Rights statement: https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/election-hacking-the-rule-of-sovereignty-and-deductive-reasoning-in-customary-international-law/2192E8E79A080E9AE07C419F827CFDB3 The final, definitive version of this article has been published in the Journal, Leiden Journal of International Law, ?? (?), pp ???-??? 2023, © 2023 Cambridge University Press.
Accepted author manuscript, 1.18 MB, PDF document
Available under license: CC BY-NC-ND: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
Final published version
Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - Election Hacking, the Rule of Sovereignty, and Deductive Reasoning in Customary International Law
AU - Wheatley, Steven
N1 - https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/election-hacking-the-rule-of-sovereignty-and-deductive-reasoning-in-customary-international-law/2192E8E79A080E9AE07C419F827CFDB3 The final, definitive version of this article has been published in the Journal, Leiden Journal of International Law, ?? (?), pp ???-??? 2023, © 2023 Cambridge University Press.
PY - 2023/4/24
Y1 - 2023/4/24
N2 - This article considers the international laws applicable to irresponsible State behaviour in cyberspace through the lens of the problem of election hacking. The rule of sovereignty has taken centre stage in these discussions and is said to be preferred to the non-intervention rule because it evades the problem of coercion. Proponents of the cyber rule of sovereignty contend that there is such a rule; Opponents reject the existence of the rule as a matter of existing law. The objective here is to explore the methodologies involved in the identification of the cyber rule of sovereignty under customary international law. The work first frames the debate in the language of regulative and constitutive rules, allowing us to show that a regulative rule of sovereignty can, logically, and necessarily, be deduced from the constitutive rule of sovereignty. The content of the regulative rule can also be deduced from the constitutive rule of sovereignty, but it has a more limited scope than claimed by the proponents of the rule, notably the Tallinn Manual 2.0. The rule of sovereignty prohibits State cyber operations carried out on the territory of the target State and remote cyber operations which involve the exercise of sovereign authority on that territory, e.g., police evidence gathering operations. The rule of sovereignty does not, however, prohibit other remote, ex situ State cyber operations, even those targeting ICTs used for governmental functions, including the conduct of elections. The rule of sovereignty is not, then, the solution to the problem of election hacking.
AB - This article considers the international laws applicable to irresponsible State behaviour in cyberspace through the lens of the problem of election hacking. The rule of sovereignty has taken centre stage in these discussions and is said to be preferred to the non-intervention rule because it evades the problem of coercion. Proponents of the cyber rule of sovereignty contend that there is such a rule; Opponents reject the existence of the rule as a matter of existing law. The objective here is to explore the methodologies involved in the identification of the cyber rule of sovereignty under customary international law. The work first frames the debate in the language of regulative and constitutive rules, allowing us to show that a regulative rule of sovereignty can, logically, and necessarily, be deduced from the constitutive rule of sovereignty. The content of the regulative rule can also be deduced from the constitutive rule of sovereignty, but it has a more limited scope than claimed by the proponents of the rule, notably the Tallinn Manual 2.0. The rule of sovereignty prohibits State cyber operations carried out on the territory of the target State and remote cyber operations which involve the exercise of sovereign authority on that territory, e.g., police evidence gathering operations. The rule of sovereignty does not, however, prohibit other remote, ex situ State cyber operations, even those targeting ICTs used for governmental functions, including the conduct of elections. The rule of sovereignty is not, then, the solution to the problem of election hacking.
KW - custom
KW - cyber
KW - deduction
KW - election
KW - sovereignty
U2 - 10.1017/S0922156523000092
DO - 10.1017/S0922156523000092
M3 - Journal article
VL - 36
SP - 675
EP - 698
JO - Leiden Journal of International Law
JF - Leiden Journal of International Law
SN - 0922-1565
IS - 3
ER -