{"id":9213,"date":"2020-11-20T11:42:49","date_gmt":"2020-11-20T16:42:49","guid":{"rendered":"https:\/\/journals.law.harvard.edu\/ilj\/?p=9213"},"modified":"2023-09-29T19:08:31","modified_gmt":"2023-09-29T23:08:31","slug":"some-considerations-for-conducting-legal-reviews-of-u-s-military-cyber-operations","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/ilj\/2020\/11\/some-considerations-for-conducting-legal-reviews-of-u-s-military-cyber-operations\/","title":{"rendered":"Some Considerations for Conducting Legal Reviews of U.S. Military Cyber Operations"},"content":{"rendered":"<h6>By: The Hon. Paul C. Ney, Jr.*<\/h6>\n<p><i>* General Counsel, U.S. Department of Defense. This Essay is based on remarks given at the U.S. Cyber Command Legal Conference on March 2, 2020. Footnotes have been added and updated as of the date of publication of this Essay. I am grateful to Charles A. Allen, Eliana V. Davidson, Thomas H. Lee, Guillermo R. Carranza, Commander Robin Crabtree, Karl S. Chang, Matthew McCormack, John L. Muelheuser, Gary Corn, and Lieutenant Commander Lynn M. Cherry, for their assistance in preparing this Essay.<\/i><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/journals.law.harvard.edu\/ilj\/wp-content\/uploads\/sites\/84\/Some-Considerations-for-Conducting-Legal-Reviews-of-US-Military-Cyber-Operations.pdf\">[Click here for PDF]<\/a><\/p>\n<p>General Nakasone, Colonel Smawley, distinguished panelists, and guests, thank you for the opportunity to speak with you today. Since its inception in 2012, the U.S. Cyber Command legal conference has provided the Department of Defense (DoD), other U.S. Government agencies, our Allies and partners, and interested members of the academy and the general public, with a unique opportunity to explore some of the complex legal issues facing our military and our Nation in cyberspace.<\/p>\n<p>I have two objectives today. First, I\u2019ll offer a snapshot of how we in DoD are integrating cyberspace into our overall national defense strategy. Second, I will summarize the domestic and international law considerations that inform the legal reviews that DoD lawyers conduct as part of the review and approval process for military cyber operations. We at DoD now have considerable practice advising on such operations and are accordingly in a position to begin to speak from experience to some of the challenging legal issues that cyber operations present.<\/p>\n<p>To set the scene, when I talk about \u201ccyberspace,\u201d I am referring to \u201cthe interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.\u201d<a href=\"#_ftn2\" name=\"_ftnref2\"><b>[1]<\/b><\/a> Physically, and logically, the domain is in a state of perpetual transformation. It enables the transmission of data across international boundaries in nanoseconds\u2014controlled much more by individuals or even machines than by governments\u2014spreading ideas to disparate audiences and, in some cases, the generating of physical effects in far-flung places.<\/p>\n<h2><strong>I. Today\u2019s Cyber Threat Environment and DoD\u2019s Response<\/strong><\/h2>\n<p>As we enter the third decade of the twenty-first century, people are imagining, developing, and creating new technologies and devices at a faster rate than ever before. These new technologies update on a near daily basis\u2014think of the software update that your phone automatically uploaded today.<\/p>\n<p>Sophisticated technologies are now a part of nearly all aspects of military operations, creating opportunities and challenges. A recent Brookings paper makes the point well: \u201cBy\u00a0.\u00a0.\u00a0.\u00a0building Achilles\u2019 heels into everything they operate, modern militaries have created huge opportunities for their potential enemies. The fact that everyone is vulnerable\u00a0.\u00a0.\u00a0.\u00a0is no guarantee of protection.\u201d<a href=\"#_ftn3\" name=\"_ftnref3\"><b>[2]<\/b><\/a><\/p>\n<p>Constantly changing vulnerabilities exist not only within our Armed Forces but also in the private and public sectors, which provide critical support to our operations. This includes contractors that manage networks and other services; the defense industrial base that is the foundation of the United States\u2019 military strength; and critical public infrastructure upon which the entire country, including the Armed Forces, relies for water, electricity, and transportation.<\/p>\n<p>From a strategic competition perspective, too, cyberspace is increasingly dynamic and contested, including as a warfighting domain. In the past few years, other nations, in part to make up for gaps in conventional military power vis-\u00e0-vis the United States, have developed cyber strategies and organized military forces to conduct operations in cyberspace. China\u2019s Strategic Support Force, for example, provides its People\u2019s Liberation Army with cyberwarfare capabilities to \u201cestablish information dominance in the early stages of a conflict to constrain [U.S.] actions\u00a0.\u00a0.\u00a0.\u00a0by targeting network-based [command and control,]\u00a0.\u00a0.\u00a0.\u00a0logistics, and commercial activities.\u201d<a href=\"#_ftn4\" name=\"_ftnref4\"><b>[3]<\/b><\/a> Russia consistently uses cyber capabilities for what it calls \u201cinformation confrontation\u201d during peacetime and war.<a href=\"#_ftn5\" name=\"_ftnref5\"><b>[4]<\/b><\/a> All of this is unsurprising because cyber is a relatively cheap form of gaining real power, especially for impoverished adversaries like North Korea: a cyber operation can require nothing more than a reasonably skilled operator, a computer, a network connection, and persistence.<\/p>\n<p>A key element of the U.S. military\u2019s strategy in the face of these cyber-threats is to \u201cdefend forward.\u201d<a href=\"#_ftn6\" name=\"_ftnref6\"><b>[5]<\/b><\/a> Implementing this element of the strategy begins with \u201ccontinuously engaging and contesting adversaries and causing them uncertainty wherever they maneuver\u201d\u2014which we refer to as \u201cpersistent engagement.\u201d<a href=\"#_ftn7\" name=\"_ftnref7\"><b>[6]<\/b><\/a> \u201cPersistent engagement recognizes that cyberspace\u2019s structural feature of interconnectedness and its core condition of constant contact creates a strategic necessity to operate continuously in cyberspace.\u201d<a href=\"#_ftn8\" name=\"_ftnref8\"><b>[7]<\/b><\/a> As General Nakasone has said, \u201c[i]f we find ourselves defending inside our own networks, we have lost the initiative and the advantage.