International Law and Cyberspace Flashcards

1
Q

What are the three main forms of international law?

A

Treaty Law, Customary Law, General Principles of Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Pacta sunt servanda?

A

It means every treaty in force is binding upon the parties and must be performed in good faith (Article 26 of Vienna Convention).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the key issue in applying Treaty Law in the cyber context?

A

How norms of non-cyber-specific instruments are to be interpreted in the cyber context.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two elements required for customary international law?

A

State practice (usus) and opinio juris (belief that practice is legally necessary).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What obstacles exist for the emergence of customary norms in cyberspace?

A

Requirement of practice over time, invisibility of cyber activities, strategic ambiguity, consistency, and density.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the principle of sovereignty in cyberspace?

A

A state enjoys sovereign authority over cyber infrastructure and activities within its territory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a violation of sovereignty in the cyber context?

A

Physical damage, loss of functionality, or interference with governmental functions of another state.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the three types of jurisdiction states possess?

A

Prescriptive (legislative), enforcement (executive), and judicial (adjudicatory).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is territorial jurisdiction in cyberspace?

A

A state may exercise jurisdiction over cyber activities originating in or affecting its territory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is extraterritorial prescriptive jurisdiction?

A

A state can regulate cyber activities by its nationals or those that impact its essential interests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the main international human rights relevant to cyberspace?

A

Freedom of expression, privacy, due process, economic and social rights, access to the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the applicability of the Law of Armed Conflict to cyber operations?

A

Cyber operations in armed conflict are subject to international humanitarian law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two types of armed conflicts under international law?

A

International armed conflict (between states) and non-international armed conflict (within a state).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a cyber attack?

A

A cyber operation expected to cause injury, death, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the principle of distinction in cyber warfare?

A

Cyber attacks must distinguish between civilian and military targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is prohibited under international law regarding cyber attacks?

A

Attacking civilians, civilian objects, indiscriminate attacks, and acts of cyber terrorism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who may be lawfully targeted in a cyber attack?

A

Armed forces members, organized armed groups, civilians participating in hostilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is prohibited under the means and methods of cyber warfare?

A

Causing unnecessary suffering, using indiscriminate methods, employing cyber booby traps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the principle of proportionality in cyber warfare?

A

Cyber attacks must not cause excessive civilian harm relative to military advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What must be done before launching a cyber attack?

A

Verify targets, take precautions, provide advance warning when possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the right of visit in maritime cyber operations?

A

A warship may board a vessel if suspected of cyber piracy or illegal cyber activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the legal status of cyber operations in national airspace?

A

States may regulate aircraft conducting cyber operations in their airspace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What restrictions exist on cyber operations in outer space?

A

Cyber operations must be for peaceful purposes and avoid interference with other states’ activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does the NIS2 Directive require from essential entities?

A

Implement risk management measures for cybersecurity, including incident handling and encryption.

25
Q

What is the principle of non-intervention in cyber diplomacy?

A

Diplomatic missions must not engage in cyber activities interfering with a host state’s internal affairs.

26
Q

What protections exist for cyber infrastructure in diplomatic missions?

A

Cyber infrastructure in diplomatic premises is inviolable and must be protected from intrusion.

27
Q

What is the legal framework governing cyber operations on the high seas?

A

Cyber operations must comply with international law and be conducted for peaceful purposes.

28
Q

What are the obligations of states in regulating private cyber actors?

A

States must supervise private cyber activities and ensure they comply with international law.

29
Q

What principle governs cyber warfare targeting?

A

Military objectives should be selected to minimize civilian harm when multiple options exist.

30
Q

What is cyber espionage under international law?

A

Unlawful cyber intelligence gathering that may result in loss of legal protections for captured spies.

31
Q

What is the responsibility of states regarding cyber attacks?

A

States must not knowingly allow cyber infrastructure to be used for unlawful acts affecting other states.

32
Q

What is the universality principle in cyber crime jurisdiction?

A

Certain cyber crimes can be prosecuted by any state under international law.

33
Q

What are key factors in determining jurisdiction over cyber crimes?

A

Connection to the crime, location of perpetrator, extradition treaties, and state interests.

34
Q

What is cyber sovereignty?

A

A state’s exclusive control over cyber activities within its jurisdiction.

35
Q

What are cyber booby traps?

A

Malicious cyber tools designed to trigger unexpected harmful actions, prohibited under warfare law.

36
Q

What is the effects doctrine in territorial jurisdiction?

A

A state may exercise jurisdiction if cyber activities have substantial effects within its territory.

37
Q

What is a cyber levée en masse?

A

Civilians spontaneously taking up cyber arms against an invading force, enjoying combatant status.

38
Q

What is the role of consent in cyber operations?

A

A state may consent to another state’s cyber operations within its jurisdiction.

39
Q

What is cyber terrorism?

A

Cyber attacks intended primarily to spread terror among the civilian population, prohibited under international law.

40
Q

What is the significance of the UN Charter in cyberspace governance?

