Abstract
Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the Shanghai Cooperation Organisation to identify strengths and weaknesses of such international cooperation, and how Cyber Peacekeeping could fill current gaps relating to cyber conflict response.
References
Akatyev, N., & James, J. I. (2015). Cyber Peacekeeping. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 157, pp. 126–139). http://doi.org/10.1007/978-3-319-25512-5_10
Albert, E. (2009, March). The Shanghai Cooperation Organization. Retrieved September 15, 2016, from http://www.cfr.org/china/shanghai-cooperation-organization/p10883
Amnesty International. (2016, March). Syrian and Russian forces targeting hospitals as a strategy of war. Retrieved September 15, 2016, from https://www.amnesty.org/en/press-releases/2016/03/syrian-and-russian-forces-targeting-hospitals-as-a-strategy-of-war/
Co-Chairs’ Summary Report. (2012) (p. ASEAN Regional Forum). Hoi An, Quang Nam, Viet Nam: ASEAN Regional Forum. Retrieved from http://aseanregionalforum.asean.org/files/library/ARF Chairman%27s Statements and Reports/The Nineteenth ASEAN Regional Forum, 2011-2012/10 - Co-Chairs Summary Report - ARF Workshop on Proxy Actors in Cyberspace, Quang Nam.pdf
Das, S. K., Kant, K., & Zhang, N. (2012). Handbook on securing cyber-physical critical infrastructure. Elsevier. Retrieved from https://books.google.co.kr/books?hl=en&lr=&id=MftTeQivgA0C&oi=fnd&pg=PP1&dq=Handbook+on+Securing+Cyber-Physical+Critical+Infrastructure&ots=btXJyS5P37&sig=evhxiS3RLF4bZd5OXxvgImspQ_g
Denning, D. E. (2008). The ethics of cyber conflict. In K. E. Himma & H. T. Tavani (Eds.), The handbook of information and computer ethics (pp. 407–428). Wiley. Retrieved from https://books.google.co.kr/books?hl=en&lr=&id=ZC7SDyPZUMoC&oi=fnd&pg=PA407&dq=victims+of+cyber+conflict&ots=lcfZIdxY72&sig=FwXaBLmrMCzxTwpKGasbGhVli0k
Eom, J. H., Kim, N. U., Kim, S. H., & Chung, T. M. (2012). Cyber military strategy for cyberspace superiority in cyber warfare (pp. 295–299). http://doi.org/10.1109/CyberSec.2012.6246114
Erskine, T., & Carr, M. (2016). Beyond “Quasi-Norms”: The Challenges and Potential of Engaging with Norms in Cyberspace. In A.-M. Osula & H. Rõigas (Eds.). Tallinn: NATO CCD COE Publications.
European Council. Convention on Cybercrime, Current (2001). Budapest. Retrieved from https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185
Farrell, H. (2015). Promoting Norms for Cyberspace. Cyber Brief. Council on Foreign Relations Press.
Farwell, J. P. (2014). The Media Strategy of ISIS. Survival, 56(6), 49–55. http://doi.org/10.1080/00396338.2014.985436
Gjelten, T. (2013). FIRST STRIKE: US Cyber Warriors Seize the Offensive. World Affairs, 175(5), 33–43. Retrieved from http://www.jstor.org/stable/43554737
Godwin III, J. B., Kulpin, A., Rauscher, K. F., & Yaschenko, V. (2014). Critical Terminology Foundations 2. EastWest Institute and the Information Security Institute at the Moscow State University. Retrieved from https://www.eastwest.ngo/idea/critical-terminology-foundations-2
Goldman, D. (2016, February). Twitter goes to war against ISIS. Retrieved September 16, 2016, from http://money.cnn.com/2016/02/05/technology/twitter-terrorists-isis/index.html
Gordon, K., & Dion, M. (2008). Protection of Critical Infrastructure and the role of investment policies relating to national security. Investment Division, Directorate for Financial and Enterprise Affairs, Organisation for Economic Co-operation and Development,, Paris (Vol. 75116). Paris, France. Retrieved from https://www.oecd.org/daf/inv/investment-policy/40700392.pdf
Hua, X. (2016, May). China, U.S. discuss int’l norms of state behavior in cyberspace. Retrieved September 15, 2016, from http://news.xinhuanet.com/english/2016-05/12/c_135354264.htm
IMPACT- International Multilateral Partnership Against Cyber Threats. (2016). Retrieved September 15, 2016, from http://www.impact-alliance.org/home/index.html
Information Security Doctrine of the Russian Federation. (2000). Russian Federation. Retrieved from http://archive.mid.ru//bdomp/ns-osndoc.nsf/1e5f0de28fe77fdcc32575d900298676/2deaa9ee15ddd24bc32575d9002c442b!OpenDocument
INTERPOL. (2016). Retrieved September 15, 2016, from http://www.interpol.int/
James, J. I. (2013). An Argument for Assumed Extra-territorial Consent During Cybercrime Investigations. VFAC Review, (25), 7–8. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.711.6146&rep=rep1&type=pdf
Kaljurand, M. (2015, December). International Norms in Cyberspace: A Discussion with Minister Marina Kaljurand. Center for Strategic and International Studies 1616 Rhode Island Avenue, NW Washington, DC 20036. Retrieved from https://www.csis.org/events/international-norms-cyberspace-discussion-minister-marina-kaljurand
Karatzogianni, A. (2013). A cyberconflict analysis of the 2011 Arab Spring. In G. Youngs (Ed.), Digital world: Connectivity, creativity and rights (p. 159). Routledge. Retrieved from https://www.routledge.com/Digital-World-Connectivity-Creativity-and-Rights/Youngs/p/book/9780415839082
Korzak, E. (2015, September). The 2015 GGE Report: What Next for Norms in Cyberspace? Retrieved September 15, 2016, from https://www.lawfareblog.com/2015-gge-report-what-next-norms-cyberspace
Langner, R. (2011). Stuxnet: Dissecting a Cyberwarfare Weapon. IEEE Security Privacy, 9(3), 49–51. http://doi.org/10.1109/MSP.2011.67
Lee, B. (2016). The Impact of Cyber Capabilities in the Syrian Civil War. Small Wars Journal.
