Document Type : Article

Author

Associate Prof., Department of Law, Faculty of Economics & Admiristrative Sciences, University of Isfahan, Isfahan, Iran

Abstract

Espionage has been exercised throughout world history. By the new advancements in technology and emergence of the phenomenon of terrorism and taking necessary measures against it, however, it has gained its particular complexities and leading to many international disputes. International law distinguishes between peacetime and wartime espionage. In peacetime, it applies principle of separation of national and international jurisdictions and consequently that of State equality. Therefore, any intervention including through espionage entailing aggression against State national jurisdiction is considered as unlawful. The principle of equality of States implies non-intervention by States in each other’s affairs. Nevertheless, in new international legal order there exist certain instances of justified interventions including through espionage such as interventions permitted by the UN Security Council when collective peace and security of the world demands; intervention for self-defence; intervention by invitation; and intervention for humanitarian and human rights purposes. In war time, under certain circumstances, espionage is recognized as a legitimate ruse of war. There is an urgent need to have a world document for codification of provisions governing espionage and its new forms including cyber espionage and espionage violating the individual’s privacy. Espionage has become a global issue and therefore a new treaty can identify the instances of legitimate and illegitimate espionage.

Keywords

1. فارسی
الف) کتاب‌ها
1. بابایی، حسن (1388)، جاسوسی از دیدگاه حقوق بین‌الملل، چ اول، تهران: گنج دانش.
2. پیمانی، ضیاءالدین (1380)، حقوق جزای اختصاصی، جرائم علیه امنیت و آسایش عمومی، چ پنجم، تهران: میزان.
3. د.سینگر، کورت (1948)، از کتاب سه هزار سال جاسوسی،گزیده‌ای از بزرگ‌ترین داستان‌های جاسوسی در جهان.
4. ساریخانی، عادل (1384)، حقوق جزای اختصاصی، جرائم علیه امنیت و آسایش عمومی، قم: دانشگاه قم.
5. ضیائی بیگدلی، محمدرضا (1380)، حقوق جنگ (حقوق بین‌الملل مخاصمات مسلحانه، چ دوم، تهران: دانشگاه علامه طباطبایی.
6. گارو، رنه (1344)، مطالعات نظری و عملی در حقوق جزا، ترجمۀ کتاب Rene Garraud, Traite theorique et pratique du droit penal Francais, 1913 توسط سید ضیاءالدین نقابت، ج 3، تهران: ابن‌سینا.
7. گلدوزیان، ایرج (1385)، حقوق جزای اختصاصی، تهران: انتشارات دانشگاه تهران.
8. میر محمد صادقی، حسین (1385)، حقوق کیفری اختصاصی، جرائم علیه امنیت و آسایش عمومی، تهران: میزان.
9. ولیدی، محمدصالح (1384)، حقوق جزای اختصاصی، جرائم علیه امنیت و آسایش عمومی، تهران: دانشگاه پیام نور.
10. میلتون، کیت (1396)، دائره المعارف مصور تاریخ جاسوسی، ترجمۀ الهام شوشتری‌زاده، چ سوم، نشر سایان.
 
ب) مقالات
11. زارع، محسن؛ قره‌باغی، ونوس (1394)، «تعارض میان جاسوسی و آزادی اطلاعات از منظر حقوق بین‌الملل بشر»، فصلنامۀ مطالعات حقوق عمومی، دورۀ 45، ش 4.
12. شفیعی، یوسف (1397)، «جاسوسی حقوق بشردوستانه با رعایت حقوق بین‌الملل»، روزنامۀ وطن امروز، ش 2412، سه‌شنبه 21 فروردین 1397.
13. ضیایی، سید یاسر؛ محمدی مطلق، علیرضا (1394)، «ورود پهپادهای جاسوسی به قلمرو هوایی ایران از منظر حقوق بین‌الملل»، فصلنامۀ مطالعات راهبردی، سال هجدهم، ش 1 (پیاپی 67).
 
