1 Introduction

In 2000, Thomas C. Wingfield published a book entitled The Law of Information Conflict: National Security Law in Cyberspace.Footnote 1 Legal writing on the application of international law to war in cyberspace had only just started to emerge, and Wingfield was one of a group of predominantly US scholars already concerned with this new form of warfare. ‘Advances in computer technology and networking’, he wrote, ‘will revolutionize future warfare as well as reshape the rule of law and traditional notions of sovereignty’.Footnote 2 The aim of his book, therefore, was ‘to serve as a modest beginning to the task of providing a detailed analysis of the law of information conflict’.Footnote 3

Part of this analysis pertains to Article 2(4) of the UN Charter, the prohibition on the use of force. In his sixth chapter, entitled ‘Application of Existing Rules’, Wingfield attempts to reconstruct the meaning of the prohibition so as to see whether it can feasibly serve to regulate cyberattacks. He states that this attempt is however somewhat hampered by the absence of actual examples of the kind of information conflict envisaged: he writes how ‘there are no reported information operations in cyberspace that will exemplify these principles’.Footnote 4 So instead he resorts to ‘somewhat simplified hypothetical scenarios […] to demonstrate how [the] jus ad bellum may restrict state activities in cyberspace’.Footnote 5 One of these stories reads as follows:

State B completely jams all electronic transmissions into, out of, and within State A. This has a devastating effect on State A […] Emergency services are significantly curtailed throughout State A, and the flow of emergency medical data between hospitals has stopped. No financial transaction can occur electronically within State A or between anyone in State A and someone in another state. The volume of imports and exports has dropped sharply 95% from the previous month […] Without a single shot being fired, State A has effectively been brought to its knees in a few short months and is at the complete mercy of State B.Footnote 6

Wingfield concludes this scenario with the claim that ‘State B’s virtual blockade of State A is a use of force within the meaning of Article 2(4)’.Footnote 7

The kind of storytelling as done here by Wingfield is not particular to the debate on cyberattacks, but its context is very specific. Back in 2000, legal scholars could draw on very little (if any) actual examples of the kinds of cyberattacks they were concerned with when considering the application of rules such as Article 2(4).Footnote 8 Writing around the same time, another major contributor to the debate—Michael Schmitt—similarly stated how ‘[h]ypothetical examples of [computer network attacks], some realistic, others stretching credulity, abound in the literature’.Footnote 9 This changed only recently with the emergence of real-world cyberattacks: writing in 2014, Marco Benatar stated how ‘[t]he rise in the number of serious cyber incidents in recent years, once confined to science fiction lore, has led various writers to take such attacks as the point of departure for their scientific inquiries’.Footnote 10

So, Thomas Wingfield refers to ‘scenarios’, Marco Benatar to ‘science fiction lore’ and Michael Schmitt to ‘hypothetical examples stretching credulity’. In other words, in this debate storytelling is used as a ‘structured attempt to imagine […] what cyberwar might, could, or ought to look like from the perspective of international law’.Footnote 11 Whether these stories are ‘hypothetical account[s]’ or the ‘retellings of actual events’,Footnote 12 we can identify them as serving a particular purpose in legal argumentation: as illustrations, examples or (in the words of Wingfield) ‘a superb way to demonstrate’ how law operates ‘in practice’.Footnote 13

But to view these hypotheticals or retellings as stories does raise the question of which other ‘stories’ are told in legal scholarship. There is no reason to reduce the notion of narrative to that which we ‘intuitively recognize’Footnote 14 as such. As Jane Baron and Julia Epstein point out, legal scholarship itself might similarly be regarded as narrative.Footnote 15 Articles in journals, book chapters, posts on well-known blogs such as Opinio Juris or EJIL Talk!, after all, are also ‘stories about what the law is or could be’.Footnote 16 In this view, ‘narrative’ refers to more than just the scenarios or examples that illustrate what cyberwar might look like, or the rendition of cyberattacks that have ‘actually’ happened. The attempts by scholars such as Thomas Wingfield to interpret a norm in order to facilitate its application to cyberattacks are also narratives about the meaning of law.

