An Assessment of International Law on the Use of Cyber-Espionage as a Substitute for Traditional Spying
Article Main Content
Traditionally spying is an integral part of war, economic, and political sabotage among other things. In a bid to curb the incessant act of traditional spying which involves the act of physically and clandestinely crossing over to the countries where spying is to be carried out, various international conventions/instruments covering the act of traditional spying are of the moment. These include; the Hague Regulation of 1907, Vienna Convention of 1961, Geneva Conventions, United Nations Charter among others. In the same vein, Countries have enacted domestic laws to prevent the traditional spying/ clandestine acts within their territorial sovereignty. However, the 21st-century development in the field of technology and its use for a wind range of activities which include cyber espionage have questioned the effectiveness and relevance of international conventions and domestic laws on cyber espionage.
It is against this backdrop that this article embarks on the assessment of the conventions/instruments and domestic laws on cyber espionage. Precisely, it examines the assessment of countries’ espionage laws and their relevance to cyber espionage among countries, the assessment of international law and its relevance to cyber espionage, the assessment of customary international law on cyber espionage, and recommendations. Accordingly, it concludes that a holistic assessment of cyber espionage reveals that the applicability of extant international law to it like traditional spying is uncertain.1.
References
-
Arthur, C. (2005). Google the Latest Victim of Chinese State-Sponsored Cyberwar. The Guardian. Retrieved 30 June 2022 from http://www.guardian.co.uk/technology/2010/jan/14/google-hackingchina-cyberwar.
Google Scholar
1
-
Ayalew Y. E. (2015). Cyber Warfare: A New Hullaballoo under International Humanitarian Law. Beijing Law Review, 6, 218.
Google Scholar
2
-
Benatar, M. (2019). Cyber Espionage in Inter-State Litigation. In Hélène Ruiz Fabri (ed.) International Law and Litigation. A Look into Procedure. Nomos.
Google Scholar
3
-
Bosnia and Herzegovina’s Criminal Code (BHCC). (2003).
Google Scholar
4
-
Buchan, R.J. (Accepted: 2016) The International Legal Regulation of Cyber Espionage. In: Osula, A.-M. and Rõigas, H., (eds.) International Cyber Norms: Legal, Policy & Industry Perspectives. NATO CCD COE Publications , Tallinn, Estonia, pp. 65-86. ISBN 9789949954469 9789949954476.
Google Scholar
5
-
Canada’s LOAC. (2001).
Google Scholar
6
-
Case Concerning the Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v United States of America) (Merits). (1986). ICJ Rep 14, para 205.
Google Scholar
7
-
CDLOACM. (2007).
Google Scholar
8
-
Charter of the United Nations and Statute of the International Court of Justice. (1945).
Google Scholar
9
-
Connell, S. and Vogler, S. (2017). Russia’s Approach to Cyber Warfare. CNA Analysis and Solution Publishing, Moscow.
Google Scholar
10
-
Corinne, J. N., Glorioso, L., Rosaria, M. (2015). NATO CCD COE Workshop Ethics and Policies for Cyber Warfare. Magdale College, Oxford Report. www.ccdcoe.org.
Google Scholar
11
-
Corfu Channel United Kingdom of Great Britain and Northern Ireland v Albania. (1949) ICJ Rep 1 35.
Google Scholar
12
-
Croatia’s Criminal Code (CCC). (2007).
Google Scholar
13
-
Dinstein, Y. (2011). War, Aggression and Self-Defence. 5th edition Cambridge University Press, Cambridge.
Google Scholar
14
-
DRCMPC. (2002).
Google Scholar
15
-
GGE Report. (2015). Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, UN Doc. A/70/174, 22 July 2015, para. 4.
Google Scholar
16
-
Healey, J. and Piiparinen, A. (2015). Did China Just Hack the International Court Adjudicating Its South China Sea Territorial Claims? The Diplomat. Retrieved 30 June 2022 from http://thediplomat.com/2015/10/did-china-just-hack-the-international-court-adjudicating-its-south-china-sea-territorial-claims/.
Google Scholar
17
-
Heintschel von Heinegg, W. (2013). Territorial Sovereignty and Neutrality in Cyber Space. 89 International Law Studies, 129.
Google Scholar
18
-
Heriyanto, D. S. N. (2019). International Regulatory Vacuum of Cyber Espionage. Advances in Social Science, Education and Humanities Research, 106.
