{"id":5155,"date":"2020-02-21T14:10:32","date_gmt":"2020-02-21T19:10:32","guid":{"rendered":"https:\/\/journals.law.harvard.edu\/nsj\/?p=5155"},"modified":"2025-09-19T14:43:11","modified_gmt":"2025-09-19T18:43:11","slug":"perfidy-in-cyberspace-the-requirement-for-human-confidence","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/nsj\/2020\/02\/perfidy-in-cyberspace-the-requirement-for-human-confidence\/","title":{"rendered":"Perfidy in Cyberspace: The Requirement for Human Confidence"},"content":{"rendered":"<p style=\"text-align: center;\"><strong><em>Sean K. Price<\/em><\/strong><a href=\"#_ftn1\" name=\"_ftnref1\">[*]<\/a><\/p>\n<p style=\"text-align: center;\">[This article is available in PDF at <a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/04\/Price_Perfidy-in-Cyberspace_FINAL.pdf\" data-wplink-edit=\"true\">this link<\/a>]<\/p>\n<h1><a name=\"_Toc33188201\"><\/a><a name=\"_Toc33187693\"><\/a>Introduction<\/h1>\n<p>The United States is under attack. In the months leading up to hostilities, the enemy\u2019s intelligence agencies have identified key U.S. and allied military officials who use cloud-connected artificial pacemakers<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> or implantable cardiac defibrillators (ICD).<a href=\"#_ftn2\" name=\"_ftnref2\">[2]<\/a> Immediately preceding offensive operations in the physical domains, the adversary\u2019s cyber force pushes malware to those officials\u2019 pacemakers, which accept it as authentic firmware updates produced by a civilian manufacturer. When the attack begins, the adversary instructs the now-infected pacemakers to malfunction.<a href=\"#_ftn3\" name=\"_ftnref3\">[3]<\/a> The most fortunate targets require hospitalization to deactivate their pacemakers. A few senior officers<a href=\"#_ftn4\" name=\"_ftnref4\">[4]<\/a> and civilian defense officials die.<a href=\"#_ftn5\" name=\"_ftnref5\">[5]<\/a><\/p>\n<p>Assuming it was lawful to target these officials,<a href=\"#_ftn6\" name=\"_ftnref6\">[6]<\/a> did the adversary violate the rule against perfidy by exploiting their pacemakers\u2019 cybersecurity vulnerabilities<a href=\"#_ftn7\" name=\"_ftnref7\">[7]<\/a> to wound or kill them? Put briefly (and to be discussed in more detail below), the rule against perfidy prohibits inviting the adversary\u2019s confidence concerning protection under the law of armed conflict with the intention of wounding or killing him.<a href=\"#_ftn8\" name=\"_ftnref8\">[8]<\/a> This question produced a split within the International Group of Experts who contributed to the <em>Tallinn Manual 2.0<\/em><a href=\"#_ftn9\" name=\"_ftnref9\">[9]<\/a>: the majority believed that the facts presented would violate the rule against perfidy, while others believed that they would not, because \u201cconfidence presupposes human involvement.\u201d<a href=\"#_ftn10\" name=\"_ftnref10\">[10]<\/a> This article argues that the latter group was correct because confidence, as that term is used in the rule against perfidy, means human trust.<\/p>\n<p>Wars will have a cyber component for the foreseeable future.<a href=\"#_ftn11\" name=\"_ftnref11\">[11]<\/a> The new, more aggressive cyber strategy of the U.S. Department of Defense (DoD) reflects this reality, calling for \u201cdefend[ing] forward to disrupt or halt malicious cyber activity at its source.\u201d<a href=\"#_ftn12\" name=\"_ftnref12\">[12]<\/a> The DoD also expressed its intent to \u201cemploy offensive cyber capabilities and innovative concepts.\u201d<a href=\"#_ftn13\" name=\"_ftnref13\">[13]<\/a> A clear and realistic understanding of what constitutes perfidy in cyberspace will inform the limits of that innovation.<\/p>\n<p>Human confidence is\u2014and should be\u2014required to commit perfidy. To explain why, this article first discusses the modern definition of perfidy, the rule against it, and its function within the larger framework of lawful and unlawful deception. Second, it describes the characteristics of cyberspace that are the most challenging to the application of perfidy. Third, it explains how perfidy as currently defined and applied does not extend to the deception of cyber systems. Fourth, this article argues that the definition of perfidy should not be expanded to include the deception of cyber systems. Finally, this article anticipates some counterarguments in favor of the majority position set out in the <em>Tallinn Manual 2.0<\/em>.<\/p>\n<h1><a name=\"_Toc33188202\"><\/a><a name=\"_Toc33187694\"><\/a><a name=\"_Toc30531069\"><\/a>I.\u00a0 Perfidy Defined<\/h1>\n<p>Perfidy, also sometimes called treachery,<a href=\"#_ftn14\" name=\"_ftnref14\">[14]<\/a> \u201cis the false claim to protections under the law of war in order to secure a military advantage.\u201d<a href=\"#_ftn15\" name=\"_ftnref15\">[15]<\/a> The term is used both broadly to describe generally bad faith or dishonorable conduct, and more narrowly as an element of the crime of perfidy as it exists today.<a href=\"#_ftn16\" name=\"_ftnref16\">[16]<\/a> This article is concerned with perfidy in the latter sense, which must further be distinguished from the rule against it. The crime of perfidy does not prohibit perfidy <em>per se<\/em>, but rather perfidy as a means of achieving a certain result: death or injury of the adversary.<a href=\"#_ftn17\" name=\"_ftnref17\">[17]<\/a><\/p>\n<h2><a name=\"_Toc33188203\"><\/a><a name=\"_Toc33187695\"><\/a><a name=\"_Toc30531070\"><\/a>A.\u00a0 <em>Perfidy and the Rule Against It<\/em><\/h2>\n<p>Perfidy as a concept has its origins in chivalric notions of honor and fairness between combatants.<a href=\"#_ftn18\" name=\"_ftnref18\">[18]<\/a> Rules against perfidy were first codified during the 19<sup>th<\/sup> century in the Lieber Code, the Brussels Declaration, and the 1880 Oxford Manual, which prohibited \u201cclandestine or treacherous attempts to injure an enemy,\u201d<a href=\"#_ftn19\" name=\"_ftnref19\">[19]<\/a> \u201cmurder by treachery,\u201d<a href=\"#_ftn20\" name=\"_ftnref20\">[20]<\/a> and \u201cperfidious, unjust, or tyrannical acts,\u201d<a href=\"#_ftn21\" name=\"_ftnref21\">[21]<\/a> respectively.<a href=\"#_ftn22\" name=\"_ftnref22\">[22]<\/a> Codification continued with the Hague Regulations of 1907, which prohibit \u201ckill[ing] or wound[ing] treacherously individuals belonging to the hostile nation or army.\u201d<a href=\"#_ftn23\" name=\"_ftnref23\">[23]<\/a><\/p>\n<p>The modern definition of, and rule against, perfidy was codified in Article 37 of Additional Protocol I (AP I) to the Geneva Conventions of 1949:<\/p>\n<ol>\n<li>It is prohibited to kill, injure or capture an adversary by resort to perfidy. Acts inviting the confidence of an adversary to lead him to believe that he is entitled to, or obliged to accord, protection under the rules of international law applicable in armed conflict, with intent to betray that confidence, shall constitute perfidy. . . .<\/li>\n<li>Ruses of war are not prohibited. Such ruses are acts which are intended to mislead an adversary or to induce him to act recklessly but which infringe no rule of international law applicable in armed conflict and which are not perfidious because they do not invite the confidence of an adversary with respect to protection under the law. The following are examples of such ruses: the use of camouflage, decoys, mock operations and misinformation.<a href=\"#_ftn24\" name=\"_ftnref24\">[24]<\/a><\/li>\n<\/ol>\n<p>AP I\u2019s formulation of the rule is generally considered to reflect customary international law,<a href=\"#_ftn25\" name=\"_ftnref25\">[25]<\/a> though it has not entirely displaced the rule in the Hague Regulations of 1907.<a href=\"#_ftn26\" name=\"_ftnref26\">[26]<\/a> AP I\u2019s rule against perfidy (like that in the Hague Regulations of 1907) outlaws a discrete type of deception: not perfidy itself, but rather perfidy that proximately causes the adversary\u2019s death or injury.<a href=\"#_ftn27\" name=\"_ftnref27\">[27]<\/a> For example, approaching the enemy under a flag of truce and then attacking would violate the rule against perfidy.<a href=\"#_ftn28\" name=\"_ftnref28\">[28]<\/a> Sending a small part of one\u2019s force under a flag of truce solely to delay the enemy would not, even though it satisfies AP I\u2019s definition of perfidy. Yet it would still be unlawful deception\u2014specifically, the improper use of the flag of truce.<a href=\"#_ftn29\" name=\"_ftnref29\">[29]<\/a> Unlike the rule against perfidy, the prohibition on improper use of a flag of truce and of other recognized emblems (e.g., the red cross) is \u201cabsolute.\u201d<a href=\"#_ftn30\" name=\"_ftnref30\">[30]<\/a> Improper use of such an emblem is illegal, plain and simple.<a href=\"#_ftn31\" name=\"_ftnref31\">[31]<\/a><\/p>\n<p>As this example illustrates, the rule against perfidy does not need, nor should it be expected, to do all the work of marking the boundary between lawful and unlawful deception. The definition of perfidy within the rule is narrower and more demanding than the rule set forth in the Hague Regulations of 1907, which prohibits \u201ckill[ing] or wound[ing] treacherously.\u201d<a href=\"#_ftn32\" name=\"_ftnref32\">[32]<\/a> Nonetheless, it is still more flexible than the rules on using recognized emblems.<\/p>\n<p>Thus, perfidy\u2019s modern definition strikes a balance between flexibility and objectivity, so that it can fill the gap between recognized emblems and ruses<a href=\"#_ftn33\" name=\"_ftnref33\">[33]<\/a> while retaining sufficient clarity to give combatants adequate notice of what deception is illegal. After all, protection under the law of war can take many forms, not all of which require a recognized emblem. Civilians, for example, do not need to wear a specific symbol to warrant protection from attack.<a href=\"#_ftn34\" name=\"_ftnref34\">[34]<\/a> Accordingly, the rule against perfidy must address inviting the adversary\u2019s confidence with respect to legal protections that are not accompanied by a recognized emblem. Getting the balance between flexibility and objectivity right is important because a ruse\u2019s legality is defined in the negative: the deception is lawful so long as it neither is perfidious nor violates a specific rule in the law of armed conflict (e.g., improper use of the enemy\u2019s uniform).<a href=\"#_ftn35\" name=\"_ftnref35\">[35]<\/a> Like perfidy, the concept of ruses has chivalric origins.<a href=\"#_ftn36\" name=\"_ftnref36\">[36]<\/a> Thus, if perfidy were left in its previous form\u2014prohibiting treacherous wounding or killing, without further elaboration of what \u201ctreachery\u201d means\u2014the distinction between perfidy and ruses would turn on subjective, and consequently unenforceable, notions of fairness.<a href=\"#_ftn37\" name=\"_ftnref37\">[37]<\/a><\/p>\n<p>Reinforced with its present, objective standard, the rule against perfidy is better able to serve its two purposes, which are linked by a common thread of trust.