
- 312 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
While espionage between states is a practice dating back centuries, the emergence of the internet revolutionised the types and scale of intelligence activities, creating drastic new challenges for the traditional legal frameworks governing them.This book argues that cyber-espionage has come to have an uneasy status in law: it is not prohibited, because spying does not result in an internationally wrongful act, but neither is it authorised or permitted, because states are free to resist foreign cyber-espionage activities. Rather than seeking further regulation, however, governments have remained purposefully silent, leaving them free to pursue cyber-espionage themselves at the same time as they adopt measures to prevent falling victim to it.Drawing on detailed analysis of state practice and examples from sovereignty, diplomacy, human rights and economic law, this book offers a comprehensive overview of the current legal status of cyber-espionage, as well as future directions for research and policy. It is an essential resource for scholars and practitioners in international law, as well as anyone interested in the future of cyber-security.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover
- Half-Title
- Series
- Title
- Copyright
- Dedication
- Contents
- Acknowledgements
- List of abbreviations
- Part I: Introduction
- Part II: The rules connected to territorial integrity
- Part III: The rules disconnected from territorial integrity
- Conclusion to Part III
- Conclusion
- Index