Editing Talk:Scenario 02: Cyber espionage against government departments

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.

Latest revision Your text
Line 3: Line 3:
 
Comments and questions in addition to text edits
 
Comments and questions in addition to text edits
  
The topic is an important one and the scenario is well-written. It does need to be fleshed-out somewhat in order to deepen the legal issues addressed. The legal issue of privacy rights (as part of international human rights law) was added. Corrections are in the text, comments and questions below.
+
The topic is an important one and the scenario is well-written. Believe it needs to be fleshed-out somewhat.Corrections are in the text, comments and questions below.
  
 
(1) Keyword "privacy" added because of the personnel emails being hacked and personal details published: privacy rights are implicated.
 
(1) Keyword "privacy" added because of the personnel emails being hacked and personal details published: privacy rights are implicated.
Line 11: Line 11:
 
(3) "Nobody claims responsibility for the attack immediately after the MFA's discovery of the incident and publication of the fact that it has occurred." - is the addition ok? Otherwise - why would anyone claim responsibility, if there's been no public acknowledgement?
 
(3) "Nobody claims responsibility for the attack immediately after the MFA's discovery of the incident and publication of the fact that it has occurred." - is the addition ok? Otherwise - why would anyone claim responsibility, if there's been no public acknowledgement?
  
(3)After this sentence, additional information is important to give the reader some sense of how critical the leaked information is, otherwise, perhaps not a violation of sovereignty or prohibited intervention: "However, a few days later, emails, procurement documents, and internal memos purportedly belonging to the MFA of State A are published on the Internet (incident 4)."
+
(3)
 
 
--The sentence that follows below seems to indicate that there's no coercion involved; it'd be helpful to have that specified at the first point (viz., "However, incidents 1–3 do not contain the element of coercion, because they are conducted merely with the aim to gather information, which does not compel State A to adapt the conduct of its external affairs.")
 
 
 
TRANSCLUDED TEXTS ON SOVEREIGNTY, INTERVENTION, AND CYBER ESPIONAGE
 
See comments for 01- Election interference
 
 
 
---------------
 
[[User:Reviewer331|Reviewer331]] ([[User talk:Reviewer331|talk]]) 11:57, 8 February 2019 (UTC)
 
 
 
Add a section pointing out other legal considerations/regimes that a national legad would likely need to consider:
 
(a) under the keyword/concept of privacy: national/regional data protection law
 
(b) under "sovereignty" (?) domestic/regional criminal law, legal assistance treaties
 
 
 
KEYWORDS
 
hyperlink each of the keywords, linking them to concepts
 
 
 
Sovereignty
 
Check whether publication of confidential information is violation of sovereignty.
 
 
 
OTHER CONSIDERATIONS
 
does the legal analysis cover the full range of potential violations of intl. law? if not, indicate that this is not a comprehensive list.
 

Please note that all contributions to International cyber law: interactive toolkit are considered to be released under the Creative Commons Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) (see International cyber law: interactive toolkit:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!

Cancel Editing help (opens in new window)