I. Introduction
Good morning. I want to thank General Nakasone and Colonel Hayden for inviting me to speak at the CYBERCOM legal conference today — I am delighted to be here. Every year, this conference gathers the legal community to explore the legal and policy aspects of military operations in cyberspace. This year's theme of integrated deterrence is especially timely in light of current challenges we face as a Nation, the release last fall of the Biden Administration's National Security Strategy, and the National Defense Strategy which nests within it. As the President explained in the 2022 NSS, we live in a "decisive decade," marked by dramatic changes in technology, geopolitics, economics, and the environment. In response, the Department of Defense has adopted a strategy to address this new reality and maintain our competitive advantage. The 2022 National Defense Strategy sets forth the Department's approach to advancing the defense of our Nation, paced to the growing multi-domain challenge posed by China. The NDS focuses on deterring strategic attacks and aggression while being prepared to prevail in conflict, if necessary.
A key component of the NDS is "integrated deterrence" — a holistic approach to addressing our competitors across domains, across DoD components and the U.S. Government, and with our Allies and partners around the world.
In the current strategic environment, we see our competitors in cyberspace seeking to steal our technology, undermine our military advantages, threaten our critical infrastructure, disrupt our government and commerce, weaken our collective prosperity, and challenge our democratic processes. The scope, pace, and sophistication of this cyber activity continues to rise around the world. Under the framework of integrated deterrence, the Department is countering these malign cyber activities by taking action to generate insights about the adversary's cyber operations and capabilities; enable the U.S. Government, industry, and international partners to create better cyber defenses; and act to deter or, when necessary, disrupt adversary cyber actors and halt malicious activities. Our success in the cyber domain depends on maintaining an ability to move quickly and cohesively with key partners within the U.S. Government and around the globe.
The law is an integral component of furthering these strategic objectives. Today, I will elaborate on the role of the lawyer in advancing integrated deterrence, with a focus on the cyber domain. Lawyers are essential to successfully achieving integrated deterrence. And DoD lawyers have a profound obligation to ensure that the Department's activities are conducted consistent with applicable domestic and international law. A key priority for my office is ensuring not only that we follow the rule of law in our own work, but also that we, as a Department, promote the rule of law around the world. Working with our Allies and partners requires recognition that we might, at times, be subject to different legal obligations or adopt different interpretations of certain legal rules, while ensuring we remain aligned on core issues wherever possible.
Determining the shape and contours of domestic and international law raises challenging questions that we wrestle with as an international legal community, which includes our civilian lawyers and judge advocates across the U.S. Government; legal advisers for our Allies and partners; and civil society, including academics and non-governmental organizations. Today, I will highlight some of those challenging questions and how we are thinking about them, specifically focusing on evaluating cyber operations against the international law framework of prohibited intervention and countermeasures, as well as the First and Fourth Amendments of the U.S. Constitution.
II. Integrated Deterrence and the Role of Lawyers
Before I dive into how lawyers help further integrated deterrence in the cyber realm, I'd like to spend a few moments on what "integrated deterrence" means. The 2022 NDS defines integrated deterrence as: "using every tool at the Department's disposal, in close collaboration with our counterparts across the U.S. Government and with Allies and partners, to ensure that potential foes understand the folly of aggression."
My colleague, Dr. Colin Kahl, Under Secretary of Defense for Policy, has explained that integrated deterrence is a reminder that successful deterrence must seamlessly incorporate tools from every domain, including, of course, cyber and space; from every geographic theater; and from multiple instruments of national power, including not only military activities but also diplomacy, economic tools, and others.
Integrated deterrence spans the spectrum of competition and armed conflict — to include gray zone activities — and immeasurably benefits from the critical assistance of our Allies and partners. The ultimate goal is a comprehensive approach to deterring conflict and, should it arise, keeping such conflict at the lowest possible level. This is particularly important when nuclear powers are involved.
