Cybercrimes: What Is and What Ought to Be? Rethinking the Role of Recklessness and Negligence in the International Criminal Court

By: Adi Libsker-Hazut.

A. Background

Methods and means of warfare have been evolving since the dawn of history. Attempts to develop new weapons or improve existing ones have often led to technological break-throughs. While the primordial man sharpened stone spears and arrowheads, nowadays, warfare develops and adopts online technological tools – cyber warfare.

Over the past few years, developments in the field of cyber warfare have led many experts to estimate that states will use their cyber means of warfare more and more over future conflicts, especially as they realize that cyber-attacks may bear more significant results. Unlike other weapons, the production and manufacturing costs of a cyber-attack is affordable, and available to most states. It goes without saying that developed countries increasingly rely on technological means to operate their infrastructure. Therefore, they expose themselves to harm and increase the potential for damage. [1]

The complexity in defining cyberspace and cyber warfare does not mean that this domain is lawless and out of control. Over the years, interested international parties have made efforts towards expanding, adjusting and renewing traditional legal doctrines in order to deal with the difficulties cyberspace and cyber warfare pose.[2] Few agreements and understandings were made in the international arena over the past decade, regarding cyber-attacks. Yet there are fundamental difficulties in the application of international Law to cyberspace. Most of the difficulties stems from the physical uniqueness of cyberspace. For example, can "cyber warfare" constitute an "armed conflict"?[3] The means of cyber warfare vary in many ways from traditional weapons, and are very difficult to define in physical terms. These are usually computer programs, or even just a part of a code designed to cause harm. [4] They do not exist outside the cyber dimension, cannot be seen, smelt, touched, heard or tasted. Therefore, at first sight we may be able to accept the claim that cyber operations are unarmed. [5] In the following section I wish to point out another fundamental difficulty in the application of International law to cyberspace, which surprisingly stems from the mental elements of the crimes.

B. The current legal situation (in International Criminal Law)

On 17 July 1998, 120 states passed the International Criminal Court Statute (also referred to as the 'Rome Statute').[6] On 1 July 2002, following the UN decision, the court’s statute entered into force, and, for the first time in the history of international law, the criminal court (ICC) was established as permanent.[7] Article 5 of the court’s statute decided which crimes would be within its jurisdiction. Article 5(1) limits the court authority to try only the most serious crimes.[8] This article also defines four categories of the crimes that fall under the court’s jurisdiction, as stated in article 5(1):

(a) The crime of genocide;

(b) Crimes against humanity;

(c) War crimes;

(d) The crime of aggression.[9]

Article 9 of the statute set a mechanism that determines what elements may constitute crimes within the court’s jurisdiction.[10] In September 2002, the “Elements of Crimes” were published.[11]

The International Criminal Court statute has, for the first time in international criminal law, defined the mental element required for imposing criminal liability. Until then, no international law, nor any international charter, included a definition of the mental element.[12]

In a nutshell, according to Article 30 of The Rome Statute, all crimes included in the statute are crimes whose mental element is a 'guilty mind'. That is, knowledge of the nature of the action, the existing circumstances, and the possible consequences, as detailed in the particulars of the crime; As for the consequences, if included in the definition of the crime, an intent to cause those consequences, or, at the least, an awareness of their probability.[13]

Indeed, the most obvious lacunas are:

  • Recklessness – that is, indifference to the possible consequences; or care-less-ness – taking an unreasonable risk with the intention of preventing such consequences from happening.
  • Negligence – that is, an unawareness of behavior, circumstances or the possible consequences.
  • Strict or Absolute Liability – that is, crimes that do not rely on evidence of guilty mind or negligence.

It is worth mentioning that a definition of recklessness was included in the court statute draft, under Article 29.[14] In the final text of the statute, however, the definition of recklessness was removed, because it was redundant.[15]

During the discussions, the issue of negligence, unlike that of recklessness, did not come up at all. It seems all parties agreed that international criminal law should not deal with crimes of negligence. Such crimes are simply not severe enough.

The perception of crimes of negligence and recklessness as less severe offences is based on a deontological idea, emphasizing one’s unintentional act and not the consequences of his act. However, from a teleological viewpoint that focuses on the consequences, negligent acts may be just as severe, or even worse than unintentional acts.[16]

Very little attention was given to how the Elements of Crimes ignore the element of negligence and recklessness. Many of the crimes in international criminal law have horrible consequences.[17] Don't these consequences justify giving precedence to teleological considerations over deontological ones? Is it not right and just to determine negligent genocide a crime?

In my humble opinion, the international community should consider crimes of negligence more seriously. However, this is not the aim of my study. My argument is of a more modest nature – I want to know whether the unique characteristics of cyber warfare justify and even necessitate an acknowledgement of the element of negligence and recklessness.

