Hostes Humani Generis: Cyberspace, the Sea, and Sovereign Control

Open access


Cyberspace is a new global space that is yet not fully explored nor effectively regulated. The authors are not sketching a regulatory framework for cyberspace, but instead are inclined to glean valuable experience from the developments in the regulation of other global spaces, especially the sea. First, the peculiarities of cyberspace and cybercrime are briefly outlined. Then, the other global spaces are analysed drawing comparisons between exploration, appropriation and regulations of the sea and the air and cyberspace. The authors suggest that it is vital to learn lessons from the past in order to achieve an effective model of regulation of cyberspace. One of the main focus points of the paper is the position of a pirate and the ways of regulating piracy in different global spaces.

1. Armitage, David. “The Elephant and the Whale: Empires of Land and Sea.” Journal for Maritime Research 9 (1) (2007): 23-36.

2. Banner, Stuart. Who Owns the Sky? The Struggle to Control Airspace from the Wright Brothers On. Cambridge (MA): Harvard University Press, 2008.

3. Blau, John. “Battle Brewing over International Internet Regulation.” IEEESpectrum (December 2012) // regulation (accessed December 14, 2012).

4. Bodini, Stefano Piedimonte. “Fighting Maritime Piracy under the European Convention on Human Rights.” The European Journal of International Law 22 (3) (2011): 829-848.

5. Brenner, Susan W., and Marc D. Goodman. “The Emerging Consensus on Criminal Conduct in Cyberspace.” International Journal of Law and Information Technology 10 (2) (2002): 139-223.

6. Burgess, Douglas R. “Hostis Humani Generi: Piracy, Terrorism and a New International Law.” University of Miami International and Comparative Law Review 13 (2006): 293-341.

7. Cade, Nicholas W. “An Adaptive Approach for an Evolving Crime: The Case for an International Cyber Court and Penal Code.” Brooklyn Journal of International Law 37 (3) (2012): 1139-1175.

8. Caral, Jose MA. Emmanuel. “Lessons from ICANN: Is the Self-regulation of the Internet Fundamentally Flawed?” International Journal of Law and Information Technology 12 (1) (2004): 1-31.

9. Cerf, Vinton, Barry M. Leiner, David C. Clark, et al. “A Brief History of the Internet”, An International Electronic Publication of the Internet Society (1997) // (accessed December 17, 2012).

10. Chik, Warren B. “‘Customary Internet-tional Law’: Creating a Body of Customary Law to Cyberspace. Part 1: Developing Rules for Transitioning Custom into Law.” Computer Law & Security Review 26 (2010): 3-44.

11. Clough, Jonathan. “Cybercrime.” Commonwealth Law Bulletin 37 (4) (2011): 671-680.

12. Clough, Jonathan. “Data Theft? Cybercrime and the Increasing Criminalization of Access to Data.” Criminal Law Forum 22 (1) (2011): 145-170.

13. Connery, Christopher L. “Ideologies of Land and Sea: Alfred Thayer Mahan, Carl Schmitt, and the Shaping of Global Myth.” Elements 28 (2) (2001): 173-201.

14. De Leon, Pablo Mendes. “The Dynamics of Sovereignty and jurisdiction in International Aviation Law”: 483-496. In: Gerard Kreijen, ed. State,Sovereignty, and International Governance. Oxford and New York: Oxford University Press, 2002.

15. Dean, Mitchell. “Nomos: Word and Myth”: 242-258. In: Louiza Odysseos and Fabio Petito, eds. The International Political Thought of Carl Schmitt: Terror,Liberal War, and the Crisis of Global Order. Abingdon and New York: Routledge, 2007.

16. Dunlap, Charles J. “Towards a Cyberspace Legal Regime in the Twenty-First Century: Considerations for American Cyber-Warriors.” Nebraska Law Review 87 (2008-2009): 712-724.

17. Frazzetto, Mark. “A Maritime Model for Cyberspace Legal Governance.” The National Strategy Forum Review (September 19, 2011) // (accessed November 4, 2012).

18. Geiß, Robin, and Anna Petrig. Piracy and Armed Robbery at Sea. Oxford and New York: Oxford University Press, 2011.

19. Ghosh, Sumit, and Elliot Turrini. Cybercrimes: A Multidisciplinary Analysis. Heidelberg: Springer, 2010.

20. Grabosky, Peter. “The Global Dimension of Cybercrime.” Global Crime 6 (1) 2004: 146-157.

21. Greenleaf, Graham. “Regulating Cyberspace: Architecture vs Law?” Universityof New South Wales Law Journal 21 (2) (1998): 593-604.

22. Grewe, Wilhelm G. The Epochs of International Law. Berlin: Walter de Gruyter, 2000.

23. Guilfoyle, Douglas. “Piracy off Somalia: UN Security Council Resolution 1816 and IMO Regional Counter-Piracy Efforts.” International Criminal LawQuarterly 57 (2) (2008): 690-699.

