About the Authors |
|
v | |
Foreword |
|
xv | |
|
|
xvii | |
Acknowledgements |
|
xxi | |
|
Chapter 1 Introduction: Overview |
|
|
1 | (14) |
|
§1.01 General Introduction |
|
|
1 | (5) |
|
[ A] Cybersecurity in Aviation |
|
|
3 | (1) |
|
[ B] Cybersecurity in Outer Space |
|
|
4 | (2) |
|
[ C] Cybersecurity in Satellite Services |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (8) |
|
[ A] Chapter 2: Definitions and Terminology |
|
|
7 | (1) |
|
[ B] Chapter 3: Cyberattacks from an International Law Perspective |
|
|
8 | (1) |
|
[ C] Chapter 4: Promotion of Cybersecurity and Combating Cybercrime in the EU |
|
|
8 | (1) |
|
[ D] Chapter 5: Space (Law) and Cybersecurity |
|
|
9 | (1) |
|
[ E] Chapter 6: Critical Infrastructure for Aviation and Space Activities: Satellite Communication and Navigation |
|
|
10 | (1) |
|
[ F] Chapter 7: Public International Civil Aviation Law |
|
|
11 | (1) |
|
[ G] Chapter 8: Aviation Liability in Cases of Cyberattacks |
|
|
12 | (1) |
|
[ H] Chapter 9: Lessons Learned |
|
|
12 | (3) |
|
Chapter 2 Definitions and Terminology |
|
|
15 | (26) |
|
|
15 | (1) |
|
§2.02 Relevant Cyber Terminology |
|
|
16 | (10) |
|
[ A] Cyberspace: Etymology, History and Main Characteristics |
|
|
16 | (3) |
|
|
19 | (1) |
|
[ C] Cybersecurity in Aviation |
|
|
20 | (1) |
|
[ D] Cybersecurity in Outer Space |
|
|
20 | (1) |
|
[ E] Cyber Activities and Cyber Operations |
|
|
21 | (2) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
24 | (1) |
|
[ I] Weapon and Cyberweapon |
|
|
25 | (1) |
|
§2.03 Relevant Aviation Terminology |
|
|
26 | (4) |
|
|
26 | (1) |
|
|
26 | (1) |
|
[ C] Aviation Safety Versus Aviation Security |
|
|
27 | (1) |
|
[ D] Standards and Recommended Practices |
|
|
28 | (1) |
|
[ E] Interference in Aviation |
|
|
29 | (1) |
|
§2.04 Relevant Outer Space and Satellite Services Terminology |
|
|
30 | (7) |
|
[ A] Electromagnetic Attack |
|
|
30 | (1) |
|
[ B] Electromagnetic Interference |
|
|
30 | (1) |
|
[ C] Electromagnetic Spectrum |
|
|
31 | (1) |
|
[ D] Harmful Interference |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
[ G] Malicious Cyber Activities Against Space Infrastructure |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
[ J] Space Infrastructure |
|
|
34 | (1) |
|
[ K] Space Objects and Space Assets |
|
|
35 | (2) |
|
|
37 | (1) |
|
|
37 | (4) |
|
[ A] Critical Infrastructure |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
39 | (1) |
|
[ F] Resilience of Information Systems |
|
|
39 | (1) |
|
|
40 | (1) |
|
Chapter 3 Cyberattacks from an International Law Perspective |
|
|
41 | (24) |
|
§3.01 Sources of Public International Law |
|
|
42 | (3) |
|
§3.02 Public International Law and Conflict: Jus Ad Bellum and Jus in Bello |
|
|
45 | (7) |
|
[ A] A Potential Digital Geneva Convention |
|
|
47 | (2) |
|
[ B] Convention on Cybercrime of the Council of Europe |
|
|
49 | (2) |
|
[ C] Tallinn Manual on International Law Applicable to Cyber Operations |
|
|
51 | (1) |
|
§3.03 Applicability of the Jus Ad Bellum to Cyberattacks |
|
|
52 | (7) |
|
[ A] Use or Threat of Use of `Cyber' Force |
|
|
53 | (2) |
|
[ B] From `Use of Cyber Force' to `Armed Cyber Attack' |
|
|
55 | (1) |
|
[ 1] Responding to an Armed Cyber Attack: Self-Defence |
|
|
56 | (2) |
|
[ 2] Responding to an Armed Cyber Attack: Security Council Authorisation |
|
|
58 | (1) |
|
§3.04 State Responsibility under International Law |
|
|
59 | (2) |
|
§3.05 International Regulation |
|
|
61 | (2) |
|
|
63 | (2) |
|
