Cyber Attribution and State Responsibility
Cyber Attribution and State Responsibility
Cyber Attribution and State Responsibility
State Responsibility
William Banks
Volume 97 2021
William Banks∗
CONTENTS
1039
International Law Studies 2021
I. INTRODUCTION
1. Marc Ambinder, Did America’s Cyber Attack on Iran Make Us More Vulnerable?, THE
ATLANTIC (June 5, 2012), https://www.theatlantic.com/national/archive/2012/06/did-
americas-cyber-attack-on-iran-make-us-more-vulnerable/258120/ (calling the U.S. cyberat-
tack a “history-making development” and “the most sophisticated state-sponsored cyber
attack in the history of civilization”).
1040
Cyber Attribution and State Responsibility Vol. 97
1041
International Law Studies 2021
4. Przemysław Roguski, Russian Cyber Attacks Against Georgia, Public Attributions and Sov-
ereignty in Cyberspace, JUST SECURITY (Mar. 6, 2020), https://www.justsecurity.org/69019/
russian-cyber-attacks-against-georgia-public-attributions-and-sovereignty-in-cyberspace/
(citing twenty States accusing Russia of cyber operations against Georgia as evidence that
“more—especially European—States are willing to adopt public attributions”); see also Da-
vid E. Sanger & Marc Santora, U.S. and Allies Blame Russia for Cyberattack on Republic of Georgia,
NEW YORK TIMES (Feb. 21, 2020), https://www.nytimes.com/2020/02/20/world/eu-
rope/georgia-cyberattack-russia.html (“Neither the United States nor its allies released any
evidence used to establish how they tied the attacks to the G.R.U. That made it easier for
the Russian Foreign Ministry to deny that Moscow was behind the assault.”); Davis II et al.,
supra note 3, at 2; Thomas Grove & Ann M. Simmons, Russian Agency at Center of U.S. Hacking
Indictment Has Long Operated in the Shadows, WALL STREET JOURNAL (July 14, 2018),
https://www.wsj.com/articles/russian-agency-at-center-of-u-s-hacking-indictment-has-lo
ng-operated-in-the-shadows-1531599417#:~:text=Russian%20Agency%20at%20Center%
20of%20U.S.%20Hacking%20Indictment,a%20visit%20to%20its%20Moscow%20head-
quarters%20in%202006.
5. See, e.g., Jack Goldsmith, Uncomfortable Questions in the Wake of Russia Indictment 2.0 and
Trump’s Press Conference With Putin, LAWFARE (July 16, 2018), https://www.lawfare-
blog.com/uncomfortable-questions-wake-russia-indictment-20-and-trumps-press-confer-
ence-putin. The United States and China did reach an understanding in 2015 prohibiting
commercial cyber espionage following the U.S. indictment of five People’s Liberation Army
officers for such behavior. China’s commitment, however, appears to have been more a
response to domestic politics, and was—in any case—short-lived.
6. Andrzej Kozlowski, Comparative Analysis of Cyberattacks on Estonia, Georgie and Kyrgyz-
stan, 3 EUROPEAN SCIENTIFIC JOURNAL 237, 242–243 (2014); John Markoff, Before the Gun-
fire, Cyberattacks, NEW YORK TIMES (Aug. 12, 2008), https://www.nytimes.com/ 2008/
08/13/technology/13cyber.html.
7. Jack Goldsmith & Robert D. Williams, The Failure of the United States’ Chinese-Hacking
Indictment Strategy, LAWFARE (Dec. 28, 2018), https://www.lawfareblog.com/failure-united-
states-chinese-hacking-indictment-strategy; Jonathan Kaiman, China Reacts Furiously to US
Cyber-Espionage Charges, GUARDIAN (May 20, 2014), https://www.theguardian.com/world/
2014/may/20/china-reacts-furiously-us-cyber-espionage-charges.
8. Goldsmith & Williams, supra note 7; Kaiman, supra note 7.
1042
Cyber Attribution and State Responsibility Vol. 97
1043
International Law Studies 2021
sharing any evidence, told the BBC that North Korea was responsible. 16 By
mid-December, the United States, United Kingdom, Australia, Canada, New
Zealand, and Japan issued coordinated statements attributing the WannaCry
actions to North Korea. 17 In a press briefing, White House Homeland Secu-
rity Advisor Thomas Bossert stated that the United States “do[es] not make
this allegation lightly. We do so with evidence, and we do so with partners.” 18
No affirmative actions were taken until June 2018, when the United States
brought criminal charges against North Korean citizen Park Jin Hyok, who
was alleged to be a member of “a government-sponsored hacking team.” 19
Hyok was charged with working for “a North Korean government front
company . . . to support the [North Korean] government’s malicious cyber
actions,” which included those of WannaCry. 20 Three months after the
charges were brought, the U.S. Treasury Department sanctioned Hyok. 21
16. Dan Bilefsky, Britain Says North Korea Was Behind Cyberattack on Health Service, NEW
YORK TIMES (Oct. 27, 2017), https://www.nytimes.com/2017/10/27/world/europe/uk-
ransomware-hack-north-korea.html.
17. Thomas P. Bossert, It’s Official: North Korea Is Behind WannaCry, WALL STREET JOUR-
NAL (Dec. 18, 2017), https://www.wsj.com/articles/its-official-north-korea-is-behind-
wannacry-1513642537; Press Release, U.K. Foreign & Commonwealth Office, Foreign Of-
fice Minister Condemns North Korean Actor for WannaCry Attacks (Dec. 19, 2017),
https://www.gov.uk/government/news/foreign-office-minister-condemns-north-korean-
actor-for-wannacry-attacks; Greta Bossenmaier, Communications Security Establishment,
CSE Statement on the Attribution of WannaCry Malware, GOVERNMENT OF CANADA (Dec. 19,
2017), https://cse-cst.gc.ca/en/information-and-resources/announcements/cse-statement
-attribution-wannacry-malware (noting Canada’s agreement with attribution of WannaCry
to North Korea); Joint Media Release, Australia Ministry for Foreign Affairs, Attributing
the ‘WannaCry’ Ramsomware to North Korea (Dec. 20, 2017), https://www.foreignminis-
ter.gov.au/minister/julie-bishop/media-release/attributing-wannacry-ramsomware-north-
korea; New Zealand Concerned at North Korean Cyber Activity, NATIONAL CYBER SECURITY
CENTRE (Dec. 20, 2017), https://www.ncsc.govt.nz/newsroom/new-zealand-concerned-
at-north-korean-cyber-activity/; Press Release, The U.S. Statement on North Korea’s
Cyberattacks, MINISTRY OF FOREIGN AFFAIRS OF JAPAN (Dec. 20, 2017), https://
www.mofa.go.jp/press/release/press4e_001850.html.
18. White House, Press Briefing on the Attribution of the WannaCry Malware Attack
to North Korea (Dec. 19, 2017), https://trumpwhitehouse.archives.gov/briefings-state-
ments/press-briefing-on-the-attribution-of-the-wannacry-malware-attack-to-north-korea-
121917/.
19. Criminal Complaint, United States v. Park Jin Hyok, No. MJ 18-1479 (C.D. Cal.
June 8, 2018), https://www.justice.gov/opa/press-release/file/1092091/download.
20. Id.
21. Press Release, Treasury Targets North Korea for Multiple Cyber-Attacks, U.S. DE-
PARTMENT OF THE TREASURY (Sept. 6, 2018), https://home.treasury.gov/news/press-re-
leases/sm473.
