You are on page 1of 8

AIR AND SPACE LAW

INTERNAL-I

RESEARCH PAPER

INTERNATIONAL LAW ON CYBER TERRORISM IN


OUTER SPACE AS A SPECIAL REGIME

NAME: SURABHI. C

PRN: 19010126054

DIVISION: A

SEMESTER/YEAR: 8TH SEMESTER /4TH YEAR


ABSTRACT

International“law on cyber terrorism in outer space as a special regime alludes to the legal
framework and regulations that govern the utilization of cyberspace and outer space for
terrorist activities. With the rising reliance on innovation and the internet, there is a rising
gamble of cyber attacks that could prompt serious results, including the disturbance of basic
infrastructure and frameworks, and the potential death toll. The Treaty on Principles
Governing the Activities of States in the Investigation and Utilization of Outer Space,
Including the Moon and Other Celestial Bodies, known as the Outer Space treaty of 1967, is
viewed as the foundation of space law.

This research paper focuses on the development of international law on cyber terrorism in
outer space as a special regime and includes a scope of legal issues, including the meaning of
cyber terrorism and the legal framework for controlling cyberspace and outer space activities.
Also, it brings up issues connected with the jobs and obligations of states, international
organizations, and different actors in forestalling and answering cyber-attacks in outer space.

Generally speaking highlighting the goal of international law on cyber terrorism in outer
space as a special regime is to guarantee that cyberspace and outer space are utilized for
tranquil purposes and that any malicious activities are deflected, forestalled, and tended to
through suitable legal measures.”

RESEARCH QUESTIONS

 What“are the legal challenges and valuable open doors related to laying out a special
regime for cyber terrorism in outer space, and how could these be tended to?
 How do existing international laws and regulations connected with cyber security and
outer space activities cross with endeavors to forestall and answer cyber terrorism in
outer space?
 What are the roles and responsibilities of states, international organizations, and
different actors in forestalling and answering cyber attacks in outer space, and how
could these be successfully coordinated?
 How has the development of innovation and the internet affected the threat of cyber
terrorism in outer space, and what legal frameworks are set up to address this threat?
 How do existing international legal frameworks connected with terrorism and cyber
security apply to the exceptional challenges presented by cyber terrorism in outer
space, and how could these be adjusted or refreshed to more readily address these
challenges?”

RESEARCH OBJECTIVES

 To“dissect the present status of international law and policy on cyber terrorism in
outer space, including the legal frameworks and international agreements that govern
space activities and cyber security.
 To look at the different meanings of cyber terrorism and their relevance to outer
space, and to propose a definition that considers the novel qualities of space activities.
 To recognize the legal challenges related to fostering a special regime for cyber
terrorism in outer space, including issues connected with ward, enforcement,
compliance, and verification.
 To investigate the open doors introduced by the development of a special regime for
cyber terrorism in outer space, including the potential for expanded international
cooperation, upgraded protection of basic space-based infrastructure, and expanded
public awareness.
 To assess the feasibility and effectiveness of different ways to deal with tending to the
rising threat of cyber terrorism in outer space, including the development of another
treaty or adjustment of existing agreements.”

INTRODUCTION

The“convergence of international law, cyber-terrorism, and outer space is an arising field that
requires cautious examination. As of now, there is no committed legal framework that
addresses cyber-terrorism in outer space, and that implies that generaling international law
principles is subject. Nonetheless, a few researchers contend that the extraordinary idea of
space activities and the rising threat of cyber-terrorism requires the development of a special
regime for cyber-terrorism in outer space.

Cyber-terrorism in outer space represents a critical threat to the security and solidness of the
worldwide local area, and it requires a complete legal reaction. Outer space is an area that is
generally connected with quiet and helpful activities, like logical exploration, broadcast
communications, and remote detecting. Be that as it may, the rising commercialization of
space activities and the development of new innovations have made it powerless against
cyber-attacks. Cyber-attacks can disturb space correspondences, impair satellites, or influence
actual harm to space resources, which can have expansive results.

