Cybersecurity and International Criminal Law
More details
Hide details
MA Student at the Eötvös Loránd University Faculty of Law
Publication date: 2022-07-02
Cybersecurity and Law 2022;7(1):110–129
In this paper I thoroughly discuss the possibility of committing crimes which would fall under the Rome Statute, with regards to the very notion of cybersecurity. I conclude that we need extensively empirical research and solution to many aspects pointed out in my paper. First, we need to find an acceptable definition of cybersecurity to work with this process, and in order to understand the world and possibilities it creates for us. Furthermore, the 1998 Rome Statute needs an update, because the world of the internet creates opportunities never seen before, and the international case law is unable to cope with such distinct acts. Therefore, I believe that we need to find the next „Nuremberg Trials”, the next generational solution to a world and crimes never seen before. We need the theoretical and legal revolution which did come after the World World II, and after the ICTY, ICTR and Sierra Leone ad hoc Courts. I truly hope that this short and hence mashup summarizing paper is just an indicator of papers and conferences to come, with solutions and more and more ideas on how we solve these two phased problems, namely having to find 1. An ultimate definition for cybersecurity 2. Having a solution of how to interpret it to the classical notion of International Criminal Law. if we conclude that we are unable to handle this issue, I suggest to create a panel on international or V4 level on either the reorganization of customary international criminal law under the Rome Statute or on the ever-changing definition of cybersecurity.
Baldwin D.A., The Concept of Security, „Review of International Studies” 1997, vol. 23.
Benenson Z., Gassmann F., Landwirth R., Unpacking spear phishing susceptibility [in:] Financial Cryptography and Data Security (Lecture Notes in Computer Science), eds. M. Brenner et al., New York, NY 2017.
Canongia C., Mandarino R., Cybersecurity: The New Challenge of the Information Society. In Crisis Management: Concepts, Methodologies, Tools and Applications, Hershey, PA 2014.
Cavelty M.D., Cyber-Security [in:] The Routledge Handbook of New Security Studies, ed. J.P. Burgess, London 2010.
Chang F.R., Guest Editor’s Column, „The Next Wave” 2012, vol. 19, no. 4.
Chantler K., Gangoli G., Hester M., Forced marriage in the UK: Religious, cultural, economic or state violence?, „Critical Social Policy” 2009, vol. 29, no. 4.
Clark R.S., Crimes Against Humanity at Nuremberg [in:] The Nuremberg Trial and International Law, eds. G. Ginsburgs, V.N. Kudriavtsev, Dordrecht–Boston 1990.
Clark R.S., The Mental Element in International Criminal Law: The Rome Statute of the International Criminal Court and the Elements of Offences’, „Criminal Law Forum” 2001, no. 3.
Clarke K.M., Affective Justice: The International Criminal Court and the Pan-Africanist Pushback, Durham 2019.
Cook K. et al., A Theory of Organizational Response to Regulation: The Case of Hos-pitals, „Academy of Management Review” 1983, no. 8.
Craenig D., Diakun-Thibault N., Purse R., Defining Cybersecurity, „Technology Innovation Management Review” 2014, no. 4. dhs.gov./topic/critical.infrastuctrure-security [access: 20.12.2021].
Dormann K., Elements of war crimes under the Rome statute of the International criminal court: sources and commentary, Cambridge 2003.
Emergency Management Vocabulary, „Terminology Bulletin” 2014, no. 281, http://www.bt-tb.tpsgcpwgsc.gc... [access:15.01.2022].
Fang B., Define cyberspace security, „Chinese Journal Network Information Security” 2018, vol. 4, no. 1.
Fang B., The definitions of fundamental concepts [in:] Cyberspace Sovereignty, New York, NY 2018.
Hasle H. et al., Measuring resistance to social engineering [in:] Information Security Practice and Experience (Lecture Notes in Computer Science), Berlin 2005.
Heller K., The Rome Statute of the International Criminal Court [in:] The Handbook of Comparative Criminal Law, eds. K. Heller, M. Dubber, Redwood City 2010.
Kemmerer R.A., Cybersecurity [in:] Proceedings of the 25th IEEE International Conference on Software Engineering, 2003, http://dx.doi.org/10.1109/ICSE... [access: 25.01.2022].
Ldsmith J., Cybersecurity Treaties. A Skeptical View, Hoover Institution Future Challenges Essays, 2011, http://media.hoover.org/sites/... [access: 15.02.2022].
Lewis J.A., Cybersecurity and Critical Infrastructure Protection, Washington, DC 2006.
Litwak R.S., King M., Arms Control in Cyberspace?, Wilson Briefs, Wilson Center Digital Futures Project, 2015, https://www.wilsoncenter.org/p... [access: 15.01.2022].
Mettraux G., International Crimes and the Ad Hoc Tribunals, Oxford 2006.
Overview of Cybersecurity. Recommendation ITU-T X.1205, Geneva 2009.
Oxford Online Dictionary, Oxford 2014, http://www.oxforddictionaries.... [access: 10.12.2021].
Petrovic D., Ethnic Cleansing – an Attempt at Methodology, „European Journal of International Law” 1994, vol. 5.
Schmitt M.N., Vihul L., The Nature of International Law Cyber Norms, „Tallinn Paper” 2014, no. 5.
USA und China wollen Vertrag zur Begrenzung von Cyberangriffen’, Heise.de, September 20, 2015, https://www.heise.de/security/... [access: 15.01.2022].
Workman S., The Dynamics of Bureaucracy in the U.S. Government: How Congress and Federal Agencies Process Information and Solve Problems, New York 2015.
Workman S., Shafran J., Bark T., Problem Definition and Information Provision by Federal Bureaucrats, „Cognitive Systems Research” 2017, vol. 43.
Ziolkowski K., General Principles of International Law as Applicable in Cyberspace [in:] Peacetime Regime for State Activities in Cyberspace. International Law, International Relations and Diplomacy, ed. K. Ziolkowski, Tallinn 2013.