UNCLOS provisions on transit passage provide good model for international agreements governing military activity in cyberspace
When navigating Cyberspace international straits, users behave much like ships and aircraft engaged in transit passage: they proceed without delay, in the normal mode of continuous and expeditious transit, and refrain from any threat or use of force against the national Cyberspace through which their communication is routed. The nature of telecommunications means Cyber Forces transit Cyberspace almost instantaneously and without delay except as limited by system bandwidth during periods of peak demand. The high speed of transmission is valuable to the commander as well as the State through which the Cyber Force is transmitted. The combination of speed and volume of Internet traffic means most States have limited capability to intercept and monitor Cyberspace communications. This limited ability to intercept and monitor traffic through Cyberspace is important to maintaining the neutrality of states that are mere intermediaries in information warfare, as in our opening scenario, because the transited State is unlikely to be aware of the transmission.
In summary, transit passage provides the commander two major advantages over innocent passage: forces may transit in their normal mode of operation42 and bordering States may not suspend the right of transit passage through international straits. When applied to Cyberspace the proscription against suspending transit passage is a strong argument for applying the UNCLOS III by analogy to Cyberspace. While governments, corporations and private organizations may choose to suspend access to their internal Cyberspace for various reasons, as global economies become more dependent on the international telecommunications infrastructure it is unlikely that States could or would entirely close national Cyberspace. Even if a State tried to close national Cyberspace it would have little effect on the ability to transfer CNA packets through international Cyberspace because if intermediate routers are not available the packet will be automatically rerouted. Finally, if a belligerent State, like State A in the opening scenario, were to specifically route a CNA through the Cyberspace of a neutral intermediate state that act alone would be insufficient to violate the neutrality of the transited State if the Cyberspace transit passage analogy is used.
Quicktabs: Evidence
Arguments
Related argument(s) where this quote is used.
-
The Internet poses legal challenges similar to those encountered in maintaining order in the use of the world's oceans. UNCLOS, which imposes law and order in the seas, entered into force based on "the notion that all problems of ocean space are closely related and needed to be addressed as a whole."" Similarly, the Internet is shared globally and the consequences of actions taken by an Internet user in one jurisdiction can be borne globally.
Keywords:Related Quotes:- Legal challenges posed by cybercrime similar to those posed by maritime piracy
- International community should follow example set by UNCLOS and establish governing regime to combat cybercrime
- A cybercrime treaty that established universal jurisdiction over crimes and an international tribunal could help deter cybercrimes
- Creating an international tribunal for cybercrime based on UNCLOS model would help deter and resolve cybercrime
- UNCLOS navigational freedom provisions provides good model for regulating cyberspace
- UNCLOS provisions on transit passage provide good model for international agreements governing military activity in cyberspace
Parent Arguments: