Front matter
p. iAdvanced Introduction to Cybersecurity Law
p. iiElgar Advanced Introductions are stimulating and thoughtful introductions to major fields in the social sciences, business and law, expertly written by the world’s leading scholars. Designed to be accessible yet rigorous, they offer concise and lucid surveys of the substantive and policy issues associated with discrete subject areas.
The aims of the series are two-fold: to pinpoint essential principles of a particular field, and to offer insights that stimulate critical thinking. By distilling the vast and often technical corpus of information on the subject into a concise and meaningful form, the books serve as accessible introductions for undergraduate and graduate students coming to the subject for the first time. Importantly, they also develop well-informed, nuanced critiques of the field that will challenge and extend the understanding of advanced students, scholars and policy-makers.
For a full list of titles in the series please see the back of the book. Recent titles in the series include:
U.S. Environmental Law
E. Donald Elliott and Daniel C. Esty
Gentrification
Chris Hamnett
Family Policy
Chiara Saraceno
Law and Psychology
Tom R. Tyler
Advertising
Patrick De Pelsmacker
New Institutional Economics
Claude Ménard and Mary M. Shirley
The Sociology of Sport
Eric Anderson and Rory Magrath
The Sociology of Peace Processes
John D. Brewer
Social Protection
James Midgley
Corporate Finance
James A. Brickley and Clifford W. Smith Jr
U.S. Federal Securities Law
Thomas Lee Hazen
Cybersecurity Law
David P. Fidler
p. iiiAdvanced Introduction to
Cybersecurity Law
DAVID P. FIDLER
Senior Fellow for Cybersecurity and Global Health, Council on Foreign Relations, USA
Elgar Advanced Introductions
Cheltenham, UK • Northampton, MA, USA
p. iv© David P. Fidler 2022
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical or photocopying, recording, or otherwise without the prior permission of the publisher.
Published by
Edward Elgar Publishing Limited
The Lypiatts
15 Lansdown Road
Cheltenham
Glos GL50 2JA
UK
Edward Elgar Publishing, Inc.
William Pratt House
9 Dewey Court
Northampton
Massachusetts 01060
USA
A catalogue record for this book
is available from the British Library
Library of Congress Control Number: 2022934389
This book is available electronically on Elgar Advanced Introductions: Law
ISBN 978 1 80088 334 5 (cased)
ISBN 978 1 80088 336 9 (paperback)
ISBN 978 1 80088 335 2 (eBook)
List of figures ix
List of tables x
About the author xi
Preface xiii
Post script xvi
List of abbreviations xvii
Index 152
David P. Fidler is a senior fellow for cybersecurity and global health at the Council on Foreign Relations, USA. At CFR, he has contributed to Net Politics, the blog of CFR’s Digital and Cyberspace Policy Program and written reports on cybersecurity issues, including “Cybersecurity and the New Era of Space Activities,” CFR Cyber Brief (April 2018). He served as the chair of the International Law Association Study Group on Cybersecurity, Terrorism, and International Law (2014-16). He edited and contributed to The Snowden Reader (Indiana University Press, 2015). His recent publications include “Cyberspace and Human Rights,” p. xiiin Research Handbook on International Law and Cyberspace, 2nd ed. (Nicholas Tsagourias and Russell Buchan, eds.) (Edward Elgar, 2021), 130-51; “Foreign Election Interference and Open-Source Anarchy, “in Defending Democracies: Combating Foreign Election Interference in the Digital Age (Jens David Ohlin and Duncan Hollis, eds.) (Oxford University Press, 2021), 293-313; and “SolarWinds and Microsoft Exchange: Hacks Wrapped in a Cybersecurity Dilemma Inside a Cyberspace Crisis, “Georgetown Journal of International Affairs (April 2021). He holds degrees in law from Harvard Law School and the University of Oxford and in international relations from the University of Oxford.
In the late 1990s, concerns about ‘non-lethal’ weapons introduced me to the potential weaponization of internet-linked digital technologies. Initially, the possible development of other types of ‘non-lethal’ weapons preoccupied my attention, but, in the first decade of the new century, the significance of what came to be called ‘cybersecurity’ became more apparent. Governments began to grapple with cybercrime, terrorist use of the internet, cyber espionage, and the military potential of cyber technologies. But it was the Stuxnet operation exposed in 2010 that crystallized for me the policy and legal challenges that cybersecurity threats posed to governments, economies, societies, and individuals. Thereafter, cybersecurity became a core part of my endeavours as a professor at the Indiana University Maurer School of Law and my think-tank work with the Council on Foreign Relations.