<a href=\"#_ftn38\" name=\"_ftnref38\">[38]<\/a> First, the rule seeks to preserve \u201cthe basis for restoration to peace\u201d<a href=\"#_ftn39\" name=\"_ftnref39\">[39]<\/a> by ensuring \u201creliable mediums of exchange and communication\u201d between the parties,<a href=\"#_ftn40\" name=\"_ftnref40\">[40]<\/a> thereby allowing resolution of the conflict \u201cshort of the complete annihilation of one belligerent by the other.\u201d<a href=\"#_ftn41\" name=\"_ftnref41\">[41]<\/a> For example, an offer to surrender will not be trusted if the other side believes it is a trick to injure or kill its soldiers. Second, and more importantly, the rule protects persons who are not subject to attack under the law of armed conflict by assuring combatants that their respect for protected persons (e.g., civilians) may not lawfully be exploited to do them harm.<a href=\"#_ftn42\" name=\"_ftnref42\">[42]<\/a> All this is not to say that the modern definition of perfidy is perfect, but rather that states should make sure that perfidy\u2019s role in the cyber context stays true to its role in the physical domain.<\/p>\n<h2><a name=\"_Toc33188204\"><\/a><a name=\"_Toc33187696\"><\/a><a name=\"_Toc30531071\"><\/a>B.\u00a0 <em>The <\/em>Tallinn Manual 2.0<em> and Perfidy<\/em><\/h2>\n<p>The description of perfidy in the <em>Tallinn Manual 2.0<\/em> is, for the most part, a straightforward application of the rule set forth in AP I.<a href=\"#_ftn43\" name=\"_ftnref43\">[43]<\/a> Two aspects of its analysis of perfidy merit mention here: its interpretation of the concept of \u201cadversary\u201d and its discussion of proximate cause.<\/p>\n<p>The <em>Manual<\/em> observes that \u201c[t]he notion of \u2018adversary\u2019 is sufficiently broad to encompass the situation in which the deceived person is not necessarily the person whose death or injury results from the deception.\u201d<a href=\"#_ftn44\" name=\"_ftnref44\">[44]<\/a> It neither elaborates on this point nor cites to any authority in support of it.<a href=\"#_ftn45\" name=\"_ftnref45\">[45]<\/a> Even so, the <em>Tallinn Manual<\/em> <em>2.0<\/em>\u2019s broad reading of \u201cadversary\u201d is consistent with AP I\u2019s definition and is essential to the application of perfidy in cyberspace, as shown by its discussion of proximate cause.<\/p>\n<p>To violate the rule against perfidy, \u201cthe perfidious act must be the proximate cause of the death or injury.\u201d<a href=\"#_ftn46\" name=\"_ftnref46\">[46]<\/a> To illustrate, the <em>Manual<\/em> gave this example: a military unit sends an email to the adversary \u201cindicating an intention to surrender some days later at a specific location,\u201d but then ambushes the adversary unit sent to accept the surrender.<a href=\"#_ftn47\" name=\"_ftnref47\">[47]<\/a> Those responsible for sending the email have violated the rule against perfidy, regardless of whether any member of the ambushed unit knew of the email\u2019s existence.<a href=\"#_ftn48\" name=\"_ftnref48\">[48]<\/a> The email proximately caused the ambush by deceiving a person with the authority to dispatch the unit; it need not have deceived any of the victims.<\/p>\n<p>So far, so good. However, the International Group of Experts split on the scope of an adversary\u2019s confidence, specifically whether it includes the confidence of a cyber system.<a href=\"#_ftn49\" name=\"_ftnref49\">[49]<\/a> Put another way, can the deception of a computer system be imputed to the adversary? To explain why it would be odd to think so, a discussion of some of the peculiar aspects of cyberspace is warranted.<\/p>\n<h1><a name=\"_Toc33188205\"><\/a><a name=\"_Toc33187697\"><\/a><a name=\"_Toc30531072\"><\/a>II.\u00a0 Aspects of Cyberspace<\/h1>\n<p>It is by now axiomatic that international law, including the law of armed conflict, applies to cyberspace.<a href=\"#_ftn50\" name=\"_ftnref50\">[50]<\/a> The DoD recognizes cyberspace as its own domain.<a href=\"#_ftn51\" name=\"_ftnref51\">[51]<\/a> And cyberspace is firmly anchored in the real world,<a href=\"#_ftn52\" name=\"_ftnref52\">[52]<\/a> the ambitions of information freedom enthusiasts<a href=\"#_ftn53\" name=\"_ftnref53\">[53]<\/a> notwithstanding. Every piece of information in cyberspace can be tied to a physical place\u2014that is, the server or computer on which it resides\u2014and is thus subject to the jurisdiction of one or more states.<a href=\"#_ftn54\" name=\"_ftnref54\">[54]<\/a> Nevertheless, cyberspace has two properties that frustrate the application of law-of-armed-conflict concepts in general, and perfidy in particular: cyberspace is (1) inherently artificial and (2) thoroughly civilian in terms of its architecture, means, and users. These two properties significantly complicate the analysis required to distinguish between ruses and perfidy.<\/p>\n<h2><a name=\"_Toc33188206\"><\/a><a name=\"_Toc33187698\"><\/a><a name=\"_Toc30531073\"><\/a>A.\u00a0 <em>Cyberspace Is Inherently Artificial<\/em><\/h2>\n<p>There is no such thing as a <em>natural<\/em> environment or background in cyberspace. It is \u201cthe realm of computer networks,\u201d<a href=\"#_ftn55\" name=\"_ftnref55\">[55]<\/a> which are by definition <em>artificial<\/em>. To be sure, it has a human element because people use computer networks. This is reflected in DoD\u2019s cyberspace layer model, which describes cyberspace \u201cin terms of three interrelated layers: physical network, logical network, and cyber-persona.\u201d<a href=\"#_ftn56\" name=\"_ftnref56\">[56]<\/a> Put simply, the physical and logical network layers are the hardware (e.g., a desktop computer) and the code transcending it (e.g., a website that \u201cexists on multiple servers in multiple locations\u201d).<a href=\"#_ftn57\" name=\"_ftnref57\">[57]<\/a> Cyber-personas \u201cconsist[] of network or [information technology] user accounts, whether human or automated, and their relationships to one another.\u201d<a href=\"#_ftn58\" name=\"_ftnref58\">[58]<\/a> For instance, a person\u2019s social media account is part of the cyber-persona layer; it thereby serves as a direct link between the person and the logical network layer.<a href=\"#_ftn59\" name=\"_ftnref59\">[59]<\/a> But, of course, cyber-personas are themselves artificial. For instance, \u201c[o]ne individual may create and maintain multiple cyber-personas . . . which may vary in the degree to which they are factually accurate.\u201d<a href=\"#_ftn60\" name=\"_ftnref60\">[60]<\/a><\/p>\n<h2><a name=\"_Toc33188207\"><\/a><a name=\"_Toc33187699\"><\/a><a name=\"_Toc30531074\"><\/a>B.\u00a0 <em>Cyberspace Is Generally Civilian<\/em><a name=\"_Toc535768476\"><\/a><a name=\"_Toc535768097\"><\/a><a name=\"_Toc535336492\"><\/a><\/h2>\n<p>Cyberspace is the culmination of a general trend in technology and warfare that has been progressively complicating the application of the principle of distinction: the merging of civilian and military technology and infrastructure. As Professor Michael Schmitt has observed: \u201c[I]t is becoming ever more difficult to determine when an object, and the facility that makes it, is military.\u201d<a href=\"#_ftn61\" name=\"_ftnref61\">[61]<\/a> Cyberspace epitomizes this problem because \u201c[t]he private sector owns and operates over ninety percent of all of the networks and infrastructure of cyberspace.\u201d<a href=\"#_ftn62\" name=\"_ftnref62\">[62]<\/a> Consequently, something like \u201c98 percent of U.S. government communications, including classified communications, travel over civilian-owned-and-operated networks.\u201d<a href=\"#_ftn63\" name=\"_ftnref63\">[63]<\/a> It is no surprise, then, that \u201cnearly all cyber operations occur on, in, or through civilian cyberspace infrastructure.\u201d<a href=\"#_ftn64\" name=\"_ftnref64\">[64]<\/a> <a name=\"_Toc33188208\"><\/a><a name=\"_Toc33187700\"><\/a><a name=\"_Toc30531075\"><\/a><\/p>\n<h2>C.\u00a0 <em>Camouflage in Cyberspace<\/em><\/h2>\n<p><a name=\"_Toc535768478\"><\/a><a name=\"_Toc535768099\"><\/a><a name=\"_Toc535336494\"><\/a>These two aspects of cyberspace complicate the perfidy analysis by blurring the line between perfidy and camouflage,<a name=\"_Toc535336495\"><\/a> which Article 37 of AP I lists as an example of a ruse.<a href=\"#_ftn65\" name=\"_ftnref65\">[65]<\/a> The purpose of camouflage is to blend into the background to avoid detection even under direct observation (as opposed to taking cover behind an object that obscures observation).<a href=\"#_ftn66\" name=\"_ftnref66\">[66]<\/a> In cyberspace, the only background to blend into is man-made and mostly civilian. This, by itself, is not necessarily a problem. The law of armed conflict does not prohibit blending into a man-made, civilian background, such as in a city.<a href=\"#_ftn67\" name=\"_ftnref67\">[67]<\/a> But \u201c[t]he feigning of civilian, non-combatant status\u201d is perfidious.<a href=\"#_ftn68\" name=\"_ftnref68\">[68]<\/a> Thus, \u201c[a] combatant . . . can use camouflage and make himself virtually invisible against a natural or man-made background, but he may not feign a civilian status and hide amongst a crowd.\u201d<a href=\"#_ftn69\" name=\"_ftnref69\">[69]<\/a><\/p>\n<p><a name=\"_Toc535768479\"><\/a><a name=\"_Toc535768100\"><\/a><a name=\"_Toc535336496\"><\/a>Cyberspace seldom allows for this distinction between blending into the background and hiding in a crowd, for in cyberspace\u2019s logical network layer, they are one and the same. Thus, \u201c[f]requently, concealment in cyberspace requires, in effect, hiding in plain \u2018technical\u2019 sight to evade identification and attribution.\u201d<a href=\"#_ftn70\" name=\"_ftnref70\">[70]<\/a> Hiding this way is essential for cyberspace operations to avoid detection by adversary personnel or programs.<a href=\"#_ftn71\" name=\"_ftnref71\">[71]<\/a> The stakes are especially high in the cyber context, because the adversary\u2019s detection of a particular cyberspace capability will not only render that capability useless against that adversary, but also allow the adversary to replicate the capability for its own uses.<a href=\"#_ftn72\" name=\"_ftnref72\">[72]<\/a> For example, Stuxneta cyberweapon jointly developed by the United States and Israel to attack Iranian nuclear centrifuges<a href=\"#_ftn73\" name=\"_ftnref73\">[73]<\/a>\u2014\u201cmay have taken the combined efforts of a team of experts almost a year to build,\u201d but it only took a few weeks after its discovery for a blogger to post an online how-to guide to building it.<a href=\"#_ftn74\" name=\"_ftnref74\">[74]<\/a> Shortly thereafter, variations of Stuxnet (such as the \u201cson of Stuxnet\u201d) began to appear \u201cin the wild.