Election hacking, the rule of sovereignty, and deductive reasoning in customary international law

IF 1.3 2区 社会学 Q1 LAW Leiden Journal of International Law Pub Date : 2023-04-24 DOI:10.1017/S0922156523000092
S. Wheatley
{"title":"Election hacking, the rule of sovereignty, and deductive reasoning in customary international law","authors":"S. Wheatley","doi":"10.1017/S0922156523000092","DOIUrl":null,"url":null,"abstract":"\n This article considers the international laws applicable to irresponsible state behaviour in cyberspace through the lens of the problem of election hacking. The rule of sovereignty has taken centre stage in these discussions and is said to be preferred to the non-intervention rule because it evades the problem of coercion. Proponents of the cyber rule of sovereignty contend that there is such a rule; opponents reject the existence of the rule as a matter of existing law. The objective here is to explore the methodologies involved in the identification of the cyber rule of sovereignty under customary international law. The work first frames the debate in the language of regulative and constitutive rules, allowing us to show that a regulative rule of sovereignty can, logically, and necessarily, be deduced from the constitutive rule of sovereignty. The content of the regulative rule can also be deduced from the constitutive rule of sovereignty, but it has a more limited scope than claimed by the proponents of the rule, notably the Tallinn Manual 2.0. The rule of sovereignty prohibits state cyber operations carried out on the territory of the target state and remote cyber operations which involve the exercise of sovereign authority on that territory, e.g., police evidence-gathering operations. The rule of sovereignty does not, however, prohibit other remote, ex situ state cyber operations, even those targeting ICTs used for governmental functions, including the conduct of elections. The rule of sovereignty is not, then, the solution to the problem of election hacking.","PeriodicalId":46816,"journal":{"name":"Leiden Journal of International Law","volume":"36 1","pages":"675 - 698"},"PeriodicalIF":1.3000,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Leiden Journal of International Law","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1017/S0922156523000092","RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"LAW","Score":null,"Total":0}
引用次数: 0

Abstract

This article considers the international laws applicable to irresponsible state behaviour in cyberspace through the lens of the problem of election hacking. The rule of sovereignty has taken centre stage in these discussions and is said to be preferred to the non-intervention rule because it evades the problem of coercion. Proponents of the cyber rule of sovereignty contend that there is such a rule; opponents reject the existence of the rule as a matter of existing law. The objective here is to explore the methodologies involved in the identification of the cyber rule of sovereignty under customary international law. The work first frames the debate in the language of regulative and constitutive rules, allowing us to show that a regulative rule of sovereignty can, logically, and necessarily, be deduced from the constitutive rule of sovereignty. The content of the regulative rule can also be deduced from the constitutive rule of sovereignty, but it has a more limited scope than claimed by the proponents of the rule, notably the Tallinn Manual 2.0. The rule of sovereignty prohibits state cyber operations carried out on the territory of the target state and remote cyber operations which involve the exercise of sovereign authority on that territory, e.g., police evidence-gathering operations. The rule of sovereignty does not, however, prohibit other remote, ex situ state cyber operations, even those targeting ICTs used for governmental functions, including the conduct of elections. The rule of sovereignty is not, then, the solution to the problem of election hacking.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
选举黑客、主权规则和习惯国际法中的演绎推理
本文以选举黑客问题为视角,探讨适用于网络空间不负责任国家行为的国际法。主权原则在这些讨论中占据了中心位置,据说比不干涉原则更可取,因为它避免了强制的问题。网络主权规则的支持者认为,存在这样一种规则;反对者反对该规定的存在,认为这是现行法律的问题。本文的目的是探讨在习惯国际法下识别网络主权规则所涉及的方法。这项工作首先以规范性和构成规则的语言框架辩论,使我们能够表明,主权的规范性规则可以,逻辑上,并且必然地,从主权的构成规则中推导出来。监管规则的内容也可以从主权的构成规则中推导出来,但它的范围比规则的支持者所声称的要有限,特别是《塔林手册2.0》。主权规则禁止在目标国领土上开展的国家网络行动,以及涉及在该领土上行使主权权力的远程网络行动,例如警方取证行动。然而,主权规则并不禁止其他远程、异地网络行动,即使是针对用于政府职能(包括进行选举)的信息通信技术的行动。因此,主权规则并不是解决选举黑客问题的办法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
2.30
自引率
6.70%
发文量
67
期刊最新文献
International law in the minds: On the ideational basis of the making, the changing, and the unmaking of international law BinaryTech in motion: The sexgender in the European Court of Human Rights jurisprudence Rewriting the law of international organizations: Whither the Asia Pacific? Beyond the machinery metaphors: Towards a theory of international organizations as machines The Committee on the Rights of the Child and Article 12: Applying the Lundy model to treaty body recommendations
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1