{"id":2473,"date":"2024-12-14T03:49:41","date_gmt":"2024-12-14T03:49:41","guid":{"rendered":"https:\/\/law.temple.edu\/ilit\/?p=2473"},"modified":"2026-01-22T17:36:33","modified_gmt":"2026-01-22T17:36:33","slug":"a-victims-perspective-on-international-law-in-cyberspace","status":"publish","type":"post","link":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/","title":{"rendered":"A Victim\u2019s Perspective on International Law in Cyberspace"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.lawfaremedia.org\/contributors\/ccarpenter\">Chris Carpenter<\/a>, <a href=\"https:\/\/www.lawfaremedia.org\/contributors\/dhollis\">Duncan B. Hollis<\/a><\/p>\n\n\n\n<p>Costa Rica\u2019s recent position paper improves transparency on the country\u2019s legal views and provides a framework for future dialogue with other states.<\/p>\n\n\n\n<p>In the spring of 2022, two significant <a href=\"https:\/\/www.wired.com\/story\/costa-rica-ransomware-conti\/\">ransomware operations<\/a> targeted 27 Costa Rican government bodies, in addition to the country\u2019s health care system. Costa Rica\u2019s government <a href=\"https:\/\/securityintelligence.com\/news\/costa-rica-state-emergency-ransomware\/\">refused to pay the ransom<\/a> demanded. In light of the hackers\u2019 threats to leak sensitive information from the data they encrypted, many government-run systems had to be taken offline (including those related to tax collection, medicine, and social security). Costa Rica\u2019s president, Rodrigo Chaves, declared that Costa Rica was \u201cat war\u201d with the attackers (who were affiliated with two Russian-language-speaking groups, known as Conti and Hive). The Costa Rican government has spent the last year working on recovery and remediation, with technical assistance from state governments (namely, <a href=\"https:\/\/www.state.gov\/reward-offers-for-information-to-bring-conti-ransomware-variant-co-conspirators-to-justice\/\">the United States<\/a> and <a href=\"https:\/\/www.jdsupra.com\/legalnews\/ransomware-reduces-costa-rica-to-pen-6866829\/\">Spain<\/a>) and <a href=\"https:\/\/cyberlaw.ccdcoe.org\/wiki\/Costa_Rica_ransomware_attack_(2022)\">industry<\/a>.&nbsp;<\/p>\n\n\n\n<p>In light of these events, it is unsurprising that Costa Rica just released one of the most robust <a href=\"https:\/\/docs-library.unoda.org\/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)\/Costa_Rica_-_Position_Paper_-_International_Law_in_Cyberspace.pdf\">position papers<\/a> on the applicability of international law in cyberspace. In doing so, it becomes (by our count) the 36th state to offer an official national position on the subject. Thus, Costa Rica joins a trend\u2014though not yet a large sample\u2014in which states appear increasingly interested in improving transparency on their respective legal views and providing a framework for future dialogue (and, perhaps, agreement). &nbsp;<\/p>\n\n\n\n<p>Costa Rica\u2019s statement tracks the vast majority of its predecessors in acknowledging the applicability of international law \u201cin its entirety\u201d to information and communication technologies (ICTs), including the prohibition on the use of force and international humanitarian law (IHL). It tackles many of the same topics covered in other states\u2019 national statements\u2014such as nonintervention, sovereignty, countermeasures, and due diligence\u2014while raising others that have not received as much attention\u2014including human rights, peaceful settlement of disputes, and neutrality. Costa Rica has clearly spent time examining other states\u2019 statements and, in particular, \u201cacademic projects on the application of international law to cyber operations\u201d including the <a href=\"https:\/\/www.elac.ox.ac.uk\/the-oxford-process\/\">Oxford Process<\/a> (for which one of us is a co-convenor), the <a href=\"https:\/\/www.cambridge.org\/core\/books\/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations\/E4FFD83EA790D7C4C3C28FC9CA2FB6C9\">Tallinn Manuals<\/a>, and the <a href=\"https:\/\/cyberlaw.ccdcoe.org\/wiki\/Main_Page\">Cyberlaw Toolkit<\/a>.