\u201d<a href=\"#_ftn75\" name=\"_ftnref75\">[75]<\/a><\/p>\n<p><a name=\"_Toc535768480\"><\/a><a name=\"_Toc535768101\"><\/a><a name=\"_Toc535336497\"><\/a>These operational realities virtually eliminate any obligation of passive distinction with respect to cyberspace operations. Passive distinction requires parties to \u201cdistinguish or separate [their] military forces and war-making activities from members of the civilian population to the maximum extent feasible.\u201d<a href=\"#_ftn76\" name=\"_ftnref76\">[76]<\/a> There is no extent to which a party can feasibly distinguish a cyberspace capability from surrounding, generally civilian, code.<a href=\"#_ftn77\" name=\"_ftnref77\">[77]<\/a> For example, owing to the U.S. government\u2019s near-total reliance on civilian infrastructure for its communications, that same infrastructure is the principal conduit through which the United States\u2019 adversaries may conduct cyber operations against it.<a href=\"#_ftn78\" name=\"_ftnref78\">[78]<\/a><\/p>\n<h1><a name=\"_Toc33188209\"><\/a><a name=\"_Toc33187701\"><\/a><a name=\"_Toc30531076\"><\/a>III.\u00a0 Back to Perfidy<\/h1>\n<p><a name=\"_Toc535768482\"><\/a><a name=\"_Toc535768103\"><\/a><a name=\"_Toc535336499\"><\/a>What, then, does this mean for the application of perfidy in cyberspace? In short, it means that, just like in the physical domains, the deception of a human being is a necessary\u2014and desirable\u2014component of perfidy. Expanding the concept of \u201cadversary\u201d to include the adversary\u2019s cyber systems and that of \u201cconfidence\u201d to include the perception of those systems would not only go beyond what is required by customary international law, but would also unduly restrict cyberspace capabilities. This Part first explains why the current definition of perfidy requires the deception of a human being. It then argues that perfidy should not be expanded to include inviting the confidence of a cyber system.<\/p>\n<h2><a name=\"_Toc33188210\"><\/a><a name=\"_Toc33187702\"><\/a><a name=\"_Toc30531077\"><\/a>A.\u00a0 <em>Human Confidence Is Required to Commit Perfidy<\/em><\/h2>\n<p><a name=\"_Toc535768484\"><\/a><a name=\"_Toc535768105\"><\/a><a name=\"_Toc535336501\"><\/a>Perfidy is premised on the deception of a human for two reasons. First, the notion of an adversary implies humanity. Second, confidence\u2014that is, trust\u2014is uniquely human. The reasoning here is essentially textual, and the relevant text is that of Article 37 of AP I.<\/p>\n<p><a name=\"_Toc535768485\"><\/a><a name=\"_Toc535768106\"><\/a><a name=\"_Toc535336502\"><\/a>As discussed in the <em>Tallinn Manual 2.0<\/em>, the word \u201cadversary\u201d in Article 37 is general enough to include multiple people.<a href=\"#_ftn79\" name=\"_ftnref79\">[79]<\/a> Depending on the context in which it is used, it can refer to a single soldier, a unit, an entire fighting force, its commander-in-chief, or anything in between.<a href=\"#_ftn80\" name=\"_ftnref80\">[80]<\/a> But it does not refer to things, such as tanks, planes, rifles, computers, and, yes, cyber systems. An adversary is a party to a conflict, or, typically, a member or members of a party\u2019s armed forces.<a href=\"#_ftn81\" name=\"_ftnref81\">[81]<\/a><\/p>\n<p><a name=\"_Toc535768486\"><\/a><a name=\"_Toc535768107\"><\/a><a name=\"_Toc535336503\"><\/a>More fundamentally, wars are fought by people, not things. The law of armed conflict reflects this principle by distinguishing between persons and objects.<a href=\"#_ftn82\" name=\"_ftnref82\">[82]<\/a> Admittedly, the term \u201cobject\u201d does not apply neatly to cyber systems because, on the majority view, objects must be \u201cvisible and tangible.\u201d<a href=\"#_ftn83\" name=\"_ftnref83\">[83]<\/a> Thus, data, including software, are not objects under the law of armed conflict.<a href=\"#_ftn84\" name=\"_ftnref84\">[84]<\/a> A minority of the International Group of Experts for the <em>Tallinn Manual 2.0 <\/em>believed that sufficiently important data should be considered objects because it would be absurd to allow the deletion of data with impunity, no matter the severity of the consequences.<a href=\"#_ftn85\" name=\"_ftnref85\">[85]<\/a><\/p>\n<p><a name=\"_Toc535768487\"><\/a><a name=\"_Toc535768108\"><\/a><a name=\"_Toc535336504\"><\/a>Regardless, under either view, a cyber system can only be an object. The only question is how much of the system is considered an object. While the rule against perfidy itself does not use the word \u201cperson,\u201d it refers to the adversary in personal terms by prohibiting the adversary\u2019s killing, injury, or capture by resort to perfidy.<a href=\"#_ftn86\" name=\"_ftnref86\">[86]<\/a> Objects cannot be killed or injured, and when taken, they are \u201cseized,\u201d not captured.<a href=\"#_ftn87\" name=\"_ftnref87\">[87]<\/a><\/p>\n<p><a name=\"_Toc535768488\"><\/a><a name=\"_Toc535768109\"><\/a><a name=\"_Toc535336505\"><\/a>Where enforced, the rule against perfidy reflects this understanding. The United States has made perfidy triable by military commission.<a href=\"#_ftn88\" name=\"_ftnref88\">[88]<\/a> The rule prohibits \u201cinviting the confidence or belief of one or more <em>persons<\/em>\u201d concerning protection under the law of armed conflict and using \u201cthat confidence or belief in killing, injuring, or capturing such <em>person or persons<\/em>.\u201d<a href=\"#_ftn89\" name=\"_ftnref89\">[89]<\/a> Similarly, the Elements of Crimes under the Rome Statute of the International Criminal Court require \u201c[t]he perpetrator [to have] invited the confidence or belief of one or more <em>persons<\/em>.\u201d<a href=\"#_ftn90\" name=\"_ftnref90\">[90]<\/a><\/p>\n<p><a name=\"_Toc535768489\"><\/a><a name=\"_Toc535768110\"><\/a><a name=\"_Toc535336506\"><\/a>The current definition of perfidy also requires the deception of a human by specifying that the deception must \u201cinvit[e] the confidence of an adversary to lead him to believe\u201d that he or someone else is entitled to legal protection.<a href=\"#_ftn91\" name=\"_ftnref91\">[91]<\/a> Computers do not have beliefs. They store and process information. They do not make judgments concerning legal protection. Even if they did, current law would not recognize their decisions on protection under the law of armed conflict. That responsibility would remain with the cognizant commander.<a href=\"#_ftn92\" name=\"_ftnref92\">[92]<\/a> Thus, the minority within the International Group of Experts for the <em>Tallinn Manual 2.0 <\/em>correctly took \u201cthe position that the notion of confidence presupposes human involvement.\u201d<a href=\"#_ftn93\" name=\"_ftnref93\">[93]<\/a><\/p>\n<h2><a name=\"_Toc33188211\"><\/a><a name=\"_Toc33187703\"><\/a><a name=\"_Toc30531078\"><\/a>B.\u00a0 \u00a0<em>Why Human Confidence Should Be Required<\/em><\/h2>\n<p><a name=\"_Toc535768491\"><\/a><a name=\"_Toc535768112\"><\/a><a name=\"_Toc535336508\"><\/a>If the current definition of perfidy does not include inviting the confidence of a cyber system, the natural follow-up question is whether it should. There have been, after all, calls for new, overarching international agreements on cyberspace (a \u201cDigital Geneva Convention,\u201d for instance).<a href=\"#_ftn94\" name=\"_ftnref94\">[94]<\/a> Nothing has come of these calls thus far,<a href=\"#_ftn95\" name=\"_ftnref95\">[95]<\/a> but customary international law can change even without formal agreements.<a href=\"#_ftn96\" name=\"_ftnref96\">[96]<\/a> So, if a critical mass of states followed the majority view of perfidy expressed in the <em>Tallinn Manual 2.0<\/em> out of a sense of legal obligation, it would become the law.<a href=\"#_ftn97\" name=\"_ftnref97\">[97]<\/a> Should they? No, for four reasons. First, the cyber systems themselves do not need the protection of the rule against perfidy. Second, existing prohibitions against unlawful deception adequately regulate the use of cyberspace capabilities. Third, such a rule would be both theoretically unsound and impractical to apply. Finally, deceiving a cyber system does not implicate the same interests that the rule against perfidy is meant to protect.<\/p>\n<p><a name=\"_Toc535768492\"><\/a><a name=\"_Toc535768113\"><\/a><a name=\"_Toc535336509\"><\/a>First, as discussed above, since a cyber system is, at most, an object, the law of armed conflict protects the system based on its \u201cnature, location, purpose or use.\u201d<a href=\"#_ftn98\" name=\"_ftnref98\">[98]<\/a> Cyber systems thus do not require the protection of the rule against perfidy as they are adequately protected by the rules concerning objects. Of course, one might argue that perfidy and the rule against it are more concerned with protecting people than things.<\/p>\n<p>The point, then, of expanding the definition of perfidy to include inviting the confidence of a cyber system would be to protect certain persons, rather than the cyber systems themselves. This argument fails because the rules concerning objects are already structured to incidentally protect people who must not be made the object of attack. For example, combatants are generally required to respect and protect the cyber systems of medical units, thereby incidentally protecting medical personnel and their patients (who are presumably <em>hors de combat<\/em>).<a href=\"#_ftn99\" name=\"_ftnref99\">[99]<\/a> Any cyber system that is not a military objective would similarly (though not as strictly) be protected from attack.<a href=\"#_ftn100\" name=\"_ftnref100\">[100]<\/a> Behind these rules, the proportionality principle protects civilians and other protected persons by prohibiting attacks expected to produce excessive collateral damage.<a href=\"#_ftn101\" name=\"_ftnref101\">[101]<\/a><\/p>\n<p><a name=\"_Toc535768493\"><\/a><a name=\"_Toc535768114\"><\/a><a name=\"_Toc535336510\"><\/a>Second, existing rules that distinguish between lawful and unlawful deception, including the rule against perfidy in its current form, already regulate the use of cyberspace capabilities to deceive humans. The <em>Tallinn Manual 2.0<\/em>\u2019s example of emailing the adversary falsely claiming that a military unit will surrender is illustrative.<a href=\"#_ftn102\" name=\"_ftnref102\">[102]<\/a> Betraying the adversary\u2019s confidence that the unit will surrender by attacking violates the rule against perfidy. Had no person been deceived by the email, the adversary would not have sent the unit that got ambushed. It does not matter whether the cyber system itself was deceived.<\/p>\n<p><a name=\"_Toc535768494\"><\/a><a name=\"_Toc535768115\"><\/a><a name=\"_Toc535336511\"><\/a>Other rules of unlawful deception also apply, such as the improper use of recognized emblems.<a href=\"#_ftn103\" name=\"_ftnref103\">[103]<\/a> To be sure, they do not translate neatly to the cyber context. Consider, for example, the question whether the protected indicator itself must be used (e.g., the red cross) or if an email purporting to originate from someone with an \u201c@icrc.org\u201d<a href=\"#_ftn104\" name=\"_ftnref104\">[104]<\/a> email address is sufficient to violate the law of armed conflict.