A Single Comment — Permalink
© ICCforum.com, 2010–2024. All rights reserved. Policies | Guidelines
Featured Comments
- knturner1991: The Most Serious Standards for the Most Serious Crime: Prosecution Strategies for the ICC on the Crime of Aggression Introduction The Kampala Amendments adopted in June 2010 provided the definition and trigger mechanism that will be used by the International Criminal Court (ICC) to prosecute the crime of aggression. The ICC will be the first international court since the post-WWII... (more)
- Cyprien Fluzin: Humanitarian Interventions and Crime of Aggression: Does the Kampala Amendment Spell the End of Humanitarian Intervention? I. Introduction The entry into force of the Kampala amendment aiming at enforcing the crime of aggression provision in the Rome Statute is the culmination of a long struggle. Although described in Nuremberg as the “supreme international crime”,1 the provision... (more)
- lgiles: New Frontiers for the ICC: Tackling Cyber Attacks Through the Crime of Aggression I. Introduction The state parties to the Rome Statute recently activated the crime of aggression by the approval of thirty states.1 The crime of aggression has been codified in the Rome Statute to prevent a state party from committing a “manifest violation of the... (more)
- Nick Baltaxe: The Crime of Aggression and Aiding and Abetting: Examining How Article 25(C)(3) of the Rome Statute Can Apply to the Crime of Aggression Abstract Article 25(C)(3) of the Rome Statute establishes individual criminal responsibility for any person who purposely aids and abets in the commission of a crime under the jurisdiction of the ICC. With the adoption of the Kampala Amendments... (more)
- Morgan Thompson: Criteria for Legitimate Humanitarian Intervention Introduction Is a state action that is planned, prepared, initiated, or executed by a state’s leaders in the name of humanitarian intervention or the responsibility to protect (R2P) encompassed by the International Criminal Court’s (ICC) crime of aggression? In the past fifteen years, there have been expansions related to the law on humanitarian intervention, R2P, and to the... (more)
- Daniel Aspinwall: I. Introduction In 2010, at the review conference in Kampala, the state parties to the Rome Statute of the International Criminal Court proposed seven amendments. These proposed amendments are the first steps to enable the Court to exercise jurisdiction over the crime of aggression. We have been asked: “How should the Office of the Prosecutor (OTP) approach prosecution of the crime of aggression if it is... (more)
- Leeran: Selected Approaches and Policies for Prosecuting the Crime of Aggression I. Introduction After many years of uncertainty, the International Criminal Court (Court) may finally exercise jurisdiction over the crime of aggression. The Court faces a variety of complex issues when it decides to prosecute individuals who allegedly committed the crime of aggression. When the Office of the Prosecutor (Prosecutor) may... (more)
- Erin French: Preemptive Nuclear Strikes and the Crime of Aggression: Evaluating the Reach of the ICC’s Jurisdiction Introduction At the 2010 International Criminal Court (ICC) Review Conference in Kampala, the crime of aggression was defined under Article 8 bis in the Rome Statute.1 It requires three elements: the perpetrator is a political or military... (more)
Comment on the Aggression Question: “What should be the policy and approach of the Office of the Prosecutor in conducting investigations and prosecutions with regard to the crime of aggression?”
New Frontiers for the ICC: Tackling Cyber Attacks Through the Crime of Aggression
I. Introduction
The state parties to the Rome Statute recently activated the crime of aggression by the approval of thirty states.1 The crime of aggression has been codified in the Rome Statute to prevent a state party from committing a “manifest violation of the Charter of the United Nations.”2 In this comment, I will argue that the crime of aggression, in the cyber context, should primarily be used to prevent catastrophic digital attacks by state actors and those under their control. Because the crime of aggression imports the UN Charter standards, the crime of aggression should be defined by the prevailing international criminal standards for aggression. Therefore, the crime of aggression should include, among other imparted responsibility standards, the responsibility of states to prevent attacks being launched from their territory if they had the ability to direct or control the non-State actor.
