State Responsibility in Cyber Operations: The Applicability of the Tallinn Manual

UNITED NATIONS

4/25/20255 min read

teal LED panel
teal LED panel

If a state-sponsored cyberattack disables a country’s power grid, plunging millions into darkness, who bears legal responsibility? Can international law keep pace with cyber operations that cross borders without a single soldier stepping onto foreign soil? As digital threats grow in sophistication and frequency, these questions have become urgent for policymakers, legal scholars, and national security experts alike. In this post, we examine the role of international law in regulating state behavior in cyberspace, focusing on the guidance provided by the Tallinn Manual—a cornerstone in the emerging field of cyber conflict law.

Understanding the Tallinn Manual: A Non-Binding Blueprint for Cyber Norms

The Tallinn Manual on the International Law Applicable to Cyber Warfare—and its expanded version, Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations—are the most comprehensive academic analyses of how existing international law applies to cyberspace. The manuals were developed by an international group of legal and military experts under the auspices of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in Estonia.

Despite their influence, the manuals are non-binding and do not constitute international law per se. However, they serve as an important interpretive tool for states, lawyers, and scholars seeking to understand how long-standing legal norms such as sovereignty, non-intervention, and the use of force can be extended to the cyber domain. Tallinn Manual 2.0, published in 2017, is particularly significant as it addresses not just wartime conduct (jus in bello) but also peacetime cyber operations.

Attribution and State Responsibility in International Law

Under international law, state responsibility arises when a state commits an internationally wrongful act that is attributable to it and breaches an international obligation. The guiding framework here is the Articles on Responsibility of States for Internationally Wrongful Acts (ARSIWA), drafted by the International Law Commission (ILC).

Two key conditions must be met:

  1. The act must be attributable to the state (e.g., conducted by state organs or agents).

  2. The act must breach an international obligation of that state (such as violating sovereignty or engaging in the unlawful use of force).

In cyberspace, these principles still apply—but the how of attribution becomes significantly more difficult, as cyber operations often obscure the origin of an attack.

Cyber Operations and the Use of Force / Prohibition of Intervention

According to the Tallinn Manual, a cyber operation may constitute a “use of force” under Article 2(4) of the UN Charter if its scale and effects are comparable to those of a kinetic attack. For example, a cyberattack that causes physical destruction or loss of life (e.g., disabling hospital equipment or causing explosions) could meet this threshold.

Cyber operations may also violate the principle of non-intervention, a customary international norm prohibiting coercive actions in the internal affairs of another state. A cyber campaign targeting a nation’s electoral systems or public opinion infrastructure could potentially breach this rule.

Moreover, the Tallinn Manual classifies some actions as infringements on state sovereignty, even if they fall short of armed force—such as unauthorized intrusions into government networks or interference with critical infrastructure. While the manual offers guidance, it stops short of providing black-and-white answers, leaving states and tribunals to interpret context-specific nuances.

Challenges in Attribution and Evidence

Unlike conventional warfare, cyberattacks often occur anonymously, making attribution—linking an operation to a particular state—one of the thorniest legal and technical problems in the field. Attackers can route traffic through multiple countries, use botnets, or rely on proxy actors, making direct attribution difficult, if not impossible, without significant intelligence.

The Tallinn Manual acknowledges these difficulties but insists that the standard of proof for attribution under international law remains the same, regardless of the medium. States must still demonstrate, using credible evidence, that the action was undertaken by or on behalf of another state. Yet the inherent opacity of cyberspace weakens the practical enforceability of legal responsibility.

Real-World Examples and Precedents

Several prominent incidents illustrate the complex legal landscape of cyber operations:

  • Stuxnet (2010): Widely attributed to the U.S. and Israel, this malware targeted Iran’s nuclear centrifuges. While not officially acknowledged, it’s often cited as a cyber operation that reached the threshold of “use of force.”

  • NotPetya (2017): A destructive ransomware attack allegedly launched by Russian actors, NotPetya caused billions in damages globally. It targeted Ukraine but spread uncontrollably.

  • SolarWinds (2020): A sophisticated espionage operation attributed to Russian intelligence that compromised U.S. government and corporate networks. Though highly intrusive, it likely did not rise to the level of a use of force.

  • WannaCry (2017): Attributed to North Korean actors, this ransomware paralyzed systems worldwide, including hospital services in the UK. Though financially motivated, it caused public health risks.

These examples show that while the international community often points fingers, it rarely invokes formal legal proceedings due to attribution issues, geopolitical consequences, and the lack of binding legal mechanisms.

Legal and Policy Implications: Gaps and Limitations of the Tallinn Manual

While the Tallinn Manual provides valuable interpretive guidance, it remains a soft law instrument. Its influence is persuasive but not compulsory. Moreover, the manual reflects the views of a specific group of experts—not a consensus among states.

Some critics argue that the current international legal framework is insufficiently equipped to handle the complexities of cyberspace. The absence of a binding treaty on cyber conflict—akin to the Geneva Conventions or the UN Convention on the Law of the Sea—leaves significant legal ambiguity. This legal grey zone can be exploited by states wishing to engage in hostile operations while avoiding formal accountability.

Others suggest that overly rigid treaties may stifle innovation or prevent proportionate responses, especially given the rapid pace of technological change. In this light, the Tallinn Manual is seen as a compromise: a flexible, evolving reference point rather than a legal straitjacket.

Conclusion: The Future of State Responsibility in Cyberspace

The Tallinn Manual offers a valuable lens through which to interpret state behavior in cyberspace, bridging the gap between traditional international law and emerging digital threats. Yet its non-binding nature and the inherent challenges of attribution mean that it cannot, on its own, ensure accountability for cyberattacks.

Moving forward, the international community must grapple with how to build consensus-based norms that retain the flexibility of customary law while addressing the unique features of cyber operations. Enhanced cooperation, transparency, and possibly new treaty instruments may be needed to reinforce the legitimacy and effectiveness of legal accountability in cyberspace.

Summary: Key Takeaways on State Responsibility and the Tallinn Manual

The Tallinn Manual serves as a leading interpretive guide on how international law applies to cyber operations, especially regarding state responsibility. While it is non-binding, it helps clarify the legal implications of cyberattacks under established norms such as sovereignty, non-intervention, and use of force.

State responsibility in cyberspace follows the same legal framework as in other domains, as laid out in the ILC’s Articles on State Responsibility. However, technical anonymity and indirect methods complicate attribution, making enforcement challenging.

Notable cyber incidents like Stuxnet, NotPetya, and SolarWinds show how real-world operations test the boundaries of legal accountability. These cases often remain in a political or rhetorical space rather than legal adjudication.

The Tallinn Manual partially fills the legal void, but a binding treaty or clearer global consensus may be needed to address state behavior in cyberspace more effectively.

Future legal efforts must find a balance between flexibility and enforceability, ensuring both state security and accountability in the digital age.