•  
  •  
 
International Law Studies

Authors

Abstract

We might expect international law to specifically address cyber attribution requirements due to the significance of attribution in framing the legal responsibility of States and the boundaries of responsive actions by victim States. However, there is little international law of cyber attribution, and what law there is exists largely by implication. Likewise, there is only a murky and highly contested law of State responsibility that theoretically constrains the vast majority of State-sponsored cyberattacks. Because victim States cannot engage in countermeasures unless they attribute a cyberattack to a State, attribution can serve simultaneously to constrain and empower victim States. However, the lack of a common understanding about whether cyber attribution is required—much less what evidence suffices for attribution of a cyberattack for international law purposes—combined with the absence of consensus legal rules to limit cyber intrusions, has helped render the entire international legal response to cyberattacks weak and largely ineffective. Going forward, States and the international community should support public cyber attributions and address what legal or evidentiary standards must be met to attribute responsibility for a cyberattack to a State. A viable cyber attribution regime is a missing but key component for States to overcome the Wild West cyber environment that we live in.

html

Share

COinS
 

Accessibility Request

Some items in this repository were created or digitized prior to implementation of the accessibility standards under the Rehabilitation Act of 1973 and are preserved in their original, unmodified state for research, reference, or historical recordkeeping. In accordance with the ADA Title II Final Rule, the College provides accessible versions of archival materials upon request. To request a version of a file or resource, please submit an Accessible File Request Form.