Three key ways in which the United States enhances integrated deterrence are: (1) escalation management; (2) campaigning; and (3) prioritizing interoperability with our Allies and partners. In recent years, the cyber domain has taken on greater importance in each of these areas. Law, of course, plays an essential role as well. As lawyers, mastering a deep understanding of the relevant international and domestic legal guideposts enables us to explain to policymakers the full menu of legally available policy options.
The first concept, escalation management, is inherently linked with deterrence. State activities in the cyber domain have the potential to lead to inadvertent escalation, especially where there are insufficient "collective experience, common understanding[] and established norms of behavior" to allow competitors to correctly interpret intent. Against this backdrop, lawyers have an opportunity to support integrated deterrence by clearly articulating legal standards; working alongside policymakers to develop and implement norms of responsible behavior; and helping to provide a vocabulary for States to communicate expectations and redlines, all with the objective of adding a measure of predictability to cyber-related interactions between State actors.
Legal practitioners play an important role in ensuring that States do not misinterpret actions in cyberspace and thus risk inadvertent escalation.
Another way in which the United States enhances integrated deterrence is through campaigning. The NDS defines campaigning as "the conduct and sequencing of logically-linked military activities to achieve strategy-aligned objectives over time." Campaigning is a daily effort to close warfighting vulnerabilities, shape the perceptions of our competitors, and sow doubt that they can achieve their objectives through directly countering the United States, our Allies, or our partners. In the cyber domain, campaigning occurs through day-to-day contact with our competitors. It includes operations to "degrade competitors' malicious cyber activity and to prepare cyber capabilities to be used in crisis or conflict." And it happens primarily in the gray zone — that is, on the spectrum of competition below the level of or outside the context of armed conflict. Here, too, we as lawyers play an important role in advising on the types of activities that might cross thresholds in international law, such as whether an activity could constitute a prohibited intervention or a use of force. Ensuring our planners understand applicable legal rules can facilitate the development and deployment of complex and enduring campaigns.
Finally, the United States enhances integrated deterrence through interoperability with our Allies and partners, which enables us to work together as one team.
Some of our Allies, like the United Kingdom and Japan, have adopted strategies which include elements similar to our National Defense Strategy's approach to integrated deterrence. Interoperability with our Allies and partners is particularly relevant in the cyber domain, in which technology transcends territorial boundaries and effortlessly brings us into contact with others around the world. To operate most effectively with our Allies and partners, it is important to have common understandings of the respective legal frameworks governing our actions in cyber.
Lawyers have already played a vital role here. States now generally agree that international law applies in cyberspace and, along with NGOs, civil society, and academia, States have made tremendous progress in clarifying how various aspects of international law apply to cyber operations. And dialogue continues regarding how particular rules of international law apply to specific scenarios in cyberspace. There is always room to create more commonality, and thus enhance integrated deterrence.
III. Importance of International Law
Our clients fully embrace the importance of adhering to international law. One of the key precepts of the 2022 National Defense Strategy is the promotion of a rules-based international order. International law is the framework that States have adopted to set binding standards for their behavior, serving as an essential pillar of stability and order in the international system. States have committed to abide by international law not only in their interactions with each other, but also, in many respects, in their treatment of their nationals and others within their territory and subject to their jurisdiction.
International law can provide the guideposts States use both to criticize unlawful conduct and to respond together.
The United States believes that our compliance with international law in the cyber domain is a foundation for the legitimacy of our military operations. As former State Department Legal Adviser Harold Koh presciently said over a decade ago at one of the first CYBERCOM legal conferences, where he clearly set forth the U.S. government view that international law applies in cyberspace, "if we succeed in promoting a culture of compliance, we will reap the benefits. And if we earn a reputation for compliance, the actions we do take will earn enhanced legitimacy worldwide for their adherence to the rule of law."
Clarity, predictability, and shared understandings of the law play the same important role for deterrence in the cyber domain as they do in other areas of State conduct, whether in competition or in conflict. But, in contrast to many other areas of State activity, outsiders are rarely able to observe State cyber behavior directly. As a result, the cyber domain often affords minimal public visibility into the two preconditions for establishing customary international law: general and consistent State practice and opinio juris, which are statements affirming that a State is acting out of a sense of legal obligation. As a result, there is heightened value in States continuing the public conversation regarding how specific rules of international law — whether established in treaty or by custom — apply in cyberspace, and publicly identifying violations when they occur.
