Tallinn Manual

× Clear Filters
22 Articles

A Right to Spy? The Legality and Morality of Espionage

The Chinese spy balloon incident raises deeper concerns about the legality and morality of espionage.
Blue futuristic monitor with information data

Poland’s Position on International Law and Cyber Operations: Sovereignty and Third-Party Countermeasures

Poland's positions push the discussion forward on contested areas of law.
A graphic illustration of Germany with a triangular grid pattern symbolizing virtual connections.

Germany’s Positions on International Law in Cyberspace Part II

Germany issues major statement on use of force and International Humanitarian Law in cyberspace, analyzed here by leading expert Professor Michael Schmitt.
A phone show the Garmin Connect software with an error message that reads, “Server Maintenance: Sorry, we are down for maintenance. Check back shortly.” and “We are currently experiencing an outage that affects Garmin.com and Garmin Connect. This outage also affects our call centers, and we are currently unable to receive any calls, emails, or online chats. We are working to resolve this issue as quickly as possible and apologize for this inconvenience.” A watch that is clearly not working and has a dark screen is shown next to the phone with these messages.

Germany’s Positions on International Law in Cyberspace Part I

Germany issues major statement on cyberspace and international law, analyzed here by leading expert Professor Michael Schmitt.
Map of Finland with an abstract pattern representing networks.

Finland Sets Out Key Positions on International Cyber Law

Analysis of the Government of Finland's new statement on international law in cyberspace.
Binary code in blue on a blue and black background

The Defense Department’s Measured Take on International Law in Cyberspace

A close reading of the Defense Department's statement on cyber by top expert, comparing it to positions of Australia, France, Netherlands, United Kingdom and others.
Cyber operations on mission in the 780th Military Intelligence Brigade operations center at Fort Meade, Md. U.S. Army Cyber Command. The room is covered with computer screens on desks as well as larger screens on the front wall. Each soldier appears to have three screens to their self.

Norm-Skepticism in Cyberspace? Counter-Factual and Counterproductive

Leading expert on international law and cyber responds to statement by Chief of US Naval Operations, Admiral Mike Gilday on international norms in cyberspace.
World Map

The Application of International Law to Cyberspace: Sovereignty and Non-intervention

A new Chatham House Report discusses how key international law principles apply to States’ cyber operations below the threshold of use of force and makes recommendations to governments…
The Netherlands' Minister of Foreign Affairs Stef Blok speaks during a debate about Socialist Party (SP) party chairman Murat Memis at the Senate, in The Hague, on December 26, 2019.

The Netherlands Releases a Tour de Force on International Law in Cyberspace: Analysis

The Dutch make a major contribution to interpretation and application of international law in cyberspace with careful legal analysis on topics ranging from sovereignty to the use…
The seals of the U.S. Cyber Command, the National Secrity Agency and the Central Security Service.

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part II

Part I demonstrated that the United States is likely to struggle to make a convincing argument that economic cyber intrusions carried out against it breach international law. Consequently,…
The seals of the U.S. Cyber Command, the National Secrity Agency and the Central Security Service.

U.S. Offensive Cyber Operations against Economic Cyber Intrusions: An International Law Analysis – Part I

On June 11, 2019, White House National Security Adviser John Bolton announced that U.S. offensive cyber operations would be expanded beyond countering election interference to…

The Technicolor Zone of Cyberspace, Part 2

What did the UK attorney general say about the principle of sovereignty in cyberspace and countermeasures as a self-help remedy to cyber-enabled breaches of international law?
1-12 of 22 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: