Argentina requires a statement on international law´s application in cyberspace: Why?

Authors

  • María Pilar Llorens

Keywords:

international law, cyberspace, statement of international law, Argentina

Abstract

On-going debates about the applicability of international law to cyberspace tend to focus on how legal rules and principles apply in this domain. For the last couple of years a growing number of Statements on International Law’s Application in Cyberspace (SILACs) has been released. In these documents States share their view regarding this topic. However, this is not the case for Argentina. The country has not laid out its position concerning this matter. In this paper it is argued that Argentina should release a SILAC.  This document should analyse and systematise the country’s views on some of these issues. Consequently, the paper examines in the first place the scope and the content of a SILAC. Then drawing from various official documents it lays out the Argentine position regarding the applicability of international law to cyberspace. Finally, the paper advances the content that an Argentine SILAC should cover.

Downloads

Download data is not yet available.

References

AKANDE, Dapo; COCO, Antonio; DE SOUZA DIAS, Talita; HOLLIS, Duncan B.; O'BRIEN, James y VAN BENTHEM, Tseveletina. (02 06 2021). “The Oxford Statement on International Law Protections in Cyberspace: The Regulation of Information Operations and Activities”, EJIL:Talk! Disponible en https://www.ejiltalk.org/the-oxford-statement-on-international-law-protections-in-cyberspace-the-regulation-of-information-operations-and-activities/

ALEMANIA, THE FEDERAL GOVERNMENT (2021). “On the Application of International Law in Cyberspace Position Paper”. Disponible en Disponible en https://www.auswaertiges-amt.de/blob/2446304/32e7b2498e10b74fb17204c54665bdf0/on-the-application-of-international-law-in-cyberspace-data.pdf

ARGENTINA (2017). “Creación del Comité de Ciberseguridad”. Decreto 577/2017.

ARGENTINA (2019a) “Estrategia Nacional de Ciberseguridad”. Jefatura del Gabinete de Ministros. Resolución 829/2019.

ARGENTINA (2019b). “Jefatura del Gabinete de Ministros. Resolución 1523/2019.

ARGENTINA (2020). “Initial ´Pre-draft´ of the report of the OEWG on developments in the field of information and telecommunications in the context of international security”. Comentarios ARGENTINA. Disponible en https://front.un-arm.org/wp-content/uploads/2020/04/oewg-ict-comentarios-argentina-2.pdf

ARGENTINA, MISIÓN PERMANENTE DE LA REPÚBLICA ARGENTINA ANTE LAS NACIONES UNIDAS (2019). “Evaluación general de los temas relacionados con la seguridad de la información”. Disponible en https://unoda-web.s3.amazonaws.com/wp-content/uploads/2019/09/Argentina-2019.pdf

ARGENTINA, MISIÓN PERMANENTE DE LA REPÚBLICA ARGENTINA ANTE LAS NACIONES UNIDAS (2020). “Arria Formula – UN Security Council. Cyber Stability, Conflict Prevention and Capacity Building”. New York, 22 May 2020. Permanent Mission of Argentina - Written contribution. Disponible en https://vm.ee/sites/default/files/Estonia_for_UN/formula_arria_csun_-_ciberseguridad_y_capacitacion_-_intervencion_escrita_argentina.pdf

ARITMASU, Louise y SCHMITT, Michael N. (2021). “The Plea of Necessity: An Oft Overlooked Response Option to Hostile Cyber Operations”, International Law Studies. 97. 1171-1199.

ASAMBLEA GENERAL DE LAS NACIONES UNIDAS, Documento A/68/98, Informe del Grupo de Expertos Gubernamentales sobre los Avances en la Información y las Telecomunicaciones en el Contexto de la Seguridad Internacional (23 de junio de 2013).

ASAMBLEA GENERAL DE LAS NACIONES UNIDAS, Documento A/70/174, Informe final del Grupo de Expertos Gubernamentales sobre los Avances en la Información y las Telecomunicaciones en el Contexto de la Seguridad Internacional (22 de julio de 2015).

ASAMBLEA GENERAL DE LAS NACIONES UNIDAS, Documento A/76/135, Informe del Grupo de Expertos Gubernamentales sobre la Promoción del Comportamiento Responsable de los Estados en el Ciberespacio en el Contexto de la Seguridad Internacional (14 de julio de 2021).