To consider international legal scholarship as ‘stories about what the law is’ changes the questions we ask of the texts we read. From a doctrinal point of view an article about cyberattacks and Article 2(4) may offer a more or less persuasive interpretation of the prohibition on the use of force. For example, we may be convinced by the argument that, if economic coercion does not constitute force, neither should a cyberattack on the New York Stock Exchange.Footnote 17 But to view the same piece as a narrative about what the law is or should be raises a different set of questions. Rather than asking which interpretation is the most convincing, we might want to know who is doing the storytelling and in what way; who are the main characters in the narrative and how they are portrayed.

Specifically, in this article I want to consider these stories about cyberattacks and international law as plot-driven: the writer of the piece sets out to solve the legal problem of cyber operations and, as readers, ‘[w]e want to know the story’—we want to know ‘how it ends’.Footnote 18 I will elaborate on the notion of ‘plot’ below, but for now it suffices to point out what it does analytically: it puts the writer in the spotlight as she ‘temporally unfolds’ the text to the reader.Footnote 19 ‘Plot’ is that which exposes the presence of the writer in the text as well as that which is aimed at making the reader continue reading.Footnote 20 Yet when we read an individual article or book chapter we are hardly aware of the writer, guiding us through the text.Footnote 21 The writer hardly seems to figureFootnote 22 in what we absorb when we read. But ‘texts do not […] write themselves’, and the same goes for law and legal scholarship.Footnote 23 Thus, my aim in thinking about these articles on cyberattacks and international law in this way is to show where and how in these academic texts the writer attempts to model the reading experience. A different way of phrasing this is that the words chosen by a writer impact what we think the law is in a particular field, yet, ‘as a reader, you hardly notice that you’re not free when you’re reading a text’.Footnote 24 So my aim here is to show where those restrictions on our reading experience—the boundaries of what is and is not law—are imposed by the writer.Footnote 25 In short, I want to show that these are people writing law, and they can be made visible in their own texts.

The article is structured as follows. In Sect. 2 I will situate this piece in relation to literary theory and law and literature scholarship specifically, elaborating on different notions of the concept of ‘narrative’ and what it does for the study of law.Footnote 26 In Sect. 3 I move on to explain, with reference to the work of Peter Brooks,Footnote 27 my understanding of ‘plot’ as a specific element of narrative. To explain what I mean when I claim that ‘plot’ exposes the presence of the writer in the text, I also discuss the example of metatext in scholarship. Metatext roughly means ‘text about text’Footnote 28; phrases such as ‘in section 2 I will situate this piece…’ By these means writers explicitly ‘manifest’Footnote 29 themselves in the text, and a discussion of metatext will therefore hopefully help in explaining what I mean by plot as similar—though perhaps less obviousFootnote 30—proof of the writer’s presence.Footnote 31 Section 4 concludes the article.

A note on my choice of subject as well as my method is in order. As is apparent from this introduction, in this piece I use the debate on cyberattacks and international law to illustrate how plot and metatext signal the presence of the writer in the text. The reason for singling out this debate is precisely because legal scholars have played such a prominent part in it: for years, states have kept quiet on how they think international law applies to cyberattacks. This means that the space afforded to legal scholars to come up with their own solutions is much bigger than if there had been a plethora of state practice.Footnote 32 It is therefore an interesting debate for numerous reasons, one of which is that international legal scholars are so visible as the ones coming up with international law as we know it.Footnote 33

Finally, a note on method. Previously, the ‘interdisciplinary […] analysis of narratives’Footnote 34—narratology—was concerned with the common elements of narratives.Footnote 35 This approach entails a search for stories’ ‘underlying structures’, a ‘model’ that would apply to the way narratives proceed ‘across time and cultures’.Footnote 36 However, in this article I follow (to a degreeFootnote 37) Peter Brooks’ approach to plot, which deals with how plot ‘drive[s] the text forward’, ‘with how narratives work on us, as readers’.Footnote 38 This means that in this article I focus on what the plot of an individual piece of scholarly writing does for the overall legal argument: how the steps a scholar takes in her legal reasoning ‘drive the argument forward’ toward a seemingly inevitable ending.Footnote 39 Importantly, this ‘work’ done on the reader by means of plot and metadiscourse is work done by the writer on an imagined reader—imagined by the writer.Footnote 40 Writing about metadiscourse Geoff Thompson states how it is aimed at the ‘reader-in-the-text’, or ‘the reader as enacted by the writer’.Footnote 41 My analysis therefore aims to uncover how the writer presumes her reader will ‘respond’, as ‘evidence[d] from the text’.Footnote 42 What this means is that I am concerned with the textual, ‘tangible’ presence of the writer in her text.