Levin, A., Goodrick, P., & Ilkina, D. (2014). Securing cyberspace: a comparative review of strategies worldwide. Montreal, Canada: Canadian IT Law Association. Retrieved from http://www.it-can.ca/wp-content/uploads/conf2014/Securing_Cyberspace-Levin.pdf
Norms of Behaviour for Cyberspace. (2014, June). Retrieved September 15, 2016, from https://www.ccdcoe.org/norms-behaviour-cyberspace
O’Connell. (2016, January). Google Joins The Fight Against ISIS. Retrieved from https://hacked.com/google-joins-fight-isis/
OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security. (2002). Organization for Economic Co-Operation and Development. Retrieved from https://www.oecd.org/sti/ieconomy/15582260.pdf
Osula, A.-M., & Rõigas, H. (2016). International cyber norms: legal, policy & industry perspectives. NATO Cooperative Cyber Defence Centre of Excellence. Retrieved from https://ccdcoe.org/sites/default/files/multimedia/pdf/InternationalCyberNorms_full_book.pdf
Principles of UN peacekeeping. (2008). Retrieved September 15, 2016, from http://www.un.org/en/peacekeeping/operations/principles.shtml
Reed, T. (2007). At the Abyss: An Insider’s History of the Cold War. Random House Publishing Group. Retrieved from https://books.google.co.kr/books?id=69Vvboox1JcC
Schmitt, M. N. (2013). Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press. Retrieved from https://books.google.co.kr/books?hl=en&lr=&id=FujYDXdOMQgC&oi=fnd&pg=PR1&dq=Tallinn+Manual+on+the+International+Law+Applicable+to+Cyber+Warfare&ots=M1uSBsT3Nu&sig=jwHYrfUIWFhlCl3iZd-q09QzAwM
Schmitt, M. N., & Vihul, L. (2014). The Nature of International Law Cyber Norms. Rochester, NY. Retrieved from http://papers.ssrn.com/abstract=2543520
Segal, A. (2011, March). Cyberspace Governance: The Next Step. Council on Foreign Relations Press. Retrieved from http://www.cfr.org/cybersecurity/cyberspace-governance-next-step/p24397
Solce, N. (2008). Battlefield of Cyberspace: The Inevitable New Military Branch-The Cyber Force, The. Alb. LJ Sci. & Tech., 18, 293. Retrieved from http://heinonlinebackup.com/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/albnyst18§ion=11
United Nations. (2008). United Nations Peacekeeping Operations Principles and Guidelines. United Nations Department of Peacekeeping Operations. Retrieved from http://www.un.org/en/peacekeeping/documents/capstone_eng.pdf
United Nations. (2015a). Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. Retrieved from http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174
United Nations. (2015b, January). Letter dated 9 January 2015 from the Permanent Representatives of China, Kazakhstan, Kyrgyzstan, the Russian Federation, Tajikistan and Uzbekistan to the United Nations addressed to the Secretary-General. Retrieved from https://ccdcoe.org/sites/default/files/documents/UN-150113-CodeOfConduct.pdf
United Nations. (2016). Digital Blue Helmets. Retrieved September 15, 2016, from https://unite.un.org/digitalbluehelmets/
United States White House. (2011). International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World. White House. Retrieved from https://www.whitehouse.gov/sites/default/files/rss_viewer/international_strategy_for_cyberspace.pdf
Watts, S. (2015). Cyber Law Development and the United States Law of War Manual. NATO Cooperative Cyber Defence Centre of Excellence, International Cyber Norms Development (Anna-Maria Osula Ed., Forthcoming). Retrieved from http://ssrn.com/abstract=2650784
Recommended Citation
Akatyev, Nikolay and James, Joshua I.
(2017)
"Legislative Requirements for Cyber Peacekeeping,"
Journal of Digital Forensics, Security and Law: Vol. 12
, Article 4.
DOI: https://doi.org/10.15394/jdfsl.2017.1447
Available at:
https://commons.erau.edu/jdfsl/vol12/iss3/4
Included in
Computer Law Commons, Criminology and Criminal Justice Commons, Forensic Science and Technology Commons, Information Security Commons, Jurisdiction Commons, Law and Politics Commons, Law and Society Commons, Military, War, and Peace Commons, National Security Law Commons, Other International and Area Studies Commons, Privacy Law Commons, Science and Technology Law Commons, Transnational Law Commons