美国网络空间政策国际法研究
The United States’ Cyberspace Policy under International Law
-
摘要:美国的网络空间政策主要体现在军方和政府的文件上,从最早的1993年白宫发布的关于发展信息基础设施的12864号行政命令至今,已有近20年的时间。政府文件主要来自白宫,自始至终强调对关键基础设施的发展与保护,基本不涉及国际法;军方文件来自国防部、陆军、海军、空军、军法官参考文献等,这些文件虽不同程度地提及国际法,但流于表面。美国的网络空间政策经历了一个长期演化的过程,采取了4种策略,呈现出4个特点。2011年5月白宫发布的《网络空间国际战略》最终明确了美国将采取激进的网络空间政策,即网络空间的某些行为将导致美国在现实世界中使用武力,这对现有的国际法和国际法律秩序构成严重挑战,不仅会扩展领土和主权概念,延伸使用武力的含义,进一步滥用自卫权;而且使国际社会更难以接受侵略的定义,使国际法的中立制度形同虚设,挑战了国际法的责任制度,破坏了战争法的基石。Abstract:The United States' cyberspace policy is mainly reflected in the documents from the government and the military. It has been almost 20 years since Executive Order 12864 of 1993 related to the development of the National Information Infrastructure was promulgated. Most government documents on cyberspace were issued by the White House, which barely touched upon international law. Their military counterparts range from documents from Department of Defense, the Army, the Navy and the Air Force to judge advocates' references. Although these military documents did mention about international law, in-depth analysis were scarce. The United States' cyberspace policy has experienced a long-term evolving process during which four tactics were employed and four characteristics were formed. International Strategy for Cyberspace, issued by the White House in May 2012, finally made it clear that the United States would adopt a radical cyberspace policy via connecting certain acts in cyberspace with using force in the real world. It will pose grave challenges to international law and international legal order for not only would the traditional concepts of territory and sovereignty be overthrew and the meaning of using force be expanded, but also the right to self-defense would be further abused and the international society be more reluctant to accept the definition of aggression. Moreover, the neutral institution in international law would be nullified, the responsibility settings in international law would be challenged, and the foundation of law of war would be destroyed.
-
[1] Encyclopedia Britannica. Britannica concise encyclopedia[M]. Chicago:Encyclopedia Britannica, Inc., 2006:761. [2] Stephanie Carvin.The US department of defense law of war manual:an update[C]//Schmitt M N. Yearbook of International Humanitarian Law 2010. The Hague:T.M.C. Asser Press, 2011:359. [3] 梁西. 国际法(修订第2版)[M]. 武汉:武汉大学出版社, 2000. [4] Matthew C Waxmant. Cyber-attacks and the use of force:back to the future of article 2(4)[J]. Yale Journal of International Law, 2011(2):427-430. [5] Todd C Huntley. Controlling the use of force in cyber space:the application of the law of armed conflict during a time of fundamental change in the nature of warfare[J]. Naval Law Review, 2010(1):39. [6] Daniel B Silver. Computer network attack as a use of force under article 2(4) of the United Nations charter[J]. International Law Studies Series, US Naval War College, 2002(76):92. [7] 王铁崖. 国际法(第1版)[M]. 北京:法律出版社, 2002:121. [8] Miriam Sapiro. Iraq:the shifting sands of preemptive self-defense[J]. American Journal of International Law, 2003(3):599-606. [9] 王秀梅. 论侵略罪[J]. 法学家, 2002(2):39-44. [10] 王秀梅. 侵略罪定义及侵略罪管辖的先决条件问题[J]. 西安政治学院学报, 2012(3):102-112. [11] Davis Brown. A Proposal for an International Convention to Regulate the Use of Information Systems in Armed Conflict[J]. Harvard International Law Journal, 2006(1):179-221. [12] 红十字国际委员会. 国际人道法中直接参加敌对行动定义的解释性指南(中文版)[M/EB].(2009-11-06)[2013-01-21]. htttp://www.icrc.org/chi/resources/documents/publication/p0990.htm. [13] William Gibson. Neuromancer[M]. New York:Ace Books, 2000:51. [14] .pdf.
计量
- 文章访问数:613
- HTML全文浏览量:1
- PDF下载量:1317
- 被引次数:0