<a href=\"#_ftn105\" name=\"_ftnref105\">[105]<\/a> This question split the <em>Tallinn Manual 2.0<\/em>\u2019s International Group of Experts.<a href=\"#_ftn106\" name=\"_ftnref106\">[106]<\/a> However, expanding the definition of perfidy to include inviting the confidence of a cyber system would not solve this problem because, as discussed below, it is not clear what it means to invite the confidence of a cyber system.<a href=\"#_ftn107\" name=\"_ftnref107\">[107]<\/a> Instead, the more sensible reform would be to expand the definition of recognized emblems to include \u201capparently authoritative indication[s]\u201d of the protected status each emblem is intended to represent, such as the @icrc.org domain.<a href=\"#_ftn108\" name=\"_ftnref108\">[108]<\/a><\/p>\n<p><a name=\"_Toc535768495\"><\/a><a name=\"_Toc535768116\"><\/a><a name=\"_Toc535336512\"><\/a>Perfidy and the rule against it are an essential part of the legal framework regulating deception, and means and methods generally, in armed conflict. That said, perfidy should not be expected to play a larger role in cyberspace than it does in the physical domains. Indeed, because of cyberspace\u2019s entirely artificial and principally civilian character, perfidy will probably play a much smaller role within it vis-\u00e0-vis the principles of distinction and proportionality. A target\u2019s legal susceptibility to attack (e.g., by virtue of membership in the armed forces) and proportionality considerations are more important in regulating cyber means and methods than the rule against perfidy is.<\/p>\n<p><a name=\"_Toc535768496\"><\/a><a name=\"_Toc535768117\"><\/a><a name=\"_Toc535336513\"><\/a>Third, expanding the definition of perfidy to include inviting the confidence of cyber systems would be unwise both theoretically and practically. Theoretically, what exactly would it mean for a cyber system to extend its confidence based on some piece of code (e.g., malware) purporting to have protected status? Take the pacemaker scenario from the beginning of this article: is it accurate to say that a pacemaker\u2019s software accepted malware because it believed the malware had civilian, non-combatant status or was otherwise protected under the law of armed conflict? No, because the software simply did what it was programmed to do\u2014it did not actually have a choice. That is, its response to the malware was determined by its programming. The malware fulfilled a certain set of conditions the pacemaker\u2019s software was programmed to look for, and, on seeing those conditions fulfilled, the pacemaker\u2019s software mechanistically accepted the malware.<\/p>\n<p>This theoretical problem\u2014that there is no such thing as a cyber system\u2019s confidence\u2014would give rise to practical difficulties. For example, a change in the definition of perfidy might incentivize designers to program their software to describe its actions in legal terms, such as by having log files say things like \u201cUpdate accepted due to civilian, non-combatant status.\u201d But that would do nothing to change the nature of the processes governing the cyber system\u2019s behavior. By its nature, a cyber system does not have confidence, so the question whether a cyber system\u2019s confidence has been invited cannot, in fact, be answered.<\/p>\n<p><a name=\"_Toc535768497\"><\/a><a name=\"_Toc535768118\"><\/a><a name=\"_Toc535336514\"><\/a>In addition to the fundamental problem that a cyber system does not act or refrain from acting based on a piece of code\u2019s protected status, there is the question of what exactly civilian, non-combatant status looks like in cyberspace. The drafting of Article 37 of AP I foreshadowed this problem. Originally, \u201c[t]he [International Committee of the Red Cross\u2019s] draft listed \u2018the disguising of combatants in civilian clothing\u2019\u201d as an example of perfidy. <a href=\"#_ftn109\" name=\"_ftnref109\">[109]<\/a> It was changed to \u201cfeigning of civilian, non-combatant status\u201d<a href=\"#_ftn110\" name=\"_ftnref110\">[110]<\/a> because specifying disguise in civilian clothing as perfidy \u201cmight be misused to punish some combatants who would be entitled to prisoner of war status.\u201d<a href=\"#_ftn111\" name=\"_ftnref111\">[111]<\/a> The point was to prohibit combatants from fooling their opponents into believing they are civilians, not to prohibit the use of civilian clothing as such. This distinction does not translate well to cyberspace. When all of cyberspace is manmade, and virtually all of it is civilian or civilian-made, what is the difference between malware merely wearing civilian clothing and malware feigning civilian status?<\/p>\n<p><a name=\"_Toc535768498\"><\/a><a name=\"_Toc535768119\"><\/a><a name=\"_Toc535336515\"><\/a>There is no meaningful way to make such a distinction from the perspective of a cyber system without taking most cyberspace capabilities off the table. What, after all, does it mean for a cyber system to perceive a piece of code as having civilian status rather than fail to identify its true nature because it is camouflaged? To be effective, \u201chidden malware . . . mimics the innocuous, usually civilian, objects or lines of code that surround it.\u201d<a href=\"#_ftn112\" name=\"_ftnref112\">[112]<\/a> The importance of cyberspace capabilities to the future of warfare is widely acknowledged. The world\u2019s foremost military powers have incorporated cyberspace into their plans, and invested in cyberspace capabilities accordingly. At the same time, the U.S. military is dependent on civilian cyber infrastructure.<a href=\"#_ftn113\" name=\"_ftnref113\">[113]<\/a> Together, this means that a rule prohibiting or substantially limiting the camouflage of cyberspace capabilities against a civilian background would simply not be followed.<\/p>\n<p><a name=\"_Toc535336516\"><\/a><a name=\"_Toc535768499\"><\/a><a name=\"_Toc535768120\"><\/a>Finally, it must be asked what interests an expanded definition of perfidy would vindicate. It would serve neither of the rule against perfidy\u2019s purposes: maintaining \u201cthe basis for restoration to peace\u201d<a href=\"#_ftn114\" name=\"_ftnref114\">[114]<\/a> and protecting the classes of persons who are not subject to attack under the law of armed conflict.<a href=\"#_ftn115\" name=\"_ftnref115\">[115]<\/a> <a name=\"_Toc535768500\"><\/a><a name=\"_Toc535768121\"><\/a><a name=\"_Toc535336517\"><\/a>An expanded definition of perfidy would not preserve the potential for trust <em>between adversaries<\/em>. It would instead enhance the degree of trust adversaries can have (or, probably more accurately, believe they can have) <em>in their cyber systems<\/em>. This is not a worthy goal for the law of armed conflict.<\/p>\n<p>In an analogous context, the law offers no protection. The use of \u201cenemy codes, passwords, and countersigns\u201d is permissible,<a href=\"#_ftn116\" name=\"_ftnref116\">[116]<\/a> although it is generally unlawful to use \u201cenemy flags, insignia, and military uniforms\u201d in combat.<a href=\"#_ftn117\" name=\"_ftnref117\">[117]<\/a> The two forms of deception deserve different treatment because \u201cmilitary forces are expected to take measures to guard against the use of their codes, passwords, and countersigns by the enemy.\u201d<a href=\"#_ftn118\" name=\"_ftnref118\">[118]<\/a> The same cannot be said of flags, insignia, and uniforms because they, like recognized emblems in general, cannot perform their function when concealed or constantly changed.<\/p>\n<p>The law of armed conflict is not intended to protect the adversary or the means by which it wages war.<a href=\"#_ftn119\" name=\"_ftnref119\">[119]<\/a> It is not, in other words, a shield behind which military forces are supposedly able to rest assured that their systems are uncompromised. So, just as the law of armed conflict generally offers no protection for codes, passwords, or countersigns, it should not generally protect military cyber systems. This is what the concept of perfidy would tend to do if expanded to include the confidence of cyber systems. Military forces should be expected to take measures to guard the integrity of their cyber systems. By retaining perfidy\u2019s requirement that a person be deceived, adversaries could trust the reliability of communications that invite their confidence about legal protection while still having to exercise diligence regarding what their cyber systems are doing behind the scenes.<\/p>\n<h1><a name=\"_Toc33188212\"><\/a><a name=\"_Toc33187704\"><\/a><a name=\"_Toc30531079\"><\/a>IV.\u00a0 Some Counterarguments<\/h1>\n<p><a name=\"_Toc535768502\"><\/a><a name=\"_Toc535768123\"><\/a><a name=\"_Toc535336519\"><\/a>There are three important counterarguments to the position outlined in this article. The first is that a strict reading of the rule against perfidy draws an arbitrary distinction between functionally equivalent results. The second is that an expanded definition of perfidy can be read into Article 23 of the Hague Regulations of 1907. Finally, there is the argument that not expanding the definition of perfidy will discourage the outsourcing of distinction decisions to systems that may, in the future, be better than people at making those decisions.<\/p>\n<h2><a name=\"_Toc33188213\"><\/a><a name=\"_Toc33187705\"><\/a><a name=\"_Toc30531080\"><\/a>A.\u00a0 <em>Functional Equivalence<\/em><\/h2>\n<p>The strongest counterargument is the functional equivalence between deceiving people to harm them and tricking a cyber system to harm them in the same way. Take the scenario from the beginning of this article\u2014where the officials\u2019 pacemakers automatically accept the malware disguised as updates (call this scenario <em>A<\/em>)\u2014and suppose instead that the model of pacemakers in question requires owners to affirmatively accept updates through a pop-up on their smartphones (call this scenario <em>B<\/em>). Why does it make sense for the malware to be considered perfidy in scenario <em>B<\/em> but not in scenario <em>A<\/em>? Suppose further that owners of the pacemaker can determine whether they must affirmatively accept updates, but the malware can change the settings to accept updates automatically (call this scenario <em>C<\/em>). In this case, a human has not been deceived because the otherwise perfidious means of cyber-attack has deprived the person of the opportunity to be\u2014or avoid being\u2014deceived.