首页 > 最新文献

Research Handbook on International Law and Cyberspace最新文献

英文 中文
Cyber Espionage and International Law 网络间谍与国际法
Pub Date : 2018-12-27 DOI: 10.5040/9781782257370
R. Buchan
This chapter provides an international law response to the dramatic increase in state-sponsored cyber espionage in recent years. The chapter pursues three objectives. First, to provide a working definition of the concept of cyber espionage in order to provide some much-needed clarification to the meaning of this practice and, further, to refine the research scope of this chapter. Second, to present cyber espionage as a pernicious practice that represents a threat to international peace and security and which is thus in need of international regulation. Third, to assess whether cyber espionage is already prohibited by international law. In particular, this chapter contends that cyber espionage is an inherently coercive act that compromises the political integrity of sovereign states and to this end constitutes a violation of the principle of non-intervention. In contrast, the chapter argues that because cyber espionage results in the copying of confidential information and does not produce kinetic damage, cyber espionage does not amount to an unlawful use of force under Article 2(4) UN Charter and thus cannot amount to an armed attack within the meaning of Article 51 UN Charter.
这一章提供了对近年来国家支持的网络间谍活动急剧增加的国际法回应。本章追求三个目标。首先,提供网络间谍概念的工作定义,以便为这一实践的含义提供一些急需的澄清,并进一步完善本章的研究范围。二是将网络间谍视为威胁国际和平与安全、需要国际规范的有害行为。第三,评估网络间谍活动是否已被国际法所禁止。特别是,本章认为网络间谍活动本质上是一种强制行为,它损害了主权国家的政治完整,因此违反了不干涉原则。相反,本章认为,由于网络间谍活动导致机密信息的复制,并且不产生动能损害,因此网络间谍活动不构成《联合国宪章》第2(4)条所指的非法使用武力,因此不构成《联合国宪章》第51条所指的武装攻击。
{"title":"Cyber Espionage and International Law","authors":"R. Buchan","doi":"10.5040/9781782257370","DOIUrl":"https://doi.org/10.5040/9781782257370","url":null,"abstract":"This chapter provides an international law response to the dramatic increase in state-sponsored cyber espionage in recent years. The chapter pursues three objectives. First, to provide a working definition of the concept of cyber espionage in order to provide some much-needed clarification to the meaning of this practice and, further, to refine the research scope of this chapter. Second, to present cyber espionage as a pernicious practice that represents a threat to international peace and security and which is thus in need of international regulation. Third, to assess whether cyber espionage is already prohibited by international law. In particular, this chapter contends that cyber espionage is an inherently coercive act that compromises the political integrity of sovereign states and to this end constitutes a violation of the principle of non-intervention. In contrast, the chapter argues that because cyber espionage results in the copying of confidential information and does not produce kinetic damage, cyber espionage does not amount to an unlawful use of force under Article 2(4) UN Charter and thus cannot amount to an armed attack within the meaning of Article 51 UN Charter.","PeriodicalId":147844,"journal":{"name":"Research Handbook on International Law and Cyberspace","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131034289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
International criminal responsibility in cyberspace 网络空间国际刑事责任
Pub Date : 2015-06-26 DOI: 10.4337/9781782547396.00015
K. Ambos
The primary objective of this chapter is to give a reliable overview of the state of the art with regard to 'computer network attacks' (CNAs) or cyber-attacks. A CNA constitutes the strongest form of what is regarded to be cyber warfare, i.e., the use of technical means to wage war against an adversary in cyberspace. The focus on CNAs is explained by the fact that only these forms of crimes in cyberspace are normally serious enough to qualify as international crimes and thus be covered by an international criminal jurisdiction like the ICC. As to ‘international criminal responsibility’ the current debate in the cyber context is mostly concerned with the application of the law of armed conflict or international humanitarian law (IHL) to CNAs (infra Section 2). Less intense is the debate regarding a possible criminal responsibility for a crime of aggression (infra Section 3). Finally, there is virtually no debate regarding the commission of crimes against humanity by way of CNAs but it is worthwhile taking a brief look at this possibility too (infra Section 4). There are, of course, other issues regarding international criminal responsibility in cyberspace but they must be left to further inquiries.