2 On Stories and Narratives: A Brief Introduction

As the Cambridge Companion to Narrative states, ‘[i]n informal usage, narrative is a synonym for story’.Footnote 43 Normal language use does not differentiate between the two, and in the introduction to this article ‘narrative’ and ‘story’ were similarly used interchangeably. However, in literary theory a distinction is made between ‘story’ and ‘narrative’—and the same distinction will be maintained in the remainder of this text.Footnote 44 The basic idea is that ‘a story is separate from its rendering’.Footnote 45 What this means is that a narrative can be organized in different ways, all the while referring to the same order of events (the story). Simply put, ‘something’ is being told in a particular way: the ‘something’ here being the story; its rendering the narrative.Footnote 46 More comprehensively defined, a narrative,

is a representation of (i) a structured time-course of particularized events that (ii) introduces conflict […] into a storyworld […] conveying (iii) what it’s like to live through that disruption.Footnote 47

In other words, narrative is about the conscious effort on the part of the writer to construct a particular reality by ‘structuring events’, ‘introducing a problem’ and conveying ‘what it’s like’ to experience that problem. Although there are multiple definitions of narrative around, the difference between story and narrative as such is informative in that it highlights that what we call narrative is a very specific representation of a story: ‘the chronological sequence of situations and events’Footnote 48 may be told in many different ways.

Legal scholars have, for some time now, paid attention to the way legal stories are told.Footnote 49 ‘[L]aw is awash in storytelling’,Footnote 50 Anthony Amsterdam and Jerome Bruner state, and the most obvious example might be the stories told in a courtroom:

Clients tell stories to lawyers […] As clients and lawyers talk, the client’s story gets recast into plights and prospects, plots and pilgrimages into possible worlds […] If circumstances warrant, the lawyers retell their clients’ stories in the form of pleas and arguments […] Next, judges and jurors retell the stories to themselves or to each other in the form of instructions, deliberations, a verdict, a set of findings, or an opinion. And then it is the turn of journalists, commentators, and critics. This endless telling and retelling, casting and recasting is essential to the conduct of the law.Footnote 51

Narratives, Amsterdam and Bruner claim, are crucial to our understanding of ‘what happened’Footnote 52 in a particular case, and the easiest way to grasp why they matter is by focusing on their rhetoric. Marianne Constable points out that there is a difference between saying ‘the man dropped the package’ versus ‘the package was dropped by the man’ for our understanding of exactly the same situation.Footnote 53 Constable explains how the first phrase—the man dropped the package—places responsibility for dropping the package squarely with ‘the man’, simply by virtue of its grammar. The man is the acting subject in this phrase, she states; he is the one dropping the package. Conversely, ‘the package was dropped by the man’ is far less direct: written in the passive voice ‘the man’ moves into the background and instead, something happens to ‘the package’.Footnote 54 This shows, at a micro-level, why narrative matters: these are all different accounts (narratives) of the same event (or story) and the account we adhere to determines what we think happened—and thus matters to legal outcomes.Footnote 55 In the words of Peter Brooks, ‘our tellings reorganize events’Footnote 56 and it is not for nothing, he adds, that US Supreme Court opinions end with the phrase, ‘[i]t is so ordered’.Footnote 57 This is not just a Court making a final decision as to how the law applies in a particular case: the decision itself is a choice to ‘order’Footnote 58 a story in a particular way.

Stephen Paskey takes this notion of narrative and law even one step further and argues that all law is narrative. Narrative emerges not just in the statement of a rule and its application to a concrete case: he claims that ‘the elements of [a] rule correspond to the elements of a story and have a logical relationship that qualifies as a “plot”’.Footnote 59 ‘[E]very governing rule demands a story’, he writes: the set-up of every rule is, in itself, a story, and therefore demands that its application proceeds according to a specific narrative (‘stock stories’, in his words).Footnote 60