Increased transparency enhances legitimacy and predictability by helping to develop and strengthen expectations surrounding State behavior, as well as possible responses, in the rapidly evolving cyber domain.
We therefore must continue to recognize the applicability of international law to State activity in cyberspace during both peacetime competition and armed conflict, and we must continue to develop our understanding of how it applies to the conduct of military operations. The United States has previously articulated certain aspects of our interpretation of international law in the cyber domain. For example, we have affirmed that a State's inherent right of self-defense, recognized in Article 51 of the U.N. Charter, may in certain circumstances be triggered by cyber activities that amount to an actual or imminent armed attack. And we have affirmed that States conducting activities in cyberspace must take into account the sovereignty of other States, including outside the context of armed conflict.
One important, though sometimes overlooked, method for advancing the conversation regarding specific rules of international law is to raise questions for discussion. By asking those questions, States can identify areas where the particular application of the law is less clear. The purpose of identifying these unanswered or underexplored issues is to prompt the entire legal community, as well as policymakers, to consider and work towards resolution of these questions.
Over the balance of my remarks, I will focus on summarizing the current state of the law in two important areas of the international legal architecture below the threshold of armed conflict — prohibited intervention and countermeasures — and then identify several questions that remain the subject of discussion and debate regarding the application of those legal concepts in the cyber domain. I will conclude with an explanation of how our military operations in cyberspace are conducted consistent with the First and Fourth Amendments to the U.S. Constitution. My goal is to advance the public conversation about and understandings of these rules, thereby contributing to the advancement of integrated deterrence, as set forth in the National Defense Strategy.
a. Prohibited Intervention
I'll begin with the customary international law rule of prohibited intervention, a concept that is also reflected in certain treaties that the United States has joined. As the International Court of Justice, or ICJ, described in its merits judgment in the Case Concerning Military and Paramilitary Activities in and against Nicaragua, the rule of prohibited intervention forbids States from engaging in coercive action that bears on a matter that each State is entitled, by the principle of State sovereignty, to decide freely. Prohibited intervention thus plays an important role in protecting State sovereignty and preventing interstate disputes — contributing directly to the goals of integrated deterrence.
Although the scope of prohibited intervention is generally understood to be relatively narrow, certain peacetime activities of States in cyberspace could run afoul of this high threshold.
The United States has previously said, for example, that a cyber operation by a state that interferes with another country's ability to hold an election, or that manipulates another country's election results, would violate the rule of non-intervention.
It is widely recognized that prohibited intervention includes two elements: (1) the action must interfere in the matters the targeted State is permitted to decide freely under the principle of sovereignty; and (2) it must be coercive. However, the precise meaning and contours of these elements are not well-defined — and cyberspace magnifies these already existing uncertainties. Working with our Allies and partners, and appreciating contributions from civil society and academia, to advance the understanding of these fundamental concepts can contribute to the broader goal of a shared and more nuanced view of how international law applies in cyberspace.
i. Domaine Réservé
Let me start with which matters a State is permitted to decide freely under the principle of sovereignty. Many commentators refer to these matters as a State's "domaine réservé" — or "reserved domain" in English. Although the United States does not publicly use that phrase in formal writings, I'll use it today as a convenient shorthand in describing past and current discussions on this topic.
As the ICJ said in the Nicaragua merits judgment mentioned earlier, one matter within the domaine réservé is "the choice of a political, economic, social and cultural system, and the formulation of foreign policy."
Although the ICJ expressly limited its discussion to those aspects of prohibited intervention that it considered most relevant to the resolution of the dispute in that case, one abiding question is: how can we better understand the contours of which activities are matters a State is permitted by the principle of state sovereignty to decide freely?