II. Defining the ICC Standard of Aggression through Analogous International Doctrines
The crime of aggression, as codified, sets an extremely high standard for what actions will be sufficient for prosecution. Article 8 bis of the Rome Statute states three distinct requirements for prosecution:
Additionally, in drafting and activating the crime of aggression, it was noted that:
Therefore, the crime of aggression, as drafted, should be understood as a grave offense not to be employed unless a serious aggressive act has occurred.
As codified, the crime of aggression imports the UN Charter standards and definitions; therefore, prevailing international norms regarding aggression should be imported into the statute regarding cyberwarfare. As seen above, the first standard set by the Kampala Amendments references manifest violations of the UN Charter.4 Additionally:
These two statements early in the body of the Kampala Amendment text show that the drafters sought to make clear reference to prevailing international norms in the drafting and activation of the crime of aggression.
Therefore, in defining the crime of aggression for the Rome Statute, we must first look to the prevailing international norms around cyber warfare, especially those promulgated by the United Nations and related organs. These legal standards themselves are somewhat sparse and largely imported by analogy from other fields of warfare law. States are bound not to use force against other states by the UN Charter; instead they are supposed to use diplomatic channels to resolve international disputes.5 In the international realm, uses of force are split into two categories as they relate to self-defense: uses of force and armed attacks.
The use of force standard employed by the United Nations is best defined by two sources: the ICJ Nicaragua judgment, and the UN Resolution defining aggression (which are incorporated into the Kampala Amendments; Article 8 bis Paragraph 2 (a–g)). The Nicaragua judgment used a test considering the scale and effects of an attack to determine if there was a use of force.6 As such, it determined that the United States’s actions—in arming, assisting, and training a guerilla force to depose the current government—constituted a use of force. The resolution defining aggression provided several examples of uses of force, e.g.:7
Therefore, we can assume that a cyber attack, which has the same scale and effects on a state as the above enumerated acts, would constitute a use of force for both international law and for the crime of aggression. It is important to note that these are merely examples of uses of force or aggression and not an exhaustive list. However, it is unclear if it would rise to the character, gravity, and scale requirements of the Article 8 bis test. Therefore, the best comparison for those actions which would meet the crime of aggression standard may be the traditional armed attack standard employed for determining whether a state’s right to self-defense has been triggered.
The armed attack standard is less defined by current international norms than the use of force; nonetheless, the Nicaragua judgment, Nuclear Weapons Advisory Opinion, and various international statements are informative. In the Nicaragua judgment, the ICJ considered whether Nicaragua had committed an armed attack against El Salvador to trigger El Salvador’s collective self-defense rights (thereby allowing the US to defend El Salvador).8 The ICJ noted that even where providing weaponry to dissident/rebellious forces was imputable to a nation state, that alone would not be considered an armed attack.9 Additionally, in defining armed attack, the court referred to an armed attack as “the most grave use of force” as distinguished from “other less grave forms.”10 Therefore, it seems to be proper for the crime of aggression to settle in between the armed attack standard and the traditional use of force standard.
III. Using International Norms of State Responsibility to Define the Scope of Possible Prosecution
The scope of those responsible for cyber warfare defies conventional norms of state actor responsibility. The Kampala Amendments institute a limited scope of persons to be held responsible in the case of an attack as follows:
Though this scope is extremely limited in text, the possibility for enforcement in the cyber context goes far beyond traditional warfare. States, in governing, usually limit the ability for citizens to access means of employing force. For example, many European nations enforce gun control restriction’s, and few nations allow for private citizens to access military vehicles such as tanks or fighter planes. These restrictions are effectively enforced both at the state level and because of practical economic limitations of private citizens. As of a few years ago, a Sherman tank on the open market cost anywhere from $95,000 to $400,000, far beyond the ability of most private citizens to purchase even before considering the cost and difficulty in attaining the ammunition.12 Conventional military attacks generally involve many persons including the attackers themselves, their training/trainers, support staff, and logistical support. Therefore, it is hard to envision a conventional attack rising to the level imagined by the Kampala Amendments without some state involvement or support. Cyber attacks, by contrast, may be performed by as little as one person with hardware easily purchased.13 Therefore, the scope of potentially responsible persons committing cyber attacks is far greater than conventional warfare.
