{"id":4669,"date":"2015-12-17T08:05:52","date_gmt":"2015-12-17T13:05:52","guid":{"rendered":"http:\/\/journals.law.harvard.edu\/nsj\/?p=4669"},"modified":"2016-02-01T15:37:54","modified_gmt":"2016-02-01T20:37:54","slug":"so-youre-telling-me-theres-a-chance-how-the-articles-on-state-responsibility-could-empower-corporate-responses-to-state-sponsored-cyber-attacks","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/nsj\/2015\/12\/so-youre-telling-me-theres-a-chance-how-the-articles-on-state-responsibility-could-empower-corporate-responses-to-state-sponsored-cyber-attacks\/","title":{"rendered":"So You\u2019re Telling Me There\u2019s A Chance: How the Articles on State Responsibility Could Empower Corporate Responses to State-Sponsored Cyber Attacks"},"content":{"rendered":"<p style=\"text-align: center;\">By Daniel Garrie and Shane R. Reeves<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a><\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2016\/01\/Garrie-and-Reeves-Non-State-Actor-and-Self-Defense.pdf\" target=\"_blank\">Click here to read the full text as a PDF.<\/a><\/p>\n<p><em>\u201c[U.S] information systems face thousands of attacks a day from criminals, terrorist organizations, and more recently from more than 100 foreign intelligence organizations.\u201d<\/em><a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a><\/p>\n<p><em>Looking forward, if the pace and intensity of attacks increase and are not met with improved defenses, a backlash against digitization could occur, with large negative economic implications. Using MGI data on the technologies that will truly matter to business strategy during the coming decade, we estimate that over the next five to seven years, $9 trillion to $21 trillion of economic-value creation, worldwide, depends on the robustness of the cybersecurity <\/em><a href=\"http:\/\/www.mckinsey.com\/insights\/business_technology\/the_rising_strategic_risks_of_cyberattacks\"><em>environment<\/em><\/a><em>.<a href=\"#_ftn3\" name=\"_ftnref3\"><strong>[3]<\/strong><\/a><\/em><\/p>\n<p>I. Introduction<\/p>\n<p>Corporate America is facing a relentless wave of state sponsored hostilities in cyber space.<a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a> Prominent recent examples include: Russia \u201cattack[ing] the U.S. financial system\u201d and stealing data from J.P. Morgan Chase &amp; Company in <a href=\"http:\/\/www.bloomberg.com\/news\/articles\/2014-08-27\/fbi-said-to-be-probing-whether-russia-tied-to-jpmorgan-hacking\">August 2014<\/a>;<a href=\"#_ftn5\" name=\"_ftnref5\">[5]<\/a> the December 2014 North Korea hack of Sony over the release of a comedy titled \u201c<a href=\"http:\/\/www.nytimes.com\/2014\/12\/18\/world\/asia\/us-links-north-korea-to-sony-hacking.html?_r=1\">The Interview<\/a>,\u201d<a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a> and the continuing efforts of Chinese military unit 61398 to gain access to strategically important <a href=\"http:\/\/www.cnn.com\/2014\/05\/20\/world\/asia\/china-unit-61398\/\">corporate<\/a> <a href=\"http:\/\/www.npr.org\/2013\/02\/19\/172373133\/report-links-cyber-attacks-on-u-s-to-chinas-military\">intellectual<\/a> <a href=\"http:\/\/www.washingtonpost.com\/business\/technology\/vast-majority-of-global-cyber-espionage-emanates-from-china-report-finds\/2013\/04\/22\/61f52486-ab5f-11e2-b6fd-ba6f5f26d70e_story.html\">property<\/a>.<a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a> Whether motivated by economics, ideology, or nationalism, the cyber targeting of corporations is increasingly the modus operandi of hostile state <a href=\"http:\/\/fas.org\/sgp\/crs\/natsec\/R43955.pdf\">actors<\/a>.<a href=\"#_ftn8\" name=\"_ftnref8\">[8]<\/a> Leaving this tactic unchecked poses a significant risk to both corporate interests and U.S. national security.<a href=\"#_ftn9\" name=\"_ftnref9\">[9]<\/a><\/p>\n<p>While non-state cyber threats to corporations are no less <a href=\"http:\/\/abcnews.go.com\/Business\/anthem-cyber-attack-things-happen-personal-information\/story?id=28747729\">pernicious<\/a>,<a href=\"#_ftn10\" name=\"_ftnref10\">[10]<\/a> a broad array of federal statutes that regulate computer-related misconduct address such threats.<a href=\"#_ftn11\" name=\"_ftnref11\">[11]<\/a> This domestic legal regime provides a victimized corporation both a criminal and civil roadmap for addressing a cyber incident.<a href=\"#_ftn12\" name=\"_ftnref12\">[12]<\/a> By contrast, it is international law that regulates the response when a state conducts hostile cyber activity against a corporation. International law currently prohibits non-state actors\u2014including corporations\u2014from responding to state hostility themselves.<a href=\"#_ftn13\" name=\"_ftnref13\">[13]<\/a> Only state actors have the legal authority to respond to other state actors.<a href=\"#_ftn14\" name=\"_ftnref14\">[14]<\/a> As a result, a targeted corporation must hope that its host state will act on behalf of its interests. Unfortunately, despite some recent efforts to build a more robust public-private partnership to address state sponsored cyber hostilities, government responses are unpredictable and have proven inadequate at defending corporate interests.<a href=\"#_ftn15\" name=\"_ftnref15\">[15]<\/a> As the frequency and intensity of state sponsored hostile activity increases, this arrangement is becoming untenable.<\/p>\n<p>Is it possible to give corporations greater discretion in how they defend their interests from hostile state cyber activity without undercutting the well-established international norm that only states can act against other states? The answer to this question is a limited \u201cyes.\u201d International law recognizes the authority of a state to empower private corporations to assume certain governmental functions.<a href=\"#_ftn16\" name=\"_ftnref16\">[16]<\/a> These governmental functions may include responding with cyber countermeasures that are traditionally off-limits to corporations.<a href=\"#_ftn17\" name=\"_ftnref17\">[17]<\/a> However, the delegation of this governmental authority does come with risk for the state. Since the corporation is viewed as an appendage of the government, the authorizing state retains legal responsibility for the countermeasures.<a href=\"#_ftn18\" name=\"_ftnref18\">[18]<\/a> It is therefore imperative for the authorizing state to clearly articulate the parameters on these actions in order to avoid violating international law or, more importantly, inadvertently causing an armed conflict.<\/p>\n<p>This article will begin with a brief summary of the international legal framework that regulates state interactions. The legal authority for government sanctioned corporate countermeasures, as well as the limitation on these actions, becomes apparent through this framework. The reasons that targeted states need to invoke this authority and how they should limit the countermeasures will follow. The article will conclude with a recommendation that host states, despite the associated risks with such a decision, empower victimized corporations with the authority to use countermeasures in response to hostile state cyber activity.<\/p>\n<p>II. International Law and State Relationships<\/p>\n<p>Public international law governs the interaction between states.<a href=\"#_ftn19\" name=\"_ftnref19\">[19]<\/a> Within this broad category of international law there are more specialized sub-categories including the law of state responsibility, the <em>jus ad bellum<\/em>, and the <em>jus in bellum<\/em>. The law of state responsibility outlines the obligations states owe to each other as well as their concomitant responsibilities if they commit an internationally wrongful act.<a href=\"#_ftn20\" name=\"_ftnref20\">[20]<\/a> When these internationally wrongful acts are interpreted as a use of force state relations may devolve into armed conflict as a result.<a href=\"#_ftn21\" name=\"_ftnref21\">[21]<\/a> The international law which regulates armed conflict is comprised of two distinct strands known as <em>jus ad bellum and jus in bello. Jus ad bellum, <\/em>which lays the framework for when a state actor may resort to war, is \u201cgoverned by an important, but distinct, part of the international law set out in the United Nations Charter,\u201d<a href=\"#_ftn22\" name=\"_ftnref22\">[22]<\/a> and only allows for the use of force in cases of self-defense or if condoned by the collective judgment of the international community.