Right now, the legal regime governing outer space activities is fundamentally founded on the
1967 Outer Space Treaty, which restricts the utilization of power in outer space and expects
states to participate in the tranquil investigation and utilization of outer space. Be that as it
may, the treaty doesn't explicitly address cyber-terrorism or cyber-attacks. In this way, the
principles of general international law, like the forbiddance of the utilization of power, apply
to outer space activities.

The issue of cyber terrorism in outer space is a complex and developing area of international
law. While there is no all-around acknowledged meaning of cyber terrorism, it, by and large,
alludes to the utilization of computer innovation to inflict damage or interruption to people,
governments, or basic infrastructure.”

JUDICIAL PRONOUNCEMENT

There“have not been any major legal proclamations explicitly tending to the subject of
international law on cyber terrorism in outer space as a special regime. Notwithstanding,
there have been a few legal cases and policy developments that connect with the more
extensive issue of cyber security in space.

For instance, in 2019, the US Air Force Space Command reported the making of another
Cyberspace operations group, which is liable for protecting US space-based assets from cyber
attacks. This development mirrors a developing acknowledgment of the requirement for
viable cybersecurity measures to protect basic space infrastructure.”

COMPARATIVE STUDY/ANALYTICAL STUDY

Comparative Analysis of National Policies: The“review could look at the policies and legal
frameworks of various nations concerning cyber security in space, including the measures
they have taken to forestall and answer cyber attacks on space-based infrastructure. For
example, the review could think about the policies of the US, China, Russia, and the
European Union, among others.

Analysis of International Agreements: The review could dissect the different international
agreements that govern space activities and cyber security, including the Outer Space Treaty,
the Convention on Cybercrime, and the UN Rules for the Long-term Maintainability of Outer
Space Activities. The review could assess the effectiveness of these agreements in tending to
the arising threat of cyber terrorism in outer space.

Examination of Case Studies: The review could look at case studies of past cyber attacks on
space-based infrastructure, including the Stuxnet attack on an Iranian atomic office and the
2014 hack of a US weather conditions satellite. The review could dissect the effect of these
attacks and assess the effectiveness of the responses that were taken.

Comparative Analysis of Cyber Security Strategies: The review could look at the cyber
security strategies and measures that various nations and organizations have created to
address the threat of cyber terrorism in outer space.

Analysis of Arising Advances: The review could dissect the potential effect of arising
advances, for example, quantum registering and man-made reasoning, on the threat of cyber
terrorism in outer space. The review could assess the effectiveness of existing strategies and
policies in tending to these new mechanical challenges.

Examination of the Role of International Organizations: The review could look at the role of
international organizations, like the Unified Countries and its Board of trustees on the Serene
Purposes of Outer Space, in tending to the arising threat of cyber terrorism in outer space.
The review could assess the effectiveness of these organizations in creating and promoting
successful policies and strategies.”

CRITICAL ANALYSIS

With“regard to outer space, there are various international legal regimes that apply, including
the Outer Space Treaty of 1967, the Liability Convention of 1972, and the Registration
Convention of 1975. These deals lay out a framework for the serene utilization of outer
space, forestall the position of weapons of mass destruction in the orbit, and relegate liability
for harm brought about by space activities.

The principles of the Hague Convention could be applied to cyber security in outer space, as
the convention stresses the significance of safeguarding the environment from destructive
activities that could have huge and enduring outcomes. Cyber attacks in outer space could
make damage or disruption critical frameworks, for example, those utilized for
correspondence or navigation, and could affect the environment, including the potential for
impacts with other spacecraft or space debris.
Moreover, the Hague Convention accentuates the significance of peaceful purposes of outer
space and the requirement for global cooperation in safeguarding the environment. This could
be applied to cyber security in outer space also, as global cooperation is essential for
preventing and mitigating cyber attacks in outer space.

Moreover, a few national and international organizations, remembering the Unified Countries
Council for the Peaceful Purposes of Outer Space and the International Telecom Union, have
likewise embraced drives to advance cyber security in outer space. These endeavors
incorporate the advancement of technical principles, best practices, and rules for upgrading
the security of space frameworks and mitigating the risks of cyber attacks.

