Operations in Cyberspace vs Human Rights and Freedoms
- Institution: Akademia Sztuki Wojennej (Poland)
- ORCID: https://orcid.org/0000-0003-0188-5704
- Published online: 10 November 2022
- Final submission: 17 October 2022
- Printed issue: September 2023
- Source: Show
- Page no: 14
- DOI Address: https://doi.org/10.15804/ppsy202263
- PDF: ppsy/51/ppsy202263.pdf
The dynamic civilisation transformations observed worldwide in recent years have arisen from the rapid development of information and the ICTs that support it. Cyberspace is a new sphere affected by these processes, and it evolves alongside the threats occurring therein. Nowadays, no country’s cyberspace is entirely secure. Cyber threats are characterised by unpredictability and global reach. In modern times, cyberspace is a symbol of development, the freedom of speech, and the right to privacy and every interference in the behaviours of its users is associated with an attack on these values. The article discusses the fundamental problems concerning operations in cyberspace justified by the violation of human rights but should also be assessed in the context of interference with the scope of individual rights and freedoms, including in times of seemingly normal functioning, namely in times of peace.
REFERENCES:
- Brenner, S. (2011). In R. D. Clifford (Ed.), The Investigation, Prosecution and Defence of a Computer-related Crime (pp. 17–20). Carolina Academic Press.
- Centre för rättvisa v. Sweden. (2021). 35252/08, Judgment of the ECHR of 25 May 2021.
- Chałubińska-Jentkiewicz, K., & Nowikowska, M. (2020). Bezpieczeństwo, prywatność, tożsamość – aspekty prawne. C.H. Beck Publishing House.
- Chałubińska-Jentkiewicz, K., & Nowikowska, M. (2021a). Ochrona danych osobowych w cyberprzestrzeni. War Studies University Publishing House.
- Chałubińska-Jentkiewicz, K., & Nowikowska, M. (2021b). Ochrona informacji w cyberprzestrzeni. War Studies University Publishing House.
- Chałubińska-Jentkiewicz, K., & Nowikowska, M. (2021c). Security v. Privacy – Legal Aspects. Institute for Local Self-Government Maribor.
- Chałubińska-Jentkiewicz, K., Nowikowska, M., & Taczkowska-Olszewska, J. (2019). Retencja, migracja i przepływy danych w cyberprzestrzeni. Ochrona danych osobowych w systemie bezpieczeństwa państwa. C.H. Beck.
- Clapper v. Amnesty. (2013). Int'l USA, 568 U.S. 398.
- Clough, J. (2013). Principles of cybercrime. New York.
- Cusumano, E., & Corbe, M. (Eds.) (2018). A civil-military response to hybrid threats. The Hague.
- Gajdus, G., & Gronowska, B. (1994). Stosowanie podsłuchu telefonicznego w ocenie Europejskiej Komisji i Europejskiego Trybunału Praw Człowieka (Refleksje na tle rozwiązań polskich). Palestra, 11.
- Goitein, E., & Patel, F. (2015). What Went Wrong with the FISA Court. brennancenter.org
- Grabosky, P. (2006). Electronic crime. New Jersey.
- Klamberg, M. (2021, June 1). Mały Brat, bardziej niebezpieczny brat: Centrum för Rättvisa przeciwko Szwecji. VerfBlog. https://verfassungsblog.de/raettvisa. DOI: 10.17176/20210601-123800-0
- Ohlin, J. D., Govern, K., & Finkelstein, C. (2015). Law and ethics for virtual conflicts. Oxford University Press.
- Roguski, P. (2020a). Australia: Strategia zaangażowania w cyberprzestrzeni. In Application of International Law to Cyber Operations: A Comparative Analysis of States’ Views. The Hague Program for Cyber Norms Policy Brief.
- Roguski, P. (2020b). ITC p. 1949.4, 22.62 Doc. A/70/174, par. 13(3). In Application of International Law to Cyber Operations: A Comparative Analysis of States’ Views. The Hague Program for Cyber Norms Policy Brief.
- Roguski, P. (2020c). USA: Egan Speech. In Application of International Law to Cyber Operations: A Comparative Analysis of States' Views. The Hague Program for Cyber Norms Policy Brief.
- Seffers, G. I. (1998, November). Joint Chiefs Inaugurate Information Combat Era. Defence News, 9–15.
- Spinello, R. A. (2017). Morality and law in cyberspace. Boston.
- Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations. (2017). Cambridge University Press.
- The Constitution of the Republic of Poland of 2 April 1997. (1997). Journal of Laws No. 78, item 483, as amended.
- Tzu, S. (1971). The Art of War. Oxford University Press.
- UN General Assembly. (2013). The Report of the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, June 242013, Doc. A/68/98 (hereunder referred to as “The UN GGE Report 2013”).
- UN General Assembly. (2015). The Report of the UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, July 222015, 2015, Doc. A/70/174 (hereunder referred to as “The UN GGE Report 2015”).
- UN General Assembly. (2018a). Advancing responsible State behaviour in cyberspace in the context of international security, Resolution of December 5, 2018, Doc. A/RES/73/27.
- UN General Assembly. (2018b). Advancing responsible State behaviour in cyberspace in the context of international security, Resolution of December 22, 2018, Doc. A/RES/73/266.
- (1947). Charter of the United Nations, Statute of the International Court of Justice and the Agreement on Interim Arrangements establishing the Preparatory Commission of the United Nations, Journal of Laws 1947 No. 23, item 90.
cyberspace information operations in cyberspace cyber-attack the right to privacy disinformation information war operational actions