Hostname: page-component-cd9895bd7-lnqnp Total loading time: 0 Render date: 2024-12-26T16:12:23.896Z Has data issue: false hasContentIssue false

Disinformation Operations Aimed at (Democratic) Elections in the Context of Public International Law: The Conduct of the Internet Research Agency During the 2016 US Presidential Election

Published online by Cambridge University Press:  23 January 2020

Abstract

Due to new technologies, the speed and volume of disinformation is unprecedented today. As seen in the 2016 US presidential election, especially with the conduct of the Internet Research Agency, this poses challenges and threats for the (democratic) political processes of internal State affairs, and in particular, (democratic) elections are under increasing risk. Disinformation has the potential to sway the outcome of an election and therefore discredits the idea of free and fair elections. Given the growing prevalence of disinformation operations aimed at (democratic) elections, the question arises as to how international law applies to such operations and how States under international law might counter such hostile operations launched by their adversaries.

From a legal standpoint, it appears that such disinformation operations do not fully escape existing international law. However, due to open questions and the geopolitical context, many States refrain from clearly labelling them as internationally wrongful acts under international law. Stretching current international legal norms to cover the issue does not seem to be the optimal solution and a binding international treaty would also need to overcome various hurdles. The author suggests that disinformation operations aimed at (democratic) elections in the context of public international law will most likely be regulated (if) by a combination of custom and bottom-up law-making influencing and reinforcing each other.

Type
Articles
Copyright
Copyright © The Author(s) 2020

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Footnotes

1

© Manuel Rodriguez 2019. The author is a jurist in the Private Security Services Section within the Division for Security Policy at the Swiss Federal Department of Foreign Affairs (FDFA).

This article was prepared by the author in his personal capacity. The views and opinions in this article are the author's own and do not reflect the views and opinions of the Private Security Services Section, the Division for Security Policy, or the Swiss Federal Department of Foreign Affairs (FDFA).

References

Part 7: Bibliography

Addis, Adeno. “International Propaganda and Developing Countries.” Vanderbilt Journal of Transnational Law 21 (1988): 491548.Google Scholar
Arimatsu, Louise. “A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations.” Paper presented at the 4th International Conference on Cyber Conflict, NATO CCD COE Publications, Tallinn, 2012: 91109.Google Scholar
Ashley, Nicolas C.Taming the Trolls: The Need for an International Legal Frame work to Regulate State Use of Disinformation on Social Media.” The Georgetown Law Journal Online 107 (2018): 3662.Google Scholar
Baezner, Marle, and Robin, Patrice. ”Hotspot Analysis: Cyber and Information Warfare in Elections in Europe.” Center for Security Studies (CSS), ETH Zurich, Zurich, 2017.Google Scholar
Baines, Paul, and Jones, Nigel. “Influence and Interference in Foreign Elections.” The RUSI Journal 163, no. 1 (2018): 1219.CrossRefGoogle Scholar
Bargaoanu, Alina, and Radu, Loredana. “Fake News or Disinformation 2.0: Some Insights into Romanians’ Digital Behaviour.” Romanian Journal of European Affairs 18, no. 1 (2018): 2438.Google Scholar
Baker, Peter. “White House Penalizes Russians over Election Meddling and Cyberattacks.” The New York Times, March 16, 2018, https://www.nytimes.com/2018/03/15/us/politics/trump-russia-sanctions.html.Google Scholar
Barth, Volker, and Homberg, Michael. “Geschichte und Theorie falscher Nachrichten.” Geschichte und Gesellschaft 44 (2018): 619642.CrossRefGoogle Scholar
Bouchard, Mikayla. “The Russia Investigation Is Completed: Here's What It All Means.” The New York Times, May 16, 2018, https://www.nytimes.com/2018/05/16/us/politics/russia-investigation-guide.html.Google Scholar
Russell, Buchan. “The International Legal Regulation of State-Sponsored Cyber Espionage.” in International Cyber Norms: Legal, Policy & Industry Perspectives, 6586, Tallinn, NATO CCD COE Publications, 2016.Google Scholar
Calabresi, Massimo. “Hacking Democracy: Inside Russia's Social Media War on America.” Time, May 29, 2017.Google Scholar
Calabresi, Massimo. “Hacking the Voter: What's Behind Russia's Effort to Influence the U.S. Election.” Time, October 10, 2016.Google Scholar
Carroll, Oliver. “St. Petersburg Troll Farm had 90 Dedicated Staff Working to Influence US Election Campaign.” Independent, October 17, 2017, https://perma.cc/BL34-WK9F.Google Scholar
Center for European Policy Analysis (CEPA). “Techniques.” Accessed January 5, 2019, http://infowar.cepa.org/Techniques.Google Scholar
Cerone, John. “A Taxonomy of Soft Law: Stipulating a Definition.” in Tracing the Roles of Soft Law in Human Rights. Edited by Lagoutte, Stéphanie, Lagoutte, Thomas Gammeltoft-Hansen, and Cerone, John, 1524, Oxford: Oxford University Press, 2016. Doi: 10.1093/acprof:oso/9780198791409.003.0002.CrossRefGoogle Scholar
Chesney, Bobby, and Citrone, Danielle. “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security.” July 14, 2018, California Law Review 107, 2019, forthcoming. Available at SSRN: https://ssrn.com/abstract=3213954.CrossRefGoogle Scholar
Chinkin, Cristine M.The Challenge of Soft Law: Development and Change in International Law.” International and Comparative Law Quarterly 38, no. 4 (1989): 850866.CrossRefGoogle Scholar
Chircop, Luke. “A Due Diligence Standard of Attribution in Cyberspace.” International and Comparative Law Quarterly 67 (2018): 643668.CrossRefGoogle Scholar
Chung, John J.Nation-States and Their Operations in Planting of Malware in Other Countries: Is it Legal Under International Law,” University of Pittsburgh Law Review 80 (2018): 3367.CrossRefGoogle Scholar
Clark, David D., and Landau, Susan. “Untangling Attribution.” Harvard Journal of Law and Technology 2 (2011): 531562.Google Scholar
Corn, Gary P., and Taylor, Robert. “Sovereignty in the Age of Cyber.” AJIL Unbound 111 (2017): 207212.CrossRefGoogle Scholar
Couzigou, Irène. “Securing Cyber Space: The Obligation of States to Prevent Harmful International Cyber Operations.” International Review of Law, Computers & Technology 32, no. 1 (2018): 3757.CrossRefGoogle Scholar
Crawford, James, and Brownlie, Ian. Brownlie's Principles of Public International Law. 8th ed. (2012).Google Scholar
Crootof, Rebecca. “International Cybertorts: Expanding State Accountability in Cyberspace.” Cornell Law Review 103 (2018): 565644.Google Scholar
Darczewska, Jolanta, Zochowski, Piotr, Orttung, Robert W., Laruelle, Marlene, and Pörzge, Gemma. ”Russian Analytical Digest.” Center for Security Studies (CSS), ETH Zurich, Zurich, 2017.Google Scholar
Deeks, Ashley S.Confronting and Adapting: Intelligence Agencies and International Law.” Virginia Law Review 102, no. 3 (2016): 599685.Google Scholar
Egan, Brian J.International Law and Stability in Cyberspace.” Berkeley Journal of International Law 35 (2017): 169180.Google Scholar
Fallis, Don. “What is Disinformation?Library Trends 63, no. 3 (2015): 401426.CrossRefGoogle Scholar
