Skip to main content

Cyberspace and Innocent Passage: Regulations for the Security of the Coastal State

  • Conference paper
  • First Online:
Developments and Advances in Defense and Security (MICRADS 2020)

Abstract

This research identifies the actors, interests, and situations involved in the development of cybernetic operations that can affect the peace, good order, and security of the coastal State in its territorial sea. Particularly, special emphasis is placed on the right of innocent passage of foreign ships navigating in such space. Each of the activities of this legal concept is studied in order to determine whether or not the passage complies with the condition of innocence and its close relationship with the use of cyberspace for such purposes. Fifteen interests and their implications for security are recorded and analyzed from the perspective of cyberspace. The study concludes that in the absence of an international regime for the governance of cyberspace and the legal obsolescence of customary international law to regulate activities related to innocent passage, it recommends that States should empower themselves with laws and regulations to ensure their security in cyberspace.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ocon, A.L., Gastaldi, S.: Ciberespacio y Defensa Nacional: Una Reflexión Sobre El Dilema Libertad-Seguridad En El Ejercicio De La Soberanía 1, p. 89. Revista Científica de la UNDEF (2019)

    Google Scholar 

  2. Dalbello, M.: Digital convergence: the past in the present. In: Spence Richards, P., et al. (eds.) A History of Modern Librarianship: Constructing the Heritage of Western Cultures. Libraries Unlimited Ed., California (2015)

    Google Scholar 

  3. Valeriano, B., Jensen, B., Maness, R.: Cyber Strategy. The Evolving Character of Power and Coercion. Oxford University Press, Oxford (2018)

    Google Scholar 

  4. Zekos, G.I.: State cyberspace jurisdiction and personal cyberspace jurisdiction. Int. J. Law Inform. Technol. 15, 1 (2007)

    Google Scholar 

  5. Ottis, R., Lorents, P.: Cyberspace: definition and implications. In: Proceedings of the 5th International Conference on Information Warfare and Security, pp. 267–270. Academic Publishing Limited (2010)

    Google Scholar 

  6. Joyanes, L.: Cibersociedad, Los retos sociales ante un nuevo mundo digital. Ed. McGraw-Hill (1997)

    Google Scholar 

  7. Nye, J.S.: Cyber Power, p. 94. Belfer Center for Science and International Affairs, Cambridge (2010)

    Google Scholar 

  8. U.S. Cyber Comand: Beyond the Build: Delivering Outcomes Through Cyberspace. Maryland. https://www.hsdl.org/?view&did=787006 (2015). último acceso 2019/12/11

  9. Organización Marítima Internacional: Directrices sobre ciberseguridad a bordo de los buques, MSC 96/4/1. London. Homepage: http://www.imo.org (2016). último acceso 2019/12/11

  10. Organización Marítima Internacional: Guidelines on Maritime Cyber Risk Managment. MSC-FAL 1/Circ.3. OMI, London. Homepage: http://www.imo.org (2017). último acceso 2019/12/11

  11. Organización Marítima Internacional: Directrices del sector sobre ciberseguridad a bordo de los buques (versión 3). MSC 101/4/1. London. Homepage: http://www.imo.org (2019). último acceso 2019/12/11

  12. Robles Carrillo, M.: El ciberespacio: Presupuestos para su ordenación jurídico-internacional, en Revista Chilena de Derecho y Ciencia Política, 7 que cita a RYAN et al. (2010): “International Cyberlaw: A Normative Approach”. Georget. J. Int. Law 42(2010–2011), 1161–1197 (2016)

    Google Scholar 

  13. Satola, D., Judy, H.: Towards a dynamic approach to enhancing international cooperation and collaboration in cybersecurity legal frameworks: reflections on the proceedings of the workshop on cybersecurity legal issues at the 2010 United Nations internet governance forum. William Mitchell Law Rev. 37(4), 1744–1804 (2010)

    Google Scholar 

  14. Hakapää, M., Molenaar, E.J.: Innocent passage: past and present. Mar. Policy 23(2), 131–145 (1999). https://doi.org/10.1016/S0308-597X(98)00032-3

    Article  Google Scholar 

  15. UIT, Rec. UIT-T X.1205: Sector de Normalización de las Telecomunicaciones de la UIT (04/2008). Serie X: Redes de Datos, Comunicaciones de Sistemas Abiertos y Seguridad. Seguridad en el ciberespacio—Ciberseguridad. Aspectos generales de la ciberseguridad. Ginebra-Suiza (2009)

    Google Scholar 

  16. Bejarano, M.J.C.: Alcance y ámbito de la seguridad nacional en el ciberespacio. Cuadernos estrateg. 149, 47–82 (2011)

    Google Scholar 

  17. Raboin, B.: Corresponding evolution: international law and the emergence of cyber warfare. J. Natl. Assoc. Adm. Law Judic. 31, 2 (2011)

    Google Scholar 

  18. Llorens, M.P.: Los desafíos del uso de la fuerza en el ciberespacio. Anu. mex. der. int. 17, 785–816 (2017)

    Google Scholar 

  19. Kanuck, S.: Sovereign discourse on cyber conflict under international law. Texas Law Rev. 88, 1571–1597 (2010)

    Google Scholar 

  20. Shackelford, S.J.: From nuclear war to net war: analogizing cyber attacks in international law. Berkeley J. Int. Law 27(1), 193–251 (2009)

    Google Scholar 

  21. Vergara, M.D.A.: Ciberataques: La influencia del individuo como actor no estatal en riesgo a la seguridad nacional. Rev. Chil. Relac. Int. 3(55) (2019). ISSN 0719-8256

    Google Scholar 

  22. Schmitt, M.N. (ed.): Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge University Press (2013)

    Google Scholar 

  23. Ferrer, J.A.: Incidencia de la ciberguerra en las operaciones navales. In: Cuadernos de pensamiento naval: Suplemento de la revista general de marina, no. 15, pp. 87–102 (2013)

    Google Scholar 

  24. Loredo González, J.A., Ramírez Granados, A.: Delitos informáticos: su clasificación y una visión general de las medidas de acción para combatirlo. Celerinet, 44–51 (2013)

    Google Scholar 

  25. Domínguez, J.: La ciberguerra como realidad posible contemplada desde la prospectiva. Rev. Pensamiento Estratég. Seguridad CISDE 1(1), 18–32 (2016)

    Google Scholar 

  26. Schmitt, M.N.: Cyber operations and the jus ad bellum revisited. Villanova Law Rev. 56, 578–581 (2011)

    Google Scholar 

  27. Jensen, E.T.: Cyber sovereignty: the way ahead. Texas Int. Law J. 50(2), 275–304 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fabián Ramírez-Cabrales .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ramírez-Cabrales, F., Machado Jiménez, J.A. (2020). Cyberspace and Innocent Passage: Regulations for the Security of the Coastal State. In: Rocha, Á., Paredes-Calderón, M., Guarda, T. (eds) Developments and Advances in Defense and Security. MICRADS 2020. Smart Innovation, Systems and Technologies, vol 181. Springer, Singapore. https://doi.org/10.1007/978-981-15-4875-8_2

Download citation

Publish with us

Policies and ethics