Art11-网络法和间谍法作为交流工具

ID:23706

阅读量:0

大小:2.30 MB

页数:24页

时间:2022-11-29

金币:15

上传者:战必胜
203
Cyber Law and
Espionage Law as
Communicating
Vessels
Abstract: Existing legal literature would have us assume that espionage operations
and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is
subject to the scant, amorphous, and under-developed legal framework of espionage
law, the other is subject to an emerging, ever-evolving body of legal rules, known
cumulatively as cyber law. This dichotomy, however, is erroneous and misleading.
In practice, espionage and cyber law function as communicating vessels, and so are
better conceived as two elements of a complex system, Information Warfare (IW).
This paper therefore rst draws attention to the similarities between the practices the
fact that the actors, technologies, and targets are interchangeable, as are the knee-jerk
legal reactions of the international community. In light of the convergence between
peacetime Low-Intensity Cyber Operations (LICOs) and peacetime Espionage
Operations (EOs) the two should be subjected to a single regulatory framework, one
which recognizes the role intelligence plays in our public world order and which
adopts a contextual and consequential method of inquiry. The paper proceeds in
the following order: Part 2 provides a descriptive account of the unique symbiotic
relationship between espionage and cyber law, and further explains the reasons for this
dynamic. Part 3 places the discussion surrounding this relationship within the broader
discourse on IW, making the claim that the convergence between EOs and LICOs, as
described in Part 2, could further be explained by an even larger convergence across
all the various elements of the informational environment. Parts 2 and 3 then serve
as the backdrop for Part 4, which details the attempt of the drafters of the Tallinn
Dr. Asaf Lubin
Post-Doctoral Cyber Research Fellow
Fletcher School of Law and Diplomacy
Tufts University
Medford, MA, United States
2018 10th International Conference on Cyber Conict
CyCon X: Maximising Eects
T. Minárik, R. Jakschis, L. Lindström (Eds.)
2018 © NATO CCD COE Publications, Tallinn
Permission to make digital or hard copies of this publication for internal
use within NATO and for personal or educational use when for non-prot or
non-commercial purposes is granted providing that copies bear this notice
and a full citation on the rst page. Any other reproduction or transmission
requires prior written permission by NATO CCD COE.
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