Freedom House. Freedom on the Net 2017: Manipulating Social Media to Undermine Democracy. (2017), accessed March 7, 2019, https://freedomhouse.org/sites/default/files/FOTN_2017_Final.pdf.Google Scholar
Funke, Daniel. “A Guide to Anti-Misinformation Actions Around the World.” Poynter, (n.d.), accessed March 11, 2019, https://www.poynter.org/ifcn/anti-misinformation-actions/.Google Scholar
Gill, Terry D.Non-Intervention in the Cyber Context.” in Peacetime Regime for State Activities in Cyberspace. Edited by Ziolkowski, Katharina, Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence, 2013.Google Scholar
Goldsmith, Jack. “Cybersecurity Treaties: A Sceptical View.” Paper, Hoover Institute at Stanford University, 2011, accessed March 6, 2019, http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf.Google Scholar
Greenberg, Lawrence T., Goodman, Seymour E., and Soo Hoo, Kevin J.. Information Warfare and International Law. Washington, DC: National Defense University Press, 1998.Google Scholar
Greenemeier, Larry. “Seeking Address: Why Cyber Attacks are so Difficult to Trace Back to Hackers.” Scientific American (June 11, 2011), https://www.scientificamerican.com/article/tracking-cyber-hackers/.Google Scholar
Gunther, Richard, Beck, Paul A., and Nisbet, Erik C.. “Fake News May Have Contributed to Trump's 2016 Victory.” Study, Ohio State University, 2018, accessed February 5, 2019, https://www.documentcloud.org/documents/4429952-Fake-News-May-Have-Contributed-to-Trump-s-2016.html.Google Scholar
Hamilton, Logan. “Beyond Ballot-Stuffing: Current Gaps in International Law Regarding Foreign State Hacking to Influence a Foreign Election.” Wisconsin International Law Journal 35 (2017): 179204.Google Scholar
Hansen, Isabelle, and Lim, Darren J.. “Doxing Democracy: Influencing Elections Via Cyber Voter Interference.Contemporary Politics (2018): 2. Doi: 10.1080/13569775.2018.1493629.Google Scholar
Hollis, Duncan. “The Influence of War; The War of Influence,Temple Journal of International & Comparative Law 32 (2018): 3146.Google Scholar
Howard, David M.Can Democracy Withstand the Cyber Age: 1984 in the 21st Century.” Hastings Law Journal 69 (2018): 13551378.Google Scholar
Howard, Philip N., Ganesh, Bharath, and Liotsiou, Dimitra. The IRA, Social Media and Political Polarization in the United States, 2012-2018. Oxford, UK: Oxford Internet Institute, 2019.Google Scholar
Howard, Philip N., Kollanyi, Bence, Bradshaw, Samantha, and Neudert, Lisa-Maria. “Social Media, News and Political Information During the US Election: Was Polarizing Content Concentrated in Swing States?” Study, Oxford University, 2017, accessed February 27, 2019, https://arxiv.org/ftp/arxiv/papers/1802/1802.03573.pdf.Google Scholar
Jensen, Eric Talbot, and Watts, Sean. “A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destablizier.Texas Law Review 95 (2017).Google Scholar
Joint Chiefs of Staff. Information Operations. JP 3–13. (20 November 2014), accessed January 13, 2019, https://www.hsdl.org/?abstract&did=759867.Google Scholar
Kilovaty, Ido. “Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information.” Harvard National Security Journal 9 (2018): 146179.Google Scholar
Klabbers, Jan. “The Redundancy of Soft Law.” Nordic Journal of International Law 65 (1996): 168182.CrossRefGoogle Scholar
Koh, Harold H.The Trump Administration and International Law,Washburn Law Journal 56 (2017): 413469.Google Scholar
Koh, Tommy T. B.The Origins of the 1982 Convention on the Law of the Sea,Malaya Law Review 29 (1987): 117.Google Scholar
Kollanyi, Bence, Howard, Philip N., and Woolley, Samuel C., “Bots and Automation over Twitter During the U.S. Election,” (study, Oxford University, 2016), accessed February 27, 2019, http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2016/11/Data-Memo-US-Election.pdf.Google Scholar
Koven, Janet. “Bottom-up International Lawmaking: Reflections on the New Haven School of International Law.” The Yale Journal of International Law 32 (2007): 393420.Google Scholar
Lam, Christina. “A Slap on the Wrist: Combatting Russia's Cyber Attack on the 2016 U.S. Presidential Election.Boston College Law Review 59 (2018): 21672201.Google Scholar
Lazer, David, Baum, Matthew, Benkler, Yochai, Berinsky, Adam, Greenhill, Kelly, Menczer, Filippo, Metzger, Miriam, Nyhan, Brendan, Pennycook, Gordon, Rothschild, David, Schudson, Michael, Sloman, Steven, Sunstein, Cass, Thorson, Emily, Watts, Duncan, and Zittrain, Jonathan. “The Science of Fake News: Addressing Fake News Requires a Multidisciplinary Effort.” Science 359, 8 March 2018.Google Scholar
Lecher, Colin. “Senators Announce New Bill That Would Regulate Online Political Ads.” The Verge, October 19, 2017, https://www.theverge.com/2017/10/19/16502946/facebook-twitter-russia-honest-ads-act.Google Scholar
Levin, Dov H.Partisan Electoral Interventions by the Great Powers: Introducing the PEIG Dataset.Conflict Management and Peace Science 36, no. 1 (2019): 88106.CrossRefGoogle Scholar
Levin, Dov H.When the Great Power Gets a Vote: The Effects of Great Power Electoral Interventions on Election Results.” International Studies Quarterly 60 (2016): 189202.CrossRefGoogle Scholar
Lewis, James A.Multilateral Agreements to Constrain Cyberconflict.Arms Control Today 40, (2010). Accessed March 6, 2019, https://www.armscontrol.org/act/2010_06/Lewis.Google Scholar
Libicki, Martin. “The Coming of Cyber Espionage Norms.” Paper presented at the 9th International Conference on Cyber Conflict, NATO CCD COE Publications, Tallinn, 2017.CrossRefGoogle Scholar
Liu, Ian Yuying. “State Responsibility and Cyberattacks: Defining Due Diligence Obligations.” Indonesian Journal of International & Comparative Law 4 (2017): 191260.Google Scholar
Lomas, Dan. “Book Review Essay: The Zinoviev Letter.” International Affairs 95, no. 1 (2019): 201206.CrossRefGoogle Scholar
McDougal, Myres S., and Feliciano, Florentino P.. “International Coercion and World Public Order: The General Principles of the Law of War.” Yale Law Journal 67 (1958): 771845.CrossRefGoogle Scholar
McGonagle, Tarlach. “Fake News: False Fears or Real Concerns?Netherlands Quarterly of Human Rights 35, no. 4 (2017): 203209.CrossRefGoogle Scholar
McKune, Sarah. “An Analysis of the International Code of Conduct for Information Security.” The Citizen Lab, September 28, 2015, https://citizenlab.ca/2015/09/international-code-of-conduct/.Google Scholar
Melzer, Nils. Cyberwarfare and International Law. Geneva: United Nations Institute for Disarmament Research (UNIDIR), 2011.Google Scholar
Moore, Stephan. “Cyber Attacks and the Beginnings of an International Cyber Treaty.” North Carolina Journal of International Law and Commercial Regulation 39 (2013): 223257.Google Scholar
Muir, Lawrence L. Jr.Combatting Cyber-Attacks Through National Interest Diplomacy: A Trilateral Treaty with Teeth.Washington & Lee Law Review Online 68, (2012): 73106.Google Scholar
NATO Cooperative Cyber Defence Centre of Excellence. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Edited by Schmitt, Michael N., and Vihul, Liis. 2nd ed.Cambridge, UK: Cambridge University Press, 2017.CrossRefGoogle Scholar
Office of the Director of National Intelligence (ODNI). Assessing Russian Activities and Intentions in Recent US Elections. ICA 2017-01D, (6 January 2017), accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.Google Scholar
Ohlin, Jens D.Did Russian Cyber Interference in the 2016 Election Violate International Law?Texas Law Review 95 (2017): 15791598.Google Scholar