<\/p>\n\n\n\n<p>Temple University Law School\u2019s <a href=\"https:\/\/law.temple.edu\/ilit\/\">Institute for Law, Innovation, and Technology<\/a>, known as iLIT, has been working in conjunction with American University\u2019s <a href=\"https:\/\/www.wcl.american.edu\/impact\/initiatives-programs\/techlaw\/\">Tech, Law, and Security program<\/a> to catalog and analyze the three dozen existing national statements on the application of international law. We were thus pleased to see Costa Rica\u2019s elaborate statement. It provides an opportunity not only to engage with Costa Rica\u2019s novel contributions but also to evaluate the overall state of play on the operation of international law in cyberspace.&nbsp;<\/p>\n\n\n\n<p><strong>Sovereignty&nbsp;<\/strong><\/p>\n\n\n\n<p>Costa Rica joins the majority of states that have addressed the topic of sovereignty (including <a href=\"https:\/\/cyberlaw.ccdcoe.org\/wiki\/National_position_of_Brazil_(2021)\">Brazil<\/a>, <a href=\"https:\/\/www.international.gc.ca\/world-monde\/issues_development-enjeux_developpement\/peace_security-paix_securite\/cyberspace_law-cyberespace_droit.aspx?lang=eng\">Canada<\/a>, <a href=\"https:\/\/www.mofa.go.jp\/files\/100200935.pdf\">Japan<\/a>, and, most recently, <a href=\"https:\/\/www.dfa.ie\/media\/dfa\/ourrolepolicies\/internationallaw\/Ireland---National-Position-Paper.pdf\">Ireland<\/a>) by categorizing it as a rule that can be breached by other states\u2019 cyber operations. In doing so, Costa Rica\u2019s statement further isolates the <a href=\"https:\/\/www.gov.uk\/government\/publications\/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement\/application-of-international-law-to-states-conduct-in-cyberspace-uk-statement\">United Kingdom<\/a>\u2014which has <a href=\"https:\/\/www.gov.uk\/government\/speeches\/cyber-and-international-law-in-the-21st-century\">doubled-down on the idea<\/a> that sovereignty is better thought of as <a href=\"https:\/\/www.gov.uk\/government\/speeches\/international-law-in-future-frontiers\">a background principle informing other rules<\/a>, noting that it \u201cdoes not consider that the general concept of sovereignty by itself provides a sufficient or clear basis for extrapolating a specific rule or additional prohibition for cyber conduct.\u201d &nbsp;<\/p>\n\n\n\n<p>What cyber operations will violate sovereignty? Here, too, <a href=\"https:\/\/docs-library.unoda.org\/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)\/Costa_Rica_-_Position_Paper_-_International_Law_in_Cyberspace.pdf\">Costa Rica\u2019s statement<\/a> reaches widely, including not only physical attacks but also cyber operations that trigger a \u201closs of functionality&nbsp;of cyber infrastructure located in the victim State.\u201d This position makes sense given the nonphysical (but extensive) economic damage Costa Rica suffered in the 2022 ransomware attacks. Similarly, Costa Rica includes an \u201cusurpation of inherently governmental functions\u201d as a violation of sovereignty, tracking the <a href=\"https:\/\/www.cambridge.org\/core\/books\/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations\/E4FFD83EA790D7C4C3C28FC9CA2FB6C9\">Tallinn Manual 2.0<\/a>, and including operations \u201cinterfering with a State\u2019s democratic processes, such as elections, responses to a national security or health emergency, such as the COVID-19 pandemic, and its choice of foreign policy.\u201d Costa Rica\u2019s position differs from the statement immediately preceding its own (from <a href=\"https:\/\/www.dfa.ie\/media\/dfa\/ourrolepolicies\/internationallaw\/Ireland---National-Position-Paper.pdf\">Ireland<\/a>) that had not recognized usurpation of governmental functions as a sovereignty violating condition. &nbsp;<\/p>\n\n\n\n<p>Where Costa Rica really separates itself from other states is in its willingness to envision violations of state sovereignty via cyber espionage. To be clear, Costa Rica recognizes that \u201cit is often difficult to technically distinguish between a mere data-gathering operation from an operation penetrating a governmental system in order to interfere with a State\u2019s sovereign functions. Real-world examples show that, once a piece of malware successfully enters a system or network, it remains a latent threat to its integrity.