1044
Cyber Attribution and State Responsibility Vol. 97
22. Press Release, Treasury Sanctions North Korean State-Sponsored Malicious Cyber
Groups, U.S. DEPARTMENT OF THE TREASURY (Sept. 13, 2019), https://home.treasury.
gov/news/press-releases/sm774.
23. Nicole Perlroth et al., Cyberattack Hits Ukraine Then Spreads Internationally, NEW YORK
TIMES (June 27, 2017), https://www.nytimes.com/2017/06/27/technology/ransomware-
hackers.html.
24. White House, Statement from the Press Secretary (Feb. 15, 2018), https://
trumpwhitehouse.archives.gov/briefings-statements/statement-press-secretary-25/.
25. David E. Sanger et al., Russia Targeted Investigators Trying to Expose Its Misdeeds, Western
Allies Say, NEW YORK TIMES (Oct. 4, 2018), https://www.nytimes.com/2018/10/04/us/
politics/russia-hacks-doping-poisoning.html.
26. Former Russian Spy Poisoned by Nerve Agent on Door of Home in England, Police Say,
CNBC, https://www.cnbc.com/2018/03/29/ex-russian-spy-skripal-poisoned-by-nerve-
agent-on-door-of-home.html (last visited July 13, 2021); Opinion, Peeling Away Russia’s Lies
About the Downed Malaysia Airlines Flight, WASHINGTON POST (June 20, 2019),
https://www.washingtonpost.com/opinions/global-opinions/peeling-away-russias-lies-
about-the-downed-malaysia-airlines-flight/2019/06/20/611a7a1c-92b6-11e9-aadb-
74e6b2b46f6a_story.html; Russian Envoy Rejects Reports of Cybercrimes, ASSOCIATED PRESS
Oct. 4, 2018, https://apnews.com/article/hacking-winter-olympics-ap-top-news-olympic-
games-international-news-f267a56952704de6bdddadac6193f854?utm_source=twitter&ut
m_medium=ap&utm_campaign=socialflow.
1045
International Law Studies 2021
27. Int’l Law Comm’n, Draft Articles on Responsibility of States for Internationally Wrongful
Acts with Commentaries, 56 U.N. GAOR Supp. No. 10, art. 2, cmt. ¶ 12, U.N. Doc. A/56/10
(2001), reprinted in [2001] 2 Y.B. Int’l L. Comm’n 26, U.N. Doc. A/CN.4/SER.A/
2001/Add.1 (Part 2), https://legal.un.org/ilc/documentation/english/reports/a_56_10
.pfd; see also Martha Finnemore & Duncan B. Hollis, Beyond Naming and Shaming: Accusations
and International Law in Cybersecurity, 31 EUROPEAN JOURNAL OF INTERNATIONAL LAW 969,
985–90 (2020).
28. Good background on the technical challenges of attribution may be found in
Thomas Rid & Ben Buchanan, Attributing Cyber Attacks, 38 JOURNAL OF STRATEGIC STUD-
IES 4, 14–23 (2015).
1046
Cyber Attribution and State Responsibility Vol. 97
have stymied efforts to clarify what international legal rules apply when cyber
operations target civilians and their infrastructure below the use of force
threshold and outside of armed conflicts.
As a result, some States use cyber tools to strike with impunity, knowing
(or at least strongly suspecting) that their digital attacks will either not
prompt a response or lead to a response that is no more than the “naming
and shaming” that goes on in the diplomatic world and in the media. Mean-
while, the threats to infrastructure and extraction of data and intellectual
property by cyber means continue at great cost to governments and private
industry. We now know that increasingly sophisticated forms of offensive
hacking are capable of causing more significant harm, even catastrophic
damage, such as shutting down financial systems, sabotaging critical infra-
structure, and scrambling communications. 29 These continuing threats make
knowing and attributing the source of the cyber intrusion especially im-
portant so that States and the international community can respond accord-
ingly.
In addition, the inability to identify the source of a cyberattack potentially
increases the risks of confusion and escalation. When the United States re-
leased an unclassified summary of its Department of Defense Cyber Strategy
in September 2018, attention focused on its commitment to “defend forward
to disrupt or halt malicious cyber activity at its source, including activity that
falls below the level of armed conflict.” 30 Yet some see “defending forward”
as putting the U.S. military on an offensive, rather than defensive, footing.
The recent shift in U.S. cyber policy deepens a cyber variant on a classic
security dilemma between States: as one State takes steps to defend itself in
cyberspace, it inadvertently threatens other States with what appears to be
offensive action. In practice, “defending forward” can look like attacking
forward to those experiencing an intrusion. One implication is an increased
29. See, e.g., Jordan Robertson & Michael Riley, Mysterious ’08 Turkey Pipeline Blast Opened
New Cyberwar, BLOOMBERG (Dec. 10, 2014), https://www.bloomberg.com/news/arti-
cles/2014-12-10/mysterious-08-turkey-pipeline-blast-opened-new-cyberwar; 10 Catastrophic
Cyberattacks From 2019, ARTIC WOLF (Dec. 23, 2019), https://arcticwolf.com/re-
sources/blog/10-catastrophic-cyberattacks-from-2019 (listing significant cyberattacks in
2019).
30. U.S. Department of Defense, Cyber Strategy Summary 1 (2018), https://media.de-
fense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_STRATEGY_SUMMARY_FI-
NAL.PDF.
1047
International Law Studies 2021
In July 2020, in the midst of the global coronavirus pandemic, the U.S., Brit-
ish, and Canadian governments accused Russia of using cyber means in at-
tempts to steal intelligence on vaccines from universities, companies, and
other health care organizations. 32 According to the NSA, the group of hack-
ers known as both APT29 and Cozy Bear (the same group implicated in the
2016 Democratic National Committee break-ins into Democratic Party serv-
ers) attempted to exploit the chaos created by the pandemic. 33 The attacks
were, of course, conducted in secret with malware that disguised its origins.
Despite these new public accusations, the uncertain attribution of the
cyberattacks to Russia made it easy for Russia to deny responsibility.
A few days later, the Justice Department accused two Chinese hackers
of trying to acquire vaccine research on behalf of China’s intelligence ser-
vice. 34 Despite the outrage expressed in some quarters that the Russians and
Chinese would use digital tools to hack Western research into coronavirus
vaccines, cyber experts cautioned that this form of cyber espionage—even if
clearly attributed (it has not been)—is neither authorized nor forbidden by
international law. 35
31. Ben Buchanan & Robert D. Williams, A Deepening U.S.-China Cybersecurity Dilemma,
LAWFARE (Oct. 24, 2018), https://www.lawfareblog.com/deepening-us-china-cybersecu-
rity-dilemma; Robert Chesney, An American Perspective on a Chinese Perspective on the Defense
Department’s Cyber Strategy and ‘Defending Forward,’ LAWFARE (Oct. 23, 2018), https://
www.lawfareblog.com/american-perspective-chinese-perspective-defense-departments-cy
ber-strategy-and-defending-forward.
32. Julian E. Barnes, Russia is Trying to Steal Virus Vaccine Data, Western Nations Say, NEW
YORK TIMES (July 16, 2020), https://www.nytimes.com/2020/07/16/us/politics/vaccine-
hacking-russia.html.
33. Id.
34. Julian E. Barnes, U.S. Accuses Hackers of Trying to Steal Coronavirus Vaccine Data for
China, NEW YORK TIMES (July 21, 2020), https://www.nytimes.com/2020/07/21/us/pol-
itics/china-hacking-coronavirus-vaccine.html.