本章的主要目标是对“计算机网络攻击”(CNAs)或网络攻击的最新状况给出一个可靠的概述。CNA构成了被认为是网络战的最强形式,即使用技术手段在网络空间对对手发动战争。对cnna的关注可以解释为这样一个事实,即只有网络空间中的这些形式的犯罪通常才严重到足以构成国际犯罪,从而受到国际刑事法院等国际刑事管辖权的管辖。关于“国际刑事责任”,目前在网络环境下的辩论主要涉及武装冲突法或国际人道法(IHL)对cna的适用(见第2节)。关于侵略罪可能的刑事责任的辩论不那么激烈(见第3节)。最后,通过CNAs犯下危害人类罪几乎没有争议,但也值得简单看看这种可能性(见第4节)。当然,关于网络空间中的国际刑事责任,还有其他问题,但它们必须留给进一步的调查。
{"title":"International criminal responsibility in cyberspace","authors":"K. Ambos","doi":"10.4337/9781782547396.00015","DOIUrl":"https://doi.org/10.4337/9781782547396.00015","url":null,"abstract":"The primary objective of this chapter is to give a reliable overview of the state of the art with regard to 'computer network attacks' (CNAs) or cyber-attacks. A CNA constitutes the strongest form of what is regarded to be cyber warfare, i.e., the use of technical means to wage war against an adversary in cyberspace. The focus on CNAs is explained by the fact that only these forms of crimes in cyberspace are normally serious enough to qualify as international crimes and thus be covered by an international criminal jurisdiction like the ICC. As to ‘international criminal responsibility’ the current debate in the cyber context is mostly concerned with the application of the law of armed conflict or international humanitarian law (IHL) to CNAs (infra Section 2). Less intense is the debate regarding a possible criminal responsibility for a crime of aggression (infra Section 3). Finally, there is virtually no debate regarding the commission of crimes against humanity by way of CNAs but it is worthwhile taking a brief look at this possibility too (infra Section 4). There are, of course, other issues regarding international criminal responsibility in cyberspace but they must be left to further inquiries.","PeriodicalId":147844,"journal":{"name":"Research Handbook on International Law and Cyberspace","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117084936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Some thoughts on cyber deterrence and public international law 关于网络威慑与国际公法的思考
Pub Date : 2015-06-26 DOI: 10.4337/9781782547396.00024
Eric P. J. Myjer
The mention of a potential preventive US reaction with extremely powerful cyber weapons against the possibility of a cyber threat brings back memories of the early deterrence discussions with regard to nuclear weapons. What deterrence basically comes down to is making clear to any potential opponent that if you dare to attack me, you may expect, at a minimum, a reply in kind that will be devastating to your potential. It also includes the message that even if attacked my capacity to make such a reply will be preserved in a guaranteed second strike, so a first strike will not give any advantage. With regard to nuclear weapons the ICJ considered deterrence but did not conclude that the threat or use of nuclear weapons, which was the deterrent threat, was contrary to public international law in cases where the survival of the state was at stake. This is the reason to see whether indeed a parallel can be drawn between the deterrent strategies in the nuclear realm and a perceived cyber attack by a state in cyberspace and projected generic (preventive) replies by states to such threats, or attacks. Is such a deterrent strategy viable? Would importing deterrence in the cyber realm improve cyber security? And how does public international law qualify such deterrent strategy (is it in accordance with public international law)? These and other legal questions are prompted by the technological developments in the digital area that have created the possibilities for its use as new weapons.