<a href=\"#_ftn23\" name=\"_ftnref23\">[23]<\/a> <em>Jus in bello<\/em>, on the other hand, governs the actions of those participating in a conflict by establishing a delicate balance between military necessity\u2014\u201cthe wartime necessity of killing and destroying military objectives\u201d \u2014 and humanity\u2014\u201cthe wartime requirement of preventing unnecessary suffering and protecting the civilian <a href=\"http:\/\/hir.harvard.edu\/bin-laden-and-awlaki-lawful-targets\">population<\/a>.\u201d<a href=\"#_ftn24\" name=\"_ftnref24\">[24]<\/a> The International Committee of the Red Cross (ICRC), in describing the differences between the two stated that \u201c<em>[j]us ad bellum<\/em> refers to the conditions under which one may resort to war or to force in general; <em>jus in bello<\/em> governs the conduct of belligerents during a war, and in a broader sense comprises the rights and obligations of neutral parties as <a href=\"http:\/\/www.icrc.org\/eng\/resources\/documents\/misc\/57jnuu.htm\">well<\/a>.\u201d<a href=\"#_ftn25\" name=\"_ftnref25\">[25]<\/a><\/p>\n<p>As this section addresses the legal justification for a response to hostile cyber activity only the law of state responsibility and the <em>jus ad bellum<\/em> will be discussed.<a href=\"#_ftn26\" name=\"_ftnref26\">[26]<\/a> The law of state responsibility provides a path for more aggressive corporate responses to hostile cyber activity. However, if this corporate response is too aggressive, it may be construed as an illegal use of force or even an armed attack. Consequently, the corporation may be responsible for triggering the <em>jus ad bellum<\/em> and dangerously elevating the cyber incident into a justification for a military response. State actors would be foolish to authorize a private corporation to start an armed conflict. It is therefore important to briefly examine how the law of state responsibility provides for the empowerment of a corporation victimized by a hostile state cyber act and the consequences if those actions are misinterpreted.<\/p>\n<p style=\"padding-left: 30px;\"><em>A. The Law of State Responsibility and Corporate Countermeasures<\/em><\/p>\n<p>State responsibility for committing an international wrongful act is found in customary international law and reflected for the most part in the International Law Commission\u2019s Articles of State Responsibility.<a href=\"#_ftn27\" name=\"_ftnref27\">[27]<\/a> Underlying these articles is a belief in the inviolability of state sovereignty<a href=\"#_ftn28\" name=\"_ftnref28\">[28]<\/a> and the need to hold accountable those states that violate international law. The articles \u201cdo not attempt to define the content of the international obligations, the breach of which gives rise to responsibility\u201d but rather to outline the \u201cgeneral conditions under international law for the State to be considered responsible for wrongful acts or <a href=\"http:\/\/legal.un.org\/ilc\/texts\/instruments\/english\/commentaries\/9_6_2001.pdf\">omissions<\/a>.\u201d<a href=\"#_ftn29\" name=\"_ftnref29\">[29]<\/a> The Articles of State Responsibility therefore do not simply codify the legal rights and obligations of state actors but also outline in broad terms the consequences of a violation of international law.<a href=\"#_ftn30\" name=\"_ftnref30\">[30]<\/a><\/p>\n<p>One possible consequence for a state that chooses to commit an international wrongful act is entitling a targeted state to resort to countermeasures.<a href=\"#_ftn31\" name=\"_ftnref31\">[31]<\/a> \u201cCountermeasures are actions by an injured State that breach obligations owed to the \u201cresponsible\u201d State (the one initially violating its legal obligations) in order to persuade the latter to return to a state of <a href=\"http:\/\/justsecurity.org\/18460\/international-humanitarian-law-cyber-attacks-sony-v-north-korea\/\">lawfulness<\/a>.\u201d<a href=\"#_ftn32\" name=\"_ftnref32\">[32]<\/a> In other words, a state victimized by another is authorized to use acts traditionally prohibited under international law to force the offending state to comply with its legal obligations. As countermeasures are intended to induce a state to comply with international law rather than as a punitive response, these acts are limited in severity and disallowed immediately upon cessation of the triggering illegal act.<a href=\"#_ftn33\" name=\"_ftnref33\">[33]<\/a> Most importantly, countermeasures must not involve the threat or use of force as these acts are exclusively regulated by the United Nations Charter and customary international law.<a href=\"#_ftn34\" name=\"_ftnref34\">[34]<\/a><\/p>\n<p>The Tallinn <a href=\"http:\/\/www.pcworld.com\/article\/261850\/manual_examines_how_international_law_applies_to_cyberwarfare.html\">Manual<\/a><a href=\"#_ftn35\" name=\"_ftnref35\">[35]<\/a> notes the applicability of countermeasures to cyber space. It provides that \u201ca state injured by an internationally wrongful act may resort to proportionate countermeasures, including cyber countermeasures\u201d against a responsible state.<a href=\"#_ftn36\" name=\"_ftnref36\">[36]<\/a> Internationally wrongful acts can range from the severe\u2014such as a violation of the United Nations Charter\u2014to the more benign\u2014such as a breach of the non-intervention principle.<a href=\"#_ftn37\" name=\"_ftnref37\">[37]<\/a> What is clear is that a state actor conducting hostile cyber operations against a corporation unquestionably commits an internationally wrongful act.<a href=\"#_ftn38\" name=\"_ftnref38\">[38]<\/a> It is irrelevant whether these activities are physically destructive or injurious, but only that they are unlawful and detrimental.<a href=\"#_ftn39\" name=\"_ftnref39\">[39]<\/a> How the internationally wrongful act is interpreted will, however, drive the response. If the cyber activity targeting the corporation is an armed attack, the host state\u2019s right of self-defense option to use force applies.<a href=\"#_ftn40\" name=\"_ftnref40\">[40]<\/a> For those hostile cyber acts falling below the armed attack threshold, non-forceful countermeasures are an appropriate and authorized response.<a href=\"#_ftn41\" name=\"_ftnref41\">[41]<\/a><\/p>\n<p>In almost all situations countermeasures are reserved for use by a victimized state. The Articles of State Responsibility make clear that violations of a state\u2019s sovereignty by non-state actors are not permitted. Article 2 expresses that \u201c[t]here is an internationally wrongful act of a State when conduct consisting of an action or omission\u201d is attributable to the State.<a href=\"#_ftn42\" name=\"_ftnref42\">[42]<\/a> Inclusion of \u201comission\u201d as a form of attribution is important as a non-state actor, in this case a corporation, could respond in such a way that the government becomes responsible. For this reason a corporation is unauthorized to unilaterally engage a state participating in hostile cyber activities.<a href=\"#_ftn43\" name=\"_ftnref43\">[43]<\/a><\/p>\n<p>However, there is an exception to this general rule: An injured state which decides to invoke its right to use countermeasures may empower a non-governmental entity to act on its behalf. Article Five of the Articles of State Responsibility states that an \u201centity which is not an organ of the State\u201d may be permitted by domestic law to exercise elements of governmental authority.<a href=\"#_ftn44\" name=\"_ftnref44\">[44]<\/a> The term \u201centity\u201d may include \u201cpublic corporations, semi-public entities, public agencies of various kinds and even, in special cases, private companies, provided that in each case the entity is empowered by the law of the State to exercise functions of a public character normally exercised by State organs.\u201d<a href=\"#_ftn45\" name=\"_ftnref45\">[45]<\/a> While the definition of \u201cgovernmental authority\u201d is intentionally left vague to accommodate various interpretations, the use of a countermeasure is clearly within any reasonable interpretation of this term.<a href=\"#_ftn46\" name=\"_ftnref46\">[46]<\/a> In fact, countermeasures are a relatively minor exercise of government authority in comparison to how the Tallinn Manual illustrates the appropriate use of Article Five in cyberspace. Examples offered include a \u201cprivate corporation that has been granted the authority by the government to conduct offensive computer network operations against a state\u201d and \u201cempowering a private entity to engage in cyber intelligence gathering.\u201d<a href=\"#_ftn47\" name=\"_ftnref47\">[47]<\/a> International law and specifically the Articles of State Responsibility therefore allow for the delegation of authority to use countermeasures, and in particular cyber countermeasures, to private corporations.