Law and literature scholarsFootnote 61 thus mainly focus on court cases and legal briefs, but the focus of this article lies specifically on legal scholarship as narrative. Paulina Starski points out that ‘[w]ithin academic contributions, sequences of events, climaxes, imageries, personas, myths, scenarios […] and “narrative closures” can be identified’.Footnote 62 Legal scholarship, as much as judges’ rulings and lawyers’ defence of their clients, ‘can also be seen to tell stories about what the law is or could be’.Footnote 63 Viewed as such, plot has a particular explanatory function when looking at legal scholarship: it is that which moves the narrative forward.Footnote 64 As stated in the introduction, in this article the notion of ‘plot’ serves the purpose of exposing the presence of the writer in the text; someone who exercises control over the ‘order’ in which we as readers receive the information about the law that is applied. The outcome of the law-application in question may be told right away or not revealed until the very end of the piece—but in both instances plot decisions are being made by the writer.Footnote 65 Therefore, in the next section I will draw on the notion of plot to show where the writer takes control of the way in which we are familiarized with the outcome of ‘legal problem–solution’.Footnote 66

3 Plot and the Presence of the Writer

Plot, in literary theory, is ‘an even slipperier term than narrative’; ‘polyvalent’ and ‘vague in ordinary usage’.Footnote 67 When literary theorists discuss what plot ‘does’ for a narrative they use phrases such as ‘the itch to find out’, ‘narrative with something “done to it”’, or the ‘temporal unfolding’ of the narrative.Footnote 68 But however vague it may be and however much it may lack a uniform definition, the notion of plot seems to point in the direction of that which moves the story along: ‘[w]e want to know the story’.Footnote 69 What literary theorists refer to when writing about ‘plot’ is the idea of the ‘management of suspense’ and the expectations the reader has about where the narrative is going next.Footnote 70 This also highlights the crucial role played by the reader in the experience of plot.Footnote 71 There is no plot without a reader there to absorb it: ‘the reading of plot [is] a form of desire that carries us forward, onward, through the text’.Footnote 72 As an example, consider how this article starts anecdotally with a reference to the book by Thomas Wingfield. This is a conscious effort on my part to (hopefully) draw in the reader, urging her along. So ‘plot’ has a lot to do with the way a narrative is structured. Legal scholarship, as does fiction, presents a certain kind of ‘ordering’,Footnote 73 a decision made by a writer to present events—legal interpretation—in one way rather than another. This choice about order subsequently impacts the ‘experience of reading’: plot is ‘goal-oriented and forward-moving’.Footnote 74 If, then, plot is equated with leaving the reader in suspense, textual ordering as a very ‘careful decision’Footnote 75 by the writer turns into a structuring device.

As a starting point, and to show what I mean by plot as a structuring device, I turn to a concrete example of legal scholarly writing. The example I use here is a book chapter written about the application of the jus ad bellum to attacks perpetrated by states in cyberspace. The debate the writer refers to is that on the meaning of the prohibition on the use of force, found in both customary law as well as Article 2(4) of the Charter of the United Nations. Most scholars claim that the meaning of the word ‘force’—at least in the context of international law—is restricted to the use of military or armed force, and that it takes some interpretive effort to include cyberattacks.Footnote 76 The question that is central to their writing is whether the prohibition on the use of force allows for extension towards cyberattacks and, if so, how. However, my concern here is not with the substance of these claims: rather, I wish to point out the way in which they are presented.

The chapter in question is taken from James Green’s Cyber Warfare: A Multidisciplinary Analysis: an edited volume containing a variety of contributions on the issue of cyber warfare from a wide range of writers.Footnote 77 The topics they address include the jus in bello as it applies to cyberattacks, the just war tradition and the problem of attribution in cyberspace. Green himself wrote the chapter on the applicability of the jus ad bellum. Two pages into his chapter it is already clear what he will argue: that the debate on Article 2(4) and cyberattacks glosses over the fact that the application of these rules will be obstructed by the (legal and technical) difficulty of attributing cyberattacks.Footnote 78 Those first couple of pages serve as a summary of the chapter as a whole: Green starts with the problem statement that ‘at present, there are no specific rules of international law governing the interstate use of cyber force’. He then moves on to list several scholarly efforts to nonetheless give concrete meaning to existing law, concluding that the ‘majority view […] is that the existing rules of international law are applicable […] to cyber warfare’. Added to this then is his own view: ‘[t]he first part of this chapter’, he writes, ‘sets out [the] debate as to the correct interpretation of Article 2(4)’, but will conclude—we are told—that it is ‘extremely difficult to determine whether Article 2(4)’ ‘works’ in cyberspace. Subsequently, ‘[the] chapter goes on to argue’ that whatever the correct interpretation of Article 2(4), the lower threshold of the non-intervention principle means that ‘resort to cyber warfare will in most cases be unlawful’. However, both the prohibition on the use of force as well as the non-intervention principle suffer from the problem of attribution: it is often unknown who the attacker is, and scholarly proposals to come up with a treaty to regulate cyberwar specifically suffer from the same fate. Therefore, Green announces he will conclude the chapter by proposing a focus on the due diligence principle.

