• DIGIFACE
    • Home
    • DIGI-FACE Handbook
      • Download: DIGI-FACE Handbook
    • About DIGI-FACE
    • FAQ
    • How-to Guides
  • Centres
    • African Excellence
    • Global Centres: Climate
    • Global Centres: Health
  • Blog
    • How to write a blog post
    • Write a blog post
    • Latest blog posts
    • Blog posts by Centre
    • Blog posts by subject
  • Learn
    • DIGI-FACE Modules
    • Compᶟ modules
    • Applications for modules
    • ‘Learn’ User Guides
    • Our facilitators
    • Go to Digital Classroom
    • Prospectus
  • Publications
  • Projects
    • Events
    • Projects
  • Members
    • Member Search
    • Members by centre
      • African Excellence
        • CCAM
        • CEGLA
        • CEMEREM
        • CERM-ESA
        • CENIT@EA
        • GGCDS
        • NGCL
        • PRO-RUWA
        • SA-GER CDR
        • SCO
        • TGCL
        • TRANSCRIM
        • WAC-SRT
      • Global Centres: Climate
        • ABCD
        • AFAS
        • SAGE
        • TRAJECTS
      • Global Centres: Health
        • GLACIER
        • PACE-UP
        • G-WAC
    • Edit your profile
  • Alumni
    • African Excellence
      • CEGLA
        • UAM
      • CCAM
      • CERM-ESA
      • WAC-SRT
  • Go to Digital Classroom
  • Log in or Register
Digi-Face
✕

Search results

    Support
    • FR
    Log in or Register
    • Digi-Face
      • Home
      • DIGI-FACE Handbook
        • Download: DIGI-FACE Handbook
      • About DIGI-FACE
      • FAQ
      • How-to Guides
    • Centres
      • African Excellence
        • CCAM
        • CEGLA
        • CEMEREM
        • CERM-ESA
        • CENIT@EA
        • GGCDS
        • NGCL
        • PRO-RUWA
        • SA-GER CDR
        • SCO
        • TGCL
        • TRANSCRIM
        • WAC-SRT
      • Global Centres: Climate
        • ABCD
        • AFAS
        • SAGE
        • TRAJECTS
      • Global Centres: Health
        • GLACIER
        • PACE-UP
        • G-WAC
    • Blog
      • How to write a blog post
      • Write a blog post
      • Latest blog posts
      • Blog posts by Centre
        • DIGI-FACE
        • CCAM
        • CEGLA
        • CEMEREM
        • CERM-ESA
        • CENIT@EA
        • GGCDS
        • NGCL
        • PRO-RUWA
        • SA-GER CDR
        • SCO
        • TGCL
        • TRANSCRIM
        • WAC-SRT
      • Blog posts by subject
        • Agriculture
        • Development
        • Education
        • Environment
        • Governance
        • Health
        • ICT
        • IT
        • Law
        • Logistics
        • Microfinance
        • Mining
        • Other
    • Learn
      • DIGI-FACE Modules
      • Compᶟ modules
      • Applications for modules
      • ‘Learn’ User Guides
        • User Guide – ‘Learn’ Moodle Platform
        • Download: User Guide – ‘Learn’ Moodle Platform
      • Our facilitators
      • Go to Digital Classroom
      • Prospectus
    • Publications
    • Projects
      • Events
      • Projects
    • Members
      • Member Search
      • Members by centre
        • African Excellence
          • CCAM
          • CEGLA
          • CEMEREM
          • CERM-ESA
          • CENIT@EA
          • GGCDS
          • NGCL
          • PRO-RUWA
          • SA-GER CDR
          • SCO
          • TGCL
          • TRANSCRIM
          • WAC-SRT
        • Global Centres: Climate
          • ABCD
          • AFAS
          • SAGE
          • TRAJECTS
        • Global Centres: Health
          • GLACIER
          • PACE-UP
          • G-WAC
      • Edit your profile
    • Alumni
      • African Excellence
        • CEGLA
          • UAM
        • CCAM
        • CERM-ESA
        • WAC-SRT
    • Go to Digital Classroom
    Home Blog The Tallin Manual: The Head, Shoulders, Knees and Toes of International Law and Cyber Warfare
    12.03.2017 | TRANSCRIM | Brendan Proctor

    The Tallin Manual: The Head, Shoulders, Knees and Toes of International Law and Cyber Warfare

    Share this:

    The Tallin Manual: The Head, Shoulders, Knees and Toes of International Law and Cyber Warfare

    By Matsiko Samuel[1]

    The greatest challenge for states and international relations today is the manner and scope of international law’s applicability to cyber warfare and cyber operations. The legal regime regulating cyber operations remains unsettled. International law whether in the form of treaty regimes or customary international law was developed at a time when cyber technology and cyber operations was not a dominant feature of international relations. A group of experts have conducted an ambitious project that comprehensively analyses existing international law and its application to cyber operations. This analysis is published in a non binding document known as the Tallin Manual . This manual  is what I term as the head, shoulders, knees and toes of international law and cyber operations.

    What is the Tallin Manual?

    The NATO Cooperative Cyber Defence Centre of Excellence, The Embassy of the Kingdom of the Netherlands to the United States and the Atlantic Council on the 8th February 2017 co-organized the launch of the “Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations” This was followed by another launch in the Hague co-organized by the T.M.C.Asser Institute and the Netherlands Ministry of Foreign Affairs on 13th February 2017.

    Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations is a predecessor of the 2013 Tallinn Manual on the International Law Applicable to Cyber Warfare. It is important to note the nomenclature of the current manual is a shift from cyber warfare to cyber operations. The 2013 Tallinn Manual is a massive 215 paged document that addresses the current  international cyber security law landscape and architecture. The manual is divided into sections of black letter rules with accompanying commentaries. The first chapter attempts to address issues of state sovereignty, jurisdiction and use of force. The latter chapters raise myriad legal questions from individual criminal responsibility, characterisation of international armed conflict, conduct of hostilities to improper use, perfidity and espionage.

    With regard to espionage and the debates on cyber espionage, the second Tallinn Manual raises important legal questions. For example, whether cyber espionage reaching a particular threshold of severity violates international law? Whether one state hacking into a facility of a another state and  holding it as a cyber hostage violates international law?

    What would constitute a cyber attack or cyber use of force?

    The drafters of Tallin manual were faced with a challenge on the definition of what constitutes a cyber attack or cyber use of force? In rule 11 it is without a doubt they applied the approach articulated in the armed attack context in the Nicaragua Decission by the International Court of Justice (ICJ) . This approach mainly dealt with States but did not address issues of non-state private actors.

    The issue of the attribution of international responsibility to States for conduct of a group of individuals within the territory of another State has become a question of control. Therefore if a cyber operation by  Uganda aided and abetted another cyber operation  in Estonia would thatconstitute a cyber attack? .However we need to be cautious and draw a line between attribution, effective control and overall control, the current  international jurisprudence is more reflective to state relations than private non -state actors.

    The voyage on the unchartered waters of the applicability of international law and cyber operations was not only necessary it was timely. The Tallin manual is indeed the ABC guide or head, shoulders, knees and toes of international law and cyber operations. The 2017 version does a commendable job on addressing the law on state responsibility, which includes thelegal standards for attribution. Though more work needs to be done in adressing the interaction between international cyber norms and domestic cyber norms.

    In sum the Tallin manual is not necessarily  a source international law it is merely an academic, non-binding manual on how international law applies to cyber conflicts. The practice of producing a non-binding manuals is not novel. Similar manuals have been published before such as the San Remo manual on International Law Applicable to Armed Conflicts at Sea.

    [1] Matsiko Samuel (LLM) is Uganda lawyer and academic with a keen interest in international law. He is a lecturer at the faculty of law Uganda Christian University and Vice president of the International Law Association Uganda Branch http://www.ila-hq.org/en/branches/index.cfm/bid/1026.

    You must be logged in to rate posts.

    Rate this post

    Average rating 0 / 5. Vote count: 0

    Director Brendan Proctor Viewport More blogs from this author
    Category:
    TRANSCRIM
    Keywords:
    cyberwarfare International law
    An academic semester in Flensburg, Germany learning more about Logistics: A logistics short course really gets your career moving

    1 Comments

    1. Kalumbu Banza says:
      14 March 2017 at 8:23 am

      Interesting. I’ve learned a lot.

      Log in to Reply

    Leave a Reply Cancel reply

    You must be logged in to post a comment.

    DIGI-FACE – Digital Initative for African Centres of Excellence represented by:

    University of Applied Sciences Kehl
    Kehl Institute of Applied Research (KIAF)
    Projects International Cooperation and Development

    Kinzigallee 1, D- 77694 Kehl
    +49 7851 894143
    https://www.hs-kehl.de/

    Contact: digiface[at]hs-kehl.de

    • Data Protection
    • Terms of Use
    • Imprint
    • Contact & Support
    • Facebook
    • Instagram
    • LinkedIn

    Developed by Viewport / WordPress Guys

    Opt-out complete; your visits to this website will not be recorded by the Web Analytics tool. Note that if you clear your cookies, delete the opt-out cookie, or if you change computers or Web browsers, you will need to perform the opt-out procedure again.

    You may choose to prevent this website from aggregating and analyzing the actions you take here. Doing so will protect your privacy, but will also prevent the owner from learning from your actions and creating a better experience for you and other users.

    The tracking opt-out feature requires cookies to be enabled.

    ×

    Not sure which status you have? Have a look at the list below to identify the right role for your profile.

    1. Student
      • A student is currently enrolled in a study programme at one of the universities which is participating at DIGI-FACE (African Centres of Excellence and its network).
    2. Staff
      • Staff is everybody who works in the frame of a university which is participating at DIGI-FACE (African Centres of Excellence and its network) [(i.e. as coordinator, financial/administrative support, IT-support, learning designer, administrator etc.). If you are working for DAAD or DIGI-FACE you are also staff.
    3. Alumni
      • An Alumni is a former student in a study programme at one of the universities which is participating at DIGI-FACE (African Centres of Excellence and its network). In many cases, part of one of the centres’ alumni associations.
    4. Lecturer
      • A Lecturer performs teaching and pedagogic work at one of the universities which is participating at DIGI-FACE (African Centres of Excellence and its network)
    5. Researcher
      • A researcher is an individual who is engaged in conducting research at one of the universities which is participating in DIGI-FACE (African Centres of Excellence, Global Centres and its networks). Researchers contribute to academic knowledge through studies, experiments, and publications in various fields of expertise.
    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
    Cookie settingsACCEPT
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the ...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checbox-analytics7 daysThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checbox-functional7 daysThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checbox-others7 daysThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-necessary7 daysThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-performance7 daysThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy7 daysThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT
    Loading...

    Insert/edit link

    Enter the destination URL

    Or link to existing content

      No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.

        Notifications