提到美国可能用极其强大的网络武器对可能发生的网络威胁作出预防性反应,让人想起早期关于核武器威慑的讨论。威慑基本上归结为让任何潜在的对手清楚,如果你敢攻击我,你可以期待,至少,以同样的方式回应,这将破坏你的潜力。它还包括这样一个信息,即即使受到攻击,我作出这种答复的能力也将在第二次打击中得到保证,因此第一次打击不会带来任何优势。关于核武器,国际法院考虑了威慑,但没有得出结论认为,在国家生存受到威胁的情况下,威胁或使用核武器是一种威慑威胁,违反国际公法。正因为如此,我们才有必要看看,在核领域的威慑战略,是否确实可以与一个国家在网络空间感知到的网络攻击,以及各国对此类威胁或攻击的预期的一般性(预防性)回应相提并论。这种威慑战略可行吗?在网络领域引入威慑会改善网络安全吗?国际公法如何限定这种威慑战略(它是否符合国际公法)?这些和其他法律问题是由数字领域的技术发展引起的,这些技术发展创造了将其用作新武器的可能性。
{"title":"Some thoughts on cyber deterrence and public international law","authors":"Eric P. J. Myjer","doi":"10.4337/9781782547396.00024","DOIUrl":"https://doi.org/10.4337/9781782547396.00024","url":null,"abstract":"The mention of a potential preventive US reaction with extremely powerful cyber weapons against the possibility of a cyber threat brings back memories of the early deterrence discussions with regard to nuclear weapons. What deterrence basically comes down to is making clear to any potential opponent that if you dare to attack me, you may expect, at a minimum, a reply in kind that will be devastating to your potential. It also includes the message that even if attacked my capacity to make such a reply will be preserved in a guaranteed second strike, so a first strike will not give any advantage. With regard to nuclear weapons the ICJ considered deterrence but did not conclude that the threat or use of nuclear weapons, which was the deterrent threat, was contrary to public international law in cases where the survival of the state was at stake. This is the reason to see whether indeed a parallel can be drawn between the deterrent strategies in the nuclear realm and a perceived cyber attack by a state in cyberspace and projected generic (preventive) replies by states to such threats, or attacks. Is such a deterrent strategy viable? Would importing deterrence in the cyber realm improve cyber security? And how does public international law qualify such deterrent strategy (is it in accordance with public international law)? These and other legal questions are prompted by the technological developments in the digital area that have created the possibilities for its use as new weapons.","PeriodicalId":147844,"journal":{"name":"Research Handbook on International Law and Cyberspace","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132653064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-defence in cyberspace 网络空间自卫
Pub Date : 2015-06-26 DOI: 10.4337/9781782547396.00023
C. Focarelli
Is self-defence against a cyber attack permitted? What about a cyber counter-attack against a conventional or cyber attack? Under Article 51 UN Charter self-defence is permitted ‘if an armed attack occurs’. Many scholars agree that a cyber attack amounts to an ‘armed attack’ when it causes harm or damage approximately comparable to a ‘kinetic’ or conventional attack and in particular when it hits ‘critical infrastructures’. Also in cyberspace, when permitted, individual or collective self-de¬fence has to meet the requirements of necessity, proportionality and immediacy. Two further major problems linked with self-defence against cyber attacks discussed in this chapter relate to the permissibility of anticipatory self-defence and self-defence against non-state actors or against the breach by a state of its duty of prevention of cross-border harmful private acts. The chapter concludes with some scepticism about the ‘use of force’ and analogy-based approaches in the literature suggesting that the law enforcement paradigm and non-forcible responses are preferable to the escalating militarization of cyberspace and noting that even when self-defence is permitted in cyberspace the necessity requirement demands of states to abide by a continuing obligation to implement passive and active electronic defences. In any case the prevailing approach serves, in addition to trying to identify reasonable rules, a twofold purpose, that is, deterring possible attacks and promoting the rules which could possibly govern major cyber attacks at the moment when they occur so as to have at that very moment the international community ‘prepared’ to share the view that the attack is indeed ‘equivalent’ to a kinetic attack which justifies a kinetic response.