ASAMBLEA GENERAL DE LAS NACIONES UNIDAS, Documento A/76/136, Compendio oficial de las contribuciones nacionales voluntarias sobre la cuestión de cómo se aplica el derecho internacional al uso de las tecnologías de la información y las comunicaciones por los Estados, presentadas por los expertos gubernamentales participantes en el Grupo de Expertos Gubernamentales sobre la Promoción del Comportamiento Responsable de los Estados en el Ciberespacio en el Contexto de la Seguridad Internacional, establecido en virtud de la resolución 73/266 de la Asamblea General (13 de julio de 2021).

ASAMBLEA GENERAL, Resolución 73/266, Promoción del comportamiento responsable de los Estados en el ciberespacio en el contexto de la seguridad internaciona (22 de diciembre de 2018)

AUSTRALIA, DEPARTMENT OF FOREIGN AFFAIRS AND TRADE (2021). Australia’s International Cyber and Critical Technology Engagement Strategy. Disponible en https://www.internationalcybertech.gov.au/sites/default/files/2021-05/21066%20DFAT%20Cyber%20Affairs%20Strategy%202021%20update%20Internals%201%20Acc.pdf

BANKS, William. (2019). “State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0”, Texas Law Review, 95 (7), 1487-1513.

BANNELIERE-CHRISTAKIS, Karine. (2015). “Is the principle of distinction relevent in cyberwarefare?”, en TSAGOURIAS, Nicholas y BUCHAN, Rusell (ed.), Research Handbook of International Law and Cyberspace. Gloucestershire: Edward Eldgar Publishing.

CORFU CHANNEL CASE (U.K. v. Alb.), Merits, 1949 I.C.J. Rep. 4 (April 9).

CORN, Gary P. y TAYLOR, Robert. (2017). Sovereignty in the Age of Cyber. AJIL Unbound, 111, 207-212.

DELERUE, François. (2019). “Attribution to State of Cyber Operations Conducted by Non-State Actors”, en CARPANELLI, Elena y LAZZERINI, Nicole (eds.). Use and Misuse of New Technologies: Contemporary Challenges under International and European Law. Berlin: Springer.

DELERUE, François. (2020). Cyber Operations and International Law. Cambridge: Cambridge University Press.

ECKART, Christian. (2012). Promises of States under International Law. Oxford: Hart Publishing.

EGAN, BRIAN J., LEGAL ADVISOR (2016, 10 Noviembre 2016). “Remarks on International Law and Stability in Cyberspace”. Disponible en https://2009-2017.state.gov/s/l/releases/remarks/264303.htm

EICHENSEHR, Kristen. I. (2014). “The Cyber-Law of Nations”, The Georgetown Law Journal, 103, 317-380.

FANG, Bixing. (2018). Cyberspace Sovereignty. Reflections on Building a Community of Common Future in Cyberspace. Beijing: Springer.

FINLANDIA, MINISTRY OF FOREIGN AFFAIRS (2020). “International Law and Cyberspace. Finland's Nationals Positions”. Disponible en https://valtioneuvosto.fi/en/-/finland-published-its-positions-on-public-international-law-in-cyberspace

FINLAY, Lorraine y PAYNE, Christian (2019). “The Attribution Problem and Cyber Armed Attacks”, AJIL Unbound, 113, 202-206.

FITZMAURICE, Malgosia (2017). “Legitimacy of International Environmental Law. The Sovereign States Overwhelmed by Obligations: Responsibility to React to Problems Beyond National Jurisdiction?”, Zeitschrift für ausländisches öffentliches Recht und Völkerrecht, 77, 339-370.

FRANCIA, MINISTÈRE DES ARMÉES (2019). “International Law Applied to Operations in Cyberspace”. Disponible en https://www.defense.gouv.fr/content/download/567648/9770527/file/international+law+applied+to+operations+in+cyberspace.pdf

GRUPO DE TRABAJO DE COMPOSICIÓN ABIERTA (2020) (02:15:00-02:17:33). Intervención argentina: Second substantive session (10–14 February 2020). Disponible en: https://media.un.org/en/asset/k18/k18w6jq6eg

GUTIÉRREZ ESPADA, Cesáreo (2002). “Las Contramedidas de Estados ´´erceros´´ por Violación a Ciertas Obligaciones Internacionales, Anuario Argentino de Derecho Internacional, XI (2000-2001), 15-49.