<\/p>\n<p>Under all three sets of facts, the malware is functionally equivalent: it is masquerading as an authentic firmware update from a civilian manufacturer in order to harm or kill the pacemaker\u2019s host. The consequences of the malware\u2019s success are the same. Yet, on the view of perfidy advanced by this article, the malware\u2019s sender has not violated the rule against perfidy in scenario <em>A<\/em> or <em>C<\/em>. Only in scenario <em>B<\/em>, when an affirmative human action was required to accept the malware, has the element of inviting the adversary\u2019s confidence been fulfilled. It seems arbitrary to deem legal an action that harms or kills people without their ever being aware of the means of their injury or demise, but to call the exact same action illegal if it happens to require the victims to be fooled about the source of the attack.<\/p>\n<p>The simple, but unsatisfying, response to that objection is that the law often draws arbitrary distinctions. Sometimes this is because of conflicting values or principles in the drafting process. Other times, legal distinctions do not seem arbitrary until new circumstances arise. Or, as is the case with the rule against perfidy, both of these things are true. The rule does not prohibit perfidy per se, thereby leaving open the possibility of permissible perfidy.<a href=\"#_ftn120\" name=\"_ftnref120\">[120]<\/a> And the internet did not exist when the modern rule was codified in AP I. Consequently, it would be surprising if Article 37 translated perfectly to cyberspace.<\/p>\n<p>This article goes one step further than simply pointing out that perfidy in its current form does not apply to scenario <em>A<\/em> or <em>C<\/em>: it argues that it should not apply. This is because the gravamen of the offense is unlawful deception, not injury or death.<a href=\"#_ftn121\" name=\"_ftnref121\">[121]<\/a> It is the targets\u2019 combatant status that renders them subject to injury or death. Absent deception, the death or injury of a combatant does not reduce the credibility of inter-personal communication. Thus, prohibiting the conduct described in scenarios <em>A<\/em> and <em>C<\/em> does not advance the purposes of the rule against perfidy.<\/p>\n<h2><a name=\"_Toc33188214\"><\/a><a name=\"_Toc33187706\"><\/a><a name=\"_Toc30531081\"><\/a>B.\u00a0 <em>What About the Hague Regulations of 1907?<\/em><\/h2>\n<p>Recall that Article 37 of AP I did not displace the already-existing prohibition codified in Article 23 of the Hague Regulations of 1907,<a href=\"#_ftn122\" name=\"_ftnref122\">[122]<\/a> which prohibits \u201ckill[ing] or wound[ing] treacherously individuals belonging to the hostile nation or army.\u201d<a href=\"#_ftn123\" name=\"_ftnref123\">[123]<\/a> The word \u201ctreacherously\u201d is sufficiently broad to encompass the deception of cyber systems. The majority view of the <em>Tallinn Manual 2.0<\/em>\u2019s International Group of Experts could, therefore, be tied to an already-existing legal provision.<\/p>\n<p>The problem with this argument is that while the word \u201ctreacherously\u201d is indeed broad, it is not specific enough to be legally determinate. Legal reasoning alone cannot answer the question whether deceiving a cyber system can be treacherous. Reference to norms and customs is necessary to determine the content of the word. This lack of specificity is the problem that led to the creation of the more precise formula set out in Article 37 of AP I.<a href=\"#_ftn124\" name=\"_ftnref124\">[124]<\/a> Moreover, states have not employed cyberspace capabilities in armed conflict enough to have formed norms and customs<a href=\"#_ftn125\" name=\"_ftnref125\">[125]<\/a> that supply widely accepted meaning to the word \u201ctreachery\u201d in the cyber context. Consequently, a debate about the legal definition of \u201ctreachery\u201d would collapse into a conversation about whether it <em>should <\/em>include the deception of cyber systems.<\/p>\n<h2><a name=\"_Toc33188215\"><\/a><a name=\"_Toc33187707\"><\/a><a name=\"_Toc30531082\"><\/a>C.\u00a0 <em>Outsourcing Distinction Decisions<\/em><\/h2>\n<p>The counterargument that is the most speculative, but perhaps most consequential in the long run, is that a human-centric definition of perfidy will impede the development of technologies capable of making distinction decisions better than people can. It should be expected that artificial intelligence (AI) will be developed to the point of being able to distinguish between lawful and unlawful targets (however that is defined in the AI\u2019s code).<a href=\"#_ftn126\" name=\"_ftnref126\">[126]<\/a> Professor Schmitt gives the example of \u201can autonomous anti-personnel weapon system designed for employment in urban areas\u201d with \u201csufficient sensor and artificial intelligence capability to distinguish [between civilians and combatants].\u201d<a href=\"#_ftn127\" name=\"_ftnref127\">[127]<\/a><\/p>\n<p>There are a number of reasons why such a system might be better at making distinction decisions. For instance, it would presumably not be subject to factors (like fatigue and fear) that can adversely affect human judgment. The employment of such a system would also reduce casualties for the side employing it.<a href=\"#_ftn128\" name=\"_ftnref128\">[128]<\/a> But if combatants are permitted to exploit the programming designed to make a system comply with the principle of distinction\u2014for example, by affixing to their clothing \u201cadversarial stickers\u201d designed to be interpreted by the autonomous weapon as a red cross but imperceptible to humans<a href=\"#_ftn129\" name=\"_ftnref129\">[129]<\/a>\u2014parties may refrain from using such systems, despite their superiority in making distinction decisions. Or worse, parties may relax the standards for distinction in the systems\u2019 programming.<\/p>\n<p>A full discussion of the principle of distinction as it relates to autonomous weapon systems is outside the scope of this article. Suffice it to say that modifying the definition of perfidy is not the most effective means of accommodating the development of such systems within the law of armed conflict. The rule against perfidy is a relatively flexible catch-all, but human confidence is essential to its role in filling the gap between ruses and other rules of unlawful deception. It is those other rules that should be modified, or supplemented, in order to accommodate the development of distinction-capable technologies. To use the \u201cadversarial sticker\u201d example, the rule against improper use of recognized emblems could be expanded to include images intended to appear as such an emblem to a machine.<\/p>\n<h1><a name=\"_Toc33188216\"><\/a><a name=\"_Toc33187708\"><\/a><a name=\"_Toc30531083\"><\/a>Conclusion<\/h1>\n<p>Perfidy requires human confidence, and should continue to do so. The broader view taken by a majority of the<em> Tallinn Manual 2.0<\/em>\u2019s International Group of Experts neither is supported by the text of Article 37 of AP I, nor would work to preserve the possibility of trust between adversaries. Human confidence is central to that purpose.<\/p>\n<p>Cyber systems are not, at least for the time being, capable of confidence in the sense that term is used in the definition of perfidy. Accordingly, expanding perfidy to include the confidence of a cyber system would entail legal analysis about something that does not exist. In addition, the cyber domain\u2019s inherently artificial and principally civilian character would tend to make compliance with such a rule impossible. Only by retaining the requirement for human confidence may perfidy continue to perform its proper function in cyberspace.<\/p>\n<p><strong>Recommended Citation<\/strong><br \/>\nSean K. Price, <em>Perfidy in Cyberspace: The Requirement for Human Confidence<\/em>, Harv. Nat&#8217;l Sec. J. Online (Feb. 21, 2020, <a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/02\/Price_Perfidy-in-Cyberspace.pdf\">https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2020\/02\/Price_Perfidy-in-Cyberspace.pdf<\/a>.<\/p>\n<hr \/>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[*]<\/a> Judge Advocate, United States Marine Corps. J.D., University of Chicago Law School, 2011; B.A., Old Dominion University, 2008. The author is presently assigned as Student, 67th Judge Advocate Officer Graduate Course, The Judge Advocate General\u2019s School, United States Army, Charlottesville, Virginia. This article was submitted in partial completion of the Master of Laws requirements of the 67th Judge Advocate Officer Graduate Course.<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a> Modern pacemakers are, indeed, connected to the cloud. <em>See<\/em> Neta Alexander, <em>My Pacemaker Is Tracking Me from Inside My Body<\/em>, The Atlantic (Jan. 27, 2018), <a href=\"https:\/\/www.theatlantic.com\/technology\/archive\/2018\/01\/my-pacemaker-is-tracking-me-from-inside-my-body\/551681\/\">https:\/\/www.theatlantic.com\/technology\/archive\/2018\/01\/my-pacemaker-is-tracking-me-from-inside-my-body\/551681\/<\/a> [perma.cc\/M4C9-4DW6] (\u201c[E]very new pacemaker implanted in the United States is cloud-connected.\u201d).<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> Though they are not the same, both artificial pacemakers and ICDs are implantable medical devices used to treat heart conditions. Because the difference between them is not relevant to the topic of this article, both artificial pacemakers and ICDs will henceforth be referred to simply as \u201cpacemakers.\u201d<\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> For a discussion of how a \u201cmaliciously configured\u201d pacemaker could be made to harm a patient, see Daniel Halperin et al., <em>Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses<\/em>, <em>in <\/em>Proceedings of the 2008 IEEE Symposium on Security and Privacy 129, 131 (2008).<\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> While it is theoretically possible for an individual to serve on active duty with a pacemaker, the more likely victims of such an attack would be senior civilian leaders.<\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> This scenario is based on an example of cyber perfidy given in Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations 493\u201394 (Michael N. Schmitt &amp; Liis Vihul eds. 2017) [hereinafter Tallinn Manual 2.0].<\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\">[6]<\/a> Office of Gen. Counsel, Dep\u2019t of Def., Department of Defense Law of War Manual \u00a7 5.7.4 (2016) [hereinafter Law of War Manual], <a href=\"https:\/\/dod.defense.gov\/Portals\/1\/Documents\/pubs\/DoD%20Law%20of%20War%20Manual%20-%20June%202015%20Updated%20Dec%202016.pdf\">https:\/\/dod.defense.gov\/Portals\/1\/Documents\/pubs\/DoD%20Law%20of%20War%20Manual%20-%20June%202015%20Updated%20Dec%202016.pdf<\/a> [perma.cc\/TBV2-HFYN] (stating that leaders, including certain civilian officials, are subject to attack).