\u201d But rather than default to a position allowing espionage, given the difficulty in making such distinctions, Costa Rica\u2019s statement cuts in the other direction, suggesting that at least some surveillance operations and cyber espionage can be conducted in a manner that breaches state sovereignty and other rules of international law. As such, Costa Rica stands apart from many other states\u2014<a href=\"https:\/\/ccdcoe.org\/uploads\/2018\/10\/Germany_on-the-application-of-international-law-in-cyberspace-data_English.pdf\">Germany<\/a>, <a href=\"https:\/\/www.mofa.go.jp\/files\/100200935.pdf\">Japan<\/a>, <a href=\"https:\/\/www.gov.pl\/attachment\/3203b18b-a83f-4b92-8da2-fa0e3b449131\">Poland<\/a>, and <a href=\"https:\/\/digital-commons.usnwc.edu\/cgi\/viewcontent.cgi?article=2957&amp;context=ils\">Israel<\/a>, to name a few\u2014that declined to expressly tie surveillance operations to potential violations of state sovereignty. In fact, Costa Rica is the first state to adopt this position in such clear and unequivocal terms.<\/p>\n\n\n\n<p><strong>Nonintervention<\/strong><\/p>\n\n\n\n<p>Costa Rica\u2019s position, like most of the other national statements, relies on the 1986 International Court of Justice case <a href=\"https:\/\/www.icj-cij.org\/sites\/default\/files\/case-related\/70\/070-19860627-JUD-01-00-EN.pdf\"><em>Nicaragua v. United States<\/em><\/a> and the UN General Assembly\u2019s <a href=\"https:\/\/digitallibrary.un.org\/record\/202170?ln=en\">Friendly Relations Declaration<\/a> to identify a prohibition on intervention that includes behavior below the use-of-force threshold, which involves coercive interference in another state\u2019s domestic affairs (the <em>domaine r\u00e9serv\u00e9<\/em>). As with sovereignty, Costa Rica is again expansive in its reading of what conduct will violate this obligation, including \u201cransomware attacks crippling or simply interfering with a State\u2019s ability to run public services, such as finance, education, and social security.\u201d Relying on the <a href=\"https:\/\/www.cambridge.org\/core\/books\/tallinn-manual-20-on-the-international-law-applicable-to-cyber-operations\/E4FFD83EA790D7C4C3C28FC9CA2FB6C9\">Tallinn Manual 2.0<\/a>, Costa Rica suggests an intervention can also occur \u201cwhen [a State] engages in or supports subversive or hostile propaganda or the dissemination of false news that interfere in the internal or external affairs of another State\u201d and (joining <a href=\"https:\/\/dpmc.govt.nz\/sites\/default\/files\/2020-12\/The%2520Application%2520of%2520International%2520Law%2520to%2520State%2520Activity%2520in%2520Cyberspace.pdf\">New Zealand<\/a>, <a href=\"https:\/\/www.internationalcybertech.gov.au\/our-work\/annexes\/annex-b\">Australia<\/a>, <a href=\"https:\/\/cyberlaw.ccdcoe.org\/wiki\/National_position_of_Brazil_(2021)\">Brazil<\/a>, and others) \u201cforeign election interference.\u201d Thus, Costa Rica breaks ahead of the pack in suggesting that the principle of nonintervention can be applied as a tool to respond to state-sponsored mis- and disinformation campaigns. Furthermore, in Costa Rica\u2019s view, the attempted cyber intervention does not need to be successful in order to violate this principle\u2014intent to coerce is sufficient.&nbsp;<\/p>\n\n\n\n<p><strong>Countermeasures<\/strong><\/p>\n\n\n\n<p>Countermeasures involve otherwise internationally wrongful conduct whose wrongfulness is precluded when done in response to a prior internationally wrongful act (and various other substantive and process conditions are satisfied). Costa Rica\u2019s statement acknowledges the substantive and procedural constraints articulated by the <a href=\"https:\/\/legal.un.org\/ilc\/texts\/instruments\/english\/commentaries\/9_6_2001.pdf\">UN International Law Commission<\/a> (for example, that countermeasures must not be punitive, must be proportionate, and must not disrupt fundamental human rights).&nbsp;At the same time, Costa Rica\u2019s position acknowledges that the procedural requirements\u2014namely (a) summation (calling on the state to cease its wrongful acts), (b) notice to that state of the intention to take countermeasures, and (c) the offer to negotiate\u2014\u201cdo not have to be met when compliance with them would defeat the purpose of the intended countermeasures.\u201d Other states have opined on exceptions to procedural requirements, albeit in slightly different terms (such as <a href=\"https:\/\/www.esteri.it\/mae\/resource\/doc\/2021\/11\/italian_position_paper_on_international_law_and_cyberspace.pdf\">Italy<\/a>, <a href=\"https:\/\/documents.unoda.org\/wp-content\/uploads\/2021\/12\/French-position-on-international-law-applied-to-cyberspace.pdf\">France<\/a>, <a href=\"https:\/\/www.government.nl\/binaries\/government\/documenten\/parliamentary-documents\/2019\/09\/26\/letter-to-the-parliament-on-the-international-legal-order-in-cyberspace\/international-law-in-the-cyberdomain-netherlands.pdf\">Netherlands<\/a>, and <a href=\"https:\/\/cyberlaw.ccdcoe.org\/wiki\/National_position_of_Norway_(2021)\">Norway<\/a>).