C. The Proper Legal Condition in Light of Technological Advances

In the following section I wish to examine whether the unique characteristics of cyber warfare justify expanding international criminal law to also include crimes of negligence and crimes of recklessness.

It is important to keep in mind that this is a work in progress, and that some of the following ideas have not yet fully ripened and are still incomplete.

1. The pace of developments and innovations – Unlike the physical world – which we are equipped to know and deal with – the cyber dimension is a new manmade dimension. The physical world has barely changed since the very beginning of human history, but the rate of change and innovation in the cyber dimension is very high.[18] In the physical world, each action may have unexpected consequences, but we know and can predict their absolute majority. In contrast, the consequences of a cyber-dimension action are unpredictable and very hard to anticipate.[19] Therefore, in order to uphold a higher standard of conduct within cyberspace, the international criminal law ought to ensnare those who were unaware of conduct, circumstances, or the possible consequences of their actions.

2. Internet of Things – In the near future, we will be able to see our cars communicate with the air conditioner and fridge in our homes, the shutters interact with the alarm clock on our cellphones, and our grandfather’s pacemaker will communicate with emergency services and his doctor's laptop.[20] We expect the network will expand as more and more objects can gather and exchange information.[21]

This communication may be very beneficial, but it carries with it an enormous potential for damage. A cyber weapon that infiltrates an appliance may cause massive damage by interacting with another appliance that wasn’t even a target.[22] Should we exempt the warring parties from taking a closer look at the possible consequences of whatever means of cyber warfare they use, we will not be able to prevent the terrible catastrophes that may be the result of negligent or reckless acts.

3. The Various Violated Rights – if someone was to point a missile, gun, knife or grenade our way, the possible consequences would be immediately obvious both to them and to us – we would know that our lives, health or property could come to harm.[23]

However, imagine a case in which a cyber weapon erases you from all governmental systems of information. You no longer exist, cannot leave the state, open a bank account, own a credit card, purchase a car, get married, work, file a legal complaint, and even your children are no longer yours.[24] Now imagine something like that happening to millions of people across the state simultaneously.

In fact, a well-planned and well-executed cyber-attack can damage every possible human right we can think of. With the press of a button, an attacker may violate over thirty such rights. Unless we include recklessness and negligence in international bans, criminals could easily defend themselves with the claim that they only meant to violate a non-protected right, and unintentionally violated protected rights as well.

4. Artificial intelligence – is, in fact, independent,[25] and therefore we cannot lay the blame with its programmer, even if it commits a crime against humanity.[26] Programmers allegedly had no intention that their actions would result in such terrible consequences. Let’s say, for example, that a state develops artificial intelligence that can independently identify an existential threat, and then launches weapons of mass destruction against its enemy. The AI misevaluates the situation as war, and independently launches weapons of mass destruction. Would we want and expect international law to capture the AI’s programmers and operators, who relinquished all human judgement by setting off weapons of mass destruction? Without including recklessness and negligence in the law, it would hardly be possible.

5. Fog of battle – Cyber warfare allows its “combatants” to fight from the comfort and safety of an airconditioned room, far from the battlefield, far from the Fog of War, and its stress and anxiety.[27]

In such cases, the implementation of International Criminal Law may also be applied to crimes of negligence and recklessness for two central reasons:

  1. This situation justifies a less forgiving approach toward errors and mistakes that result in damages.
  2. This situation may also cause an emotional disconnect between the combatant and the outcomes of the warfare itself, and thus increase risk and cause unnecessary suffering and needless harm.[28]

Adding the elements of negligence and recklessness to International Criminal Law will set a higher moral bar and reduce the potential danger that lies in emotional disconnect.

D. Conclusion

History teaches us that International Criminal Law oftentimes cannot realize its aspirations. This powerlessness is the result of the contractual components of international law, the absence of any real investigation and enforcement, and the dependency on strong countries and their budgets. It is hard not to surmise that International Criminal Law is often used as a tool by the winning sides of any war, and oftentimes international law is harshly criticized – albeit not always justly – for its levels of objectivity and neutrality. [29]

Despite the impotence of International Criminal Law, I do believe that its declarative values still rise in this age of globalization. The internet, global communication, and international culture lessen the national effects. Incompliance with the norms of international law incurs criticism from both within and without the state, and may have significant effects on its economic and national and international political fields. Thus, impotence within a limited legal framework does not equate to impotence in the field of culture.