<a href=\"#_ftn48\" name=\"_ftnref48\">[48]<\/a><\/p>\n<p style=\"padding-left: 30px;\"><em>B. What are the Risks? <\/em><\/p>\n<p>Authorizing a private corporation to use countermeasures is an intriguing idea but comes with significant risk for the state. A state may \u201coutsource the taking of lawful cyber actions to private entities\u201d but it also \u201cshoulder[s] legal responsibility for the actions.\u201d<a href=\"#_ftn49\" name=\"_ftnref49\">[49]<\/a> Through domestic law the state delegates to the private entity the power to exercise governmental authority.<a href=\"#_ftn50\" name=\"_ftnref50\">[50]<\/a> In doing so, the private entity is the equivalent of a government agency making any approved measures logically attributable to the authorizing state.<a href=\"#_ftn51\" name=\"_ftnref51\">[51]<\/a> Similarly, any actions of the private entity not authorized by the domestic legislation are not attributable to the state.<a href=\"#_ftn52\" name=\"_ftnref52\">[52]<\/a> Thus, if a corporation is empowered to use cyber countermeasures in response to a state sponsored hostile cyber act, these government sanctioned actions would be \u201cconsidered an act of the State under international law, provided [they are] acting in that capacity in the particular instance.\u201d<a href=\"#_ftn53\" name=\"_ftnref53\">[53]<\/a><\/p>\n<p>The risk to the authorizing state is further amplified by the requirement that countermeasures not violate the State obligation to refrain from the threat or use of force as embodied in the United Nations Charter.<a href=\"#_ftn54\" name=\"_ftnref54\">[54]<\/a> Compliance with this limitation is particularly difficult in cyber space as the definition of \u201ccyber use of force\u201d is unclear. Professor Michael Schmitt notes that this topic frustrated the International Group of Experts convened to write the Tallinn Manual.<a href=\"#_ftn55\" name=\"_ftnref55\">[55]<\/a> Out of this frustration the group developed a nonexclusive list of factors that would likely influence the characterization of cyber operations by states as uses of force: severity, immediacy, directness, invasiveness, measurability, military character, state involvement, and presumptive legality. Additional factors found meaningful by the Experts included, inter alia, the prevailing political environment, the nexus of an operation to prospective military force, the attacker\u2019s identity, the attacker\u2019s track record with respect to cyber operations, and the nature of the target. These and other factors operate in concert as states make case-by-case determinations.<a href=\"#_ftn56\" name=\"_ftnref56\">[56]<\/a><\/p>\n<p>In applying the above listed factors and methodology it is easy to see how a corporate cyber countermeasure could be characterized as an unlawful use of force. If so characterized, the countermeasure would violate international law and, as the corporation would be acting under governmental authority, the violation would be attributable to the host state.<a href=\"#_ftn57\" name=\"_ftnref57\">[57]<\/a><\/p>\n<p>Perhaps more significantly, a corporate cyber countermeasure authorized by the host state may be interpreted as an armed attack and potentially escalate into a military engagement.<a href=\"#_ftn58\" name=\"_ftnref58\">[58]<\/a> It is important to note that the U.N. Charter prohibits the threat or use of force by any state.<a href=\"#_ftn59\" name=\"_ftnref59\">[59]<\/a> This prohibition has only two generally recognized exceptions.<a href=\"#_ftn60\" name=\"_ftnref60\">[60]<\/a> The first exception reserves to the Security Council the right to \u201cdetermine the existence of any threat to the peace, breach of the peace, or act of aggression,\u201d and the power to \u201cdecide what measures shall be taken . . . to maintain or restore international peace and security.\u201d<a href=\"#_ftn61\" name=\"_ftnref61\">[61]<\/a> The second exception ensures that states retain the \u201cinherent\u201d right of individual or collective self-defense if they are the victim of an armed attack.<a href=\"#_ftn62\" name=\"_ftnref62\">[62]<\/a> This right is a well-established international norm existing prior to the drafting of the U.N. Charter and is generally recognized as customary international law.<a href=\"#_ftn63\" name=\"_ftnref63\">[63]<\/a> International law thus imparts on the state independent authority to determine when it is necessary to exercise their inherent right to self-defense.<\/p>\n<p>So when would a cyber countermeasure be significant enough to allow a state to invoke its inherent right of self-defense?<a href=\"#_ftn64\" name=\"_ftnref64\">[64]<\/a> Again, similar to \u201cuse of force,\u201d it is difficult to define \u201carmed attack\u201d in cyber operations. While any cyber \u201cuse of force that injures or kills persons or damages or destroys property\u201d is clearly an armed attack<a href=\"#_ftn65\" name=\"_ftnref65\">[65]<\/a> the \u201crequisite degree of damage or injury remains . . . the subject of some disagreement.\u201d<a href=\"#_ftn66\" name=\"_ftnref66\">[66]<\/a> What is left unclear is whether cyber countermeasures not resulting in physical damage or injury, but generating \u201csevere non-destructive or non-injurious consequences,\u201d constitute an armed attack.<a href=\"#_ftn67\" name=\"_ftnref67\">[67]<\/a> In its characterization of these forms of cyber operations the United States has stated that \u201cunder some circumstances, a disruptive activity in cyberspace could constitute an armed attack.\u201d<a href=\"#_ftn68\" name=\"_ftnref68\">[68]<\/a> Broadly interpreting an \u201carmed attack\u201d in cyber space to include not only destruction or injury but also serious disruptions to the functioning of the state is increasingly the international norm.<a href=\"#_ftn69\" name=\"_ftnref69\">[69]<\/a> It is therefore possible that a cyber countermeasure that is too aggressive may fall within this more general definition of armed attack. The result would be a perverse situation where the aggressor state, whose actions initially justified the use of cyber countermeasures, could use military force as an act of self-defense against the victim state.<a href=\"#_ftn70\" name=\"_ftnref70\">[70]<\/a><\/p>\n<p>III. Why Should a State Risk Empowering a Corporation with Cyber Countermeasures?<\/p>\n<p>The risks to state actors, who remain legally accountable for any corporate use of cyber countermeasures, are significant, particularly for those corporate acts that could be misconstrued as an illegal use of force or an armed attack. For this reason, it would seem unlikely that a state would delegate countermeasure authority to a corporation. However, the advent of cyberspace has fundamentally altered the traditional landscape for international relations. As a result, states have been forced to re-think their approach to a myriad of issues including how best to protect corporations targeted by state actors in cyberspace.<a href=\"#_ftn71\" name=\"_ftnref71\">[71]<\/a> However, this approach can only work if the domestic law that empowers the corporation also has clearly articulated limitations in order to mitigate many of the associated concerns with this proposal. Discussion of why corporations need this authority, and how to limit the risk presented by cyber countermeasures, follows.<\/p>\n<p style=\"padding-left: 30px;\"><em>A. Cyberspace: Opportunity and Danger<\/em><\/p>\n<p>The importance of cyberspace in the contemporary business environment cannot be overstated which makes any state sponsored hostile cyber activities that target private corporations potentially devastating. Cyberspace has become ubiquitous for corporations and absolutely essential for conducting business operations.<a href=\"#_ftn72\" name=\"_ftnref72\">[72]<\/a> In a survey of nearly four hundred businesses conducted by the Journal of Law and Cyber Warfare nearly 11% of corporations surveyed reported generating or using data equaling that stored by the Library of Congress.<a href=\"#_ftn73\" name=\"_ftnref73\">[73]<\/a> The survey also found that the reliance on data, and the more general use of cyberspace for corporate operations, is not limited to \u201cjust a handful of industries\u201d but rather is pervasive throughout almost all businesses.<a href=\"#_ftn74\" name=\"_ftnref74\">[74]<\/a><\/p>\n<p>Cyberspace, described by one author \u201cas all of the computer networks in the world and everything they connect and control,\u201d<a href=\"#_ftn75\" name=\"_ftnref75\">[75]<\/a> offers unique opportunities and exciting possibilities to <a href=\"http:\/\/www.defense.gov\/transcripts\/transcript.aspx?%20transcriptid=5136\">businesses<\/a>.