&nbsp;<\/p>\n\n\n\n<p>More importantly, <a href=\"https:\/\/docs-library.unoda.org\/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)\/Costa_Rica_-_Position_Paper_-_International_Law_in_Cyberspace.pdf\">Costa Rica\u2019s statement<\/a> weighs in (positively) on the possibility of states employing countermeasures <em>collectively<\/em>, a position championed originally by <a href=\"https:\/\/www.justsecurity.org\/64490\/estonia-speaks-out-on-key-rules-for-cyberspace\/\">Estonia<\/a> and supported more recently by <a href=\"https:\/\/www.dfa.ie\/media\/dfa\/ourrolepolicies\/internationallaw\/Ireland---National-Position-Paper.pdf\">Ireland<\/a>. Costa Rica\u2019s statement signals support for the idea of collective countermeasures not only for violations of obligations <em>erga omnes&nbsp;<\/em>but also at the request of a victim state. In contrast, states such as <a href=\"https:\/\/documents.unoda.org\/wp-content\/uploads\/2021\/12\/French-position-on-international-law-applied-to-cyberspace.pdf\">France<\/a> and <a href=\"https:\/\/www.international.gc.ca\/world-monde\/issues_development-enjeux_developpement\/peace_security-paix_securite\/cyberspace_law-cyberespace_droit.aspx?lang=eng\">Canada<\/a> have suggested collective countermeasures are not permitted by international law at present, while <a href=\"https:\/\/cyberlaw.ccdcoe.org\/wiki\/National_position_of_Brazil_(2021)\">Brazil<\/a> has poured cold water on the idea of countermeasures in general. &nbsp;<\/p>\n\n\n\n<p><strong>Due Diligence<\/strong>&nbsp;&nbsp;<\/p>\n\n\n\n<p>The U.S. has notably declined to endorse the idea of due diligence as a rule of international law governing cyberspace, supporting it as a \u201cvoluntary\u201d norm instead in the influential <a href=\"https:\/\/digitallibrary.un.org\/record\/799853?ln=en\">2015 UN Group of Governmental Experts Report<\/a>. Costa Rica, in contrast, comes out strongly supporting due diligence as a standard that manifests across <a href=\"https:\/\/www.elac.ox.ac.uk\/wp-content\/uploads\/2022\/02\/Final-Report-BSG-ELAC-CyberDueDiligenceInInternationalLaw.pdf\">at least four different areas of international law<\/a>. Thus, Costa Rica cites due diligence as including the <a href=\"https:\/\/www.icj-cij.org\/case\/1\">Corfu Channel<\/a> standard (a state is \u201cnot to allow knowingly its territory to be used for acts contrary to the rights of other States\u201d), with constructive notice being possible where a state \u201cknows or should have known\u201d that the act contrary to the rights of other states \u201coriginates from or transits through its territory.\u201d Costa Rica, moreover, takes the position that states \u201cmust exercise a reasonable degree of vigilance over their networks\u201d and \u201cmust also put in place certain basic protective measures\u201d over their cyber infrastructure.<\/p>\n\n\n\n<p>At the same time, Costa Rica looks beyond Corfuto tie its vision of the due diligence obligation to taking \u201cappropriate measures to prevent significant transboundary harm\u201d (independent of whether that harm violates the rights of other states). Previously, this reading of due diligence has mostly been applied to international environmental law in the context of pollution (for example, in <a href=\"https:\/\/legal.un.org\/riaa\/cases\/vol_III\/1905-1982.pdf\"><em>Trail Smelter<\/em><\/a>, where an arbitral tribunal ruled in favor of U.S. claims that Canada should bear responsibility for pollution caused by smoke from the smelter on the Canadian side of the border that drifted downwind into Washington state, causing harm to crops and forests there). Here, Costa Rica <a href=\"https:\/\/docs-library.unoda.org\/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)\/Costa_Rica_-_Position_Paper_-_International_Law_in_Cyberspace.pdf\">cites the application of due diligence<\/a> in the cyberspace context as covering \u201cnon-physical harms \u2026 including those caused through or to ICTs,\u201d such as \u201conline incitement to violence, hostility or discrimination and disinformation campaigns causing harm to individuals.