Cyber-attacks-efforts to alter, disrupt, or destroy computer systems, networks, or the information or programs on them-pose difficult interpretive issues with respect to the U.N. Charter, including when, if ever, such activities constitute prohibited 'force" or an "armed attack" justifying military force in self-defense. In exploring these issues, and by drawing on lessons from Cold War legal debates about the U.N. Charter, this Article makes two overarching arguments. First, strategy is a major driver of legal evolution. Whereas most scholarship and commentary on cyber-attacks has focused on how international law might be interpreted or amended to take account of new technologies and threats, this Article focuses on the dynamic interplay of law and strategy-strategy generates reappraisal and revision of law, while law itself shapes strategy-and the moves and countermoves among actors with varying interests, capabilities, and vulnerabilities. Second, this Article argues that it will be difficult to achieve international agreement on legal interpretation and to enforce it with respect to cyber-attacks. The current trajectory of U.S. interpretation-which emphasizes the effects of cyber-attacks in analyzing whether they cross the UN. Charter's legal thresholds-is a reasonable effort to overcome translation problems of a Charter built for a different era of conflict. However, certain features of cyber-activities make international legal regulation very difficult, and major actors have divergent strategic interests that will pull their preferred doctrinal interpretations and aspirations in different directions, impeding formation of a stable international consensus. The prescription is not to abandon interpretive or multilateral legal efforts to regulate cyber-attacks, but to recognize the likely limits of these efforts and to consider the implications of legal proposals or negotiations in the context of broader security strategy.
Matthew C. Waxman,
Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4),
Yale J. Int'l L.
Available at: http://digitalcommons.law.yale.edu/yjil/vol36/iss2/5