是否允许对网络攻击进行自卫?那么针对传统攻击或网络攻击的网络反击呢?根据《联合国宪章》第51条,“如果发生武装攻击”,自卫是允许的。许多学者一致认为,当网络攻击造成的伤害或损害与“动能”或传统攻击大致相当时,特别是当它击中“关键基础设施”时,网络攻击就相当于“武装攻击”。同样,在网络空间,在允许的情况下,个人或集体的self-deÂ防御必须满足必要性、相称性和即时性的要求。本章讨论的与防范网络攻击的自卫有关的另外两个主要问题涉及预先自卫和防范非国家行为者或国家违反其防止跨界有害私人行为的义务时的自卫。本章最后对文献中的“使用武力”和基于类比的方法提出了一些怀疑,认为执法范式和非强制反应比网络空间不断升级的军事化更可取,并指出即使在网络空间允许自卫,必要性要求国家遵守实施被动和主动电子防御的持续义务。在任何情况下,除了试图确定合理的规则外,通行的方法具有双重目的,即阻止可能的攻击并促进可能在发生重大网络攻击时管理这些攻击的规则,以便在那一刻国际社会“准备”分享这样的观点,即攻击确实是“等同于”动能攻击,这证明动能反应是合理的。
{"title":"Self-defence in cyberspace","authors":"C. Focarelli","doi":"10.4337/9781782547396.00023","DOIUrl":"https://doi.org/10.4337/9781782547396.00023","url":null,"abstract":"Is self-defence against a cyber attack permitted? What about a cyber counter-attack against a conventional or cyber attack? Under Article 51 UN Charter self-defence is permitted ‘if an armed attack occurs’. Many scholars agree that a cyber attack amounts to an ‘armed attack’ when it causes harm or damage approximately comparable to a ‘kinetic’ or conventional attack and in particular when it hits ‘critical infrastructures’. Also in cyberspace, when permitted, individual or collective self-de¬fence has to meet the requirements of necessity, proportionality and immediacy. Two further major problems linked with self-defence against cyber attacks discussed in this chapter relate to the permissibility of anticipatory self-defence and self-defence against non-state actors or against the breach by a state of its duty of prevention of cross-border harmful private acts. The chapter concludes with some scepticism about the ‘use of force’ and analogy-based approaches in the literature suggesting that the law enforcement paradigm and non-forcible responses are preferable to the escalating militarization of cyberspace and noting that even when self-defence is permitted in cyberspace the necessity requirement demands of states to abide by a continuing obligation to implement passive and active electronic defences. In any case the prevailing approach serves, in addition to trying to identify reasonable rules, a twofold purpose, that is, deterring possible attacks and promoting the rules which could possibly govern major cyber attacks at the moment when they occur so as to have at that very moment the international community ‘prepared’ to share the view that the attack is indeed ‘equivalent’ to a kinetic attack which justifies a kinetic response.","PeriodicalId":147844,"journal":{"name":"Research Handbook on International Law and Cyberspace","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126264181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber war and the law of neutrality 网络战争和中立法则
Pub Date : 2015-06-26 DOI: 10.4337/9781782547396.00030
D. Turns
This chapter considers the potential for the contemporary and future application of the international law of neutrality in the context of cyber warfare. The relevant provisions are mostly contained in treaties and other legal instruments that are now more than a century old, such as the Hague Conventions of 1907. Although customarily thought of as old-fashioned and arguably irrelevant to the age of cyber in its obsession with safeguarding the territorial sovereignty of neutral States, the law of neutrality is at least quite likely to be of direct application in future armed conflicts situated in cyberspace. This stems in part from the politico-economic realities of an increasingly interconnected international society in today’s world, which may cause States to continue to insist on their neutrality in the conflicts of the future. But it is also largely a function of the provisions of the law itself, particularly the jus in bello: the routing of hostile data through cyber infrastructure belonging to a neutral State and the legal status of “hacktivists” in neutral territory could be examples. The existing law, old as it is, can be applied by analogy to cyber hostilities.
本章考虑了在网络战争背景下,国际中立法在当代和未来应用的潜力。有关规定大多载于已有一百多年历史的条约和其他法律文书中,例如1907年《海牙公约》。虽然通常被认为是过时的,而且由于执著于维护中立国的领土主权,可以说与网络时代无关,但中立法至少很可能直接适用于未来发生在网络空间的武装冲突。这部分源于当今世界日益相互联系的国际社会的政治经济现实,这可能导致各国在未来的冲突中继续坚持中立。但这在很大程度上也是法律本身条款的一个功能,尤其是在战权方面:敌对数据通过属于中立国的网络基础设施传输,以及“黑客活动分子”在中立国的法律地位,都可以作为例子。现有的法律,虽然很旧,但可以类比地适用于网络敌对行动。
{"title":"Cyber war and the law of neutrality","authors":"D. Turns","doi":"10.4337/9781782547396.00030","DOIUrl":"https://doi.org/10.4337/9781782547396.00030","url":null,"abstract":"This chapter considers the potential for the contemporary and future application of the international law of neutrality in the context of cyber warfare. The relevant provisions are mostly contained in treaties and other legal instruments that are now more than a century old, such as the Hague Conventions of 1907. Although customarily thought of as old-fashioned and arguably irrelevant to the age of cyber in its obsession with safeguarding the territorial sovereignty of neutral States, the law of neutrality is at least quite likely to be of direct application in future armed conflicts situated in cyberspace. This stems in part from the politico-economic realities of an increasingly interconnected international society in today’s world, which may cause States to continue to insist on their neutrality in the conflicts of the future. But it is also largely a function of the provisions of the law itself, particularly the jus in bello: the routing of hostile data through cyber infrastructure belonging to a neutral State and the legal status of “hacktivists” in neutral territory could be examples. The existing law, old as it is, can be applied by analogy to cyber hostilities.","PeriodicalId":147844,"journal":{"name":"Research Handbook on International Law and Cyberspace","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Classifying cyber warfare 网络战争分类
Pub Date : 2015-06-26 DOI: 10.4337/9781782547396.00027
Louise Arimatsu
This chapter considers how the classification of armed conflict applies to cyber warfare. Classifying the particular conflict – in other words determining whether it is one fought between States or between a State and organized armed group or between such groups – is necessary to determine what body of law applies to the hostilities. The chapter considers whether the prospect of cyber warfare presents particular problems for classification.
