{"id":8846,"date":"2020-06-17T10:52:28","date_gmt":"2020-06-17T14:52:28","guid":{"rendered":"https:\/\/journals.law.harvard.edu\/ilj\/?p=8846"},"modified":"2023-09-29T18:48:10","modified_gmt":"2023-09-29T22:48:10","slug":"security-and-human-rights-challenges-of-cyber-due-diligence","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/ilj\/2020\/06\/security-and-human-rights-challenges-of-cyber-due-diligence\/","title":{"rendered":"Security and Human Rights Challenges of Cyber Due Diligence"},"content":{"rendered":"<p>By: Adina Ponta<\/p>\n<p><em>Editor\u2019s Note: This article does not reflect the views of the American Society of International Law or its members.<\/em><\/p>\n<h1><strong>Introduction<\/strong><\/h1>\n<p>After\u00a0<a href=\"https:\/\/www.coe.int\/en\/web\/cybercrime\/the-budapest-convention\">states<\/a>, <a href=\"https:\/\/eeas.europa.eu\/delegations\/un-new-york\/52894\/eu-statement-%E2%80%93-united-nations-1st-committee-thematic-discussion-other-disarmament-measures-and_en\">international<\/a> <a href=\"https:\/\/www.nato.int\/cps\/en\/natohq\/official_texts_133169.htm\">organizations<\/a>, and international\u00a0<a href=\"https:\/\/www.nato.int\/nato_static\/assets\/pdf\/pdf_2011_05\/20110926_110526-G8-Summit-Deauville.pdf\">coordinating<\/a> fora, including the United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (\u201c<a href=\"https:\/\/undocs.org\/A\/70\/174\">UN GGE<\/a>\u201d), endorsed application of international law to cyberspace, the debate shifted to questions of how existing principles, rights, and obligations should be interpreted in regard to cyber activities.<\/p>\n<p>As\u00a0<a href=\"https:\/\/www.cambridge.org\/core\/books\/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations\/sovereignty\/6BA0C5B9829FD15D997B8C973C395E16\">reaffirmed<\/a>\u00a0by the Tallinn Manual 2.0, several principles and rules of conventional and customary international law derive from the international law principle of sovereignty, including the \u201c<a href=\"https:\/\/www.icj-cij.org\/files\/case-related\/70\/070-19860627-JUD-01-00-EN.pdf\">corollary<\/a>\u201d principle of non-intervention. Although states and scholars have different views regarding the legal qualification of sovereignty\u2014either as an international law principle or as a rule \u2014it is accepted that in cyberspace, sovereignty reflects states\u2019 exclusive legal authority over their cyber infrastructure and activity associated with it, as well as jurisdiction over the persons engaged in cyber activity, including control of non-state cyber operations launched from their territory.<\/p>\n<p>The modern due diligence principle derives from the\u00a0<a href=\"https:\/\/poseidon01.ssrn.com\/delivery.php?ID=535088111116103124001007095126085122000020077035034062072086117067098082127118108098056017035063031005018100100074120089095083121026023010011093125126106027030100073005050095092113110089066031026101078103001116008095005092086123073092102127017009097&amp;EXT=pdf\">ancient maxim\u00a0<\/a><em>sic utere tuo ut alienum non laedas<\/em>, meaning use your own property in such a manner as not to injure that of others. In <a href=\"https:\/\/www.president.ee\/en\/official-duties\/speeches\/15241-president-of-the-republic-at-the-opening-of-cycon-2019\/index.html\">2019<\/a>, the Estonian President noted that \u201c[s]overeignty entails not only rights, but also obligations,\u201d reaffirming views expressed by <a href=\"https:\/\/www.dfat.gov.au\/sites\/default\/files\/DFAT%20AICES_AccPDF.pdf\">Australia<\/a>, <a href=\"https:\/\/www.diplomatie.gouv.fr\/IMG\/pdf\/190514-_french_reponse_un_resolutions_73-27_-_73-266_ang_cle4f5b5a-1.pdf\">France<\/a>, <a href=\"https:\/\/www.auswaertiges-amt.de\/en\/newsroom\/news\/150518-ca-b-chatham-house\/271832\">Germany<\/a>, and <a href=\"https:\/\/www.government.nl\/ministries\/ministry-of-foreign-affairs\/documents\/parliamentary-documents\/2019\/09\/26\/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace\">the Netherlands<\/a>. In this regard, a state may be held responsible for the conducts of private persons if (1) upon attribution, these acts are <a href=\"https:\/\/legal.un.org\/ilc\/texts\/instruments\/english\/commentaries\/9_6_2001.pdf\">considered<\/a> to be acts of the state itself, or (2) if a state has violated its obligation \u201cnot to allow knowingly its territory to be used for acts contrary to the rights of other States,\u201d as emphasized by the International Court of Justice (\u201cICJ\u201d) in the <a href=\"https:\/\/www.icj-cij.org\/files\/case-related\/1\/001-19490409-JUD-01-00-EN.pdf\"><em>Corfu Channel<\/em><\/a> case.