Home > Research > Publications & Outputs > Election Hacking, the Rule of Sovereignty, and ...

Electronic data

  • RoS FINAL

    Rights statement: https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/election-hacking-the-rule-of-sovereignty-and-deductive-reasoning-in-customary-international-law/2192E8E79A080E9AE07C419F827CFDB3 The final, definitive version of this article has been published in the Journal, Leiden Journal of International Law, ?? (?), pp ???-??? 2023, © 2023 Cambridge University Press.

    Accepted author manuscript, 1.18 MB, PDF document

    Available under license: CC BY-NC-ND: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License

Links

Text available via DOI:

View graph of relations

Election Hacking, the Rule of Sovereignty, and Deductive Reasoning in Customary International Law

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Election Hacking, the Rule of Sovereignty, and Deductive Reasoning in Customary International Law. / Wheatley, Steven.
In: Leiden Journal of International Law, Vol. 36, No. 3, 24.04.2023, p. 675-698.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Wheatley S. Election Hacking, the Rule of Sovereignty, and Deductive Reasoning in Customary International Law. Leiden Journal of International Law. 2023 Apr 24;36(3):675-698. Epub 2023 Apr 24. doi: 10.1017/S0922156523000092

Author

Wheatley, Steven. / Election Hacking, the Rule of Sovereignty, and Deductive Reasoning in Customary International Law. In: Leiden Journal of International Law. 2023 ; Vol. 36, No. 3. pp. 675-698.

Bibtex

@article{b71846f7f8694701be43c67baf6a9b5f,
title = "Election Hacking, the Rule of Sovereignty, and Deductive Reasoning in Customary International Law",
abstract = "This article considers the international laws applicable to irresponsible State behaviour in cyberspace through the lens of the problem of election hacking. The rule of sovereignty has taken centre stage in these discussions and is said to be preferred to the non-intervention rule because it evades the problem of coercion. Proponents of the cyber rule of sovereignty contend that there is such a rule; Opponents reject the existence of the rule as a matter of existing law. The objective here is to explore the methodologies involved in the identification of the cyber rule of sovereignty under customary international law. The work first frames the debate in the language of regulative and constitutive rules, allowing us to show that a regulative rule of sovereignty can, logically, and necessarily, be deduced from the constitutive rule of sovereignty. The content of the regulative rule can also be deduced from the constitutive rule of sovereignty, but it has a more limited scope than claimed by the proponents of the rule, notably the Tallinn Manual 2.0. The rule of sovereignty prohibits State cyber operations carried out on the territory of the target State and remote cyber operations which involve the exercise of sovereign authority on that territory, e.g., police evidence gathering operations. The rule of sovereignty does not, however, prohibit other remote, ex situ State cyber operations, even those targeting ICTs used for governmental functions, including the conduct of elections. The rule of sovereignty is not, then, the solution to the problem of election hacking. ",
keywords = "custom, cyber, deduction, election, sovereignty",
author = "Steven Wheatley",
note = "https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/election-hacking-the-rule-of-sovereignty-and-deductive-reasoning-in-customary-international-law/2192E8E79A080E9AE07C419F827CFDB3 The final, definitive version of this article has been published in the Journal, Leiden Journal of International Law, ?? (?), pp ???-??? 2023, {\textcopyright} 2023 Cambridge University Press. ",
year = "2023",
month = apr,
day = "24",
doi = "10.1017/S0922156523000092",
language = "English",
volume = "36",
pages = "675--698",
journal = "Leiden Journal of International Law",
issn = "0922-1565",
publisher = "Cambridge University Press",
number = "3",

}

RIS

TY - JOUR

T1 - Election Hacking, the Rule of Sovereignty, and Deductive Reasoning in Customary International Law

AU - Wheatley, Steven

N1 - https://www.cambridge.org/core/journals/leiden-journal-of-international-law/article/election-hacking-the-rule-of-sovereignty-and-deductive-reasoning-in-customary-international-law/2192E8E79A080E9AE07C419F827CFDB3 The final, definitive version of this article has been published in the Journal, Leiden Journal of International Law, ?? (?), pp ???-??? 2023, © 2023 Cambridge University Press.

PY - 2023/4/24

Y1 - 2023/4/24

N2 - This article considers the international laws applicable to irresponsible State behaviour in cyberspace through the lens of the problem of election hacking. The rule of sovereignty has taken centre stage in these discussions and is said to be preferred to the non-intervention rule because it evades the problem of coercion. Proponents of the cyber rule of sovereignty contend that there is such a rule; Opponents reject the existence of the rule as a matter of existing law. The objective here is to explore the methodologies involved in the identification of the cyber rule of sovereignty under customary international law. The work first frames the debate in the language of regulative and constitutive rules, allowing us to show that a regulative rule of sovereignty can, logically, and necessarily, be deduced from the constitutive rule of sovereignty. The content of the regulative rule can also be deduced from the constitutive rule of sovereignty, but it has a more limited scope than claimed by the proponents of the rule, notably the Tallinn Manual 2.0. The rule of sovereignty prohibits State cyber operations carried out on the territory of the target State and remote cyber operations which involve the exercise of sovereign authority on that territory, e.g., police evidence gathering operations. The rule of sovereignty does not, however, prohibit other remote, ex situ State cyber operations, even those targeting ICTs used for governmental functions, including the conduct of elections. The rule of sovereignty is not, then, the solution to the problem of election hacking.

AB - This article considers the international laws applicable to irresponsible State behaviour in cyberspace through the lens of the problem of election hacking. The rule of sovereignty has taken centre stage in these discussions and is said to be preferred to the non-intervention rule because it evades the problem of coercion. Proponents of the cyber rule of sovereignty contend that there is such a rule; Opponents reject the existence of the rule as a matter of existing law. The objective here is to explore the methodologies involved in the identification of the cyber rule of sovereignty under customary international law. The work first frames the debate in the language of regulative and constitutive rules, allowing us to show that a regulative rule of sovereignty can, logically, and necessarily, be deduced from the constitutive rule of sovereignty. The content of the regulative rule can also be deduced from the constitutive rule of sovereignty, but it has a more limited scope than claimed by the proponents of the rule, notably the Tallinn Manual 2.0. The rule of sovereignty prohibits State cyber operations carried out on the territory of the target State and remote cyber operations which involve the exercise of sovereign authority on that territory, e.g., police evidence gathering operations. The rule of sovereignty does not, however, prohibit other remote, ex situ State cyber operations, even those targeting ICTs used for governmental functions, including the conduct of elections. The rule of sovereignty is not, then, the solution to the problem of election hacking.

KW - custom

KW - cyber

KW - deduction

KW - election

KW - sovereignty

U2 - 10.1017/S0922156523000092

DO - 10.1017/S0922156523000092

M3 - Journal article

VL - 36

SP - 675

EP - 698

JO - Leiden Journal of International Law

JF - Leiden Journal of International Law

SN - 0922-1565

IS - 3

ER -