Acknowledgements |
|
v | |
|
|
xi | |
|
|
xxi | |
Introduction |
|
1 | (12) |
|
|
1 | (3) |
|
|
4 | (5) |
|
|
9 | (4) |
|
1 Defining Cyber Espionage |
|
|
13 | (15) |
|
|
13 | (1) |
|
2 The Intelligence Community |
|
|
14 | (3) |
|
2.1 Sources of Information Collection |
|
|
15 | (1) |
|
2.2 Open and Closed Sources |
|
|
16 | (1) |
|
3 Cyber Espionage: The Copying of Confidential Data |
|
|
17 | (1) |
|
4 Close and Remote Access Cyber Espionage |
|
|
18 | (1) |
|
5 Secrecy and Cyber Espionage |
|
|
19 | (1) |
|
6 Non-Consensual Information Gathering |
|
|
20 | (1) |
|
7 Political and Economic Cyber Espionage and the Role of State and Non-State Actors |
|
|
21 | (4) |
|
8 Cyber Espionage and International Law |
|
|
25 | (1) |
|
9 Peacetime Cyber Espionage |
|
|
26 | (1) |
|
|
27 | (1) |
|
2 Cyber Espionage and International Peace and Security |
|
|
28 | (20) |
|
|
28 | (1) |
|
2 Political Cyber Espionage |
|
|
28 | (13) |
|
|
28 | (3) |
|
2.2 The International Society |
|
|
31 | (5) |
|
2.3 Espionage and International Cooperation |
|
|
36 | (5) |
|
3 Economic Cyber Espionage |
|
|
41 | (5) |
|
|
46 | (2) |
|
3 Cyber Espionage and the Rules of Territorial Sovereignty, Non-Intervention and the Non-Use of Force |
|
|
48 | (22) |
|
|
48 | (1) |
|
2 The Rule of Territorial Sovereignty |
|
|
49 | (12) |
|
2.1 Cyber Espionage and Control Over Cyber Infrastructure |
|
|
51 | (5) |
|
2.2 Cyber Espionage and the Performance of Inherently Governmental Functions |
|
|
56 | (5) |
|
3 The Rule of Non-intervention |
|
|
61 | (4) |
|
|
62 | (1) |
|
|
63 | (2) |
|
4 The Prohibition on the Use of Force |
|
|
65 | (3) |
|
|
68 | (2) |
|
4 Cyber Espionage and Diplomatic and Consular Law |
|
|
70 | (25) |
|
|
70 | (1) |
|
2 Cyber Espionage Against Diplomatic Missions and Consular Posts |
|
|
71 | (18) |
|
2.1 The Inviolability of Diplomatic and Consular Premises |
|
|
72 | (1) |
|
|
72 | (5) |
|
2.1.2 The `Special Duty' to Protect Premises |
|
|
77 | (3) |
|
2.1.3 Furnishings, Property and Means of Transport |
|
|
80 | (3) |
|
2.2 The Inviolability of Archives and Documents |
|
|
83 | (3) |
|
2.3 Freedom of Communication |
|
|
86 | (3) |
|
3 The Use of Diplomatic Missions and Consular Posts for Cyber Espionage |
|
|
89 | (5) |
|
3.1 Immunities for Diplomatic and Consular Officials |
|
|
92 | (2) |
|
|
94 | (1) |
|
5 Cyber Espionage and International Human Rights Law |
|
|
95 | (27) |
|
|
95 | (1) |
|
2 The Extraterritorial Application of Human Rights Treaties |
|
|
96 | (9) |
|
|
97 | (4) |
|
|
101 | (4) |
|
|
105 | (4) |
|
4 Restricting the Right to Privacy |
|
|
109 | (12) |
|
4.1 In Accordance with the Law |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (4) |
|
|
114 | (2) |
|
|
116 | (3) |
|
|
119 | (2) |
|
|
121 | (1) |
|
6 Economic Cyber Espionage and the World Trade Organization |
|
|
122 | (23) |
|
|
122 | (3) |
|
2 Economic Cyber Espionage as a WTO `Measure' |
|
|
125 | (4) |
|
2.1 `As Applied' Challenge |
|
|
125 | (2) |
|
|
127 | (2) |
|
3 Nullification or Impairment of a Benefit |
|
|
129 | (1) |
|
4 Substantive Obligations under WTO Law |
|
|
130 | (11) |
|
4.1 Article 10bis Paris Convention 1967 |
|
|
130 | (1) |
|
4.1.1 Who Qualifies as a National? |
|
|
131 | (1) |
|
4.1.2 What Amounts to Unfair Competition? |
|
|
132 | (3) |
|
4.1.3 What Measures Must Members Adopt to Assure to Nationals' of Other Members `Effective Protection' Against Unfair Competition? |
|
|
135 | (2) |
|
4.2 Article 39.2 TRIPS 1994 |
|
|
137 | (1) |
|
4.2.1 Who Qualifies as a National? |
|
|
137 | (1) |
|
4.2.2 Article 39.2 and Trade Secrets |
|
|
138 | (1) |
|
4.2.3 The Nature of the Obligation Imposed by Article 39.2 TRIPS |
|
|
139 | (1) |
|
4.2.4 Extraterritoriality |
|
|
140 | (1) |
|
5 Non-Violation Complaints |
|
|
141 | (2) |
|
|
143 | (2) |
|
7 Cyber Espionage and the Existence of Customary International Law Exceptions |
|
|
145 | (25) |
|
|
145 | (3) |
|
2 Customary International Law |
|
|
148 | (1) |
|
|
149 | (11) |
|
|
150 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
3.4 Public Acknowledgment |
|
|
152 | (3) |
|
|
155 | (5) |
|
|
160 | (8) |
|
4.1 Acquiescence and Protest |
|
|
163 | (4) |
|
|
167 | (1) |
|
|
168 | (2) |
|
8 Cyber Espionage and the Doctrines of Self-Defence and Necessity |
|
|
170 | (21) |
|
|
170 | (1) |
|
2 The Doctrine of Self-Defence |
|
|
171 | (8) |
|
|
173 | (2) |
|
|
175 | (2) |
|
|
177 | (2) |
|
3 The Doctrine of Necessity |
|
|
179 | (11) |
|
|
180 | (2) |
|
3.2 A Grave and Imminent Peril |
|
|
182 | (2) |
|
3.3 No Other Means to Safeguard an Essential Interest |
|
|
184 | (1) |
|
|
185 | (2) |
|
3.5 Balancing of Interests |
|
|
187 | (3) |
|
|
190 | (1) |
Conclusion |
|
191 | (5) |
Bibliography |
|
196 | (9) |
Index |
|
205 | |