The term domaine réservé appeared in an advisory opinion of the Permanent Court of International Justice — the precursor to the ICJ. In that opinion, the PCIJ was assessing the scope of a dispute resolution provision of the Covenant of the League of Nations, which did not apply to disputes arising out of matters solely within the domestic jurisdiction of a State. In assessing the legality of French decrees imposing French nationality on all persons born in Tunis and Morocco — which had the effect of converting British subjects born in the French zone into French nationals — the PCIJ used the term domaine réservé to capture matters of a State's affairs that are solely within the jurisdiction of a State. The PCIJ noted that some matters — such as, in principle, nationality — are not governed by international law and thus part of a State's reserved domain. The Court observed that the parameters of the domaine réservé will evolve over time, because whether a certain matter is solely within a State's domestic jurisdiction was a relative question that would depend on a State's obligations to other States and the development of international relations.
The PCIJ was not addressing the prohibition against intervention, and its remarks do not govern that distinct issue. But this history may help give a sense of what some people have in mind when they refer to the domaine réservé.
In today's interconnected world, having a sharper understanding of the parameters of matters a State is permitted, by the principle of state sovereignty, to decide freely could contribute to clarity and predictability. Against this backdrop, a number of States in recent years have begun to explore how the concept of prohibited intervention applies in cyberspace. They have identified additional areas that, in their view, fall within a State's domaine réservé for purposes of prohibited intervention, including elections and, more recently, healthcare. For example, last year the United Kingdom identified domestic healthcare, financial markets, energy supply, and elections as falling within its domaine réservé for the purposes of prohibited intervention. The United States in 2021 identified manipulation of a State's election results, or coercive interference in a State's ability to hold an election or to protect the health of its population, as potentially constituting violations of the rule. In this respect, certain aspects of a State's provision of healthcare could be part of its domaine réservé, whether administered by the State or predominantly through the private sector. Italy and New Zealand have also suggested that coercive interference in healthcare could violate the rule on prohibited intervention.
As States consider how to develop their thinking further on the domaine réservé as understood for purposes of prohibited intervention, some may look to historical sources. For example, in its Nicaragua judgment, the ICJ looked in part to the 1933 Montevideo Convention — to which both Nicaragua and the United States were parties.
The Montevideo Convention provides that each party to that treaty has the right "to organize itself as it sees fit, to legislate upon its interests, administer its services, and to define the jurisdiction and competence of its courts."
At the same time, and as the PCIJ observed, States will want to bear in mind that the parameters of a State's domaine réservé will depend in part on its obligations to other States, which can develop over time. To give one example of particular importance in the cyber context, by becoming parties to the United Nations Charter, all States today have agreed that certain matters are unquestionably matters of international concern that may be regulated by international law, such as the prohibition on the use of force in Article 2(4). Articles 1(3), 55, and 56 of the Charter each commit U.N. Member States to respecting international human rights. This, in turn, has led to the development of human rights treaties. States that are parties to such treaties have consented to legally binding obligations aimed at protecting specific human rights, such as freedom of expression, freedom of association, and the freedom of religion or belief. Under this international human rights regime, excessive regulation of online content, including censorship and access restrictions, cannot be justified as a sovereign prerogative. And as the United States has reaffirmed, "any regulation by a State of matters within its territory, including use of and access to the Internet, must comply with that State's applicable obligations under international human rights law."
ii. Coercion
Having explored the matters a State is permitted by the principle of state sovereignty to decide freely, I turn now to the second element of prohibited intervention: the activities must be coercive. While coercion can mean different things in different contexts, the scope of coercion for purposes of prohibited intervention remains particularly undertheorized and underdeveloped. It is well-established that a use of force against another State would be coercive. On the other end of the spectrum, actions to which a State voluntarily consents, such as by joining human rights treaties just discussed, are, inherently, not coercive. So where, on the spectrum between voluntarily-consented-to behavior and a use of force, does coercion begin?
The threshold for assessing an act as coercive in the context of prohibited intervention seems to be most clearly satisfied when a State has in fact been compelled to take, or refrain from taking, a particular course of action. For example, a cyber operation that "manipulates another country's election results" or "interferes with another country's ability to hold an election" is coercive. Certain cyber operations that prevent a State from protecting the health of its population could also be coercive.
