Muutke küpsiste eelistusi

E-raamat: Cyber Espionage and International Law

(University of Reading, UK)
  • Formaat: 248 pages
  • Ilmumisaeg: 27-Dec-2018
  • Kirjastus: Hart Publishing
  • ISBN-13: 9781782257363
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 45,62 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 248 pages
  • Ilmumisaeg: 27-Dec-2018
  • Kirjastus: Hart Publishing
  • ISBN-13: 9781782257363
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The advent of cyberspace has led to a dramatic increase in state-sponsored political and economic espionage. This monograph argues that these practices represent a threat to the maintenance of international peace and security and assesses the extent to which international law regulates this conduct. The traditional view among international legal scholars is that, in the absence of direct and specific international law on the topic of espionage, cyber espionage constitutes an extra-legal activity that is unconstrained by international law. This monograph challenges that assumption and reveals that there are general principles of international law as well as specialised international legal regimes that indirectly regulate cyber espionage. In terms of general principles of international law, this monograph explores how the rules of territorial sovereignty, non-intervention and the non-use of force apply to cyber espionage. In relation to specialised regimes, this monograph investigates the role of diplomatic and consular law, international human rights law and the law of the World Trade Organization in addressing cyber espionage. This monograph also examines whether developments in customary international law have carved out espionage exceptions to those international legal rules that otherwise prohibit cyber espionage as well as considering whether the doctrines of self-defence and necessity can be invoked to justify cyber espionage. Notwithstanding the applicability of international law, this monograph concludes that policymakers should nevertheless devise an international law of espionage which, as lex specialis, contains rules that are specifically designed to confront the growing threat posed by cyber espionage.

Arvustused

Dr Russell Buchans new book Cyber Espionage and International Law offers a timely and thorough examination of the application of existing public international law doctrines to the practice of peacetime interstate cyber intelligence operations. In doing so the book carefully walks readers through a complex wilderness of mirrors, a landscape populated by spies, saboteurs, hackers, and surveillance intermediaries. Grounding his work is a profound understanding of the foundational principles of international law, and Buchan does a superb job both introducing them to readers and making the case for their unique operation in addressing the contemporary challenges posed by new surveillance technologies. Since the dawn of the printing press there have only been a handful of books ever written on the law of nations as it applies to the second oldest profession. Buchans work thus offers a valuable contribution to what is an emerging legal debate seeking to promote greater clarity around international rules on espionage. -- Asaf Lubin, Yale University [ M]any legal scholars suggest that espionage is neither legal nor illegal under international law. Cyber Espionage and International Law is a strong and well-supported rebuttal of this interpretation [ E]ssential reading for anyone interested in understanding or tasked with interpreting the scope of the CSEs new powers in light of existing international law. -- Leah West * Canadian Yearbook of International Law * Buchan is not afraid to express his opinion on a number of issues throughout the monograph and the decisive, well supported and justified stance that he takes in relation to how international law rules apply to state cyber espionage is one of the unique features of this book There is no doubt that the monograph is an important and sound contribution to the existing debate on these issues and will serve as a valuable tool to those who are new to this area of law together with the experts keen to explore the evolution of the legal regimes applicable to state cyber espionage activities. -- Eliza Watt * Journal of Conflict and Security Law * There is much of interest and a wealth of material here... Cyber-espionage as a topic, however much avoided in polite company in the past, now more than ever needs to be subject to proper analytical discourse. This book provides a significant and rigorous contribution to that intellectual debate. -- Duncan French, Professor, College of Social Science, University of Lincoln * Leiden Journal of International Law * Cyber Espionage and International Law is one of the most important and complete works on cyber espionage in international scholarship, and it will be studied and analysed for many years in the future to understand the complex relationship between cyber espionage and a number of international law rules. The books compelling arguments, its fresh and frank style, and its sound knowledge of international law rules make this monograph a fascinating and pleasant read. -- Marco Longobardo, University of Westminster * Israel Law Review * Buchans book offers a comprehensive study of the patchwork of norms applicable to cyber espionage. This book, through the lenses of the dawn of cyberspace, offers a fresh look at the question relating to the international legal framework applicable to espionage. I highly recommend this book for those who are interested in cyber espionage, and more broadly in how the development of ICTs affects existing international law. -- François Delerue, Sciences Po Paris * German Yearbook of International Law *