This book derives from the materials I developed in teaching Cybersecurity Law and Policy for nearly a decade. As such, it benefits from the changes I made to my approach from interacting with students, learning from colleagues, and analysing the policy and legal implications of cybersecurity incidents and developments at home and abroad. In keeping with the purpose of Elgar Advanced Introductions, the book provides an accessible framework for understanding the field of cybersecurity and concise analysis of domestic and international law concerning each topic within the framework. The book also evaluates whether domestic and international law are proving effective against cybersecurity threats and identifies policy shifts made, and proposals offered, to improve cybersecurity within and among nations.
Given the diversity of national legal systems, the book’s sections on domestic law focus on patterns discernible across countries that arise p. xivfrom how governments deal with cybersecurity threats. Examples from various countries are given, but the sections on domestic law primarily provide a roadmap for guiding more detailed study of how domestic legal systems handle cybersecurity challenges.
By contrast, international law provides an overarching set of rules that applies to the interactions of all states, which permits more uniformity in analysing how states use international law in addressing cybersecurity problems. However, international law reflects a different kind of diversity. On some problems, such as cybercrime, states have developed many international legal instruments. In some areas of cybersecurity, such as armed conflict, countries rely on international law developed before the internet and cyberspace became global phenomena. On yet other issues, such as cyber espionage, little, if any, international law exists. In terms of general international legal rules, such as on sovereignty and non-intervention in the domestic affairs of other states, states agree that such rules apply in cyberspace but prove reticent to clarify how they apply to features or consequences of cyber operations.
As an advanced introduction, the book does not systematically cite the scholarship and policy writing on cybersecurity. Much of this analytical work dissects cybersecurity events, challenges traditional perspectives on cybersecurity, and offers new ways to think about this field. This dynamic has been particularly interesting, for example, in connection with international law and cyber espionage. The book identifies prominent cybersecurity incidents, new policy perspectives, and leading legal reform ideas to prime the reader’s exploration of additional material on specific cybersecurity episodes and different ways of countering cybersecurity threats. Where relevant, I point readers to chapters in the Research Handbook on International Law and Cyberspace (Edward Elgar, 2nd edn, 2021) to assist deeper study of issues raised in this book.
The book’s final chapter summarizes the past 20 years in cybersecurity policy and law and ponders the challenges the next decade might bring. Looking backward and peering ahead are sobering exercises. Past efforts have proved less effective than hoped. Future actions must navigate more difficult national and international environments, including the return of balance-of-power politics to the international system. What emerges in this darker context remains to be seen. But a decade from now, an advanced introduction to cybersecurity law will likely look different to p. xvthe one in your hands because you, perhaps, helped chart a new course for an area of policy and law that will only become more important with each passing day.
David P. Fidler
Clarendon Hills, Illinois, USA
15 October 2021
The Russian invasion of Ukraine in February 2022 occurred after this book’s production process was completed. The armed conflict between Russia and Ukraine involved military kinetic and cyber operations and provides an important episode relevant to the analysis in Chapter 6.--D.P.F.
art. | article in a legal document |
CBMs | confidence-building measures |
CIP | critical-infrastructure protection |
COE | Council of Europe |
DDoS | distributed denial of service |
DNS | Domain Name System |
EU | European Union |
Europol | European Law Enforcement Agency |
FISA | Foreign Intelligence Surveillance Act |
ICANN | Internet Corporation for Assigned Names and Numbers |
ICC | International Criminal Court |
ICCPR | International Covenant on Civil and Political Rights |
ICRC | International Committee of the Red Cross |
ICT | information and communication technology |
IETF | Internet Engineering Task Force |
IGF | Internet Governance Forum |
IHL | international humanitarian law |
ITRs | International Telecommunication Regulations |
ITU | International Telecommunication Union |
MLAT | mutual legal assistance treaty |
NATO | North Atlantic Treaty Organization |
para. | paragraph in a document |
p. xviiiR2P | responsibility to protect |
sec. | section in a document |
Tallinn Manual 2.0 | Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations |
TCP/IP | Transmission Control Protocol/Internet Protocol |
TRIPS | WTO Agreement on Trade-Related Aspects of Intellectual Property Rights |
UK | United Kingdom |
UN | United Nations |
UNGGE | UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security |
US | United States |
USC | United States Code |
USMCA | United States–Mexico–Canada Agreement |
VEP | vulnerabilities equities process |
WTO | World Trade Organization |