The decision made by Green to inform his readers from the outset what ‘the chapter’ will argue immediately clarifies how we are to read the remainder of his chapter and what its overall claim is. These choices made by a writer—whether to summarize the whole piece in the introduction or notFootnote 79—are choices about order: they aim to structure the ‘experience of reading’. James Green’s introduction is a push in a very distinct direction; a push toward a reading experience different from a chapter introduction that claims to present an overview of existing law. Green’s is a normative claim about, to put it bluntly, what is wrong with the law and how it can be fixed. As an alternative, consider the introduction of Marco Roscini’s chapter on the same topic: the application of the jus ad bellum to cyberattacks.Footnote 80 As does James Green, in his introduction Marco Roscini presents an overview of his chapter. However, there is no sense here of a main claim or of a very strong argument as to whether or not cyberattacks allow for regulation under existing laws of war. Instead, he writes how the overall aim of the chapter is to ‘discuss how the Charter’s provisions on the use of force apply to cyber operations’. In order to do so, ‘[i]t will first explore if and when a cyber operation amounts to a use of force’, followed by a ‘discuss[ion] whether the state victim of a cyber operation can invoke the right of self-defence by cyber or kinetic means against it’. The chapter then ‘analyse[s]’ ‘[r]emedies against cyber operations below the level of armed attack […] before turning to the role that the UN Security Council can play in relation to cyber operations’.

This is where his introduction stops. At this point in the text we have no idea what Marco Roscini will eventually conclude with regard to the legal issues he raises; we are merely presented with an overview of what he will discuss. Interestingly, this sense of ‘merely’ presenting an overview, the much less explicit tone adopted by Roscini in his introduction, is mirrored in his conclusion. He summarizes his ‘findings’ in six, numbered points, followed by two tables presenting a ‘[q]ualification’ of cyberattacks as well as possible remedies.Footnote 81

Considering how plot is the ‘temporal unfolding’ of the narrative, ‘carrying us forward, onward, through the text’ the effects achieved by these two introductions are very different. James Green’s introduction pushes us toward a very explicit conclusion about how the law works in this field and what is wrong with it. By contrast, the experience of reading Roscini’s introduction is the exact opposite: there is a calmness to it and an almost reassuring sense that, at the end of this chapter, we will have been informed ‘what the law is’.

This writing towards a certain conclusion does not just happen, obviously, by means of an introduction: it happens throughout a text by means of ‘subplots’, if you like—twists and turns in a text that direct the narrative towards its ultimate conclusion about what we are told by the writer is or should be law.Footnote 82 In order to better explain what I mean when I claim that this exposes the presence of the writer, the next section takes a closer look at some legal texts. I start by looking at their metadiscourse: the words by means of which these writers explicitly organize their texts, either by structuring it or by adopting a specific position.Footnote 83 This then serves to revisit the plot of their work and to ask again how we are directed towards a conclusion about the meaning of law.

3.1 Taking a Closer Look

As a start, let’s return to James Green’s chapter on the jus ad bellum and cyberspace. A few pages in Green elaborates on the meaning of the word ‘force’ in Article 2(4). After first positing that the prohibition on the use of force is not limited to attacks against the ‘territorial integrity or political independence’ of the state, but covers all uses of force, Green states the following:

While it can be said that all ‘uses of force’ are covered by Article 2(4)’s prohibition, this begs a much more problematic question for the regulation of cyber warfare under the jus ad bellum: do interstate cyber-attacks qualify as ‘uses of force’ in the first place? The primary debate in the international law literature, which has raged since the late 1990s, is whether a cyber-attack equates to ‘force’ as per Article 2(4). If so, then such action is prohibited by that article; if not, rather obviously, it falls outside of its reach. Unfortunately, Article 2(4) itself does not define what it means by ‘force’. Long before the advent of cyberspace, states and scholars therefore debated what was included in the term and what was not. In particular, the question was whether actions such as economic and political coercion should be considered ‘force’ for the purposes of Article 2(4), or whether the provision is restricted to what might be termed ‘armed force’ (i.e. troop movements, gunfire, explosives and so on) […] The starting point for interpreting the meaning of provisions of a treaty is to consider [their] ordinary meaning […]Footnote 84