<\/p>\n<h1><strong>Cyber Due Diligence <\/strong><\/h1>\n<p>Deriving the obligation of due diligence in cyberspace from the principle of equal state sovereignty, Rule 6 of the Tallinn Manual 2.0. notes states\u2019 obligation to ensure that the territory or cyber infrastructure under their control is not used for cyber operations that affect the rights of, and produce serious adverse consequences for, other states. The due diligence principle covers\u00a0<a href=\"https:\/\/www.justsecurity.org\/66194\/frances-major-statement-on-international-law-and-cyber-an-assessment\/\">remote operations<\/a>\u00a0and operations conducted from or through state territory that affect the legal <a href=\"https:\/\/www.youtube.com\/watch?v=YOIuiNfaZU8\">rights<\/a>, and not mere interests, of other states. As mentioned by the director of the Tallinn Manual Process, this includes, for example, the\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=YOIuiNfaZU8\">right to be free from intervention<\/a>\u00a0by another state.<\/p>\n<p>In the environmental law context, due diligence has been\u00a0<a href=\"https:\/\/ccdcoe.org\/uploads\/2018\/10\/Art-13-From-Grey-Zone-to-Customary-International-Law.-How-Adopting-the-Precautionary-Principle-May-Help-Crystallize-the-Due-Diligence-Principle-in-Cyberspace.pdf\">recognized<\/a>\u00a0as a principle of customary international law by international tribunals, including the\u00a0<a href=\"https:\/\/www.icj-cij.org\/files\/case-related\/152\/152-20151216-JUD-01-00-EN.pdf\">ICJ<\/a>, and in treaties, such as the <a href=\"https:\/\/unfccc.int\/files\/essential_background\/background_publications_htmlpdf\/application\/pdf\/conveng.pdf\">UN Framework Convention on Climate Change<\/a>. However, under\u00a0<em>lex lata,\u00a0<\/em>cyber due diligence has no binding nature, therefore, its scope and consequences of non-compliance are still grey areas of international law, as reflected by the <a href=\"https:\/\/undocs.org\/A\/70\/174\">2015<\/a> UN GGE report. The vague language\u00a0<a href=\"https:\/\/cpb-us-w2.wpmucdn.com\/campuspress.yale.edu\/dist\/8\/1581\/files\/2017\/08\/Schmitt_Grey-Areas-in-the-International-Law-of-Cyberspace-1cab8kj.pdf\">might indicate<\/a>\u00a0a lack of state endorsement that the due diligence duty is reflective of\u00a0<a href=\"https:\/\/legal.un.org\/riaa\/cases\/vol_III\/1905-1982.pdf\">customary international law<\/a>. The rejection of a mandatory due diligence rule within the UN GGE, which might as well represent valid\u00a0<em>opinio juris,\u00a0<\/em>mainly underlies fears of burdensome oversight obligations such a rule would impose on states with massive technological capabilities.<\/p>\n<p>In contrast to the absence of consensus which determine the general language used in the statements of international organizations, individual states often chose to assert more <a href=\"https:\/\/www.justsecurity.org\/66562\/the-netherlands-releases-a-tour-de-force-on-international-law-in-cyberspace-analysis\/\">granular statements<\/a>.\u00a0Official endorsement of due diligence as a rule of international law, by the <a href=\"https:\/\/www.government.nl\/binaries\/government\/documents\/parliamentary-documents\/2019\/09\/26\/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace\/International+Law+in+the+Cyberdomain+-+Netherlands.pdf\">Netherlands<\/a>, <a href=\"https:\/\/www.diplomatie.gouv.fr\/IMG\/pdf\/190514-_french_reponse_un_resolutions_73-27_-_73-266_ang_cle4f5b5a-1.pdf\">France<\/a>, <a href=\"https:\/\/www.auswaertiges-amt.de\/en\/newsroom\/news\/150518-ca-b-chatham-house\/271832\">Germany<\/a>, <a href=\"https:\/\/president.ee\/en\/official-duties\/speeches\/15241-president-of-the-republic-at-the-opening-of-cycon-2019\/\">Estonia<\/a>, and <a href=\"https:\/\/ccdcoe.org\/incyder-articles\/overview-of-un-oewg-developments-continuation-of-discussions-on-how-international-law-applies-in-cyberspace\/\">Finland<\/a>, translates into accepting the consequences of internationally wrongful acts, such as political or diplomatic actions, including those implemented via the U.N. Security Council. In the\u00a0<a href=\"https:\/\/www.defense.gouv.fr\/content\/download\/565896\/9750885\/file\/Droit+internat+appliqu%C3%A9+aux+op%C3%A9rations+Cyberespace+-+r%C3%A9sum%C3%A9.pdf\">French<\/a>\u00a0view, non-compliance with the due diligence rule, including failure to terminate operations which violate the sovereignty of another state, may be followed by\u00a0<a href=\"http:\/\/opiniojuris.org\/2019\/09\/24\/frances-declaration-on-international-law-in-cyberspace-the-law-of-peacetime-cyber-operations-part-i\/\">non-forcible<\/a>\u00a0countermeasures. Due diligence could be especially <a href=\"https:\/\/harvardnsj.org\/wp-content\/uploads\/sites\/13\/2017\/02\/Schmitt-NSJ-Vol-8.pdf\">valuable<\/a> in the assessment of legitimate responses to actions committed by non-state actors, as countermeasures can be lawfully applied only against states. The answer to this dilemma could be another question: did the host state of those actors breach its due diligence obligation?<\/p>\n<h1><strong>The Preventive Component of Due Diligence<\/strong><strong>\u00a0<\/strong><\/h1>\n<p>The application of the French maxim \u201c<em>Qui peut et n\u2019emp\u00eache, p\u00e8che<\/em>\u201d (He who can and does not prevent, sins) in the cyber realm is very controversial. According to the International Law Commission (\u201cILC\u201d), states are expected to employ\u00a0<a href=\"https:\/\/legal.un.org\/ilc\/texts\/instruments\/english\/commentaries\/9_7_2001.pdf\">vigilance<\/a>\u00a0on their territory, a duty that\u00a0has <a href=\"https:\/\/poseidon01.ssrn.com\/delivery.php?ID=924024068085090099021002019094118078018010057003010003004105083109024010064022017011126002010009009047042124109016115109065079005085066082003089077093112088105099010052005043005015006127065093124003019104020016090001003100108017080019118122024082090069&amp;EXT=pdf\">developed<\/a>\u00a0in relation to their responsibility for private activities. Although it is agreed that due diligence is an obligation of conduct, there is no consensus on its content, nor on whether this duty also entails a <a href=\"https:\/\/undocs.org\/A\/70\/174\">preventive aspect<\/a>, which in case of violation would constitute an internationally wrongful act. Prevention, the procedural component of due diligence, is reflected in the European Union (\u201cEU\u201d) General Data Protection Regulation (\u201c<a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679&amp;from=EN\">GDPR<\/a>\u201d), and has been endorsed by the World Trade Organization (\u201cWTO\u201d), by the International Tribunal for the Law of the Sea (\u201c<a href=\"https:\/\/www.itlos.org\/fileadmin\/itlos\/documents\/cases\/case_no_17\/adv_op_010211.pdf\">ITLOS<\/a>\u201d), and, in the environmental context, by the <a href=\"https:\/\/www.icj-cij.org\/files\/case-related\/135\/135-20100420-JUD-01-00-EN.pdf\">ICJ<\/a>. By <a href=\"https:\/\/ccdcoe.org\/uploads\/2018\/10\/Art-13-From-Grey-Zone-to-Customary-International-Law.-How-Adopting-the-Precautionary-Principle-May-Help-Crystallize-the-Due-Diligence-Principle-in-Cyberspace.pdf\">analogy<\/a> with international environmental law, states would have to assess the cyberactivities within their jurisdiction, similar to the obligation to conduct an environmental impact assessment, when there is a likelihood that transboundary harm would occur from these activities.