حقوق بین‌الملل ارتباطات در نظرگاه راهنمای تالین 2

نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشجوی دکتری حقوق بین الملل، دانشکده حقوق و ‌علوم سیاسی، دانشگاه تهران، تهران، ایران.

2 استاد، گروه حقوق، دانشکده علوم انسانی، دانشگاه بوعلی سینا، همدان، ایران.

10.22084/qjpla.2025.30423.1012

چکیده

 فضای سایبر به جنبه‌ای ضروری در صنعت ارتباطات تبدیل شده است که ناشی از وابستگی فزاینده به زیرساخت‌های دیجیتال و رشد تصاعدی ترافیک داده‌ها است. با اینحال، با ظهور فناوری‌هایی مانند 5G، اینترنت اشیاء و رایانش ابری، سطح حمله به این زیرساخت‌ها گسترش یافته است و چالش‌ها و آسیب‌پذیری‌های جدیدی را به‌وجود آورده که نیازمند پروتکل‌های امنیتی پیچیده است. از سوی دیگر، خلأ اسناد معاهداتی و حقوق بین‌المللی عرفی در عرصه‌ی فضای سایبر بسیار مشهود است. البته باید خاطرنشان نمود که فقدان قواعد خاص به این معنا نیست که دولت‌ها می‌توانند بدون محدودیت اقدام به عملیات سایبری نمایند و هرچند حقوق عرفی و معاهداتی موجود به‌صراحت درخصوص عملیات سایبری قاعده‌ای ندارد، اما به کمک ابزارهای تفسیر می‌توان قواعد موجود را به عملیات سایبری نیز تعمیم داد. از اینرو در فقدان اجماع جهانی درباره اعمال قواعد بین‌المللی بر عملیات سایبری و کمبود رویه یکپارچه در میان دولت‌ها، راهنمای تالین 2 به‌عنوان یکی از تلاش‌های مهم در راستای قاعده‌مندسازی فضای سایبر شناخته می‌شود. این سند، حقوق بین‌الملل قابل اعمال بر عملیات‌های سایبری را مورد بررسی قرار داده و تلاش می‌کند چارچوبی حقوقی برای مدیریت چالش‌های موجود در این حوزه ارائه دهد. این راهنما در یازدهمین فصل خود، در قالب چهار قاعده، نکات و ملاحظاتی پیرامون حقوق بین‌الملل ارتباطات بیان می‌نماید. لذا در پژوهش حاضر با استفاده از روش توصیفی-تحلیلی و بهره‌گیری از منابع کتابخانه‌ای، سعی شده است مواضع راهنمای تالین 2 را در ارتباط با حقوق بین‌الملل ارتباطات مورد بررسی و مداقه قرار دهد

کلیدواژه‌ها


عنوان مقاله [English]

International Telecommunication Law in the Perspective of the Tallinn Manual 2.0

نویسندگان [English]

  • Kian Biglarbeigi 1
  • Sattar Azizi 2
1 Ph.D. Student in International Law, Faculty of Law and Political Science, Tehran University, Tehran, Iran.
2 Prof., Department of Law, Faculty of Humanities, Bu-Ali Sina University, Hamedan, Iran.
چکیده [English]

 Cyberspace has become an essential aspect of the telecommunication industry due to the increasing reliance on digital infrastructure and the exponential growth of data traffic. However, with the emergence of technologies such as 5G, the Internet of Things (IoT), and cloud computing, the attack surface of these infrastructures has expanded, introducing new challenges and vulnerabilities that necessitate complex security protocols. On the other hand, the lack of treaty documents and customary international law in the realm of cyberspace is highly noticeable. It should be noted, however, that the absence of specific rules does not imply that states are free to conduct cyber operations without restrictions. Although existing customary and treaty laws do not explicitly regulate cyber operations, through interpretative tools, existing rules can be extended to include cyber operations. Thus, in the absence of global consensus on the application of international rules to cyber operations and the lack of uniform practices among states, the Tallinn Manual 2.0 is recognized as one of the significant efforts toward regulating cyberspace. This document examines the international law applicable to cyber operations and seeks to provide a legal framework for managing the challenges in this domain. In its eleventh chapter, the manual addresses international telecommunication law through four rules, offering related observations and considerations. Therefore, this research, using a descriptive-analytical method and relying on library resources, seeks to examine and analyze the positions of the Tallinn Manual 2.0 regarding international telecommunication law.