Oppenheim, Lassa. Oppenheim's International Law. Edited by Jennings, Sir Robert and Watts, Sir Arthur, 9th ed.London: Longmans, 2008.Google Scholar
Ostroukh, Andrey. “Putin Tells U.S. to Send Evidence of Vote Meddling.” Reuters, March 3, 2018, https://www.reuters.com/article/us-usa-trump-putin-reaction/putin-tells-u-s-to-send-evidence-of-vote-meddling-idUSKCN1GF0AS.Google Scholar
Pagallo, Ugo. “Cyber Force and the Role of Sovereign States in Informational Warfare.” Philosophy & Technology 28, no. 3 (2015): 407425.CrossRefGoogle Scholar
Payne, Christian, and Finlay, Lorraine. “Addressing Obstacles to Cyber-Attribution: A Model Based on State Response to Cyber-Attack.” The George Washington International Law Review 49 (2017): 535568.Google Scholar
Payne, Thomas. “Teaching Old Law New Tricks: Applying and Adapting State Responsibility to Cyber Operations.” Lewis & Clark Law Review 20, no. 2 (2016): 683715.Google Scholar
Perina, Alexandra H.Black Holes and Open Secrets: The Impact of Covert Action on International Law.Columbia Journal of Transnational Law 53 (2015): 507583.Google Scholar
Pisillo-Mazzeschi, Ricardo. “The Due Diligence Rule and the Nature of International State Responsibility.” German Yearbook of International Law 36 (1993): 951.Google Scholar
Prier, Jarred. “Commanding the Trend: Social Media as Information Warfare.” Strategic Studies Quarterly 11, no. 4 (2017): 5585.Google Scholar
Prokop, Andrew. “All of Robert Mueller's Indictments and Plea Deals in the Russia Investigation So Far.” Vox, January 25, 2019, https://www.vox.com/policy-and-politics/2018/2/20/17031772/mueller-indictments-grand-jury.Google Scholar
Roscini, Marco. “Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations” in Cyber War: Law and Ethics for Virtual Conflicts. Edited by Ohlin, Jens, Govenr, Kevin, and Finkelstein, Claire, 215273Cambridge, UK: Cambridge University Press, 2015. Doi: 10.1093/acprof:oso/9780198717492.001.0001.Google Scholar
Sander, Barrie. “Democracy Under the Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections.Chinese Journal of International Law 18 (2019).CrossRefGoogle Scholar
Sanger, David E. “Obama Strikes Back at Russia for Election Hacking.” The New York Times, December 29, 2016, https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html.Google Scholar
Sanger, David E., and Fackler, Martin. “N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say.” New York Times, January 18, 2015, https://www.nytimes.com/2015/01/19/world/asia/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html.Google Scholar
Sanovich, Sergey. “Computational Propaganda in Russia: The Origins of Digital Misinformation.” Working paper no. 2017.3, Oxford Internet Institute, Oxford University, Oxford, 2017, accessed February 27, 2019, http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2017/06/Comprop-Russia.pdf.Google Scholar
Schiffrin, Anya. “Disinformation and Democracy: The Internet Transformed Protest but did not Improve Democracy.” Journal of International Affairs 71, no. 1 (2017): 117125.Google Scholar
Schmitt, Michael N.Classification of Cyber Conflict.” Journal of Conflict & Security Law 17, no. 2 (2012): 245260. Doi:10.1093/jcsl/krs018.CrossRefGoogle Scholar
Schmitt, Michael N.Cyber Operations and the Jus Ad Bellum Revisited,Villanova Law Review 56, no. 3 (2011): 569606.Google Scholar
Schmitt, Michael N.Grey Zones in the International Law of Cyberspace.The Yale Journal of International Law Online 42 (2017). Available at SSRN: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3180687.Google Scholar
Schmitt, Michael N.Peacetime Cyber Response and Wartime Cyber Operations Under International Law: An Analytical Vade Mecum.” Harvard National Security Journal 8 (2017): 239280.Google Scholar
Schmitt, Michael N.Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law.Chicago Journal of International Law 19, no. 1 (2018): 3067.Google Scholar
Schmitt, Michael N., and Vihul, Liis. “Respect for Sovereignty in Cyberspace.” Texas Law Review 95 (2017): 16391670.Google Scholar
Schmitt, Michael N., and Vihul, Liis. “Sovereignty in Cyberspace: Lex Lata vel Non.” AJIL Unbound 111 (2017): 213218.CrossRefGoogle Scholar
Shackelford, Scott J., and Andres, Richard B.. “State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem.” Georgetown Journal of International Law 42 (2011): 9711016.Google Scholar
Shackelford, Scott J., Russell, Scott, and Kuehn, Andreas. “Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors.Chicago Journal of International Law 17, no. 1 (2016): 150.Google Scholar
Shaffer, Gregory C., and Pollack, Mark A.. “Hard Versus Soft Law in International Security.” Boston College Law Review 52 (2011): 11471241.Google Scholar
Shane, Scott. “Russia Isn't the Only One Meddling in Elections: We Do It, Too.” The New York Times, February 17, 2018, https://www.nytimes.com/2018/02/17/sunday-review/russia-isnt-the-only-one-meddling-in-elections-we-do-it-too.html.Google Scholar
Silverman, Craig. “This Analysis Shows How Viral Fake Election News Stories Outperformed Real News on Facebook.” BuzzFeed, November 16, 2016, https://www.buzzfeednews.com/article/craigsilverman/viral-fake-election-news-outperformed-real-news-on-facebook#.wkLAZDD3pa.Google Scholar
Singer, Peter W., and Friedman, Allan. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford, UK: Oxford University Press, 2014.Google Scholar
Smith-Spark, Laura, and Gigova, Radina. “Russia to Expand American Blacklist After New US Sanctions.” CNN, March 16, 2018, https://perma.cc/DY52-LW48.Google Scholar
Solon, Olivia, and Siddiqui, Sabrina. “Russia-backed Facebook posts reached 126m Americans during US election.” The Guardian, March 26, 2019, https://www.theguardian.com/technology/2017/oct/30/facebook-russia-fake-accounts-126-million.Google Scholar
Swaine, Jon. “Twitter Admits Far More Russian Bots Posted On Election Than It Had Disclosed.” The Guardian, January 20, 2018, https://www.theguardian.com/technology/2018/jan/19/twitter-admits-far-more-russian-bots-posted-on-election-than-it-had-disclosed.Google Scholar
Tandoc, Edson C. Jr., Lim, Zheng Wei, and Ling, Richard. “Defining Fake News.Digital Journalism 6, no. 2 (2018): 137153.CrossRefGoogle Scholar
Taylor, Philip M.Munition of the Mind: A History of Propaganda. Manchester University Press, 2003.Google Scholar
Tharoor, Ishaan. “The Long History of the U.S. Interfering with Elections Elsewhere.” Washington Post, October 13, 2016, https://www.washingtonpost.com/news/worldviews/wp/2016/10/13/the-long-history-of-the-u-s-interfering-with-elections-elsewhere/?utm_term=.c7547589f5b0.Google Scholar
The EastWest Institute, Critical Terminology Foundations 2: The Russia–U.S. Bilateral on Cybersecurity. Edited by Goodwin, James B. III, Kulpin, Andrey, Rauscher, Karl F., and Yaschenko, Valery. New York, NY: The EastWest Institute, 2014.Google Scholar
Thielbörger, Pierre, and Ramsahye, Robin. “Hybrid Warfare: Zwischen Cyber-Attacken und Manipulation von Informationen.” Die Friedens-Warte 90, no. 1/2 (2015): 81112.Google Scholar
Tinline, Phil. “The Art of the Big Lie”: From the Reichstag Fire to Stalin's Show Trials, the Craft of Disinformation is Nothing New.” New Statesman, March 2018.Google Scholar
Tran, Delbert. “The Law of Attribution: Rules for Attribution the Source of a Cyber Attack.” The Yale Journal of Law & Technology 20 (2018): 376441.Google Scholar