<\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\">[7]<\/a> The U.S. federal government has identified pacemaker cybersecurity vulnerabilities. For example, on August 29, 2017, the Food and Drug Administration issued a recall for certain pacemakers for a firmware update to address cybersecurity vulnerabilities. <em>See<\/em> U.S. Food &amp; Drug Admin., Firmware Update to Address Cybersecurity Vulnerabilities Identified in Abbot\u2019s (Formerly St. Jude Medical\u2019s) Implantable Cardiac Pacemakers, <a href=\"https:\/\/www.fda.gov\/medical-devices\/safety-communications\/firmware-update-address-cybersecurity-vulnerabilities-identified-abbotts-formerly-st-jude-medicals\">https:\/\/www.fda.gov\/medical-devices\/safety-communications\/firmware-update-address-cybersecurity-vulnerabilities-identified-abbotts-formerly-st-jude-medicals<\/a> [perma.cc\/E6SP-5XZW].<\/p>\n<p><a href=\"#_ftnref8\" name=\"_ftn8\">[8]<\/a> <em>See<\/em> Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I) art. 37(1), June 8, 1977, 1125 U.N.T.S. 3 [hereinafter AP I].<\/p>\n<p><a href=\"#_ftnref9\" name=\"_ftn9\">[9]<\/a> Though the <em>Manual<\/em> does not represent the official views of any state or organization, Michael N. Schmitt, <em>Introduction <\/em>to Tallinn Manual 2.0, <em>supra <\/em>note 5, at 1\u20132, it is nevertheless the most influential statement (at least in the West) of how international law currently applies to cyber warfare, <em>see <\/em>Michael J. Adams, <em>A Warning About <\/em>Tallinn 2.0 \u2026<em> Whatever It Says<\/em>, Lawfare (Jan. 4, 2017, 8:30 AM), <a href=\"https:\/\/www.lawfareblog.com\/warning-about-tallinn-20-%E2%80%A6-whatever-it-says\">https:\/\/www.lawfareblog.com\/warning-about-tallinn-20-%E2%80%A6-whatever-it-says<\/a> [perma.cc\/2ZKX-XW9R] (\u201cIt is routinely referenced and relied upon by civilian and military practitioners across the globe . . . .\u201d).<\/p>\n<p><a href=\"#_ftnref10\" name=\"_ftn10\">[10]<\/a> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 493\u201394.<\/p>\n<p><a href=\"#_ftnref11\" name=\"_ftn11\">[11]<\/a> <em>See, e.g.<\/em>, P.W. Singer &amp; Allan Friedman, Cybersecurity and Cyberwar 127 (2014) (discussing Israel\u2019s hacking of Syrian air defense network in advance of a 2007 airstrike).<\/p>\n<p><a href=\"#_ftnref12\" name=\"_ftn12\">[12]<\/a> U.S. Dep\u2019t of Def., Summary: Department of Defense Cyber Strategy 1 (2018) (emphasis omitted).<\/p>\n<p><a href=\"#_ftnref13\" name=\"_ftn13\">[13]<\/a> <em>Id.<\/em> (emphasis omitted).<\/p>\n<p><a href=\"#_ftnref14\" name=\"_ftn14\">[14]<\/a> <em>See<\/em> Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.22.1.1.<\/p>\n<p><a href=\"#_ftnref15\" name=\"_ftn15\">[15]<\/a> <em>Id.<\/em> \u00a7 5.22.1.<\/p>\n<p><a href=\"#_ftnref16\" name=\"_ftn16\">[16]<\/a> <em>See<\/em> Int\u2019l Comm. of the Red Cross, Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949 \u00b6 1483, at 430 (Yves Sandoz et al. eds. 1987) [hereinafter AP I Commentary] (\u201cLiterally speaking, perfidy means the breaking of faith . . . .\u201d); Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.22.1.1.<\/p>\n<p><a href=\"#_ftnref17\" name=\"_ftn17\">[17]<\/a> Michael Bothe et al., New Rules for Victims of Armed Conflicts: Commentary on the Two 1977 Protocols Additional to the Geneva Conventions of 1949, at 234\u201335 (2d ed. 2013).<\/p>\n<p><a href=\"#_ftnref18\" name=\"_ftn18\">[18]<\/a> <em>See<\/em> <em>id.<\/em> at 233; Sean Watts, <em>Law-of-War Perfidy<\/em>, 219 Mil. L. Rev. 106, 171 (2014).<\/p>\n<p><a href=\"#_ftnref19\" name=\"_ftn19\">[19]<\/a> Adjutant-Gen.\u2019s Office, U.S. Dep\u2019t of War, Gen. Order No. 100, Instructions for the Government of Armies of the United States in the Field art. 101 (1863), <em>reprinted<\/em> <em>in<\/em> 2 The Miscellaneous Writings of Francis Lieber 245, 265 (1881).<\/p>\n<p><a href=\"#_ftnref20\" name=\"_ftn20\">[20]<\/a> Project of an International Declaration Concerning the Laws and Customs of War art. 13(b) (1874), <em>reprinted in<\/em> The Laws of Armed Conflicts 23, 24 (Dietrich Schindler &amp; Jiri Toman eds., 4th ed. 2004).<\/p>\n<p><a href=\"#_ftnref21\" name=\"_ftn21\">[21]<\/a> Inst. of Int\u2019l Law, The Laws of War on Land art. 4 (1880), <em>reprinted in<\/em> The Laws of Armed Conflicts, <em>supra<\/em> note 20, at 29, 31.<\/p>\n<p><a href=\"#_ftnref22\" name=\"_ftn22\">[22]<\/a> For an in-depth discussion of these provisions, see Watts, <em>supra <\/em>note 18, at 125\u201334.<\/p>\n<p><a href=\"#_ftnref23\" name=\"_ftn23\">[23]<\/a> Convention Respecting the Laws and Customs of War on Land, Annex art. 23(b), Oct. 18, 1907, 36 Stat. 2277 [hereinafter Hague Convention IV].<\/p>\n<p><a href=\"#_ftnref24\" name=\"_ftn24\">[24]<\/a> AP I, <em>supra<\/em> note 8, art. 37.<\/p>\n<p><a href=\"#_ftnref25\" name=\"_ftn25\">[25]<\/a> <em>See<\/em> 1 Jean-Marie Henckaerts &amp; Louise Doswald-Beck, Int\u2019l Comm. of the Red Cross, Customary International Humanitarian Law 225 (2005) (\u201c[I]t can be argued that killing, injuring or capturing by resort to perfidy is illegal under customary international law . . . .\u201d). The United States, however, does not recognize \u201ccapture\u201d as one of the acts prohibited by resort to perfidy. Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.22.2.1. This was also the view of a majority of the International Group of Experts who contributed to the <em>Tallinn Manual 2.0<\/em>. <em>See<\/em> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 492.<\/p>\n<p><a href=\"#_ftnref26\" name=\"_ftn26\">[26]<\/a> AP I Commentary, <em>supra<\/em> note 16, \u00b6 1488, at 431; Watts, <em>supra <\/em>note 18, at 151. The implications of this relationship for perfidy in the cyber context are discussed <em>infra<\/em> Part V.B.<\/p>\n<p><a href=\"#_ftnref27\" name=\"_ftn27\">[27]<\/a> Bothe et al., <em>supra<\/em> note 17, at 234\u201335. A strict reading of the prohibition requires the attack to be successful because the text of Article 37 of AP I does not explicitly cover attempts. But commentary by the International Committee of the Red Cross (ICRC) states that \u201cthe attempted or unsuccessful act also falls under the scope of [the] prohibition.\u201d AP I Commentary, <em>supra<\/em> note 16, \u00b6 1493, at 433. This question split the International Group of Experts who contributed to the <em>Tallinn Manual 2.0<\/em>. <em>See<\/em> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 493.<\/p>\n<p><a href=\"#_ftnref28\" name=\"_ftn28\">[28]<\/a> <em>See<\/em> Law of War Manual, <em>supra<\/em> note 6 \u00a7 5.22.3.<\/p>\n<p><a href=\"#_ftnref29\" name=\"_ftn29\">[29]<\/a> Hague Convention IV, <em>supra<\/em> note 23, Annex art. 23(f); AP I, <em>supra<\/em> note 8, art. 38(1); <em>see also<\/em> Law of War Manual, <em>supra<\/em> note 6, \u00a7 12.4.2.1.<\/p>\n<p><a href=\"#_ftnref30\" name=\"_ftn30\">[30]<\/a> AP I Commentary, <em>supra<\/em> note 16, \u00b6 1532, at 448.<\/p>\n<p><a href=\"#_ftnref31\" name=\"_ftn31\">[31]<\/a> <em>See <\/em>Bothe et al., <em>supra<\/em> note 17, at 235 (\u201c[Articles 38 and 39 of AP I] prohibit the improper use of the emblems . . . concerned within their scope and thus include a prohibition of the perfidious use of these symbols even if it does not necessarily meet all of the criteria of the first sentence of Art. 37.\u201d)<\/p>\n<p><a href=\"#_ftnref32\" name=\"_ftn32\">[32]<\/a> <em>See <\/em>Watts, <em>supra <\/em>note 18, at 108 (\u201c[T]he twentieth century\u2019s codification of the perfidy prohibition converted a popularly and intuitively understood label for betrayal of trust or confidence into a technically bound term of art, comparatively divested of much of its customary import and broad coverage.\u201d).<\/p>\n<p><a href=\"#_ftnref33\" name=\"_ftn33\">[33]<\/a> By \u201cruses,\u201d I mean \u201cdeceptions that are not prohibited by the law of war,\u201d as opposed to deceptions in warfare generally. <em>See<\/em> Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.25.1.4.<\/p>\n<p><a href=\"#_ftnref34\" name=\"_ftn34\">[34]<\/a> <em>See id.<\/em> \u00a7 4.8.1.5 (defining \u201ccivilian\u201d as \u201ca person who is neither part of nor associated with an armed force or group, nor otherwise engaging hostilities.\u201d).<\/p>\n<p><a href=\"#_ftnref35\" name=\"_ftn35\">[35]<\/a> <em>See<\/em> AP I, <em>supra<\/em> note 8, art. 37(2); Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.25.1. There is, however, space between the definition of ruse and the rule against perfidy for so-called \u201cpermissible perfidy\u201d: perfidious deception that neither results in the adversary\u2019s injury, death, or capture nor misuses a recognized emblem. <em>See<\/em> Watts, <em>supra <\/em>note 18, at 149\u201350. This gap in coverage is not relevant to this article because it argues that deception of a cyber system would not be perfidious.<\/p>\n<p><a href=\"#_ftnref36\" name=\"_ftn36\">[36]<\/a> <em>See<\/em> Thomas C. Wingfield, <em>Chivalry in the Use of Force<\/em>, 32 U. Tol. L. Rev. 111, 113 (2001) (\u201cAs strongly as the law of chivalry is woven into the fabric of the modem law of war, it remains most intact in the distinction between lawful ruses and treacherous perfidy.\u201d).<\/p>\n<p><a href=\"#_ftnref37\" name=\"_ftn37\">[37]<\/a> <em>Cf.<\/em> Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.21 (\u201cThe line between those deceptions that good faith permits and those that good faith prohibits may appear indistinct and has varied according to State practice.\u201d).<\/p>\n<p><a href=\"#_ftnref38\" name=\"_ftn38\">[38]<\/a> <em>See<\/em> AP I Commentary, <em>supra<\/em> note 16, \u00b6 1499, at 434 (\u201c[T]he first proposals concerned with defining the concept of perfidy were based on the concept of trust, which forms the basis of the security of international relations.\u201d).<\/p>\n<p><a href=\"#_ftnref39\" name=\"_ftn39\">[39]<\/a> Bothe et al., <em>supra<\/em> note 17, at 233; <em>see also<\/em> U.S. Dep\u2019t of Def., Manual for Military Commissions pt. IV, \u00a7 5(17)(c)(3), at IV-15 (2016).<\/p>\n<p><a href=\"#_ftnref40\" name=\"_ftn40\">[40]<\/a> Watts, <em>supra <\/em>note 18, at 172.<\/p>\n<p><a href=\"#_ftnref41\" name=\"_ftn41\">[41]<\/a> Manual for Military Commissions, <em>supra<\/em> note 39, pt. IV, \u00a7 5(17)(c)(3), at IV-5.<\/p>\n<p><a href=\"#_ftnref42\" name=\"_ftn42\">[42]<\/a> <em>See<\/em> Bothe et al., <em>supra<\/em> note 17, at 233 (\u201cCombatants, in practice, find it difficult to respect protected persons and objects if experience causes them to believe or suspect that their adversaries are abusing their claim to protection under the rules of international law applicable in armed conflict in order to achieve a military advantage.\u201d); Watts, <em>supra <\/em>note 18, at 171 (\u201cCivilians, the wounded, and those offering surrender or truce enjoy more reliable protection when soldiers are confident that their forbearance in attacking these persons will not be betrayed or used against them.