<a href=\"#_ftn76\" name=\"_ftnref76\">[76]<\/a> However, the very reasons that businesses so heavily rely upon cyberspace are why hostile state actors target these corporations. Access to cyberspace is not limited to the technologically advanced, does not require extensive computer sophistication, and is possible from almost any location.<a href=\"#_ftn77\" name=\"_ftnref77\">[77]<\/a> These attributes are advantages for businesses attempting to reach new customers and create organizational efficiencies. Yet, the borderless nature of cyberspace coupled with how easy it is to access the domain creates a staggering number of ways in which a cyber dependent corporation is vulnerable to exploitation.<a href=\"#_ftn78\" name=\"_ftnref78\">[78]<\/a> For a hostile state this unparalleled ability to exploit a corporation is enticing and one of the primary reasons cyberspace is increasingly attractive.<\/p>\n<p>Cyber activity is almost immediate, and if desired, relatively anonymous. These traits make cyberspace invaluable to a corporation; but they also incentivize bad behaviour in aggressive state actors.<a href=\"#_ftn79\" name=\"_ftnref79\">[79]<\/a> While cyberspace allows a corporation to conduct business incredibly fast it also results in hostile \u201ccyber operations . . . unfold[ing] so quickly that the state cannot\u201d respond.<a href=\"#_ftn80\" name=\"_ftnref80\">[80]<\/a> Further, the capability to remain anonymous in cyberspace is interesting to both corporate customers as well as the business itself. Anonymity, however, also makes attributing cyber hostilities to a state actor particularly difficult.<a href=\"#_ftn81\" name=\"_ftnref81\">[81]<\/a> A hostile state is not bound by geography, technology, or even the likelihood that a victimized corporation\u2019s government will respond due to the speed and attribution difficulties associated with these acts.<a href=\"#_ftn82\" name=\"_ftnref82\">[82]<\/a> These dynamics encourage a hostile state actor to target a corporation with relative impunity and little risk. The targeting of corporations in cyberspace is simply too attractive of an option for a motivated state actor not to use. Until there are consequences for the hostile state, there will be an increase in the targeting of corporations in cyberspace. It is therefore imperative to consider alternatives to the status quo including allowing corporations to protect themselves through the use of cyber countermeasures.<\/p>\n<p style=\"padding-left: 30px;\"><em>B. What Should Corporations Be Allowed to Do and Not Do<\/em><\/p>\n<p>International law, as a general rule, categorically prohibits a corporation from actively engaging a state actor, even if victimized by hostile activity. <a href=\"#_ftn83\" name=\"_ftnref83\">[83]<\/a> However, the Articles on State Responsibility liberate corporations to act when their host state delegates through domestic legislation to them countermeasure authority.<a href=\"#_ftn84\" name=\"_ftnref84\">[84]<\/a> Currently, despite increased efforts by state actors to protect <a href=\"https:\/\/www.whitehouse.gov\/the-press-office\/2015\/02\/25\/fact-sheet-cyber-threat-intelligence-integration-center\">corporations<\/a> in <a href=\"https:\/\/www.whitehouse.gov\/the-press-office\/2015\/02\/13\/executive-order-promoting-private-sector-cybersecurity-information-shari\">cyberspace<\/a>,<a href=\"#_ftn85\" name=\"_ftnref85\">[85]<\/a> government responses to state sponsored cyber hostilities remain slow and often non-existent.<a href=\"#_ftn86\" name=\"_ftnref86\">[86]<\/a> Empowering the corporation to act on its own behalf in cyberspace allows for quick and forceful responses to these hostile cyber activities. Further, the host state is at a significant disadvantage to respond as it is often receiving incomplete, second hand information regarding the hostile cyber activity.<a href=\"#_ftn87\" name=\"_ftnref87\">[87]<\/a> The victimized corporation, in contrast, is in a much better position to remediate any cyber breaches and to identify the perpetrators. Allowing corporations these self-help measures therefore negates many of the advantages currently enjoyed by hostile state actors in cyberspace.<\/p>\n<p>However, it is essential that there are limits placed on any corporate cyber countermeasures. Domestic legislation delegating countermeasure authority to the corporation must expressly prohibit any actions that may be construed as a use of force.<a href=\"#_ftn88\" name=\"_ftnref88\">[88]<\/a> Again, it is important to reiterate that the host state retains responsibility for the consequences of any corporate actions<a href=\"#_ftn89\" name=\"_ftnref89\">[89]<\/a> and the intent of allowing cyber countermeasures is to force an aggressor state into compliance with their international legal obligations.<a href=\"#_ftn90\" name=\"_ftnref90\">[90]<\/a> Cyber countermeasures are not meant to open the door to armed violence or to \u201cundermine U.S. efforts to establish durable international norms\u201d against <a href=\"http:\/\/www.washingtonpost.com\/blogs\/worldviews\/wp\/2013\/05\/23\/should-the-u-s-allow-companies-to-hack-back-against-foreign-cyber-spies\/\">hacking<\/a>.<a href=\"#_ftn91\" name=\"_ftnref91\">[91]<\/a> Allowing for active defense measures is potentially problematic in cyberspace as these acts can often be misinterpreted as more aggressive than intended. Only through well-established and advertised parameters on the corporate countermeasures can a host state hope to avoid unwanted escalations.<a href=\"#_ftn92\" name=\"_ftnref92\">[92]<\/a> It is critical for the host state to ensure that any authorized corporate cyber countermeasures respect the well-established prohibitive use of force model found in international law.<a href=\"#_ftn93\" name=\"_ftnref93\">[93]<\/a><\/p>\n<p>It is also important for the corporate countermeasure authorization to delineate attribution criteria before use. Attribution is a difficulty in cyberspace and can be especially troublesome in the context of state actors.<a href=\"#_ftn94\" name=\"_ftnref94\">[94]<\/a> While it is nearly impossible to positively attribute cyber actions with complete certainty, evidence often points to the <a href=\"http:\/\/www.engadget.com\/2014\/12\/07\/north-korea-denies-hacking-sony-pictures\/\">hostile<\/a> <a href=\"http:\/\/www.nytimes.com\/2014\/12\/18\/world\/asia\/us-links-north-korea-to-sony-hacking.html?_r=1\">state<\/a>.<a href=\"#_ftn95\" name=\"_ftnref95\">[95]<\/a> Any domestic legislation empowering a corporation with cyber countermeasure authority must balance the need to respond with the importance of holding accountable the responsible party. Without attribution requirements cyber countermeasures could quickly devolve into simple hack back strategies that are shots in the dark against unknown perpetrators.<a href=\"#_ftn96\" name=\"_ftnref96\">[96]<\/a> However, in circumstances where there is strong evidence of state sponsorship of cyber hostilities, corporations must be allowed to respond.<a href=\"#_ftn97\" name=\"_ftnref97\">[97]<\/a><\/p>\n<p>The current paradigm where corporations sit idly by while their interests are assaulted in cyberspace by hostile state actors is impractical. Governments are currently ill-equipped to respond on behalf of the corporation and thus allowing businesses to use self-help protective measures is a logical alternative. Admittedly, the host state assumes risk by authorizing corporate cyber countermeasures. Yet, the peril of this strategy is diminished by clearly establishing in the domestic legislation attribution criteria and the parameters of the corporations cyber countermeasures.<\/p>\n<p>IV. Conclusion<\/p>\n<p>The hacking of corporations in cyberspace will not stop until hostile states are forced to re-consider the cost of their actions. Delegating cyber countermeasure authority to corporations would be an effective way to start this thought process. However, this article\u2019s proposal is not meant to be considered in lieu of a closer relationship between governments and corporations; it is rather intended to be a small part of a broader strategy. Only a robust public-private partnership will provide truly comprehensive solutions to the problems facing corporations in cyberspace.<a href=\"#_ftn98\" name=\"_ftnref98\">[98]<\/a> These problems are immense and finding solutions is of critical importance to both corporations and the national security of the United States. Allowing victimized corporations to respond to hostile state cyber activity would be a small, yet positive, step towards a broader solution.