\u201d<\/p>\n\n\n\n<p><strong>International Humanitarian Law<\/strong><\/p>\n\n\n\n<p>Costa Rica\u2019s position on the applicability of <a href=\"https:\/\/docs-library.unoda.org\/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)\/Costa_Rica_-_Position_Paper_-_International_Law_in_Cyberspace.pdf\">international humanitarian law in cyberspace<\/a> is one of the most detailed, nuanced, and wide ranging of those disseminated thus far. The statement describes in detail how IHL applies to cyber operations as a part of ongoing armed conflicts, and where a cyber operation has the ability to commence an armed conflict on its own. It takes the time, moreover, to walk through the application of the core IHL principles. Regarding the principle of distinction, for example, Costa Rica adopts the position that, \u201c[w]ith respect to cyber infrastructure, the assessment of whether an object qualifies as a military objective must be done at the lowest level practically possible,\u201d by which it means, \u201cat the level of each particular computer, cable, router, or other specific device that can be separated from a network or a system as a whole.\u201d Cyberattacks (for purposes of the prohibition of attacks on civilians or civilian objects) involve conduct \u201cdesigned or [that] can be reasonably expected to cause injury or death to persons or damage or destruction to objects,\u201d alongside:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The disabling\u2014temporary or permanent, reversible or not\u2014of the targeted computer, system, or network. For the avoidance of doubt, this means that the existence of physical damage to objects or injury or death to persons is <em>not required<\/em> for an operation to constitute an attack under IHL. (Emphasis added.)<\/p>\n<\/blockquote>\n\n\n\n<p>The implications of this position are significant. A number of other states have been reluctant to treat a loss of functionality alone as an attack (some states, such as <a href=\"https:\/\/www.gov.pl\/attachment\/3203b18b-a83f-4b92-8da2-fa0e3b449131\">Poland<\/a>, simply do not include loss of functionality as an attack, while other states, such as <a href=\"https:\/\/www.international.gc.ca\/world-monde\/issues_development-enjeux_developpement\/peace_security-paix_securite\/cyberspace_law-cyberespace_droit.aspx?lang=eng\">Canada<\/a>, <a href=\"https:\/\/www.auswaertiges-amt.de\/blob\/2446304\/32e7b2498e10b74fb17204c54665bdf0\/on-the-application-of-international-law-in-cyberspace-data.pdf\">Germany<\/a>, and <a href=\"https:\/\/digital-commons.usnwc.edu\/cgi\/viewcontent.cgi?article=2957&amp;context=ils\">Israel<\/a>, are much more qualifying in their language). These qualifiers matter, since only \u201cattacks\u201d trigger IHL fundamental principles like distinction and proportionality. If an operation is not an attack, the argument goes, there is no need to discriminate among civilian and military objects. If, however, a loss of functionality can, as Costa Rica submits, comprise an attack, it widens the aperture significantly as to which cyber operations will be attacks that trigger the principle of distinction. From this position, Costa Rica returns to its own situation, asserting that the kind of ransomware attack it suffered in 2022 \u201cwould be considered an attack under IHL and therefore must not be directed against civilian systems.\u201d&nbsp;&nbsp;<\/p>\n\n\n\n<p>Finally, Costa Rica takes <a href=\"https:\/\/international-review.icrc.org\/sites\/default\/files\/irrc-886-droege.pdf\">a position long advocated by the International Committee of the Red C<\/a>ross, but that few (if any) states have endorsed previously: the idea of data as an object. Costa Rica takes the <a href=\"https:\/\/docs-library.unoda.org\/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)\/Costa_Rica_-_Position_Paper_-_International_Law_in_Cyberspace.pdf\">view<\/a> that \u201ccivilian data constitute civilian objects under IHL,\u201d reasoning that, \u201c[b]efore the digital revolution, such data was stored in the form of paper files that were protected under IHL. Therefore, in Costa Rica\u2019s view, the protection of civilian objects under IHL extends to civilian data.