MOTHER'S DAY SPECIALS! SHOW ME MORE

Close Notification

Your cart does not contain any items

Cyber-Espionage in International Law

Silence Speaks

Thibault Moulin

$195

Hardback

Not in-store but you can order this
How long will it take?

QTY:

English
Manchester University Press
07 September 2023
While espionage among nations is a long-standing practice, the emergence of the Internet has challenged the traditional legal framework and has resulted in the intensification of intelligence activities. With the emergence of cyber-espionage, agents may collect intelligence from within their own jurisdictions, with a great deal of secrecy and less risk. This book argues that - save some exceptions - this activity has been subject to normative avoidance, meaning that it is neither prohibited, nor authorized or permitted. States are aware of such status of law, and are not interested in any further regulation, leaving them free to pursue cyber-espionage themselves at the same time as they adopt measures to prevent and falling victim to it. This book resorts to a first-class sample of state practice and analyses several rules and treaties, and demonstrates that no specific customary law has emerged in the field.
By:  
Imprint:   Manchester University Press
Country of Publication:   United Kingdom
Dimensions:   Height: 234mm,  Width: 156mm,  Spine: 19mm
Weight:   617g
ISBN:   9781526168030
ISBN 10:   1526168030
Series:   Melland Schill Studies in International Law
Pages:   312
Publication Date:  
Audience:   College/higher education ,  Professional and scholarly ,  Primary ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active
Part I: Introduction Introduction to Part I 1 Main notions 1.1 The concept of ‘cyber-espionage’ 1.2 The concept of ‘cyber-space’ 2 Methodological and conceptual frameworks 2.1 The determination of law 2.1.1 The approach to treaty interpretation 2.1.2 The approach to sources 2.2 The concept of normative avoidance 2.2.1 Definition 2.2.2 Novelty Part II: The rules connected to territorial integrity Introduction to Part II 3 Territorial sovereignty 3.1 The dissimilarities between physical trespass and digital intrusion 3.1.1 Espionage per se is not an international wrongful act 3.1.2 The lack of an analogy between digital and physical intrusions 3.2 The ‘do-not-harm’ challenge and the minimal effects of cyber-espionage 4 Collective security law 4.1 A traditional interpretation of the UN Charter does not result in a regulation of cyber-espionage 4.2 Alternative interpretations of cyber-espionage do not result in the regulation of cyber-espionage 4.2.1 Interpretation based on meta-rules 4.2.2 Teleological interpretation 5 The law applicable between belligerent States 5.1 The territorial rationale of the regulation of espionage between belligerents 5.1.1 The categories of spies defined by the law of armed conflict 5.1.2 The challenging application of rules about espionage in a digital space 5.2 A lack of State support in favour of the application of espionage-related rules in cyber-space 6 The law applicable between belligerent and non-belligerent States 6.1 The absence of a regulation by rules on material operations 6.1.1 The obligations between belligerents 6.1.2 The obligations on neutral States 6.2 A limited restriction of cyber-espionage by rules on the use of telecommunications 6.2.1 The obligations between belligerents 6.2.2 The obligations on neutral States Conclusion to Part II Part III: The rules disconnected from territorial integrity Introduction to Part III 7 The law of diplomatic relations 7.1 Indirect regulation of espionage by embassies 7.1.1 The accreditation of the mission 7.1.2 The performing of the mission 7.2 Indirect regulation of espionage on embassies 7.2.1 The lack of regulation by the inviolability of diplomatic premises 7.2.2 The incompatibility of cyber-espionage with the rules protecting the inviolability of archives and documents 8 International economic law 8.1 The absence of a prohibition of economic cyber-espionage 8.1.1 The absence of a prohibition by national treatment 8.1.2 The absence of a prohibition by the obligation to protect undisclosed information 8.2 The tolerance of cyber-espionage required for the preservation of essential security interests 8.2.1 Cyber-espionage activities in peacetime 8.2.2 Cyber-espionage in a time of war or other emergency in international relations 9 International human rights law 9.1 The absence of extraterritorial jurisdiction in the event of remote cyber-espionage activities 9.2 The measured regulation of surveillance activities by the right to privacy 9.2.1 Interference and legality 9.2.2 Legitimacy and proportionality 10 State practice 10.1 The unanimous prohibition of espionage by domestic criminal laws 10.1.1 The traditional prohibition of espionage 10.1.2 The progressive prohibition of digital intrusions and interceptions 10.2 The predominant authorisation of one’s own intelligence activities against other States 10.2.1 Provisions authorising intelligence gathering 10.2.2 Grounds allowing intelligence collection 11 Opinio juris 11.1 The absence of a right to spy 11.2 The absence of a prohibition on espionage Conclusion to Part III Conclusion Index -- .

Dr Thibault Moulin is an Associate Professor at the Catholic University of Lyon and a Research Associate at the Federmann Cyber Security Center of the Hebrew University of Jerusalem.

See Also