Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2022 | nr 1 Wyzwania polityki bezpieczeństwa w świetle inwazji Rosji na Ukrainę = Security Policy Challenges in the Light of Russia's Invasion of Ukraine | 69--96
Tytuł artykułu

Cyber Operations and Article 42.7 of the Treaty on European Union

Warianty tytułu
Operacje cybernetyczne a art. 42.7 Traktatu o Unii Europejskiej
Języki publikacji
The threat posed by the occurrence of cyber-attacks constitutes a challenge to national security. Such attacks may target and disturb the daily functioning of any state. Faced with complex and diverse crises, the European Union (EU) has improved its response capacities over the last decades, introducing a so-called 'aid and assistance clause' into Article 42(7) of the Treaty on European Union (TEU) applicable in the case of armed aggression against an EU member state on its territory. The main objective of this publication is to examine potential conditions for the application of Article 42(7) TEU in response to cyber operations. The author argues that under certain conditions, the aid and assistance clause in Article 42(7) TEU may be invoked in response to certain cyber operations against an EU member state on its territory. (original abstract)
Zagrożenia wynikające z dokonywania cyberataków stanowią wyzwanie dla bezpieczeństwa narodowego. Takie ataki mogą być wymierzone w każde państwo, aby zakłócić jego codzienne funkcjonowanie. W obliczu złożonych i różnorodnych kryzysów Unia Europejska w ostatnich dekadach zwiększyła swoje możliwości reagowania, wprowadzając do art. 42 ust. 7 Traktatu o Unii Europejskiej (TUE) tzw. klauzulę pomocy i wsparcia, mającą zastosowanie w przypadku zbrojnej agresji przeciwko państwu członkowskiemu UE na jego terytorium. Głównym celem niniejszej publikacji jest analiza potencjalnych warunków zastosowania art. 42 ust. 7 TUE w odpowiedzi na operacje cybernetyczne. Autor argumentuje, że w określonych sytuacjach klauzula pomocy i wsparcia z art. 42 ust. 7 TUE może być stosowana w odpowiedzi na niektóre operacje cybernetyczne przeciwko państwu członkowskiemu UE na jego terytorium. (abstrakt oryginalny)
  • An object [term], [in:] Merriam-Webster Dictionary, [accessed: 10.02.2022].
  • Armed [term], [in:] Cambridge Dictionary, english [accessed: 10.01.2022].
  • Bethlehem D., Self-Defense Against an Imminent or Actual Armed Attack by Nonstate Actors, "The American Journal of International Law" 2012, Vol. 106, No. 4, pp. 770-777.
  • Blanke H.-J., Article 52 - Commentary, [in:] Treaty on European Union, eds H.-J. Banke, St. Miangameli, Springer Verlag, Berlin-Heidelberg 2013.
  • Boothby W.H., Weapons, Prohibited, [in:] Max Planck Encyclopedia of Public International Law, 02.2015, 9780199231690-e447 [accessed: 19.02.2022].
  • Brownlie I., International law, and the Use of Force by States, Clarendon Press, Oxford 1963.
  • De Casadevante Romani C.F., International Law of Victims, "Max Planck Yearbook of United Nations Law" 2010, Vol. 14, pp. 219-272.
  • De Tomas Colatin S., Väljataga A., Data as a Weapon: refined Cyber Capabilities under Weapon Reviews and International Human Rights law, NATO CCDCOE Tallinn 2020, FINAL_PDF.pdf [accessed: 10.01.2022].
  • Dinstein Y., Aggression [term], [in:] Max Planck Encyclopedia of Public International Law, 09.2015, 9780199231690-e236 [accessed: 11.02.2022].
  • Dinstein Y., War, Aggression and Self-defence, 6th ed., Cambridge University Press, Cambridge 2017.
  • Dubuisson F., Lagerwall A., The threat of the use of force and ultimate, [in:] The Oxford Handbook of the Use of Force in International Law, ed. M. Weller, Oxford University Press, Oxford 2017.
  • European Civil Protection and Humanitarian Aid Operations, European Commission, centre-ercc_en [accessed: 10.01.2022].
  • Hathaway O.A., Crootof R., Levitz P., Nix H., Nowlan A., Perdue W., Spiegel J., The Law of Cyber-Attack, "California Law Review" 2012, Vol. 100, No. 4, pp. 817-886.
