Identifying the scope of the applicable international law rules towards malicious cyber activities against space assets

研究成果: Conference article

抄録

This article studies five category of malicious cyber activities against space assets in order to assess to what extent the existing international telecommunications law and space law address them and identify which rules are lacking to effectively solve such incidents. Five category of such activities include to jam, hijack, hack, spoof, and rob the control of telemetry, tracking and control (T&C) of a satellite, a kind of anti-satellite (ASAT). More specifically, he following five cases are studied: (i) Iranian intentional jamming of the Eutelsat satellite solved in the ITU/RRB; (ii)a terrorist organization, Liberation Tigers of Tamil Eelam hijacking an Intelsat-12 satellite solved by diplomatic negotiations between the Sri Lankan and US Governments using law enforcement under ITU regime; (iii) allegedly Chinese hacking of US NOAA's information systems; (iv) Iranian spoofing of the NPT/GPS signals to guide a US/CIA's RQ-170 UAV into the Iranian territory; and (v) allegedly Chinese taking control of US NASA's Landsat-7. Tentative conclusions are that it can be said that international telecommunication laws including those under the ITU provide necessary legal mechanisms on which reasonable solutions is attained when “harmful interference� is conducted by a nongovernmental entity. To better solve the conflicts between States in this regard, emerging space law norms relating to TCBM and the pursuit of the consultation in case of the “potentially harmful interference� may help. The remaining and thorny issues include that cases (iii), (iv) and (v) which need careful examinations of the UN treaties on outer space including Articles VI and IX of the Outer Space Treaty, and customary international law of responsibility.

元の言語English
ジャーナルProceedings of the International Astronautical Congress, IAC
2018-October
出版物ステータスPublished - 2018 1 1
イベント69th International Astronautical Congress: #InvolvingEveryone, IAC 2018 - Bremen, Germany
継続期間: 2018 10 12018 10 5

Fingerprint

international law
International law
space law
Satellites
International cooperation
air piracy
Telecommunication
telecommunication
outer space treaty
Landsat 7
interference
jamming
telemetry
information systems
Jamming
Law enforcement
Telemetering
Unmanned aerial vehicles (UAV)
law enforcement
norms

ASJC Scopus subject areas

  • Aerospace Engineering
  • Astronomy and Astrophysics
  • Space and Planetary Science

これを引用

@article{58fa2238d16b4457aeec9f45b42a3bd9,
title = "Identifying the scope of the applicable international law rules towards malicious cyber activities against space assets",
abstract = "This article studies five category of malicious cyber activities against space assets in order to assess to what extent the existing international telecommunications law and space law address them and identify which rules are lacking to effectively solve such incidents. Five category of such activities include to jam, hijack, hack, spoof, and rob the control of telemetry, tracking and control (T&C) of a satellite, a kind of anti-satellite (ASAT). More specifically, he following five cases are studied: (i) Iranian intentional jamming of the Eutelsat satellite solved in the ITU/RRB; (ii)a terrorist organization, Liberation Tigers of Tamil Eelam hijacking an Intelsat-12 satellite solved by diplomatic negotiations between the Sri Lankan and US Governments using law enforcement under ITU regime; (iii) allegedly Chinese hacking of US NOAA's information systems; (iv) Iranian spoofing of the NPT/GPS signals to guide a US/CIA's RQ-170 UAV into the Iranian territory; and (v) allegedly Chinese taking control of US NASA's Landsat-7. Tentative conclusions are that it can be said that international telecommunication laws including those under the ITU provide necessary legal mechanisms on which reasonable solutions is attained when {\^a}€œharmful interference{\^a}€� is conducted by a nongovernmental entity. To better solve the conflicts between States in this regard, emerging space law norms relating to TCBM and the pursuit of the consultation in case of the {\^a}€œpotentially harmful interference{\^a}€� may help. The remaining and thorny issues include that cases (iii), (iv) and (v) which need careful examinations of the UN treaties on outer space including Articles VI and IX of the Outer Space Treaty, and customary international law of responsibility.",
author = "Setsuko Aoki",
year = "2018",
month = "1",
day = "1",
language = "English",
volume = "2018-October",
journal = "Proceedings of the International Astronautical Congress, IAC",
issn = "0074-1795",
publisher = "International Astronautical Federation, IAF",