Printed in bold in the quote above are the metadiscursive elements in Green’s text. Metadiscourse refers to ‘those aspects of the text which explicitly refer to the organisation of the discourse or the writer’s stance towards either its content or the reader’.Footnote 85 As an example from my own text: at the end of the previous section I announced what I would discuss in this one. This is ‘textual metadiscourse’, to be more precise, an ‘endophoric marker’ which ‘[r]efer[s] to information in other parts of the text’.Footnote 86 We also find these ‘endophoric markers’ in the introduction of Green’s chapter: he writes that ‘[t]he first part of this chapter sets out…’; it then ‘goes on to argue’ and ‘[n]ext […] considers’.Footnote 87 Writing about metadiscourse, Thompson refers to these words as ‘involv[ing] the management of the flow of information and thus serv[ing] to guide readers through the content of the text’.Footnote 88 This is not the only way the writer directs our thoughts, however: Hyland refers to the second category of metadiscourse as ‘interpersonal’.Footnote 89 By means of these words the writer communicates how she ‘feels’ about the claims she puts forward.Footnote 90 For example, James Green writes how ‘unfortunately, Article 2(4) itself does not define what it means by “force”’. This is an example of an ‘attitude marker’Footnote 91 by means of which we come to know how James Green ‘feels’ about Article 2(4) itself not defining what it means by force. It paves the way for what we read in the next sentence: that ‘states and scholars therefore debated what was included in the term and what was not’.

Words such as ‘whether’, ‘if so’ followed by ‘if not’, ‘therefore’, ‘in particular’, and ‘the starting point’ all structure the text and are all ‘strateg[ies] for guiding the reading process’.Footnote 92 We are told how a phrase relates to the one preceding it, and there are numerous qualifications James Green gives in relation to the debate his piece deals with. Similarly, the four paragraphs following the one quoted above all start with phrases that may be read sequentially: ‘[t]he starting point for interpreting […] a treaty’, ‘[e]lsewhere in the UN Charter’, ‘[o]ther scholars, however, have…’, and ‘[a]lso potentially supporting a more restrictive reading…’ They furthermore contain words such as ‘might well suggest’, ‘certainly arguable’, ‘entirely contradictory’, ‘strongly indicates’ and ‘perhaps should’.Footnote 93 This is the text being ‘unfolded’ by the writer, and the way it unfolds is through ‘various kinds of textual clues that writers give to readers’.Footnote 94 In this way we are told a particular narrative about the meaning of force, and at the end of it James Green tells his reader that these ‘interpretive gymnastics’Footnote 95 really have not got us anywhere.

Ken Hyland, whose model of metadiscourse is used in this section, describes metadiscourse as the way in which ‘writers project themselves into their work’.Footnote 96 Something ‘might well suggest’; alternatively, it may ‘strongly indicate’; something is ‘certainly arguable’ or ‘perhaps should’ be read differently.Footnote 97 By means of these phrases the writer constantly makes an appearance in the text, qualifying terms and directing our focus. This is one of the ways in which ‘authorial control’Footnote 98 may be exercised by the writer, and it aims to affect how we perceive certain claims. For example, rather than claim that it is ‘unfortunate’ that Article 2(4) ‘does not define what it means by “force”’, Green could also have considered it fortunate that it does not do so. After all, arguably this openness allows for the inclusion of new ways of waging war—such as cyberattacks. So to point out how ‘authorial control’ is exercised is really no different than saying that this narrative could have been told differently, but that it wasn’t.Footnote 99

The same holds true for an article’s or a book chapter’s narrative at large. Zooming out from the metadiscursive level to the plot twists in Green’s text, we see the way in which the writer orders what he ‘knows’ about the law.Footnote 100 Basically, the paragraphs referred to above constitute a narrative about the boundaries of Article 2(4).Footnote 101 It starts with a very specific way of talking about the history of the prohibition on the use of force: a ‘method of “historization”’, Paulina Starski names it, in which legal scholars ‘display how specific norms have evolved, in which historical setting they were enacted and how they used to be interpreted by jurisprudence’.Footnote 102 In the narrative that Green presents, this little bit of history provides a jumping-off point for a discussion of the ‘secondary method of treaty interpretation’: the travaux of the UN Charter.Footnote 103 Concluding that these reveal that force should be read as armed force, Green discusses several attempts by scholars to see whether cyberattacks could be considered as such—as armed force. Not surprisingly given what he announced in the introduction of his chapter, none of these suffices: a couple of pages further on we are told that the debate on Article 2(4) is both ‘exhaustive and exhausting’.Footnote 104 This, again, is a sub-plot: it opens up space for a move towards a discussion of the non-intervention principle.