کلیدواژه‌ها [English]

  • Cyberspace
  • International Telecommunication Law
  • Cyber Communications
  • Harmful Interference
  • Tallinn Manual 2.0
[ 1]اصلانی، جبار و رنجبریان، امیرحسین (1394). «بررسی تطبیقی و تحلیل تعریف حمله سایبری از منظر دکترین، رویه کشورها و سازمان‌های بین‌المللی در حقوق بین‌الملل». فصلنامه تحقیقات حقوقی دانشگاه شهید بهشتی. 18 (71): 257-278.
[2]بیگزاده، ابراهیم ( 1400). حقوق سازمان‌های بین‌المللی. چاپ هشتم. تهران: انتشارات مجد.
[3] بیگلربیگی، کیان (1402). حملات سایبری و نقض اصل عدم مداخله. پایان‌نامه کارشناسی ارشد حقوق بین‌الملل. به راهنمایی ابراهیم
بیگزاده. تهران: دانشگاه شهید بهشتی، دانشکده حقوق، تاریخ دفاع 1402/06/19.
[4] Additional Protocol Concerning the Criminalization of Acts of a Racist and Xenophobic Nature Committed through Computer System, (2003). Retrieved November 17, 2024 from https://rm.coe.int/168008160f
[5] Adel, A., Sarwar, D. & Hosseinian-Far, A. (2021). Transformation of Cybersecurity Posture in IT Telecommunication: A Case Study of a Telecom Operator, In book: Cybersecurity, Privacy and Freedom Protection in the Connected World, Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London.
[6] Arthur, Charles. (2011). Egypt blocks social media websites in attempted clampdown on unrest, The Guardian. Retrieved January 12, 2025 from https:// www.theguardian.com/world/2011/jan/26/egypt-blockssocial-media-websites
[7] Circular Letter from François Rancy, Director, Radiocommunication Bureau, to Administrations of Member States of the ITU, (2016). CR/389. Retrieved January 14, 2025 from https://www.itu.int/en/ITU-R/conferences/ RRB/Documents/ai%204_1_compendium%20to%20be%20published%20as%20special%20topics_English.docx
[8] Consolidated Version of General Conditions Office of Communications (UK) (‘Ofcom General Conditions’) (2015). Retrieved January 12, 2025 from https://www.ofcom.org.uk/siteassets/resources/documents/phonestelecoms-and-internet/information-for-industry/generalauthorisationregime/consolidated_version_of_general_ conditions_as_at_28_may_20151.pdf?v=335358
[9] Convention on Cybercrime (Budapest Convention), (2001). Council of Europe, European Treaty Series – No. 185., Entered into Force on 1 July 2004. Retrieved November 17, 2024 from https://rm.coe.int/1680081561
[10] Directive 2002/58/EC of the European Parliament and of the Council Concerning the Processing of Personal Data and the Protection of Privacy in the Electronic Communications Sector (amended by Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006, and Directive 2009/136/EC of the European Parliament and of the Council of 25 November 2009). Retrieved January 12, 2025 from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32002L0058
[11] Ezeigweneme, C.A., Umoh, A.A., Ilojianya, V.I., & Oluwatoyin, A. (2023). “Telecom project management: Lessons learned and best practices: A review from Africa to the USA”, World Journal of Advanced Research and Reviews, 20(03), pp. 1713-1730.
[12] Folorunsho, S. O., Adenekan, O. A., Ezeigweneme, C., Somadina, I. C., & Okeleke, P. T. (2024). “Ensuring Cybersecurity in telecommunications: Strategies to protect digital infrastructure and sensitive data”, Computer Science & IT Research Journal, 5(8), pp. 1855-1883.
[13] General Agreement on Trade in Services, Annex on Telecommunications. (1994). Retrieved January 12, 2025 from https://www.wto.org/english/docs_e/legal_e/26-gats.pdf
[14] Giles, K., & Hartmann, K. (2021). “Adversary Targeting of Civilian Telecommunications Infrastructure”, 13th International Conference on Cyber Conflict (CyCon), pp. 133-150.
[15] Hill, R. (2015). Dealing with Cyber Security Threats: International Cooperation, ITU and WCIT, in Maybaum, M., Osula, A.M, and Lindström L. (Eds.), Proceedings of the7th International Conference on Cyber Conflict: Architectures in Cyberspace, 2015, NATO CCDCOE Publications.
[16] International Group of Experts at the Invitation of the NATO Cooperative Cyber Defence Center of Excellence. (2017). Tallinn Manual 2.0 On The International Law Applicable To Cyber Operation, Cambridge University Press.
[17] International Radiotelegraph Convention. (1906). Retrieved January 13, 2025 from https://www.itu.int/en/ history/Pages/RadioConferences.aspx?conf=4.36
[18] International Radiotelegraph Convention. (1927). Retrieved January 13, 2025 from https://history.state. gov/historicaldocuments/frus1927v01/d235
[19] International Telecommunication Convention. (1932). Retrieved January 13, 2025 from https://www.itu.int/en/history/Pages/PlenipotentiaryConferences.aspx?conf=4.5