U.S. Department of Defense. Memorandum for Chiefs of the Military Services: Joint Terminology for Cyberspace Operations. (n.d.): 1–16, accessed January 5, 2019, https://www.hsdl.org/?abstract&did=734860.Google Scholar
U.S. Department of Justice. Production Company Registers Under the Foreign Agent Registration Act as Agent for the Russian Government Entity Responsible for Broadcasting RT. (November 13, 2017), https://www.justice.gov/opa/pr/production-company-registers-under-foreign-agent-registration-act-agent-russian-government.Google Scholar
U.S. Department of Justice, Report on the Investigation into Russia Interference in the 2016 Presidential Election: Volume I of II, Washington D.C. (March 2019): 1, accessed April 19, 2019, https://www.justice.gov/storage/report.pdf.Google Scholar
U.S. Department of State, Section 231 of CAATSA (n.d.), accessed February 26, 2019, https://www.state.gov/t/isn/caatsa/.Google Scholar
Van De Velde, Jacqueline. “The Law of Cyber Interference in Elections.” Paper, Yale Law School, 2017, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf.CrossRefGoogle Scholar
Ventre, Daniel. Information Warfare. 2nd ed.London: UK ISTE Ltd, and John Wiley & Sons, 2016.CrossRefGoogle Scholar
Vincent, James. “New AI Research Makes It Easier to Create Fake Footage of Someone Speaking.” The Verge, July 12, 2017, https://www.theverge.com/2017/7/12/15957844/ai-fake-video-audio-speech-obama.Google Scholar
Von Heinegg, Wolff Heintschel. “Territorial Sovereignty and Neutrality in Cyberspace.” International Law Studies 89 (2013): 123156.Google Scholar
Vosoughi, Soroush, Roy, Deb, and Aral, Sinan. “The Spread of True and False News Online.” Science, March 9, 2018.CrossRefGoogle Scholar
Walton, Beatrice A.Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law.” The Yale Law Journal 126 (2017): 14601518.Google Scholar
Watts, Sean. “Low-Intensity Cyber Operations and the Principle of Non-Intervention,” in Cyber War: Law and Ethics for Virtual Conflicts, edited by Ohlin, Jens D., Govern, Kevin, and Finkelstein, Claire, 249284, Oxford: Oxford University Press, 2018.Google Scholar
Watts, Sean, and Richard, Theodore. “Baseline Territorial Sovereignty and Cyberspace.” Lewis & Clark Law Review 22, no. 3 (2018): 771840.Google Scholar
Weil, Prosper. “Towards Relative Normativity in International Law.” American Journal of International Law 77, no. 3 (1983): 413442.CrossRefGoogle Scholar
White, Jon. “Dismiss, Distort, Distract, and Dismay: Continuity and Change in Russian Disinformation.” Institute for European Studies: Vrije Universiteit Brussel, 13 May 2016, https://www.ies.be/node/3689.Google Scholar
Woolley, Samuel C., and Howard, Philip N., “Political Communication, Computational Propaganda, and Autonomous Agents,International Journal of Communication 10 (2016): 48824890.Google Scholar
Charter of the United Nations, 24 Oct., 1945, 1 U.N.T.S. 16 [U.N. Charter]Google Scholar
Convention on Biological Diversity, June 5, 1992, 1760 U.N.T.S. 79Google Scholar
Convention on Cybercrime, Nov. 23, 2001, 2296 U.N.T.S. 167 [Budapest Convention]Google Scholar
Convention on Long-Range Transboundary Air Pollution, Nov. 13, 1979, 1302 U.N.T.S. 217Google Scholar
United Nations Framework Convention on Climate Change, May 9, 1992, 1771 U.N.T.S. 107Google Scholar
Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43 (February 26)Google Scholar
Armed Activities on the Territory of the Congo (Dem. Rep. Congo v. Uganda), 2005 I.C.J 168 (December 19)Google Scholar
Case Concerning the Air Service Agreement of 27 March 1946 (U.S. v. Fr.), 18 R.I.A.A. 417 (Arb. Trib. 1979)Google Scholar
Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4 (April 9)Google Scholar
Gabčíkovo-Nagymaros Project (Hung./Slovk.), 1997 I.C.J. 7 (September 25)Google Scholar
Island of Palmas (Neth. v. U.S.), 2 R.I.A.A. 829 (Perm. Ct. Arb. 1928)Google Scholar
Legal Consequences of the Construction of a Wall in the Occupied PalestinianGoogle Scholar
Territory, Advisory Opinion, 2004 I.C.J. 136 (9 July)Google Scholar
Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226 (8 July)Google Scholar
Nationality Decrees Issued in Tunis and Morocco, Advisory Opinion, 1923 P.C.I.J. (ser. B) No. 4 (February 7)Google Scholar
Oil Platforms (Iran v. U.S.), 2003 I.C.J. 161 (6 November)Google Scholar
Oil Platforms (Iran v. U.S.), 1998 I.C.J. 190, Counter-Claim (Order of 10 March)Google Scholar
Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J 14 (June 27)Google Scholar
Rainbow Warrior (N.Z. v. Fr.), 20 R.I.A.A. 217 (Arb. Trib. 1990).Google Scholar
Responsibilities and Obligations of States Sponsoring Persons and Entities with Respect to Activities in the Area, Case No. 17, Advisory Opinion of Feb. 1, 2011, ITLOS Reports 10.Google Scholar
Responsibility of Germany for Damage Caused in the Portuguese Colonies in the South of Africa (Naulilaa Arbitration) (Port. v. Ger.), 2 R.I.A.A. 1011 (Arb. Trib. 1928)Google Scholar
S.S. Lotus (Fr. v. Turk.), 1927 P.C.I.J. (ser. A) No. 10, at 18 (September 7)Google Scholar
Trail Smelter (U.S. v. Can.), 3 R.I.A.A. 1905 (Arb. Trib. 1941)Google Scholar
U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia)Google Scholar
U.S. v. Viktor Borisovich Netyksho, et al. (1:18-cr-215, District of Columbia)Google Scholar
Attorney General's Office of the UK, Speech by the Attorney General Jeremy Wright on Cyber and International Law in the 21st Century (May 23, 2018), accessed April 4, 2019, https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century.Google Scholar
Communication – Tacking online disinformation: A European approach, European Commission, COM (2018) 236 final (April 26, 2018)Google Scholar
Declaration on the Inadmissibility of Intervention and Interference in the Internal Affairs of States, G.A. Res. 36/103, U.N. Doc. A/RES/36/103 (December 9, 1981)Google Scholar
Friendly Relations Declaration, G.A. Res. 2525 (XXV), U.N. Doc. A/RES/25/2625 (October 24, 1970)Google Scholar
International Code of Conduct for Information Security (Letter dated January 9, 2015 from the Permanent Representative of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the UN addressed to the Secretary-General), UN Doc. A/69/723 (January 13, 2015)Google Scholar
International Code of Conduct for Information Security (Letter dated September 12, 2011 from the Permanent Representative of China, the Russian Federation, Tajikistan and Uzbekistan to the UN addressed to the Secretary-General), UN Doc. A/66/359 (September 14, 2011)Google Scholar
International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Prevention of Transboundary Harm from Activities, U.N. Doc. A/56/10, at 148 (2001)Google Scholar
International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, U.N. Doc. A/56/10, at 31 (2001)Google Scholar
International Law Commission, Report on the Work of Its Seventieth Session, Draft Conclusion on Identification of Customary International Law with Commentaries, U.N. Doc. A/73/10, at 122 (2018)Google Scholar
Joint Declaration on Freedom of Expression and “Fake News,” Disinformation and Propaganda. The United Nations (UN) Special Rapporteur on Freedom of Opinion and Expression, the Organization for Security and Co-operation in Europe (OSCE) Representative on Freedom of the Media, the Organization of American States (OAS) Special Rapporteur on Freedom of Expression and the African Commission on Human and Peoples’ Rights (ACHPR) Special Rapporteur on Freedom of Expression and Access to Information (March 3, 2017)Google Scholar