35. In contrast, an executive order issued by President Trump in 2020 confers on the
Central Intelligence Agency authorities that open the door to expansive hacking activities,
1048
Cyber Attribution and State Responsibility Vol. 97
Meanwhile, in late June and early July of 2020 explosions did significant
damage to advanced nuclear centrifuges at Natanz in Iran. 36 It remains un-
clear whether the destruction was caused by an explosive device planted in
the heavily guarded facility or was instead the product of a cyberattack that
triggered a gas line explosion. Although Iranian officials and many in the
media assumed that Israel was behind this latest attack on the Iranian nuclear
initiative, Israel denied involvement. 37 Like the 2010 Stuxnet malware, the
2020 attacks on Iranian centrifuges may have constituted a use of force at
international law, and thus a clearer assignment of the rights and responsi-
bilities of the involved States, whichever they turn out to be, is needed. 38 In
any case, the absence of agreed-upon standards for attribution means that
the perpetrator will not suffer legal consequences.
Around the same time, despite years of fears about potential life-threat-
ening cyberattacks from Russia, Iran, or North Korea that could resemble a
“cyber 9/11” or “cyber Pearl Harbor,” the first cyberattack directly linked to
a death came from common criminals. In September 2020 an ailing woman
was turned away from a hospital in Dusseldorf, Germany, that was in the
grips of a ransomware attack. She died on the way to another hospital. 39
Then, further illustrating the technical and practical challenges in attrib-
uting cyberattacks, in January and February 2021 news media reported that
Russia and China executed major cyber operations against the networks of
U.S. companies and government agencies. Both were apparently espionage
operations designed to give foreign intelligence agencies access to sensitive
including disrupting foreign elections, energy services, or financial transactions that run di-
rectly counter to international norms that the United States has long advocated for cyber-
space. Zach Dorfman et al., Secret Trump Order Gives CIA More Powers to Launch Cyberattacks,
YAHOO NEWS (July 15, 2020), https://www.yahoo.com/now/secret-trump-order-gives-
cia-more-powers-to-launch-cyberattacks-090015219.html. The 2020 executive order imple-
ments broad authorization provided by Congress in 2018 to give the Central Intelligence
Agency broad powers to conduct actions in cyberspace without White House prior approval
when targeting Russia, China, Iran, and North Korea.
36. Iran Nuclear: Natanz Fire Caused ‘Significant’ Damage, BBC NEWS (July 5, 2020),
https://www.bbc.com/news/world-middle-east-53300579.
37. Borzou Daragahi, Israel Speculated to be Behind Mysterious Explosion at Iranian Nuclear
Site, INDEPENDENT (July 6, 2020), https://www.independent.co.uk/news/world/middle-
east/iran-nuclear-explosion-israel-natanz-a9603976.html.
38. See Kristen E. Eichensehr, The Law and Politics of Cyberattack Attribution, 67 UCLA
LAW REVIEW 520, 582 (2020).
39. German Hospital Hacked, Patient Taken to Another City Dies, AP NEWS (Sept. 17, 2020),
https://apnews.com/article/technology-hacking-europe-cf8f8eee1adcec69bcc864f2c4308
c94.
1049
International Law Studies 2021
40. David E. Sanger et al., White House Weighs New Cybersecurity Approach After Failure to
Detect Hacks, NEW YORK TIMES (Mar. 14, 2021), https://www.nytimes.com/2021/03/
14/us/politics/us-hacks-china-russia.html.
41. Nicholas Weaver, The Microsoft Exchange Hack and the Great Email Robbery, LAWFARE
(Mar. 9, 2021), https://www.lawfareblog.com/microsoft-exchange-hack-and-great-email-
robbery.
42. Sanger et al., supra note 40.
43. On April 15, 2021, the White House attributed the SolarWinds cyberattack to the
Russian foreign intelligence service and announced the official response. White House, Fact
Sheet: Imposing Costs for Harmful Foreign Activities by the Russian Government (Apr.
15, 2021), https://www.whitehouse.gov/briefing-room/statements-releases/2021/04/15/
fact-sheet-imposing-costs-for-harmful-foreign-activities-by-the-russian-government/;
Press Release, Treasury Sanctions Russia with Sweeping New Sanctions Authority, U.S. DE-
PARTMENT OF THE TREASURY (Apr. 15, 2021), https://home.treasury.gov/news/press-re-
leases/jy0127.
44. Dmitri Alperovitch & Ian Ward, The White House Responded to the Chinese Hacks of the
Microsoft Exchange Servers This Week. Is It Enough?, LAWFARE (July 21, 2021), https://
1050
Cyber Attribution and State Responsibility Vol. 97
Lacking an international legal regime for attribution and thus for State
responsibility, in recent years victim States have often retaliated for cyber
intrusions with their own cyberattacks. For example, experts and U.S. gov-
ernment officials believe that as retaliation for suspected U.S. and Israeli
cyberattacks, Iran has targeted American financial institutions, a major Las
Vegas casino, a dam in the New York City suburbs, and the water supply
system in Israel. 45 There has been no formal attribution of these attacks by
Iran, just as the attacks on Iranian centrifuges were not attributed.
www.lawfareblog.com/white-house-responded-chinese-hacks-microsoft-exchange-servers
-week-it-enough.
45. Tracy Connor & Tom Winter, Iranians Charged With Cyber Attacks of U.S. Banks, Dam,
NBC NEWS (Mar. 24, 2016), https://www.nbcnews.com/news/us-news/iranians-charged-
hacking-attacks-u-s-banks-dam-n544801; Jose Pagliery, Iran Hacked an American Casino, U.S.
Says, CNN (Feb. 27, 2015), https://money.cnn.com/2015/02/27/technology/secu-
rity/iran-hack-casino/index.html; Joby Warrick & Ellen Nakashima, Foreign Intelligence Offi-
cials Say Attempted Cyberattack on Israeli Water Utilities Linked to Iran, WASHINGTON POST (May
8, 2020), https://www.washingtonpost.com/national-security/intelligence-officials-say-at-
tempted-cyberattack-on-israeli-water-utilities-linked-to-iran/2020/05/08/f9ab0d78-9157-
11ea-9e23-6914ee410a5f_story.html.
46. William F. Lynn III, Defending a New Domain: The Pentagon’s Cyberstrategy, 89 FOREIGN
AFFAIRS 97, 99 (2010).
47. Leon E. Panetta, U.S. Secretary of Defense, Remarks on Cybersecurity to the Busi-
ness Executives for National Security, New York City (Oct. 11, 2012), https://www.hsdl.
org/?view&did=724128.
48. Office of the Director of National Intelligence, A Guide to Cyber Attribution 2 (Sept.
14, 2018), https://www.dni.gov/files/CTIIC/documents/ODNI_A_Guide_to_ Cyber_
Attribution.pdf; cf. Jeremy Hunt, U.K. Foreign Secretary, Speech at Glasgow University:
Deterrence in the Cyber Age (Mar. 7, 2019), GOV.UK, https://www.gov.uk/govern-
ment/speeches/deterrence-in-the-cyber-age-speech-by-the-foreign-secretary (“Along with
1051
International Law Studies 2021
SolarWinds and Microsoft Exchange attacks were not even detected by U.S.
intelligence agencies for as long as nine months (SolarWinds), 49 and official
attribution of SolarWinds was not announced until April 2021. 50
In general, significant technological strides in attributing cyber events in
the last decade have made the attribution task “more nuanced, more com-
mon, and more political than has typically been acknowledged.” 51 The nu-
ance involves combining experienced and disciplined technical operators
with the intuition and judgment of intelligence professionals. The political
aspect includes assessing what is at stake in making the attribution judgment,
starting with the damage incurred, whether physical, financial, or reputa-
tional. 52 A prime example is the U.S. attribution of Russian interference in
the 2016 election. Although an official attribution was made public in the
last days of the Obama administration, more detailed and evidence-based
attributions accumulated in U.S. intelligence agencies and Congress through
President Trump’s first term, culminating in the August 2020 release of a
lengthy report of the Senate Select Committee on Intelligence detailing the
Russian cyber intrusions. 53 As the 2016 election interference example illus-
trates, attribution is often expressed in degrees of certainty. It requires input
from a range of actors and sources, including technical forensics, human in-
telligence, signals intelligence, history, and diplomatic relations. 54
The declassified Background to “Assessing Russian Activities and Intentions in
Recent US Elections” reminds us that intelligence analysis of cyber intrusions
our allies, we have improved our collective ability to detect those responsible for malign
actions in cyberspace, including election interference.”).