Google Scholar
19
-
Islands of Palmas (Netherlands v US). (1928). 2 RIAA 829 838.
Google Scholar
20
-
Laws of War: Laws and Customs of War on Land (Hague II); July 29, (1899).
Google Scholar
21
-
Lin, H. S. (2010). Offensive Cyber Operations and the Use of Force. Journal of National Security, Law and Policy, 63, 78.
Google Scholar
22
-
Lotus Case (France v Turkey). (1927). PCIJ Report Series A No 10.
Google Scholar
23
-
Mandiant Report. (2013). State-Sponsored Cyber Espionage Projects Now Prevailed. Retrieved 30 June 2022 from http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf.
Google Scholar
24
-
Mann, J. (2008). Expert: Cyber attacks on Georgia Websites Tied to Mob, Russian government. Los Angeles times. Retrieved 30 June 2022 from http://latimesblogs.latimes.com/technology/2008/08/experts-debate.html.
Google Scholar
25
-
Moore, M. (2009). China Global Cyber Espionage Network, Ghost Net Penetrates 103 Countries. Retrieved 30 June 2022 from https://www.telegraph.co.uk/5071124.
Google Scholar
26
-
Morocco’s Military Justice Code (MMJC). (1956).
Google Scholar
27
-
Nicaragua (Nicaragua v United States of America). (1986). ICJ Rep 14 para 202.
Google Scholar
28
-
Nigeria’s Manual on Laws of War (NMLW). (1994).
Google Scholar
29
-
Philippines v. China. (2013). PCA 19; Award of 12 July 2016.
Google Scholar
30
-
Protocols Additional to the Geneva Conventions of 12 August 1949: Additional Protocol to the Geneva Conventions of 12 August 1949 and relating to the Protection of Victims of International Armed Conflicts, article 46 (2).
Google Scholar
31
-
Restatement of the Law. (1987). Third, Foreign Relations Law of the United States, section 102.
Google Scholar
32
-
Richmond, J. A. (1998). Spies in Ancient Greece. Greece & Rome, 45(1), 1-18.
Google Scholar
33
-
Roberts, A. (2001). Traditional and Modern Approaches to Customary International Law: A Reconciliation. American Journal of International Law, 95, 758.
Google Scholar
34
-
Shoshan, E. (2014). Applicability of International Law on Cyber Espionage Intrusions. Ph.D thesis, Stockholm University.
Google Scholar
35
-
SMC. (1927) amended 2007.
Google Scholar
36
-
Smith, D. (2012). How Russia Harnesses Cyber Warfare. Defence Dossier, American Foreign Policy Council. Retrieved 30 June 2022 from http://www.afpc.org/files /august2012.pdf.
Google Scholar
37
-
Smith, J. H. (2007). State Intelligence Gathering and International Law: Key Note Address. 28 Michigan Journal of International Law 544.
Google Scholar
38
-
Swaine, C. J. (2008). Georgia: Russia ‘Conducting Cyber War. The Telegraph. Retrieved 30 June 2022 from http://www.telegraph.co.uk/news/worldnews/europe/georgia/2539157/Georgia-Russiaconducting-cyberwar.html.
Google Scholar
39
-
The Central African Republic’s Penal Code (2010).
Google Scholar
40
-
The Guardian. (24 September, 2013). Brazilian President: US Surveillance a Breach of International Law. Retrieved 3 July 2022 from http://www.theguardian.com/world/2013/sep/24/brazil-president-un-speech-nsa-surveillance.
Google Scholar
41
-
The Hague Convention Respecting the Laws and Customs of War on Land, article. 29.
Google Scholar
42
-
The MI5. (n.d.). What is Espionage? Retrieved 28 June 2022 from https://www.mi5.gov.uk/home/the-threats/espionage/what-isespionage.html.
Google Scholar
43
-
The Russian Federation’s Regulation on the Application of International Humanitarian Law (2001).
Google Scholar
44
-
Uniform Code of Military Justice (UCMJ). (1951).
Google Scholar
45
-
United Kingdom’s LOAC. (2004).
Google Scholar
46
-
United Nations Convention on the Law of the Sea. (1989). Part 2, article 2.
Google Scholar
47
-
USMMC. (2010).
Google Scholar
48
-
USEA. (1917).
Google Scholar
49