}

TY - JOUR

T1 - Identifying the scope of the applicable international law rules towards malicious cyber activities against space assets

AU - Aoki, Setsuko

PY - 2018/1/1

Y1 - 2018/1/1

N2 - This article studies five category of malicious cyber activities against space assets in order to assess to what extent the existing international telecommunications law and space law address them and identify which rules are lacking to effectively solve such incidents. Five category of such activities include to jam, hijack, hack, spoof, and rob the control of telemetry, tracking and control (T&C) of a satellite, a kind of anti-satellite (ASAT). More specifically, he following five cases are studied: (i) Iranian intentional jamming of the Eutelsat satellite solved in the ITU/RRB; (ii)a terrorist organization, Liberation Tigers of Tamil Eelam hijacking an Intelsat-12 satellite solved by diplomatic negotiations between the Sri Lankan and US Governments using law enforcement under ITU regime; (iii) allegedly Chinese hacking of US NOAA's information systems; (iv) Iranian spoofing of the NPT/GPS signals to guide a US/CIA's RQ-170 UAV into the Iranian territory; and (v) allegedly Chinese taking control of US NASA's Landsat-7. Tentative conclusions are that it can be said that international telecommunication laws including those under the ITU provide necessary legal mechanisms on which reasonable solutions is attained when “harmful interference� is conducted by a nongovernmental entity. To better solve the conflicts between States in this regard, emerging space law norms relating to TCBM and the pursuit of the consultation in case of the “potentially harmful interference� may help. The remaining and thorny issues include that cases (iii), (iv) and (v) which need careful examinations of the UN treaties on outer space including Articles VI and IX of the Outer Space Treaty, and customary international law of responsibility.

AB - This article studies five category of malicious cyber activities against space assets in order to assess to what extent the existing international telecommunications law and space law address them and identify which rules are lacking to effectively solve such incidents. Five category of such activities include to jam, hijack, hack, spoof, and rob the control of telemetry, tracking and control (T&C) of a satellite, a kind of anti-satellite (ASAT). More specifically, he following five cases are studied: (i) Iranian intentional jamming of the Eutelsat satellite solved in the ITU/RRB; (ii)a terrorist organization, Liberation Tigers of Tamil Eelam hijacking an Intelsat-12 satellite solved by diplomatic negotiations between the Sri Lankan and US Governments using law enforcement under ITU regime; (iii) allegedly Chinese hacking of US NOAA's information systems; (iv) Iranian spoofing of the NPT/GPS signals to guide a US/CIA's RQ-170 UAV into the Iranian territory; and (v) allegedly Chinese taking control of US NASA's Landsat-7. Tentative conclusions are that it can be said that international telecommunication laws including those under the ITU provide necessary legal mechanisms on which reasonable solutions is attained when “harmful interference� is conducted by a nongovernmental entity. To better solve the conflicts between States in this regard, emerging space law norms relating to TCBM and the pursuit of the consultation in case of the “potentially harmful interference� may help. The remaining and thorny issues include that cases (iii), (iv) and (v) which need careful examinations of the UN treaties on outer space including Articles VI and IX of the Outer Space Treaty, and customary international law of responsibility.

UR - http://www.scopus.com/inward/record.url?scp=85065327404&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85065327404&partnerID=8YFLogxK

M3 - Conference article

AN - SCOPUS:85065327404

VL - 2018-October

JO - Proceedings of the International Astronautical Congress, IAC

JF - Proceedings of the International Astronautical Congress, IAC

SN - 0074-1795

ER -