本章考虑武装冲突的分类如何适用于网络战。对具体冲突进行分类- -换句话说,确定它是国家之间的冲突,还是国家与有组织的武装集团之间的冲突,或这类集团之间的冲突- -对于确定何种法律体系适用于敌对行动是必要的。这一章考虑了网络战争的前景是否为分类提出了特殊的问题。
{"title":"Classifying cyber warfare","authors":"Louise Arimatsu","doi":"10.4337/9781782547396.00027","DOIUrl":"https://doi.org/10.4337/9781782547396.00027","url":null,"abstract":"This chapter considers how the classification of armed conflict applies to cyber warfare. Classifying the particular conflict – in other words determining whether it is one fought between States or between a State and organized armed group or between such groups – is necessary to determine what body of law applies to the hostilities. The chapter considers whether the prospect of cyber warfare presents particular problems for classification.","PeriodicalId":147844,"journal":{"name":"Research Handbook on International Law and Cyberspace","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130897063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
State responsibility in cyberspace 网络空间中的国家责任
Pub Date : 2015-06-26 DOI: 10.4337/9781782547396.00012
C. Antonopoulos
The commission of internationally wrongful acts in cyberspace may lead to the responsibility of States. However, there appears to be substantial difficulty in applying the existing legal framework introduced in the International Law Commission’s Articles on State Responsibility (2001). This difficulty concerns the rules on attribution of an act in cyberspace to a particular State. Attribution in the law as it currently stands is focused on the link of natural persons to a specific State; but this is nearly impossible to establish in the case of cyber acts for they are ascribed to computers, the users of which remain largely unidentified. Therefore, as computers constituting the source of wrongful acts may be traced to the territory of particular States the best solution would be to establish a breach of the duty of due diligence on the part of the State from the which injurious cyber acts emanate. Evidence in this respect would seek to prove that the State from which the injurious act emanated had knowledge that the act occurred in its territory and a more flexible approach to its evaluation should be admitted.
在网络空间犯下国际不法行为可能导致国家承担责任。然而,在适用国际法委员会《国家责任条款》(2001年)中引入的现有法律框架方面似乎存在重大困难。这一困难涉及将网络空间中的行为归于某一特定国家的规则。目前法律上的归属侧重于自然人与特定国家的联系;但就网络行为而言,这几乎是不可能确定的,因为它们是由电脑造成的,而这些电脑的用户在很大程度上仍未被确认。因此,由于构成不法行为来源的计算机可追溯至特定国家的领土,最佳解决办法将是认定产生损害性网络行为的国家违反了尽职调查义务。在这方面的证据将设法证明,造成损害行为的国家知道该行为发生在其领土内,因此应当对其评价采取更灵活的办法。
{"title":"State responsibility in cyberspace","authors":"C. Antonopoulos","doi":"10.4337/9781782547396.00012","DOIUrl":"https://doi.org/10.4337/9781782547396.00012","url":null,"abstract":"The commission of internationally wrongful acts in cyberspace may lead to the responsibility of States. However, there appears to be substantial difficulty in applying the existing legal framework introduced in the International Law Commission’s Articles on State Responsibility (2001). This difficulty concerns the rules on attribution of an act in cyberspace to a particular State. Attribution in the law as it currently stands is focused on the link of natural persons to a specific State; but this is nearly impossible to establish in the case of cyber acts for they are ascribed to computers, the users of which remain largely unidentified. Therefore, as computers constituting the source of wrongful acts may be traced to the territory of particular States the best solution would be to establish a breach of the duty of due diligence on the part of the State from the which injurious cyber acts emanate. Evidence in this respect would seek to prove that the State from which the injurious act emanated had knowledge that the act occurred in its territory and a more flexible approach to its evaluation should be admitted.","PeriodicalId":147844,"journal":{"name":"Research Handbook on International Law and Cyberspace","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121868525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The United Nations and the regulation of cyber-security 联合国和网络安全监管
Pub Date : 2015-06-26 DOI: 10.4337/9781782547396.00035
C. Henderson