\u201d).<\/p>\n<p><a href=\"#_ftnref43\" name=\"_ftn43\">[43]<\/a> <em>See<\/em> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 491 (\u201cIn the conduct of hostilities involving cyber operations, it is prohibited to kill or injure an adversary by resort to perfidy.\u201d).<\/p>\n<p><a href=\"#_ftnref44\" name=\"_ftn44\">[44]<\/a> <em>Id. <\/em>at 492.<\/p>\n<p><a href=\"#_ftnref45\" name=\"_ftn45\">[45]<\/a> <em>See id. <\/em>Indeed, the implementation of the rule against perfidy in both the U.S. Military Commissions Act of 2009 and the Elements of Crimes under the Rome Statute of the International Criminal Court apparently require the person or persons deceived and the person or persons killed, wounded, or captured to be the same. <em>See<\/em> 10 U.S.C. \u00a7 950t(17) (2018) (specifying that victims of perfidy are \u201csuch person or persons\u201d whose confidence or belief had been invited); International Criminal Court, Elements of Crimes art. 8(2)(b)(xi), at 24 (2011), <a href=\"https:\/\/www.icc-cpi.int\/NR\/rdonlyres\/336923D8-A6AD-40EC-AD7B-45BF9DE73D56\/0\/ElementsOfCrimesEng.pdf\">https:\/\/www.icc-cpi.int\/NR\/rdonlyres\/336923D8-A6AD-40EC-AD7B-45BF9DE73D56\/0\/ElementsOfCrimesEng.pdf<\/a> [perma.cc\/QA94-E2PU] (same).<\/p>\n<p><a href=\"#_ftnref46\" name=\"_ftn46\">[46]<\/a> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 492; <em>accord <\/em>Bothe et al., <em>supra<\/em> note 17, at 235; Watts, <em>supra <\/em>note 18, at 154.<\/p>\n<p><a href=\"#_ftnref47\" name=\"_ftn47\">[47]<\/a> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 493. This example is also intended to show that temporal proximity is not a requirement for proximate causation. <em>See id.<\/em><\/p>\n<p><a href=\"#_ftnref48\" name=\"_ftn48\">[48]<\/a> <em>See<\/em> <em>id.<\/em> at 492\u201393.<\/p>\n<p><a href=\"#_ftnref49\" name=\"_ftn49\">[49]<\/a> <em>See<\/em> <em>id. <\/em>at 493\u201394. The <em>Manual<\/em> defines a cyber or computer system as \u201c[o]ne or more interconnected computers with associated software and peripheral devices.\u201d<em> Id. <\/em>at 564.<\/p>\n<p><a href=\"#_ftnref50\" name=\"_ftn50\">[50]<\/a> <em>See<\/em> Rep. of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, \u00b6 28(b), U.N. Doc. A\/70\/174 (July 22, 2015) (\u201cExisting obligations under international law are applicable to State use of [information and communications technologies].\u201d); Gary D. Solis, <em>Cyber Warfare<\/em>, Mil. L. Rev., Spring 2014, at 1, 1\u20132 (affirming that \u201cexisting [laws of armed conflict] apply to cyber issues,\u201d <em>id.<\/em> at 1).<\/p>\n<p><a href=\"#_ftnref51\" name=\"_ftn51\">[51]<\/a> <em>See<\/em> Joint Chiefs of Staff, Joint Pub. 3-12, Cyberspace Operations I-1 (8 June 2018) [hereinafter Joint Pub. 3-12] (\u201c[T]he [DOD] is responsible for defending the US homeland and US interests from attack, including attacks that may occur in cyberspace.\u201d (citation omitted)).<\/p>\n<p><a href=\"#_ftnref52\" name=\"_ftn52\">[52]<\/a> <em>See<\/em> Singer &amp; Friedman, <em>supra <\/em>note 11, at 182 (\u201c[E]very node of the network, every router, every switch is within the sovereign borders of a nation-state . . . or travels on a submarine cable or satellite connection owned by a company that is incorporated in a sovereign nation-state . . . .\u201d (citation omitted)).<\/p>\n<p><a href=\"#_ftnref53\" name=\"_ftn53\">[53]<\/a> <em>See, e.g.<\/em>, John Perry Barlow, <em>A Declaration of the Independence of Cyberspace<\/em>, Electronic Frontier Found. (Feb. 8, 1996), <a href=\"https:\/\/www.eff.org\/cyberspace-independence\">https:\/\/www.eff.org\/cyberspace-independence<\/a> [perma.cc\/TJ39-J4PC] (\u201cGovernments of the Industrial World . . . [y]ou have no sovereignty where we gather [in cyberspace, that is].\u201d).<\/p>\n<p><a href=\"#_ftnref54\" name=\"_ftn54\">[54]<\/a> <em>See<\/em> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 13 (\u201cA State enjoys sovereign authority with regard to the cyber infrastructure, persons, and cyber activities located within its territory, subject to its international legal obligations.\u201d).<\/p>\n<p><a href=\"#_ftnref55\" name=\"_ftn55\">[55]<\/a> Singer &amp; Friedman, <em>supra <\/em>note 11, at 13.<\/p>\n<p><a href=\"#_ftnref56\" name=\"_ftn56\">[56]<\/a> Joint Pub. 3-12, <em>supra<\/em> note 51, at I-2.<\/p>\n<p><a href=\"#_ftnref57\" name=\"_ftn57\">[57]<\/a> <em>Id.<\/em> at I-3 to I-4.<\/p>\n<p><a href=\"#_ftnref58\" name=\"_ftn58\">[58]<\/a> <em>Id. <\/em>at I-4.<\/p>\n<p><a href=\"#_ftnref59\" name=\"_ftn59\">[59]<\/a> <em>See id.<\/em><\/p>\n<p><a href=\"#_ftnref60\" name=\"_ftn60\">[60]<\/a> <em>Id. <\/em>For an extreme example of the maintenance of multiple cyberpersons, see, for example, P.W. Singer &amp; Emerson T. Brooking, LikeWar: The Weaponization of Social Media 138 (2018) (discussing Russian \u201cbotnet\u201d of at least 60,000 Twitter accounts).<\/p>\n<p><a href=\"#_ftnref61\" name=\"_ftn61\">[61]<\/a> Michael N. Schmitt, <em>The Principle of Discrimination in 21st Century Warfare<\/em>, 2 Yale Hum. Rts. &amp; Dev. L.J. 143, 159 (1999).<\/p>\n<p><a href=\"#_ftnref62\" name=\"_ftn62\">[62]<\/a> U.S. Dep\u2019t of Def., The Department of Defense Cyber Strategy 5 (2015).<\/p>\n<p><a href=\"#_ftnref63\" name=\"_ftn63\">[63]<\/a> Singer &amp; Friedman, <em>supra <\/em>note 11, at 196 (citation omitted).<\/p>\n<p><a href=\"#_ftnref64\" name=\"_ftn64\">[64]<\/a> Gary P. Corn &amp; Peter P. Pascucci, <em>The Law of Armed Conflict Implications of Covered or Concealed Operations: Perfidy, Ruses, and the Principle of Passive Distinction<\/em>, <em>in<\/em> The Impact of Emerging Technologies on the Law of Armed Conflict 273, 277 (Michael N. Schmitt et al. eds. 2019).<\/p>\n<p><a href=\"#_ftnref65\" name=\"_ftn65\">[65]<\/a> AP I, <em>supra<\/em> note 8, art. 37(2).<\/p>\n<p><a href=\"#_ftnref66\" name=\"_ftn66\">[66]<\/a> <em>See <\/em>AP I Commentary, <em>supra<\/em> note 16, \u00b6 1507, at 438.<\/p>\n<p><a href=\"#_ftnref67\" name=\"_ftn67\">[67]<\/a> <em>See id.<\/em>; Corn &amp; Pascucci, <em>supra<\/em> note 64, at 292.<\/p>\n<p><a href=\"#_ftnref68\" name=\"_ftn68\">[68]<\/a> AP I, <em>supra<\/em> note 8, art. 37(1)(c).<\/p>\n<p><a href=\"#_ftnref69\" name=\"_ftn69\">[69]<\/a> AP I Commentary, <em>supra<\/em> note 16, \u00b6 1507, at 438.<\/p>\n<p><a href=\"#_ftnref70\" name=\"_ftn70\">[70]<\/a> Corn &amp; Pascucci, <em>supra<\/em> note 64, at 292.<\/p>\n<p><a href=\"#_ftnref71\" name=\"_ftn71\">[71]<\/a> <em>See generally<\/em> Singer &amp; Friedman, <em>supra <\/em>note 11, at 61\u201362 (discussing antivirus programs and firewalls).<\/p>\n<p><a href=\"#_ftnref72\" name=\"_ftn72\">[72]<\/a> <em>S<\/em><em>ee<\/em> Joint Pub. 3-12, <em>supra<\/em> note 51, I-12.<\/p>\n<p><a href=\"#_ftnref73\" name=\"_ftn73\">[73]<\/a> Singer &amp; Friedman, <em>supra <\/em>note 11, at 114\u201318.<\/p>\n<p><a href=\"#_ftnref74\" name=\"_ftn74\">[74]<\/a> <em>Id.<\/em> at 158.<\/p>\n<p><a href=\"#_ftnref75\" name=\"_ftn75\">[75]<\/a> <em>Id. <\/em>at 159.<\/p>\n<p><a href=\"#_ftnref76\" name=\"_ftn76\">[76]<\/a> Law of War Manual, <em>supra<\/em> note 6, \u00a7 2.5.3.<\/p>\n<p><a href=\"#_ftnref77\" name=\"_ftn77\">[77]<\/a> <em>See<\/em> Corn &amp; Pascucci, <em>supra<\/em> note 64, at 298.<\/p>\n<p><a href=\"#_ftnref78\" name=\"_ftn78\">[78]<\/a> For its part, DoD recognizes this problem: \u201cMany of DOD\u2019s critical functions and operations rely on contracted commercial assets, including Internet service providers (ISPs) and global supply chains, over which DOD and its forces have no direct authority.\u201d Joint Pub. 3-12, <em>supra<\/em> note 51, I-12 to I-13.<\/p>\n<p><a href=\"#_ftnref79\" name=\"_ftn79\">[79]<\/a> <em>See<\/em> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 492.<\/p>\n<p><a href=\"#_ftnref80\" name=\"_ftn80\">[80]<\/a> <em>Cf. <\/em>Jean de Preux, Int\u2019l Comm. of the Red Cross, 3 The Geneva Conventions of 12 August 1949: Commentary 50 (Jean S. Pictet ed., A.P. de Heney trans., 1960) (\u201c[T]he term \u2018enemy\u2019 covers <em>any adversary<\/em> during an \u2018armed conflict which may arise between two or more of the High Contracting Parties\u2019 . . . .\u201d (emphasis added) (first quoting Geneva Convention Relative to the Treatment of Prisoners of War art. 4(A), Aug. 12, 1949, 6 U.S.T. 3316; and then quoting <em>id.<\/em> art. 2)).<\/p>\n<p><a href=\"#_ftnref81\" name=\"_ftn81\">[81]<\/a> <em>See<\/em> Law of War Manual, <em>supra<\/em> note 6, \u00a7 4.2 (\u201cThe law of war has recognized that the population of an enemy State is generally divided into two classes: the armed forces and the civilian population.\u201d).<\/p>\n<p><a href=\"#_ftnref82\" name=\"_ftn82\">[82]<\/a> <em>Compare, e.g.<\/em>, AP I, <em>supra<\/em> note 8, art. 51 (protection of civilian population), <em>with, e.g.<\/em>,<em> id.<\/em> art. 52 (protection of civilian objects).<\/p>\n<p><a href=\"#_ftnref83\" name=\"_ftn83\">[83]<\/a> AP I Commentary, <em>supra<\/em> note 16, \u00b6\u00b6 2007\u201308, at 633\u201334.<\/p>\n<p><a href=\"#_ftnref84\" name=\"_ftn84\">[84]<\/a> <em>See<\/em> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 437.<\/p>\n<p><a href=\"#_ftnref85\" name=\"_ftn85\">[85]<\/a> <em>See id.<\/em><\/p>\n<p><a href=\"#_ftnref86\" name=\"_ftn86\">[86]<\/a> AP I, <em>supra<\/em> note 8, art. 37(1).<\/p>\n<p><a href=\"#_ftnref87\" name=\"_ftn87\">[87]<\/a> <em>See, e.g.<\/em>, Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.17.2 (\u201cEnemy property may not be <em>seized<\/em> or destroyed unless imperatively demanded by the necessities of war.\u201d (emphasis added)).<\/p>\n<p><a href=\"#_ftnref88\" name=\"_ftn88\">[88]<\/a> <em>See<\/em> 10 U.S.C. \u00a7 950t(17).<\/p>\n<p><a href=\"#_ftnref89\" name=\"_ftn89\">[89]<\/a> <em>Id.<\/em> (emphasis added); <em>accord<\/em> Manual for Military Commissions, <em>supra<\/em> note 39, pt. IV, \u00a7 5(17)(b), at IV-14 (elements of the offense).<\/p>\n<p><a href=\"#_ftnref90\" name=\"_ftn90\">[90]<\/a> Elements of Crimes, <em>supra<\/em> note 45, art. 8(2)(b)(xi), at 24 (emphasis added).<\/p>\n<p><a href=\"#_ftnref91\" name=\"_ftn91\">[91]<\/a> AP I, <em>supra<\/em> note 8, art. 37(1).<\/p>\n<p><a href=\"#_ftnref92\" name=\"_ftn92\">[92]<\/a> <em>See<\/em> Law of War Manual, <em>supra<\/em> note 6, \u00a7 6.5.9.3 (\u201c[I]t is persons who must comply with the law of war.\u201d).<\/p>\n<p><a href=\"#_ftnref93\" name=\"_ftn93\">[93]<\/a> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 494.<\/p>\n<p><a href=\"#_ftnref94\" name=\"_ftn94\">[94]<\/a> <em>See, e.g.