Editing Scenario 05: State investigates and responds to cyber operations against private actors in its territory

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 39: Line 39:
 
'''[L1]''' The legal analysis begins with the attribution of the incidents to States A and B, continues with possible breaches of international obligations by State B (sovereignty, prohibition of intervention, due diligence obligation) and State A (sovereignty), and ends with a possible justification for State A's response (countermeasures).
 
'''[L1]''' The legal analysis begins with the attribution of the incidents to States A and B, continues with possible breaches of international obligations by State B (sovereignty, prohibition of intervention, due diligence obligation) and State A (sovereignty), and ends with a possible justification for State A's response (countermeasures).
   
=== Attribution ===
+
=== Attribution to State B ===
   
 
==== State organs and exercise of governmental authority ====
 
==== State organs and exercise of governmental authority ====
Line 67: Line 67:
 
'''[L9]''' There is no legal obligation to publicly provide evidence upon which State A attributes the cyber operation to State B, even though States sometimes do this as a matter of good policy.<ref>According to the UK Attorney General, "the UK can and does attribute malicious cyber activity where we believe it is in our best interests to do so, and in furtherance of our commitment to clarity and stability in cyberspace. Sometimes we do this publicly, and sometimes we do so only to the country concerned. We consider each case on its merits." (UK Attorney General, Jeremy Wright QC MP, '[https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century Cyber and International Law in the 21st Century]'.</ref>
 
'''[L9]''' There is no legal obligation to publicly provide evidence upon which State A attributes the cyber operation to State B, even though States sometimes do this as a matter of good policy.<ref>According to the UK Attorney General, "the UK can and does attribute malicious cyber activity where we believe it is in our best interests to do so, and in furtherance of our commitment to clarity and stability in cyberspace. Sometimes we do this publicly, and sometimes we do so only to the country concerned. We consider each case on its merits." (UK Attorney General, Jeremy Wright QC MP, '[https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century Cyber and International Law in the 21st Century]'.</ref>
   
=== Breach of an international obligation ===
+
=== Breach of an international obligation by State B ===
   
 
==== Sovereignty of State A ====
 
==== Sovereignty of State A ====

Please note that all contributions to International cyber law: interactive toolkit are considered to be released under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) (see International cyber law: interactive toolkit:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)