{"id":330,"date":"2020-12-07T14:25:00","date_gmt":"2020-12-07T13:25:00","guid":{"rendered":"http:\/\/scpo-cybersecurityassociation.com\/?p=330"},"modified":"2021-12-12T14:28:30","modified_gmt":"2021-12-12T13:28:30","slug":"07-12-2020-espionage-and-international-law-with-dr-asaf-lubin","status":"publish","type":"post","link":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/2020\/12\/07\/07-12-2020-espionage-and-international-law-with-dr-asaf-lubin\/","title":{"rendered":"07\/12\/2020: Espionage and International Law with Dr. Asaf Lubin"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"489\" src=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2021\/12\/event-15-1024x489.png\" alt=\"\" class=\"wp-image-331\" srcset=\"https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2021\/12\/event-15-1024x489.png 1024w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2021\/12\/event-15-300x143.png 300w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2021\/12\/event-15-768x367.png 768w, https:\/\/scpo-cybersecurityassociation.com\/wp-content\/uploads\/2021\/12\/event-15.png 1256w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The Sciences Po Cyber Security Association Masterclass with Prof. Dr. Asaf Lubin tackled the issue of Espionage and International law. As an experienced scholar at the Maurer School of Law in Bloomington, IN, Lubin focuses his research on international and cybersecurity law. The masterclass was concentrated on the topic of legality of intelligence operations, and current issues in the field were discussed. As technology advances, international law became more porous in terms of accountability and legality of different types of espionage and the breach of national sovereignty.&nbsp;<\/p>\n\n\n\n<p>Lubin raised the question of a problematic drawing line when it comes to new forms of state espionage. Though the U.N. Charter outlaws territorial espionage as a breach of national sovereignty, territoriality today is not the most important aspect. Not only, that the current international law permits extra-territorial intelligence gathering, but in terms of cyber capabilities the law is not applied.\u00a0<\/p>\n\n\n\n<p>\u201cIf a hacker in Germany connects through Belgian, Korean and Canadian VPN to Kenyan server to gain access to the U.S. Embassy in Jordan to reach data stored in Washington D.C., whose sovereignty was violated?\u201d<\/p>\n\n\n\n<p>The paradox of legally framing an inherently secretive action is, according to Lubin, possible to resolve with espionage \u201clex specialis\u201d. As not all secrets bear the same value, the intelligence agencies already publish more de-classified documents, to let some light shed on their operations. Even though Lubin expressed a rather pessimistic view on states\u2019 willingness to accept a binding international codification of espionage activities, something called a \u201ccyber 9\/11\u201d has the potential to advance the regulation.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Sciences Po Cyber Security Association Masterclass with Prof. Dr. Asaf Lubin tackled the issue of Espionage and International law. As an experienced scholar at the Maurer School of Law in Bloomington, IN, Lubin focuses his research on international and cybersecurity law. The masterclass was concentrated on the topic of legality of intelligence operations, and [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":331,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-events"],"_links":{"self":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":1,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":332,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/posts\/330\/revisions\/332"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media\/331"}],"wp:attachment":[{"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/media?parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/categories?post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scpo-cybersecurityassociation.com\/index.php\/wp-json\/wp\/v2\/tags?post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}