\u201d<a href=\"#_ftn9\" name=\"_ftnref9\"><b>[8]<\/b><\/a> In short, the strategy envisions that our military cyber forces will be conducting operations in cyberspace to disrupt and defeat malicious cyber activity that is harmful to U.S. national interests.<a href=\"#_ftn10\" name=\"_ftnref10\"><b>[9]<\/b><\/a><\/p>\n<p>Cyber operations are also becoming an integral part of other military operations. As the 2018 National Defense Strategy emphasizes, \u201c[s]uccess no longer goes to the country that develops a new technology first, but rather to the one that better integrates it and adapts its way of fighting.\u201d<a href=\"#_ftn11\" name=\"_ftnref11\"><b>[10]<\/b><\/a> For example, during operations in Iraq in 2017, U.S. forces used cyber and space capabilities to disrupt communications to and from the enemy\u2019s primary command post, forcing the enemy to move to previously unknown backup sites, thereby exposing their entire command-and-control network to U.S. kinetic strikes.<a href=\"#_ftn12\" name=\"_ftnref12\"><b>[11]<\/b><\/a> Operations like this will become increasingly common.<\/p>\n<p>Because of the complexity and dynamism of the domain and the threat environment, the need for persistent engagement outside U.S. networks, and the critical advantage that cyber operations provide our Armed Forces, DoD must develop, review, and approve military cyber operations at so-called \u201cwarp-speed.\u201d To this end, the U.S. Government has made meaningful strides. You heard in 2018 that the President had issued National Security Presidential Memorandum-13, <em>United States Cyber Operations Policy<\/em>, or \u201cNSPM-13\u201d for short, which allows for the delegation of well-defined authorities to the Secretary of Defense to conduct time-sensitive military operations in cyberspace. Congress also has clarified that the President has authority to direct military operations in cyberspace to counter adversary cyber operations against our national interests and that such operations, whether they amount to the conduct of hostilities or not, and even when conducted in secret, are to be considered traditional military activities and not covert action, for purposes of the covert action statute.<a href=\"#_ftn13\" name=\"_ftnref13\"><b>[12]<\/b><\/a><\/p>\n<p>Even as the United States takes action to secure its vital national interests and to support its Allies and partners in this complex environment, it is a Nation dedicated to the rule of law. Consequently, we must ensure that our efforts are not only effective but also consistent with law and wider U.S. Government efforts to promote stability in cyberspace and adherence to the rules-based international order. DoD lawyers have an important role to play as the Department develops and executes cyber operations to meet these mandates.<\/p>\n<p>Let me turn now to providing you a sense of how DoD lawyers analyze proposed military cyber operations for compliance with domestic and international law.<\/p>\n<h2><strong>II. Framework for Legal Analysis<\/strong><\/h2>\n<p>To evaluate the legal sufficiency of a proposed military cyber operation, we employ a process similar to the one we use to assess non-cyber operations. We engage our clients to understand the relevant operational details: What is the military objective we seek to achieve? What is the operational scheme of maneuver and how does it contribute to achieving that objective? Where is the target located? Does the operation involve multiple geographic locations? What is the target system used for? How will we access it? What effects\u2014such as loss of access to data\u2014will we generate within that system? How will those effects impact the system\u2019s functioning? Which people or processes will be affected by anticipated changes to the system\u2019s functioning? Are any of those likely to be impacted civilians or public services? Answers to these questions will drive the legal analysis.<\/p>\n<h3><strong><em>A. U.S. Domestic Law<\/em><\/strong><\/h3>\n<p>Let\u2019s take up considerations of U.S. domestic law first. We begin with the foundational question of domestic legal authority to conduct a military cyber operation. The domestic legal authority for the DoD to conduct cyber operations is included in the broader authorities of the President and the Secretary of Defense to conduct military operations in defense of the nation. We assess whether a proposed cyber operation has been properly authorized using the analysis we apply to all other operations, including those that constitute use of force. The President has authority under Article II of the U.S. Constitution to direct the use of the Armed Forces to serve important national interests, and it is the longstanding view of the Executive Branch that this authority may include the use of armed force when the anticipated nature, scope, and duration of the operations do not rise to the level of war under the Constitution, triggering Congress\u2019s power to declare war.<a href=\"#_ftn14\" name=\"_ftnref14\"><b>[13]<\/b><\/a> Furthermore, the Supreme Court has long affirmed the President\u2019s power to use force in defense of the nation and federal persons, property, and instrumentalities.<a href=\"#_ftn15\" name=\"_ftnref15\"><b>[14]<\/b><\/a> Accordingly, the President has constitutional authority to order military cyber operations even if they amount to use of force in defense of the United States. Of course, the vast majority of military operations in cyberspace do not rise to the level of a use of force; but we begin analysis of U.S. domestic law with the same starting point of identifying the legal authority.<\/p>\n<p>In the context of cyber operations, the President does not need to rely solely on his Article II powers because Congress has provided for ample authorization. As I noted earlier, Congress has specifically affirmed the President\u2019s authority to direct DoD to conduct military operations in cyberspace.<a href=\"#_ftn16\" name=\"_ftnref16\"><b>[15]<\/b><\/a> Moreover, cyber operations against specific targets are logically encompassed within broad statutory authorizations to the President to use force, like the 2001 Authorization for the Use of Military Force, which authorizes the President to use \u201call necessary and appropriate force\u201d against those he determines were involved in the 9\/11 attacks or that harbored them.<a href=\"#_ftn17\" name=\"_ftnref17\"><b>[16]<\/b><\/a> Congress has also expressed support for the conduct of military cyber operations to defend the nation against Russian, Chinese, North Korean, and Iranian \u201cactive, systematic, and ongoing campaigns of attacks\u201d against U.S. interests, including attempts to influence U.S. elections.