‘Spoofed Presence Does not Suffice’: On Territoriality in the Tallinn Manual

  • Lianne J.M. BoerEmail author
Part of the Netherlands Yearbook of International Law book series (NYIL, volume 47)


This chapter explores how the internet materializes in one of the most influential writings on cyberwar and international law, the Tallinn Manual on the International Law Applicable to Cyber Warfare. Based on the work of Molly Sauter, this chapter examines the metaphor used in the Manual to describe the internet, what effect this particular metaphor has, and at which points specific situations made possible by ‘cyberspace’ escape the confines of this particular metaphor.


Cyberspace Metaphor Tallinn Manual Jurisdiction Sovereignty 


  1. Agnew J (1994) The Territorial Trap: The Geographical Assumptions of International Relations Theory. Review of International Political Economy 1:53–80Google Scholar
  2. Benoliel D (2005) Law, Geography and Cyberspace: The Case of On-Line Territorial Privacy. Cardozo Arts & Entertainment Law Journal 23(1):125–196Google Scholar
  3. Boer LJM (2013) Restating the Law ‘As It Is’: On the Tallinn Manual and the Use of Force in Cyberspace. Amsterdam Law Forum 5(3):4–18Google Scholar
  4. Boer LJM (2017) International law as we know it: Cyberwar discourse and the construction of knowledge in international legal scholarship. Dissertation Vrije Universiteit AmsterdamGoogle Scholar
  5. Brunnée J, Tamar M (2015) Teaching an Old Law New Tricks: International Environmental Law Lessons for Cyberspace Governance. In: Odendahl K, Matz-Lück N, von Arnauld A (eds) German Yearbook of International Law, Vol 58. Duncker & Humblot, Berlin, pp 129–168Google Scholar
  6. Byassee WS (1995) Jurisdiction of Cyberspace: Applying Real World Precedent to the Virtual Community. Wake Forest Law Review 30:197–220Google Scholar
  7. Cohen JE (2007) Cyberspace as/and Space. Columbia Law Review 107:210–256Google Scholar
  8. Finnemore M, Hollis D (2016) Constructing Norms for Global Cybersecurity. American Journal of International Law 110: 425–479Google Scholar
  9. Franzese PW (2009) Sovereignty in Cyberspace: Can it Exist? Air Force Law Review 64:-1–42Google Scholar
  10. Graham M (2013) Commentary Geography/internet: Ethereal alternate dimensions of cyberspace or grounded augmented realities? The Geographical Journal 179: 177–182Google Scholar
  11. Herrera GL (2005) Cyberspace and Sovereignty: Thoughts on Physical Space and Digital Space. First International CISS/ETH Conference on The Information Revolution and the Changing Face of International Relations and Security, Lucerne, SwitzerlandGoogle Scholar
  12. Hollis D (2015) Re-Thinking the Boundaries of Law in Cyberspace: A Duty to Hack? In: Ohlin JD, Govern K, Finkelstein C (eds) Cyber War: Law and Ethics for Virtual Conflicts. Oxford University Press, Oxford, pp 129–174Google Scholar
  13. Johnson DR, Post D (1995) Law and Borders: The Rise of Law in Cyberspace. Stanford Law Review 48:1367–1402Google Scholar
  14. Lakoff G, Johnson M (1980) Metaphors we Live By. The University of Chicago Press, Chicago/LondonGoogle Scholar
  15. Lambach D (2016) The Territorialization of Cyberspace. Conference Paper. Accessed 16 February 2017
  16. Manjikian M (2015) Confidence-building in Cyberspace: A Comparison of Territorial and Weapons-based Regimes. Strategic Studies Institute and United States Army War College Press, Carlisle BarracksGoogle Scholar
  17. McEvoy Manjikian M (2010) From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik. International Studies Quarterly 54: 381–401Google Scholar
  18. Olson KK (2005) Cyberspace as Place and the Limits of Metaphor Convergence: The International Journal of Research into New Media Technologies 11(1):10–18Google Scholar
  19. Pirker B (2013) Territorial Sovereignty and Integrity and the Challenges of Cyberspace. In: Ziolkowski K (ed) Peacetime Regime for State Activities in Cyberspace: International Law, International Relations and Diplomacy. NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) Publications, Tallinn, pp 189–216Google Scholar
  20. Post DG (2007) Governing Cyberspace: Law Symposium Review. Santa Clara High Technology Law Journal 24:883–913Google Scholar
  21. Roscini M (2014) Cyber Operations and the Use of Force in International Law. Oxford University Press, OxfordGoogle Scholar
  22. Ryngaert CMJ (2014) The End of Territory? The Re-Emergence of Community as a Principle of Jurisdictional Order in the Internet Era. Accessed 6 December 2016
  23. Sauter M (2015) Show Me On the Map Where They Hacked You: Cyberwar and the Geospatial Internet Doctrine. Case Western Reserve Journal of International Law 47:63–77Google Scholar
  24. Schmitt MN (2012) ILD 2012 Panel Discussion: Cyber Conflict and the Law of Armed Conflict, 25–27 June 2012,, accessed 13 May 2016
  25. Schmitt MN (2012) CyCon 2012 Tallinn Manual Part I, 4th Annual International Conference on Cyber Conflict (CyCon), 5–8 June 2012, Tallinn,, accessed 26 April 2016
  26. Schmitt MN (ed) (2013) Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press, CambridgeGoogle Scholar
  27. Schmitt MN (2015) PILAC Lecture on Cyber Operations and IHL: Fault Lines and Vectors, 3 April 2015,, accessed 11 May 2016
  28. Schmitt MN (ed) (2017) Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. Cambridge University Press, CambridgeGoogle Scholar
  29. Stein AR (1998) The Unexceptional Problem of Jurisdiction in Cyberspace. The International Lawyer 32:1167–1194Google Scholar
  30. Steinberg P, McDowell S (2003) Global Communication and the Post-Statism of Cyberspace: A Spatial Constructivist View. Review of International Political Economy 10:196–221Google Scholar
  31. Tsagourias N (2015) The Legal Status of Cyberspace. In: Tsagourias N, Russel B (eds) Research Handbook on International Law and Cyberspace. Edward Elgar Publishing, Cheltenham/Northampton, pp 13–29Google Scholar
  32. Werner WG (2017) The Law at Hand: What Does it Mean to Restate International Humanitarian Law in the Form of a Manual? In: Krieger H (ed) Legitimacy in International Humanitarian Law. ForthcomingGoogle Scholar
  33. Werner WG, Boer LJM (2017) It Could Probably Just as Well Be Otherwise: Imageries of Cyberwar. In: Ambrus M, Rayfuse R, Werner W (eds) Risk and the Regulation of Uncertainty in International Law. Oxford University Press, Oxford, pp 39–55Google Scholar
  34. Zeno-Zencovich V (2016) Around the CJEU Schrems Decision: Digital Sovereignty and International Governance of Telecommunication Networks. Accessed 27 November 2016

Copyright information

© T.M.C. Asser Press and the authors 2017

Authors and Affiliations

  1. 1.Vrije Universiteit AmsterdamAmsterdamThe Netherlands

Personalised recommendations