A

The UN Charter is fundamental to international law and applies to cyberspace. It emphasizes sovereignty, non-intervention, and the prohibition of the use of force, meaning that cyber operations must adhere to these principles.

41
Q

How does the principle of non-intervention apply to cyber operations?

A

The principle of non-intervention prohibits states from using cyber means to interfere in the internal or external affairs of another state, such as influencing elections or undermining a government’s authority.

42
Q

What are the main legal challenges in applying international humanitarian law (IHL) to cyber warfare?

A

The key challenges include attribution difficulties, determining whether a cyber attack meets the threshold of an armed conflict, ensuring distinction between civilian and military targets, and assessing proportionality in the cyber domain.

43
Q

What role does attribution play in cyber conflict and international law?

A

Attribution is crucial in holding states accountable for cyber operations. It involves technical evidence, intelligence assessments, and legal frameworks to determine the responsible party, but remains complex due to anonymity and spoofing techniques.

44
Q

What is the threshold for a cyber operation to be considered a ‘use of force’ under international law?

A

A cyber operation constitutes a ‘use of force’ if it causes significant physical damage, injury, or loss of life comparable to conventional military attacks. The interpretation is guided by Article 2(4) of the UN Charter and state practice.

45
Q

How does the law of state responsibility apply to cyber operations?

A

Under international law, a state is responsible for cyber operations conducted by its government agencies, as well as for private actors if they act under the direction or control of the state or if the state knowingly allows harmful cyber activities.

46
Q

What is the ‘due diligence’ obligation of states regarding cyber activities?

A

Due diligence requires states to prevent their territory from being used for cyber operations that harm other states. While not all states accept this as a binding legal duty, many consider it an emerging norm in international law.

47
Q

What is the difference between a cyber espionage operation and a cyber attack under international law?

A

Cyber espionage, which involves unauthorized data collection, is generally not considered a use of force and falls into a legal gray area. However, cyber attacks, which cause destruction or harm, may violate international law and trigger self-defense rights.

48
Q

What is the ‘effects-based approach’ in determining the legality of cyber operations?

A

The effects-based approach assesses the impact of a cyber operation rather than its technical means. If the consequences are comparable to a kinetic attack, it may be considered a use of force or an armed attack under international law.

49
Q

How does the principle of proportionality apply to cyber attacks?

A

A cyber attack must not cause excessive collateral damage to civilians or civilian infrastructure relative to the anticipated military advantage. This principle is particularly challenging in cyberspace due to indirect and cascading effects.

50
Q

What legal protections exist for critical infrastructure under international law?

A

International law does not explicitly prohibit cyber attacks on civilian infrastructure, but targeting essential services like power grids, hospitals, and water supplies could violate humanitarian law if it disproportionately affects civilians.

51
Q

How does international law address cyber operations targeting financial institutions?

A

While no universal rule prohibits cyber operations against financial institutions, such attacks could be seen as economic coercion, violate sovereignty, or disrupt international stability, potentially invoking countermeasures by affected states.

52
Q

Can states respond to cyber attacks with countermeasures?

A

Yes, under international law, states can take countermeasures—such as sanctions or cyber retaliation—if they are proportional, non-forceful, and aimed at compelling the responsible state to comply with its legal obligations.

53
Q

What is the Tallinn Manual, and how does it contribute to cyber law?

A

The Tallinn Manual is a non-binding academic study outlining how international law applies to cyber conflicts. It provides legal interpretations on sovereignty, self-defense, cyber warfare, and state responsibility in cyberspace.

54
Q

How does the principle of necessity limit state responses to cyber threats?

A

Necessity requires that a state only take cyber measures that are essential to protect its interests and when no alternative lawful measures are available, ensuring that responses remain within legal boundaries.

55
Q

What is the legal status of hacktivism under international law?

A

Hacktivism—unauthorized cyber activities by non-state actors for political purposes—is generally illegal under domestic laws, and states may hold responsible governments accountable if hacktivists operate with state support.

56
Q

What legal principles apply to self-defense against cyber attacks?

A

A state may invoke the right to self-defense under Article 51 of the UN Charter if a cyber attack reaches the threshold of an armed attack, causing significant harm. The response must be necessary and proportional.

57
Q

What are the limitations on economic sanctions in response to cyber operations?

A

Economic sanctions must comply with international law, meaning they should not violate trade agreements, humanitarian obligations, or disproportionately harm civilian populations.

58
Q

What is the ‘responsibility to protect’ (R2P) doctrine in relation to cyberspace?

A

The R2P doctrine suggests that states must protect their populations from cyber-enabled atrocities such as genocide, war crimes, and ethnic cleansing, and the international community may intervene if a state fails to do so.

59
Q

What role do international organizations play in cyber norm development?

A

Organizations like the UN, NATO, and the EU establish cyber norms by setting legal frameworks, facilitating diplomatic discussions, and promoting cooperative cybersecurity measures to maintain global stability.