<\/em>, Brad Smith, President, Microsoft Corp., Keynote Address at the RSA Conference 2017: The Need for a Digital Geneva Convention (Feb. 14, 2017), <a href=\"https:\/\/blogs.microsoft.com\/wp-content\/uploads\/2017\/03\/Transcript-of-Brad-Smiths-Keynote-Address-at-the-RSA-Conference-2017.pdf\">https:\/\/blogs.microsoft.com\/wp-content\/uploads\/2017\/03\/Transcript-of-Brad-Smiths-Keynote-Address-at-the-RSA-Conference-2017.pdf<\/a> [perma.cc\/D9FP-8YNN] (proposing a Digital Geneva Convention \u201cthat will call on the world\u2019s governments to pledge that they will not engage in cyberattacks on the private sector, that they will not target civilian infrastructure\u201d).<\/p>\n<p><a href=\"#_ftnref95\" name=\"_ftn95\">[95]<\/a> <em>See, e.g.<\/em>, Arun M. Sukumar, <em>The UN GGE Failed. Is International Law in Cyberspace Doomed as Well?<\/em>, Lawfare (July 4, 2017, 1:51 PM), <a href=\"https:\/\/www.lawfareblog.com\/un-gge-failed-international-law-cyberspace-doomed-well\">https:\/\/www.lawfareblog.com\/un-gge-failed-international-law-cyberspace-doomed-well<\/a> [perma.cc\/C22C-N5B4] (noting the U.N. Group of Governmental Experts failed to reach consensus on \u201chow international law applies to the use of Information and Communication Technologies (ICTs) by states\u201d).<\/p>\n<p><a href=\"#_ftnref96\" name=\"_ftn96\">[96]<\/a> <em>See<\/em> Law of War Manual, <em>supra<\/em> note 6, \u00a7 1.8 (\u201cCustomary international law is an unwritten form of law in the sense that it is not created through a written agreement by States.\u201d).<\/p>\n<p><a href=\"#_ftnref97\" name=\"_ftn97\">[97]<\/a> <em>See id. <\/em>(\u201c<em>Customary international law<\/em> results from a general and consistent practice of States that is followed by them from a sense of legal obligation (<em>opinio juris<\/em>).\u201d).<\/p>\n<p><a href=\"#_ftnref98\" name=\"_ftn98\">[98]<\/a> AP I, <em>supra<\/em> note 8, art. 52(2); <em>accord<\/em> Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.6.3 (quoting <em>id.<\/em>).<\/p>\n<p><a href=\"#_ftnref99\" name=\"_ftn99\">[99]<\/a> <em>See<\/em> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 515 (\u201cComputers, computer networks, and data that form an integral part of the operations or administration of medical units and transports must be respected and protected . . . .\u201d).<\/p>\n<p><a href=\"#_ftnref100\" name=\"_ftn100\">[100]<\/a> <em>See id.<\/em> at 435\u201345 (\u201cCyber infrastructure may only be made the object of attack if it qualifies as a military objective.\u201d <em>Id.<\/em> at 434); <em>see also<\/em> AP I, <em>supra<\/em> note 8, art. 52(1) (\u201cCivilian objects shall not be the object of attack or of reprisals. Civilian objects are all objects which are not military objectives . . . .\u201d).<\/p>\n<p><a href=\"#_ftnref101\" name=\"_ftn101\">[101]<\/a> <em>See<\/em> Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.10; <em>see also<\/em> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 470 (\u201cA cyber attack that may be expected to cause incidental loss of civilian life, injury to civilians, damage to civilian objects, or a combination thereof, which would be excessive in relation to the concrete and direct military advantage anticipated is prohibited.\u201d).<\/p>\n<p><a href=\"#_ftnref102\" name=\"_ftn102\">[102]<\/a> <em>See<\/em> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 493.<\/p>\n<p><a href=\"#_ftnref103\" name=\"_ftn103\">[103]<\/a> <em>See <\/em><em>id. <\/em>at 496\u2013504 (prohibiting improper use of protective indicators, United Nations emblem, enemy indicators, or neutral indicators).<\/p>\n<p><a href=\"#_ftnref104\" name=\"_ftn104\">[104]<\/a> Official ICRC email addresses end with \u201c@icrc.org.\u201d <em>Fraudulent E-mails and Websites<\/em>, ICRC, <a href=\"https:\/\/www.icrc.org\/en\/faq\/fraudulent-emails-and-websites\">https:\/\/www.icrc.org\/en\/faq\/fraudulent-emails-and-websites<\/a> [perma.cc\/ZK6M-EUZK] (last visited Jan. 21, 2020).<\/p>\n<p><a href=\"#_ftnref105\" name=\"_ftn105\">[105]<\/a> <em>See<\/em> Tallinn Manual 2.0, <em>supra <\/em>note 5, at 498.<\/p>\n<p><a href=\"#_ftnref106\" name=\"_ftn106\">[106]<\/a> <em>See id.<\/em><\/p>\n<p><a href=\"#_ftnref107\" name=\"_ftn107\">[107]<\/a> At least with respect to the possibility that the email address will deceive a person. It would bear on the scenario used in the <em>Tallinn Manual 2.0<\/em> where \u201can email message spoofed to originate from the \u2018icrc.org\u2019 domain . . . bypass[es] the enemy\u2019s data filters and deliver[s] a piece of malware to the military network.\u201d <em>Id.<\/em><\/p>\n<p><a href=\"#_ftnref108\" name=\"_ftn108\">[108]<\/a> <em>Id. <\/em>at 499.<\/p>\n<p><a href=\"#_ftnref109\" name=\"_ftn109\">[109]<\/a> Bothe et al., <em>supra<\/em> note 17, at 236 (citation omitted).<\/p>\n<p><a href=\"#_ftnref110\" name=\"_ftn110\">[110]<\/a> AP I, <em>supra<\/em> note 8, art. 37(1)(c).<\/p>\n<p><a href=\"#_ftnref111\" name=\"_ftn111\">[111]<\/a> Bothe et al., <em>supra<\/em> note 17, at 236; <em>see also<\/em> AP I, <em>supra<\/em> note 8, art. 44(3) (granting prisoner-of-war status to combatants who \u201cowing to the nature of the hostilities . . . cannot\u201d distinguish themselves from the civilian population if they satisfy certain requirements).<\/p>\n<p><a href=\"#_ftnref112\" name=\"_ftn112\">[112]<\/a> Watts, <em>supra <\/em>note 18, at 167.<\/p>\n<p><a href=\"#_ftnref113\" name=\"_ftn113\">[113]<\/a> <em>See<\/em> Joint Pub. 3-12, <em>supra<\/em> note 51, at I-13 (acknowledging DoD\u2019s \u201c[d]ependency on commercial Internet providers\u201d).<\/p>\n<p><a href=\"#_ftnref114\" name=\"_ftn114\">[114]<\/a> Bothe et al., <em>supra<\/em> note 17, at 233.<\/p>\n<p><a href=\"#_ftnref115\" name=\"_ftn115\">[115]<\/a> <em>See supra <\/em>note 42.<\/p>\n<p><a href=\"#_ftnref116\" name=\"_ftn116\">[116]<\/a> Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.23.1.5; <em>see also<\/em> Bothe et al., <em>supra<\/em> note 17, at 246.<\/p>\n<p><a href=\"#_ftnref117\" name=\"_ftn117\">[117]<\/a> Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.23.1.5; <em>see also<\/em> AP I, <em>supra<\/em> note 8, art. 39(2) (\u201cIt is prohibited to make use of the flags or military emblems, insignia or uniforms of adverse Parties while engaging in attacks or in order to shield, favour, protect or impede military operations.\u201d).<\/p>\n<p><a href=\"#_ftnref118\" name=\"_ftn118\">[118]<\/a> Law of War Manual, <em>supra<\/em> note 6, \u00a7 5.23.1.5.<\/p>\n<p><a href=\"#_ftnref119\" name=\"_ftn119\">[119]<\/a> <em>See id. <\/em>\u00a7 1.3.4 (listing purposes of the law of war).<\/p>\n<p><a href=\"#_ftnref120\" name=\"_ftn120\">[120]<\/a> <em>See<\/em> Watts, <em>supra <\/em>note 18, at 149\u201350.<\/p>\n<p><a href=\"#_ftnref121\" name=\"_ftn121\">[121]<\/a> <em>See<\/em> John C. Dehn, <em>Permissible Perfidy?: Analysing the <\/em><em>Colombian Hostage Rescue, the Capture of Rebel Leaders and the World\u2019s Reaction<\/em>, 6 J. Int\u2019l Crim. Just. 627, 644 (2008) (\u201cThe possible results of prohibited perfidy\u2014meaning death, injury or capture\u2014are not forbidden between combatants in armed conflict. It is the use of bad faith to obtain those results that is wrongful.\u201d (footnote omitted)).<\/p>\n<p><a href=\"#_ftnref122\" name=\"_ftn122\">[122]<\/a> AP I Commentary, <em>supra<\/em> note 16, \u00b6 1488, at 431.<\/p>\n<p><a href=\"#_ftnref123\" name=\"_ftn123\">[123]<\/a> Hague Convention IV, <em>supra<\/em> note 23, Annex art. 23(b).<\/p>\n<p><a href=\"#_ftnref124\" name=\"_ftn124\">[124]<\/a> <em>See<\/em> AP I Commentary, <em>supra<\/em> note 16, \u00b6 1489, at 431\u201332 (explaining \u201cthe inadequate wording of the Hague Regulations\u201d forms part of the background \u201cfor providing a general definition of perfidy for the first time\u201d).<\/p>\n<p><a href=\"#_ftnref125\" name=\"_ftn125\">[125]<\/a> <em>See<\/em> Solis, <em>supra <\/em>note 50, at 2.<\/p>\n<p><a href=\"#_ftnref126\" name=\"_ftn126\">[126]<\/a> <em>See<\/em> Christopher M. Ford, <em>Autonomous Weapons and International Law<\/em>, 69 S.C. L. Rev. 413, 434\u2013439 (2017) (discussing how an autonomous weapon might distinguish between persons).<\/p>\n<p><a href=\"#_ftnref127\" name=\"_ftn127\">[127]<\/a> Michael N. Schmitt, <em>Autonomous Weapon Systems and International Humanitarian Law: A Reply to the Critics<\/em>, Harv. L. Sch. Nat\u2019l Security J. (Feb. 5, 2013), <a href=\"https:\/\/journals.law.harvard.edu\/nsj\/2013\/02\/autonomous-weapon-systems-and-international-humanitarian-law-a-reply-to-the-critics\/\">https:\/\/journals.law.harvard.edu\/nsj\/2013\/02\/autonomous-weapon-systems-and-international-humanitarian-law-a-reply-to-the-critics\/<\/a> [perma.cc\/9VH7-NWZQ].<\/p>\n<p><a href=\"#_ftnref128\" name=\"_ftn128\">[128]<\/a> <em>See<\/em> Ford, <em>supra<\/em> note 126, at 432 (\u201cA single combatant could control dozens of autonomous weapons systems, which could replace hundreds or thousands of combatants.\u201d).<\/p>\n<p><a href=\"#_ftnref129\" name=\"_ftn129\">[129]<\/a> <em>Cf.<\/em> Ryan Calo et al., <em>Is Tricking a Robot Hacking?<\/em> 7 (Univ. of Wash. Sch. of Law, Legal Studies Research Paper No. 2018-05, 2018), <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3150530\">https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=3150530<\/a> [perma.cc\/Q8A4-W66G] (giving the example of an \u201cadversarial sticker\u201d that caused a self-driving car to misidentify a traffic sign).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sean K. Price[*] [This article is available in PDF at this link] Introduction The United States is under attack. In the months leading up to hostilities, the enemy\u2019s intelligence agencies have identified key U.S. and allied military officials who use cloud-connected artificial pacemakers[1] or implantable cardiac defibrillators (ICD).[2] Immediately preceding offensive operations in the physical domains, the adversary\u2019s cyber force pushes malware to those officials\u2019 pacemakers, which accept it as authentic firmware updates produced by a civilian manufacturer. When the attack begins, the adversary instructs the now-infected pacemakers to malfunction.[3] The most fortunate targets require hospitalization to deactivate their pacemakers. [&hellip;]<\/p>\n","protected":false},"author":13020,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-5155","post","type-post","status-publish","format-standard","hentry","category-online"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/peZtUX-1l9","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/5155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/13020"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=5155"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/5155\/revisions"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=5155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/categories?post=5155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/tags?post=5155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}