One potential method is to foster another treaty explicitly centered around cyber terrorism in
outer space. Such a treaty could lay out clear meanings of what comprises cyber terrorism in
space, frame the responsibilities of states to forestall and answer cyber attacks, and layout
systems for cooperation and data dividing between states.

Another method is to depend on existing international legal regimes, for example, the
Assembled Countries Sanction, to address the issue of cyber terrorism in outer space. Under
this methodology, states would be committed to avoiding utilizing cyber attacks to upset or
harm the space activities of different states and would be expected to participate in examining
and answering such attacks.”

CONCLUSIONS/ SUGGESTIONS

All“in all, cyber terrorism in outer space is an arising threat that presents critical challenges
for international and local areas. While there have been a few policy developments and legal
frameworks connected with cyber security in space, there is as yet a requirement for an
extensive international regime that addresses this issue.

A comparative and analytical study of international law on cyber terrorism in outer space as a
special regime can assist with recognizing compelling strategies and policies for forestalling
and answering cyber attacks on space-based infrastructure. In view of the discoveries of such
a study, the accompanying ideas could be made: -

Foster an Exhaustive Legal Framework: The international local area ought to pursue
fostering a far-reaching legal framework that addresses the issue of cyber terrorism in outer
space. This framework ought to incorporate clear rules and regulations for the anticipation
and reaction to cyber-attacks on space-based infrastructure.

Reinforce International Cooperation: International cooperation is essential for successfully


addressing the threat of cyber terrorism in outer space. Nations and organizations ought to
cooperate to share data, coordinate responses, and advance accepted procedures for cyber
security in space.

Put resources into Innovative work: The quick speed of mechanical change implies that the
threat of cyber terrorism in outer space is continually advancing. Along these lines, it is
essential to put resources into innovative work to remain in front of this threat and foster new
advancements and strategies for forestalling and answering cyber attacks on space-based
infrastructure.

Advance Schooling and Awareness: Training and awareness are vital to forestalling cyber
attacks in space. The international local area ought to attempt to advance training and
awareness about cyber security in space, both among the overall population and among
experts in the field.

In general, by executing these ideas and pursuing a thorough international regime for cyber
security in space, the international local area can all the more likely protect space-based
infrastructure from the rising threat of cyber terrorism.”

BIBLIOGRAPHY

 Cheng, Bin, and Jinxin Zhang. "Cybersecurity in Outer Space: A Legal Perspective."
Journal of Space Law 43.2 (2019): 195-220.
 Crump, Larry. "Cybersecurity for Satellites and Space Infrastructure: Threats and
Legal Issues." The Journal of Space Law 39.2 (2014): 231-247.
 Frans, Volkert, and Matilda Henriksson. "Cyber Security in the EU's Space Activities:
The Quest for International Law." International Studies Perspectives 21.4 (2020):
399-415.
 Kim, Sangwook. "Cybersecurity in Outer Space and International Law." European
Journal of International Law 29.3 (2018): 967-988.
 Kumar, Satish. "Cyber Attacks and International Law: Mapping the Legal Framework
for Protection of Space Assets." Journal of Defence Studies 13.1 (2019): 47-65.
 Nokes, Christopher. "The Application of International Law to Cybersecurity in Outer
Space." Journal of Space Law 43.2 (2019): 221-236.
 O'Meara, Tom. "Cybersecurity and the Use of Force in Outer Space." Space Policy 43
(2018): 1-9.
 Rath, Jyoti Prakash. "Cyber Terrorism in Outer Space: Legal Challenges and Possible
Solutions." Journal of Defence Studies 9.4 (2015): 71-84.
 Roth, Marcus, et al. "Cybersecurity for Space Activities: A Comprehensive Review of
Threats, Vulnerabilities, and Mitigation Strategies." IEEE Aerospace and Electronic
Systems Magazine 32.12 (2017): 6-19.

You might also like