Press Release, White House, Statement by the President on Actions in Response to Russian Malicious Cyber Activity and Harassment (December 29, 2016), accessed February 9, 2019,https://perma.cc/3XXD-8K5C.Google Scholar
Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, U.N. Doc. A/70/174 (July 22, 2015)Google Scholar
Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, U.N. Doc. A/68/98 (June 24, 2013)Google Scholar
Report of the independent High Level Group on fake news and online disinformation, A Multi-dimensional Approach to Disinformation, European Commission, March, 2018, doi: 10.2759/739290.CrossRefGoogle Scholar
The Sounding Board, The Sounding Board's Unanimous Final Opinion on the So- Called Code of Practice, September 24, 2018, https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation.Google Scholar
Computer Fraud and Abuse Act, 18 U.S.C. § 1030(a)(1) (1984)Google Scholar
Foreign Agents Registration Act, 22 U.S.C. § 611–621 (1938)Google Scholar
Addis, Adeno. “International Propaganda and Developing Countries.” Vanderbilt Journal of Transnational Law 21 (1988): 491548.Google Scholar
Arimatsu, Louise. “A Treaty for Governing Cyber-Weapons: Potential Benefits and Practical Limitations.” Paper presented at the 4th International Conference on Cyber Conflict, NATO CCD COE Publications, Tallinn, 2012: 91109.Google Scholar
Ashley, Nicolas C.Taming the Trolls: The Need for an International Legal Frame work to Regulate State Use of Disinformation on Social Media.” The Georgetown Law Journal Online 107 (2018): 3662.Google Scholar
Baezner, Marle, and Robin, Patrice. ”Hotspot Analysis: Cyber and Information Warfare in Elections in Europe.” Center for Security Studies (CSS), ETH Zurich, Zurich, 2017.Google Scholar
Baines, Paul, and Jones, Nigel. “Influence and Interference in Foreign Elections.” The RUSI Journal 163, no. 1 (2018): 1219.CrossRefGoogle Scholar
Bargaoanu, Alina, and Radu, Loredana. “Fake News or Disinformation 2.0: Some Insights into Romanians’ Digital Behaviour.” Romanian Journal of European Affairs 18, no. 1 (2018): 2438.Google Scholar
Baker, Peter. “White House Penalizes Russians over Election Meddling and Cyberattacks.” The New York Times, March 16, 2018, https://www.nytimes.com/2018/03/15/us/politics/trump-russia-sanctions.html.Google Scholar
Barth, Volker, and Homberg, Michael. “Geschichte und Theorie falscher Nachrichten.” Geschichte und Gesellschaft 44 (2018): 619642.CrossRefGoogle Scholar
Bouchard, Mikayla. “The Russia Investigation Is Completed: Here's What It All Means.” The New York Times, May 16, 2018, https://www.nytimes.com/2018/05/16/us/politics/russia-investigation-guide.html.Google Scholar
Russell, Buchan. “The International Legal Regulation of State-Sponsored Cyber Espionage.” in International Cyber Norms: Legal, Policy & Industry Perspectives, 6586, Tallinn, NATO CCD COE Publications, 2016.Google Scholar
Calabresi, Massimo. “Hacking Democracy: Inside Russia's Social Media War on America.” Time, May 29, 2017.Google Scholar
Calabresi, Massimo. “Hacking the Voter: What's Behind Russia's Effort to Influence the U.S. Election.” Time, October 10, 2016.Google Scholar
Carroll, Oliver. “St. Petersburg Troll Farm had 90 Dedicated Staff Working to Influence US Election Campaign.” Independent, October 17, 2017, https://perma.cc/BL34-WK9F.Google Scholar
Center for European Policy Analysis (CEPA). “Techniques.” Accessed January 5, 2019, http://infowar.cepa.org/Techniques.Google Scholar
Cerone, John. “A Taxonomy of Soft Law: Stipulating a Definition.” in Tracing the Roles of Soft Law in Human Rights. Edited by Lagoutte, Stéphanie, Lagoutte, Thomas Gammeltoft-Hansen, and Cerone, John, 1524, Oxford: Oxford University Press, 2016. Doi: 10.1093/acprof:oso/9780198791409.003.0002.CrossRefGoogle Scholar
Chesney, Bobby, and Citrone, Danielle. “Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security.” July 14, 2018, California Law Review 107, 2019, forthcoming. Available at SSRN: https://ssrn.com/abstract=3213954.CrossRefGoogle Scholar
Chinkin, Cristine M.The Challenge of Soft Law: Development and Change in International Law.” International and Comparative Law Quarterly 38, no. 4 (1989): 850866.CrossRefGoogle Scholar
Chircop, Luke. “A Due Diligence Standard of Attribution in Cyberspace.” International and Comparative Law Quarterly 67 (2018): 643668.CrossRefGoogle Scholar
Chung, John J.Nation-States and Their Operations in Planting of Malware in Other Countries: Is it Legal Under International Law,” University of Pittsburgh Law Review 80 (2018): 3367.CrossRefGoogle Scholar
Clark, David D., and Landau, Susan. “Untangling Attribution.” Harvard Journal of Law and Technology 2 (2011): 531562.Google Scholar
Corn, Gary P., and Taylor, Robert. “Sovereignty in the Age of Cyber.” AJIL Unbound 111 (2017): 207212.CrossRefGoogle Scholar
Couzigou, Irène. “Securing Cyber Space: The Obligation of States to Prevent Harmful International Cyber Operations.” International Review of Law, Computers & Technology 32, no. 1 (2018): 3757.CrossRefGoogle Scholar
Crawford, James, and Brownlie, Ian. Brownlie's Principles of Public International Law. 8th ed. (2012).Google Scholar
Crootof, Rebecca. “International Cybertorts: Expanding State Accountability in Cyberspace.” Cornell Law Review 103 (2018): 565644.Google Scholar
Darczewska, Jolanta, Zochowski, Piotr, Orttung, Robert W., Laruelle, Marlene, and Pörzge, Gemma. ”Russian Analytical Digest.” Center for Security Studies (CSS), ETH Zurich, Zurich, 2017.Google Scholar
Deeks, Ashley S.Confronting and Adapting: Intelligence Agencies and International Law.” Virginia Law Review 102, no. 3 (2016): 599685.Google Scholar
Egan, Brian J.International Law and Stability in Cyberspace.” Berkeley Journal of International Law 35 (2017): 169180.Google Scholar
Fallis, Don. “What is Disinformation?Library Trends 63, no. 3 (2015): 401426.CrossRefGoogle Scholar
Freedom House. Freedom on the Net 2017: Manipulating Social Media to Undermine Democracy. (2017), accessed March 7, 2019, https://freedomhouse.org/sites/default/files/FOTN_2017_Final.pdf.Google Scholar
Funke, Daniel. “A Guide to Anti-Misinformation Actions Around the World.” Poynter, (n.d.), accessed March 11, 2019, https://www.poynter.org/ifcn/anti-misinformation-actions/.Google Scholar
Gill, Terry D.Non-Intervention in the Cyber Context.” in Peacetime Regime for State Activities in Cyberspace. Edited by Ziolkowski, Katharina, Tallinn, Estonia: NATO Cooperative Cyber Defence Centre of Excellence, 2013.Google Scholar
Goldsmith, Jack. “Cybersecurity Treaties: A Sceptical View.” Paper, Hoover Institute at Stanford University, 2011, accessed March 6, 2019, http://media.hoover.org/sites/default/files/documents/FutureChallenges_Goldsmith.pdf.Google Scholar
Greenberg, Lawrence T., Goodman, Seymour E., and Soo Hoo, Kevin J.. Information Warfare and International Law. Washington, DC: National Defense University Press, 1998.Google Scholar
Greenemeier, Larry. “Seeking Address: Why Cyber Attacks are so Difficult to Trace Back to Hackers.” Scientific American (June 11, 2011), https://www.scientificamerican.com/article/tracking-cyber-hackers/.Google Scholar
Gunther, Richard, Beck, Paul A., and Nisbet, Erik C.. “Fake News May Have Contributed to Trump's 2016 Victory.” Study, Ohio State University, 2018, accessed February 5, 2019, https://www.documentcloud.org/documents/4429952-Fake-News-May-Have-Contributed-to-Trump-s-2016.html.Google Scholar