<a href=\"#_ftn18\" name=\"_ftnref18\"><b>[17]<\/b><\/a><\/p>\n<p>In addition to questions of legal authority, DoD lawyers advise on the Secretary of Defense\u2019s authority to direct the execution of military cyber operations as authorized by the President and statute,<a href=\"#_ftn19\" name=\"_ftnref19\"><b>[18]<\/b><\/a> \u201cincluding in response to malicious cyber activity carried out against the United States or a United States person by a foreign power,\u201d<a href=\"#_ftn20\" name=\"_ftnref20\"><b>[19]<\/b><\/a> and to conduct related intelligence activities.<a href=\"#_ftn21\" name=\"_ftnref21\"><b>[20]<\/b><\/a> Our lawyers ensure that U.S. military cyber operations adhere to the President\u2019s specific authorizations as well as the generally applicable NSPM-13.<\/p>\n<p>After concluding that the operation has been properly authorized, DoD lawyers assess whether there are any statutes that may restrict DoD\u2019s ability to conduct the proposed cyber operation and whether the operation may be carried out consistent with the protections afforded to the privacy and civil liberties of U.S. persons. To illustrate, I am going to talk about two statutes and the First Amendment as examples of laws that we may consider, depending on the specific cyber operation to be conducted.<\/p>\n<p>First, let\u2019s look at federal criminal provisions in Title 18 of the U.S. Code that prohibit accessing certain computers and computer networks \u201cwithout authorization,\u201d<a href=\"#_ftn22\" name=\"_ftnref22\"><b>[21]<\/b><\/a> or transmitting a \u201cprogram, information, code, or command,\u201d<a href=\"#_ftn23\" name=\"_ftnref23\"><b>[22]<\/b><\/a> that intentionally causes \u201cany impairment to the integrity or availability\u201d of the computer or data on it<b> <a href=\"#_ftn24\" name=\"_ftnref24\">[23]<\/a><\/b>\u2014provisions found in the Computer Fraud and Abuse Act or \u201cCFAA,\u201d as amended.<a href=\"#_ftn25\" name=\"_ftnref25\"><b>[24]<\/b><\/a> These provisions contain exceptions for lawfully authorized activities of law enforcement agencies and U.S. intelligence agencies but do not refer to U.S. military cyber operations.<a href=\"#_ftn26\" name=\"_ftnref26\"><b>[25]<\/b><\/a> Common sense and long-accepted canons of statutory interpretation suggest, however, that the CFAA will not constrain appropriately authorized DoD cyber operations.<a href=\"#_ftn27\" name=\"_ftnref27\"><b>[26]<\/b><\/a><\/p>\n<p>The CFAA was enacted to protect U.S. Government computers and critical banking networks against thieves and hackers,<a href=\"#_ftn28\" name=\"_ftnref28\"><b>[27]<\/b><\/a> not vice versa; it expresses no clear indication of congressional intent to limit the President from directing military actions;<a href=\"#_ftn29\" name=\"_ftnref29\"><b>[28]<\/b><\/a> and the more recent statutes I mentioned earlier specifically authorize or reaffirm the President\u2019s authority to direct DoD to conduct operations in cyberspace. In light of these considerations, it would be unreasonable and counterintuitive to interpret the CFAA as restricting properly authorized military cyber operations abroad against foreign actors.<a href=\"#_ftn30\" name=\"_ftnref30\"><b>[29]<\/b><\/a><\/p>\n<p>Second, DoD lawyers typically analyze whether the proposed cyber operation may be conducted as a traditional military activity\u2014or \u201cTMA\u201d\u2014such that it would be excluded from the approval and oversight requirements applicable to covert action under the Covert Action Statute.<a href=\"#_ftn31\" name=\"_ftnref31\"><b>[30]<\/b><\/a> Because the statute does not define TMA, we look to the legislative history and a provision in the National Defense Authorization Act for Fiscal Year 2019 that clarifies that in general clandestine military activities in cyberspace constitute TMA for purposes of the Covert Action Statute, and reaffirms established congressional reporting requirements for military cyber operations.<a href=\"#_ftn32\" name=\"_ftnref32\"><b>[31]<\/b><\/a><\/p>\n<p>Third, DoD lawyers must assess whether a proposed operation will impact the privacy and civil liberties of U.S. persons. The practical reality of cyberspace today is that U.S. military cyber operations aimed at disrupting an adversary\u2019s ability to put information online or to distribute it across the worldwide web have the potential to affect U.S. persons\u2019 rights and civil liberties in ways that operations in physical domains do not.<\/p>\n<p>Let me give you a concrete example. A core part of DoD\u2019s mission to defend U.S. elections consists of defending against covert foreign government malign influence operations targeting the U.S. electorate. The bulk of DoD\u2019s efforts in this area involve information-sharing and support to domestic partners, like the Department of Homeland Security and the Federal Bureau of Investigation. But what about a U.S. military cyber operation to disrupt a foreign government\u2019s ability to disseminate covertly information to U.S. audiences via the Internet by pretending that the information has been authored by Americans inside the United States? Can we conduct such an operation in a manner that contributes to the defense of our elections but avoids impermissible interference with the right of free expression under the First Amendment\u2014including the right to <em>receive<\/em> information?<a href=\"#_ftn33\" name=\"_ftnref33\"><b>[32]<\/b><\/a> The analysis often turns on the specifics of the proposed operation\u2014but, in short, we believe we can.<\/p>\n<p>Few precedents address this issue directly; but, U.S. case law does provide a framework with at least three key strands. First, there are judicial decisions that stand for the proposition that the U.S. Government, in carrying out certain appropriately authorized activities, may incidentally burden the right to receive information from foreign sources without violating the First Amendment.<a href=\"#_ftn34\" name=\"_ftnref34\"><b>[33]<\/b><\/a> Second, courts have recognized a compelling government interest in protecting U.S. elections from certain types of foreign influence\u2014especially when that influence is exercised covertly.<a href=\"#_ftn35\" name=\"_ftnref35\"><b>[34]<\/b><\/a> Third, government action based on the content of the speech will be suspect.<a href=\"#_ftn36\" name=\"_ftnref36\"><b>[35]<\/b><\/a><\/p>\n<p>In light of these precedents, DoD lawyers analyzing particular cyber operations for First Amendment compliance will consider a number of factors, including: whether the operation is targeting the foreign actors seeking to influence U.S. elections covertly rather than the information itself; the extent to which the operation may be conducted in a \u201ccontent neutral\u201d manner; and, the foreign location and foreign government affiliation of the targeted entity.