Jump to ContentJump to Main Navigation
Show Summary Details
More options …

Baltic Journal of Law & Politics

A Journal of Vytautas Magnus University

2 Issues per year


CiteScore 2016: 0.13

SCImago Journal Rank (SJR) 2015: 0.102
Source Normalized Impact per Paper (SNIP) 2015: 0.276

Open Access
Online
ISSN
2029-0454
See all formats and pricing
More options …

Hostes Humani Generis: Cyberspace, the Sea, and Sovereign Control

LL.M. student Julija Kalpokienė
  • Corresponding author
  • School of Law, University of Nottingham (United Kingdom), Law and Social Sciences Building, University Park, Nottingham NG7 2RD, United Kingdom
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Ignas Kalpokas Ph.D student
  • Corresponding author
  • School of Politics and International Relations, University of Nottingham (United Kingdom), Law and Social Sciences Building, University Park, Nottingham NG7 2RD, United Kingdom
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
Published Online: 2013-02-08 | DOI: https://doi.org/10.2478/v10076-012-0014-y

ABSTRACT

Cyberspace is a new global space that is yet not fully explored nor effectively regulated. The authors are not sketching a regulatory framework for cyberspace, but instead are inclined to glean valuable experience from the developments in the regulation of other global spaces, especially the sea. First, the peculiarities of cyberspace and cybercrime are briefly outlined. Then, the other global spaces are analysed drawing comparisons between exploration, appropriation and regulations of the sea and the air and cyberspace. The authors suggest that it is vital to learn lessons from the past in order to achieve an effective model of regulation of cyberspace. One of the main focus points of the paper is the position of a pirate and the ways of regulating piracy in different global spaces.

KEYWORDS: Cyberspace; cybercrime; sovereignty; regulation; cyber law; law of the sea

  • 1. Armitage, David. “The Elephant and the Whale: Empires of Land and Sea.” Journal for Maritime Research 9 (1) (2007): 23-36.Google Scholar

  • 2. Banner, Stuart. Who Owns the Sky? The Struggle to Control Airspace from the Wright Brothers On. Cambridge (MA): Harvard University Press, 2008.Google Scholar

  • 3. Blau, John. “Battle Brewing over International Internet Regulation.” IEEESpectrum (December 2012) // http://spectrum.ieee.org/telecom/internet/battle-brewing-over-internationalinternet- regulation (accessed December 14, 2012).Google Scholar

  • 4. Bodini, Stefano Piedimonte. “Fighting Maritime Piracy under the European Convention on Human Rights.” The European Journal of International Law 22 (3) (2011): 829-848.CrossrefGoogle Scholar

  • 5. Brenner, Susan W., and Marc D. Goodman. “The Emerging Consensus on Criminal Conduct in Cyberspace.” International Journal of Law and Information Technology 10 (2) (2002): 139-223.Google Scholar

  • 6. Burgess, Douglas R. “Hostis Humani Generi: Piracy, Terrorism and a New International Law.” University of Miami International and Comparative Law Review 13 (2006): 293-341.Google Scholar

  • 7. Cade, Nicholas W. “An Adaptive Approach for an Evolving Crime: The Case for an International Cyber Court and Penal Code.” Brooklyn Journal of International Law 37 (3) (2012): 1139-1175.Google Scholar

  • 8. Caral, Jose MA. Emmanuel. “Lessons from ICANN: Is the Self-regulation of the Internet Fundamentally Flawed?” International Journal of Law and Information Technology 12 (1) (2004): 1-31.Google Scholar

  • 9. Cerf, Vinton, Barry M. Leiner, David C. Clark, et al. “A Brief History of the Internet”, An International Electronic Publication of the Internet Society (1997) // http://www.isoc.org/oti/printversions/0797prleiner.html (accessed December 17, 2012).Google Scholar

  • 10. Chik, Warren B. “‘Customary Internet-tional Law’: Creating a Body of Customary Law to Cyberspace. Part 1: Developing Rules for Transitioning Custom into Law.” Computer Law & Security Review 26 (2010): 3-44.Google Scholar

  • 11. Clough, Jonathan. “Cybercrime.” Commonwealth Law Bulletin 37 (4) (2011): 671-680.Google Scholar

  • 12. Clough, Jonathan. “Data Theft? Cybercrime and the Increasing Criminalization of Access to Data.” Criminal Law Forum 22 (1) (2011): 145-170.Google Scholar