[20] International Telecommunication Convention. (1973). Retrieved January 13, 2025 from https://treaties.un.org/pages/showDetails.aspx?objid=08000002800e18c9 [21] ITU Constitution, Annex, No. 1012. Retrieved January 12, 2025 from https://www.itu.int/en/council/Documents/ basic-texts/Constitution-E.pdf
[22] ITU Constitution. Retrieved January 12, 2025 from https://www.itu.int/en/council/Documents/basic-texts/Constitution-E.pdf
[23] ITU International Telecommunication Regulations. (1988). Retrieved January 12, 2025 from https://www.itu.int/dms_pub/itu-t/oth/3f/01/t3f010000010001pdfe.pdf
[24] ITU International Telecommunication Regulations. (2012). Retrieved January 12, 2025 from https://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf
[25] ITU Radio Regulations. (2024). Retrieved January 12, 2025 from https://www.itu.int/pub/R-REG-RR
[26] Kaur, R., Gabrijelčič, D., & Klobučar, T. (2023). “Artificial intelligence for cybersecurity: Literature review and future research directions”. Information Fusion, 97(101804), pp. 1-29.
[27] Lin, H. S. (2010). “Offensive Cyber Operations and the Use of Force”, Journal of National Security Law & Policy, 4(63), pp. 63-86.
[28] Manukonda, K. R. R. (2019). “Cyber Attack on Telecommunications Company”, European Journal of Advances in Engineering and Technology, 6(12), pp.113-120.
[29] Naughton, J. (2016). “The evolution of the Internet: from military experiment to General Purpose Technology”, Journal of Cyber Policy, (1), pp. 5-28.
[30] Okafor, E. S., Akinrinola, O., Usman, F. O., Amoo, O. O., & Ochuba, N. A. (2024). “Cybersecurity analytics in protecting satellite telecommunications networks: a conceptual development of current trends, challenges, and strategic responses”, International Journal of Applied Research in Social Sciences, 6(3), pp. 254-266.
[31] Oleg, S. (2022). “Analysis of conditions and factors affecting cyber security in the special purpose information and telecommunication system”, Technology audit and production reserves, 4 (2/66), pp. 25-28.
[32] Privalov, A., Lukicheva, V., Kotenko, I., & Saenko, I. (2020). “Increasing the Sensitivity of the Method of Early Detection of Cyber-Attacks in Telecommunication Networks Based on Traffic Analysis by Extreme Filtering”, Energies, 13(11), 2774, pp. 1-18
[33] Roscini, M. (2014). Cyber Operations and the Use of Force in International Law. Oxford University Press.
[34] Sadiku, M. N. O., Adekunte, P. A., & Sadiku. J. O. (2024). “Cybersecurity in Telecommunications”, International Journal of Trend in Scientific Research and Development, 8(6), pp. 493-502.
[35] Sadiku, M. N. O., Tembely, M., & Musa, S. M. (2016). “Smart grid cybersecurity”, Journal of Multidisciplinary Engineering Science and Technology, 3(9), pp. 5574-5576.
[36] Shoetan, P.A.,Amoo, O. O., Okafor, E. S., & Olorunfemi, O. L. (2024). “Synthesizing Ai’s impact on cybersecurity in telecommunications: a conceptual framework”, Computer Science & IT Research Journal, 5(3), pp. 594-605.
[37] Singh, K., Kapoor, R. (2023). “Robotic Process Automation and Security Operations in Telecommunications: Addressing Cyber Threats and Vulnerabilities”, MZ Computing Journal, 4(1). pp. 1-7.
[38] Stockburger, P. Z. (2016). “Known Unknowns: State Cyber Operations, Cyber Warfare, and the Jus Ad Bellum”, American University International Law Review, 31(4), pp. 544-591.
[39] The Prosecutor v. Ferdinand Nahimana, Jean-Bosco Barayagwiza, Hassan Ngeze, Case No. ICTR-99-52-T, judgment and sentence, (2003). Retrieved January 12, 2025 from https://www.refworld.org/jurisprudence/caselaw/ictr/2003/en/91852
[40] Twain, M. W., Morrison, J. L. & Scott, W. F. (2023). “Assessing the Effectiveness of Cybersecurity Measures in the United States Telecommunications Industry: A Comprehensive Analysis”, Journal of Marketing and Communication, 6(1), pp. 1-10.
[41] United States Department of Defense, JP 6-01, Joint Electromagnetic Spectrum Management Operations, (2012). Retrieved January 13, 2025 from https://www.govinfo.gov/content/pkg/GOVPUB-D5-PURLgpo29176/pdf/GOVPUB-D5-PURL-gpo29176.pdf
[42] Vaseashta, A., Susmann, F., & Braman, E. (2014). Cyber Security and Resiliency Policy Framework, IOS Press.
[43] Wallace, W., & Visger, M. (2018). “ Responding to the Call for a Digital Geneva Convention: An Open Letter to Brad Smith and the Technology Community”, Journal of Law & Cyber Warfare, 6(2), pp. 3-55.
[44] Woltag, J. C. (2015). Cyber Warfare, Max Planck Encyclopedias of International Law.