<\/p>\n<p>We at DoD realize that military involvement in protecting U.S. elections is a sensitive mission, even when conducted in compliance with First Amendment protections and consistent with congressional intent. Virtually any military involvement in U.S. elections implicates the bedrock premise of maintaining civilian control of the military and our long tradition of keeping the military out of domestic politics. Accordingly, in assessing proposed operations related to elections, DoD lawyers pay particular attention to whether the proposed operation may be conducted consistent with legal and regulatory limits on the use of official positions to influence or affect the results of U.S. elections or to engage in, <em>or create the appearance of engaging in<\/em>, partisan politics.<a href=\"#_ftn37\" name=\"_ftnref37\"><b>[36]<\/b><\/a><\/p>\n<h3><em><strong>B. International Law<\/strong><\/em><\/h3>\n<p>Those are some highlights of U.S. domestic law considerations that may be implicated by proposed military cyber operations; let me turn now to international law.<\/p>\n<p>We recognize that State practice in cyberspace is evolving. As lawyers operating in this area, we pay close attention to States\u2019 explanations of their own practice, how they are applying treaty rules and customary international law to State activities in cyberspace, and how States address matters where the law is unsettled. DoD lawyers, and our clients, engage with our counterparts in other U.S. Government departments and agencies on these issues, and with Allies and partners at every level\u2014from the halls of the United Nations to the floors of combined tactical operations centers\u2014to understand how we each apply international law to operations in cyberspace. Initiatives by non-governmental groups like those that led to the Tallinn Manual can be useful to consider, but they do not create new international law, which only states can make. My intent here is not to lay out a comprehensive set of positions on international law. Rather, as I have done with respect to domestic law, I will tell you how DoD lawyers address some of the international law issues that today\u2019s military cyber operations present.<\/p>\n<p>I will start with some basics. It continues to be the view of the United States that existing international law applies to State conduct in cyberspace. Particularly relevant for military operations are the Charter of the United Nations, the law of State responsibility, and the law of war. To determine whether a rule of customary international law has emerged with respect to certain State activities in cyberspace, we look for sufficient State practice over time, coupled with <em>opinio<\/em><em> juris<\/em>\u2014evidence or indications that the practice was undertaken out of a sense that it was legally compelled, not out of a sense of policy prudence or moral obligation.<\/p>\n<p>As I discussed a few minutes ago, our policy leaders assess that the threat environment demands action today\u2014our clients need our advice today on how international legal rules apply when resorting to action to defend our national interests from malicious activity in cyberspace, notwithstanding any lack of agreement among States on how such rules apply. Consequently, in reviewing particular operations, DoD lawyers provide advice guided by how existing rules apply to activities in other domains, while considering the unique, and frequently changing, aspects of cyberspace.<\/p>\n<p>First, let\u2019s discuss the international law applicable to uses of force. Article 2(4) of the Charter of the United Nations provides that \u201cAll Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purposes of the United Nations.\u201d<a href=\"#_ftn38\" name=\"_ftnref38\"><b>[37]<\/b><\/a> At the same time, international law recognizes that there are exceptions to this rule. For example, in the exercise of its inherent right of self-defense a State may use force that is necessary and proportionate to respond to an actual or imminent armed attack.<a href=\"#_ftn39\" name=\"_ftnref39\"><b>[38]<\/b><\/a> This is true in the cyber context just as in any other context.<\/p>\n<p>Depending on the circumstances, a military cyber operation may constitute a use of force within the meaning of Article 2(4) of the U.N. Charter and customary international law. In assessing whether a particular cyber operation\u2014conducted by or against the United States\u2014constitutes a use of force, DoD lawyers consider whether the operation causes physical injury or damage that would be considered a use of force if caused solely by traditional means like a missile or a mine.<a href=\"#_ftn40\" name=\"_ftnref40\"><b>[39]<\/b><\/a> Even if a particular cyber operation does not constitute a use of force, it is important to keep in mind that the State or States targeted by the operation may disagree, or at least have a different perception of what the operation entailed.<\/p>\n<p>Second, the international law prohibition on coercively intervening in the core functions of another State, such as the choice of political, economic, or cultural system,<a href=\"#_ftn41\" name=\"_ftnref41\"><b>[40]<\/b><\/a> applies to State conduct in cyberspace.<a href=\"#_ftn42\" name=\"_ftnref42\"><strong><sup>[41]<\/sup><\/strong><\/a> For example, \u201ca cyber operation by a State that interferes with another country\u2019s ability to hold an election\u201d or that tampers with \u201canother country\u2019s election results would be a clear violation of the rule of non-intervention.\u201d<a href=\"#_ftn43\" name=\"_ftnref43\"><b>[42]<\/b><\/a> Other States have indicated that they would view operations that disrupt the fundamental operation of a legislative body or that would destabilize their financial system as prohibited interventions.<a href=\"#_ftn44\" name=\"_ftnref44\"><b>[43]<\/b><\/a><\/p>\n<p>There is no international consensus among States on the precise scope or reach of the non-intervention principle, even outside the context of cyber operations. Because States take different views on this question, DoD lawyers examining any proposed cyber operations must tread carefully, even if only a few States have taken the position publicly that the proposed activities would amount to a prohibited intervention.