بررسی تطبیقی و تحلیل تعریف حمله سایبری از منظر دکترین، رویه- کشورها و سازمان های بینالمللی در حقوق بینالملل

نویسندگان

دانشگاه تهران

چکیده

چکیدهرشد فزاینده تکنولوژی در حوزه اطلاعات و ارتباطات، تهدیدهایی نیز به دنبال داشتهاست که حمله سایبری نمونه بارز چنین تهدیدی محسوب میگردد. تبعات چنین حملاتیبه حدی جدی است که بازیگران بین المللی به ویژه دولتها را جهت اتخاذ رویه هایمناسب و مواضع سیاسی-حقوقی به تکاپو واداشته است. مهم ترین چالش فراروی اینموضوع مسئله مفهوم شناسی و تعریف حمله سایبری و لزوم تبیین و تعیین دایره مفهومیاین پدیده است که در میان رویه رسمی کشورها و سازما نهای بین المللی به شدتاختلافی است، به طوری که تاکنون هیچگونه اجماعی در خصوص تعریف حمله سایبریحاصل نشده است. پژوهش حاضر با رویکردی تطبیقی به بررسی و تحلیل تعاریف ارائهشده از حمله سایبری از دیدگاه برخی کشورها و سازما نهای بی نالمللی پرداخته و درنهایت فقدان چنین اجماع حقوقی را در حقوق بین الملل به عنوان یک چالش جدیقلمداد کرده است

کلیدواژه‌ها


عنوان مقاله [English]

Comparative Review and Analysis of the Notion of CyberAttack in the Light of Doctrine, States Practice andInternational Organizations within International Law

چکیده [English]

With the growth of technology in the field of information andcommunication, some different types of threats have appeared of whichcyber attacks are the most prominent instances in cyberspace. The negativeconsequences of such attacks are so vast and dangerous that internationalactors are attempting to take appropriate measures in this era. The mostimportant challenge is the definition of ‘cyber attack’ and, also, describingits different aspects which is differentiated between the official position ofStates and also among international organizations. Up until now, noconsensus has been achieved on the definition of cyber attack. With itscomparative approach, this survey tries to provide and analyze the currentdefinitions of cyber attack. Finally, this papertakes the position that a lack ofconsensus in this regard should be considered as a major challenge toInternational Law.KeywordsCyber attack, Cyber security, Statepractice, International organizations,Information operations 