\u201d This means that \u201c[c]ivilian datasets, including medical data, social security data, tax records, corporate and financial data, or electoral lists,\u201d are all considered unlawful targets under IHL that cannot be attacked without violating the principle of distinction. &nbsp;<\/p>\n\n\n\n<p><strong>Human Rights<\/strong>&nbsp;<\/p>\n\n\n\n<p>Like other states, Costa Rica asserts that human rights apply online the same way they do offline. It also repeatedly highlights the gendered impact of cyber harms, noting that women have suffered disproportionately from cyber harms (from electronic surveillance to hate speech to doxxing to cyber bullying to harassment). Where its statement is likely to engender the most controversy is in <em>where<\/em> these obligations apply. The U.S., for example, has long <a href=\"https:\/\/www.justsecurity.org\/wp-content\/uploads\/2014\/03\/state-department-iccpr-memo.pdf\">contended<\/a> that its human rights obligations under the International Covenant on Civil and Political Rights (ICCPR) apply only within U.S. territory\u2014that is, it has no obligation to respect human rights outside its territory. Costa Rica\u2019s position can be said to occupy the opposite pole. It claims that a state\u2019s obligations to respect, protect, and ensure human rights under the ICCPR and the American Convention on Human Rights go beyond:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>[A] State\u2019s territory, areas, or persons under its physical control. It extends to all human rights over whose enjoyment the State exercises power or effective control, regardless of physical proximity. This means that, under those treaties, States must respect, protect and ensure human rights that are exercised online or via ICTs and over whose enjoyment a State exercises effective control.&nbsp;<\/p>\n<\/blockquote>\n\n\n\n<p>This position may align with the <a href=\"https:\/\/www.ejiltalk.org\/a-new-extraterritorial-jurisdictional-link-recognised-by-the-iacthr\/\">Inter-American Court of Human Rights<\/a>, but it is not one many states have endorsed themselves. Hence, it will be interesting to gauge other states\u2019 reactions to Costa Rica\u2019s position on where online states must afford human rights protections.&nbsp;<\/p>\n\n\n\n<p><strong>Conclusion&nbsp;<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/docs-library.unoda.org\/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)\/Costa_Rica_-_Position_Paper_-_International_Law_in_Cyberspace.pdf\">Costa Rica\u2019s statement<\/a> appears to be the longest and most sophisticated national statement issued to date on the application of international law in cyberspace. Although not traditionally recognized as a cyber power in either a military or an industrial sense, Costa Rica\u2019s experiences with ransomware may elevate its voice among the dozens of states now speaking out on how to achieve global governance for states\u2019 online behaviors. Of course, this is no guarantee that Costa Rica\u2019s positions will set a new standard for others, whether in requiring states that have already spoken out to update their more cursory existing statements or in providing a proof of concept for other states that have yet to issue any statements.&nbsp;<\/p>\n\n\n\n<p>But Costa Rica\u2019s position paper highlights just how much priority many states are now affording the role of international law online. The question of what to make of these statements themselves also warrants more attention. How do these national statements relate to international law\u2014what legal relevance do they have if, as states generally assert, existing rules already apply? Are they merely efforts at interpretation and application, or do they go further by serving as evidence of some new <em>opinio juris <\/em>and evolving the law\u2019s content in the process? As Russia and others call for a <a href=\"https:\/\/docs-library.unoda.org\/Open-Ended_Working_Group_on_Information_and_Communication_Technologies_-_(2021)\/ENG_Concept_of_UN_Convention__on_International_Information_Security_Proposal_of_the_Russian__Federation.pdf\">cybersecurity treaty<\/a>, it may be particularly important to look to these statements as a signal on those areas where consensus appears most likely, and those where positions diverge (often quite substantially), suggesting that further clarifications and dialogues are sorely needed.