<\/p>\n<p>Photo courtesy of Wikimedia Commons<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> Daniel B. Garrie is the executive managing partner for Law &amp; Forensics, a legal consulting firm that works with clients across industries on software, cybersecurity, e-discovery, and digital forensic issues. He is also an accomplished electronic discovery Special Master hearing disputes throughout the United States. In addition, he is a Partner at Zeichner Ellman and Krause, responsible for the firm\u2019s cyber security and privacy practice and is an Adjunct Professor of Law at Cardozo Law School specializing in Information Governance.<\/p>\n<p>Shane R. Reeves is a Lieutenant Colonel in the United States Army. He is an Associate Professor and the Deputy Head, Department of Law at the United States Military Academy, West Point, New York (shane.reeves@usma.edu). The views expressed here are his personal views and do not necessarily reflect those of the Department of Defense, the United States Army, the United States Military Academy, or any other department or agency of the United States Government. The analysis presented here stems from his academic research of publicly available sources, not from protected operational information.<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> <em>U.S. Cyber Command: Organizing for Cyber Space Operations: Hearings Before the H. Comm. on Armed Services, <\/em>111<sup>th<\/sup> Cong. 1 (2010) [hereinafter Hearings] (statement of Rep. Skelton, Chairman, H. Comm. on Armed Services).<\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> <em>See<\/em> McKinsey &amp; Company, Insights &amp; Publications, May 2014 <em>available at: <\/em>http:\/\/www.mckinsey.com \/insights\/business_technology\/the_rising_strategic_risks_of_cyberattacks.<\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> Cyberspace is defined as \u201ca global domain within the information environment that encompasses the interdependent networks of information technology infrastructures, including the Internet and telecommunications networks.\u201d U.S. Dep\u2019t of Def. Quadrennial Defense Review Report 37, February 2010 [hereinafter QDR]. The Tallinn Manual defines cyber space as \u201c[t]he environment formed by physical and non-physical components, characterized by the use of computers and the electromagnetic spectrum, to store, modify, and exchange data using computer networks.\u201d Tallinn Manual on the International Law Applicable to Cyber Warfare 193 (Michael Schmitt ed., 2013) [hereinafter Tallinn Manual].<\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> <em>See, e.g., <\/em>Michael A Riley &amp; Jordan Robertson, <em>FBI Said to Examine Whether Russia Tied to JPMorgan Hacking<\/em>, Bloomberg (Aug. 27, 2014), http:\/\/www.bloomberg.com\/news\/articles\/2014-08-27\/fbi-said-to-be-probing-whether-russia-tied-to-jpmorgan-hacking (\u201cRussian hackers attacked the U.S. financial system in mid-August, infiltrating and stealing data from JPMorgan Chase &amp; Co..\u201d).<\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> <em>See, e.g.<\/em>, David E. Sanger &amp; Nicole Perlroth, <em>U.S. Said to Find North Korea Ordered Cyberattack on Sony<\/em>, N.Y. Times (Dec. 17, 2014), http:\/\/www.nytimes.com\/2014\/12\/18\/world\/asia\/us-links-north-korea-to-sony-hacking.html?_r=1. \u201cThe Interview,\u201d a comedy about an assassination attempt on dictator Kim Jong-un, offended North Korea and was the reason for the cyber assault on Sony. <em>See id.<\/em><\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> <em>See <\/em>Zoe Li, <em>What we know about the Chinese army\u2019s alleged cyber spying unit<\/em>, CNN (May 20, 2014), www.cnn.com\/2014\/05\/20\/world\/asia\/china-unit-61398\/ (stating that \u201c141 companies targeted by unit 61398, out of which 115 were in the United States\u201d and are \u201cblue-chip companies in important industries such as aerospace, satellite and telecommunications, and information technology\u2014strategic industries that were identified in China\u2019s five year plan for 2011 to 2015.\u201d). <em>See also<\/em> Frank Langfitt, <em>U.S. Security Company Tracks Hacking To Chinese Army Unit<\/em>, NPR (Feb. 19, 2013), http:\/\/www.npr.org\/2013\/02\/19\/172373133\/report-links-cyber-attacks-on-u-s-to-chinas-military (discussing the link between Unit 61398 and cyberattacks on dozens of American companies). Hackers affiliated with the Chinese government are considered the most energetic and aggressive international actors. <em>See, e.g., <\/em>Craig Timberg, <em>Vast majority of global cyber-espionage emanates from China, report finds<\/em>, Wash. Post, Apr. 22, 2013, <em>available at<\/em> http:\/\/www.washingtonpost.com\/business\/technology\/vast-majority-of-global-cyber-espionage-emanates-from-china-report-finds\/2013\/04\/22\/61f52486-ab5f-11e2-b6fd-ba6f5f26d70e_story.html (reporting that of 120 incidents of government cyber espionage, 96 percent came from China).<\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> Cyber attacks motivated by ideology or nationalism can also be defined as cyberterrorism. <em>See generally<\/em> Catherine Theohary &amp; John Rollins, Cyberwarfare and Cyberterrorism: In Brief (May 27, 2015), <em>available at<\/em> http:\/\/fas.org\/sgp\/crs\/natsec\/R43955.pdf.<\/p>\n<p>Cyberterrorism can be considered \u2018the premeditated use of disruptive activities, or the threat thereof, against computers and\/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.\u2019&#8230;Cyberterrorists are state-sponsored and non-state actors who engage in cyberattacks to pursue their objectives\u2026.There are no clear criteria yet for determining whether a cyberattack is criminal, an act of hactivism, terrorism, or a nation-state\u2019s use of force equivalent to an armed attack. Likewise, no international, legally binding instruments have yet been drafted explicitly to regulate inter-state relations in cyberspace. <em>Id.<\/em><\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> <em>See, e.g., <\/em>Daniel Garrie &amp; Mitchell Silber, Cyber Warfare: Understanding the Law, Policy, and Technology 5-6 (2014) (discussing various cyber hostilities against corporations by state actors).<\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\">[10]<\/a> The damage to corporations by cyber criminals and non-state cyber groups can be immense as illustrated by the February 2015 hack of Anthem Incorporated Insurance Company. <em>See, e.g.,<\/em> Susanna Kim, <em>Anthem Cyber Attack: 5 Things That Could Happen to Your Personal Information<\/em>, ABC News (Feb. 5, 2015), http:\/\/abcnews.go.com\/Business\/anthem-cyber-attack-things-happen-personal-information\/story?id=28747729 (noting that over 80 million personal records were exposed to include those of children and non-customers).<\/p>\n<p><a href=\"#_ftnref11\" name=\"_ftn11\">[11]<\/a> <em>See generally <\/em>Daniel Garrie &amp; Shane R. Reeves, <em>An Unsatisfactory State of the Law: The Limited Options for a Corporation Dealing with Cyber Hostilities by State Actors<\/em>, Card. L. Rev. 48-60 (forthcoming Spring 2016).<\/p>\n<p><a href=\"#_ftnref12\" name=\"_ftn12\">[12]<\/a> <em>See, e.g.<\/em>, <em>United States v. Drew<\/em>, 259 F.R.D. 449 (C.D. Cal. 2009); <em>Bittman v. Fox<\/em>, 2015 U.S. Dist. LEXIS 70249 (N.D. Ill. June 1, 2015); <em>Mahoney v. Denuzzio<\/em>, 2014 U.S. Dist. LEXIS 10931 (D. Mass. Jan. 29, 2014).<\/p>\n<p><a href=\"#_ftnref13\" name=\"_ftn13\">[13]<\/a> <em>See generally<\/em> Shane Reeves, <em>To Russia with Love: How Moral Arguments for a Humanitarian Intervention in Syria Opened the Door for an Invasion of the Ukraine<\/em>, 23 Mich. S. Int\u2019. L. Rev. 199-229 (Fall 2014) (discussing the reason why states maintain the exclusive right to use force).<\/p>\n<p><a href=\"#_ftnref14\" name=\"_ftn14\">[14]<\/a> <em>See <\/em>Garrie &amp; Reeves, <em>supra<\/em> note 11, at 62-70 (reinforcing why corporations cannot be viewed as state actors or unilaterally respond to state sponsored hostile cyber activity).<\/p>\n<p><a href=\"#_ftnref15\" name=\"_ftn15\">[15]<\/a> <em>See id<\/em>. at 75-76.<\/p>\n<p><a href=\"#_ftnref16\" name=\"_ftn16\">[16]<\/a> <em>See <\/em>Responsibility of States for Internationally Wrongful Acts, G.A. Res. 56\/83, Annex, Art. 5, U.N. Doc. A\/RES\/56\/83 Dec. 12, 2001) [hereinafter Articles on State Responsibility] (stating an \u201centity which is not an organ of the State\u201d may be empowered to exercise elements of governmental authority).<\/p>\n<p><a href=\"#_ftnref17\" name=\"_ftn17\">[17]<\/a> Tallinn Manual, <em>supra<\/em> note 4, at 30-31 (discussing private corporations being granted authority by a government to conduct offensive computer network operations against another state).