Not All Those Who Wander (Over the Horizon) Are Lost: The Applicability of Existing Paradigms of International Law to Cyberspace and the Interpretation of Customary International Law

被引:0
作者
Chan, Kristy [1 ]
Khaw, Joseph [1 ]
机构
[1] Univ Cambridge, Jurisprudence Oxon, Cambridge, England
来源
2024 16TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: OVER THE HORIZON, CYCON | 2024年
关键词
cyberspace; custom; identification; international law; interpretation; methodology;
D O I
10.23919/CyCon62501.2024.10685595
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It may be considered banal at this point for a State to assert that 'international law applies to cyberspace'. However, this belies tricky methodological questions regarding how a 'new' rule of customary international law (CIL) emerges. Cyberspace poses unique difficulties for the identification of CIL because of a paucity of publicly known State practice, vague statements, and attribution difficulties. However, this does not render CIL irrelevant to cyberspace. We argue that as the pace of technological development increases, interpretation of general rules of CIL may be used to ascertain their content when applied in cyberspace. First, the proposed interpretive method is discussed. Second, State practice on the application of sovereignty and jurisdiction in cyberspace are considered to demonstrate interpretation in practice, focusing on extraterritorial botnet takedowns. Third, objections to the interpretive method are considered but shown to be ultimately unsustainable. Normatively, the interpretation of CIL is an important tool for regulating cyberspace. First, it explains States' constant assertions that CIL applies to cyberspace despite the difficulties in meeting the usual tests. Second, on this approach, custom does not play catch-up to States' activities but develops contemporaneously. This allows international law to peer over the horizon and be better prepared to tackle future challenges.
引用
收藏
页码:177 / 190
页数:14
相关论文
共 63 条
  • [1] Akande Dapo, 2022, Intl L Stud, V99, P18
  • [2] [Anonymous], Lando
  • [3] [Anonymous], 2015, ICJ Rep 665 [93]
  • [4] [Anonymous], 2021, Official compendium of voluntary national contributions on the subject of how international law applies to the use of information and communications technologies by States, UNODA, A/76/136,, P17
  • [5] [Anonymous], U.S. Attorney's Office, Southern District of New York. "Nine Iranians Charged With Conducting Massive Cyber Theft Campaign On Behalf Of The Islamic Revolutionary Guard Corps." U.S. Department of Justice, March 23, 2018. https://www.justice.gov/usao-sdny/pr/nine-iranians-charged-conducting-massivecyber-theft-campaign-behalf-islamic.
  • [6] [Anonymous], 2012, ICJ Reports, P99
  • [7] [Anonymous], 2020, Taipei, Taiwan, P1
  • [8] [Anonymous], For example, the UK has always held that sovereignty cannot be breached as a standalone independent primary rule of international law
  • [9] [Anonymous], 2005, Armed Activities on the Territory of Congo (Democratic Republic of Congo v Uganda), Judgment, Merits
  • [10] [Anonymous], 2010, ICJ REPORTS, P403