Home > Research > Publications & Outputs > Election Hacking, the Rule of Sovereignty, and ...

Electronic data

  • RoS FINAL

    Rights statement: https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/election-hacking-the-rule-of-sovereignty-and-deductive-reasoning-in-customary-international-law/2192E8E79A080E9AE07C419F827CFDB3 The final, definitive version of this article has been published in the Journal, Leiden Journal of International Law, ?? (?), pp ???-??? 2023, © 2023 Cambridge University Press.

    Accepted author manuscript, 1.18 MB, PDF document

    Available under license: CC BY-NC-ND: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License

Links

Text available via DOI:

View graph of relations

Election Hacking, the Rule of Sovereignty, and Deductive Reasoning in Customary International Law

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published
<mark>Journal publication date</mark>24/04/2023
<mark>Journal</mark>Leiden Journal of International Law
Issue number3
Volume36
Number of pages24
Pages (from-to)675-698
Publication StatusPublished
Early online date24/04/23
<mark>Original language</mark>English

Abstract

This article considers the international laws applicable to irresponsible State behaviour in cyberspace through the lens of the problem of election hacking. The rule of sovereignty has taken centre stage in these discussions and is said to be preferred to the non-intervention rule because it evades the problem of coercion. Proponents of the cyber rule of sovereignty contend that there is such a rule; Opponents reject the existence of the rule as a matter of existing law. The objective here is to explore the methodologies involved in the identification of the cyber rule of sovereignty under customary international law. The work first frames the debate in the language of regulative and constitutive rules, allowing us to show that a regulative rule of sovereignty can, logically, and necessarily, be deduced from the constitutive rule of sovereignty. The content of the regulative rule can also be deduced from the constitutive rule of sovereignty, but it has a more limited scope than claimed by the proponents of the rule, notably the Tallinn Manual 2.0. The rule of sovereignty prohibits State cyber operations carried out on the territory of the target State and remote cyber operations which involve the exercise of sovereign authority on that territory, e.g., police evidence gathering operations. The rule of sovereignty does not, however, prohibit other remote, ex situ State cyber operations, even those targeting ICTs used for governmental functions, including the conduct of elections. The rule of sovereignty is not, then, the solution to the problem of election hacking.

Bibliographic note

https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/election-hacking-the-rule-of-sovereignty-and-deductive-reasoning-in-customary-international-law/2192E8E79A080E9AE07C419F827CFDB3 The final, definitive version of this article has been published in the Journal, Leiden Journal of International Law, ?? (?), pp ???-??? 2023, © 2023 Cambridge University Press.