The text of the Kampala Amendments attempts to limit this pool of potential offenders to those who can control or direct the political or military action of a state. However, the text does not provide us with any guidance as to military action or political control. Therefore, we must look to prevailing international norms of state responsibility to determine those who will be potential cyber offenders. Though not an international treaty, the Responsibility of States for Internationally Wrongful Acts as adopted by the International Law Commission in 2001, attempted to codify prevailing customary law and has been adopted as the international standard of responsibility through custom. Under this framework, states are responsible for two categories of actions: those performed by the state itself and those attributable to the state through some other theory. State action directly is tested by whether the actions were taken by the organs of the state as determined by the state’s own definition of who may act on the state’s behalf.14 States may also later adopt an action of a party as their own.15 The state may also be held responsible for those who they directed, controlled, or acted in the absence of government authority.16 Therefore, many cyber actors may effectively control some part of the military apparatus of a state through the direct and control standards presented. For example, consider the US direction of the Contra Forces at issue in the Nicaragua judgment.17 The ICJ reasoned that US involvement was a necessary component and intended to assist the guerilla actions. As such, they were imputable to the United States.18
Consider Russia’s alleged attack on Georgia in 2008 where a large scale DDoS attack took place on Georgian government and public websites effectively slowed the internet to a crawl.19 As the digital attack took place, Russian troops moved into Georgia occupying the territory.20 Lists of attack targets were posted on the Russian internet at sites like StopGeorgia.ru, though the control server for the attack was actually located within the United States.21 Security researchers attributed the attack to a number of actors within Russia, but, upon questioning, the Russian government denied its own involvement.22 Digital security professionals opined that the attacks were too successful and coordinated to originate from amateurs, believing the attacks may have had some superior direction.23 The closest group associated with the attack was a Russian cybermafia group known as the Russian Business Network who contract out their digital services for cash.24 It is difficult to know whether these actions were at the direction of the Russian government itself; nonetheless, they certainly assisted with the Russian state’s aim of crippling the Georgian forces. If the RBN story is to be believed, then private individuals were a central component of a cyber attack on a foreign state. At the least, these acts are imputable to state actors, but there is the possibility that the actors themselves were sufficiently independent to fall under the direction of political or military action of the state as well. Therefore, the possible pool of persons responsible under a cyber aggression standard is much broader than conventional warfare.
IV. Applying the International Standard to Cyber
A. What Should the Prosecutor Do?
It is unclear whether the Kampala Amendments wanted the crime of aggression defined by severity requirements similar to a use of force or by the higher standard of armed attack given the gravity requirement instituted. Of course, the Kampala Amendments could have been setting out a different standard from these two internationally recognized standards as well. Likely, the standard was intended to mean use of force plus or severe uses of force. Therefore, in defining cyber aggression, the prosecutor should look to instances that would constitute a severe use of force but perhaps not meet the armed attack threshold, to determine those cases where prosecution should occur. The prosecutor should be especially conservative in the digital context where the law is already poorly defined given the young status of the court. Being conservative in this manner also respects the scale, gravity, and character requirements of Article 8 bis.
The prosecutor, considering the new era of cyber war, should not however feel beholden to follow the United Nations in its potential redefining of international law. Although, it may prove useful to observe the moving international standard of cyber attack, it is important for the court to define its own precedent that it believes best captures the intentions of the state parties to the Rome Statute. The ICC has the unique ability to define its own precedent, and that ability, coupled with the young era of cyber law, may allow the court to make its mark on international law. If the court feels as though there is a good case to tackle the new era of cyber warfare, then it should not shy away and wait for others to act first.
