The Necessity of States Cooperation in Strengthening Cyber Security

Document Type : Original Article from Result of Thesis

Authors

1 Ph.D Student in Public International Law, Department of International law, Isfahan (Khorasgan) Branch ,Islamic Azad University , Isfahan ,Iran

2 Associate Professor. Department of Law, University of Isfahan , Isfahan ,Iran

Abstract

Cyber attacks are a global problem that now pose great threats to the world security. Every day we see cyber attacks around the world in such a way that currently no part of the world is immune to these attacks. Capacities and potentials that The cyberspace has brought about human society has led countries to exploit these capacities and potentials for their own political and economic purposes that this has disrupted global cybersecurity. The only thing that can help solve this problem in the world is the cooperation of States at the international level to strengthen their cyber security. In this study , the question which arises is that What is the need for states to work together to strengthen their cyber security? Using the descriptive – analytical method , this question has been answered that because all aspect of human life has got dependent on cyber technologies and such a level of dependence leads to the abuse of some states in carrying out cyber attacks on the vital infrastructures of states , it is necessary that in order to strengthen cyber security , states should cooperate globally.

Highlights

Introduction

The computer and the Internet have been the most important inventions in human history. Cyberspace interlinks all components within the critical national infrastructure, such as communication, defense, energy, transportation, agriculture, healthcare, and economy. It facilitates actions while serving as a breeding ground for countless societal risks. Historically, governments would mainly compete on military and related technologies, which have now spread to cyberspace. Although there are several incentives for governments and individuals to conduct cyberattacks, the most significant are political and economic ones. The United States of America has polarized the world and its regions through its hegemonic policies and intimidation. Countries around the globe, including Russia, Iran, China, and North Korea, have confronted the US in cyberspace, and the regional situation is similar. For example, in the Middle East, apart from conflicts in Syria, Iraq, and Yemen, Israel and Saudi Arabia are confronting the Islamic Republic of Iran by launching cyberattacks on each other. North and South Korea have an intense rivalry and animosity on the Korean peninsula, heightening the specter of mutual cyberattacks. There are also tensions in the Indian subcontinent due to India and Pakistan's intense rivalry, which periodically target each other with cyberattacks. The United States and many Latin American countries wage cyberattacks against Venezuela in the Americas. Such a complicated and problematic international status quo portends a disastrous future for international security and peace. Using a descriptive-analytical method, this study seeks to determine the necessity of interstate cooperation in strengthening cybersecurity. The absolute dependency of life on cyber technology has resulted in state abuse in the form of cyberattacks on countries' key infrastructures. Therefore, interstate cooperation is required to strengthen international cybersecurity.

 

Methodology

This study is carried out using a descriptive-analytical approach.

 

 Findings

This study explains why governments should work together to improve cybersecurity. The first reason is the increasing adoption of computers and information technology. Given its benefits, there is a growing base of computer and information technology users. The Internet has become a part of daily life, which has become dependent on computers and the Internet's functions. All governmental and non-governmental organizations are connected to this network, and without it, the current human civilizations cannot survive. Such widespread adoption of the Internet is also dangerous to human civilization, as exhibited by the numerous cybercrimes happening worldwide. The second reason is the growing number of cyber powers in the world. A new report by Harvard University ranks the United States of America, China, Britain, Russia, the Netherlands, France, Germany, Canada, Japan, and Australia as the world's top ten cyber powers, respectively. The state of Israel is ranked 11th, the Islamic Republic of Iran is ranked 23rd, and Saudi Arabia is ranked 26th. The report suggests that the number of cyber powers worldwide is increasing daily. The third reason is the rise of cyber-attacks. The transfer of activities, businesses, and information storage to the Internet has increased Internet abuse and data theft, creating an insecure environment for information exchange. Countries tend to use cyber-attacks due to their lower cost than conventional weapons. The fourth reason is the lack of clear rules for cybersecurity. Currently, the leading international cybersecurity treaties are the 2001 Convention on Cybercrime and its 2006 Additional Protocol and the Agreement on Cooperation in Ensuring International Information Security between the Member States of the Shanghai Cooperation Organization. These two treaties are weakened by the few member states and territorial limitations. After explaining the reasons for intergovernmental cooperation, government strategies for strengthening cybersecurity have been discussed.

 

Results

The first strategy is intergovernmental cooperation, the second is a global division of labor, the third is strategic reforms to the security concept, and the fourth is to improve international liability laws.

In terms of the responsibility of governments in cyberspace, strengthening international cybersecurity calls for more attention to the international commitment of countries from whence cyberattacks originate. Governments should thus exercise due diligence against cyberattacks in an international treaty. This criterion means exercising due diligence in carrying out legal obligations and strips countries of the right to use or allow the use of their territory to damage another state’s land, property, or persons. This, and basing accountability on due diligence of source countries, will decrease the number of global cyberattacks and bolster international cybersecurity.