HOLLIS, Duncan B. (27 07 2016) ‘Russia and the DNC Hack: What Future for a Duty of Non-intervention?, Opinio Juris. Disponible en https://opiniojuris.org/2016/07/25/russia-and-the-dnc-hack-a-violation-of-the-duty-of-non-intervention/

HOLLIS, Duncan B. (RELATOR ESPECIAL) (2020). “Derecho Internacional y Operaciones Cibernéticas del Estado: Mejora de la Transparencia - Quinto Informe” (CJI/doc. 615/20 rev. 1).

HUESA VINAIXA, Rosario (2008). “Auge y Declive de las ´Contramedidas Colectivas´ en la Construcción de un Sistema de Responsabilidad Internacional, en HUESA VINAIXA, Rosario (ed.), Derechos humanos, responsabilidad internacional y seguridad colectiva. Intersección de sistemas. Estudios en homenaje al profesor Eloy Ruiloba Santana. Madrid: Marcial Pons

IRÁN, GENERAL STAFF OF THE ARMED FORCES (2020). “Declaration of General Staff of the Armed Forces of the Islamic Republic of Iran Regarding International Law Applicable to the Cyberspace”. Disponible en https://www.aldiplomasy.com/en/?p=20901

JENSEN, Eric T., y WATTS, Sean (2017). “A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destabilizer?”, Texas Law Review, 95 (7), 1555-1577.

JOHANSON, Sarah. (2021). “Definitional doom: How Iran and Israel derail legal application in cyberspace”. Disponible en https://www.mei.edu/publications/definitional-doom-how-iran-and-israel-derail-legal-application-cyberspace.

KALJULAID, KERSTI, PRESIDENTE DE ESTONIA (2019, 29 Mayo 2019). “President of the Republic at the opening of CyCon 2019”. Disponible en https://www.president.ee/en/official-duties/speeches/15241-president-of-the-republic-at-the-opening-of-cycon-2019/index.html

KOH, HAROLD H., LEGAL ADVISOR U.S. DEPARMENT OF STATE (2012, 18 Septiembre 2012). “International Law and Cyberspace”. Disponible en https://2009-2017.state.gov/s/l/releases/remarks/197924.htm

KOLB, Robert (2015). “Reflections on Due Diligence Duties and Cyberspace”, German Yearbook of International Law Studies, 58, 113-128.

KOSSEFF, Jeff (2020a). “Collective Countermeasures in Cyberspace”, Notre Dame Journal of International & Comparative Law, 10, 18-34.

KOSSEFF, Jeff. (2020b), “Retorsion as a Response to Ongoing Malign Cyber Operations” en JANČÁRKOVÁ; LINDSTRÖM; SIGNORETTI; TOLGA y VISKY (eds.), 2020 12th International Conference on Cyber Conflict. 20/20 Vision: The Next Decade. NATO CCDCOE Publications.

LAHMANN, Henning (2020). Unilateral Remedies to Cyber Operations: Self-Defence, Countermeasures, Necessity, and the Question of Attribution. Cambridge: Cambridge University Press.

LLORENS, María Pilar (2021). “Ciberespacio y Derecho Internacional”, Anuario del Centro de Investigaciones Jurídicas y Sociales, 19, 383-402.

MAČÁK, Kubo (2016). “Decoding Article 8 of International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors”, Journal of Conflict and Security Law, 21 (3), 405-428.

MARTÍNEZ PUÑAL, Antonio (2013). Actos Unilaterales, Promesa, Silencio y Nomegénesis en el Derecho Internacional (2º reimpresión). Santiago de Compostela: Andavira.

MILITARY AND PARAMILITARY ACTIVITIES IN AND AGAINST NICARAGUA (Nicar. v. U.S.), Merits, 1986 I.C.J. Rep. 14 (June, 27).

MOYNIHAN, Harriet (2019). “The Application of International Law to State Cyberattacks. Sovereignty and Non-Intervention”, Research Paper, Chatham House, The Royal Institute of International Affairs.

NUEVA ZELANDIA, FOREIGN AFFAIRS & TRADE (2020). “The Application of International Law to State Activity in Cyberspace”. Disponible en https://dpmc.govt.nz/publications/application-international-law-state-activity-cyberspace

PAÍSES BAJOS, MINISTRY OF FOREIGN AFFAIRS (2019, 5 Julio 2019). “Letter to the Parliament on the International Legal Order in Cyberspace”. Disponible en https://www.government.nl/ministries/ministry-of-foreign-affairs/documents/parliamentary-documents/2019/09/26/letter-to-the-parliament-on-the-international-legal-order-in cyberspace

REINHOLD, Stephen (2015). “Good Faith in International Law”, UCL Journal of Law and Jurisprudence, 2, 40-63.

