The Law of Neutrality and the Sharing of Cyber-Enabled Data During International Armed Conflict

被引:0
|
作者
Schmuki, Yann L. [1 ]
机构
[1] Swiss Fed Inst Technol, Dept Comp Sci, Adv Studies Program Cyber Secur, Zurich, Switzerland
关键词
law of neutrality; cyber-enabled data; data sharing; impartiality; prevention;
D O I
10.23919/CYCON58705.2023.10181885
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The question of the extent to which neutral States are allowed to share (cyber-enabled) data during international armed conflict has rarely been addressed by governments and academia. There are two reasons for this gap: first, States are traditionally reluctant to publicly discuss or internationally regulate sharing of information with partners. Second, the law of neutrality has become a niche discipline in the past years when major international armed conflicts (IAC) were often considered to be passe. However, in today's digitalized societies, information has acquired a value similar to physical goods. Supporting a belligerent with data may therefore be just as problematic from a neutrality perspective as delivering weapons. This paper discusses the important implications of the law of neutrality for neutral States to share data obtained in cyberspace. After introducing a neutrality framework that takes contemporary State practice into account, I illustrate that the discussions on neutrality in the context of the Russia-Ukraine war are neither new nor unaddressed. A short case study will outline the inherent tensions between a neutral State's impartiality and its preventive obligations. Weighing these two factors in the context of an interconnected, cyber-driven security landscape, I argue that during an IAC, a neutral has the ability, but not the obligation, to share certain information with selected partners. However, this does not include militarily actionable data, as such sharing would violate the neutral State's fundamental impartiality obligations.
引用
收藏
页码:25 / 38
页数:14
相关论文
共 50 条
  • [1] Cyber Strategy and the Law of Armed Conflict
    Haeussler, Ulf
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 99 - 105
  • [2] Modeling and Detection of Future Cyber-Enabled DSM Data Attacks
    Hatalis, Kostas
    Zhao, Chengbo
    Venkitasubramaniam, Parv
    Snyder, Larry
    Kishore, Shalinee
    Blum, Rick S.
    ENERGIES, 2020, 13 (17)
  • [3] War Law - International Law and Armed Conflict
    Michael, Legg B.
    PUBLIC LAW REVIEW, 2006, 17 (03): : 233 - 236
  • [4] War Law: International Law and Armed Conflict
    Henderson, Christian M.
    JOURNAL OF CONFLICT & SECURITY LAW, 2007, 12 (01): : 150 - 155
  • [5] Emerging Privacy Issues and Solutions in Cyber-Enabled Sharing Services: From Multiple Perspectives
    Yan, Ke
    Shen, Wen
    Jin, Qun
    Lu, Huijuan
    IEEE ACCESS, 2019, 7 : 26031 - 26059
  • [6] Cyber conflict and international humanitarian law
    Lin, Herbert
    INTERNATIONAL REVIEW OF THE RED CROSS, 2012, 94 (886) : 515 - 531
  • [7] The Law of Armed Conflict: International Humanitarian Law in War
    Hall, Rebecca L.
    JOURNAL OF CONFLICT & SECURITY LAW, 2022, 27 (01): : 123 - 129
  • [8] War law: International law and armed conflict.
    Geron, D
    INTERNATIONAL AFFAIRS, 2005, 81 (04) : 867 - 868
  • [9] War law: Understanding international law and armed conflict
    Lewis, Elizabeth A.
    HARVARD INTERNATIONAL LAW JOURNAL, 2007, 48 (01) : 293 - 306
  • [10] The Law of Armed Conflict: International Humanitarian Law in War
    Orakhelashvili, Alexander
    JOURNAL OF CONFLICT & SECURITY LAW, 2011, 16 (03): : 555 - 558