Keywords

Main Subjects


  1. Borqe'I, S. (2014). A Review on Cyberspace Security: Lessons for Islamic Republic of Iran. Journal of Islamic Revolution Studies, 11 (38), 85-104 (In Persian)
  2. Borrell, J. (2020). Declaration by the High Representative Josep Borrell, on behalf of the European Union, on malicious cyber activities exploiting the coronavirus pandemic,30 April 2020, https://eucyberdirect.eu
  3. Davand, M., Soltani Nejad, A. (2018). Securitization of the Islamic Republic of Iran and Saudi Arabia Cyber-Tensions; Threats and Strategic Requirements , Strategy Quarterly,27 (1), 71-98, DOI: 20.1001.1.1.0283102.1397.27.1.4.8 (In Persian)
  4. Dunn Cavelty, M. (2012). The Militarisation of Cyber Security as a Source of Global Tension ,.Center for Security Studies, 103-124
  5. Eilstrup-Sangiovanni, M. Why the World Needs an International Cyberwar Convention. Philos. Technol. 31, 379–407 (2018). https://doi.org/10.1007/s13347-017-0271-5
  6. Faghihi, M., Jalali Farahani, A.H. (2018). Review of Transnational Cyber Agreements, Deputy Minister of Infrastructure Research and Production, Office of Communication Studies and New Technologies, 1-23 (In Persian)
  7. Ghasemi, G.A., Namdar, S. (2018). Analyzing of the Concept of Self-defense in Light of Cyber Aattack (With an emphasis on Stuxnet attack on Iran's nuclear facilities) , Journal of Legal Studies, 10 (1), 199-235, DOI: 10.22099/jls.2018.23191.2178 (In Persian)
  8. Harjinder, L., Lynsay, S, Jason, N., Arnau, E., Gregory, E., Carsten, M., Xavier B. (2020). Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic, Department of Electronic and Electrical Engineering, University of Strathclyd, 1-20
  9. Jalali, M ,Tavassoli Ardakani, S. (2019). Necessity of Establishment of an International Harmonized Legal System against Crimes in Cyberspace, Public Law Studies Quarterly, 49(4), 1351-1372, DOI: 10.22059/jplsq.2019.208109.1271 (In Persian)
  10. Katanchi, E., Pour-Qahramani, B. (2021). Cyber Security Challenges in ASEAN Countries, International Studies Journal ,18(1) , 139-156, DOI: 10.22034/isj.2021.252695.1237 (In Persian)
  11. Khalilipour Rokanabadi, A. ,Nooralivand, Y. (2012). Cyber Threats and Its Impact on National Security, Strategic Studies Quarterly,15(56), 167- 196 (In Persian)
  12. Li, Y., Liu, Q. (2021). A comprehensive review study of cyber-attacks and cyber security: Emerging trends and recent developments. EnergyReports, 7, 8176–8186, DOI: https://doi.org/10.1016/j.egyr.2021.08.126
  13. Lucas, G. (2017). Ethics of cyber warfare. The quest for responsible security in the age of digital warfare, Oxford,Oxford University Press.
  14. Mukherjee, S. (2019). Implementing Cybersecurity in the Energy Sector , University of the Cumberlands (formerly Cumberland College), 1-18
  15. Rezaei, M., Babazadeh Moghadam, H. (2014). Principles of Codification for the Laws and Regulations of the Internet with the Emphasis on UNESCO and European Council Documents , The Quarterly Journal of Public Law Research, 15(42) , 43-82 (In Persian)
  16. Shahbazi, A., Aghajani Ronaghi, A. (2021). Cyber Espionage in International Law: Attribution of International Responsibility to States in a State of  Uncertainty, Quarterly Journal of Public Law Studies, 50 (4) , 1487-1503, DOI: 10.22059/jplsq.2020.274302.1912  (In Persian)
  17. Snider, K., Ryan, S., Shay, Z., Daphna, C. (2021). Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. Journal of Cybersecurity, 7 (1), 1-11
  18. Soltaninejad, A., Jamshidi, M., Mohseni, S. (2016). The Evolution of Security Concept in the Light of Globalization and New Information and Communication Technologies, World Politics, 5(2), 7-42 (In Persian)
  19. Tsakanyan, T.  (2017). The  role  of  Cybersecurity  in  World  Politics. Vestnik  RUDN. International  Relations, 17( 2), 339-348. Doi:10.22363/2313-0660-2017-17-2-339-348
  20. Vasileiou, K. G. (2019). Cyber Security in the Energy Sector a Holistic Approach, University of Piraeus, Department of International & European Studies.
  21. Voo , J., Hemani, I., Jones, S., Desombre, W., Cassidy, D., Schwarzenbach, A (2020).National Power Cyber Index 2020 Methodology and Analytical Consideration, Harvard Kennedi School Belfer Center for Science and International Affairs.
  22. Ziaei, S.Y., Shakibnejad, E. (2018). Legislation in Cyberspace from the Prospect of International Law and the Iranian Law, International Law Journal, 34(57), 227-249, DOI:10.22066/cilamag.2017.27971 (In Persian)