Because relatively few States have made public statements regarding their interpretation of the coercion element of prohibited intervention in the cyber domain, opinio juris on this matter is still developing. Many questions remain ripe for further examination.
One question relates to the degree of severity required for an act to be coercive. Although some may assume that a coercive action must involve force — because, of course, force is inherently coercive — such an interpretation is unduly limited. The prohibition against intervention makes sense as a standalone rule under international law only if it is distinct from the prohibition on the use of force, which means coercion for purposes of prohibited intervention in the cyber domain must include at least some acts below the threshold of a use of force.
Another question focuses on the intended consequences of a potentially coercive act. Is coercion, for purposes of prohibited intervention in the cyber domain, limited to those instances where the act is designed to compel a target State to undertake a specific act or omission? Some States support that approach. Other States have adopted a broader view, that any act that deprives a State of freedom of control over elements of its domaine réservé would constitute prohibited intervention. This broader approach may stem from a desire to hold States accountable for seriously disruptive conduct without requiring a target State to show that the conduct was meant to induce a particular act or omission. But focusing solely on deprivation of control, without more, could turn any disruptive cyber activity by a State that affects, even unwittingly, certain elements of another State's activities into an unlawful intervention.
A final question for further exploration is whether coercion must succeed for the act to violate the prohibition on intervention.
The ICJ's Nicaragua merits judgment describes intervention as wrongful when done by "methods of coercion" but does not address whether the method of coercion must be effective. Requiring coercion to actually produce the desired effect could have paradoxical results. It may disadvantage States that are better able to deflect or endure coercive acts because their resilience would foreclose a determination of prohibited intervention. And it could reward States whose attempted intervention fails. It could also mean the same act, directed towards two different States, could be a prohibited intervention against one State but not the other, depending only on attributes of the target State, for example, whether a target State's cyber defenses were advanced enough to withstand the act. Such an outcome could impede the ability of States with more robust and resilient defenses to call out violations and, if desired and appropriate, to respond lawfully with countermeasures or other tools of international law.
b. Countermeasures
Before turning to domestic law, I'll briefly address another topic that comes up frequently and raises challenging questions when discussing cyber operations in an environment of competition below the threshold of armed conflict: countermeasures. A countermeasure is an act that would otherwise be internationally wrongful but for the fact that it is taken in response to an internationally wrongful act attributable to a State.
Like international law writ large, the doctrine of countermeasures applies to state conduct in cyberspace and is an important tool for States that are victims of violations of international law — including, potentially, as a response to a violation of the rule of non-intervention. Indeed, as the United States has previously affirmed, a State injured by another State's cyber activities that constitute an internationally wrongful act, but do not amount to an armed attack, may respond with non-forcible countermeasures in the cyber or any other domain.
As in other domains, the lawful use of countermeasures in the context of peacetime cyberspace activities has several requirements. First, the countermeasure must be taken in response to an internationally wrongful act attributable to a State. This factor reaffirms the importance of resolving the earlier discussion of prohibited intervention — particularly whether an attempted but unsuccessful intervention by coercion constitutes an internationally wrongful act.
Second, the countermeasure must be taken against the responsible State for the purpose of inducing that State to return to compliance with international law. Third, the countermeasure must meet the requirement of proportionality and must be suspended without undue delay if the internationally wrongful act has ceased. In the United States' view, whether a measure is proportionate should be measured in relation to what is necessary to induce the breaching State to cease its wrongful conduct, as well as in relation to the size or gravity of the original breach itself.
In addition, countermeasures are generally understood to be temporary measures and should therefore be reversible to the extent possible.
Finally, as a general rule, an injured State preparing to take a countermeasure in response to an internationally wrongful act in cyberspace attributable to another State must call upon the responsible State to cease its wrongful conduct, unless the need to preserve the injured State's rights demands urgent countermeasures. The purpose of this requirement is to provide the responsible State with notice of the injured State's claim and the opportunity to respond or cease its wrongful conduct. But in practice, such notification in the cyber domain calls for further exploration.
