Transnational state-sponsored cyber economic espionage: a legal quagmire

被引:0
作者
Brenda I. Rowe
机构
[1] Texas A&M University – San Antonio,Department of Social Sciences
来源
Security Journal | 2020年 / 33卷
关键词
Espionage; Cybercrime; Transnational crime; International law; State crime;
D O I
暂无
中图分类号
学科分类号
摘要
Transnational state-sponsored cyber economic espionage poses a threat to the economy of developed countries whose industry is largely reliant on the value of information. In the face of rapid technological development facilitating cyber economic espionage from afar on a massive scale, the law has not developed apace to effectively address this problem. Applicable United States domestic laws have been ineffective in addressing the problem due to lack of enforcement jurisdiction, sovereign immunity, and inability to hold the state sponsor accountable. Customary international law principles offer little help in combatting the issue, as countermeasures are typically unavailable since espionage may not be ongoing by the time a victimized state can confidently attribute it to a state and retortions are a relatively weak response. Although existing treaties have not been effective in addressing this problem, a multilateral global treaty specifically addressing transnational state-sponsored cyber economic espionage may be a promising way forward.
引用
收藏
页码:63 / 82
页数:19
相关论文
共 39 条
  • [11] Din M(2004)Approaches to Cybercrime Jurisdiction Journal of High Technology Law 4 1-46
  • [12] Brenner SW(2016)Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats Harvard National Security Journal 7 391-435
  • [13] Koops B-J(2014)A World of Difference: The Budapest Convention on Cybercrime and the Challenges of Harmonization Monash University Law Review 40 698-736
  • [14] Carlin JP(2018)International Cybertorts: Expanding Accountability in Cyberspace Cornell Law Review 103 565-644
  • [15] Clough J(2009)Economic Espionage: A Framework for a Workable Solution Minnesota Journal of Law, Science & Technology 10 503-548
  • [16] Crootof R(2017)Data Extraterritoriality Texas Law Review 95 145-160
  • [17] Danielson MEA(2017)Public-Private Cybersecurity Texas Law Review 95 467-538
  • [18] Eichensehr KE(2016)Constructing Norms for Global Cybersecurity American Journal of International Law 110 425-479
  • [19] Eichensehr KE(2017)Transnational Bribery: When is Extraterritoriality Appropriate? Charleston Law Review 11 305-352
  • [20] Finnemore M(2018)The DTSA at One: An Empirical Study of the First Year of Litigation UNDER the Defend Trade Secrets Act Wake Forest Law Review 53 105-156