49. Sanger et al., supra note 40.
50. The SolarWinds attack was attributed to the Russian Foreign Intelligence Service
on April 15, 2021. See White House, supra note 43; see also Kristen Eichensehr, SolarWinds:
Accountability, Attribution, and Advancing the Ball, JUST SECURITY (Apr. 16, 2021),
https://www.justsecurity.org/75779/solarwinds-accountability-attribution-and-advancing-
the-ball/.
51. Rid & Buchanan, supra note 28.
52. Id. at 7 (“attribution is an art as much as a science”).
53. S. REP. NO. 116-290, RUSSIAN ACTIVE MEASURES CAMPAIGNS AND INTERFERENCE
IN THE 2016 U.S. ELECTION (2020). For an in-depth look at the long saga of Russian inter-
ference in the United States and the history of attribution, see OFFICE OF THE DIRECTOR
OF NATIONAL INTELLIGENCE, ASSESSING RUSSIAN ACTIVITIES AND INTENTIONS IN RE-
CENT US ELECTIONS (Jan. 6, 2017), https://digitallibrary.utah.gov/awweb/awarchive?type
=file&item=8353 .
54. See John P. Carlin, Detect, Disrupt, Deter: A Whole-of-Government Approach to National
Security Cyber Threats, 7 HARVARD NATIONAL SECURITY JOURNAL 391, 396–97 (2016) (dis-
cussing the expertise required for complex attribution analysis).
1052
Cyber Attribution and State Responsibility Vol. 97
55. Id.
56. OFFICE OF THE DIRECTOR OF NATIONAL INTELLIGENCE, supra note 53.
57. Id. at 2.
58. 1 ROBERT S. MUELLER III, REPORT ON THE INVESTIGATION INTO RUSSIAN IN-
TERFERENCE IN THE 2016 PRESIDENTIAL ELECTION 7 (2019), https://www.justice.gov/
storage/report_volume1.pdf (“On October 7, 2016, . . . Wikileaks made its second release:
thousands of John Podesta’s emails that had been stolen by the GRU in late March 2016 . .
. . That same day . . . the Department of Homeland Security and the Office of the Director
of National Intelligence issued a joint public statement ‘that the Russian Government di-
rected the recent compromises of e-mails from US persons and institutions.’”).
59. See Eichensehr, supra note 38, at 532.
60. See, e.g., Carlin, supra note 54, at 416; Herbert Lin, Attribution of Malicious Cyber Inci-
dents: From Soup to Nuts, 70 JOURNAL OF INTERNATIONAL AFFAIRS 75, 82–83 (2016).
61. See William Banks, State Responsibility and Attribution of Cyber Intrusions After Tallinn
2.0, 95 TEXAS LAW REVIEW 1487, 1494–97 (2017).
1053
International Law Studies 2021
strategy to deter harmful but below the use of force threshold for cyber in-
trusions in the future. Meanwhile, as cyber intrusions have proliferated in
recent years, and despite the absence of a durable legal regime that punishes
malevolent cyber intrusions, many States have invested in doing attribution
well and, as a result, deterring or at least discouraging States and other cyber
intruders. When attribution is done badly or not at all, States lose credibility
and likely effectiveness in dealing with those who would harm the State and
its citizens. These risks hold for State-on-State interactions across the spec-
trum of cyber operations—from espionage to destructive attacks on infra-
structure. Yet even persuasive attribution does not make up for the absence
of cyber-specific legal norms specifying what constitutes adequate attribu-
tion at international law. Nor have the technical advances in cyber attribution
led to emerging cyber law in the area of State responsibility.
When the international community recognized nearly two decades ago that
cyberattacks were becoming a new form of State-on-State warfare, govern-
ment lawyers were challenged either to fit cyber conflict into the paradigm
of kinetic war and armed conflict or to develop a new set of rules for cyber.
The United States and its allies sought to reassure the international commu-
nity that the jus ad bellum and jus in bello frameworks for kinetic warfare could
and would provide an effective overlay for the new era of cyber warfare. 62
Over the last two decades, governments and scholars labored over the nu-
ances in deciding when a cyberattack might amount to a use of force or
armed attack and, thus, whether international humanitarian law applies in the
cyber domain. When cyber weapons cause destruction or injury, the kinetic
model works reasonably well in the cyber realm. However, because the vast
majority of cyberattacks have less than destructive impacts, the law for con-
62. See THE WHITE HOUSE, INTERNATIONAL STRATEGY FOR CYBERSPACE: PROSPER-
ITY, SECURITY, AND OPENNESS IN A NETWORKED WORLD 9 (2011), https://obamawhiteh
ouse.archives.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace
.pdf (“The development of norms for state conduct in cyberspace does not require reinven-
tion of customary international law, nor does it render existing international norms obsolete.
Long-standing international norms guiding state behavior—in times of peace and conflict—
also apply in cyberspace.”); see also TALLINN MANUAL ON THE INTERNATIONAL LAW AP-
PLICABLE TO CYBER WARFARE 4 (Michael N. Schmitt gen. ed., 2013); TALLINN MANUAL
2.0 ON THE INTERNATIONAL LAW APPLICABLE TO CYBER OPERATIONS (Michael N.
Schmitt gen. ed., 2017) [hereinafter TALLINN MANUAL 2.0].
1054
Cyber Attribution and State Responsibility Vol. 97
1055
International Law Studies 2021
69. G7, Joint Statement of Foreign and Security Ministers, Defending Democracy—
Addressing Foreign Threats (Apr. 23, 2018), http://www.g8.utoronto.ca/foreign/180423-
democracy.html.
70. Ministère de l’Europe et des Affaires Étrangères [Ministry of Europe and Foreign
Affairs], Cybersecurity: Paris Call of 12 November 2018 for Trust and Security in Cyberspace (Nov.
12, 2018), https://www.diplomatie.gouv.fr/en/french-foreign-policy/digital-diplomacy/fr
ance-and-cyber-security/article/cybersecurity-paris-call-of-12-november-2018-for-trust-an
d-security-in (includes list of stakeholder signatories).
71. See Report of the Group of Governmental Experts on Developments in the Field
of Information and Telecommunications in the Context of International Security, ¶ 13, U.N.
Doc. A/70/174 (July 22, 2015) (hereinafter 2015 GGE Report).
72. See, e.g., Organization for Security and Co-operation in Europe, Decision No. 1202:
OSCE Confidence-Building Measures to Reduce the Risk of Conflict Stemming from the
Use of Information and Communication Technologies (Mar. 10, 2016), https://www.osce.
org/files/f/documents/d/a/227281.pdf.