<\/p>\n<p>Some situations compel us to take into consideration whether the States involved have consented to the proposed operation. Because the principle of non-intervention prohibits \u201cactions designed to coerce a State . . . in contravention of its rights,\u201d<a href=\"#_ftn45\" name=\"_ftnref45\"><b>[44]<\/b><\/a> it does not prohibit actions to which a State voluntarily consents, provided the conduct remains within the limits of the consent given.<a href=\"#_ftn46\" name=\"_ftnref46\"><b>[45]<\/b><\/a><\/p>\n<p>Depending on the circumstances, DoD lawyers may also consider whether an operation that does not constitute a use of force could be conducted as a countermeasure. In general, countermeasures are available in response to an internationally wrongful act attributed to a State. In the traditional view, the use of countermeasures must be preceded by notice to the offending State, though we note that there are varying State views on whether notice would be necessary in all cases in the cyber context because of secrecy or urgency.<a href=\"#_ftn47\" name=\"_ftnref47\"><b>[46]<\/b><\/a> In a particular case it may be unclear whether a particular malicious cyber activity violates international law. And, in other circumstances, it may not be apparent that the act is internationally wrongful and attributable to a State within the timeframe in which the DoD must respond to mitigate the threat. In these circumstances, which we believe are common, countermeasures would not be available.<\/p>\n<p>For cyber operations that would not constitute a prohibited intervention or use-of-force, the Department believes there is not sufficiently widespread and consistent State practice resulting from a sense of legal obligation to conclude that customary international law generally prohibits such non-consensual cyber operations in another State\u2019s territory. This proposition is recognized in the Department\u2019s adoption of the \u201cdefend forward\u201d strategy: \u201cWe will defend forward to disrupt or halt malicious cyber activity at its source, including activity that falls below the level of armed conflict.\u201d<a href=\"#_ftn48\" name=\"_ftnref48\"><b>[47]<\/b><\/a> The Department\u2019s commitment to defend forward including to counter foreign cyber activity targeting the United States\u2014comports with our obligations under international law and our commitment to the rules-based international order.<\/p>\n<p>The DoD OGC view, which we have applied in legal reviews of military cyber operations to date, shares similarities with the view expressed by the U.K. Government in 2018.<a href=\"#_ftn49\" name=\"_ftnref49\"><b>[48]<\/b><\/a> We recognize that there are differences of opinion among States, which suggests that State practice and <em>opinio<\/em><em> juris <\/em>are presently not settled on this issue. Indeed, many States\u2019 public silence in the face of countless publicly known cyber intrusions into foreign networks precludes a conclusion that States have coalesced around a common view that there is an international prohibition against all such operations (regardless of whatever penalties may be imposed under domestic law).<\/p>\n<p>Traditional espionage may also be a useful analogue to consider. Many of the techniques and even the objectives of intelligence and counterintelligence operations are similar to those used in cyber operations. Of course, most countries, including the United States, have <em>domestic<\/em> laws against espionage, but international law, in our view, does not prohibit espionage <em>per se<\/em> even when it involves some degree of physical or virtual intrusion into foreign territory. There is no anti-espionage treaty, and there are many concrete examples of States practicing it, indicating the absence of a customary international law norm against it. In examining a proposed military cyber operation, we may therefore consider the extent to which the operation resembles or amounts to the type of intelligence or counterintelligence activity for which there is no<em> per se<\/em> international legal prohibition.<a href=\"#_ftn50\" name=\"_ftnref50\"><b>[49]<\/b><\/a><\/p>\n<p>Of course, as with domestic law considerations, establishing that a proposed cyber operation does not violate the prohibitions on the use of force and coercive intervention does not end the inquiry. These cyber operations are subject to a number of other legal and normative considerations.<\/p>\n<p>As a threshold matter, in analyzing proposed cyber operations, DoD lawyers take into account the principle of State sovereignty. States have sovereignty over the information and communications technology infrastructure within their territory. The implications of sovereignty for cyberspace are complex, and we continue to study this issue and how State practice evolves in this area, even if it does not appear that there exists a rule that all infringements on sovereignty in cyberspace necessarily involve violations of international law.<\/p>\n<p>It is also longstanding DoD policy that U.S. forces will comply with the law of war during all armed conflicts, however such conflicts are characterized, and in all other military operations.<a href=\"#_ftn51\" name=\"_ftnref51\"><b>[50]<\/b><\/a> Even if the law of war does not technically apply because the proposed military cyber operation would not take place in the context of armed conflict, DoD nonetheless applies law-of-war principles.<a href=\"#_ftn52\" name=\"_ftnref52\"><b>[51]<\/b><\/a> This means that the <em>jus in bello<\/em> principles, such as military necessity, proportionality, and distinction, continue to guide the planning and execution of military cyber operations, even outside the context of armed conflict.<\/p>\n<p>DoD lawyers also advise on how a proposed cyber operation may implicate U.S. efforts to promote certain policy norms for responsible State behavior in cyberspace, such as the norm relating to activities targeting critical infrastructure. These norms are non-binding and identifying the best methods for integrating them into tactical-level operations remains a work in progress. But, they are important political commitments by States that can help to prevent miscalculation and conflict escalation in cyberspace. DoD OGC, along with other DoD leaders, actively supports U.S. State Department-led initiatives to build and promote this framework for responsible State behavior in cyberspace. This includes participation in the UN Group of Governmental Experts and an Open-Ended Working Group on information and communications technologies in the context of international peace and security. These diplomatic engagements are an important part of the United States\u2019 overall effort to protect U.S. national interests by promoting stability in cyberspace.