New Technologies in International Law / Tymofeyeva, Crhák et al.
the act as such. 531 Factually, in many cases there were links between the perpetrators of cyber-attacks and different governments and were not carried out individually (StuxNet, WannaCry, NotPetya, the attempted attack against OPCW). 532 As to the issue of vagueness, the Regulation enables the adoption of cyber sanctions against “ cyber-attacks with a significant effect ” that could have “ a potentially significant effect which constitutes an external threat to the Union or its member states .” 533 The term “significant” effect is open-ended and ensures much flexibility, albeit Article 2 lists several factors that shall be taken into account when assessing the significance of the attack. 534 The same applies to the term “external threat”. The latter term is specified in Article 1 (4) of the Regulation, though the list set out therein is not exhaustive. Such vagueness could be justified by the need to ensure a certain degree of flexibility for the Union to react promptly and more effectively in the cyberspace, which is unpredictable and subject to permanent change. Moreover, the Council had taken heed of the decision-making of the Court of Justice that has a relatively strong role in the context of restrictive measures. 535 The Council took a lesson from past judicial practice where it could not defend some of the restrictive measures it imposed. 536 On the other hand, the vagueness and imprecise nature of listing criteria creates the possibility for arbitrary decision-making, disregarding the principle of legal certainty. The second point concerns evidentiary issues. The listing must not only be based on specific reasons, but it shall be supported by evidence. Moreover, to ensure the right to fair trial the listed individuals must have access to this evidence. 537 This procedural North Korean state-sponsored groups specializing in cyber operations. See: Annex, Council of European Union, Council Decision (CFSP) 2019/797 of 17 May 2019 concerning restrictive measures against cyber-attacks threatening the Union or its Member State. 531 Miadzvetskaya Y, Wessel AR, ‘The Externalisation of the EU’s Cybersecurity Regime: The Cyber Diplomacy Toolbox’ (2022) 7 European Papers 413, p. 435. 532 Miadzvetskaya Y, ‘Cyber sanctions: towards a European Union cyber intelligence service?’ ( College of Europe Policy Brief , 2021)
125
Made with FlippingBook Annual report maker