Hamilton, Logan. “Beyond Ballot-Stuffing: Current Gaps in International Law Regarding Foreign State Hacking to Influence a Foreign Election.” Wisconsin International Law Journal 35 (2017): 179204.Google Scholar
Hansen, Isabelle, and Lim, Darren J.. “Doxing Democracy: Influencing Elections Via Cyber Voter Interference.Contemporary Politics (2018): 2. Doi: 10.1080/13569775.2018.1493629.Google Scholar
Hollis, Duncan. “The Influence of War; The War of Influence,Temple Journal of International & Comparative Law 32 (2018): 3146.Google Scholar
Howard, David M.Can Democracy Withstand the Cyber Age: 1984 in the 21st Century.” Hastings Law Journal 69 (2018): 13551378.Google Scholar
Howard, Philip N., Ganesh, Bharath, and Liotsiou, Dimitra. The IRA, Social Media and Political Polarization in the United States, 2012-2018. Oxford, UK: Oxford Internet Institute, 2019.Google Scholar
Howard, Philip N., Kollanyi, Bence, Bradshaw, Samantha, and Neudert, Lisa-Maria. “Social Media, News and Political Information During the US Election: Was Polarizing Content Concentrated in Swing States?” Study, Oxford University, 2017, accessed February 27, 2019, https://arxiv.org/ftp/arxiv/papers/1802/1802.03573.pdf.Google Scholar
Jensen, Eric Talbot, and Watts, Sean. “A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destablizier.Texas Law Review 95 (2017).Google Scholar
Joint Chiefs of Staff. Information Operations. JP 3–13. (20 November 2014), accessed January 13, 2019, https://www.hsdl.org/?abstract&did=759867.Google Scholar
Kilovaty, Ido. “Doxfare: Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information.” Harvard National Security Journal 9 (2018): 146179.Google Scholar
Klabbers, Jan. “The Redundancy of Soft Law.” Nordic Journal of International Law 65 (1996): 168182.CrossRefGoogle Scholar
Koh, Harold H.The Trump Administration and International Law,Washburn Law Journal 56 (2017): 413469.Google Scholar
Koh, Tommy T. B.The Origins of the 1982 Convention on the Law of the Sea,Malaya Law Review 29 (1987): 117.Google Scholar
Kollanyi, Bence, Howard, Philip N., and Woolley, Samuel C., “Bots and Automation over Twitter During the U.S. Election,” (study, Oxford University, 2016), accessed February 27, 2019, http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2016/11/Data-Memo-US-Election.pdf.Google Scholar
Koven, Janet. “Bottom-up International Lawmaking: Reflections on the New Haven School of International Law.” The Yale Journal of International Law 32 (2007): 393420.Google Scholar
Lam, Christina. “A Slap on the Wrist: Combatting Russia's Cyber Attack on the 2016 U.S. Presidential Election.Boston College Law Review 59 (2018): 21672201.Google Scholar
Lazer, David, Baum, Matthew, Benkler, Yochai, Berinsky, Adam, Greenhill, Kelly, Menczer, Filippo, Metzger, Miriam, Nyhan, Brendan, Pennycook, Gordon, Rothschild, David, Schudson, Michael, Sloman, Steven, Sunstein, Cass, Thorson, Emily, Watts, Duncan, and Zittrain, Jonathan. “The Science of Fake News: Addressing Fake News Requires a Multidisciplinary Effort.” Science 359, 8 March 2018.Google Scholar
Lecher, Colin. “Senators Announce New Bill That Would Regulate Online Political Ads.” The Verge, October 19, 2017, https://www.theverge.com/2017/10/19/16502946/facebook-twitter-russia-honest-ads-act.Google Scholar
Levin, Dov H.Partisan Electoral Interventions by the Great Powers: Introducing the PEIG Dataset.Conflict Management and Peace Science 36, no. 1 (2019): 88106.CrossRefGoogle Scholar
Levin, Dov H.When the Great Power Gets a Vote: The Effects of Great Power Electoral Interventions on Election Results.” International Studies Quarterly 60 (2016): 189202.CrossRefGoogle Scholar
Lewis, James A.Multilateral Agreements to Constrain Cyberconflict.Arms Control Today 40, (2010). Accessed March 6, 2019, https://www.armscontrol.org/act/2010_06/Lewis.Google Scholar
Libicki, Martin. “The Coming of Cyber Espionage Norms.” Paper presented at the 9th International Conference on Cyber Conflict, NATO CCD COE Publications, Tallinn, 2017.CrossRefGoogle Scholar
Liu, Ian Yuying. “State Responsibility and Cyberattacks: Defining Due Diligence Obligations.” Indonesian Journal of International & Comparative Law 4 (2017): 191260.Google Scholar
Lomas, Dan. “Book Review Essay: The Zinoviev Letter.” International Affairs 95, no. 1 (2019): 201206.CrossRefGoogle Scholar
McDougal, Myres S., and Feliciano, Florentino P.. “International Coercion and World Public Order: The General Principles of the Law of War.” Yale Law Journal 67 (1958): 771845.CrossRefGoogle Scholar
McGonagle, Tarlach. “Fake News: False Fears or Real Concerns?Netherlands Quarterly of Human Rights 35, no. 4 (2017): 203209.CrossRefGoogle Scholar
McKune, Sarah. “An Analysis of the International Code of Conduct for Information Security.” The Citizen Lab, September 28, 2015, https://citizenlab.ca/2015/09/international-code-of-conduct/.Google Scholar
Melzer, Nils. Cyberwarfare and International Law. Geneva: United Nations Institute for Disarmament Research (UNIDIR), 2011.Google Scholar
Moore, Stephan. “Cyber Attacks and the Beginnings of an International Cyber Treaty.” North Carolina Journal of International Law and Commercial Regulation 39 (2013): 223257.Google Scholar
Muir, Lawrence L. Jr.Combatting Cyber-Attacks Through National Interest Diplomacy: A Trilateral Treaty with Teeth.Washington & Lee Law Review Online 68, (2012): 73106.Google Scholar
NATO Cooperative Cyber Defence Centre of Excellence. Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Edited by Schmitt, Michael N., and Vihul, Liis. 2nd ed.Cambridge, UK: Cambridge University Press, 2017.CrossRefGoogle Scholar
Office of the Director of National Intelligence (ODNI). Assessing Russian Activities and Intentions in Recent US Elections. ICA 2017-01D, (6 January 2017), accessed January 30, 2019, https://www.dni.gov/files/documents/ICA_2017_01.pdf.Google Scholar
Ohlin, Jens D.Did Russian Cyber Interference in the 2016 Election Violate International Law?Texas Law Review 95 (2017): 15791598.Google Scholar
Oppenheim, Lassa. Oppenheim's International Law. Edited by Jennings, Sir Robert and Watts, Sir Arthur, 9th ed.London: Longmans, 2008.Google Scholar
Ostroukh, Andrey. “Putin Tells U.S. to Send Evidence of Vote Meddling.” Reuters, March 3, 2018, https://www.reuters.com/article/us-usa-trump-putin-reaction/putin-tells-u-s-to-send-evidence-of-vote-meddling-idUSKCN1GF0AS.Google Scholar
Pagallo, Ugo. “Cyber Force and the Role of Sovereign States in Informational Warfare.” Philosophy & Technology 28, no. 3 (2015): 407425.CrossRefGoogle Scholar
Payne, Christian, and Finlay, Lorraine. “Addressing Obstacles to Cyber-Attribution: A Model Based on State Response to Cyber-Attack.” The George Washington International Law Review 49 (2017): 535568.Google Scholar
Payne, Thomas. “Teaching Old Law New Tricks: Applying and Adapting State Responsibility to Cyber Operations.” Lewis & Clark Law Review 20, no. 2 (2016): 683715.Google Scholar
Perina, Alexandra H.Black Holes and Open Secrets: The Impact of Covert Action on International Law.Columbia Journal of Transnational Law 53 (2015): 507583.Google Scholar
Pisillo-Mazzeschi, Ricardo. “The Due Diligence Rule and the Nature of International State Responsibility.” German Yearbook of International Law 36 (1993): 951.Google Scholar
Prier, Jarred. “Commanding the Trend: Social Media as Information Warfare.” Strategic Studies Quarterly 11, no. 4 (2017): 5585.Google Scholar