73. See, e.g., Michael Schmitt & Sean Fahey, WannaCry and the International Law of Cyber-
space, JUST SECURITY (Dec. 22, 2017), https://www.justsecurity.org/50038/wannacry-inter-
national-law-cyberspace/; Banks, supra note 61; Jens David Ohlin, Did Russian Cyber Interfer-
ence in the 2016 Election Violate International Law?, 95 TEXAS LAW REVIEW 1579 (2017).
1056
Cyber Attribution and State Responsibility Vol. 97
law in press briefings or diplomatic notes, or even media reports and schol-
arly analyses, can give rise to State practice that over time may develop as
customary international law. 74
At the same time, the informal accusations and claims of State attribution
for a cyberattack can, by their public nature, serve to limit the chances that
the offending State’s behavior will be recognized as lawful. Good examples
include Estonia’s claims of Russian responsibility for the 2007 cyberattacks
against Estonian government and private sector infrastructure, President
Obama’s criticisms of Chinese cyber-espionage, 75 the public claims by the
United States, United Kingdom, and Australia that North Korea was respon-
sible for WannaCry, and the Obama administration’s criticisms of Russian
election interference in 2016. 76
Of course, public attribution brings along with it knowledge of the vic-
tim State’s vulnerabilities. States will, of course, avoid advertising how to
steal their protected data or shut down their electric grid. As such, attribution
may be provided in only general terms. Similarly, the United States and other
States tailor attribution to protect intelligence sources and methods. Because
a major part of attributing a cyberattack involves human and technical intel-
ligence work, States will work to preserve the anonymity of the intelligence
so that it may be used again.
Despite the sporadic positive steps taken by some States to attribute
cyberattacks, the public attributions over the past decade have not been tied
to law violations. States typically accuse the attributed State of bad behavior
(“malicious”) 77 or of violating some normative standard, 78 without specifying
which norm or ascribing consequences for the violation. An especially col-
orful attribution of a cyberattack was President Obama’s reference to the
74. See, e.g., James Stavridis, How to Win the Cyberwar Against Russia, FP (Oct. 12, 2016),
https://foreignpolicy.com/2016/10/12/how-to-win-the-cyber-war-against-russia/; see also
George Norman & Joel P. Trachtman, The Customary International Law Game, 99 AMERICAN
JOURNAL OF INTERNATIONAL LAW (2005).
75. Cory Bennett, Obama Calls Out China for Cyber Espionage, THE HILL (Feb. 6, 2015),
https://thehill.com/policy/cybersecurity/231998-obama-security-plan-highlights-chinese-
cyber-espionage.
76. See Banks, supra note 61, at 1489–92.
77. See, e.g., Press Release, Treasury Sanctions Russian Cyber Actors for Interference
with the 2016 U.S. Elections and Malicious Cyber-Attacks, U.S. DEPARTMENT OF THE
TREASURY (Mar. 15, 2018), https://home.treasury.gov/news/press-releases/sm0312; The
White House, supra note 68.
78. Kerry, supra note 67 (describing the 2014 Sony hack as a violation of “international
norms”).
1057
International Law Studies 2021
The Wild West environment for cyber exploitation persists in part because
of a lack of agreed-upon and enforceable rules for attributing cyber intru-
sions to the responsible actor and then punishing the wrongdoing. Without
attribution rules and practices that are transparent and widely shared, there
is no incentive for attackers to stop what they are doing. Because cyber at-
tribution remains challenging and often time-consuming when State respon-
sibility is suspected, international law places States in an untenable posture
in responding to cyber intrusions below the use of force level.
The customary international law of State responsibility and attribution is
largely drawn from the work of over a half-century of the International Law
Commission (ILC) and its Articles on State Responsibility. While not bind-
ing on any nation, the ILC articles were commended to member States by
the United Nations General Assembly in 2012 and have been cited repeat-
edly by courts, tribunals, and other bodies. 81 The unsurprising threshold un-
79. The White House, Statement by the Press Secretary on the Executive Order Enti-
tled “Imposing Additional Sanctions with Respect to North Korea” (Jan. 2, 2015), https://
obamawhitehouse.archives.gov/the-press-office/2015/01/02/statement-press-secretary-
executive-order-entitled-imposing-additional-s; Sean Sullivan, Obama: North Korea Hack
“Cyber-vandalism,” Not “Act of War,” WASHINGTON POST (Dec. 21, 2014), https://www.
washingtonpost.com/news/post-politics/wp/2014/12/21/obama-north-korea-hack-cyb
er-vandalism-not-act-of-war/; Ellen Nakashima & Devlin Barrett, U.S. Charges North Korean
Operative in Conspiracy to Hack Sony Pictures, Banks, WASHINGTON POST (Sept. 6, 2018), https:
//www.washingtonpost.com/world/national-security/justice-department-to-announce-ha
cking-charges-against-north-korean-operative-the-charge--stemming-from-the-2014-sony-
pictures-case--is-the-first-against-a-pyongyang-spy/2018/09/06/f477bfb2-b1d0-11e8-9a6
a-565d92a3585d_story.html.
80. Reckless Campaign of Cyber Attacks by Russian Military Intelligence Service Exposed, NA-
TIONAL CYBER SECURITY CENTRE (Oct. 3, 2018), https://www.ncsc.gov.uk/news/reck-
less-campaign-cyber-attacks-russian-military-intelligence-service-exposed.
81. TALLINN MANUAL 2.0, supra note 62, at 79 n.112.
1058
Cyber Attribution and State Responsibility Vol. 97
1059
International Law Studies 2021
signed on to the view that sovereignty is violated when one State’s cyberat-
tack causes “unwelcome effects” in another State. 87 Although the precise
scope of a sovereignty rule remains unclear, 88 under such a rule States are
responsible for the wrongful cyber-related acts of their own officials, agents,
contractors, non-State actors, and other States, to the extent they actually
control the operations. 89 States do not escape legal responsibility for inter-
nationally wrongful acts by perpetrating them through proxies. Taken to its
logical extreme, such an approach to sovereignty could mean that virtually
any nonconsensual cyber operation carried out by agents under the direction
or control of one State in another State has violated sovereignty. 90 In prac-
tice, however, these “purist” sovereignty States have not followed their own
purported doctrine and have instead followed the approach to sovereignty
set forth in a recent German government position paper, which maintains
that “negligible physical effects and functional impairments below a certain
impact threshold cannot—taken by themselves—be deemed to constitute a
violation of territorial sovereignty.” 91
The United Kingdom and the United States have questioned whether
sovereignty is itself an enforceable rule or is instead a background principle
87. See id. at 575; Jack Kenny, France, Cyber Operations and Sovereignty: The ‘Purist’ Approach
to Sovereignty and Contradictory State Practice, LAWFARE (Mar. 12, 2021), https://www.lawfare-
blog.com/france-cyber-operations-and-sovereignty-purist-approach-sovereignty-and-con-
tradictory-state-practice.
88. See Eichensehr, supra note 38, at 576 (“Often, applying existing international law is
sufficient, but in the context of the evidentiary standards for attribution, the underdeveloped
nature of existing international law on evidence suggests that a mix of existing and new
international law will be required.”).
89. TALLINN MANUAL 2.0, supra note 62, at 17 (rule 4); MINISTÈRE DES ARMÉES,
DROIT INTERNATIONAL APPLIQUÉ AUX OPERATIONS DANS LE CYBERSPACE [Ministry of
the Armed Forces, International Law Applied to Cyberspace] 1.1.1 (Sept. 9, 2019) (Fr.);
Dutch Minister of Foreign Affairs, Letter to the Parliament on the International Legal Order
in Cyberspace app. at 2 (July 5, 2019), https://www.government.nl/ministries/ministry-of-
foreign-affairs/documents/parliamentary-documents/2019/09/26/letter-to-the-parliamen
t-on-the-international-legal-order-in-cyberspace.