For instance, what if notification and demand for cessation of another State's internationally wrongful act would compromise a cyber operation that would be urgently executed as a lawful countermeasure? In that case, it is possible that the need to preserve the injured State's rights would justify taking action without prior notification. Similarly, what if notification and a demand for cessation would tip off the offending State that a clandestine cyber operation will follow if that State does not cease its activities?
In addition, can the doctrine of countermeasures have any applicability to assist a State that has been a victim of a cyber operation that has been completed and is irreversible? Suppose the internationally wrongful act in which a State has engaged involves "hack and leak" activities.
How could a demand for cessation, or a resort to countermeasures, bring the responsible State back into compliance once the "hack and leak" aspect of the internationally wrongful act is complete, because the leak cannot be reversed? It would seem relevant to this analysis whether there is also the expectation of further internationally wrongful acts occurring.
The doctrines of prohibited intervention and countermeasures are fundamental to peacetime stability and predictability in the international system, and, as the questions and discussion I offer today highlight, are ripe for further examination in the cyber context. By furthering these conversations, we as lawyers can make an important contribution to succeeding in competition and achieving integrated deterrence through the continued development of common understandings in the cyber domain.
IV. Domestic Law
I will turn now to a discussion of U.S. domestic law, focusing on military cyber operations against and affecting systems located outside the United States. The U.S. Constitution plays a significant role in safeguarding privacy and civil liberties, as DoD seeks to deter and protect against adversary "gray zone" activities in the cyber domain in a lawful and effective manner. As lawyers, we help our clients advance integrated deterrence and hold true to the Constitution by delineating the legal guideposts in domestic law, just as in international law. In the domestic law context, I will focus today on the First and Fourth Amendments.
a. First Amendment
The First Amendment is of course foundational in protecting free speech in the United States. As we combat efforts by our foreign adversaries to use disinformation and other influence operations in their attempts to further their own interests and to undermine our most cherished values, we must remain steadfast to the First Amendment as a critical touchstone.
Concerns about foreign influence in our political processes have existed since the founding of our Republic. We see this in the Constitution itself — for example, in the Emoluments Clause, which the Framers adopted "in order to protect U.S. officials from corruption and foreign influence." Combating malign foreign influence remains a key component of our national defense.
So, what role does the First Amendment play? Of course, the First Amendment protects Americans' right to speak freely. The picture becomes more complicated when we look abroad, where foreign speakers generally have no First Amendment-protected right to speak. This is certainly true of foreign States that wish to interfere in our electoral processes.
But the Supreme Court has also interpreted the First Amendment as protecting Americans' right to "receive information and ideas, regardless of their social worth." This right to receive information encompasses, for example, the freedom to read and receive news and information about current events and other matters of public and private interest.
In several cases, the Supreme Court has recognized that Americans have a right to receive information from foreign speakers abroad, at least under some circumstances. In a 1965 case called Lamont v. Postmaster General, for example, the Supreme Court struck down as unconstitutional a statute that required the postal service to hold "communist political propaganda" mailed to Americans from abroad and permitted release of that mail only upon affirmative request from the intended recipient. And in a 1972 case called Kleindienst v. Mandel, the Supreme Court recognized that Americans' First Amendment right to receive foreign information was implicated when the government precluded a Belgian citizen from traveling to the United States to deliver lectures. These protections recognized by the Supreme Court are vitally important.
We must therefore carefully consider how to harmonize two interests — the right of the State to prevent foreign influence on government functions and the right of the individual to receive speech. For example, there may be some tension between Americans' right to receive speech and the Nation's interest in preventing foreign influence on U.S. elections. As legal practitioners charged with both defending the Nation and upholding the Constitution, we must navigate these issues. The First Amendment's protections, including the right to receive speech, are rooted in a belief that robust political debate is essential for an informed electorate and a healthy democracy. At the same time, the protections of the First Amendment are not so expansive as to prevent the Nation from defending itself.
