{"id":6187,"date":"2012-12-12T16:15:48","date_gmt":"2012-12-12T21:15:48","guid":{"rendered":"http:\/\/www.journals.law.harvard.edu\/ilj\/?p=6187"},"modified":"2014-04-12T21:05:24","modified_gmt":"2014-04-13T01:05:24","slug":"online-articles-online_54_schmitt","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/ilj\/2012\/12\/online-articles-online_54_schmitt\/","title":{"rendered":"International Law in Cyberspace: The Koh Speech and Tallinn Manual Juxtaposed"},"content":{"rendered":"<p>In 2011, the White House issued the <i>International Strategy for Cyberspace<\/i>, which noted that \u201c[t]he development of norms for state conduct in cyberspace does not require a reinvention of customary international law, nor does it render existing international norms obsolete.\u00a0 Long-standing international norms guiding state behavior\u2014in times of peace and conflict\u2014also apply in cyberspace.\u201d\u00a0 However, the document cautioned that the \u201cunique attributes of networked technology require additional work to clarify how these norms apply and what additional understandings might be necessary to supplement them.\u201d<a title=\"\" href=\"#_ftn2\"><br \/>\n<\/a><\/p>\n<p>On September 18, 2012, State Department Legal Adviser Harold Koh took an important step towards publically elucidating the U.S. positions on how international law applies to cyberspace.\u00a0At a conference sponsored by United States Cyber Command (USCYBERCOM), Mr. Koh offered brief answers to what he labeled the \u201cfundamental questions\u201d on the issue.\u00a0 He also identified several \u201cunresolved questions\u201d with which the United States would likely be forced to grapple in the future.\u00a0 Since the speech had been fully cleared in the interagency process, it can be viewed as reflecting the U.S. Government\u2019s views on the issues, not just those of Mr. Koh or the State Department.<\/p>\n<p>The timing of the speech was propitious.\u00a0 Less than three weeks earlier, NATO\u2019s Cooperative Cyber Defence Centre of Excellence (CCD COE) had released a draft the long-awaited <i>Tallinn Manual<\/i>, due for formal publication in early 2013.\u00a0 The Manual is the product of a three-year project sponsored by the Centre in which an \u201cInternational Group of Experts\u201d examined, <i>inter alia<\/i>, the very issues cited in the Koh Speech.\u00a0 Participants included distinguished legal academics and practitioners, supported by a team of technical experts.\u00a0 USCYBERCOM, the International Committee of the Red Cross, and NATO each provided an observer who participated actively throughout the project, albeit in a non-voting capacity.<\/p>\n<p>The <i>Tallinn Manual<\/i> consists of \u201crules\u201d adopted unanimously by the International Group of Experts that are meant to reflect customary international law, accompanied by \u201ccommentary\u201d that delineates their legal basis and highlights any differences of opinion among the Experts as to their interpretation in the cyber context.\u00a0 A select group of peer reviewers offered comments on the various drafts, as did a number of states that were willing to informally and unofficially do so.\u00a0 The author served as Director of the Project.<\/p>\n<p>The relative congruency between the U.S. Government\u2019s views, as reflected in the Koh speech, and those of the International Group of Experts is striking.\u00a0 This confluence of a state\u2019s expression of <i>opinio juris<\/i> with a work constituting \u201cthe teachings of the most highly qualified publicists of the various nations\u201d significantly enhances the persuasiveness of common conclusions.\u00a0Of course, the limited differences that exist as to particular points of law render the respective positions on those points somewhat less compelling.<\/p>\n<p>This article serves two purposes.\u00a0 First, it functions as a concordance between the positions articulated in the Koh speech and those found in the <i>Tallinn Manual<\/i>.\u00a0 The comparison is particularly apropos in light of the parallels in their content.\u00a0 Second, drawing on the <i>Tallinn Manual<\/i>, the article provides analytical granularity as to the legal basis for the positions proffered in the Koh Speech.\u00a0 In doing so, it usefully catalogues the various competing interpretive perspectives.\u00a0 The article is crafted around Mr. Koh\u2019s \u201cQuestions and Answers,\u201d which are reordered topically and set forth at the beginning of each section.<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/ilj\/wp-content\/uploads\/sites\/84\/2012\/12\/HILJ-Online_54_Schmitt.pdf\"><a href=\"https:\/\/journals.law.harvard.edu\/ilj\/wp-content\/uploads\/sites\/84\/2012\/12\/HILJ-Online_54_Schmitt.pdf\">Read full article (PDF)<\/a><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On September 18, 2012, State Department Legal Adviser Harold Koh took an important step towards publically elucidating the U.S. positions on how international law applies to cyberspace. Shortly thereafter, NATO\u2019s Cooperative Cyber Defence Centre of Excellence (CCD COE) had released a draft the long-awaited Tallinn Manual, due for formal publication in early 2013.  The Manual is the product of a three-year project sponsored by the Centre in which an \u201cInternational Group of Experts\u201d examined, inter alia, the very issues cited in the Koh Speech. This article functions as a concordance between the positions articulated in the Koh speech and those found in the Tallinn Manual, and provides analytical granularity as to the legal basis for the positions proffered in the Koh Speech.  <\/p>\n","protected":false},"author":2,"featured_media":6189,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_FSMCFIC_featured_image_caption":"","_FSMCFIC_featured_image_nocaption":"","_FSMCFIC_featured_image_hide":"","_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[4,48,47],"class_list":["post-6187","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-features","tag-featured","tag-ip-law","tag-laws-of-war"],"jetpack_featured_media_url":"https:\/\/journals.law.harvard.edu\/ilj\/wp-content\/uploads\/sites\/84\/2012\/12\/cyberlaw-image.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/peZu3S-1BN","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts\/6187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/comments?post=6187"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts\/6187\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/media\/6189"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/media?parent=6187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/categories?post=6187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/tags?post=6187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}