Prokop, Andrew. “All of Robert Mueller's Indictments and Plea Deals in the Russia Investigation So Far.” Vox, January 25, 2019, https://www.vox.com/policy-and-politics/2018/2/20/17031772/mueller-indictments-grand-jury.Google Scholar
Roscini, Marco. “Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations” in Cyber War: Law and Ethics for Virtual Conflicts. Edited by Ohlin, Jens, Govenr, Kevin, and Finkelstein, Claire, 215273Cambridge, UK: Cambridge University Press, 2015. Doi: 10.1093/acprof:oso/9780198717492.001.0001.Google Scholar
Sander, Barrie. “Democracy Under the Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections.Chinese Journal of International Law 18 (2019).CrossRefGoogle Scholar
Sanger, David E. “Obama Strikes Back at Russia for Election Hacking.” The New York Times, December 29, 2016, https://www.nytimes.com/2016/12/29/us/politics/russia-election-hacking-sanctions.html.Google Scholar
Sanger, David E., and Fackler, Martin. “N.S.A. Breached North Korean Networks Before Sony Attack, Officials Say.” New York Times, January 18, 2015, https://www.nytimes.com/2015/01/19/world/asia/nsa-tapped-into-north-korean-networks-before-sony-attack-officials-say.html.Google Scholar
Sanovich, Sergey. “Computational Propaganda in Russia: The Origins of Digital Misinformation.” Working paper no. 2017.3, Oxford Internet Institute, Oxford University, Oxford, 2017, accessed February 27, 2019, http://comprop.oii.ox.ac.uk/wp-content/uploads/sites/89/2017/06/Comprop-Russia.pdf.Google Scholar
Schiffrin, Anya. “Disinformation and Democracy: The Internet Transformed Protest but did not Improve Democracy.” Journal of International Affairs 71, no. 1 (2017): 117125.Google Scholar
Schmitt, Michael N.Classification of Cyber Conflict.” Journal of Conflict & Security Law 17, no. 2 (2012): 245260. Doi:10.1093/jcsl/krs018.CrossRefGoogle Scholar
Schmitt, Michael N.Cyber Operations and the Jus Ad Bellum Revisited,Villanova Law Review 56, no. 3 (2011): 569606.Google Scholar
Schmitt, Michael N.Grey Zones in the International Law of Cyberspace.The Yale Journal of International Law Online 42 (2017). Available at SSRN: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3180687.Google Scholar
Schmitt, Michael N.Peacetime Cyber Response and Wartime Cyber Operations Under International Law: An Analytical Vade Mecum.” Harvard National Security Journal 8 (2017): 239280.Google Scholar
Schmitt, Michael N.Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law.Chicago Journal of International Law 19, no. 1 (2018): 3067.Google Scholar
Schmitt, Michael N., and Vihul, Liis. “Respect for Sovereignty in Cyberspace.” Texas Law Review 95 (2017): 16391670.Google Scholar
Schmitt, Michael N., and Vihul, Liis. “Sovereignty in Cyberspace: Lex Lata vel Non.” AJIL Unbound 111 (2017): 213218.CrossRefGoogle Scholar
Shackelford, Scott J., and Andres, Richard B.. “State Responsibility for Cyber Attacks: Competing Standards for a Growing Problem.” Georgetown Journal of International Law 42 (2011): 9711016.Google Scholar
Shackelford, Scott J., Russell, Scott, and Kuehn, Andreas. “Unpacking the International Law on Cybersecurity Due Diligence: Lessons from the Public and Private Sectors.Chicago Journal of International Law 17, no. 1 (2016): 150.Google Scholar
Shaffer, Gregory C., and Pollack, Mark A.. “Hard Versus Soft Law in International Security.” Boston College Law Review 52 (2011): 11471241.Google Scholar
Shane, Scott. “Russia Isn't the Only One Meddling in Elections: We Do It, Too.” The New York Times, February 17, 2018, https://www.nytimes.com/2018/02/17/sunday-review/russia-isnt-the-only-one-meddling-in-elections-we-do-it-too.html.Google Scholar
Silverman, Craig. “This Analysis Shows How Viral Fake Election News Stories Outperformed Real News on Facebook.” BuzzFeed, November 16, 2016, https://www.buzzfeednews.com/article/craigsilverman/viral-fake-election-news-outperformed-real-news-on-facebook#.wkLAZDD3pa.Google Scholar
Singer, Peter W., and Friedman, Allan. Cybersecurity and Cyberwar: What Everyone Needs to Know. Oxford, UK: Oxford University Press, 2014.Google Scholar
Smith-Spark, Laura, and Gigova, Radina. “Russia to Expand American Blacklist After New US Sanctions.” CNN, March 16, 2018, https://perma.cc/DY52-LW48.Google Scholar
Solon, Olivia, and Siddiqui, Sabrina. “Russia-backed Facebook posts reached 126m Americans during US election.” The Guardian, March 26, 2019, https://www.theguardian.com/technology/2017/oct/30/facebook-russia-fake-accounts-126-million.Google Scholar
Swaine, Jon. “Twitter Admits Far More Russian Bots Posted On Election Than It Had Disclosed.” The Guardian, January 20, 2018, https://www.theguardian.com/technology/2018/jan/19/twitter-admits-far-more-russian-bots-posted-on-election-than-it-had-disclosed.Google Scholar
Tandoc, Edson C. Jr., Lim, Zheng Wei, and Ling, Richard. “Defining Fake News.Digital Journalism 6, no. 2 (2018): 137153.CrossRefGoogle Scholar
Taylor, Philip M.Munition of the Mind: A History of Propaganda. Manchester University Press, 2003.Google Scholar
Tharoor, Ishaan. “The Long History of the U.S. Interfering with Elections Elsewhere.” Washington Post, October 13, 2016, https://www.washingtonpost.com/news/worldviews/wp/2016/10/13/the-long-history-of-the-u-s-interfering-with-elections-elsewhere/?utm_term=.c7547589f5b0.Google Scholar
The EastWest Institute, Critical Terminology Foundations 2: The Russia–U.S. Bilateral on Cybersecurity. Edited by Goodwin, James B. III, Kulpin, Andrey, Rauscher, Karl F., and Yaschenko, Valery. New York, NY: The EastWest Institute, 2014.Google Scholar
Thielbörger, Pierre, and Ramsahye, Robin. “Hybrid Warfare: Zwischen Cyber-Attacken und Manipulation von Informationen.” Die Friedens-Warte 90, no. 1/2 (2015): 81112.Google Scholar
Tinline, Phil. “The Art of the Big Lie”: From the Reichstag Fire to Stalin's Show Trials, the Craft of Disinformation is Nothing New.” New Statesman, March 2018.Google Scholar
Tran, Delbert. “The Law of Attribution: Rules for Attribution the Source of a Cyber Attack.” The Yale Journal of Law & Technology 20 (2018): 376441.Google Scholar
U.S. Department of Defense. Memorandum for Chiefs of the Military Services: Joint Terminology for Cyberspace Operations. (n.d.): 1–16, accessed January 5, 2019, https://www.hsdl.org/?abstract&did=734860.Google Scholar
U.S. Department of Justice. Production Company Registers Under the Foreign Agent Registration Act as Agent for the Russian Government Entity Responsible for Broadcasting RT. (November 13, 2017), https://www.justice.gov/opa/pr/production-company-registers-under-foreign-agent-registration-act-agent-russian-government.Google Scholar
U.S. Department of Justice, Report on the Investigation into Russia Interference in the 2016 Presidential Election: Volume I of II, Washington D.C. (March 2019): 1, accessed April 19, 2019, https://www.justice.gov/storage/report.pdf.Google Scholar
U.S. Department of State, Section 231 of CAATSA (n.d.), accessed February 26, 2019, https://www.state.gov/t/isn/caatsa/.Google Scholar
Van De Velde, Jacqueline. “The Law of Cyber Interference in Elections.” Paper, Yale Law School, 2017, accessed January 19, 2019, https://law.yale.edu/system/files/area/center/global/document/van_de_velde_cyber_interference_in_elections_06.14.2017.pdf.CrossRefGoogle Scholar
Ventre, Daniel. Information Warfare. 2nd ed.London: UK ISTE Ltd, and John Wiley & Sons, 2016.CrossRefGoogle Scholar