With the rise in prominence of issues of cybersecurity many measures have been adopted at the national and regional level. Action at the United Nations, however, has been relatively sluggish. For the most part activities since the Russia Federation initially introduced a draft resolution in 1998 have been impeded due to fundamental differences between the Russian Federation and the United States. However, since 2010 when the US for the first time acted as a co-sponsor to this resolution there has been a discernable momentum within the UN on issues of cybersecurity. The cyber attacks in Estonia in 2007, Georgia in 2008, and Iran in 2010, along with the revelations regarding states spying on one another, have only increased this momentum. As such, activity can be seen in various committees of the UN General Assembly including consensus being reached within several Groups of Governmental Experts on various issues. However, issues of cybersecurity have also been witnessed in the UN Security Council in the context of terrorist activity, the Economic and Social Council and various subsidiary organs and specialized agencies. With such a complex system of bodies addressing the issues, however, dialogue and communication between the various UN organs, bodies and groups now needs to be improved to enable further integrated concerted action and norm development. Furthermore, with discernable opposition to a comprehensive treaty on cybersecurity other forms of action, both regionally and bilaterally, also looks set to continue.
随着网络安全问题的日益突出,在国家和地区层面采取了许多措施。然而,联合国的行动相对迟缓。自从俄罗斯联邦于1998年最初提出一项决议草案以来,由于俄罗斯联邦和美国之间的根本分歧,各项活动在很大程度上受到了阻碍。然而,自2010年美国首次成为该决议的共同提案国以来,联合国内部在网络安全问题上出现了明显的势头。2007年在爱沙尼亚、2008年在格鲁吉亚、2010年在伊朗发生的网络攻击,以及有关国家间相互监视的披露,只会增加这种势头。因此,在联合国大会的各个委员会中都可以看到活动,包括在几个政府专家组内就各种问题达成共识。然而,在恐怖活动背景下的联合国安理会、经济及社会理事会以及各附属机构和专门机构中也出现了网络安全问题。然而,由于处理这些问题的机构系统如此复杂,现在需要改进联合国各机关、机构和团体之间的对话和沟通,以便进一步采取协调一致的行动和制定规范。此外,由于各方明显反对一项全面的网络安全条约,其他形式的地区和双边行动似乎也将继续下去。
{"title":"The United Nations and the regulation of cyber-security","authors":"C. Henderson","doi":"10.4337/9781782547396.00035","DOIUrl":"https://doi.org/10.4337/9781782547396.00035","url":null,"abstract":"With the rise in prominence of issues of cybersecurity many measures have been adopted at the national and regional level. Action at the United Nations, however, has been relatively sluggish. For the most part activities since the Russia Federation initially introduced a draft resolution in 1998 have been impeded due to fundamental differences between the Russian Federation and the United States. However, since 2010 when the US for the first time acted as a co-sponsor to this resolution there has been a discernable momentum within the UN on issues of cybersecurity. The cyber attacks in Estonia in 2007, Georgia in 2008, and Iran in 2010, along with the revelations regarding states spying on one another, have only increased this momentum. As such, activity can be seen in various committees of the UN General Assembly including consensus being reached within several Groups of Governmental Experts on various issues. However, issues of cybersecurity have also been witnessed in the UN Security Council in the context of terrorist activity, the Economic and Social Council and various subsidiary organs and specialized agencies. With such a complex system of bodies addressing the issues, however, dialogue and communication between the various UN organs, bodies and groups now needs to be improved to enable further integrated concerted action and norm development. Furthermore, with discernable opposition to a comprehensive treaty on cybersecurity other forms of action, both regionally and bilaterally, also looks set to continue.","PeriodicalId":147844,"journal":{"name":"Research Handbook on International Law and Cyberspace","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131245034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cyber operations as a use of force 作为使用武力的网络行动
Pub Date : 2014-03-31 DOI: 10.4337/9781782547396.00022
Marco Roscini
The provisions on the use of force contained in the UN Charter apply to cyber operations conducted by states against other states even though the rules were adopted well before the advent of cyber technologies. This chapter argues that a cyber operation is a use of armed force when it entails the use of a ‘weapon’ accompanied by a coercive intention. This occurs not only in the case of cyber attacks designed to cause physical damage to property, loss of life or injury of persons, but also of cyber attacks employing capabilities that render ineffective or unusable critical infrastructures so to cause significant disruption of essential services, even when they do not materially damage those infrastructures. Indeed, the increasing digitalization of today’s societies has made it possible to cause considerable harm to states through non-destructive means: physical infrastructures can be incapacitated by affecting their operating systems, with consequent disruption of services but without the need to destroy them. An evolutive interpretation of Article 2(4) should take this into account. On the other hand, cyber exploitation carried out to collect information may be a violation of the sovereignty of the targeted state when it entails an unauthorized intrusion into the cyber infrastructure located on its territory, but not intervention and even less a use of force, as it lacks the coercive element and does not involve the use of a destructive payload capable of resulting in physical damage to property, loss of life, injury of persons, or malfunction of infrastructure.