Chapter 4 Promotion of Cybersecurity and Combating Cybercrime in the EU |
|
|
65 | (38) |
|
§4.01 Introduction: EU and Cybersecurity Policy |
|
|
65 | (12) |
|
[ A] Early Regulatory and Policy Steps by the EU |
|
|
65 | (4) |
|
[ B] Cybersecurity Strategy of the EU |
|
|
69 | (1) |
|
[ 1] Cybersecurity Strategy of the EU: An Open, Safe and Secure Cyberspace |
|
|
69 | (3) |
|
[ 2] Revisiting the Cybersecurity Strategy of the EU |
|
|
72 | (1) |
|
[ C] Digital Single Market |
|
|
73 | (1) |
|
[ 1] Digital Single Market Strategy |
|
|
73 | (2) |
|
[ 2] Digital Single Market Review |
|
|
75 | (1) |
|
[ D] Tallinn Digital Summit |
|
|
76 | (1) |
|
§4.02 Primary and Secondary EU Legislation |
|
|
77 | (16) |
|
|
77 | (1) |
|
[ B] Cybersecurity Legislation |
|
|
78 | (1) |
|
|
78 | (3) |
|
[ 2] Directive on Attacks Against Information Systems |
|
|
81 | (1) |
|
[ 3] Blueprint for Large-Scale Cybersecurity Incidents and Crises |
|
|
82 | (1) |
|
[ C] Cybersecurity Certification |
|
|
83 | (1) |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (3) |
|
[ 3] Accessing Documents from the EU |
|
|
90 | (1) |
|
[ 4] EU and Processing of Personal Data |
|
|
90 | (1) |
|
|
91 | (1) |
|
[ 6] Cybersecurity Sanctions |
|
|
92 | (1) |
|
§4.03 Relevant Institutions, Bodies and Entities |
|
|
93 | (9) |
|
|
93 | (1) |
|
|
93 | (2) |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
98 | (1) |
|
[ F] European Cybersecurity Research and Competence Centre |
|
|
99 | (1) |
|
[ G] Joint EU Diplomatic Response to Malicious Cyberattacks |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
|
Chapter 5 Space (Law) and Cybersecurity |
|
|
103 | (26) |
|
|
103 | (2) |
|
[ A] Growth Tendencies in the Global Space Economy |
|
|
103 | (1) |
|
[ B] Interconnectivity in the Space Sector: The Role of Cyberspace in Outer Space |
|
|
104 | (1) |
|
§5.02 The Legal Framework Governing Human Activities in Outer Space |
|
|
105 | (4) |
|
[ A] Applicability of General International Law and Space Law to Outer Space |
|
|
106 | (2) |
|
[ B] Relevant Principles of Space Law |
|
|
108 | (1) |
|
§5.03 Challenges for the Cybersecurity of Space Assets |
|
|
109 | (7) |
|
|
109 | (1) |
|
[ 1] Elements of Satellite Systems as Entry Points for Cyber Intrusions |
|
|
110 | (1) |
|
[ 2] Remoteness and Interconnectedness of Space Objects as Weakness Factors for Cybersecurity |
|
|
111 | (1) |
|
[ B] Major Types of Security Challenges for Satellite Infrastructure |
|
|
111 | (3) |
|
[ C] New Activities in Outer Space |
|
|
114 | (1) |
|
[ D] The Role of Cybersecurity for Space Activities |
|
|
115 | (1) |
|
§5.04 Legal Challenges at the Intersection Between Outer Space and Cyberspace |
|
|
116 | (8) |
|
|
117 | (1) |
|
[ B] Applicability of Space Law to Cyber Activities |
|
|
118 | (3) |
|
[ C] Establishing Jurisdiction, Attributability and State Responsibility for Cyber (Space) Activities: A Feasible Endeavour? |
|
|
121 | (3) |
|
§5.05 Cybersecurity for Space Assets: International Regulation Efforts |
|
|
124 | (2) |
|
|
126 | (3) |
|
Chapter 6 Critical Infrastructure for Aviation and Space Activities: Satellite Communication and Navigation |
|
|
129 | (26) |
|
|
129 | (1) |
|
§6.02 Satellites and Critical Infrastructures |
|
|
129 | (9) |
|
[ A] Critical Infrastructures |
|
|
129 | (3) |
|
[ B] Space Infrastructure |
|
|
132 | (1) |
|
[ C] Satellite Communications |
|
|
133 | (2) |
|
[ D] Satellite Navigation |
|
|
135 | (2) |
|
[ E] Dual Use of Commercial Satellites |
|
|
137 | (1) |