<\/p>\n<p><a href=\"https:\/\/www.government.nl\/ministries\/ministry-of-foreign-affairs\/documents\/parliamentary-documents\/2019\/09\/26\/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace\">The Netherlands<\/a>\u00a0does not include mandatory cyber hygiene or network monitoring obligations for prevention of misusing cyber infrastructure in the scope of the due diligence duty. This approach is endorsed by the\u00a0<a href=\"https:\/\/www.justsecurity.org\/66562\/the-netherlands-releases-a-tour-de-force-on-international-law-in-cyberspace-analysis\/\">director<\/a>\u00a0of the Tallinn Manual Process, i.e. the due diligence principle would be\u00a0<a href=\"https:\/\/www.justsecurity.org\/66194\/frances-major-statement-on-international-law-and-cyber-an-assessment\/\">limited<\/a>\u00a0to contexts of ongoing hostile operations, and is violated\u00a0<em>only<\/em>\u00a0if states have knowledge of the misuse of their sovereign territory. Some <a href=\"https:\/\/www.youtube.com\/watch?v=YOIuiNfaZU8\">experts<\/a> admit that the rule can be expanded to operations which are not ongoing, but very imminent, while the results have not yet materialized.<\/p>\n<p>A major challenge to an enforceable obligation to prevent is <a href=\"https:\/\/undocs.org\/A\/70\/174\">different<\/a> economic and technological state capabilities, although the fundamentals of state responsibilities are common. While the <a href=\"https:\/\/www.president.ee\/en\/official-duties\/speeches\/15241-president-of-the-republic-at-the-opening-of-cycon-2019\/index.html\">Estonian President<\/a> implied the existence of preventive obligations on states, she included the development of assistive means to support target states in the attribution and investigation of malicious activities in the scope of \u201creasonable efforts,\u201d depending on states\u2019 capacities. Moreover, if the duty to prevent is regarded as encompassing an affirmative state obligation to enact domestic legislation, due diligence might also comprise obligations of result. Consequently, due diligence could act as a\u00a0<a href=\"https:\/\/poseidon01.ssrn.com\/delivery.php?ID=931009020100120070095110083103011098096084018006060085124105026024105030086026085096056033123048021034111124094094103107064092123076062000041114093095026096068089123005012001093089090094119086093097066083095001113076119007004124067004027073112082081099&amp;EXT=pdf\">Trojan horse<\/a>\u00a0to justify mass surveillance that limits human rights and liberties, including the right to privacy.<\/p>\n<p>States are not required to remedy all transboundary harm, but only the harm resulting in \u201cserious adverse consequences,\u201d a term borrowed from\u00a0<a href=\"https:\/\/legal.un.org\/riaa\/cases\/vol_III\/1905-1982.pdf\">international environmental case law<\/a>.\u00a0 Regarding the threshold of harm to trigger due diligence obligations, the Tallinn Manual 2.0. embraces the standard of \u201cserious adverse consequences,\u201d and specifies in <a href=\"https:\/\/www.law.georgetown.edu\/international-law-journal\/wp-content\/uploads\/sites\/21\/2018\/05\/48-3-The-Tallinn-Manual-2.0.pdf\">Rule 4<\/a> distinct levels of harm which may result from a hostile cyberoperation. States\u2019 obligation to prevent transboundary harm is conditioned by\u00a0<em>knowledge<\/em>\u00a0about the cyberoperations conducted using their territory or cyberinfrastructure. In line with the\u00a0<em>Corfu Channel<\/em>\u00a0judgement, this is broken down into \u201c<a href=\"https:\/\/www.youtube.com\/watch?v=YOIuiNfaZU8\">actual knowledge<\/a>\u201d delivered by domestic intelligence services or from warnings received from the target state, and\u00a0<a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2932110\">constructive<\/a>\u00a0knowledge, i.e., if the state, in the normal course of events, would or objectively should have known about the harm. The \u201cconstructive knowledge\u201d reflects the inherent characteristics of due diligence and good faith:\u00a0<a href=\"https:\/\/digitalcommons.law.uw.edu\/cgi\/viewcontent.cgi?article=1811&amp;context=wilj\">hypothetical<\/a>\u00a0reasonable limits and assessment depending on feasibility of means.<\/p>\n<p>Due diligence is an objective principle of law, but its assessment represents a sliding scale based on different factors, such as knowledge, capabilities, risks, and consequences, which confer the necessary\u00a0<a href=\"https:\/\/www.iss.europa.eu\/sites\/default\/files\/EUISSFiles\/cp155.pdf\">flexibility and plasticity<\/a>\u00a0to evaluate whether the expected vigilance was met.