  • 13. Connery, Christopher L. “Ideologies of Land and Sea: Alfred Thayer Mahan, Carl Schmitt, and the Shaping of Global Myth.” Elements 28 (2) (2001): 173-201.Google Scholar

  • 14. De Leon, Pablo Mendes. “The Dynamics of Sovereignty and jurisdiction in International Aviation Law”: 483-496. In: Gerard Kreijen, ed. State,Sovereignty, and International Governance. Oxford and New York: Oxford University Press, 2002.Google Scholar

  • 15. Dean, Mitchell. “Nomos: Word and Myth”: 242-258. In: Louiza Odysseos and Fabio Petito, eds. The International Political Thought of Carl Schmitt: Terror,Liberal War, and the Crisis of Global Order. Abingdon and New York: Routledge, 2007.Google Scholar

  • 16. Dunlap, Charles J. “Towards a Cyberspace Legal Regime in the Twenty-First Century: Considerations for American Cyber-Warriors.” Nebraska Law Review 87 (2008-2009): 712-724.Google Scholar

  • 17. Frazzetto, Mark. “A Maritime Model for Cyberspace Legal Governance.” The National Strategy Forum Review (September 19, 2011) // http://nationalstrategy.wordpress.com/ (accessed November 4, 2012).Google Scholar

  • 18. Geiß, Robin, and Anna Petrig. Piracy and Armed Robbery at Sea. Oxford and New York: Oxford University Press, 2011.Google Scholar

  • 19. Ghosh, Sumit, and Elliot Turrini. Cybercrimes: A Multidisciplinary Analysis. Heidelberg: Springer, 2010.Google Scholar

  • 20. Grabosky, Peter. “The Global Dimension of Cybercrime.” Global Crime 6 (1) 2004: 146-157.Google Scholar

  • 21. Greenleaf, Graham. “Regulating Cyberspace: Architecture vs Law?” Universityof New South Wales Law Journal 21 (2) (1998): 593-604.Google Scholar

  • 22. Grewe, Wilhelm G. The Epochs of International Law. Berlin: Walter de Gruyter, 2000.Google Scholar

  • 23. Guilfoyle, Douglas. “Piracy off Somalia: UN Security Council Resolution 1816 and IMO Regional Counter-Piracy Efforts.” International Criminal LawQuarterly 57 (2) (2008): 690-699.Google Scholar

  • 24. Harris, Alexandra and Ray Harris. “The Need for Air Space and Outer Space Demarcation.” Space Policy 22 (2006): 3-7.Google Scholar

  • 25. Hartogh, Den, and Cees Maris. “The Commencement of Modern Age”: 91-110. In: Cees Maris and Frans Jacobs, eds. Law, Order and Freedom: A Historical Introduction to Legal Philosophy. Heidelberg; Springer, 2011.Google Scholar

  • 26. Illves, Toomas Hendrik. “It‘s the Economy, Stupid!” The Security Times (September 2012): 24.Google Scholar

  • 27. “Internet Regulation: A Digital Cold War?” The Economist (December 14, 2012) // http://www.economist.com/blogs/babbage/2012/12/internetregulation (accessed December 14, 2012).Google Scholar

  • 28. Jarvie, Natasha. “Control of Cybercrime - Is an End to Our Privacy on the Internet a Price Worth Paying? Part 1.” Computer and Telecommunications Law Review 9 (3) (2003): 76-81.Google Scholar

  • 29. Jarvie, Natasha. “Control of Cybercrime - Is an End to Our Privacy on the Internet a Price Worth Paying? Part 2.” Computer and Telecommunications Law Review 9 (4) (2003): 110-115.Google Scholar

  • 30. Johnson, David and David Post. “Law and Borders - The Rise of Law in Cyberspace.” Stanford Law Review 48 (1996): 1367-1402.Google Scholar

  • 31. Joint Chiefs of Staff, Department of Defense Dictionary of Military and Associated Terms. “Joint Publication 1-02” (2001) // http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf (accessed November 4, 2012).Google Scholar

  • 32. Judy, Henry L., and David Satola. “Business Interests Under Attack in Cyberspace: Is International Regulation the Right Response?” Business Law Today (December 2011) // http://apps.americanbar.org/buslaw/blt/content/2011/12/article-2-judysatola.shtml (accessed November 4, 2012).Google Scholar

  • 33. Kadens, Emily. “The Myth of the Customary Law Merchant.” Texas Law Review 90 (5) (2012): 1153-1206.Google Scholar