|
§6.03 The Vulnerability of the Space Infrastructure to Electromagnetic Interferences |
|
|
138 | (5) |
|
[ A] Modern Threats to Satellites |
|
|
138 | (3) |
|
|
141 | (1) |
|
|
142 | (1) |
|
§6.04 ITU Legal Framework |
|
|
143 | (8) |
|
|
143 | (2) |
|
[ B] Relevant Provisions for Electromagnetic Interferences |
|
|
145 | (2) |
|
[ C] Effectiveness of the Provisions |
|
|
147 | (4) |
|
§6.05 Electronic Interference Versus Cyberattacks |
|
|
151 | (1) |
|
|
152 | (3) |
|
Chapter 7 Public International Civil Aviation Law |
|
|
155 | (36) |
|
§7.01 Convention on International Civil Aviation 1944 |
|
|
155 | (1) |
|
§7.02 Interpretation: Case Study of Article 3 Bis |
|
|
156 | (2) |
|
§7.03 Creation of Complementary Bilateral and Multilateral Treaties: Case Study of Air Service Agreements |
|
|
158 | (1) |
|
|
159 | (4) |
|
[ A] Beijing Convention and Protocol 2010 |
|
|
160 | (2) |
|
[ B] Interpretation: Case Study of the Hague Convention 1970 |
|
|
162 | (1) |
|
[ C] Addressing Cybersecurity Through National Law |
|
|
162 | (1) |
|
§7.05 Annexes to the Chicago Convention 1944 |
|
|
163 | (6) |
|
|
165 | (2) |
|
[ B] Different Types of Interference |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (11) |
|
[ A] Organisational Structure: Safety Versus Security |
|
|
169 | (2) |
|
[ B] Panels and Study Groups |
|
|
171 | (1) |
|
|
171 | (1) |
|
|
172 | (1) |
|
|
172 | (1) |
|
[ C] Other Relevant Activities |
|
|
173 | (1) |
|
[ 1] General Assembly Resolution |
|
|
173 | (1) |
|
|
174 | (2) |
|
[ 3] Cybersecurity Strategy |
|
|
176 | (1) |
|
[ 4] Global Aviation Security Plan |
|
|
177 | (1) |
|
[ 5] European Aviation Security Training Institute |
|
|
178 | (1) |
|
|
178 | (2) |
|
§7.07 Regional Safety and Security Organisations: Case Study of the EU |
|
|
180 | (10) |
|
[ A] Bucharest Declaration |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (4) |
|
|
187 | (3) |
|
|
190 | (1) |
|
Chapter 8 Aviation Liability in Cases of Cyberattacks |
|
|
191 | (22) |
|
§8.01 Liability in the Case of Damage Caused to Air Carrier Passengers |
|
|
191 | (11) |
|
[ A] Death or Injury of Passengers Resulting from a Cyberattack |
|
|
195 | (3) |
|
[ B] Damage to Passengers Resulting from a Cyberattack Within the EU |
|
|
198 | (4) |
|
§8.02 Liability in the Case of Damage to Third Parties |
|
|
202 | (4) |
|
§8.03 Other Cases of Liability |
|
|
206 | (1) |
|
|
207 | (5) |
|
[ A] Applicable Insurance Law in Aviation |
|
|
208 | (1) |
|
[ B] Underwriting Considerations |
|
|
209 | (1) |
|
|
210 | (2) |
|
|
212 | (1) |
|
Chapter 9 Lessons Learned |
|
|
213 | (22) |
|
|
213 | (1) |
|
§9.02 Increasing Number of Cyberattacks |
|
|
213 | (1) |
|
§9.03 General Characteristics of a Cyberattack |
|
|
214 | (6) |
|
|
214 | (1) |
|
[ 1] White Hat v. Black Hat hackers |
|
|
214 | (1) |
|
|
215 | (1) |
|
[ 3] State-Sponsored Entities |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (2) |
|
|
218 | (1) |
|
|
219 | (1) |
|
§9.04 Purpose of Cybersecurity Measures |
|
|
220 | (1) |
|
|
221 | (1) |
|
§9.06 Measures to Increase Cybersecurity |
|
|
222 | (11) |
|
|
222 | (2) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
[ B] Challenges for National Regulatory Frameworks |
|
|
226 | (1) |
|
|
227 | (1) |
|
[ D] Private Self-Regulation |
|
|
228 | (2) |
|
[ E] Information Sharing and Reporting |
|
|
230 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
|
231 | (1) |
|
[ I] A Focus on Contractual Practice |
|
|
232 | (1) |
|
|
233 | (2) |
Index |
|
235 | |