ج) منابع اینترنتی
14. رضایی، حامد، http://basiji-cpr.mihanblog.com/post/168
15. زمانی، محمدصادق (1386)،http://alef.ir/content/view/9473
16. نجف‌پور، محسن،
http://www.pajoohe.com/fa/index.php?Page=definition&UID=30736
17. مجادلۀ ترامپ و دانمارک بر سر خرید گرینلند https://www.irna.ir/news/
 
2. انگلیسی
A) Books
1. Babaei, Hassan, (2009), Espionage from the Perspective of International Law, 1st Ed., Ganj-e Daanesh Publications, Tehran, Iran (In Persian).
2. Garraud, Renee.,(1913), Traite theorique et pratique du droit penal Francais, translated by Neghaabat ziaaddin, Ibne Sina Publications, Vol. 3, Tehran, Iran (In Persian).
3. Goldoozian Iraj, (2006), Particular Criminal Law, Tehran University Press, Tehran (In Persian).
4. Keit, Milton., Picture Encyclopedia of the History of Espionage, translated by Shooshtarizade Elham., 3rd Ed., Saayaan Publications, Tehran, Iran (In Persian).
5. Kindred H.M et al., (1995), International Law, Chiefly as Interpreted and Applied in Canada .
6. Kish J., (1995), International Law and Espionage, Springer; 1ed.
7. Kurt D.  S., (1948), Three Thousand Years of Espionage: An Anthology of the World's Greatest Spy Stories, New York, Prentice-Hall (In Persian).
8. MirMohammadSaadeghi, Hossein., (2006), Particular Criminal Law: Crimes against Security and Public Safety, Mizan Pub., Tehran, Iran (In Persian).
9. Oppenheim L., (1948), International Law, A Treatise, (vol.2, 7thed.,) and (1992), Oppenheim's International Law, vol.1 (parts 2 to 4),9thed.,).
10. Peimani, Ziaaddin.,(2001), Particular Criminal Law: Crimes against Security and Public Safety, Mizan Pub., 5th Ed., Tehran, Iran (In Persian).
11. Saarikhani Adel., (2005), Particular Criminal Law: Crimes against Security and Public Safety, Qom University Press, Qom, Iran (In Persian).
12. Tunnell J.E., (1990), Latest Intelligence: An International Directory of Codes Used by Governemnt, Law Enforcement, Military and Surveillance Agncies, 101.
13. Validi, MohammadSaleh., (2005), Particular Criminal Law: Crimes against Security and Public Safety, Payam-e Noor University Press, Tehran, Iran (In Persian).
14. Wolter D., (2006)و Common Security in Outer Space and International Law, United Nations Institute for Disarmament Research, Geneva, Switzerland.
15. Ziaei, Bigdeli MohammdReza., (2001), Laws of War: International Law of Armed Conflicts, 2nd Ed., Allame Tabatabaei University (In Persian).
 
Articles)
16. “Panama Papers: The Secrets of Dirty Money”,(2016-09-21) at http://panamapapers.sueddeutsche.de/en/
17. Baker C.D., (2004), “Tolerance of International Espionage: A Functional Approach”, in American University International Law Review, Vol. 19, Issue 5, pp . 1091-1113.
18. Baxter R.R.,(1951), “So-Called Unprivileged Belligerency: Spies, Guerrillas and Saboteurs”, 28 BYIL 323.
19. Betke C. and Horrall S.W.,(1999), “Canada's Security Service: An Historical Outline 1864-1966”, ix, cited in Mellon .J., Levolution du renseignement de securite au Canada, 2.
20. Bram L.L.(ed.), (1995), “Espionage”, Funk & Wagnalls New Encyclopedia[CD-ROM].
21. Brown Craig (1999), “Espionage in International Law: A Necessary Evil”, Faculty of Law, University of Western Ontario.
22. Cohen J., ; Kovar R., (1960), "L espionnag en temps de paix", 6 Annuaire francais de droit international 239.
23. Cohen M., (1948), “Espionage and Immunity: Some Recent Problems and Developments”, BYIL 404.
24. Deeks Ashley (2015), “An International Legal Framework for Surveillance”, Virginia Journal of International Law 291, Vol.55: 2.
25. Delupis, L., (1984), “Foreign Warships and Immunity for Espionage”, 78 AJIL 53.
26. Duncan Campbell, “Interception Capabilities 2000”, at http://www.gn.apc.org/ duncan/ ic2kreport.htm
27. Edmondson, L.S., (1972), “Espionage in Transnational Law”, 5 Vanderbilt Journal of Transnational Law 434.
28. Fleck D.,(2007), “Individual and State Responsibility for Intelligence Gathering”, Vol. 28, Michigan Journal of International Law, pp.687-709.
29. Forcese Craig, (2011), “Spies without Borders: International Law and Intelligence Collection”, Journal of National Security and Policy 179, Vol. 5.
30. French R. ; A. Beliveau, (1979), La GRC et la gestion de la securite nationale 7, cited in Levolution du renseignement de securite au Canada, 2.
31. Kapp M.,(2007), “Spying for Peace: Expanding the Absence of the Formal Regulation of Peacetime Espionage”, University of Chicago.
32. Lieber F. ; Hitchcock, (1911), “Instructions for the Government of the Armies of the United States in the Field” (1863) 100 General Orders par.88, cited in Halleck H.W., Military Espionage, 5 AJIL 590.
33. Shafiei, Yusef., (2018), “Humanitarian Espionage Consistent with International Law”, Vatan-e Emrooz Daily, No. 2412, Tuesday 21 Farvardin 1397, p. 12 (In Persian).
34. Smith J. H.,(2007), “State Intelligence Gathering and International Law: Keynote Address”, Symposium.
35. Wright Q., “Espionage and the Doctrine of Non-Intervention in Internal Affairs”, (1962) in R. Stanger ed., Essays on Espionage and International Law, 3.
36. Zare, Mohsen. and Gharabaaghi, Vetus., (2015), “Conflict between Espionage and Freedom of Information from the Viewpoint of International Law”, Quarterly Journal of Public Law, Period 45, Vol. 4, Winter 2015 (In Persian).
37. Ziaei, Seyyed Yasser., and Mohammadi Motlagh Alireza., (2015), “The Entrance of Drones into the Air Space of Iran from the Perspective of International Law”, Quarterly Journal of Strategic Studies, Year 18, Spring 2015, Vol 1(67) (In Persian).
 