  • 34. Kempe, Michael. “Beyond the Law. The Image of Piracy in the Legal Writings of Hugo Grotius”: 379-395. In: Hans W Blom, ed. Property, Piracy and Punishment: Hugo Grotius on War and Booty in De Iure Praedae - Conceptsand Contexts. Leiden: Brill, 2009.Google Scholar

  • 35. Khalid, Nazery. “With a Little Help from My Friends: Maritime Capacity building Measures in the Straits of Malacca.” Contemporary Southeast Asia 31 (3) (2009): 424-446.Google Scholar

  • 36. Klein, Natalie. Maritime Security and the Law of the Sea. Oxford and New York: Oxford University Press, 2011.Google Scholar

  • 37. Kleinwachter, Wolfgang. “Internet Governance Outlook 2012: Cold War or Constructive Dialogue.” Communications Law 17 (1) (2012): 14-18.Google Scholar

  • 38. Klimburg, Alexander. “Mobilising Cyber Power.” Survival: Global politics and Strategy 53 (1) (2011): 41-60.Google Scholar

  • 39. Koops, Bert-Jaap. “The Internet and its Opportunities for Cybercrime”: 735-754. In: M Herzog-Evans, ed. Transnational Criminology Manual. Nijmegen: Wold Legal Publishers, 2010.Google Scholar

  • 40. Lessig, Lawrence. “The Law of the Horse: What Cyberlaw Might Teach.” Harvard Law Review 113 (1999): 501-546.Google Scholar

  • 41. Libicki, Martin C. Cyberdeterrence and Cyberwar. Santa Monica, Arlington, and Pittsburgh: The RAND Corporation, 2009.Google Scholar

  • 42. Maier, Bernhard. “How Has the Law Attempted to Tackle the Borderless Nature of the Internet?” International Journal of Law and Information Technology 18 (2) (2010): 142-175.Google Scholar

  • 43. Marder, Michael. Groundless Existence: The Political Ontology of Carl Schmitt. New York and London: Continuum, 2010.Google Scholar

  • 44. Mayer, Franz C. “The Internet and Public International Law - Worlds Apart?” European Journal of International Law 12 (3) (2001): 612-622.Google Scholar

  • 45. Menthe, Darrel C. “Jurisdiction In Cyberspace: A Theory of International Spaces.” Michigan Telecommunications Law Review 4 (1998): 69-103.Google Scholar

  • 46. Newman, David. “Contemporary Research Agenda in Border Studies: An Overview”: 33-48. In: Doris Wastl-Walter, ed. The Ash gate Research Companion to Border Studies. Farnham and Burlington: Ashgate, 2011.Google Scholar

  • 47. O’Donnovan, Oliver, and Joan Lockwood O’Donnovan. “Isidore of Seville”: 204-206. In: Oliver O’Donnovan and Joan Lockwood O’Donnovan, eds. From Irenaeus to Grotius: A Sourcebook in Christian Political Thought, 100-1625. Grand Rapids and Michigan: William B. Eerdmans Publishing, 1999.Google Scholar

  • 48. Odysseos, Louiza, and Fabio Petito. “The International Political Thought of Carl Schmitt”: 1-18. In: Louiza Odysseos and Fabio Petito, eds. The International Political Thought of Carl Schmitt: Terror, Liberal War, and theCrisis of Global Order. Abingdon and New York: Routledge, 2007.Google Scholar

  • 49. Orji, Uchenna Jerome. “An Analysis of China’s Regulatory Response to Cybersecurity.” Computer and Telecommunications Law Review 18 (7) (2012): 212-226.Google Scholar

  • 50. Pardo, Arvid. “The Law of the Sea: Its Past and its Future.” Oregon Law Review 63 (1) (1984): 7-17.Google Scholar

  • 51. Reed, Chris. “Online and Offline Equivalence: Aspiration and Achievement.” International Journal of Law and Information Technology 18 (3) (2010): 248-273.Google Scholar

  • 52. Ronzitti, Natalino. “The Use of Private Contractors in the Fight against Piracy: Policy Options”: 37-53. In: Francesco Francioni and Natalino Ronzitti, eds. War by Contract: Human Rights, Humanitarian Law, and Private Contractors. Oxford and New York: Oxford University Press, 2011.Google Scholar

  • 53. “Russia Calls for Internet Revolution.” Russia Today (May 28, 2012) // http://www.rt.com/news/itu-internet-revolution-russia-386 (accessed November 4, 2012).Google Scholar

  • 54. Schmitt, Carl. The Nomos of the Earth in the International Law of Jus Publicum Europaeum. New York: Telos, 2003.Google Scholar