Muu info

The overarching research objective of this book is to critically examine the protection afforded by international law to state and non-state actors from cyber espionage.
Acknowledgements v
Table of Cases
xi
Table of Instruments
xxi
Introduction 1(12)
1 Background
1(3)
2 The Argument
4(5)
3
Chapter Overview
9(4)
1 Defining Cyber Espionage
13(15)
1 Introduction
13(1)
2 The Intelligence Community
14(3)
2.1 Sources of Information Collection
15(1)
2.2 Open and Closed Sources
16(1)
3 Cyber Espionage: The Copying of Confidential Data
17(1)
4 Close and Remote Access Cyber Espionage
18(1)
5 Secrecy and Cyber Espionage
19(1)
6 Non-Consensual Information Gathering
20(1)
7 Political and Economic Cyber Espionage and the Role of State and Non-State Actors
21(4)
8 Cyber Espionage and International Law
25(1)
9 Peacetime Cyber Espionage
26(1)
10 Conclusion
27(1)
2 Cyber Espionage and International Peace and Security
28(20)
1 Introduction
28(1)
2 Political Cyber Espionage
28(13)
2.1 Realism
28(3)
2.2 The International Society
31(5)
2.3 Espionage and International Cooperation
36(5)
3 Economic Cyber Espionage
41(5)
4 Conclusion
46(2)
3 Cyber Espionage and the Rules of Territorial Sovereignty, Non-Intervention and the Non-Use of Force
48(22)
1 Introduction
48(1)
2 The Rule of Territorial Sovereignty
49(12)
2.1 Cyber Espionage and Control Over Cyber Infrastructure
51(5)
2.2 Cyber Espionage and the Performance of Inherently Governmental Functions
56(5)
3 The Rule of Non-intervention
61(4)
3.1 Domaine Reserve
62(1)
3.2 Coercion
63(2)
4 The Prohibition on the Use of Force
65(3)
5 Conclusion
68(2)
4 Cyber Espionage and Diplomatic and Consular Law
70(25)
1 Introduction
70(1)
2 Cyber Espionage Against Diplomatic Missions and Consular Posts
71(18)
2.1 The Inviolability of Diplomatic and Consular Premises
72(1)
2.1.1 Premises
72(5)
2.1.2 The `Special Duty' to Protect Premises
77(3)
2.1.3 Furnishings, Property and Means of Transport
80(3)
2.2 The Inviolability of Archives and Documents
83(3)
2.3 Freedom of Communication
86(3)
3 The Use of Diplomatic Missions and Consular Posts for Cyber Espionage
89(5)
3.1 Immunities for Diplomatic and Consular Officials
92(2)
4 Conclusion
94(1)
5 Cyber Espionage and International Human Rights Law
95(27)
1 Introduction
95(1)
2 The Extraterritorial Application of Human Rights Treaties
96(9)
2.1 ICCPR
97(4)
2.2 ECHR
101(4)
3 The Right to Privacy
105(4)
4 Restricting the Right to Privacy
109(12)
4.1 In Accordance with the Law
109(1)
4.1.1 Accessible
110(1)
4.1.2 Foreseeable
110(4)
4.1.3 Oversight
114(2)
4.2 Legitimate Aim
116(3)
4.3 Proportionality
119(2)
5 Conclusion
121(1)
6 Economic Cyber Espionage and the World Trade Organization
122(23)
1 Introduction
122(3)
2 Economic Cyber Espionage as a WTO `Measure'
125(4)
2.1 `As Applied' Challenge
125(2)
2.2 `As Such' Challenge
127(2)
3 Nullification or Impairment of a Benefit
129(1)
4 Substantive Obligations under WTO Law
130(11)
4.1 Article 10bis Paris Convention 1967
130(1)
4.1.1 Who Qualifies as a National?
131(1)
4.1.2 What Amounts to Unfair Competition?
132(3)
4.1.3 What Measures Must Members Adopt to Assure to Nationals' of Other Members `Effective Protection' Against Unfair Competition?
135(2)
4.2 Article 39.2 TRIPS 1994
137(1)
4.2.1 Who Qualifies as a National?
137(1)
4.2.2 Article 39.2 and Trade Secrets
138(1)
4.2.3 The Nature of the Obligation Imposed by Article 39.2 TRIPS
139(1)
4.2.4 Extraterritoriality
140(1)
5 Non-Violation Complaints
141(2)
6 Conclusion
143(2)
7 Cyber Espionage and the Existence of Customary International Law Exceptions
145(25)
1 Introduction
145(3)
2 Customary International Law
148(1)
3 State Practice
149(11)
3.1 Duration
150(1)
3.2 Generality
150(1)
3.3 Uniformity
151(1)
3.4 Public Acknowledgment
152(3)
3.5 Assessment
155(5)
4 Opinio Juris
160(8)
4.1 Acquiescence and Protest
163(4)
4.2 National Legislation
167(1)
5 Conclusion
168(2)
8 Cyber Espionage and the Doctrines of Self-Defence and Necessity
170(21)
1 Introduction
170(1)
2 The Doctrine of Self-Defence
171(8)
2.1 Armed Attack
173(2)
2.2 Necessity
175(2)
2.3 Proportionality
177(2)
3 The Doctrine of Necessity
179(11)
3.1 Essential Interest
180(2)
3.2 A Grave and Imminent Peril
182(2)
3.3 No Other Means to Safeguard an Essential Interest
184(1)
3.4 Non-Contribution
185(2)
3.5 Balancing of Interests
187(3)
4 Conclusion
190(1)
Conclusion 191(5)
Bibliography 196(9)
Index 205
Russell Buchan is Senior Lecturer in law at the University of Sheffield.