<\/p>\n<p><a href=\"#_ftnref18\" name=\"_ftn18\">[18]<\/a> <em>Id. <\/em>(noting that \u201ca State is responsible for the acts of non-State actors where it has \u2018effective control\u2019 over such actors\u201d).<\/p>\n<p><a href=\"#_ftnref19\" name=\"_ftn19\">[19]<\/a> <em>See <\/em>Restatement (Third) of Foreign Relations Law of the United States \u00a7 101 (1987) (defining international law as \u201crules and principles of general application dealing with the conduct of States and of international organizations and with their relations inter se, as well as some of their relations with persons, whether natural or juridical.\u201d)<\/p>\n<p><a href=\"#_ftnref20\" name=\"_ftn20\">[20]<\/a> <em>See generally <\/em>Tallinn Manual, <em>supra<\/em> note 4, at 25-35.<\/p>\n<p><a href=\"#_ftnref21\" name=\"_ftn21\">[21]<\/a> <em>See<\/em> Brian J. Bill, <em>The Rendulic \u201cRule\u201d: Military Necessity, Commander\u2019s Knowledge, and Methods of Warfare<\/em>, <em>in<\/em> 12 Yearbook of International Humanitarian law 119, 119 (2009) (discussing the reality that at times states will result to warfare to resolve differences).<\/p>\n<p><a href=\"#_ftnref22\" name=\"_ftn22\">[22]<\/a> Geoffrey Best, War &amp; Law Since 1945 5 (2002). <em>.<\/em><\/p>\n<p><a href=\"#_ftnref23\" name=\"_ftn23\">[23]<\/a> When can a state justifiably exercise its right of self-defense is debatable and outside the scope of this article. For a more detailed discussion <em>see generally <\/em>Int\u2019l &amp; Operational Law Dep\u2019t, The Judge Advocate General\u2019s Legal Ctr. &amp; Sch., U.S. Army, Law of Armed Conflict Deskbook 29-35 (2010) [hereinafter Deskbook] (discussing the various views on the inherent right of self-defense in <em>jus ad bellum<\/em>).<\/p>\n<p><a href=\"#_ftnref24\" name=\"_ftn24\">[24]<\/a> Major Shane R. Reeves &amp; Lieutenant Colonel Jeremy Marsh, <em>Bin Laden and Awlaki: Lawful Targets<\/em>, Harv. Int\u2019l Rev., web perspectives (Oct. 26, 2011), <em>available at<\/em>: http:\/\/hir.harvard.edu\/bin-laden-and-awlaki-lawful-targets (last visited 4 June 2013).<\/p>\n<p><a href=\"#_ftnref25\" name=\"_ftn25\">[25]<\/a> Robert Kolb, <em>Origin of the Twin Terms Jus Ad Bellum\/Jus In Bello<\/em><strong>,<\/strong> 320 Int&#8217;l Rev. Red Cross 553, 553 n.1, (Oct. 31, 1997), <em>available at<\/em> http:\/\/www.icrc.org\/eng\/resources\/documents\/misc\/57jnuu.htm (last visited 22 June 2013).<\/p>\n<p><a href=\"#_ftnref26\" name=\"_ftn26\">[26]<\/a> An analysis of the <em>jus in bello<\/em> in cyber space is irrelevant to this section. For a detailed discussion on <em>jus in bello <\/em>in cyber space see Michael Schmitt, <em>The Law of Cyber Warfare: Quo Vadis<\/em>, 25 Stan. L. &amp; Pol\u2019y, 269, 289-299 (2014).<\/p>\n<p><a href=\"#_ftnref27\" name=\"_ftn27\">[27]<\/a> \u201cIt must be noted, however, that the law of armed conflict contains a number of specific rules on State responsibility for violation thereof.\u201d\u00a0\u00a0 Tallinn Manual, <em>supra <\/em>note 4, at 29.<\/p>\n<p><a href=\"#_ftnref28\" name=\"_ftn28\">[28]<\/a> \u201cSovereignty in the matters between States signifies independence. Independence in regard to a portion of the globe is the right to exercise therein, to the exclusion of any other State, the functions of a State.\u201d <em>Island of Palmas <\/em>(Neth. v. U.S.) 2 R.I.A.A. 829, 838 (Perm. Ct. Arb. 1928).<\/p>\n<p><a href=\"#_ftnref29\" name=\"_ftn29\">[29]<\/a> Articles of State Responsibility and Commentaries, General Commentary (1), <em>available at<\/em> http:\/\/legal.un.org\/ilc\/texts\/instruments\/english\/commentaries\/9_6_2001.pdf [hereinafter Commentaries].<\/p>\n<p><a href=\"#_ftnref30\" name=\"_ftn30\">[30]<\/a> <em>Id. <\/em>at art. 3.<\/p>\n<p><a href=\"#_ftnref31\" name=\"_ftn31\">[31]<\/a> <em>See <\/em>Articles on State Responsibility, <em>supra <\/em>note 16, art. 22 (\u201cThe wrongfulness of an act of a State not in conformity with an international obligation towards another State is precluded if and to the extent that the act constitutes a countermeasure taken against the latter State in accordance with chapter II of part three.\u201d).<\/p>\n<p><a href=\"#_ftnref32\" name=\"_ftn32\">[32]<\/a> Michael Schmitt, <em>International Law and Cyber Attacks: Sony vs. North Korea, <\/em>Just Security (Dec. 17, 2014), http:\/\/justsecurity.org\/18460\/international-humanitarian-law-cyber-attacks-sony-v-north-korea\/.<\/p>\n<p><a href=\"#_ftnref33\" name=\"_ftn33\">[33]<\/a> Articles on State Responsibility, <em>supra <\/em>note 16, art. 49-52.<\/p>\n<p><a href=\"#_ftnref34\" name=\"_ftn34\">[34]<\/a> <em>Id. <\/em>at art. 50(1)(a); Tallinn Manual, <em>supra <\/em>note 4, at 38.<\/p>\n<p><a href=\"#_ftnref35\" name=\"_ftn35\">[35]<\/a> The Tallinn Manual on the International Law Applicable to Cyber Warfare was drafted by a group of international law experts at the behest of the NATO Cooperative Cyber Defence \u201cto help government\u2019s deal with the international legal implications of cyber operations.\u201d <em>See Manual Examines How International Law Applies to Cyberspace, <\/em>IT World, Sept. 3, 2012, http:\/\/www.pcworld.com\/article\/261850\/manual_examines_how_international_law_applies_to_cyberwarfare.html (last visited Sept. 12, 2015).<\/p>\n<p><a href=\"#_ftnref36\" name=\"_ftn36\">[36]<\/a> Tallinn Manual, <em>supra <\/em>note 4, at 36.<\/p>\n<p><a href=\"#_ftnref37\" name=\"_ftn37\">[37]<\/a> <em>Id. <\/em>at 29-30.<\/p>\n<p><a href=\"#_ftnref38\" name=\"_ftn38\">[38]<\/a> Schmitt, <em>Quo Vadis<\/em>, <em>supra<\/em> note 26, at 275-76 (2014) (\u201chostile cyber operations directed against cyber infrastructure located on another state\u2019s territory, whether government or not, constitute, <em>inter alia<\/em>, a violation of that state\u2019s\u201d sovereignty.). <em>See also <\/em>Schmitt, <em>Sony vs. North Korea, supra <\/em>note 32 (noting that North Korea\u2019s cyber hostilities directed at Sony violated the sovereignty of the United States).<\/p>\n<p><a href=\"#_ftnref39\" name=\"_ftn39\">[39]<\/a> Schmitt, <em>Sony vs. North Korea, supra <\/em>note 32 (\u201cit would seem reasonable to characterize a cyber operation involving a State\u2019s manipulation of cyber infrastructure in another State\u2019s territory, or the emplacement of malware within systems located there, as a violation of the latter\u2019s sovereignty. This being so . . . it violated U.S. sovereignty.\u201d).<\/p>\n<p><a href=\"#_ftnref40\" name=\"_ftn40\">[40]<\/a> Cyber intrusions can range from a violation of sovereignty, to an unlawful intervention, to a use of force, to an armed attack. What rises to the level of an armed attack is debatable but most agree that there is a difference between a \u201cuse of force,\u201d and an \u201carmed attack.\u201d <em>See Military and Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.)<\/em>, 1986 I.C.J. 14, 191 (June 27) [hereinafter <em>Nicaragua v. United States<\/em>](stating it is necessary to \u201cdistinguish the most grave forms of the use of force (those constituting an armed attack) from other less grave forms.\u201d). <em>But see <\/em>Harold H. Koh, Address at the USCYBERCOM Inter-Agency Legal Conference, Ft. Meade, Maryland: International Law in Cyberspace (Sept. 18, 2012) <em>in <\/em>Harv. Int\u2019l L.J. Online 1, 3 (2012) (stating that the United States position is that the \u201cinherent right of self-defense potentially applies against any illegal use of force. In our view, there is no threshold for a use of deadly force to qualify as an \u2018armed attack\u2019 that may warrant a forcible response.\u201d). The U.N. Charter does not define a \u201cuse of force\u201d leaving some discretion to individual states. The International Criminal Tribunal for the Former Yugoslavia somewhat addressed this issue by stating \u201can armed conflict exists whenever there is a resort to armed force between State or protracted armed violence between governmental authorities and organized armed groups or between such groups within a State.\u201d <em>Prosecutor v. Tadic<\/em>, Case No. IT-94-1AR72I, Decision on the Defence Motion for Interlocutory Appeal on Jurisdiction, \u00b6 70 (Oct. 2, 1995). Though not addressing the definition directly this statement infers \u201cthat activities that directly lead to an armed conflict may be a use of force.\u201d <em>See <\/em>Geoffrey S. Corn et al., The Law of Armed Conflict: An Operational Approach 15 (2012).<\/p>\n<p><a href=\"#_ftnref41\" name=\"_ftn41\">[41]<\/a> <em>See <\/em>Schmitt, <em>Quo Vadis<\/em>, <em>supra<\/em> note 26, at 284. Professor Schmitt notes that \u201cas a practical matter, characterization of a cyber operation as a wrongful use of force merely serves to label the state involved as a violator of international law.