<\/p>\n<p>Of course, the real work of analyzing specific military cyber operations in light of the domestic and international legal considerations I have mentioned falls to judge advocates and civilian attorneys at the tactical and operational levels\u2014which is to say, many of you. As one of my predecessors, Jennifer O\u2019Connor, noted in a speech in 2016, military operations\u2014including cyber operations\u2014are subject to a rigorous targeting process that involves both policy and legal reviews to ensure that specific operations are conducted consistent with the relevant authorization, domestic and international law, and any additional restraints imposed by the applicable orders. Particularly in areas like this one, in which not only the law but the domain itself is constantly evolving, I am extremely proud of the legal work many of you do for the Department of Defense and am humbled every day by your dedication to our Nation\u2019s defense.<\/p>\n<p>Thank you all for what you do and for the opportunity to speak with you today.<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\"><b>[1]<\/b><\/a> \u00a0Dep\u2019t of Def., DOD Dictionary of Military and Associated Terms 55 (June 2020), https:\/\/www.jcs.mil\/Portals\/36\/Documents\/Doctrine\/pubs\/dictionary.<br \/>\npdf [https:\/\/perma.cc\/E428-M2FP].<\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\"><b>[2]<\/b><\/a> \u00a0Michael O\u2019Hanlon, The Brookings Inst., Forecasting Change in Military Technology, 2020-2040 16 (2018), https:\/\/www.brookings.edu\/wp-content\/uploads\/2018\/09\/FP_20181218_defense_advances_pt2.pdf [https:\/\/perma.cc\/<br \/>\nYKA6-5FQL].<\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\"><b>[3]<\/b><\/a> \u00a0Def. Intelligence Agency, China Military Power: Modernizing a Force to Fight and Win 46 (2019), https:\/\/www.dia.mil\/Portals\/27\/Documents\/News\/<br \/>\nMilitary%20Power%20Publications\/China_Military_Power_FINAL_5MB_20190103.pdf [https:\/\/perma.cc\/R53S-NMFN].<\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\"><b>[4]<\/b><\/a> \u00a0Def. Intelligence Agency, Russia Military Power: Building a Military to Support Great Power Aspirations 38 (2017), https:\/\/www.dia.mil\/Portals\/27\/<br \/>\nDocuments\/News\/Military%20Power%20Publications\/Russia%20Military%20Power%20Report%202017.pdf [https:\/\/perma.cc\/ATQ8-DLEB] (citations omitted).<\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\"><b>[5]<\/b><\/a> \u00a0Dep\u2019t of Def., Summary: Department of Defense Cyber Strategy 1 (2018), https:\/\/media.defense.gov\/2018\/Sep\/18\/2002041658\/-1\/-1\/1\/CYBER_<br \/>\nSTRATEGY_SUMMARY_FINAL.PDF [https:\/\/perma.cc\/N9F9-GKWZ] [hereinafter DoD Cyber Strategy].<\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\"><b>[6]<\/b><\/a> \u00a0C. Todd Lopez, <em>Persistent Engagement, Partnerships, Top Cybercom\u2019s Priorities<\/em>, Defense.gov (May 14, 2019), https:\/\/www.defense.gov\/Explore\/<br \/>\nNews\/Article\/Article\/1847823\/persistent-engagement-partnerships-top-cybercoms-priorities\/ [https:\/\/perma.cc\/RV8Z-G6GE]. <em>See also id.<\/em>; <em>Securing the Nation\u2019s Internet Architecture: Hearing Before the H. Armed Services Subcomm. on Intelligence &amp; Emerging Threats &amp; Capabilities &amp; the H. Oversight &amp; Reform Subcomm. on Nat\u2019l Sec. <\/em>(Statement of Edwin Wilson, Deputy Assistant Secretary of Defense for Cyber Policy at 3) (Sep. 10, 2019), https:\/\/docs.house.gov\/meetings\/AS\/AS26\/20190910\/<br \/>\n109894\/HHRG-116-AS26-Bio-WilsonB-20190910.pdf [https:\/\/perma.cc\/T4S7-5NFG] [hereinafter <em>Hearing<\/em>]; U.S. Cyber Command, Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command (2018) https:\/\/www.<br \/>\ncybercom.mil\/Portals\/56\/Documents\/USCYBERCOM%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010 [https:\/\/perma.cc\/7866-EHZY].<\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\"><b>[7]<\/b><\/a> \u00a0Michael P. Fischerkeller &amp; Richard J. Harknett, <em>Persistent Engagement and Tacit Bargaining: A Path Toward Constructing Norms in Cyberspace<\/em>, Lawfare (Nov. 9, 2018), https:\/\/www.lawfareblog.com\/persistent-engagement-and-tacit-bargaining-path-toward-constructing-norms-cyberspace [https:\/\/perma.cc\/U4W2-LE4U].<\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\"><b>[8]<\/b><\/a> \u00a0<em>An Interview with Paul M. Nakasone<\/em>, Joint Forces Q. (Jan. 2019), at 4, 7, https:\/\/ndupress.ndu.edu\/Portals\/68\/Documents\/jfq\/jfq-92\/jfq-92_4-9_Nakasone-Interview.pdf [https:\/\/perma.cc\/CCP7-9RBD].<\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\"><b>[9]<\/b><\/a> \u00a0<em>See <\/em><em>Hearing<\/em>, <em>supra <\/em>note 6, at 3 (U.S. Armed Forces \u201cdefend forward by conducting operations that range from collecting information to gain insight about hostile cyber actors and their intent, to exposing malicious cyber activities and associated infrastructure publicly, to disrupting malicious cyber activities directly.\u201d).<\/p>\n<p><a href=\"#_ftnref11\" name=\"_ftn11\"><b>[10]<\/b><\/a> \u00a0Dep\u2019t of Defense, Summary of the 2018 National Defense Strategy of the United States of America 10 (2018), https:\/\/dod.defense.gov\/Portals\/1\/<br \/>\nDocuments\/pubs\/2018-National-Defense-Strategy-Summary.pdf [https:\/\/perma.cc\/<br \/>\nR5KF-EXG7].<\/p>\n<p><a href=\"#_ftnref12\" name=\"_ftn12\"><b>[11]<\/b><\/a> \u00a0<em>See <\/em>Matthew Cox, <em>US, Coalition Forces Used Cyberattacks to Hunt Down ISIS Command Posts<\/em>, Military.com (May 25, 2018), https:\/\/www.<br \/>\nmilitary.com\/dodbuzz\/2018\/05\/25\/us-coalition-forces-used-cyberattacks-hunt-down-isis-command-posts.html?utm_source=Mike%27s+Daily+Blast&amp;utm_campaign=<br \/>\n8d4307f510-EMAIL_CAMPAIGN_2018_04_27_COPY_02&amp;utm_medium=email&amp;<br \/>\nutm_term=0_beae3dbeb1-8d4307f510-51475081) [https:\/\/perma.cc\/7Z8G-J6YU].<\/p>\n<p><a href=\"#_ftnref13\" name=\"_ftn13\"><b>[12]<\/b><\/a> \u00a0<em>See <\/em>John S. McCain National Defense Authorization Act for Fiscal Year 2019, Pub. L. No. 115\u2013232 (2018) [hereinafter \u201cNDAA for FY 2019\u201d]. Several provisions in the NDAA for FY 2019 provide authority and express support for the conduct of cyber operations to disrupt, defeat, and deter \u201cactive, systematic, and ongoing campaign[s] of attacks against the Government or people of the United States in cyberspace, including [attempts] to influence American elections and democratic political processes\u201d by Russia, China, North Korea, or Iran. <em>Id<\/em>. \u00a7 1642.