  • Heintschel von Heinegg W., Legal Implications of Territorial Sovereignty in Cyberspace, 4th International Conference on Cyber Conflict 2012, TerritorialSovereigntyInCyberspace.pdf [accessed: 20.03.2022].
  • How does the Integrated Political Crisis Response (IPCR) mechanism work?, Council of the EU, 2018, [accessed: 10.01.2022].
  • Jessup P., A Modern law of Nations, Archon Books, Hamden CT 1968.
  • Joint Communication to the European Parliament and the Council. The EU's Cybersecurity Strategy for the Digital Decade, High Representative of the Union for Foreign Affairs and Security Policy, 16.12.2020, [accessed: 1.06.2022].
  • Michael B., Responding to Attacks by Non-State Actors: The Attribution Requirement of Self-Defence, "Australian International Law Journal" 2019, Vol. 19, pp. 133-159.
  • Moynihan H., The application of international law to state cyberattacks. Sovereignty and Non-Intervention, Chatham House, London 2019.
  • Murphy S.D., Terrorism, and the Concept of "Armed Attack" in Article 51 of the UN Charter, "Harvard International Law Journal" 2002, Vol. 43, No. 1, pp. 41-51.
  • Mutual defence clause (Article 42.7 TEU), European Parliament, meetdocs/2009_2014/documents/sede/dv/sede200612mutualdefsolidarityclauses_/ sede200612mutualdefsolidarityclauses_en.pdf [accessed: 15.12.2021].
  • New EU Cybersecurity Strategy, and new rules to make physical and digital critical entities more resilient, European Commission, 16.12.2020, presscorner/detail/en/IP_20_2391 [accessed: 1.02.2022].
  • Pawlak P., Cybersecurity and Cyberdefence EU Solidarity and Mutual Defence Clauses, 06.2015, [accessed: 15.12.2021].
  • Randelzhofer A., [in:] The UN Charter of the United Nations, a commentary, eds B. Simma, D.-E. Khan, G. Nolte, A. Paulus, N. Wessendorf, 3th ed., Vol. 1, Oxford University Press, Oxford-New York 2012.
  • Rehrl J., Invoking the EU's Mutual Assistance Clause. What it says, what it means, Egmont Institute, 20.11.2015, [accessed: 14.01.2022].
  • Ruys T., Armed Attack and Article 51 of the UN Charter, Cambridge University Press, Cambridge 2010.
  • Sari A., The Mutual Assistance Clauses of the North Atlantic and EU Treaties: The Challenge of Hybrid Threats, "Harvard National Security Journal" 2019, Vol. 19, pp. 405-460.
  • Schinas M., Keynote speech of the European Commission Vice President, 17.02.2022, [accessed: 20.02.2022].
  • Schmitt M.N., "Attack" as a Term of Art in International Law: The Cyber Operations Context, [in:] 4th International Conference on Cyber Conflict, eds C. Czosseck, R. Ottis, K. Ziolkowski, NATO CCDCOE Publication, Tallin 2012, pp. 283-293.
  • Schmitt M.N., Tallin Manual on the International Law Applicable to Cyber Warfare, Cambridge, Cambridge University Press, 2013.
  • Schmitt M.N., The use of cyber force and international law, [in:] The Oxford Handbook of the Use of Force in International Law, ed. M. Weller, Oxford University Press, Oxford 2017, pp. 1110-1130.
  • Shah N.A., Self-defence Anticipatory Self-defence, and Pre-emption: International Law's Response to Terrorism, "Journal of Conflict and Security Law" 2017, Vol. 12, Issue 1, pp. 95-126.
  • Significant cyber incidents since 2006, Center for Strategic and International Studies, [accessed: 29.08.2022].
  • Suwara E., Article 42(7) of the Treaty on European Union and Non-state Actors: issues for Consideration, "Humanitäres Völkerrecht" 2022, Band 5, Heft 1-2, pp. 36-49.
  • Suwara E., Klauzula wzajemnej pomocy i wsparcia zawarta w art. 42 ust. 7 Traktatu o Unii Europejskiej, "Państwo i Prawo" 2018, nr 7, pp. 91-107.