The prosecutor should pursue not only state actors responsible for military actions in the cyber space, but also be open to the pursuit of private individuals who carry out these attacks on a state’s behalf or with some state involvement. This would serve to increase the scope of the court’s effectiveness and its deterrent goals. It is especially important to note that state’s may be responsible for allowing their private citizens to host such attacks on foreign nations. It is easy to see how technologically advanced nations such as the United States, who have a strong internet infrastructure, could become a source for hackers working as mercenaries for international actors. The ability for the court to levy a deterrent effect on these private groups would severely limit states’ ability to perform cyber attacks and would serve as leverage in ascertaining the ultimately responsible party for any given attack.
Proper enforcement of the crime of aggression in the cyber context would pile on the already severe consequences of engaging in unwarranted armed conflict, as the aggressor must fear not only the invaded state’s response and international blowback, but also the threat of individual prosecution. This is especially true in the context of cyber warfare where private actors are more likely to be engaged than in conventional warfare. Additionally, it is an apt field for the court to consider governing the actions of states as they fail to control their citizens’ attacks on the citizens of other states.
B. Limitations
The prosecutor should, however, be cognizant of the political environment within which they act. This is especially important with cyber attacks, because the perpetrator is not always known and evidence may be hard to come by. Take, for example, the previously referenced attack on Georgia. Although there was strong suspicion that it was a Russian attack, in the immediate aftermath it looked as though the control server was located in the United States. Unlike conventional warfare, it is frequently hard to discern the exact origin point of a cyber attack. The political blow-back on the young court would be immense if they mistakenly identified a state as being the bad actor in an international attack. Therefore, perhaps it is best that prosecution in these cases be long after the attack has been fully understood by the international community. However, investigations must occur or any deterrent effect of the activation of the crime of aggression would quickly deteriorate.
Another concern for the prosecutor will be evidence gathering. Unlike conventional attacks, cyber attacks are likely to happen over a large number of countries simultaneously. Consider the previous example of the Georgia attack where United States’ servers were employed by Russian hackers to attack the Georgian networks. The prosecutor would have to appeal to Georgia, Russia, and the United States for evidence of the crime. The prosecutor would inevitably have to ask more countries for their assistance as cyber weapons could have traversed or hopped through various servers in various nations, vastly increasing the amount of countries to gather evidence in. However, this is not a new problem for cyber experts where much of the evidence gathering may be performed remotely with the consent of the controlling party. Therefore, the prosecutor should endeavor to keep states who may need to turn over evidence friendly with the court, and the prosecutor may wish to offer to reimburse these states for the significant potential costs associated with gathering the relevant digital evidence.
Finally, traditional notions of armed attack rely on the kinetic effects of an attack in determining gravity. Therefore, the prosecutor should expect some political push back in declaring a cyber attack of sufficient magnitude to investigate. If the prosecutor chooses a case where the effects are not easily shown to be analogous to previous kinetic attacks, then she risks invalidating the court and the crime’s serious nature. In many ways, the young court must be careful to treat the cyber field as a young crime which should rely not on hard cases but clear ones to set the proper precedent before engaging in overall enforcement.
C. Case Example: Stuxnet
Consider the somewhat recent actions of the United States and Israeli governments launching the “Stuxnet” virus in Iran.25 Let us leave aside the fact that neither the United States nor Israel are parties to the Rome Statute.2627 The governments were able to deploy a virus into the Iranian nuclear facilities that destroyed uranium centrifuges, eventually destroying 1,000 of 6,000 total centrifuges.28 This targeted attack served to delay potential weapons creation by Iran, though Iran has claimed the uranium was only to be used for power generation.29 Nonetheless, if such an attack occurred between states who were signatories to the Rome Statute, a crime of aggression would certainly have occurred. A nation causing kinetic damage to the military capabilities of another state falls squarely within Article 8 bis usage of weapons on the territory of another nation. Such a usage of weapons is especially grave as the attack targeted the military capabilities and utilities infrastructure of another state. Were such an attack to occur between state signatories to the Rome Statute, the prosecutor should step in to curb the aggressive behavior and hold those who commanded, and those who participated in the attack, accountable.
