The Problem of Cyber Espionage in the International Humanitarian Law

INTRODUCTION. The article analyses the problem of cyber espionage in the context of armed conflict in cyberspace. The relevance of this research, as part of the problem of international humanitarian law applying in cyberspace, is confirmed by the rapid development of cyber technologies that can be u...

Full description

Bibliographic Details
Main Author: S. Yu. Garkusha-Bozhko
Format: Article
Language:English
Published: Moscow State Institute of International Relations (MGIMO) 2021-03-01
Series:Московский журнал международного права
Subjects:
Online Access:https://www.mjil.ru/jour/article/view/396
_version_ 1797291426039463936
author S. Yu. Garkusha-Bozhko
author_facet S. Yu. Garkusha-Bozhko
author_sort S. Yu. Garkusha-Bozhko
collection DOAJ
description INTRODUCTION. The article analyses the problem of cyber espionage in the context of armed conflict in cyberspace. The relevance of this research, as part of the problem of international humanitarian law applying in cyberspace, is confirmed by the rapid development of cyber technologies that can be used during armed conflict, as well as the availability of the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations.MATERIALS AND METHODS. The main sources of this research are the provisions of the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, the rules of Additional Protocol I of June 08, 1977 to the Geneva Convention of August 12, 1949, the rules of the Hague Regulations on the Laws and Customs of War on Land of 1907, and the rules of custom- ary international humanitarian law. The methodology consists of the principles used in legal research, as well as general scientific and special methods of legal research (system and formal legal methods).RESEARCH RESULTS. The provisions of the Tallinn Manual on cyber espionage were examined for compliance with the relevant provisions of Additional Protocol I of June 08, 1977 to the Geneva Convention of August 12, 1949, the Hague Regulations on the Laws and Customs of War on Land of 1907, and the rules of customary international humanitarian law, as well as the problems that may arise in the process of possible practical application of this provision of the Tallinn Manual.DISCUSSION AND CONCLUSIONS. It is noted that the provisions of the Tallinn Manual 2.0 on cyber espionage are based on the relevant rules of international law. In fact, the relevant provision of the Tallinn Manual is completely copied from the relevant rules of IHL. However, based on the results of this research, the author comes to the conclusion that such blind copying does not take into account the specifics of cyberspace and leads to the following problems in the possible practical application of this provision of the Tallinn Manual: firstly, due to the anonymity of users, it will be difficult to distinguish between a cyber intelligence officer and a cyber spy in practice. Secondly, due to the difficulties in establishing clear state borders in cyberspace, including due to the use of blockchain and VPN technologies, in practice it is impossible to reliably establish whether secret information was collected on the territory of the enemy, which, in turn, leads to difficulties in qualifying such an act as cyber espionage. Finally, in the context of modern armed conflicts, espionage has ceased to be a phenomenon exclusively of international armed conflicts, and therefore it is likely that cyber espionage can be carried out not only in the context of an international armed conflict, but also in the context of a non-international armed conflict. Based on the results of this research, suggestions were made to develop state practice on this issue. It is desirable that States raise the discussion of the above issues at the UN General Assembly, which would help to identify the main trends in the development of such practices. Only And only after the practice of States on this issue becomes more obvious, the question of developing an appropriate international treaty, preferably within the UN, can be raised.
first_indexed 2024-03-07T19:36:40Z
format Article
id doaj.art-6e2cda37ccc448598ede7ebe7183f7e2
institution Directory Open Access Journal
issn 0869-0049
2619-0893
language English
last_indexed 2024-03-07T19:36:40Z
publishDate 2021-03-01
publisher Moscow State Institute of International Relations (MGIMO)
record_format Article
series Московский журнал международного права
