نویسنده

استادیار گروه حقوق پردیس بین‌المللی کیش دانشگاه تهران

چکیده

افزایشسریع استفاده از فضای سایبر و ویژگی‌های منحصربه‌فرد آن، از جمله به‌هم‌پیوسته بودن زیرساخت‌های سایبر در سراسر جهان و فاقد مرز بودن شبکۀ جهانی اینترنت، از یک سو؛ و امکان استفاده از این فضا و قابلیت‌های آن برای انجام حملات سایبری و عبور دادن سلاح سایبر با استفاده از زیرساخت‌های سایبری سایر دولت‌ها، از سوی دیگر؛ رعایت بی‌طرفی در مخاصمات مسلحانۀ بین‌المللی را با دشواری‌های جدی مواجه می‌سازد. در این شرایط اصل احترام به تعرض‌ناپذیری سرزمین دولت‌های بی‌طرف به‌شدت آسیب‌پذیر می‌شود و احتمال درگیر شدن دولت بی‌طرف در مخاصمه و در نتیجه گسترش آن افزایش می‌یابد؛ نتیجه‌ای که حقوق بی‌طرفی در پی اجتناب از آن است. بنابراین مطالعه و بررسی قابلیت اعمال حقوق بی‌طرفی بر فضای سایبر، به‌خصوص تعهدات متخاصمان و دولت‌های بی‌طرف و چگونگی اجرای آنها و آثار حقوقی نقض تعهدات بی‌طرفی ضروری می‌نماید.     

کلیدواژه‌ها

عنوان مقاله [English]

Application of the law of neutrality in cyberspace

نویسنده [English]

  • Farideh Shaygan

Assistant Professor, Kish International Campus, University of Tehran, Kish, Iran

چکیده [English]

Rapid increase in the use of cyberspace and its unique characteristics, including interconnectivity of cyber infrastructure around the world and absence of any borders on the world wide web, on the one hand; and the possibility of using cyber infrastructures of other States to employ cyberspace and its capabilities for cyber-attacks and transmission of cyber weapons, on the other; makes the observance of neutrality in international armed conflicts, if not impossible, difficult at the very least. In such situation, inviolability of the territory of neutral States becomes extremely vulnerable and the probability of involvement of the neutral State in the ongoing conflict enhances. Which is the very consequence that the law of neutrality seeks to avoid? Thus, the study of the applicability of the law of neutrality to cyberspace in general and obligations of belligerents and neutral States in particular, their implementation, and the consequences of their violations seems necessary.

کلیدواژه‌ها [English]

  • cyberspace
  • international armed conflict
  • law of neutrality
  • obligation of belligerents
  • obligations of neutral States
  • prevent the violation of neutrality
  • sovereignty over cyberspace
  • terminate the violation of neutrality

الف) کتاب‌ها

1. Henckaerts, Jean-Marie & DOSWALD-BECK, Louise (2005), Customary International Humanitarian Law, Vol. 1, Cambridge/New York: CICR/Cambridge University Press, 628 p.

2. Neff, Stephen C. (2000), The Rights and Duties of Neutrals: A General History, Manchester, Manchester University Press, 246 p.

ب) مقالات

3. Brown, Davis (2006), “A Proposal for an International Convention To Regulate the Use of Information Systems in Armed Conflict”, Harvard International Law Journal, Vol.47, No.1, pp.179-221.  

4. Deeks, Ashley (2013), “The Geography of Cyber Conflict: Through a Glass Darkly”, International Law Studies, Vol.89, pp.1-20.

5. Doswald-Beck, Louise (2002), “Some Thoughts on Computer Network Attack and the International Law of Armed Conflict”, International Law Studies, Vol.76, pp.163-185.

6. Droege, Cordula  (2012), “Get off my Cloud: Cyberwarfare, International Humanitarian Law, and the Protection of Civilians”, IRRC, Vol. 94, No. 886,  pp.533-578.  

7. Franzese, Patrick W. (2009),“Sovereignty in Cyberspace: Can It Exist?”,Air Force Law Review, Vol. 64, No. 1, pp. 1-42.  

8. Heinegg, Wolff Heintschel von (2012), “Neutrality in Cyberspace”, 4th International Conference on Cyber Conflict, available at: https://ccdcoe.org/ sites/default/files/multimedia/pdf/1_3_von_Heinegg_NeutralityInCyberspace.pdf>. 2014/4/6.

9. Heinegg, Wolff Heintschel von (2013), “Territorial Sovereignty and Neutrality in Cyberspace”, International Law Studies, Vol.89, pp.123-156. 10. Jensen, Eric Talbot (2012), “Sovereignty and Neutrality in Cyber Conflict”, Fordham International Law Journal, Vol.35, No.3, pp.815-841.

10. Kastenberg, Joshua E. (2009), “Non-Intervention and Neutrality in Cyberspace: An Emerging Principle in the National Practice of International Law”, Air Force Law Review, Vol.64, No.1, pp.43-64.

11. Kelsey, Jeffrey T.G. (2008), “Hacking into International Humanitarian Law: The Principles of Distinction and Neutrality in the Age of Cyber Warfare”, Michigan Law Review, Vol.106, No.7, pp.1427-1451.