  • Threat [term], [in:] Merriam-Webster Dictionary, [accessed: 11.02.2022].
  • Todd G.H., Armed attack in cyberspace: deterring asymmetric warfare with an asymmetric definition, "The Air Force Law Review" 2009, Vol. 19, pp. 65-102.
  • Upeniece V., Conditions for the legal commencement of an armed attack, [in:] 6th International Interdisciplinary Scientific Conference Society. Health. Welfare. 23-25 November 2016, Riga, ed. U. Berkis et al., EDP Sciences, 2018, pp. 1-7.
  • Van den Herik L.J., N.J. Schrijver, Leiden Policy Recommendations on Counter-terrorism and International Law, "Netherlands International Law Review" 2010, Vol. 57, Issue 3, pp. 531-550.
  • Victim [term], [in:] Merriam-Webster Dictionary, [accessed: 10.02.2022].
  • Wagner M., Non-State Actors, [in:] Max Planck Encyclopaedia of Public International Law, 07.2013, 9780199231690-e1445?prd=OPIL [accessed: 19.02.2022].
  • What is the Cyber Territory of a Country?, Nokia Bell Labs, 18.07.2019, https://docbox. RITY_POLICYACTIONS/01__CYBERSECURITY_ACT/NOKIA_Holtmanns.pdf [accessed: 28.03.2022].
  • Wilmshurst E., Principles of International Law on the Use of Force by States in Self-Defence, Chatham House, London 2005.
  • Armed Activities on the Territory of the Congo, DRC v. Uganda, International Court of Justice, ICJ Reports 2005, 168, [accessed: 30.11.2021].
  • Article 2(4), [ac- cessed: 13.01.2022].
  • Case concerning oil platforms Islamic Republic of Iran v. United States of America, International Court of Justice, ICJ Reports 2003, para. 161, case/90 [accessed: 30.11.2021].
  • Consolidated Version of the Treaty on European Union [2007], OJ. C. 326., 26.10.2012, 12012M TXT [accessed: 15.12.2021].
  • Council Decision (CFSP) 2019/797 of 17 May 2019 concerning restrictive measures against cyber-attacks threatening the Union or its Member States, Official Journal L 129I, L&from=EN [accessed: 20.02.2022].
  • Council Regulation (EU) 2019/796 of 17 May 2019 concerning restrictive measures against cyber-attacks threatening the Union or its Member States, Official Journal L 129I, L&from=EN [accessed: 20.02.2022].
  • Draft Council Conclusions on a Framework for a Joint EU Diplomatic Response to Malicious Cyber Activities ("Cyber Diplomacy Toolbox"), Document 9916/17, General Secretariat of the Council, 7.06.2017, CyberDiplomacyToolbox-1.pdf [accessed: 13.06.2022].
  • Draft Directive of the European Parliament and of the Council on the resilience of critical entities, COM/2020/829, European Commission, 16.12.2020, [accessed: 1.02.2022].
  • Draft Directive of the European Parliament, and the Council on measures for high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148, European Commission, 16.12.2020, [accessed: 1.02.2022].
  • Military and Paramilitary Activities in and against Nicaragua (Nicaragua v. United States of America), International Court of Justice, ICJ Reports 1986, case/70/judgments [accessed: 30.11.2021].
  • North Atlantic Treaty, Washington D.C. 4.04.1949, official_texts_17120.htm [accessed: 13.12.2021].
  • Protocol on the concerns of the Irish people on the Treaty of Lisbon, Official Journal of the European Union L 60/131, 2.03.2003, TXT/PDF/?uri=OJ:JOL_2013_060_R_0129_01&rid=3 [accessed: 13.01.2022].
  • Resolution on the mutual defence clause (Article 42(7) TEU), 2015/3034(RSP), European Parliament, 21.01.2016, [accessed: 15.12.2021].
  • The case of the S.S. "Lotus", Publications of the Permanent Court of International Justice, Series A, No. 10, 7.09.1927, international-justice/serie_A/A_10/30_Lotus_Arret.pdf [accessed: 15.08.2022].
  • UN General Assembly Resolution 3314 (XXIX) of 14 December 1974, doc. A/RES/29/3314, [accessed: 5.12.2021].
Typ dokumentu
Identyfikator YADDA

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.