Under these circumstances, I do believe that the practical difficulties of locating criminals and proving their actions in the cyber-dimension should not discourage regulation in this matter. Especially now, as this field gains momentum, it is important that criminal law pay attention to cyber warfare.[30] Additionally, we should examine whether the existing toolset (norms and laws) of International Criminal Law are sufficiently satisfactory and clear in light of the unique characteristics of cyber warfare, which includes innovative technology.[31] In my humble opinion, and as I have tried to show so far, in this context it is highly important to include crimes involving the mental element of recklessness and negligence. Though such a step may be strictly declarative, its influence over the future war field and the actions of the warring sides cannot be understated.

 


[1] Jonathan A. Ophardt, Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow's Battlefield, 9.1 Duke L. & Tech. Rev. i, v (2010); Arie J. Schaap, Cyber Warfare Operations: Development and Use under International Law, 64 A.F.L. Rev. 121, 149 (2009); Michael Gervais, Cyber Attacks and the Laws of War, 30 Berkeley J. Int'l L. 525, 531 (2012).

[2] Tom C.W. Lin, Financial Weapons of War, 100 Minn. L. Rev. 1377, 1420 (2016).

[3] Tom C.W. Lin, Financial Weapons of War, 100 Minn. L. Rev. 1377, 1417-1418 (2016); Michael N. Schmitt, Peacetime Cyber Responses and Wartime Cyber Operations under International Law: An Analytical Vade Mecum, 8 Harv. Nat'l Sec. J. 239, 264 (2017).

[4] Lior Tabansky, Basic Concepts in Cyber Warfare, 3 MIL. & STRATEGIC AFF. 75, 79-81 (2011); Stefano Mele, Legal Considerations on Cyber-Weapons and Their Definition, 3 J.L. & Cyber Warfare 52, 57 (2014); Herbert Lin, Cyber Conflict and International Humanitarian Law, 94 INT'L REv. RED CROSS. 515, 515-531(2012).

[5] Michael Schmitt, Classification of Cyber Conflict, 17(2) J. Conflict & Sec. L. 245,250 (2012).

[6] Eve La Haye, War Crimes in Internal Armed Conflicts 139 (2008).

[7] Lijun Yang, Some Critical Remarks on the Rome Statute of the International Criminal Court, 2 Chinese J. Int'l L. 599, 599 (2003).

[8] Joshua H. Joseph, Gender and International Law: How the International Criminal Court Can Bring Justice to Victims of Sexual Violence, 18 Tex. J. Women & L. 61, 69-70 (2008-2009).

[9] Rome Statute of the International Criminal Court, art. 5, July 17, 1998, 2187 U.N.T.S. 98 (entered into force 1 July 2002). [hereinafter Rome Statute of the International Criminal Court] Available at: https://www.icc-cpi.int/NR/rdonlyres/ADD16852-AEE9-4757-ABE7-9CDC7CF02886/283503/RomeStatutEng1.pdf [Accessed: 16 February 2019].

[10] Knut Dormann, Elements of War Crimes under the Rome Statute of the International Criminal Court: Sources and Commentary 8 (2003).

[11] Preparatory Commission for the Int'l Criminal Court, Finalized Draft Text of the Elements of Crimes,U.N. Doc. PCNICC/2000/I/Add.2 (Nov. 2, 2000), Available at :http://www.icc-cpi.int/NR/rdonlyres/ADD16852-AEE9-4757-ABE79CDC7CF02886/283503/RomeStatutEng1.pdf [Accessed: 16 February 2019]. 

[12] Sarah Finnin, Mental Elements Under Article 30 of the Rome Statute of the International Criminal Court: A Comparative Analysis, 61 INT'L & COMP. L.Q. 325, 325-326 (2012); Mohamed Elewa Badar, The Mental Element in the Rome Statute of the International Criminal Court: A Commentary From A Comparative Criminal Law Perspective, 19 Crim. L. Forum. 473, 473-474 (2008).

[13] Mohamed Elewa Badar, The Mental Element in the Rome Statute of the International Criminal Court: A Commentary From A Comparative Criminal Law Perspective, 19 Crim. L. Forum. 473, 474-475 (2008); Mohamed Elewa Badar, Doluseventualis and the Rome Statute Without It? 12 New Crim L.R. 433, 438 (2009).

[14] Report of the Preparatory Committee on the Establishment of an International Criminal Court' UN Diplomatic Conference of Plenipotentiaries on the Establishment of an International Criminal Court (Rome 15 June-17 July 1998) Draft Statute for the International Criminal Court and Draft Final Act, 55-56 (14 April 1998) UN Doc A/CONF.183/2/Add.1, Available online: https://documents-dds-ny.un.org/doc/UNDOC/GEN/N98/101/05/PDF/N9810105.pdf?OpenElement [Accessed: 16 February 2019]; 2 The Legislative History of the International Criminal Court 285 (Cherif M.Bassiouni & William A. Schabas eds., 2016).