24. Harris, Alexandra and Ray Harris. “The Need for Air Space and Outer Space Demarcation.” Space Policy 22 (2006): 3-7.

25. Hartogh, Den, and Cees Maris. “The Commencement of Modern Age”: 91-110. In: Cees Maris and Frans Jacobs, eds. Law, Order and Freedom: A Historical Introduction to Legal Philosophy. Heidelberg; Springer, 2011.

26. Illves, Toomas Hendrik. “It‘s the Economy, Stupid!” The Security Times (September 2012): 24.

27. “Internet Regulation: A Digital Cold War?” The Economist (December 14, 2012) // (accessed December 14, 2012).

28. Jarvie, Natasha. “Control of Cybercrime - Is an End to Our Privacy on the Internet a Price Worth Paying? Part 1.” Computer and Telecommunications Law Review 9 (3) (2003): 76-81.

29. Jarvie, Natasha. “Control of Cybercrime - Is an End to Our Privacy on the Internet a Price Worth Paying? Part 2.” Computer and Telecommunications Law Review 9 (4) (2003): 110-115.

30. Johnson, David and David Post. “Law and Borders - The Rise of Law in Cyberspace.” Stanford Law Review 48 (1996): 1367-1402.

31. Joint Chiefs of Staff, Department of Defense Dictionary of Military and Associated Terms. “Joint Publication 1-02” (2001) // (accessed November 4, 2012).

32. Judy, Henry L., and David Satola. “Business Interests Under Attack in Cyberspace: Is International Regulation the Right Response?” Business Law Today (December 2011) // (accessed November 4, 2012).

33. Kadens, Emily. “The Myth of the Customary Law Merchant.” Texas Law Review 90 (5) (2012): 1153-1206.

34. Kempe, Michael. “Beyond the Law. The Image of Piracy in the Legal Writings of Hugo Grotius”: 379-395. In: Hans W Blom, ed. Property, Piracy and Punishment: Hugo Grotius on War and Booty in De Iure Praedae - Conceptsand Contexts. Leiden: Brill, 2009.

35. Khalid, Nazery. “With a Little Help from My Friends: Maritime Capacity building Measures in the Straits of Malacca.” Contemporary Southeast Asia 31 (3) (2009): 424-446.

36. Klein, Natalie. Maritime Security and the Law of the Sea. Oxford and New York: Oxford University Press, 2011.

37. Kleinwachter, Wolfgang. “Internet Governance Outlook 2012: Cold War or Constructive Dialogue.” Communications Law 17 (1) (2012): 14-18.

38. Klimburg, Alexander. “Mobilising Cyber Power.” Survival: Global politics and Strategy 53 (1) (2011): 41-60.

39. Koops, Bert-Jaap. “The Internet and its Opportunities for Cybercrime”: 735-754. In: M Herzog-Evans, ed. Transnational Criminology Manual. Nijmegen: Wold Legal Publishers, 2010.

40. Lessig, Lawrence. “The Law of the Horse: What Cyberlaw Might Teach.” Harvard Law Review 113 (1999): 501-546.

41. Libicki, Martin C. Cyberdeterrence and Cyberwar. Santa Monica, Arlington, and Pittsburgh: The RAND Corporation, 2009.

42. Maier, Bernhard. “How Has the Law Attempted to Tackle the Borderless Nature of the Internet?” International Journal of Law and Information Technology 18 (2) (2010): 142-175.

43. Marder, Michael. Groundless Existence: The Political Ontology of Carl Schmitt. New York and London: Continuum, 2010.

44. Mayer, Franz C. “The Internet and Public International Law - Worlds Apart?” European Journal of International Law 12 (3) (2001): 612-622.

45. Menthe, Darrel C. “Jurisdiction In Cyberspace: A Theory of International Spaces.” Michigan Telecommunications Law Review 4 (1998): 69-103.

46. Newman, David. “Contemporary Research Agenda in Border Studies: An Overview”: 33-48. In: Doris Wastl-Walter, ed. The Ash gate Research Companion to Border Studies. Farnham and Burlington: Ashgate, 2011.

47. O’Donnovan, Oliver, and Joan Lockwood O’Donnovan. “Isidore of Seville”: 204-206. In: Oliver O’Donnovan and Joan Lockwood O’Donnovan, eds. From Irenaeus to Grotius: A Sourcebook in Christian Political Thought, 100-1625. Grand Rapids and Michigan: William B. Eerdmans Publishing, 1999.

48. Odysseos, Louiza, and Fabio Petito. “The International Political Thought of Carl Schmitt”: 1-18. In: Louiza Odysseos and Fabio Petito, eds. The International Political Thought of Carl Schmitt: Terror, Liberal War, and theCrisis of Global Order. Abingdon and New York: Routledge, 2007.