&nbsp;&nbsp;<\/p>\n\n\n\n<p><em><sub>Duncan B. Hollis is Laura H. Carnell Professor of Law at Temple University Law School. He recently co-edited Defending Democracies: Combating Foreign Election Interference in a Digital Age (Oxford University Press, 2021) and is editor of the award-winning Oxford Guide to Treaties (Oxford University Press, 2nd, ed., 2020). He regularly writes on issues of international law, norms, and global cybersecurity. Professor Hollis is a Non-Resident Scholar at the Carnegie Endowment for International Peace, an elected member of the American Law Institute, and a regular consultant for the Microsoft Corporation&#8217;s Digital Diplomacy team.<\/sub><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Chris Carpenter, Duncan B. Hollis Costa Rica\u2019s recent position paper improves transparency on the country\u2019s legal views and provides&#8230;<\/p>\n","protected":false},"author":54,"featured_media":2914,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[32],"tags":[80,79,68,78],"class_list":["post-2473","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-cybersecurity","tag-human-rights","tag-international-law","tag-sovereignty"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Victim\u2019s Perspective on International Law in Cyberspace - Temple iLIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Victim\u2019s Perspective on International Law in Cyberspace - Temple iLIT\" \/>\n<meta property=\"og:description\" content=\"Chris Carpenter, Duncan B. Hollis Costa Rica\u2019s recent position paper improves transparency on the country\u2019s legal views and provides...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/\" \/>\n<meta property=\"og:site_name\" content=\"Temple iLIT\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-14T03:49:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-22T17:36:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png\" \/>\n\t<meta property=\"og:image:width\" content=\"433\" \/>\n\t<meta property=\"og:image:height\" content=\"377\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jamie Sawczyszyn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jamie Sawczyszyn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/\"},\"author\":{\"name\":\"Jamie Sawczyszyn\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/7d5f4bc7921036633f229dcb14616237\"},\"headline\":\"A Victim\u2019s Perspective on International Law in Cyberspace\",\"datePublished\":\"2024-12-14T03:49:41+00:00\",\"dateModified\":\"2026-01-22T17:36:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/\"},\"wordCount\":2760,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png\",\"keywords\":[\"cybersecurity\",\"human rights\",\"international law\",\"sovereignty\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/\",\"url\":\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/\",\"name\":\"A Victim\u2019s Perspective on International Law in Cyberspace - Temple iLIT\",\"isPartOf\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png\",\"datePublished\":\"2024-12-14T03:49:41+00:00\",\"dateModified\":\"2026-01-22T17:36:33+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#primaryimage\",\"url\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png\",\"contentUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png\",\"width\":433,\"height\":377},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#website\",\"url\":\"https:\/\/law.temple.edu\/ilit\/\",\"name\":\"Temple iLIT\",\"description\":\"Institute for Law, Innovation &amp; Technology\",\"publisher\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/law.temple.edu\/ilit\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#organization\",\"name\":\"Temple iLIT\",\"url\":\"https:\/\/law.temple.edu\/ilit\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png\",\"contentUrl\":\"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png\",\"width\":1465,\"height\":704,\"caption\":\"Temple iLIT\"},\"image\":{\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/7d5f4bc7921036633f229dcb14616237\",\"name\":\"Jamie Sawczyszyn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g\",\"caption\":\"Jamie Sawczyszyn\"},\"url\":\"https:\/\/law.temple.edu\/ilit\/author\/tuu27324\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Victim\u2019s Perspective on International Law in Cyberspace - Temple iLIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/","og_locale":"en_US","og_type":"article","og_title":"A