\u00a0In some\u00a0<a href=\"https:\/\/www.yalelawjournal.org\/note\/duties-owed-low-intensity-cyber-attacks-and-liability-for-transboundary-torts-in-international-law#_ftnref149\">views<\/a>, when the\u00a0<em>standard of care<\/em>\u00a0is unclearly determined by a certain rule, states should resort to the\u00a0<a href=\"https:\/\/legal.un.org\/ilc\/texts\/instruments\/english\/commentaries\/9_6_2001.pdf\">ILC Draft Articles on Responsibility of States for Internationally Wrongful Acts<\/a><strong>\u00a0<\/strong>(\u201cDraft Articles\u201d), which suggests negligence as the standard of due diligence. According to the International Law Association\u00a0<a href=\"http:\/\/perma.cc\/786K-TDCU\">(\u201cILA\u201d) Study Group on Due Diligence in International Law<\/a>, this requires states to act with care that is \u201cgenerally considered to be appropriate and proportional to the degree of risk of transboundary harm in the particular instance.\u201d Therefore, the\u00a0<em>standard of review<\/em>\u00a0should be\u00a0<em>in abstracto<\/em>,<em>\u00a0<\/em>i.e., whether another state would have reasonably known in similar circumstances. The main challenge remains to be the\u00a0<em>standard of proof<\/em>\u00a0victims have to meet when demonstrating that a state was aware about the hostile cyber operations conducted on its territory, and will likely become\u00a0<a href=\"https:\/\/poseidon01.ssrn.com\/delivery.php?ID=931009020100120070095110083103011098096084018006060085124105026024105030086026085096056033123048021034111124094094103107064092123076062000041114093095026096068089123005012001093089090094119086093097066083095001113076119007004124067004027073112082081099&amp;EXT=pdf\"><em>probatio diabolica<\/em><\/a>\u00a0for victims.<\/p>\n<p>The concrete means employed by states to stop ongoing operations can be manifold. In the\u00a0<a href=\"https:\/\/www.government.nl\/ministries\/ministry-of-foreign-affairs\/documents\/parliamentary-documents\/2019\/09\/26\/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace\">Netherlands\u2019<\/a>\u00a0view, the target state may \u201cask the other country to shut down the servers, regardless of whether or not it has been established that a state is responsible for the cyberattack.\u201d Although the obligation of notification was clearly affirmed by the ICJ in the\u00a0<em>Corfu Channel <\/em>case\u00a0as a general principle of international law, according to the Tallinn Manual 2.0, it does not necessarily\u00a0<a href=\"https:\/\/www.youtube.com\/watch?v=YOIuiNfaZU8\">imply<\/a>\u00a0a specific obligation to notify the target state, as this would disclose the host state\u2019s capabilities. The balance of interests is very delicate, if such a notification is the only means to end the ongoing hostile cyberoperation, or if the cyberoperation would harm fundamental human rights, as was the case during the <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2020-03-23\/paris-hospitals-target-of-failed-cyber-attack-authority-says\">recent<\/a> <a href=\"https:\/\/www.zdnet.com\/article\/czech-hospital-hit-by-cyber-attack-while-in-the-midst-of-a-covid-19-outbreak\/\">cyberoperations<\/a> against medical facilities. While in this case failure of notification could represent a breach of international human rights law, a reasonable accommodation of state interests and human rights shall be found in order for the states to comply with due diligence principle which is only breached by states when they are aware of certain harmful operations but are unwilling to end them.<\/p>\n<h1><strong>Intersections with Human Rights Law<\/strong><\/h1>\n<p>States\u2019 obligations to safeguard human rights apply in relation to individuals located on their territory, and to states\u2019 obligations under international law to prevent transboundary harm. Although application of international human rights law(\u201cIHRL\u201d) to cyberspace is widely recognized, the <a href=\"https:\/\/muse.jhu.edu\/article\/699502\/pdf\">majority<\/a> of states don\u2019t regard the geographic scope of human rights treaty obligations as being \u201cextraterritorial,\u201d and consider themselves to have affirmative obligations to prevent and respond to human rights violations <em>only<\/em> on their territory. <a href=\"https:\/\/www.cambridge.org\/core\/journals\/israel-law-review\/article\/human-rights-obligations-of-the-territorial-state-in-the-cyberspace-of-areas-outside-its-effective-control\/A485442EA8B55100F398BD14924DBD0A\">Transboundary obligations<\/a> only arise when a state exercises real or de facto control and authority over another territory.