The point of these sub-plots in the text is precisely to induce a sense of inevitability to our ‘findings’ and the conclusions we ‘draw’.Footnote 105 The narrative James Green presents about the meaning of law is ordered in a very specific way, telling a very specific story about what the law is and why this debate has developed the way it has—and what would be the more obvious legal solution for the problem of cyberattacks. Scholars’ inconclusive ‘interpretive gymnastics’ might ultimately point in the direction of the due diligence principle; but alternatively, the uncertainty surrounding the application of Article 2(4) leads them to construct a tool that should help state legal advisors evaluate cyberattacks as close as possible to the UN Charter framework.Footnote 106

This emphasis on the order in which a narrative is told, and what that order ‘does’ for our overall experience of the strength of the argument, is precisely what happens when we consider legal scholarship as driven by a particular plot. In the Preface to Reading for the Plot Peter Brooks states that

[e]ven more than with plot […] I shall be concerned with plotting: with the activity of shaping, with the dynamic aspect of narrative—that which makes a plot ‘move forward,’ and makes us read forward, seeking in the unfolding of the narrative a line of intention and a portent of design that hold the promise of progress toward meaning.Footnote 107

Brooks talks here of ‘the activity of shaping’, ‘a line of intention’ and the ‘portent of design’. If we apply this notion of ‘plotting’ to legal scholarship, one way of understanding Brooks’ point is that the way in which our research proceeds is not the same as the way we eventually write down our findings.Footnote 108 We can even attempt to visualize how this happens: as writers, we sit behind our desks trying to come up with the phrases and formulations that will work best to convey our points. There is a difference between our ‘research acts’ and our ‘writing acts’,Footnote 109 between the order in which we consult our books and journal articles and the way in which we eventually write down what we found there. To explain what I mean, consider an example from a chapter written by Nicholas Tsagourias about ‘the legal status of cyberspace’.Footnote 110 The chapter deals, inter alia, with questions of jurisdiction and sovereignty in cyberspace, and includes a discussion on whether cyberspace may be seen as a global commons. Concluding his chapter Tsagourias writes the following:

It is apparent from the preceding discussion that cyberspace has not acquired any special legal status in international law but instead existing legal categories and principles have been applied to cyberspace. By doing so, a non liquet has been avoided; a finding that is of a substantive or interpretative gap in international law.Footnote 111

This paragraph is clearly aimed at flagging a conclusion for the reader: if I have read the chapter in its entirety and followed Tsagourias’ arguments this far, I can also see how he comes to claim that ‘a non liquet has been avoided’ (though, of course, I may still substantively disagree). The application of law is presented here as steadily advancing towards a certain inevitable outcome. ‘[O]ur arguments aspire to the linearity of a geometric proof’, Gerald Wetlaufer writes: if X, then Y must follow logically.Footnote 112 Yet the fact that they were written down in order to be experienced as such by the reader—Brooks’ ‘activity of shaping’—should be enough to make us wonder about the writer. Legal doctrinal scholarship presents a narrative which ‘temporally unfolds’ towards a certain outcome—the plotFootnote 113 of a legal argument—but the writer already knows how it ends. Viewed like this, the ‘finding’ that ‘a non liquet has been avoided’ gains a different flavour.Footnote 114 Brooks writes that ‘prior events, causes, are so only retrospectively, in a reading back from the end’. He adds how we may compare the application of law in an individual article or book chapter with a

detective story […] using the plot of the inquest to find, or construct, a story of the crime which will offer just those features necessary to the thematic coherence we call a solution, while claiming, of course, that the solution has been made necessary by the crime.Footnote 115