Victim\u2019s Perspective on International Law in Cyberspace - Temple iLIT","og_description":"Chris Carpenter, Duncan B. Hollis Costa Rica\u2019s recent position paper improves transparency on the country\u2019s legal views and provides...","og_url":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/","og_site_name":"Temple iLIT","article_published_time":"2024-12-14T03:49:41+00:00","article_modified_time":"2026-01-22T17:36:33+00:00","og_image":[{"width":433,"height":377,"url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png","type":"image\/png"}],"author":"Jamie Sawczyszyn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jamie Sawczyszyn","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#article","isPartOf":{"@id":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/"},"author":{"name":"Jamie Sawczyszyn","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/7d5f4bc7921036633f229dcb14616237"},"headline":"A Victim\u2019s Perspective on International Law in Cyberspace","datePublished":"2024-12-14T03:49:41+00:00","dateModified":"2026-01-22T17:36:33+00:00","mainEntityOfPage":{"@id":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/"},"wordCount":2760,"commentCount":0,"publisher":{"@id":"https:\/\/law.temple.edu\/ilit\/#organization"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#primaryimage"},"thumbnailUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png","keywords":["cybersecurity","human rights","international law","sovereignty"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/","url":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/","name":"A Victim\u2019s Perspective on International Law in Cyberspace - Temple iLIT","isPartOf":{"@id":"https:\/\/law.temple.edu\/ilit\/#website"},"primaryImageOfPage":{"@id":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#primaryimage"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#primaryimage"},"thumbnailUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png","datePublished":"2024-12-14T03:49:41+00:00","dateModified":"2026-01-22T17:36:33+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/ilit\/a-victims-perspective-on-international-law-in-cyberspace\/#primaryimage","url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png","contentUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png","width":433,"height":377},{"@type":"WebSite","@id":"https:\/\/law.temple.edu\/ilit\/#website","url":"https:\/\/law.temple.edu\/ilit\/","name":"Temple iLIT","description":"Institute for Law, Innovation &amp; Technology","publisher":{"@id":"https:\/\/law.temple.edu\/ilit\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/law.temple.edu\/ilit\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/law.temple.edu\/ilit\/#organization","name":"Temple iLIT","url":"https:\/\/law.temple.edu\/ilit\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/","url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png","contentUrl":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2022\/08\/cropped-iLIT-logo-1.png","width":1465,"height":704,"caption":"Temple iLIT"},"image":{"@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/law.temple.edu\/ilit\/#\/schema\/person\/7d5f4bc7921036633f229dcb14616237","name":"Jamie Sawczyszyn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02545dc7ed92abff19e248e72e64e09f9d08cec36cd65c2564688021bb5b9d09?s=96&d=mm&r=g","caption":"Jamie Sawczyszyn"},"url":"https:\/\/law.temple.edu\/ilit\/author\/tuu27324\/"}]}},"jetpack_featured_media_url":"https:\/\/law.temple.edu\/ilit\/wp-content\/uploads\/sites\/4\/2024\/12\/chavesrobles-legassembly.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts\/2473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/comments?post=2473"}],"version-history":[{"count":4,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts\/2473\/revisions"}],"predecessor-version":[{"id":2500,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/posts\/2473\/revisions\/2500"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/media\/2914"}],"wp:attachment":[{"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/media?parent=2473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/categories?post=2473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/law.temple.edu\/ilit\/wp-json\/wp\/v2\/tags?post=2473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}