\u00a0 The NDAA for FY 2019 also affirms the authority of the President and Secretary of Defense to conduct clandestine military operations in cyberspace, including operation short of hostilities (as such term is used in the War Powers Resolution) or in areas in which hostilities are not occurring. <em>Id<\/em>. \u00a7 1632.<\/p>\n<p><a href=\"#_ftnref14\" name=\"_ftn14\"><b>[13]<\/b><\/a> \u00a0<em>See<\/em>, <em>e<\/em>.<em>g<\/em>., April 2018 Airstrikes Against Syrian Chemical-Weapons Facilities, 42 Op. O.L.C. slip op. at 9\u201310 (2018); Authority to Use Military Force in Libya, 35 Op. O.L.C. slip op. at 8 (2011) (quoting Deployment of United States Armed Forces to Haiti, 18 Op. O.L.C. 173, 179 (1994)); <em>see also<\/em> The President\u2019s Power in the Field of Foreign Relations, 1 Op. O.L.C. Supp. 49, 56 (1937) (describing President Thomas Jefferson\u2019s actions leading to the Barbary War, the invasion of Mexico by Presidents Polk and Wilson, President McKinley\u2019s agreement to suppress the Boxer Revolution, and President Roosevelt\u2019s use of the military to support Colombia to acquire the Panama Canal Zone as examples of the exercise of presidential authority to use the military without Congressional approval.).<\/p>\n<p><a href=\"#_ftnref15\" name=\"_ftn15\"><b>[14]<\/b><\/a> \u00a0<em>See, e.g.<\/em>, The Prize Cases, 67 U.S. (2 Black) 635, 668\u201370 (discussing the authority of the President to resist foreign invasion and suppress insurrection); Fleming v. Page, 50 U.S. 603, 615 (1850) (\u201cAs commander-in-chief, [the President] is authorized to direct the movements of the naval and military forces placed by law at his command, and to employ them in the manner he may deem most effectual to harass and conquer and subdue the enemy.\u201d).<\/p>\n<p><a href=\"#_ftnref16\" name=\"_ftn16\"><b>[15]<\/b><\/a> \u00a0<em>See <\/em>National Defense Authorization Act for Fiscal Year 2012, Pub. L. No. 112-81 \u00a7 954, 125 Stat. 1298, 1551 (2011) (\u201cCongress affirms that the Department of Defense has the capability, and upon direction by the President may conduct offensive operations in cyberspace to defend our Nation, Allies and interests, subject to\u2014(1) the policy principles and legal regimes that the Department follows for kinetic capabilities, including the law of armed conflict; and (2) the War Powers Resolution (50 U.S.C. 1541 <em>et seq<\/em>.).\u201d).<\/p>\n<p><a href=\"#_ftnref17\" name=\"_ftn17\"><b>[16]<\/b><\/a> \u00a0Authorization for the Use of Military Force, Pub. L. No. 107\u201340, 115 Stat. 224 (2001).<\/p>\n<p><a href=\"#_ftnref18\" name=\"_ftn18\"><b>[17]<\/b><\/a> \u00a0NDAA for FY 2019, <em>supra <\/em>note 12, \u00a7 1642 (2018).<\/p>\n<p><a href=\"#_ftnref19\" name=\"_ftn19\"><b>[18]<\/b><\/a> \u00a0<em>See <\/em>10 U.S.C. \u00a7 113(b) (2019) (the Secretary has \u201cauthority, direction, and control over the Department of Defense\u201d).<\/p>\n<p><a href=\"#_ftnref20\" name=\"_ftn20\"><b>[19]<\/b><\/a> \u00a010 U.S.C. \u00a7 394(a) (2018).<\/p>\n<p><a href=\"#_ftnref21\" name=\"_ftn21\"><b>[20]<\/b><\/a> \u00a0<em>See <\/em>50 U.S.C. \u00a7 3038 (2016).<\/p>\n<p><a href=\"#_ftnref22\" name=\"_ftn22\"><b>[21]<\/b><\/a> \u00a018 U.S.C. \u00a7 1030(a)(2) (2018).<\/p>\n<p><a href=\"#_ftnref23\" name=\"_ftn23\"><b>[22]<\/b><\/a> \u00a0<em>Id.<\/em> \u00a7 1030(a)(5)(A).<\/p>\n<p><a href=\"#_ftnref24\" name=\"_ftn24\"><b>[23]<\/b><\/a> \u00a0<em>Id<\/em>. \u00a7 1030(e)(8).<\/p>\n<p><a href=\"#_ftnref25\" name=\"_ftn25\"><b>[24]<\/b><\/a> \u00a0<em>Id<\/em>. \u00a7 1030.<\/p>\n<p><a href=\"#_ftnref26\" name=\"_ftn26\"><b>[25]<\/b><\/a> \u00a0<em>See <\/em>10 U.S.C. \u00a7 1030(f) (\u201cThis section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or a political subdivision of a State, or of an intelligence agency of the United States.\u201d).<\/p>\n<p><a href=\"#_ftnref27\" name=\"_ftn27\"><b>[26]<\/b><\/a> \u00a0<em>See, e.g.<\/em>, Nardone v. United States, 302 U.S. 379, 383\u201384 (1937); Hancock v. Train, 426 U.S. 167, 179 (1976) (\u201cStatutes which in general terms divest pre-existing rights or privileges will not be applied to the sovereign without a clear expression or implication to that effect.\u201d (citations omitted)); Dibble v. Fenimore, 545 F.3d 208, 215 (2d Cir. 2008) (describing the \u201ccanon of construction that limits the reach of statutes of general applicability to military affairs when Congress has not explicitly provided for application to the military\u201d); United States Assistance to Countries that Shoot Down Civil Aircraft Involved in Drug Trafficking, 18 Op. O.L.C. 148, 164 (1994) (explaining that statutes should not be \u201cbe construed to have the surprising and almost certainly unintended effect of criminalizing actions by military personnel that are lawful under international law and the laws of armed conflict\u201d).<\/p>\n<p><a href=\"#_ftnref28\" name=\"_ftn28\"><b>[27]<\/b><\/a> \u00a0<em>See <\/em>H.R. Rep. No. 98-894, at 4 (1984).<\/p>\n<p><a href=\"#_ftnref29\" name=\"_ftn29\"><b>[28]<\/b><\/a> \u00a0<em>See Nardone<\/em>, 302 U.S. at 383\u201384.<\/p>\n<p><a href=\"#_ftnref30\" name=\"_ftn30\"><b>[29]<\/b><\/a> \u00a0<em>Cf.<\/em> Application of the Neutrality Act to Official Government Activities, 8 Op. O.L.C. 58, 78\u201380 (1984) (reasoning that subsequent Congressional enactment of provisions regulating the use of the military and covert actions provided further evidence of Congressional intent that the Neutrality Act did not apply to the activities of the Department of Defense or the Central Intelligence Agency).<\/p>\n<p><a href=\"#_ftnref31\" name=\"_ftn31\"><b>[30]<\/b><\/a> \u00a0<em>See <\/em>10 U.S.C. \u00a7 3093(e) (2019); H.R. Rep. No. 102-166 at 29\u201330 (1991) (Conf. Rep.); <em>see also<\/em> S. Rep. No. 102\u201385 at 46 (1991).<\/p>\n<p><a href=\"#_ftnref32\" name=\"_ftn32\"><b>[31]<\/b><\/a> \u00a0NDAA for FY 2019, <em>supra <\/em>note 12, \u00a7 1632.<\/p>\n<p><a href=\"#_ftnref33\" name=\"_ftn33\"><b>[32]<\/b><\/a> \u00a0The First Amendment protects the rights of U.S. persons \u201cto receive information and ideas, regardless of their social worth.\u201d Stanley v. Georgia, 394 U.S. 557, 564 (1969); <em>see also <\/em>Martin v. City of Struthers, 319 U.S. 141, 143 (1943); Lamont v. Postmaster General, 381 U.S. 301, 306\u201307 (1960).<\/p>\n<p><a href=\"#_ftnref34\" name=\"_ftn34\"><b>[33]<\/b><\/a> \u00a0<em>See, e.g.<\/em>, Kleindienst v. Mandel, 408 U.S. 753 (1972); United States v. Alvarez, 567 U.S. 709 (2012) (plurality opinion).