\u00a0I have argued\u00a0<a href=\"https:\/\/www.lawfareblog.com\/cyber-operations-against-medical-facilities-during-peacetime\">before<\/a>\u00a0the complexity of establishing states\u2019 responsibility to the hospitalized individuals who were injured or lost their lives as a consequence of a cyber act that could have been prevented. In relation to their own citizens, states\u2019 obligation to provide cybersecurity will have to be integrated within the scope of the right to life, the right to health, and the right to freedom and security, in order to further trigger the relevant reparation mechanisms provided by regional and international human rights instruments. The right to health is safeguarded by the International Covenant on Economic, Social and Cultural Rights (\u201cICESCR\u201d), which the United States has not ratified to date.<\/p>\n<p>Human rights bodies have attached to the due diligence principle a duty to <a href=\"http:\/\/docstore.ohchr.org\/SelfServices\/FilesHandler.ashx?enc=6QkG1d%2FPPRiCAqhKb7yhsjYoiCfMKoIRv2FVaVzRkMjTnjRO%2Bfud3cPVrcM9YR0iW6Txaxgp3f9kUFpWoq%2FhW%2FTpKi2tPhZsbEJw%2FGeZRASjdFuuJQRnbJEaUhby31WiQPl2mLFDe6ZSwMMvmQGVHA%3D%3D\">investigate<\/a> and to <a href=\"https:\/\/hudoc.echr.coe.int\/eng#{%22itemid%22:[%22001-57905%22]}\">prevent.<\/a> Although the <a href=\"https:\/\/www.cambridge.org\/core\/journals\/israel-law-review\/article\/human-rights-obligations-of-the-territorial-state-in-the-cyberspace-of-areas-outside-its-effective-control\/A485442EA8B55100F398BD14924DBD0A\">majority view<\/a> is that this principle does not impose on states a general obligation of prevention, IHRL safeguards a specific duty of prevention, including the duty to limit and prevent human rights violations in cyberspace. Addressing the right to health, the UN Committee on Economic, Social, and Cultural Rights (\u201cCESCR\u201d)\u00a0<a href=\"https:\/\/www.refworld.org\/pdfid\/4538838d0.pdf\">noted<\/a>\u00a0that \u201cStates parties [<em>to the <\/em><em>ICESCR<\/em>] have to respect the enjoyment of the right to health in other countries.\u201d Moreover, according to the\u00a0<a href=\"https:\/\/www.ciel.org\/wp-content\/uploads\/2015\/05\/Maastricht_ETO_Principles_21Oct11.pdf\">Maastricht Principles<\/a>\u00a0on the Extra-Territorial Obligations of States in the area of Economic, Social and Cultural Rights, states should be held accountable for violating human rights of people outside of their own territories. Although this article does not intend to analyze the legal effects of the CESCR language, this logic implies that even if states do not recognize the application of the due diligence principle and its preventive component, their obligation to prevent transboundary harm, including the harm resulting from hostile cyberoperations on medical and testing facilities, could be derived from transboundary IHRL obligations, or the universality of human rights.<\/p>\n<p>The theory that these positive duties under IHRL, including a reasonable due care requirement,\u00a0<a href=\"https:\/\/esil-sedi.eu\/wp-content\/uploads\/2020\/04\/ESIL-Reflection-Besson-S.-3.pdf\">can and should arise<\/a>\u00a0under international law in extraterritorial circumstances has already been discussed in other contexts, especially related to international law applicable to the environment. While reaching a balance between protection of individual rights and national security is very complex, states\u2019 operational choices to comply with their obligations shall consider national resources, without derogating from absolute human rights. According to the\u00a0\u00a0<a href=\"http:\/\/hudoc.echr.coe.int\/app\/conversion\/pdf\/?library=ECHR&amp;id=001-58257&amp;filename=001-58257.pdf&amp;TID=hhkgrkntio\">European Court of Human Rights<\/a>, this positive obligation to take preventive operational measures shall \u201cnot impose an impossible or disproportionate burden on the authorities.