V. Conclusion
The crime of aggression should be equally employed in the cyber context as any other it might be used in. Despite some significant differences in application requirements, international law may generally apply by analogy to the cyber field. In fact, the cyber context presents a unique opportunity for the court to impact the actions of many states and expand its domain from the traditional African-focused sphere to operations occurring in other areas of the globe. However, the prosecutor should remain cognizant that the crime should only be charged in the most serious of cases where there are sufficient facts to constitute a jurisdictional hook for the court.
Endnotes — (click the footnote reference number, or ↩ symbol, to return to location in text).
List of States Who Have Ratified Amendments on the Crime of Aggression, U.N.T.S., [hereinafter List of Ratifying States], available online (last visited Feb. 14, 2018). ↩
Rome Statute of the International Criminal Court, Adopted by the United Nations Diplomatic Conference of Plenipotentiaries on the Establishment of an International Criminal Court, Jul. 17, 1998, UN Doc. A/CONF.183/9, as amended [hereinafter Rome Statute], Art. 8 bis available online. ↩
Assembly of State Parties, The Crime of Aggression, RC/Res.6, at Annex 3(6) (Jun. 11, 2010), available online. ↩
Rome Statute, supra note 2. ↩
Charter of the United Nations, Art. 2 ¶ 4, available online. ↩
Case Concerning Military and Paramilitary Activities In and Against Nicaragua (Nicaragua v. U.S.), Merits, Judgment, 1986 I.C.J. Rep. 14 (Jun. 27, 1986) [hereinafter Nicaragua v. U.S.], available online. ↩
Definition of Aggression, G.A. Res. 3314, A/Res/29/3314, at Art. 3 Dec. 14, 1974, available online. ↩
Nicaragua v. U.S., supra note 6, at 191. ↩
Id. at 230. ↩
Id. at 191. ↩
Rome Statute, supra note 2. ↩
So, You Want to Buy a Sherman Tank, Military Trader, May 21, 2010, available online;
Katie DeLong, Happen to be Looking for a 1941 Sherman Tank? There’s One for Sale on Good Hope Road!, Fox6 Now, Jun. 24, 2014, available online. ↩
Kim Zetter, Teen Who Hacked CIA Director’s Email Tells How He Did It, Wired, Oct. 19, 2015, available online. ↩
Responsibility of States for Internationally Wrongful Acts, G.A. Res. 56/83, A/Res/56/83 at Annex Art. 4, Jan. 28, 2002, available online. ↩
Id. at Art. 11. ↩
Id. at Arts. 8, 9. ↩
Nicaragua v. U.S., supra note 6, at 111. ↩
Id. ↩
John Markoff, Before the Gunfire, Cyberattacks, N.Y. Times, Aug. 12, 2008, available online; Travis Wentworth, How Russia May Have Attacked Georgia’s Internet, Newsweek, Aug. 22, 2008, available online; David J. Smith, Russian Cyber Strategy and the War Against Georgia, Atlantic Council, Jan. 17, 2014, available online. ↩
Id. ↩
Id. ↩
Id. ↩
Id. ↩
Id. ↩
Ellen Nakashima & Joby Warrick, Stuxnet was Work of U.S. and Israeli Experts, Officials Say, Wash. Post, Jun. 2, 2012, available online. ↩
List of Ratifying States, supra note 1. ↩
(Although perhaps this could evidence an awareness by these countries that their cyber activities would be bound by relevant international law and the ICC’s individual accountability). ↩
Nakashima & Warrick, supra note 25. ↩
Id. ↩