spelling doaj.art-6e2cda37ccc448598ede7ebe7183f7e22024-02-29T08:19:20ZengMoscow State Institute of International Relations (MGIMO)Московский журнал международного права0869-00492619-08932021-03-0101708010.24833/0869-0049-2021-1-70-80344The Problem of Cyber Espionage in the International Humanitarian LawS. Yu. Garkusha-Bozhko0School of Higher Sportsmanship in Water Sports named after Yu. S. TyukalovINTRODUCTION. The article analyses the problem of cyber espionage in the context of armed conflict in cyberspace. The relevance of this research, as part of the problem of international humanitarian law applying in cyberspace, is confirmed by the rapid development of cyber technologies that can be used during armed conflict, as well as the availability of the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations.MATERIALS AND METHODS. The main sources of this research are the provisions of the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, the rules of Additional Protocol I of June 08, 1977 to the Geneva Convention of August 12, 1949, the rules of the Hague Regulations on the Laws and Customs of War on Land of 1907, and the rules of custom- ary international humanitarian law. The methodology consists of the principles used in legal research, as well as general scientific and special methods of legal research (system and formal legal methods).RESEARCH RESULTS. The provisions of the Tallinn Manual on cyber espionage were examined for compliance with the relevant provisions of Additional Protocol I of June 08, 1977 to the Geneva Convention of August 12, 1949, the Hague Regulations on the Laws and Customs of War on Land of 1907, and the rules of customary international humanitarian law, as well as the problems that may arise in the process of possible practical application of this provision of the Tallinn Manual.DISCUSSION AND CONCLUSIONS. It is noted that the provisions of the Tallinn Manual 2.0 on cyber espionage are based on the relevant rules of international law. In fact, the relevant provision of the Tallinn Manual is completely copied from the relevant rules of IHL. However, based on the results of this research, the author comes to the conclusion that such blind copying does not take into account the specifics of cyberspace and leads to the following problems in the possible practical application of this provision of the Tallinn Manual: firstly, due to the anonymity of users, it will be difficult to distinguish between a cyber intelligence officer and a cyber spy in practice. Secondly, due to the difficulties in establishing clear state borders in cyberspace, including due to the use of blockchain and VPN technologies, in practice it is impossible to reliably establish whether secret information was collected on the territory of the enemy, which, in turn, leads to difficulties in qualifying such an act as cyber espionage. Finally, in the context of modern armed conflicts, espionage has ceased to be a phenomenon exclusively of international armed conflicts, and therefore it is likely that cyber espionage can be carried out not only in the context of an international armed conflict, but also in the context of a non-international armed conflict. Based on the results of this research, suggestions were made to develop state practice on this issue. It is desirable that States raise the discussion of the above issues at the UN General Assembly, which would help to identify the main trends in the development of such practices. Only And only after the practice of States on this issue becomes more obvious, the question of developing an appropriate international treaty, preferably within the UN, can be raised.https://www.mjil.ru/jour/article/view/396cyber espionageсomputer network exploitationcyber reconnaissanceinternational humanitarian lawarmed conflicttallinn manualespionageintelligencecyber spy
spellingShingle S. Yu. Garkusha-Bozhko
The Problem of Cyber Espionage in the International Humanitarian Law
Московский журнал международного права
cyber espionage
сomputer network exploitation
cyber reconnaissance
international humanitarian law
armed conflict
tallinn manual
espionage
intelligence
cyber spy
title The Problem of Cyber Espionage in the International Humanitarian Law
title_full The Problem of Cyber Espionage in the International Humanitarian Law
title_fullStr The Problem of Cyber Espionage in the International Humanitarian Law
title_full_unstemmed The Problem of Cyber Espionage in the International Humanitarian Law
title_short The Problem of Cyber Espionage in the International Humanitarian Law
title_sort problem of cyber espionage in the international humanitarian law
topic cyber espionage
сomputer network exploitation
cyber reconnaissance
international humanitarian law
armed conflict
tallinn manual
espionage
intelligence
cyber spy
url https://www.mjil.ru/jour/article/view/396
work_keys_str_mv AT syugarkushabozhko theproblemofcyberespionageintheinternationalhumanitarianlaw
AT syugarkushabozhko problemofcyberespionageintheinternationalhumanitarianlaw