49. Orji, Uchenna Jerome. “An Analysis of China’s Regulatory Response to Cybersecurity.” Computer and Telecommunications Law Review 18 (7) (2012): 212-226.

50. Pardo, Arvid. “The Law of the Sea: Its Past and its Future.” Oregon Law Review 63 (1) (1984): 7-17.

51. Reed, Chris. “Online and Offline Equivalence: Aspiration and Achievement.” International Journal of Law and Information Technology 18 (3) (2010): 248-273.

52. Ronzitti, Natalino. “The Use of Private Contractors in the Fight against Piracy: Policy Options”: 37-53. In: Francesco Francioni and Natalino Ronzitti, eds. War by Contract: Human Rights, Humanitarian Law, and Private Contractors. Oxford and New York: Oxford University Press, 2011.

53. “Russia Calls for Internet Revolution.” Russia Today (May 28, 2012) // (accessed November 4, 2012).

54. Schmitt, Carl. The Nomos of the Earth in the International Law of Jus Publicum Europaeum. New York: Telos, 2003.

55. Scott, Jennifer. “ITU Internet Regulation Blocked by UK and US.” (December 14, 2012) // UK-and-US (accessed December 14, 2012).

56. Stahl, William M. “The Uncharted Waters of the Cyberspace: Applying the Principles of International Maritime Law to the Problem of Cybersecurity.” Georgia Journal of International and Comparative Law 40 (2011): 247-273.

57. Touloumis, Tara. “Buccaneers and Bucks from the Internet: Pirate Bay and the Entertainment Industry.” Seton Hall Journal of Sports & EntertainmentLaw 19 (2009): 253-281.

58. Treves, Tullio. “Piracy, Law of the Sea, and Use of Force: Developments off the Coast of Somalia.” European Journal of International Law 20 (2) (2009): 399-414.

59. US Department of State. “Fast Facts on United States Submitting Initial Proposals to World Telecom Conference” (August 1, 2012) // (accessed November 4, 2012).

60. Wang, James C. F. Handbook on Ocean Politics and Law. Westport: Greenwood Press, 1992.

61. Webb, Walter Prescott. The Great Frontier. Reno: University of Nevada Press, 2003.

62. Williams, Alison J. “A Crisis in Aerial Sovereignty? Considering the Implications of Recent Military Violations of National Airspace.” Area 42 (1) (2010): 51-59.

63. Williams, Alison J. “Blurring Boundaries / Sharpening Borders: Analysing the US’s Use of Military Aviation Technologies to Secure International Borders, 2001-2008”: 283-300. In: Doris Wastl-Walter, ed. The Ashgate ResearchCompanion to Border Studies. Farnham and Burlington: Ashgate, 2011.

64. Yar, Majid. “The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2 (2005): 407-427.

65. Zekos, Georgios I. “Globalisation and States’ Cyber- Territory.” Web Journalof Current Legal Issues 5 (2001) [pagination not available].

66. Zhou, Chenfeng Vincent, Christopher Leckie, and Shanika Karunasekera. “A Survey of Coordinated Attacks and Collaborative Intrusion Detection.” Computers & Security 19 (2010): 124-140.

1. Anglo-Norwegian Fisheries Case. I.C.J. Reports 1951, 116.

2. Convention on Cybercrime. Council of Europe. CETS no. 185 (Budapest; November 23, 2001).

3. eDate Advertising GmbH v X (C-509/09) and Olivier Martinez and RobertMartinez v MGN Limited (C-161/10). European Court of Justice. Opinion of Advocate General Cruz Villalon (March 29, 2011).

4. League against Racism and Antisemitism (LICRA), French Union of JewishStudents v Yahoo! Inc. (USA), Yahoo France. Tribunal de Grande Instance de Paris (The County Court of Paris). Interim Court Order (November 20, 2000). Electronic Business Law Reports 1(3) (2001): 110-120.

5. Medvedyev and Others v France. ECHR Grand Chamber. Application no. 3394/03 (March 29, 2010).

6. The Situation in Somalia. United Nations Security Council. Resolution no.

1816. UN Docs. S/RES/1816 (2008).

7. Towards a General Policy on the Fight against Cyber Crime. The Council and the Committee of the Regions. Communication from the Commission to the European Parliament. COM/2007/0267 Final. {SEC(2007) 641} {SEC(2007) 642}.

Baltic Journal of Law & Politics

A Journal of Vytautas Magnus University

Journal Information

CiteScore 2016: 0.13

SCImago Journal Rank (SJR) 2015: 0.102
Source Normalized Impact per Paper (SNIP) 2015: 0.276

Target Group researchers and scholars in the fields of law and politics, with an acute interest in the cross-pollinations of disciplines, comparative approaches to regional issues, and active dialogue on pressing contemporary issues of theoretical and practical import.


All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 88 88 12
PDF Downloads 19 19 6