Preview

Moscow Journal of International Law

Advanced search

The Problem of Cyber Espionage in the International Humanitarian Law

https://doi.org/10.24833/0869-0049-2021-1-70-80

Abstract

INTRODUCTION. The article analyses the problem of cyber espionage in the context of armed conflict in cyberspace. The relevance of this research, as part of the problem of international humanitarian law applying in cyberspace, is confirmed by the rapid development of cyber technologies that can be used during armed conflict, as well as the availability of the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations.

MATERIALS AND METHODS. The main sources of this research are the provisions of the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, the rules of Additional Protocol I of June 08, 1977 to the Geneva Convention of August 12, 1949, the rules of the Hague Regulations on the Laws and Customs of War on Land of 1907, and the rules of custom- ary international humanitarian law. The methodology consists of the principles used in legal research, as well as general scientific and special methods of legal research (system and formal legal methods).

RESEARCH RESULTS. The provisions of the Tallinn Manual on cyber espionage were examined for compliance with the relevant provisions of Additional Protocol I of June 08, 1977 to the Geneva Convention of August 12, 1949, the Hague Regulations on the Laws and Customs of War on Land of 1907, and the rules of customary international humanitarian law, as well as the problems that may arise in the process of possible practical application of this provision of the Tallinn Manual.

DISCUSSION AND CONCLUSIONS. It is noted that the provisions of the Tallinn Manual 2.0 on cyber espionage are based on the relevant rules of international law. In fact, the relevant provision of the Tallinn Manual is completely copied from the relevant rules of IHL. However, based on the results of this research, the author comes to the conclusion that such blind copying does not take into account the specifics of cyberspace and leads to the following problems in the possible practical application of this provision of the Tallinn Manual: firstly, due to the anonymity of users, it will be difficult to distinguish between a cyber intelligence officer and a cyber spy in practice. Secondly, due to the difficulties in establishing clear state borders in cyberspace, including due to the use of blockchain and VPN technologies, in practice it is impossible to reliably establish whether secret information was collected on the territory of the enemy, which, in turn, leads to difficulties in qualifying such an act as cyber espionage. Finally, in the context of modern armed conflicts, espionage has ceased to be a phenomenon exclusively of international armed conflicts, and therefore it is likely that cyber espionage can be carried out not only in the context of an international armed conflict, but also in the context of a non-international armed conflict. Based on the results of this research, suggestions were made to develop state practice on this issue. It is desirable that States raise the discussion of the above issues at the UN General Assembly, which would help to identify the main trends in the development of such practices. Only And only after the practice of States on this issue becomes more obvious, the question of developing an appropriate international treaty, preferably within the UN, can be raised.

About the Author

S. Yu. Garkusha-Bozhko
School of Higher Sportsmanship in Water Sports named after Yu. S. Tyukalov
Russian Federation

Sergei Yu. Garkusha-Bozhko, Legal Counsel

10-1, Naberezhnaya Grebnogo kanala, Saint-Petersburg,
Russian Federation, 197110



References

1. Давид Э. 2011. Принципы права вооруженных конфлик-

2. тов: курс лекций, прочитанных на юридическом фа-

3. культете Открытого Брюссельского университета.

4. М.: МККК. 1444 с.

5. Мельцер Н. 2017. Международное гуманитарное пра-

6. во: общий курс. М.: МККК. 420 c.

7. Мельцер Н. 2009. Непосредственное участие в воен-

8. ных действиях: руководство по толкованию понятия

9. в свете международного гуманитарного права. М.:

10. МККК. 107 с.

11. Сассоли М., Бувье А. 2008. Правовая защита во время

12. войны. Том I. М.: МККК. 672 с.

13. Сизенко А. Г. 2010. Спецслужбы России и СССР: от При-

14. каза тайных дел до наших дней. Ростов-на-Дону.: Изда-

15. тельский дом «Владис». 416 с.

16. Строганов П. П. 2009. Щит и меч блокадного Ленингра-

17. да. СПб.: Агентство ВиТ-принт. 295 с.

18. Хенкертс Ж.-М., Досвальд-Бек Л. 2006. Обычное между-

19. народное гуманитарное право. Том I. Нормы. М.: МККК.

20. с.

21. Bourguignon J. 2014. La recherche de preuves informatiques

22. et l’exercice extraterritorial des compétences de

23. l’Etat. – Société Française pour le droit International – Colloque.

24. Internet et le droit international. Paris: Éditions A.

25. Pedone. P. 357–372.

26. Forcese C. 2016. Pragmatism and Principle: Intelligence

27. Agencies and International Law. – Virginia Law Review Online.

28. Vol. 102. P. 67–84

29. Forcese C. 2011. Spies Without Borders: International Law

30. and Intelligence Collection. – Journal of National Security

31. Law & Policy. Vol. 5. P. 179–210.

32. Kerschischnig G. 2012. Cyberthreats and International Law.

33. The Hague: Eleven international publishing. 386 p.

34. Lafouasse F. 2012. L'Espionnage dans le droit international.

35. Paris.: Nouveau Monde. 500 p.

36. Moore T. 2010. Introducing the Economics of Cybersecurity:

37. Principles and Policy Options. – National Research Council,

38. Proceedings of a Workshop on Deterring Cyberattacks: Informing

39. Strategies and Developing Options for U.S. Policy. Washington,

40. D. C.: The National Academies Press. P. 3–23.

41. Navarrete I., Buchan R. 2019. Out of the Legal Wilderness:

42. Peacetime Espionage, International Law and the Existence

43. of Customary Exceptions. – Cornell International Law

44. Journal. Vol. 51. Issue 4. P. 897–954.

45. Navarrete I. 2015. L’espionnage en temps de paix en droit

46. international public. – Canadian Yearbook of International

47. Law. Vol. 53. P. 1–65.

48. Peacetime Regime for State Activities in Cyberspace. International

49. Law, International Relations and Diplomacy. Ed. by

50. K. Ziolkowski. 2013. Tallinn: NATO CCD COE. 746 p.

51. Tallinn Manual 2.0 on the International Law Applicable to

52. Cyber Operations. Prepared by the International Groups of

53. Experts at the Invitation of the NATO Cooperative Cyber

54. Defence Centre of Excellence. Ed by L. Vihul. 2017. Cambridge:

55. Cambridge University Press. 598 p.

56. Tondini M. 2018-2019. Espionage and International Law

57. in the Age of Permanent Competition. – Military Law and

58. Law of War Review. Vol. 57. Issue 1. P. 17–58.

59. Yoo Ch. S. 2015. Cyber Espionage or Cyberwar?: International

60. Law, Domestic Law, and Self-Protective Measures. –

61. University of Pennsylvania Carey Law School Scholarship.

62. No. 1540. 32 p. URL: https://scholarship.law.upenn.edu/

63. cgi/viewcontent.cgi?article=2541&context=faculty_

64. scholarship (дата обращения 27.11.2020).

65. Woltag J.-Ch. 2014. Cyber Warfare: Military Cross-Border

66. Computer Network Operations under International Law.

67. Cambridge: Intersentia. 314 p.


Review

For citations:


Garkusha-Bozhko S.Yu. The Problem of Cyber Espionage in the International Humanitarian Law. Moscow Journal of International Law. 2021;(1):70-80. (In Russ.) https://doi.org/10.24833/0869-0049-2021-1-70-80

Views: 1800


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 0869-0049 (Print)
ISSN 2619-0893 (Online)