\u201d <em>Id. <\/em>State responses to uses of force are capped \u201cat the non-forceful countermeasures level, an armed attack gives the targeted state the right to respond with its own use of force.\u201d <em>Id. (internal citation omitted)<\/em>. <em>See also <\/em> Tallinn Manual, <em>supra <\/em>note 4, at 17 (\u201cActions not constituting an armed attack but that are nevertheless in violation of international law may entitle the targeted State to resort to countermeasures\u201d).<\/p>\n<p><a href=\"#_ftnref42\" name=\"_ftn42\">[42]<\/a> <em>See <\/em>Articles on State Responsibility, <em>supra <\/em>note 16, art. 2.<\/p>\n<p><a href=\"#_ftnref43\" name=\"_ftn43\">[43]<\/a> <em>See generally id.<\/em> art. 49-54.<\/p>\n<p><a href=\"#_ftnref44\" name=\"_ftn44\">[44]<\/a> <em>See id.<\/em> art. 5.<\/p>\n<p><a href=\"#_ftnref45\" name=\"_ftn45\">[45]<\/a> Commentaries, <em>supra <\/em>note 29, at 43.<\/p>\n<p><a href=\"#_ftnref46\" name=\"_ftn46\">[46]<\/a> <em>See id. <\/em>at 128-29 (describing the use of countermeasures).<\/p>\n<p><a href=\"#_ftnref47\" name=\"_ftn47\">[47]<\/a> Tallinn Manual, <em>supra <\/em>note 4, at 31.<\/p>\n<p><a href=\"#_ftnref48\" name=\"_ftn48\">[48]<\/a> Schmitt, <em>Sony vs. North Korea<\/em>, <em>supra<\/em> note 32.<\/p>\n<p><a href=\"#_ftnref49\" name=\"_ftn49\">[49]<\/a> <em>Id.<\/em><\/p>\n<p><a href=\"#_ftnref50\" name=\"_ftn50\">[50]<\/a> Commentaries, <em>supra <\/em>note 29, at 43 (noting that Article 5 is clearly limited to entities which are empowered by internal law to exercise governmental authority).<\/p>\n<p><a href=\"#_ftnref51\" name=\"_ftn51\">[51]<\/a> <em>See <\/em>Articles on State Responsibility, <em>supra <\/em>note 16, art. 5.<\/p>\n<p><a href=\"#_ftnref52\" name=\"_ftn52\">[52]<\/a>\u00a0\u00a0 Tallinn Manual, <em>supra <\/em>note 4, at 31 (\u201cit is important to emphasize that State responsibility is only engaged when the entity in question is exercising elements of governmental authority.\u201d).<\/p>\n<p><a href=\"#_ftnref53\" name=\"_ftn53\">[53]<\/a> Schmitt, <em>Sony vs. North Korea<\/em>, <em>supra<\/em> note 32<em>.<\/em><\/p>\n<p><a href=\"#_ftnref54\" name=\"_ftn54\">[54]<\/a> <em>See <\/em>Articles on State Responsibility, <em>supra <\/em>note 16, art. 50. The Tallinn Manual notes that a majority of the International Experts agreed that this prohibition also applies to cyber countermeasures. Tallinn Manual, <em>supra <\/em>note 4, at 38.<\/p>\n<p><a href=\"#_ftnref55\" name=\"_ftn55\">[55]<\/a> <em>See <\/em>Schmitt, <em>Quo Vadis<\/em>, <em>supra<\/em> note 26, at 280.<\/p>\n<p><a href=\"#_ftnref56\" name=\"_ftn56\">[56]<\/a> <em>Id.<\/em> at 280-81 (<em>citing <\/em>Tallinn Manual, <em>supra <\/em>note 4, at 47-52).<\/p>\n<p><a href=\"#_ftnref57\" name=\"_ftn57\">[57]<\/a> This problem is particularly acute as it is likely that \u201c[t]he use of force threshold, wherever it may presently lie, will almost certainly drop in lock step with the increasing dependency of states on cyberspace.\u201d <em>Id. <\/em>At 281.<\/p>\n<p><a href=\"#_ftnref58\" name=\"_ftn58\">[58]<\/a> <em>See id. <\/em>at 284 (\u201cthe consequences of a situation in which a state mounting a cyber operation miscalculates how the targeted state will characterize it (and respond based on that characterization) are graver with respect to the armed attack threshold.\u201d).<\/p>\n<p><a href=\"#_ftnref59\" name=\"_ftn59\">[59]<\/a> U.N. Charter, art. 2, para. 4 (\u201cAll members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state\u201d). The U.N. Charter\u2019s general prohibition on the use of force echoes the ban on wars of aggression, or \u201cthe renunciation of war as an instrument of national policy,\u201d agreed to in the Kellogg-Briand Pact of 1928. <em>See <\/em>Treaty Between the United States and Other Powers Providing for the Renunciation of War as an Instrument of National Policy, 94 LNTS 57 (1928).<\/p>\n<p><a href=\"#_ftnref60\" name=\"_ftn60\">[60]<\/a> \u201cConsent\u201d is considered by some as a third exception to the general prohibition on the use of force. <em>See, e.g., <\/em>Corn et al., <em>supra <\/em>note 40, at 17. However, consent is more properly viewed as a state allowing force to be used within its own territory; therefore an exception to the rule prohibiting the use of force need not apply.<em> See <\/em>Deskbook, <em>supra <\/em>note 23, at 31 (\u201cConsent is not a separate exception to Article 2(4). If a state is using force with the consent of host state, then there is no violation of the host state\u2019s territorial integrity or political independence; thus, there is no need for an exception to the rule.\u201d).<\/p>\n<p><a href=\"#_ftnref61\" name=\"_ftn61\">[61]<\/a> U.N. Charter, art. 39.<\/p>\n<p><a href=\"#_ftnref62\" name=\"_ftn62\">[62]<\/a> <em>Id. <\/em>at art. 51.<\/p>\n<p><a href=\"#_ftnref63\" name=\"_ftn63\">[63]<\/a> <em>See Nicaragua v. United States<\/em>,<em> supra <\/em>note 40, at \u00a7 187(\u201cThe exception of the right of individual or collective self-defense is also, in the view of States, established in customary law, as is apparent for example from the terms of Article 51 of the United Nations Charter, which refers to an &#8220;inherent right&#8221;); Yoram Dinstein, War, Aggression, and Self Defense 181 (2005). \u00a0For a discussion on the customary definition of self-defense see Reeves, <em>To Russia with Love, supra <\/em>note 13, at 220-21.<\/p>\n<p><a href=\"#_ftnref64\" name=\"_ftn64\">[64]<\/a> It is again important to note that most international law experts agree that not all \u201cuses of force\u201d equate to an \u201carmed attack.\u201d <em>See, e.g., <\/em>Tallinn Manual, <em>supra <\/em>note 4, at 47, 52.<\/p>\n<p><a href=\"#_ftnref65\" name=\"_ftn65\">[65]<\/a> Tallinn Manual, <em>supra <\/em>note 4, at 55.<\/p>\n<p><a href=\"#_ftnref66\" name=\"_ftn66\">[66]<\/a> Schmitt, <em>Quo Vadis<\/em>, <em>supra<\/em> note 26, at 282.<\/p>\n<p><a href=\"#_ftnref67\" name=\"_ftn67\">[67]<\/a> <em>Id.<\/em><\/p>\n<p><a href=\"#_ftnref68\" name=\"_ftn68\">[68]<\/a> <em>See, e.g., Developments in the Field of Information and Telecommunications in the Context of International Security: Rep. of the Secretary-General, <\/em>18, U.N. Doc. A\/\/66\/152 (July 20, 2010)(stating \u201cunder some circumstances, a disruptive activity in cyberspace could constitute an armed attack.\u201d).<\/p>\n<p><a href=\"#_ftnref69\" name=\"_ftn69\">[69]<\/a> <em>See generally <\/em>Schmitt, <em>Quo Vadis<\/em>, <em>supra<\/em> note 26, at 282-83.<\/p>\n<p><a href=\"#_ftnref70\" name=\"_ftn70\">[70]<\/a> U.N. Charter, art. 51 (\u201cNothing in the present Charter shall impair the inherent right of individual or collective self-defense if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security.\u201d).<\/p>\n<p><a href=\"#_ftnref71\" name=\"_ftn71\">[71]<\/a> <em>See, e.g., <\/em>Schmitt, <em>Quo Vadis<\/em>, <em>supra<\/em> note 26, at 299 (discussing how armed conflict is transformed by cyber operations).<\/p>\n<p><a href=\"#_ftnref72\" name=\"_ftn72\">[72]<\/a> Eric A. Fisher Et Al., Cong. Research Serv., R42984, The 2013 Cybersecurity Executive Order: Overview and Considerations for Congress 1 (Mar. 1, 2013) (noting how heavily corporations rely upon computer technology to operate their business operations).<\/p>\n<p><a href=\"#_ftnref73\" name=\"_ftn73\">[73]<\/a> <em>See <\/em>Garrie &amp; Silber, <em>supra <\/em>note 9, at 8-15 (discussing the survey and its results).<\/p>\n<p><a href=\"#_ftnref74\" name=\"_ftn74\">[74]<\/a> <em>Id. <\/em>at 8.<\/p>\n<p><a href=\"#_ftnref75\" name=\"_ftn75\">[75]<\/a> Richard A. Clarke and Robert K. Knake, Cyber War 69-70 (2014).<\/p>\n<p><a href=\"#_ftnref76\" name=\"_ftn76\">[76]<\/a> Leon E. Panetta, U.S. Sec\u2019y of Defense, Remarks on Cybersecurity to the Business Executives for National Security, New York City (Oct 11, 2012), <em>available at <\/em>http:\/\/www.defense.gov\/transcripts\/transcript.aspx? transcriptid=5136 (\u201cCyberspace is the new frontier, full of possibilities to advance security and prosperity in the 21st century.\u00a0 And yet, with these possibilities, also come new perils and new dangers.\u201d).<\/p>\n<p><a href=\"#_ftnref77\" name=\"_ftn77\">[77]<\/a> <em>See, e.g.<\/em> P.W. Singer, Wired For War, 264 (2009).<\/p>\n<p><a href=\"#_ftnref78\" name=\"_ftn78\">[78]<\/a> <em>See <\/em>Garrie &amp; Reeves, <em>supra<\/em> note 11, at 10-26 (discussing different forms of cyber hostilities and how they work).