90. Kenny, supra note 87.
91. Federal Government of Germany, On the Application of International Law in Cy-
berspace, § II(a) (Mar. 2021), https://www.auswaertiges-amt.de/blob/2446304/32e7b249
8e10b74fb17204c54665bdf0/on-the-application-of-international-law-in-cyberspace-data.p
df; see also id.
1060
Cyber Attribution and State Responsibility Vol. 97
that informs the content of other rules, such as the duty of non-interven-
tion. 92 These disparate views on sovereignty could, in turn, lead to different
understandings of when attribution is required. Consider the SolarWinds
cyberattack. As has been reported, assume that the United States believes
that the Russian government was responsible for SolarWinds. The United
States may well wish to counter the Russian hack with an equivalent cyber
operation targeting Russian firms. If sovereignty is an international law rule,
Russia engaged in internationally wrongful acts and the United States is en-
titled to take countermeasures, but only if the United States attributes the
incoming attack to the Russian government. If the Russian attack is not at-
tributed, any counter cyber operation by the United States would itself vio-
late sovereignty and international law, permitting countermeasures by Rus-
sia. If, instead, sovereignty is a background principle and not law, SolarWinds
is not an internationally wrongful act, and neither attribution nor counter-
measures are required. 93
By implication, States that view sovereignty as a background principle
and not enforceable international law could argue reasonably that many of
its cyber actions—such as the United States’ responses to SolarWinds—are
retorsion and thus need not be preceded by attribution of the incoming
cyberattack to a State. 94 For the United States and the United Kingdom, the
defend forward and persistent engagement policies of actively pursuing
cyber attackers globally do not require attribution of cyberattacks to a State
92. See, e.g., Gary Corn, Tallinn Manual 2.0—Advancing the Conversation, JUST SECURITY
(Feb. 15, 2017), https://www.justsecurity.org/37812/tallinn-manual-2-0-advancing-con-
versation/; Jeremy Wright, U.K. Attorney General, Speech at Chatham House Royal Insti-
tute for International Affairs, Cyber and International Law in the 21st Century (May 23,
2018), https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21
st-century. The General Counsel of the U.S. Department of Defense has expressed a similar
view. Paul C. Ney, Jr., General Counsel, U.S. Department of Defense, Remarks at U.S.
Cyber Command Legal Conference (Mar. 2, 2020), https://www.defense.gov/News-
room/Speeches/Speech/Article/2099378/dod-general-counsel-remarks-at-us-cyber-com-
mand-legal-conference/ (“For cyber operations that would not constitute a prohibited in-
tervention or use-of-force [i.e., those that might be covered by a rule of sovereignty], the
Department believes there is not sufficiently widespread and consistent State practice re-
sulting from a sense of legal obligation to conclude that customary international law gener-
ally prohibits such non-consensual cyber operations in another State’s territory.”).
93. See Eichensehr, supra note 38, at 556 (“an injured state may only take countermeas-
ures against the state responsible for the internationally wrongful act, necessitating that the
victim state identify the state responsible”).
94. Id.
1061
International Law Studies 2021
because below threshold attacks are not internationally wrongful acts. Mean-
while, as noted above, other States may consider such operations violations
of their sovereignty. 95
Beyond the overarching debate on sovereignty, cyberattacks that are “co-
ercive” may also violate international law. Outside an armed conflict, inter-
national law forbids cyber intrusions that violate the prohibition on inter-
vention. 96 Based on the principle of sovereignty, but different from it, the
non-intervention principle forbids coercive intervention by cyber means. 97
The consensus among experts is that State-on-State cyber intrusions that are
not coercive but are “detrimental, objectionable, or otherwise unfriendly”
are not international legal violations. 98 As confirmed by the International
Court of Justice (ICJ) in the Nicaragua judgment, “the element of coercion .
. . forms the very essence of . . . prohibited intervention.” 99 Yet, international
law has never had a precise definition of coercion. According to a consensus
among the cyber experts who contributed to Tallinn 2.0, “coercion is not
limited to physical force, but rather refers to an affirmative act designed to
deprive another State of its freedom of choice . . . to force that State to act
in an involuntary manner or involuntarily refrain from acting in a particular
way.” 100 A State compels another State by, for example, providing cyber
training or supplying malware to a private group operating in the compelled
State. 101
95. The United Kingdom appeared to take an internally inconsistent position in 2018
when its National Cyber Security Centre issued a news release attributing multiple cyber
campaigns to Russia’s GRU, the State military intelligence service. The release claimed that
the Russian operations were “conducted in flagrant violation of international law.” Reckless
Campaign of Cyber Attacks by Russian Military Intelligence Service Exposed, NATIONAL CYBER SE-
CURITY CENTRE (Oct. 3, 2018), https://www.ncsc.gov.uk/news/reckless-campaign-cyber-
attacks-russian-military-intelligence-service-exposed. However, if sovereignty is a back-
ground principle and not a rule of international law, the Russian intrusions were disturbing
and perhaps repugnant but not unlawful. Jeffrey Biller & Michael Schmitt, Un-caging the Bear?
A Case Study in Cyber Opinio Juris and Unintended Consequences, EJIL:Talk (Oct. 24, 2018),
https://www.ejiltalk.org/un-caging-the-bear-a-case-study-in-cyber-opinio-juris-and-unin-
tended-consequences/.
96. TALLINN MANUAL 2.0, supra note 62, at 312 (rule 66(1)).
97. Id. at 312–13.
98. Id. at 85 (rule 15(7)).
99. Military and Paramilitary Activities in and against Nicaragua (Nicar. v. U.S.), Judg-
ment, 1986 I.C.J. 14, ¶ 205 (June 27).
100. TALLINN MANUAL 2.0, supra note 62, at 317 (rule 66(18)).
101. Michael N. Schmitt & Liis Vihul, Proxy Wars in Cyberspace: The Evolving International
Law of Attribution, 1 FLETCHER SECURITY REVIEW 53, 60 (2014).
1062
Cyber Attribution and State Responsibility Vol. 97
Defining the range of cyber conduct that qualifies as “coercion” has been
more difficult. The International Group of Experts (IGE) that provided the
analysis in Tallinn 2.0 could only agree on the anodyne statement “that as a
general matter, States must act as reasonable States would in the same or
similar circumstances when considering responses to them.” 102
In a November 2016 speech, Department of State legal adviser Brian
Egan opined that “a cyber operation by a State that interferes with another
State’s ability to hold an election or that manipulates a State’s election results
would be a clear violation of the rule of non-intervention.” 103 The Tallinn 2.0
experts similarly suggested that remotely altering electronic ballots to manip-
ulate election results constitutes unlawful intervention. 104
A January 2017 memorandum from the general counsel of the Depart-
ment of Defense to the combatant commands and other senior military and
civilian lawyers in the Pentagon affirmed coercion as a prerequisite means
for unlawful intervention. It concluded that military cyber activities that fall
below the use of force threshold and do not violate the non-intervention
principle are “largely unregulated by international law at this time.” 105
We should remain cautious about this coercion analysis, however, be-
cause State practice and resulting customary international law is based on
examples from kinetic conflicts. The analogies to cyber are not necessarily
conclusive. Consider Russian election interference in 2016. If we extrapolate
from General Michael Hayden’s metaphor that the Russians effectively
“weaponized” 106 the information they stole for the purpose of eroding con-
fidence in the U.S. democratic system, the Russian exfiltration looks more
coercive. In any case, the United States could not respond to Russia until it
1063
International Law Studies 2021
attributed State responsibility for the attacks. An official attribution did not
occur until January 2017, two months after the election.