Vincent, James. “New AI Research Makes It Easier to Create Fake Footage of Someone Speaking.” The Verge, July 12, 2017, https://www.theverge.com/2017/7/12/15957844/ai-fake-video-audio-speech-obama.Google Scholar
Von Heinegg, Wolff Heintschel. “Territorial Sovereignty and Neutrality in Cyberspace.” International Law Studies 89 (2013): 123156.Google Scholar
Vosoughi, Soroush, Roy, Deb, and Aral, Sinan. “The Spread of True and False News Online.” Science, March 9, 2018.CrossRefGoogle Scholar
Walton, Beatrice A.Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law.” The Yale Law Journal 126 (2017): 14601518.Google Scholar
Watts, Sean. “Low-Intensity Cyber Operations and the Principle of Non-Intervention,” in Cyber War: Law and Ethics for Virtual Conflicts, edited by Ohlin, Jens D., Govern, Kevin, and Finkelstein, Claire, 249284, Oxford: Oxford University Press, 2018.Google Scholar
Watts, Sean, and Richard, Theodore. “Baseline Territorial Sovereignty and Cyberspace.” Lewis & Clark Law Review 22, no. 3 (2018): 771840.Google Scholar
Weil, Prosper. “Towards Relative Normativity in International Law.” American Journal of International Law 77, no. 3 (1983): 413442.CrossRefGoogle Scholar
White, Jon. “Dismiss, Distort, Distract, and Dismay: Continuity and Change in Russian Disinformation.” Institute for European Studies: Vrije Universiteit Brussel, 13 May 2016, https://www.ies.be/node/3689.Google Scholar
Woolley, Samuel C., and Howard, Philip N., “Political Communication, Computational Propaganda, and Autonomous Agents,International Journal of Communication 10 (2016): 48824890.Google Scholar
Charter of the United Nations, 24 Oct., 1945, 1 U.N.T.S. 16 [U.N. Charter]Google Scholar
Convention on Biological Diversity, June 5, 1992, 1760 U.N.T.S. 79Google Scholar
Convention on Cybercrime, Nov. 23, 2001, 2296 U.N.T.S. 167 [Budapest Convention]Google Scholar
Convention on Long-Range Transboundary Air Pollution, Nov. 13, 1979, 1302 U.N.T.S. 217Google Scholar
United Nations Framework Convention on Climate Change, May 9, 1992, 1771 U.N.T.S. 107Google Scholar
Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosn. & Herz. v. Serb. & Montenegro), 2007 I.C.J. 43 (February 26)Google Scholar
Armed Activities on the Territory of the Congo (Dem. Rep. Congo v. Uganda), 2005 I.C.J 168 (December 19)Google Scholar
Case Concerning the Air Service Agreement of 27 March 1946 (U.S. v. Fr.), 18 R.I.A.A. 417 (Arb. Trib. 1979)Google Scholar
Corfu Channel (U.K. v. Alb.), 1949 I.C.J. 4 (April 9)Google Scholar
Gabčíkovo-Nagymaros Project (Hung./Slovk.), 1997 I.C.J. 7 (September 25)Google Scholar
Island of Palmas (Neth. v. U.S.), 2 R.I.A.A. 829 (Perm. Ct. Arb. 1928)Google Scholar
Legal Consequences of the Construction of a Wall in the Occupied PalestinianGoogle Scholar
Territory, Advisory Opinion, 2004 I.C.J. 136 (9 July)Google Scholar
Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion, 1996 I.C.J. 226 (8 July)Google Scholar
Nationality Decrees Issued in Tunis and Morocco, Advisory Opinion, 1923 P.C.I.J. (ser. B) No. 4 (February 7)Google Scholar
Oil Platforms (Iran v. U.S.), 2003 I.C.J. 161 (6 November)Google Scholar
Oil Platforms (Iran v. U.S.), 1998 I.C.J. 190, Counter-Claim (Order of 10 March)Google Scholar
Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 I.C.J 14 (June 27)Google Scholar
Rainbow Warrior (N.Z. v. Fr.), 20 R.I.A.A. 217 (Arb. Trib. 1990).Google Scholar
Responsibilities and Obligations of States Sponsoring Persons and Entities with Respect to Activities in the Area, Case No. 17, Advisory Opinion of Feb. 1, 2011, ITLOS Reports 10.Google Scholar
Responsibility of Germany for Damage Caused in the Portuguese Colonies in the South of Africa (Naulilaa Arbitration) (Port. v. Ger.), 2 R.I.A.A. 1011 (Arb. Trib. 1928)Google Scholar
S.S. Lotus (Fr. v. Turk.), 1927 P.C.I.J. (ser. A) No. 10, at 18 (September 7)Google Scholar
Trail Smelter (U.S. v. Can.), 3 R.I.A.A. 1905 (Arb. Trib. 1941)Google Scholar
U.S. v. Internet Research Agency, et al. (1:18-cr-32, District of Columbia)Google Scholar
U.S. v. Viktor Borisovich Netyksho, et al. (1:18-cr-215, District of Columbia)Google Scholar
Attorney General's Office of the UK, Speech by the Attorney General Jeremy Wright on Cyber and International Law in the 21st Century (May 23, 2018), accessed April 4, 2019, https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century.Google Scholar
Communication – Tacking online disinformation: A European approach, European Commission, COM (2018) 236 final (April 26, 2018)Google Scholar
Declaration on the Inadmissibility of Intervention and Interference in the Internal Affairs of States, G.A. Res. 36/103, U.N. Doc. A/RES/36/103 (December 9, 1981)Google Scholar
Friendly Relations Declaration, G.A. Res. 2525 (XXV), U.N. Doc. A/RES/25/2625 (October 24, 1970)Google Scholar
International Code of Conduct for Information Security (Letter dated January 9, 2015 from the Permanent Representative of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the UN addressed to the Secretary-General), UN Doc. A/69/723 (January 13, 2015)Google Scholar
International Code of Conduct for Information Security (Letter dated September 12, 2011 from the Permanent Representative of China, the Russian Federation, Tajikistan and Uzbekistan to the UN addressed to the Secretary-General), UN Doc. A/66/359 (September 14, 2011)Google Scholar
International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Prevention of Transboundary Harm from Activities, U.N. Doc. A/56/10, at 148 (2001)Google Scholar
International Law Commission, Report on the Work of Its Fifty-Third Session, Draft Articles on Responsibility of States for Internationally Wrongful Acts, U.N. Doc. A/56/10, at 31 (2001)Google Scholar
International Law Commission, Report on the Work of Its Seventieth Session, Draft Conclusion on Identification of Customary International Law with Commentaries, U.N. Doc. A/73/10, at 122 (2018)Google Scholar
Joint Declaration on Freedom of Expression and “Fake News,” Disinformation and Propaganda. The United Nations (UN) Special Rapporteur on Freedom of Opinion and Expression, the Organization for Security and Co-operation in Europe (OSCE) Representative on Freedom of the Media, the Organization of American States (OAS) Special Rapporteur on Freedom of Expression and the African Commission on Human and Peoples’ Rights (ACHPR) Special Rapporteur on Freedom of Expression and Access to Information (March 3, 2017)Google Scholar
Press Release, White House, Statement by the President on Actions in Response to Russian Malicious Cyber Activity and Harassment (December 29, 2016), accessed February 9, 2019,https://perma.cc/3XXD-8K5C.Google Scholar
Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, U.N. Doc. A/70/174 (July 22, 2015)Google Scholar
Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, U.N. Doc. A/68/98 (June 24, 2013)Google Scholar
Report of the independent High Level Group on fake news and online disinformation, A Multi-dimensional Approach to Disinformation, European Commission, March, 2018, doi: 10.2759/739290.CrossRefGoogle Scholar
The Sounding Board, The Sounding Board's Unanimous Final Opinion on the So- Called Code of Practice, September 24, 2018, https://ec.europa.eu/digital-single-market/en/news/code-practice-disinformation.Google Scholar
Computer Fraud and Abuse Act, 18 U.S.C. § 1030(a)(1) (1984)Google Scholar
Foreign Agents Registration Act, 22 U.S.C. § 611–621 (1938)Google Scholar