<\/p>\n<p><a href=\"#_ftnref35\" name=\"_ftn35\"><b>[34]<\/b><\/a> \u00a0<em>See <\/em>Bluman v. FEC, 800 F. Supp. 2d 281 (D.D.C. 2011), <em>aff\u2019d by<\/em> Bluman v. FEC, 565 U.S. 1104 (2012).<\/p>\n<p><a href=\"#_ftnref36\" name=\"_ftn36\"><b>[35]<\/b><\/a> \u00a0<em>See, e.g.<\/em>, R.A.V. v. City of St. Paul, 505 U.S. 377, 384 (1992) (explaining that content-based regulation of speech is permissible only when the content itself is \u201cconstitutionally proscribable\u201d).<\/p>\n<p><a href=\"#_ftnref37\" name=\"_ftn37\"><b>[36]<\/b><\/a> \u00a0<em>See <\/em>5 U.S.C. \u00a7 7323(a)(1); Dep\u2019t of Def., Directive 1344.10, Political Activities by Members of the Armed Forces, \u00b6 4.1.2.2 (Feb. 19, 2008), https:\/\/www.esd.whs.mil\/Portals\/54\/Documents\/DD\/issuances\/dodd\/134410p.pdf [https:\/\/perma.cc\/775C-XAR5].<\/p>\n<p><a href=\"#_ftnref38\" name=\"_ftn38\"><b>[37]<\/b><\/a> \u00a0U.N. Charter art. 2, \u00b6 4.<\/p>\n<p><a href=\"#_ftnref39\" name=\"_ftn39\"><b>[38]<\/b><\/a> \u00a0<em>See <\/em>Dep\u2019t of Def., Department of Defense Law of War Manual \u00a7 1.11.5 (rev. Dec. 2016) [hereinafter DoD Law of War Manual], https:\/\/dod.defense.gov\/Portals\/1\/Documents\/pubs\/DoD%20Law%20of%20War%20Manual%20-%20June%202015%20Updated%20Dec%202016.pdf?ver=2016-12-13-172036-190 [https:\/\/perma.cc\/2KW4-MXVY].<\/p>\n<p><a href=\"#_ftnref40\" name=\"_ftn40\"><b>[39]<\/b><\/a> \u00a0<em>See <\/em>Harold Koh, <em>International Law in Cyberspace: Remarks as Prepared for Delivery by Harold Hongju Koh to the USCYBERCOM Inter-Agency Legal Conference Ft. Meade, MD, Sept. 18, 2012<\/em>, 54 Harv. Int\u2019l L.J. Online 1, 3\u20134, https:\/\/journals.law.harvard.edu\/ilj\/2012\/12\/online_54_koh\/ [https:\/\/perma.cc\/8GTK-7D8C]; <em>see also<\/em> DoD Law of War Manual, <em>supra <\/em>note 38, \u00a7 16.3.1.<\/p>\n<p><a href=\"#_ftnref41\" name=\"_ftn41\"><b>[40]<\/b><\/a> \u00a0<em>See <\/em>Military and Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), Judgment, 1986 I.C.J. 14, at 108 (June 27, 1986), https:\/\/www.icj-cij.org\/files\/case-related\/70\/070-19860627-JUD-01-00-EN.pdf [https:\/\/perma.cc\/<br \/>\n9MPA-QE3F].<\/p>\n<p><a href=\"#_ftnref42\" name=\"_ftn42\"><b>[41]<\/b><\/a> \u00a0<em>See <\/em>Brian J. Egan, <em>International Law and Stability in Cyberspace<\/em>, 35 Berkeley J. Int\u2019l L. 169, 175 (2017). https:\/\/www.law.berkeley.edu\/wp-content\/uploads\/2016\/12\/BJIL-article-International-Law-and-Stability-in-Cyberspace.pdf [https:\/\/perma.cc\/9945-XV39].<\/p>\n<p><a href=\"#_ftnref43\" name=\"_ftn43\"><b>[42]<\/b><\/a> \u00a0<em>Id<\/em>. at 175.<\/p>\n<p><a href=\"#_ftnref44\" name=\"_ftn44\"><b>[43]<\/b><\/a> \u00a0<em>See, e.g.<\/em>, U.K. Att\u2019y Gen. Jeremy Wright QC, MP, Address on Cyber and International Law in the 21st Century (May 23, 2018) [hereinafter \u201cU.K. Att\u2019y Gen. Speech\u201d], https:\/\/www.gov.uk\/government\/speeches\/cyber-and-international-law-in-the-21st-century [https:\/\/perma.cc\/L5N6-HKX8] (archived Sept. 26, 2019)) (\u201c[T]he practical application of the principle [of non-intervention] in this context would be the use by a hostile state of cyber operations to manipulate the electoral system to alter the results of an election in another state, intervention in the fundamental operation of Parliament, or in the stability of our financial system. Such acts must surely be a breach of the prohibition on intervention in the domestic affairs of states.\u201d).<\/p>\n<p><a href=\"#_ftnref45\" name=\"_ftn45\"><b>[44]<\/b><\/a> \u00a0Memorandum from George H. Aldrich, Acting Legal Adviser, Dep\u2019t of State, on Intervention in the Internal Affairs of Other States (Oct. 25, 1974).<\/p>\n<p><a href=\"#_ftnref46\" name=\"_ftn46\"><b>[45]<\/b><\/a> \u00a0<em>See, e.g.<\/em>, Int\u2019l Law Comm\u2019n, Draft Articles on Responsibility of States for Internationally Wrongful Acts, with commentaries, 72\u201374 (2001).<\/p>\n<p><a href=\"#_ftnref47\" name=\"_ftn47\"><b>[46]<\/b><\/a> \u00a0<em>See, e.g.<\/em>, U.K. Att\u2019y Gen. Speech, <em>supra<\/em> note 43.<\/p>\n<p><a href=\"#_ftnref48\" name=\"_ftn48\"><b>[47]<\/b><\/a> \u00a0DoD Cyber Strategy <em>supra<\/em> note 5, at 1.<\/p>\n<p><a href=\"#_ftnref49\" name=\"_ftn49\"><b>[48]<\/b><\/a> \u00a0<em>See, e.g.<\/em>, U.K. Att\u2019y Gen. Speech, <em>supra<\/em> note 43.<\/p>\n<p><a href=\"#_ftnref50\" name=\"_ftn50\"><b>[49]<\/b><\/a> \u00a0<em>See, e.g<\/em>., DoD Law of War Manual, <em>supra<\/em> note 38, \u00a7 16.3.2. That is not to say that a military cyber operation that is <em>not<\/em> analogous to traditional or counterintelligence activity is necessarily unlawful; such an operation may, however, warrant closer scrutiny and additional analysis.<\/p>\n<p><a href=\"#_ftnref51\" name=\"_ftn51\"><b>[50]<\/b><\/a> \u00a0<em>See<\/em> Dep\u2019t of Def., Directive 2311.01, DoD Law of War Program \u00b6 1.2 (July 2, 2020), available at:\u00a0 https:\/\/www.esd.whs.mil\/Portals\/54\/Documents\/DD\/<br \/>\nissuances\/dodd\/231101p.pdf?ver=2020-07-02-143157-007 [https:\/\/perma.cc\/9NRH-Q2W6]; s<em>ee also<\/em> DoD Law of War Manual, <em>supra <\/em>note 38, \u00a7 18.1.1.<\/p>\n<p><a href=\"#_ftnref52\" name=\"_ftn52\"><b>[51]<\/b><\/a> \u00a0DoD Law of War Manual, <em>supra <\/em>note 38, \u00a7 3.1.1.2.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Paul C. Ney, Jr.<\/p>\n","protected":false},"author":95,"featured_media":9215,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_FSMCFIC_featured_image_caption":"","_FSMCFIC_featured_image_nocaption":null,"_FSMCFIC_featured_image_hide":null,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[205,368],"tags":[405,409],"class_list":["post-9213","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-content","category-essays","tag-security","tag-technology"],"jetpack_featured_media_url":"https:\/\/journals.law.harvard.edu\/ilj\/wp-content\/uploads\/sites\/84\/markus-spiske-iar-afB0QQw-unsplash-scaled.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/peZu3S-2oB","jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts\/9213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/comments?post=9213"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/posts\/9213\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/media\/9215"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/media?parent=9213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/categories?post=9213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/ilj\/wp-json\/wp\/v2\/tags?post=9213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}