raises profound and interesting questions about core international legal concepts. It thus is of great interest to scholars and legal advisors alike.

Our symposium begins with Gary Corn and Robert Taylor, who have served as lawyers for the United States Department of Defense.Footnote 2 They take on the concept of sovereignty as applied by Tallinn 2.0 to cyber activities. Rule 4 of the Manual provides that states “must not conduct cyber operations that violate the sovereignty of another State.” Corn and Taylor emphasize that sovereignty is a principle of international law, but view it as one that only informs primary rules of conduct, rather than itself operating as a binding rule.

Michael Schmitt, a Professor of Public International Law at Exeter Law School and head of the Group of Experts, contributes a piece co-authored with Liis Vihul of the NATO Centre, who served as Managing Editor on the Tallinn 2.0 project.Footnote 3 They contest Corn and Taylor's vision of sovereignty as only serving as a principle, and demonstrate how and why the Tallinn Working Group considered it to be more operational, particularly in the cyber context.

In the third contribution to the symposium, Phil Spector, another member of the Tallinn Group of Experts, interrogates the doctrinal basis for the claim that sovereignty is a binding principle of international law.Footnote 4 This is one of the chief axes of disagreement between Corn and Taylor on the one hand and Schmitt and Vihul on the other. Surveying international law treatises and the decisions of international tribunals, he argues that there is ample evidence to assert that sovereignty is in fact a binding rule. He further argues that the rule covers actions that fall below the threshold that triggers the law of armed conflict, defending the position of the Manual.

Ahmed Ghappour, an Associate Professor at Boston University School of Law, calls on states to be more transparent with their views of the law, which might contribute to the further development of international custom.Footnote 5 He notes that the difficulties of attribution in the cyber context raise particular difficulties. A collateral consequence of states’ preference for secrecy and deniability in their own operations is the relative lack of public pronouncements when incidents do occur. States may also have genuine difficulty articulating standards that protect their domestic cyber infrastructure while allowing them to engage in their own cyber operations abroad. But, Ghappour argues, these patterns are based on incomplete assumptions about the scope of cyber activities, and there are opportunities for greater cooperation. He notes that states have common interests in hacking techniques used in law enforcement, which in an era of greater transboundary criminal activity could create more jurisdictional conflicts if left without a legal framework. He lays out some of the ways in which law enforcement might motivate states to produce standards in this area.

Altogether, the Tallinn 2.0 Manual reflects a careful effort to move international law forward in the challenging domain of cyberspace. This Symposium presents a debate that challenges us to continue thinking about these issues, but also raises more fundamental questions about the nature of principles and rules in international law, and the manner in which rules of customary international law are articulated.

References

2 Gary P. Corn & Robert Taylor, , 111 AJIL Unbound 207 (2017).

3 Michael N. Schmitt & Liis Vihul, , 111 AJIL Unbound 213 (2017).

4 Phil Spector, , 111 AJIL Unbound 219 (2017).

5 Ahmed Ghappour, , 111 AJIL Unbound 224 (2017).