Talk:Scenario 09: Economic cyber espionage
09- Economic cyber espionage
The scenario is realistic, but perhaps a bit complex for those who are not familiar with the ins and outs of diplomatic law.
Comments and questions in addition to text edits:
(1) It is not clear why the operation is called at times APT, then espionage. What is the thinking behind this dual categorization – is it both? Why is this scenario an APT situation, in contrast to others?
(2) Did I get this right? "...while others are merely suspected of other activities against the interests of State A that are unrelated to the APT operation."
(3) OK to add? State B denies all of State A's allegations and, in turn, declares the same number of State A diplomats in State B as personae non gratae.
(4) Check that this is the intent: “On this ground, State B in any case only incurs responsibility under diplomatic law for the activities of the diplomat and the insider on the foreign territory, but not for its military unit conducting the cyber espionage operation from its own territory.”
> TRANSCLUDED TEXTS ON SOVEREIGNTY, INTERVENTION, AND CYBER ESPIONAGE See comments for 01-Election interference
> ALSO, IN TRANSCLUDED TEXT ON NON-STATE ACTORS
>>ADD 6th heading. When the state has failed in its due diligence obligations to prevent the NSA from acting contrary to international law or is complicit (some cites are Ruys, 2007; Lubell 2010, Lanovoy, 2017 - there are undoubtedly more scholars to cite here)
> TRANSCLUDED TEXT ON ECONOMIC CYBER ESPIONAGE
Re-emphasize at the end the exception, i.e. when the exfiltration of data and its publication results in coercion.
Reviewer331 (talk) 14:28, 8 February 2019 (UTC) EXAMPLES - consider (possibly for another scenario) this: https://www.cnbc.com/2017/11/08/chinese-theft-of-sensitive-us-military-technology-still-huge-problem.html https://www.justice.gov/opa/pr/chinese-national-pleads-guilty-conspiring-hack-us-defense-contractors-systems-steal-sensitive
POTENTIAL RULE OF ECONOMIC ESPIONAGE "Hence, the mere characterization of State B’s cyber operations as amounting to economic cyber espionage is insufficient to establish its international responsibility. For any ramifications according to the rules on sovereignty or prohibited intervention, see above." This requires more homework re: State practice - see US indictments against Chinese nationals, Sony hack