12. Lopez, C. Todd, “Fighting in Cyberspace Means Cyber Domain Dominance”, Air Force Print News, Feb. 28, 2007, available at:http://www.af.mil/News/ ArticleDisplay/ tabid/223/Article/127803/fighting-in-cyberspace-means-cyber-domain-ominance.aspx.  2015/9/17. 

13. Schaap, J. (2009), “Cyber Warfare Operations: Development and Use under International Law”, Air Force Law Review, Vol.64, No.1, pp.121-174.   

14. Schindler, Dietrich, “Transformations in the Law of Neutrality since 1945”, in: Humanitarian Law of Armed Conflict: Challenges Ahead, Essays in Honour of Frits Kalshoven, Delissen, Astrid J. M. (ed.) (1991), Dordrecht: ,pp. 367-386.

15. Shaygan, Farideh, “International Humanitarian Law and Legitimate targets in Cyber Conflict”, AALCO Journal of International Law, Vol. 3, No. 2, 2014, pp.67-93.

16. Sklerov, Matthew J. (2009), “Solving the Dilemma of State Responses to Cyberattacks: A Justification for the Use of Active Defenses against States Who Neglect Their Duty to Prevent”, Military Law Review, Vol.201, Fall 2009, pp.1-85.

17. Tuukkanen, “Sovereignty in the Cyber Domain”, in The Fog of Cyber Defence, edited by Rantapelkonen, Jari and Salminen, Mirva, Helsinky: National Defence University, Publications Series 2, Article Collection n. 0 10, 2013, pp.37-45.

18. Walker, George K. (2000), “Information Warfare and Neutrality”, Vanderbilt Journal of Transnational Law, Vol.33, No.5, 1079-1202.

19. Wingfield, Thomas (2000), “The Law of Information Conflict: National Security Law in Cyberspac”, Falls Church, VA: Aegis Research Corporation, 2000, 497 p.

ج) آرای قضایی و داوری

20. ICJ, Reports 1949, Corfu Channel Case, Judgment of 9 April 1949.

 

21. ICJ, Reports 1980, Case concerning United States Diplomatic and Consular Staff in Tehran, Judgment of 24 May 1980.

22. sland of Palmas Case, Netherland v. USA, Reports of International Arbitral Awards, Vol. II, 4 April 1928.  

د) سایر منابع

23. قانون جرایم رایانه‌ای جمهوری اسلامی ایران، مصوب 11 بهمن 1388.

24.Commentary on the HPCR Manual on International Law Applicable to Air and Missile Warfare, Program on Humanitarian Policy and Conflict Research at Harvard University, 2010.

25. Cyber Security Strategy for Germany, Federal Ministry of Interior, 2011, available at: <https:// www.itu.int/en/ITU-D/Cybersecurity/Documents/National_Strategies_ Repository/Germany_2011_Cyber_Security_Strategy_for_Germany.pdf>. 2015/10/22.

26. HPCR Manual on International Law Applicable to Air and Missile Warfare, Program on Humanitarian Policy and Conflict Research, University of Harvard, Bern, 15 May 2009, available at: <ihlresearch.org/amw/HPCR%20Manual.pdf>. 2014/2/25.

27.Humanitarian Law in Armed Conflicts- Manual, Bonn 1992, The Federal Ministry of Defence of the Federal Republic of Germany.  

28. International Law Association (1998), Helsinki Principles on the Law of Maritime Neutrality, Taipei, ILA Report of Sixty-Eight Conference.

29. ILC (2001), Draft Articles on Responsibility of States for Internationally Wrongful Act.

30.Law of Armed Conflict at the Operational and Tactical Levels, National Defence of Canada, August 2001.

31.San Remo Manual on International Law Applicable to Armed Conflicts at Sea, 12 June 1994.

32. Schmitt, Michael (ed.) (2013), Tallinn Manual on the International Law Applicable to Cyber Warfare, Prepared by the International Groupe of Experts at the Invitation of the NATO Cooperative Cyber Defence Centre of Excellence, Cambridge/New York, Cambridge University Press: available at: <http://www. ccdcoe.org/249.html>. 2014/02/24.

33.The Joint Service Manual of the Law of Armed Conflict, 2004, UK Ministry of Defence. .  

34. The UK Cyber Security Strategy. Protecting and Promoting UK in a Digital World, November 2011, available at: <https://www.gov.uk/government/uploads/system/ uploads/attachment_data/file/60961/uk-cyber-security-strategy-inal.pdf >. 2015/5/15.

35.US Commander’s Handbook on the Law of Naval Operations, Newport 1997.

36. US Department of Defense Office of General Counsel (1999), An Assessment of International Legal Issues In Information Operations, available at: <http://www. maxwell.af.mil/au/awc/awcgate/dod-io-legal/dod-io-legal.pdf>. 2014/11/6.

37. US Department of Defense (2005), The Strategy for Homeland Defense and Civil Support, Washington D. C., available at: available at http://www. defense.gov/news/ Jun2005/d20050630homeland.pdf>. 2015/5/21.

38. US Department of Defense (2011), Cyberspace Policy Report: A Report to Congress Pursuant to the National Defense Authorization Act for Fiscal Year 2011, available at: <https://fas.org/irp/eprint/dod-cyber.pdf>. 2015/5/11.

39. US Department of Defense (2012), Dictionary of Military and Associated Terms, 2012, available at: <www.dtic.mil/doctrine/dod_dictionary/>. 2015/10/17.