\u201d Rule 36 of the Tallinn Manual 2.0. notes states\u2019 affirmative obligation to ensure respect for human rights and to protect human rights from abuse by third parties. If the due diligence obligation will be interpreted as including a governmental duty to ensure backup power generators to medical facilities or testing databases, the scope of human rights in the artificial intelligence era will expand exponentially.<\/p>\n<h1><strong>Conclusion<\/strong><\/h1>\n<p>Although due diligence is not widely endorsed as a binding rule of international law, there is currently widespread support of this non-binding norm of responsible state behavior. There are still <a href=\"https:\/\/texaslawreview.org\/wp-content\/uploads\/2017\/11\/Jensen.Watts_..pdf\">concerns<\/a> that its clarification offers opportunities for states to allege more breaches of international law and increase the frequency of countermeasures, which ultimately hamper stabilization of this international law principle in cyberspace. Fortunately, for the purpose of protecting their national security, most states would act with due diligence simply because it is in their domestic and foreign policy interest. The challenge remains of how to legally address transboundary human rights violations of hostile cyberoperations in the absence of a unitary approach on transboundary effects of states\u2019 human rights obligations and given the non-binding nature of due diligence. Customary international law, including parts of the Draft Articles,\u00a0might be the answer in case of unlawful and attributable state actions, although their application to the cyber domain is also disputed.<\/p>\n<p>Given the fact that the principle of sovereignty is under most pressure in this domain, and due diligence is one of the main means of applying pressure, development of state practice over the next few years is crucial. Cyberoperations are a reality the international community needs to face, and as there are no means of returning to the old status quo, it needs to find a <em>modus vivendi<\/em> with all implications of the new realities. For increased stability and accountability in cyberspace, and for a widespread understanding and agreement regarding the applicability and interpretation of <em>lex lata<\/em>, it is critical that states not only affirm the general applicability of international law in cyberspace, but also expressly label hostile cyber operations as violations of specific international law rules and principles, such as due diligence.<\/p>\n<p><em>Executive Editor: Yixian Sun<\/em><\/p>\n<p>[hr gap=&#8221;30&#8243;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adina Ponta<\/p>\n","protected":false},"author":95,"featured_media":8848,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_FSMCFIC_featured_image_caption":"","_FSMCFIC_featured_image_nocaption":null,"_FSMCFIC_featured_image_hide":null,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[205,121,366],"tags":[42,405],"class_list":["post-8846","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-content","category-article-series","category-perspectives","tag-human-rights","tag-security"],"jetpack_featured_media_url":"https:\/\/journals.law.harvard.edu\/ilj\/wp-content\/uploads\/sites\/84\/philipp-katzenberger-iIJrUoeRoCQ-unsplash-scaled.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/peZu3S-2iG","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts\/8846","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/comments?post=8846"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts\/8846\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/media\/8848"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/media?parent=8846"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/categories?post=8846"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/tags?post=8846"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}