2016
DOI: 10.1093/jcsl/krw011
|View full text |Cite
|
Sign up to set email alerts
|

Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm

Abstract: That states are subject to an obligation to prevent their cyber infrastructure from being used in a manner injurious to the international legal rights of other states is well established in customary international law. This obligation imposes a dual duty upon states. The first duty is an obligation of result insofar as it requires states to implement the laws and institutions necessary to prevent and punish malicious cyber conduct emanating from their territory, although international law confers upon states a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 0 publications
0
14
0
1
Order By: Relevance
“…Further extension of this theory may be possible, that is, even transiting states whose cyberinfrastructure is being used in their territories for malicious cyber conduct have an obligation to prevent their territories from being used by referencing the ICJ Nicaragua case 28 , in which their territory was used as a trafficking route for military equipment (Buchan 2016). However, a challenge in cyberspace is that identifying the source is extremely difficult, if not impossible, when it is malicious (Gross 2015), while it is contrarily claimed that the attribution of malicious actions is becoming increasingly possible for a few countries that possess advanced technologies (Lewis 2016).…”
Section: Cybersecuritymentioning
confidence: 99%
See 3 more Smart Citations
“…Further extension of this theory may be possible, that is, even transiting states whose cyberinfrastructure is being used in their territories for malicious cyber conduct have an obligation to prevent their territories from being used by referencing the ICJ Nicaragua case 28 , in which their territory was used as a trafficking route for military equipment (Buchan 2016). However, a challenge in cyberspace is that identifying the source is extremely difficult, if not impossible, when it is malicious (Gross 2015), while it is contrarily claimed that the attribution of malicious actions is becoming increasingly possible for a few countries that possess advanced technologies (Lewis 2016).…”
Section: Cybersecuritymentioning
confidence: 99%
“…Cyberspace is also not immune from state sovereignty claims, and states have imposed the obligation to prevent transboundary harm toward activities occurring within their sovereign territory (Buchan 2016). In terms of state responsibility, on the one hand, neighboring countries are likely to suffer in the case of environmental issues, such as water pollution, or it may take time in the long term to suffer or recover from negative consequences, such as nuclear disaster and climate change.…”
Section: Comparison Of Cyberspace and Environmentmentioning
confidence: 99%
See 2 more Smart Citations
“…According to Buchan (2016), harmful transborder cyber operations by non-state actors actually exceed those of states. 7 In the United States, there is a similar distinction between the legal treatment of symbolic political speech that is protected and that which is not based on whether or not the speech interferes with institutional processes.…”
Section: Types Of Cyber Emanationsmentioning
confidence: 99%