Accordingly, the analytical legal framework and case-specific evaluation of cyber operations require careful consideration of potentially competing interests, including the nature and strength of the governmental interest and the scope and tailoring of the impact a cyber operation may have on protected First Amendment rights. The role of the government lawyer in these circumstances is especially vital because such matters often will not be adjudicated by courts. It is incumbent on Executive Branch lawyers, then, to abide by the Constitution, respect civil liberties, and uphold the rule of law while protecting national security.
b. Fourth Amendment
I will turn now to the Fourth Amendment. In working to achieve integrated deterrence, it is advantageous to understand our adversaries' plans, intentions, and capabilities. Accurate intelligence enables us to calibrate our deterrence efforts and integrate those efforts across domains and with Allies and partners. Today, cyber is a critical domain for gathering intelligence, and such intelligence, in turn, is vital to the development and conduct of cyber operations. Cyber operations also have the potential to lead to the incidental collection of intelligence to inform decisionmakers and future activities.
As we evaluate cyber operations from a legal perspective, sometimes the Fourth Amendment comes into play.
The Fourth Amendment protects the "right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures" and limits the circumstances under which warrants can be issued. Its basic purpose is to "safeguard the privacy and security of individuals against arbitrary invasions by governmental officials."
Core Fourth Amendment principles guide our cyber operations. For example, the Fourth Amendment protects U.S. persons whether they are in the United States or abroad and generally protects other persons located in the United States. Much like the First Amendment, however, non-U.S. persons located outside the United States generally will not be protected under the Fourth Amendment. Cyber operations targeting such persons overseas therefore generally do not implicate the targets' Fourth Amendment rights — because those targets do not have any Fourth Amendment rights in the first place.
Why, then, am I talking about the Fourth Amendment?
In the globally interconnected cyber domain, there is sometimes a chance that activities targeting foreign adversaries will result in the incidental acquisition of, for example, communications to which a U.S. person is a party. When a cyber operation implicates the Fourth Amendment rights of U.S. persons, further analysis is required.
That brings me to our second principle. The Fourth Amendment prohibits "unreasonable" searches and seizures. In the domestic law enforcement context, a search generally must be conducted pursuant to a warrant issued upon probable cause.
But the ultimate touchstone of the Fourth Amendment is reasonableness — and neither a warrant nor probable cause is an indispensable component of reasonableness in every circumstance. In most cases, cyber operations targeting non-U.S. persons located outside the United States do not implicate the warrant requirement. The warrant requirement generally would not apply, for example, to such searches conducted abroad or to otherwise lawful surveillance that targets persons lacking Fourth Amendment rights but incidentally acquiring the communications of a Fourth Amendment-protected person who was not targeted.
Even in contexts that do not require a warrant, a search implicating the Fourth Amendment must satisfy the reasonableness requirement. This entails a fact-sensitive evaluation of the totality of the circumstances, balancing an activity's intrusion into protected privacy interests against "the degree to which that intrusion furthers the government's legitimate interest." When cyber operations directed against foreign adversaries implicate the Fourth Amendment rights of, for example, U.S. persons, there will often be significant interests to balance on both sides.
Where a cyber operation targeting a foreign adversary implicates the Fourth Amendment because of incidental collection, two criteria help guide our review. First, we look at whether our collection methods are adequately focused and controlled to produce the required intelligence without unnecessarily invading the privacy of persons protected by the Fourth Amendment.
And second, we look at whether adequate precautions are taken to limit those invasions of privacy that do occur — an inquiry that can take into account post-collection procedures such as limitations on retention, dissemination, and querying.
Lawyers across the government, including in the Department of Defense, help their clients work through these types of questions every day. In doing so, we advance the government's vital national security interests, safeguard Americans' privacy and civil liberties, and ultimately support integrated deterrence.
V. Conclusion
In sum, government lawyers play an instrumental role on a daily basis in advancing integrated deterrence, including in the cyber domain. We do so not only by guiding policymakers on legally available options, but also by seeking to further the conversation on how relevant rules of international and domestic law apply in cyberspace. Clearer definitions can, in turn, serve as guideposts to policymakers, ensure our actions are consistent with our values, and help maintain our legitimacy on the international stage.
Thank you.