<\/p>\n<p><a href=\"#_ftnref79\" name=\"_ftn79\">[79]<\/a> <em>See<\/em> McKinsey &amp; Company, <em>supra <\/em>note 3 (highlighting the rising strategic risks of cyberattacks on corporations and the difficulty executives are having as \u201cmitigating the effect of attacks often requires making complicated trade-offs between reducing risk and keeping pace with business demands.\u201d).<\/p>\n<p><a href=\"#_ftnref80\" name=\"_ftn80\">[80]<\/a> Schmitt, <em>Quo Vadis<\/em>, <em>supra<\/em> note 26, at 276.<\/p>\n<p><a href=\"#_ftnref81\" name=\"_ftn81\">[81]<\/a> <em>See <\/em>Garrie and Silber, <em>supra<\/em> note 9, at 19-40.<\/p>\n<p><a href=\"#_ftnref82\" name=\"_ftn82\">[82]<\/a> <em>See generally <\/em>Hearings<em>, supra <\/em>note 2.<\/p>\n<p><a href=\"#_ftnref83\" name=\"_ftn83\">[83]<\/a> <em>See generally <\/em>Articles on State Responsibility, <em>supra <\/em>note 16.<\/p>\n<p><a href=\"#_ftnref84\" name=\"_ftn84\">[84]<\/a> <em>See id. <\/em>at Art. 22.<\/p>\n<p><a href=\"#_ftnref85\" name=\"_ftn85\">[85]<\/a> The United States has taken significant steps to better coordinate a response to hostile cyber activities targeting corporations by establishing the Cyber Threat Intelligence Integration Center (CTIIC). <em>See Fact Sheet: Cyber Threat Intelligence Integration Center<\/em>, whitehouse.gov (Feb. 25, 2015), <em>available at <\/em>https:\/\/www.whitehouse.gov\/the-press-office\/2015\/02\/25\/fact-sheet-cyber-threat-intelligence-integration-center.\u00a0\u00a0 The CTIIC is intended to be \u201ca national intelligence center focused on \u2018connecting the dots\u2019 regarding malicious foreign cyber threats to the nation and cyber incidents affecting U.S. national interests,\u201d has the mission of assisting \u201crelevant departments and agencies in their efforts to identify, investigate, and mitigate those threats.\u201d <em>Id. <\/em>Additionally, on February 13, 2015 the President issued an Executive Order to promote private sector cybersecurity cooperation by authorizing greater intelligence sharing while protecting business confidentiality. Executive Order\u2014Promoting Private Sector Cybersecurity Information Sharing, Feb. 13, 2015, <em>available at<\/em> https:\/\/www.whitehouse.gov\/the-press-office\/2015\/02\/13\/executive-order-promoting-private-sector-cybersecurity-information-shari. It is unclear whether these efforts will have any effect on the ongoing trend of state sponsored cyber activity.<\/p>\n<p><a href=\"#_ftnref86\" name=\"_ftn86\">[86]<\/a> <em>See, e.g., <\/em>Devlin Barrett &amp; Danny Yadron, <em>Sony, U.S. Agencies Fumbled After Hacking, <\/em>Wall St. J., Feb. 23, 2015, at B1 (discussing how there are major shortcomings in how the government and companies work together to respond to cyber hostilities and in particular the hack of Sony Entertainment).<\/p>\n<p><a href=\"#_ftnref87\" name=\"_ftn87\">[87]<\/a> <em>See <\/em>Garrie &amp; Reeves, <em>supra<\/em> note 11, at 75-76 (\u201cUnfortunately, in the United States this partnership is in its infancy and is complicated by a host of problems including: distrust between the private and public sector, corporate reputational concerns, potential liability caused by a cyber incident, and sensitivity of operating in a global economy.\u201d).<\/p>\n<p><a href=\"#_ftnref88\" name=\"_ftn88\">[88]<\/a> <em>See supra <\/em>text and accompanying notes 49-71 discussing why these acts cannot cross this threshold.<\/p>\n<p><a href=\"#_ftnref89\" name=\"_ftn89\">[89]<\/a> <em>See <\/em>Articles on State Responsibility, <em>supra <\/em>note 16, art. 5.<\/p>\n<p><a href=\"#_ftnref90\" name=\"_ftn90\">[90]<\/a> <em>See id. <\/em>art. 49-52.<\/p>\n<p><a href=\"#_ftnref91\" name=\"_ftn91\">[91]<\/a> Max Fisher, <em>Should the U.S. allow companies to \u2018hack back\u2019 against foreign cyber spies?<\/em>, Wash. Post (May 23, 2013), http:\/\/www.washingtonpost.com\/blogs\/worldviews\/wp\/2013\/05\/23\/should-the-u-s-allow-companies-to-hack-back-against-foreign-cyber-spies\/.<\/p>\n<p><a href=\"#_ftnref92\" name=\"_ftn92\">[92]<\/a> <em>See <\/em>Jeffrey Hunker Et. Al., Institute for Info. Infrastructure Protection, Role and Challenges for Sufficient Cyber-Attack Attribution 5 (2008) (describing the dangers that come with active defense measures in cyberspace and in particular the possibility of a disproportionate response).<\/p>\n<p><a href=\"#_ftnref93\" name=\"_ftn93\">[93]<\/a> <em>See<\/em> U.N. Charter, art. 2(4).<\/p>\n<p><a href=\"#_ftnref94\" name=\"_ftn94\">[94]<\/a> <em>See generally<\/em> Garrie and Silber, <em>supra<\/em> note 9, at 19-40.<\/p>\n<p><a href=\"#_ftnref95\" name=\"_ftn95\">[95]<\/a> However, there are circumstances when attribution is less of a problem. For example, while North Korea denied being behind the cyber hostilities targeting Sony in December 2014, it poorly veiled its complicity in the hack as it seemed intent on \u201cpunishing\u201d the company for its behaviour. <em>See, e.g., <\/em>John Fingas, <em>North Korea denies hacking Sony Pictures, but likes that someone did<\/em>, Engadget (Dec. 7, 2014), http:\/\/www.engadget.com\/2014\/12\/07\/north-korea-denies-hacking-sony-pictures\/. The United States later publicly attributed the cyber act against Sony to North Korea. <em>See, e.g.<\/em>, David E. Sanger &amp; Nicole Perlroth, <em>U.S. Said to Find North Korea Ordered Cyberattack on Sony<\/em>, N.Y. Times (Dec. 17, 2014), http:\/\/www.nytimes.com\/2014\/12\/18\/world\/asia\/us-links-north-korea-to-sony-hacking.html?_r=1.<\/p>\n<p><a href=\"#_ftnref96\" name=\"_ftn96\">[96]<\/a> Hunker, <em>supra <\/em>note 92, at 5 (&#8220;[o]ur legal and policy frameworks for responding to cyberattacks cannot work unless we have adequate attribution; these frameworks remain incomplete because we lack the basis (sufficient attribution) to actually use them.&#8221;)<\/p>\n<p><a href=\"#_ftnref97\" name=\"_ftn97\">[97]<\/a> Examples include the December 2014 North Korean hack of Sony, <em>see<\/em> <em>generally supra <\/em>note 95, and the October 2012 Iranian hack of American banks and the oil industry in the Middle East. <em>See generally <\/em>Mike Mount, <em>U.S. Officials believe Iran behind recent cyber attacks, <\/em>CNN (Oct. 16, 2012), http:\/\/www.cnn.com\/2012\/10\/15\/world\/iran-cyber\/index.html) (quoting Retired Senator Joseph Lieberman as stating \u201cI don\u2019t believe these were just hackers who were skilled enough to cause disruption of the Web sites . . . I think this was done by Iran and the Quds Force, which has its own developing cyber attack capability.\u201d).<\/p>\n<p><a href=\"#_ftnref98\" name=\"_ftn98\">[98]<\/a> We explain how the public-private relationship could be significantly enhanced in our forthcoming article. <em>See generally <\/em>Garrie &amp; Reeves, <em>supra<\/em> note 11.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Daniel Garrie and Shane R. Reeves[1] Click here to read the full text as a PDF. \u201c[U.S] information systems face thousands of attacks a day from criminals, terrorist organizations, and more recently from more than 100 foreign intelligence organizations.\u201d[2] Looking forward, if the pace and intensity of attacks increase and are not met with improved defenses, a backlash against digitization could occur, with large negative economic implications. Using MGI data on the technologies that will truly matter to business strategy during the coming decade, we estimate that over the next five to seven years, $9 trillion to $21 trillion [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":4670,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_post_was_ever_published":false},"categories":[4,24],"tags":[187,188,186,192,185,190,191,36,189],"class_list":["post-4669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-features","category-online","tag-cyber-attacks","tag-cyber-hostilities","tag-cyber-security","tag-cyber-space","tag-cybersecurity","tag-international-law","tag-north-korea","tag-russia","tag-state-sponsored-corporate-countermeasures"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2015\/12\/Computer_Security_Symbol_-_Hacked_rot.jpg?fit=6000%2C4000&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/peZtUX-1dj","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/4669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=4669"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/4669\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media\/4670"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=4669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/categories?post=4669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/tags?post=4669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}