C) Documents
38. Convention (IV) Respecting the Laws and Customs of War on Land and its Annex: Regulation Concerning the Laws and Customs of War on Land, the Hague, 18 October 1907), http://Diana.law.yale.edu/diono/db/4198-21.html.
39. Convention (IV) Relative to the Protection of Civilian Persons in Time of War, http://www.ifs.univie.ac.at/intlaw/konterm/vrkon-en/html/doku/gc-iv.htm.
40. Convention Relative to the Protection of Civilian Persons in Time of War.
41. Convention Respecting the Laws and Customs of War on Land.
43. ICJ Rep., (1980), United States Diplomatic and Consular Staff in Tehran, 24 May 1980: 3.
44. ICJ Rep. (1986), Military and Paramilitary Activities, 27 June 1986: 14, 65 and 123.
45. Prosecutor v. Tadic, Case No. IT-94-1-A, Appeal on the Merits, ICTY, 15 July1999: Parags 99-145.
46. PCIJ Advisory Opinion, (1931), PCIJ, Ser. A/B, No. 41.
47. Protocol Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I), http://www.ifs.univie.ac.at/intlaw/crkon-en/html/doku/gc-pi.htm.
48. UN Doc. A/56/10, 53rd GA Session, Suppl. No. 10, 2001.
49. United States v. Mcdonald, 265 Fed. 754: Annual Digest, 1919-1922, Case No. 298.
50. Verification Protocol of the Comprehensive Nuclear Test-Ban Treaty(CTBT), at https://www.ctbto.org/fileadmin/content/treaty/treatytext.tt.html
51. UN General Assembly Res. 2625, Declaration on Principles of International Law concerning Friendly Relations and Co-operation among States, 24 October 1970.
 
D) Internet Cites
52. http://www.nytimes.com/1995/01/27/us/how-the-fbi-finally-caught-aldrich-ames .html?pagewanted=all&src=pm.
53. http://en.wikipedia.org/wiki/Edward_Lee_Howard
54. http://en.wikipedia.org/wiki/Edwin_P._Wilson
55. http://www.dadkhahi.net/wiki/index.php/%D8%AC%D8%A7%D8%B3%D9%8 8%D8%B3%D
56. http://www.edwardjayepstein.com/archived/spy.htm
58. Hamed R., http://basiji-cpr.mihanblog.com/post/168 (In Persian).
59. Zamani M. S., http://alef.ir/content/view/9473 (In Persian).
61. Tension between Donald Trump and Denmark as to the Sale of Denmark, https://www.irna.ir/news/ (In Persian).