  • 55. Scott, Jennifer. “ITU Internet Regulation Blocked by UK and US.” ComputerWeekly.com (December 14, 2012) // http://www.computerweekly.com/news/2240174668/ITU-regulation-blockedby- UK-and-US (accessed December 14, 2012).Google Scholar

  • 56. Stahl, William M. “The Uncharted Waters of the Cyberspace: Applying the Principles of International Maritime Law to the Problem of Cybersecurity.” Georgia Journal of International and Comparative Law 40 (2011): 247-273.Google Scholar

  • 57. Touloumis, Tara. “Buccaneers and Bucks from the Internet: Pirate Bay and the Entertainment Industry.” Seton Hall Journal of Sports & EntertainmentLaw 19 (2009): 253-281.Google Scholar

  • 58. Treves, Tullio. “Piracy, Law of the Sea, and Use of Force: Developments off the Coast of Somalia.” European Journal of International Law 20 (2) (2009): 399-414.CrossrefGoogle Scholar

  • 59. US Department of State. “Fast Facts on United States Submitting Initial Proposals to World Telecom Conference” (August 1, 2012) // http://www.state.gov/e/eb/rls/fs/2012/195921.htm (accessed November 4, 2012).Google Scholar

  • 60. Wang, James C. F. Handbook on Ocean Politics and Law. Westport: Greenwood Press, 1992.Google Scholar

  • 61. Webb, Walter Prescott. The Great Frontier. Reno: University of Nevada Press, 2003.Google Scholar

  • 62. Williams, Alison J. “A Crisis in Aerial Sovereignty? Considering the Implications of Recent Military Violations of National Airspace.” Area 42 (1) (2010): 51-59.Google Scholar

  • 63. Williams, Alison J. “Blurring Boundaries / Sharpening Borders: Analysing the US’s Use of Military Aviation Technologies to Secure International Borders, 2001-2008”: 283-300. In: Doris Wastl-Walter, ed. The Ashgate ResearchCompanion to Border Studies. Farnham and Burlington: Ashgate, 2011.Google Scholar

  • 64. Yar, Majid. “The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2 (2005): 407-427.Google Scholar

  • 65. Zekos, Georgios I. “Globalisation and States’ Cyber- Territory.” Web Journalof Current Legal Issues 5 (2001) [pagination not available].Google Scholar

  • 66. Zhou, Chenfeng Vincent, Christopher Leckie, and Shanika Karunasekera. “A Survey of Coordinated Attacks and Collaborative Intrusion Detection.” Computers & Security 19 (2010): 124-140.Google Scholar

  • 1. Anglo-Norwegian Fisheries Case. I.C.J. Reports 1951, 116.Google Scholar

  • 2. Convention on Cybercrime. Council of Europe. CETS no. 185 (Budapest; November 23, 2001).Google Scholar

  • 3. eDate Advertising GmbH v X (C-509/09) and Olivier Martinez and RobertMartinez v MGN Limited (C-161/10). European Court of Justice. Opinion of Advocate General Cruz Villalon (March 29, 2011).Google Scholar

  • 4. League against Racism and Antisemitism (LICRA), French Union of JewishStudents v Yahoo! Inc. (USA), Yahoo France. Tribunal de Grande Instance de Paris (The County Court of Paris). Interim Court Order (November 20, 2000). Electronic Business Law Reports 1(3) (2001): 110-120.Google Scholar

  • 5. Medvedyev and Others v France. ECHR Grand Chamber. Application no. 3394/03 (March 29, 2010).Google Scholar

  • 6. The Situation in Somalia. United Nations Security Council. Resolution no.Google Scholar

  • 1816. UN Docs. S/RES/1816 (2008).Google Scholar

  • 7. Towards a General Policy on the Fight against Cyber Crime. The Council and the Committee of the Regions. Communication from the Commission to the European Parliament. COM/2007/0267 Final. {SEC(2007) 641} {SEC(2007) 642}. Google Scholar

About the article

The authors would like to thank the anonymous reviewers for their invaluable comments and suggestions. Also, a very kind thank you to Neil MacEwan for his inspirational Cyberlaw lectures at the University of Salford and guiding comments on an essay which was a start to this research.


Published Online: 2013-02-08

Published in Print: 2012-12-01


Citation Information: Baltic Journal of Law & Politics, ISSN (Online) , ISSN (Print) 2029-0454, DOI: https://doi.org/10.2478/v10076-012-0014-y.

Export Citation

This content is open access.

Comments (0)

Please log in or register to comment.
Log in