《联合国宪章》中关于使用武力的规定适用于国家针对其他国家的网络行动,尽管这些规则早在网络技术出现之前就已通过。本章认为,当网络行动需要使用带有强制意图的“武器”时,它就是使用武装力量。这种情况不仅发生在旨在造成财产损失、生命损失或人身伤害的网络攻击中,也发生在网络攻击使用的能力使关键基础设施失效或无法使用,从而导致基本服务严重中断的情况下,即使这些基础设施没有受到实质性损害。事实上,当今社会的日益数字化已经使得通过非破坏性手段对国家造成相当大的伤害成为可能:物理基础设施可以通过影响其操作系统而丧失能力,从而导致服务中断,但无需对其进行破坏。对第2(4)条的渐进解释应考虑到这一点。另一方面,网络开发进行收集信息可能是违反国家主权的目标时,需要一个未经授权的侵入网络基础设施位于其领土,但不干预,甚至不使用武力,因为它缺乏强制元素和不涉及使用破坏性载荷能力的财产造成物理伤害,生命损失,受伤的人,或故障的基础设施。
{"title":"Cyber operations as a use of force","authors":"Marco Roscini","doi":"10.4337/9781782547396.00022","DOIUrl":"https://doi.org/10.4337/9781782547396.00022","url":null,"abstract":"The provisions on the use of force contained in the UN Charter apply to cyber operations conducted by states against other states even though the rules were adopted well before the advent of cyber technologies. This chapter argues that a cyber operation is a use of armed force when it entails the use of a ‘weapon’ accompanied by a coercive intention. This occurs not only in the case of cyber attacks designed to cause physical damage to property, loss of life or injury of persons, but also of cyber attacks employing capabilities that render ineffective or unusable critical infrastructures so to cause significant disruption of essential services, even when they do not materially damage those infrastructures. Indeed, the increasing digitalization of today’s societies has made it possible to cause considerable harm to states through non-destructive means: physical infrastructures can be incapacitated by affecting their operating systems, with consequent disruption of services but without the need to destroy them. An evolutive interpretation of Article 2(4) should take this into account. On the other hand, cyber exploitation carried out to collect information may be a violation of the sovereignty of the targeted state when it entails an unauthorized intrusion into the cyber infrastructure located on its territory, but not intervention and even less a use of force, as it lacks the coercive element and does not involve the use of a destructive payload capable of resulting in physical damage to property, loss of life, injury of persons, or malfunction of infrastructure.","PeriodicalId":147844,"journal":{"name":"Research Handbook on International Law and Cyberspace","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114653455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cyberspace and human rights 网络空间与人权
Pub Date : 1900-01-01 DOI: 10.4337/9781789904253.00016
David P. Fidler
{"title":"Cyberspace and human rights","authors":"David P. Fidler","doi":"10.4337/9781789904253.00016","DOIUrl":"https://doi.org/10.4337/9781789904253.00016","url":null,"abstract":"","PeriodicalId":147844,"journal":{"name":"Research Handbook on International Law and Cyberspace","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122015617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Research Handbook on International Law and Cyberspace
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1