The OPM hack, for example, may have severely undermined U.S. na-
tional security at a scale not seen previously. Yet, from the perspective of
international law, the OPM hack was an act of espionage, which international
law either fails to regulate or affirmatively permits. As such, it is not surpris-
ing to see accusations against China avoid condemnation for the OPM hack
in international legal terms. 107
107. See Ashley Deeks, An International Legal Framework for Surveillance, 55 VIRGINIA
JOURNAL OF INTERNATIONAL LAW 291, 300 (2015).
108. See Ashley Deeks, Defend Forward and Cyber Countermeasures (Aegis Series Paper No.
2004, 2020), https://www.law.virginia.edu/system/files/faculty/Defend-Forward-Cyber-
Countermeasures.pdf.
109. Egan, supra note 103.
110. Wright, supra note 92
111. The most authoritative articulation of countermeasures is the International Law
Commission’s 2001 Draft Articles on Responsibility of States for Internationally Wrongful
Acts. See Int’l Law Comm’n, supra note 27.
112. TALLINN MANUAL 2.0, supra note 62, at 112.
113. Id. at 124.
1064
Cyber Attribution and State Responsibility Vol. 97
cyberattacks has been established or agreed upon by States. 114 The ILC Ar-
ticles on State Responsibility declined to address matters of evidence and
proof of international law violations. 115 The ICJ has contributed only by sug-
gesting that such standards vary depending on the severity of the offense. 116
The complexities of cyber attribution and the risks of misattribution argue
for a high burden of proof. Kristen Eichensehr has argued that the sliding
scale of evidence based on the severity of the cyberattack and anticipated
response, as justified by the ICJ and the Tallinn Manual 2.0, is helpful only at
the extremes of the scale—a cyber armed attack. 117
For the vast majority of cyberattacks—those that could trigger counter-
measures and lesser intrusions below the use of force threshold—
Eichensehr argues that a minimum standard of some evidence may serve im-
portant purposes of promoting stability and avoiding conflict in the cyber
domain. 118 She persuasively maintains that “providing sufficient technical de-
tails to all other potential attributors . . . to confirm (or debunk) an attribution
will bolster the attribution’s credibility.” 119 Requiring that attributors “show
their work” should lead to more careful and better attributions, too. 120
Eichensehr concludes that “all governmental attributions should provide
sufficient evidence to allow other governmental and nongovernmental ac-
tors to confirm or debunk the attributions.” 121
States engaged in countermeasures following a cyberattack bear the bur-
den of attributing the attack they wish to counter to the responsible State. 122
In other words, the victim State must persuade other interested States that it
was victimized by an internationally wrongful act. The evidence described
above would accomplish that task. The Tallinn Manual 2.0 IGE opined that
“as a general matter the graver the underlying breach . . . , the greater the
confidence ought to be in the evidence relied upon by a State considering a
response . . . because the robustness of permissible self-help responses . . .
114. See Eichensehr, supra note 38, at 559–86 (discussing this matter in depth and sug-
gesting a standard.).
115. Int’l Law Comm’n, supra note 27, at 72.
116. See Eichensehr, supra note 38, at 562 (citing Application of the Convention on the
Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Monte-
negro), Judgment, 2007 I.C.J. 43, 130, ¶ 210 (Feb. 26)).
117. Id. at 577.
118. Id. at 578.
119. Id.
120. Id.
121. Id. at 583.
122. Deeks, supra note 108, at 6.
1065
International Law Studies 2021
grows commensurately with the seriousness of the breach.” 123 However, ac-
cording to the IGE, the severity of the cyber intrusion directed at an injured
State is also relevant, so that a State confronted with “low-level cyber oper-
ations that are merely disruptive” may be expected to amass more evidence
for attribution than a State victimized by “devastating cyber operations and
needing to respond immediately to terminate them.” 124
In a similar vein, the time it takes to produce a high confidence attribu-
tion judgment can limit the lawful responses to cyber operations. Mistaken
attribution can lead to an unlawful response even if the State made a reason-
able attribution judgment and implemented countermeasures. 125 If a State
victimized by an internationally wrongful cyber intrusion engages in coun-
termeasures and ends up being wrong about State attribution, the victimized
State has committed an internationally wrongful act. 126 On the other hand, if
the victim State waits until it has high confidence in its attribution of a State’s
responsibility for the intrusion, any countermeasures may be construed as
punishment, a form of reprisal forbidden under international law. 127 As a
result, cyber deterrence may be undermined because the legally less risky but
weak self-help retorsion responses to an intrusion are unlikely to deter simi-
lar cyber intrusions in the future.
Nor is the failure of a State to provide persuasive proof of attribution
itself an internationally wrongful act. The 2015 United Nations Group of
Governmental Experts report noted that accusations of wrongful acts by
States “should be substantiated,” 128 but the group gave no indication of
which or how much evidence would suffice or even count. The U.S. view,
as articulated by Brian Egan’s 2016 speech, is that “a State acts as its own
judge of the facts and may make a unilateral determination with respect to
attribution of a cyber operation to another State. . . . [T]here is no interna-
tional legal obligation to reveal evidence on which attribution is based prior
123. TALLINN MANUAL 2.0, supra note 62, at 82. In support of its position, the IGE
cited Oil Platforms (Iran v. U.S.), 2003 I.C.J. 161, ¶ 33 (Nov. 6) (separate opinion of Higgins,
J.); Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4, 17 (Apr. 9); Application of the Convention
on Prevention and Punishment of Crime of Genocide (Bosn. & Herz. v. Serb. & Montene-
gro), Judgment, 2007 I.C.J. 43, ¶¶ 209–10 (Feb. 26); Application of Convention on Preven-
tion and Punishment of Crime of Genocide (Croat. v. Serb.), 2015 I.C.J. 3, ¶ 178 (Feb. 3).
124. TALLINN MANUAL 2.0, supra note 62, at 82.
125. Id. at 82–83.
126. Id. at 118–20.
127. Id. at 116.
128. 2015 GGE Report, supra note 71, ¶ 24.
1066
Cyber Attribution and State Responsibility Vol. 97
to taking appropriate action.” 129 Thus, even when legally required, attribution
need not be made public. 130
States are likewise not obligated to provide evidence of attribution when
responding to another State’s cyber intrusions. 131 While the IGE acknowl-
edged the value in such a disclosure requirement, it found insufficient State
practice and opinio juris to recognize “an established basis under international
law for such an obligation.” 132 The IGE noted that the highly classified na-
ture of such attribution assessments is the primary reason for the absence of
customary international law on this important point. 133 Fear of reckless or
spurious accusations is also widespread and, indeed, among the norms
agreed to by the 2015 UN Group of Government Experts was the following:
“accusations of organizing and implementing wrongful acts brought against
States should be substantiated.” 134
Although attribution is necessarily probabilistic, the process serves its
purpose if it convinces the responsible State (and victim State’s citizens) that
a response to the cyber intrusion is called for. 135 The fact that attribution
judgments draw on many different sources of information has one major
temporal implication—early judgments made with less information are gen-
erally less believable than later judgments made with more information. 136
Continuing investigation may reveal additional useful information, which
may (or may not) reinforce attribution judgments made earlier. 137 Over time,
an international consensus may develop on the minimum level of involve-
ment needed to declare that a State is legally responsible for a cyberattack.
Legally enforceable attribution proof requirements could be imposed
only on States that have been victimized by an internationally wrongful act.