REMIRO BROTÓNS, Antonio; RIQUELME CORTADO, Rosa M.; DÍEZ-HOCHLEITNER, RODRÍGUEZ Javier; ORIHUELA CALATAYUD, Esperanza y PÉREZ-PRAT DURBÁN, Luis (2010). Derecho Internacional. Curso General. Valencia: Tirant Lo Blanch.

REMIRO BROTÓNS, Antonio; RIQUELME CORTADO, Rosa M.; DÍEZ-HOCHLEITNER RODRÍGUEZ, Javier; ORIHUELA CALATAYUD, Esperanza y PÉREZ-PRAT DURBÁN, Luis (2007). Derecho Internacional , 2º ed. Valencia: Tirant Lo Blanch.

ROGUSKI, Przemysław (2020a). Application of International Law to Cyber Operations: A Comparative Analysis of States' Views, The Hague Program for Cyber Norms Policy Brief. March 2020.

ROGUSKI, Przemysław (2020b). “Collective Countermeasures in Cyberspace – Lex Lata, Progressive Development or a Bad Idea?”, en JANČÁRKOVÁ; LINDSTRÖM; SIGNORETTI; TOLGA y VISKY (eds.), 2020 12th International Conference on Cyber Conflict. 20/20 Vision: The Next Decade. NATO CCDCOE Publications.

ROSCINI, Marco. (2014) Cyber Operations and the Use of Force in International Law. Oxford: Oxford University Press.

SAGANEK, Przemysław. (2016). Unilateral Acts of States in Public International Law. Leiden: Brill-Nihoff.

SCHMITT, Michael N. (10 06 2021). The Sixth United Nations GGE and International Law in Cyberspace. Just Security. Disponible en https://www.justsecurity.org/76864/the-sixth-united-nations-gge-and-international-law-in-cyberspace/

SCHMITT, Michael N. (1999). Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework. Columbia Journal of Transnational Law, 37 (2), 885-937.

SCHMITT, Michael N. (2013). Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge Universtity Press.

SCHMITT, Michael N. (2015). In Defense of Due Diligence in Cyberspace. The Yale Law Journal Forum, 125, 68-81.

SCHMITT, Michael N. (2017). Tallinn Manual 2.0 on International Law Applicable to Cyber Operations . Cambridge: Cambridge University Press.

SCHMITT, Michael N. (2021). Germany’s Positions on International Law in Cyberspace, Part I. Disponible en https://www.justsecurity.org/75242/germanys-positions-on-international-law-in-cyberspace/

SCHMITT, Michael N. y Vihul, Liis. (2017). Respect for Sovereignty in Cyberspace. Texas Law Review, 95 (7), 1639-167.

SCHÖNFORD, Roy (2021). “Israel's Perspective on Key Legal and Practical Issues Concerning the Application of International Law to Cyber Operations”, International Law Studies, 97, 395-406.

SHACKELFORD, Scott. J., RUSSELL, Scott, y KUEHN, Andreas. (2015). Defining Cybersecurity Due Diligence Under International Law: Lessons from the Private Sector Kelley School of Business Research Paper. Indiana: Kelley School of Business.

STEPHENS, Tim, y FRENCH, Duncan. (2016). ILA Study Group on Due Diligence in International Law. Second Report.

SUIZA, FEDERAL DEPARTMENT OF FOREIGN AFFAIRS, DIRECTORATE OF INTERNATIONAL LAW. (2021). “Switzerland's Position Paper on the Application of International Law in Cyberspace Annex”, UN GGE 2019/2021. Disponible en https://www.eda.admin.ch/dam/eda/en/documents/aussenpolitik/voelkerrecht/20210527-Schweiz-Annex-UN-GGE-Cybersecurity-2019-2021_EN.pdf

TSAGOURIAS, Nicholas y BUCHAN, Russell. (2015). Research Handbook on International Law and Cyberspace. Cheltenham: Edward Elgar Publishing.

WOOD, Michael (Relator Especial). (2014). “Segundo Informe sobre la Identificación del Derecho Internacional Consuetudinario”, UN Doc A/CN.4/672.

WRIGHT, Jeremy QC MP, Attorney General. (2018, 23 Mayo 2018). “Cyber and International Law in the 21st Century”. Disponible en https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century

Published

2022-06-01

Issue

Section

Investigaciones