الف) فارسی
. 1. بیگزاده، ابراهیم؛ حقوق سازما نهای بینالمللی، چاپ دوم، انتشارات مجد، 1391
ب) لاتین
2. A/RES/65/41 of the General Assembly of the United Nations, 8 December 2010,
"Developments in the field of information and telecommunications in the
context of international security".
3. Agreement between the Governments of the Member States of the Shanghai Cooperation
Organization on Cooperation in the Field of International Information Security, (2008),
61ST Plenary Meeting.
4. Antolin-Jenkins, Vida, (2008), Defining the Parameters of Cyber war
Operations: Looking for Law in All the Wrong Places, 51 NAVAL L. REV.
132, 140.
5. Cartwright, Gen. James E., (2011), Memorandum for Chiefs of the Military
Services, Commanders of the Combatant Commands, Dirs. of the Joint Staff
Directories on Joint Terminology for Cyberspace Operations 5.
6. Chairman of the Joint Chiefs of Staff, Joint Doctrine for Information operations,
Available at: www. dtic. mil/ doctrine/ new-pubs/jp3-13.pdf.
7. Clarke, Richard A. & Knake, Robert K, (2010), Cyber War: The Next Threat TO
National Security and What to Do about It, 6.
8. Commentary on the HPCR, (2009), p 1. Available at:
http://ihlresearch.org/amw/Commentary%20on%20the%20HPCR%20Manual.pd
f.
9. Cooperative Cyber Defense Centre of Excellence (CCDCOE), (2008), Cyber
Attacks against Georgia: Legal Lessons Identified, PP.7-8. Available at: <
www. carlisle. army. mil /DIME/ documents/ Georgia %201%200. pdf.>
10. Duncan B. Hollis, (2007), Why States Need an International Law for
Information Operations, 11 LEWIS & CLARK L. REV. 1023, 1042.
11. Gellman, Barton, (2002),Cyber Attacks by Al Qaeda Feared; Terrorists at
Threshold of Using Internet as Tool of Bloodshed: Experts Say, WASH.
POST, June 27, at A01.
12. Gentile, Sal, (2011), Gadhafi Regime “Turns Off the Tap” on Libya’s Internet, Live
Blog: Libya Revolts, PBS, Available at: http://www.pbs.org/wnet/need-to-know/the-dailyneed/
libya-revolts-a-live-blog/7679/.
فصلنامه تحقیقات حقوقی شماره 71 بررسی تطبیقی و تحلیل تعریف حمله سایبری از منظر ...
277
13. Gjelten, Tom, (2010), Extending the Law of War to Cyberspace, NAT’L PUB.
RADIO. Available at:
http://www.npr.org/templates/story/story.php?storyId=130023318 (last visited
Apr. 18, 2012).
14. Gjelten, Tom, Seeing the Internet as an ‘Information Weapon,’ NAT’L PUB. RADIO.
Available at: http://www.npr.org/templates/story/story.php?storyId=130052701.
15. Hughes, Rex B., (2011), NATO and Cyber Defense: Mission Accomplished?,
ATLANTISCH PERSPECTIEF. Available at:
http://www.atlcom.nl/site/english/nieuws/wp-content/Hughes.pdf.
16. Jeffrey Carr, (2011), Inside Cyber Warfare, 2nd Edition, O’Reilly Media, Inc,
Sebastopol, CA, 2011.
17. Kuehl, D.T, (2001), Information Operations, Information Warfare, and
Computer Network Attack-Their Relationship to National Security in the
Information Age, in: Schmitt/O'Donnell (eds), Computer Network Attack and
International Law, 2001, pp 44-45.
18. Libicki, Martin, (1996), What is Information Warfare?,Center for Advanced
Concepts and Technology Institute for National Strategic Studies, Third Edition, p
77.
19. Resolution 20 November 2000, A/RES/55/29 of the General Assembly of the
United Nations, "Role of science and technology in the context of international
security and disarmament".
20. Resolution 21 December 2009, A/RES/64/211 of the General Assembly of the
United Nations, "Creation of a global culture of cyber security and taking
stock of national efforts to protect critical information infrastructures".
21. Richtel, Matt, (2011), Egypt Halts Most Internet and Cell Service, and Scale of
Shutdown Surprises Experts, N.Y. TIME, at A13.
22. Russia’s Draft Convention on International Information Security – A Commentary, (2012),
Published by Conflict Studies Research Centre and Institute of Information Security Issues
Moscow State University.
23. Schmitt, M.N, (1998-1999), Computer Network Attack and the Use of Force
in International Law: Thoughts on a Normative Framework, Colum. J.
Transnat'l L.37 PP 890-891.
24. Silver, D.B, (2001), Computer Network Attack as a use of Force Under
Article 2(4) of the United Nations Charter, in: Schmitt/O'Donnell (eds),
Computer Network Attack and International Law, P 76.
25. Tadić, (1995), Decision on the Defense Motion for Interlocutory Appeal, 2
October, Paras. 120 & 124 (regarding chemical weapons).
فصلنامه تحقیقات حقوقی شماره 71 بررسی تطبیقی و تحلیل تعریف حمله سایبری از منظر ...
278
26. TALLINN MANUAL ON THE INTERNATIONAL LAW APPLICABLE
TO CYBER WARFARE, (2013), Prepared by the International Group of
Experts at the Invitation of The NATO Cooperative Cyber Defence Centre of
Excellence, Cambridge University Press.
27. United States Department of Defense (DoD), (2006)The National Military
Strategy for Cyberspace Operations. Available at:
<www.dod.gov/pubs/foi/ojcs/07-F- 2105doc1.pdf. last accessed 17 July 2009.
28. Watts, S., (2010), Combatant Status and Computer Network Attack, Va.J.Int'l
L.50 P 400.