Short of countermeasures, victim States may respond to cyber intrusions
through retorsions, acts that are “unfriendly” but lawful. 138 Examples include
1067
International Law Studies 2021
VIII. CONCLUSIONS
1068
Cyber Attribution and State Responsibility Vol. 97
deter future attacks. 143 Public attribution also builds a record that may help
legitimate cyber responses by the victim State. 144
Because of the harm that States and their citizens continue to suffer as a
result of cyberattacks, States should agree to make some difficult tradeoffs
between secrecy and transparency and publicly identify some public infra-
structure “red lines” and attribution benchmarks that can help create an in-
ternational law roadmap for deterrence of harmful cyber intrusions.
As cyber international relations now stand, a few States benefit from the
absence of express cyber norms on what suffices to attribute State responsi-
bility for cyber exploitation because they have the most offensive cyber ca-
pabilities. However, in general, those States are also the most vulnerable to
cyber intrusions. Meanwhile, the disparity between States that are strong and
weak at attribution results in the equivalent of an arms race between ad-
vances in detection versus detection evasion. Evasion is getting easier faster,
so States that do not have advanced attribution capabilities can reliably invest
in hiding themselves. 145
As the most advanced cyber States recognize the risks of cyber escala-
tion, those States have good reason to become more transparent about at-
tribution in service of the mutual restraint that could be gained by sharing
attribution information. But to date, State concerns about revealing intelli-
gence sources and methods counsel against transparency. 146 However,
“[u]nless a nation is able to effectively redress a cyber intrusion, it can be
harmful or self-defeating to publicize it, since public knowledge of loss and
the failure to respond effectively invite more attacks.” 147
143. See, e.g., Martin C. Libicki, Cyberdeterrence and Cyberwar 7 (2009), https://www.rand.
org/content/dam/rand/pubs/monographs/2009/RAND_MG877.pdf (“If deterrence is
anything that dissuades an attack, it is usually said to have two components: deterrence by
denial (the ability to frustrate the attacks) and deterrence by punishment (the threat of retal-
iation).”); Nye, supra note 141, at 54 (“Classical deterrence theory rested primarily on two
main mechanisms: a credible threat of punishment for an action; and denial of gains from
an action.”).
144. See Int’l Law Comm’n, supra note 27, art. 22 (“The wrongfulness of an act of a
State not in conformity with an international obligation towards another State is precluded
if and to the extent that the act constitutes a countermeasure taken against the latter State .
. . .”).
145. BRUCE SCHNEIER, CLICK HERE TO KILL EVERYBODY: SECURITY AND SURVIVAL
IN A HYPER-CONNECTED WORLD 54–55 (2018).
146. Id. at 54.
147. Jack Goldsmith & Stuart Russell, Strengths Become Vulnerabilities: How a Digital World
Disadvantages the United States in Its International Relations 3 (Aegis Series Paper No. 1806, 2018),
1069
International Law Studies 2021
https://www.hoover.org/sites/default/files/research/docs/381100534-strengths-become
-vulnerabilities.pdf.
148. TALLINN MANUAL 2.0, supra note 62, at 80.
149. As per the traditional legal maxim “specific law prevails over general law.” See
Generalia Specialibus Non Derogant, BLACK’S LAW DICTIONARY (11th ed. 2014) (“The
doctrine holding that general words in a later statute do not repeal an earlier statutory pro-
vision dealing with a special subject.”); TALLINN MANUAL 2.0, supra note 62, at 81.
150. See Other Release, Joint Statement on Advancing Responsible State Behavior in
Cyberspace, U.S. DEPARTMENT OF STATE (Sept. 23, 2019), https://www.state.gov/joint-
statement-on-advancing-responsible-state-behavior-in-cyberspace/ (“When necessary, we
will work together on a voluntary basis to hold states accountable when they act contrary to
this framework, including by taking measures that are transparent and consistent with inter-
national law.”).
151. See, e.g., Roguski, supra note 4 (in February 2020, twenty States collectively accused
Russia of conducting cyber operations against Georgia); Russia Cyber-Plots: US, UK and Neth-
erlands Allege Hacking, BBC (Oct. 4, 2018), https://www.bbc.com/news/world-europe-
45746837 (noting organized accusations by Canadian, Dutch, U.S., and U.K. officials against
the GRU).
152. The CyberPeace Institute is a novel non-profit organization recently established
in Geneva with a mission of “assistance, accountability, and advancement” to “enhance the
stability of cyber space” by collaboratively analyzing cyberattacks by assisting victims whose
digital security systems are deficient, coordinating resources to assign accountability, and
1070
Cyber Attribution and State Responsibility Vol. 97
State actors reluctant to share it publicly. 153 This avenue has the potential to
provide integrity to the currently muddled series of accusations and counter-
accusations that typically characterize the aftermath of cyberattacks. Such an
entity could supplement the currently disaggregated attribution efforts, while
providing the opportunity to strengthen and perhaps eventually supplant
them. 154 Further, such an organization could build and concentrate technical
expertise that would be of particular benefit to States that lack the capacity
to adequately attribute, broadening participation in the creation of new in-
ternational norms. In essence, credible reports of attribution by neutral ac-
tors could act as a catalyst for States to coalesce around new international
legal rules proscribing the sort of cyberattacks that currently evade meaning-
ful repercussions.
In practice, attribution of cyberattacks in the United States is determined
if and when the Secretary of the Treasury decides, in consultation with other
officials, to freeze the foreign actor’s U.S.-based assets. Proposals for im-
proving U.S. attribution processes include centralizing the attribution func-
tion in a single agency—likely NSA 155—although the secrecy of NSA and its
firm anchor in the U.S. government limits the attractiveness of that idea.
Other proposals would create a National Cyber Safety Board, 156 an attribu-
tion organization somewhere in the U.S. government. Such a model has
advocating for the exposure and bridging of legal and normative gaps in international law.
To date, however, it is not clear that the institute is likely to make accusations on its own.
See CYBERPEACE INSTITUTE, https://cyberpeaceinstitute.org/ (last visited July 13, 2021).
153. See, e.g., Davis II et al., supra note 3, at 3; JASON HEALEY ET AL., ATLANTIC COUN-
CIL, CONFIDENCE-BUILDING MEASURES IN CYBERSPACE (2014), https://www.atlantic-
council.org/wp-content/uploads/2014/11/Confidence-Building_Measures_in_Cyberspa
ce.pdf; Brad Smith, President, Microsoft Corporation, Keynote Address at the RSA Con-
ference 2017: The Need for a Digital Geneva Convention, MICROSOFT (Feb. 24, 2017),
https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-conven-
tion/.
154. See, e.g., Kristin E. Eichensehr, Decentralized Cyberattack Attribution, 113 AMERICAN
JOURNAL OF INTERNATIONAL LAW UNBOUND 213 (2019). For Eichensehr’s argument that
decentralized attribution should continue, see Eichensehr, supra note 38.
155. Glenn S. Gerstell, NSA General Counsel, Speech: How We Need to Prepare for
a Global Cyber Pandemic, NSA|CSS (Apr. 9, 2018), https://www.nsa.gov/news-fea-
tures/speeches-testimonies/Article/1611673/how-we-need-to-prepare-for-a-global-cyber-
pandemic/.
156. Paul Rosenzweig, The NTSB as a Model for Cybersecurity, R STREET (May 9, 2018),
https://www.rstreet.org/2018/05/09/the-ntsb-as-a-model-for-cybersecurity/.
1071
International Law Studies 2021
promise inside the United States, but a domestic process does not get at the
international dimensions—where the problems are.
1072