[15] Kai Ambos, General Principles of Criminal Law in the Rome Statute, 10 Criminal Law Forum. 1, 21(1999):"Certainly, reckless conduct cannot be the basis of responsibility since a corresponding provision was deleted"; Gerhard Werle & Florian Jessberger. ‘Unless Otherwise Provided’: Article 30 of the ICC Statute and the Mental Element of Crimes Under International Criminal Law, 3 J. Int'l Crim. Just. 35, 35-36(2005).

[16] A.p. Simester & G.r. Sullivan, Criminal Law Theory and Doctrine 1-20, 144-145, 151-152 (3rd ed., 2007).

[17] Cryer Robert, Hakan Friman, Darryl Robinson & Elizabeth Wilmshurst, An Introduction to International Criminal Law and Procedure 1 & 23-30 (2010).

[18] Ross M. Rustici, Cyberweapons: Leveling the International Playing Field, 41(3) Parameters 32, 39 (2011).

[19] See: Matthew C. Waxman, Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4), 36 Yale J. Int'l L. 421, 431 (2011):"cyber-attacks also have unique characteristics and are evolving rapidly and in unpredictable ways"; Noah Simmons, A Brave New World: Applying International Law of War to Cyber-Attacks, 4 J.L. & Cyber Warfare 42, 51 (2014):"[…] cyber-attacks are unpredictable in their effects"; Reese Nguyen, Navigating JusAd Bellum in the Age of Cyber Warfare, 101 Calif. L. Rev. 1079, 1099 & 1102 (2013).

[20] See overviewing types of internet of Things devices: Scott R. Peppet, Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security, and Consent, 93 Tex. L. Rev. 85, 98. (2014): "health and fitness sensors, automobile black boxes, home monitors and smart grid sensors, devices designed specifically for employee monitoring, and software applications that make use of the sensors within today's smartphones"; Hartzog Woodrow & Selinger Evan, The Internet of Heirlooms and Disposable Things, 17 N.C. J.L. & Tech. 581, 583 (2016).

[21] Evans Dave, The Internet of Things How the Next Evolution of the Internet Is Changing Everything, Cisco Int'l. Bus. Solutions Grp. (IBSG) 1, 3-4 (2011), Available online: https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf [Accessed: 16 February 2019]; Kevin Werbach, The Song Remains the Same: What Cyberlaw Might Teach the Next Internet Economy, 69 Fla. L. Rev. 887, 894 (2017).

[22] loT products have ample notice that these devices might have significant security defects and that insecure devices are frequently used to carry out damaging cyberattacks.

[23] Maayan Y. Vodovis, Look Over Your Figurative Shoulder: How to Save Individual Dignity and Privacy on the Internet, 40 Hofstra L. Rev. 811, 813-814 & 822-823 (2011).

[24] See, for example: Helen Nissenbaum, Privacy as Contextual Integrity, 79 Wash. L. Rev. 119, 120 (2004).

[25] Tom Allen & Robin Widdison, Can Computers Make Contracts, 9 Harv. J. L. & Tech. 25, 27 (1996); Cristian-Vlad Oancea, Artificial Intelligence Role in Cybersecurity Infrastructures, 4 Int'l J. Info. Sec. & Cybercrime 59, 59 &61 (2015).

[26] See: Daniel Eszteri, Liability for Operation and Damages Caused by Artificial Intelligence-With a Short Outlook to Online Games, 153 Studia Iuridica Auctoritate Universitatis Pecs Publicata 57, 62 &66 (2015): "The question is that who should bear the legal responsibility for the actions of synthetic beings?".

[27] McGuffin Chris & Mitchell Paul, On Domains: Cyber and the Practice of Warfare, 69 Int'l J. 394, 410 (2014).

[28] Michael Gervais, Cyber Attacks and the Laws of War, 30 Berkeley J. Int'l L. 525 ,532 (2012)

[29] Robert Cryer, Hakan Friman, Darryl Robinson & Elizabeth Wilmshurst. An Introduction to International Criminal Law and Procedure 36-39, 517-518 (2010).

[30] Geiss Robin, The Conduct of Hostilities in and via Cyberspace, 104 Am. SOC'Y INT'L L. PROC. 371, 374 (2010).

[31] David Weissbrodt, Cyber-conflict, Cyber-crime, and Cyber-espionage, 22 Minn. J. Int'l L. 347, 348-349 (2013).

https://csrcl.huji.ac.il/sites/default/files/csrcl/files/tmvnh_dy_lybsqr_khzvt.jpg?m=1491052180