This reveals the juxtaposition of the reader’s experience of the ‘temporal unfolding’ of the answer to a legal problem, versus the writer’s ‘intervention’Footnote 116 in portraying this ‘legal problem–solution’ as a linear process. Those who narrate have the benefit of hindsight: ‘[n]arrative […] is retrospective’,Footnote 117 yet experienced in the completely opposite direction by the reader.Footnote 118

4 In Conclusion: The Present Writer

When it first came out in 1999, many reviewers of the film Mansfield Park noted the extent to which its storyline deviated from the original novel.Footnote 119 The film merges the novel’s main character, Fanny Price, with the life of the novel’s writer, Jane Austen, and according to some critics this meant the film was taking too many liberties with the original story.Footnote 120 The blend between the ‘life’ of Fanny Price and that of Jane Austen also emerges at the end of the film, when Fanny Price addresses the audience by means of a voice-over. While pondering the different ways the characters end up in the narrative and how their lives could have ended up differently, she says, ‘it could have all turned out differently I suppose. But it didn’t’.Footnote 121 We may add, ‘and it wouldn’t’.Footnote 122 Considering that this may be also the writer of the novel speakingFootnote 123 the possibility of alternative endings is illusory.Footnote 124 Of course it did not end differently, because the writer did not wish it.Footnote 125 Nor did James Green, when he considered what international law should do with the problem of cyberattacks, write a different ending to his piece, even though the sense of inevitability in legal problem–solution is all-pervasive. Similarly, Nicholas Tsagourias writes how a ‘non liquet has been avoided’, suggesting ‘it could have turned out differently’ if the law had dictated otherwise.Footnote 126

Yet the law does not speak for itself, and on the previous pages my aim was to show how its writers direct our focus in the text and thereby impact what we think the law is.Footnote 127 ‘[T]he scholar him- or herself is an essential persona within [the] discursive plot’,Footnote 128 Paulina Starski writes, and she adds that to think of law as narrative ‘exposes […] the concealment of the “I” and the misconception of the legal scholar as a purely objective observer’.Footnote 129 This ‘concealment of the I’ also results from legal writing conventions, e.g. the frequent use of the passive voiceFootnote 130 and the use of the third person, e.g. ‘the present author argues’.Footnote 131 It imbues legal scholarship with a ‘disembodied voice’, the ‘implicit claim that what we say in the text is objective, neutral, noncontingent, and wholly rational’.Footnote 132 This is certainly true for the works discussed here. James Green writes how ‘[t]his chapter evaluates’; ‘it’ also ‘sets out’, ‘considers’ and ‘argue[s] that’, and in it, ‘the present author shares’ another scholar’s ‘view that the Nicaragua “effective control” test is the more appropriate way of attributing cyber operations’.Footnote 133 Similarly, Marco Roscini writes how ‘[r]emedies against cyber operations below the level of armed attack will […] be analysed before turning to the role that the UN Security Council can play in relation to cyber operations’.Footnote 134 Moreover, like James Green, he refers to ‘the present author’s view’ and how ‘the present author has suggested elsewhere …’.Footnote 135

The ‘absence of an author’Footnote 136 occasioned by these phrases certainly makes it easier to ‘forget the subject’ whose writing and speaking ‘thinks [and] produces law’.Footnote 137 But to call this ‘forgetting’ and blame it on grammar is to gloss over a more fundamental point. The rather extreme ‘effacement of any mediating narrator’Footnote 138 achieved through a choice of grammar may indeed turn writers into ‘non-participants of the communicative exchange’,Footnote 139 but more fundamentally, it is the writer who is effacing herself from the text. Jane Baron and Julia Epstein state how legal scholarship ‘also tells a “story” about its author—if only, in many articles, a story of invisibility’.Footnote 140 Tellingly, in linguistic studies of academic writing both the use of the first person pronoun as well as the third (‘the present author’) are referred to as ‘self-mentions indicat[ing] author presence’.Footnote 141 The writer’s invisibility is self-imposed, and in that sense as much proof of her presence as her overt textual appearance would be. James Green is as present in his text if he writes ‘in this chapter it is argued’ as he would have been had he only used the first person singular.Footnote 142 With this in mind, to write a phrase such as ‘in this chapter it is discussed how the jus ad bellum applies to cyberattacks’ is no different from writing ‘I think that the jus ad bellum doesn’t apply to cyberattacks’. Both phrases signal the presence of a writer, orchestrating a particular experience of reading—ordering the law into its proper meaningFootnote 143—it is just that they do so in very different ways.