The research is aimed at developing scientific provisions that reveal the essence of axiological, substantive and structural changes that occur or will predictably occur in international public law in connection with the ever-increasing speed of development and implementation of information technologies in various spheres of society. The project focuses on three areas that pose challenges to the existing regulatory regime: the use of computer technology to influence and interfere in the affairs of other states; State deployment of mass electronic surveillance of citizens; introduction of technologies based on the use of autonomous robotic systems and artificial intelligence. The project is carried out in English by two learned mentors and six young researchers.
The seminar addressed the involvement of the social media platform Facebook in the event occurring in Myanmar in the past few years as well as the company’s role in the Cambridge Analytica scandal, specifically with regards to Cambridge Analytica’s involvement in the 2017 post-election violence in Kenya.
In her report presenter gave an overview of positive obligations of states with respect to mass surveillance.
In their report, the presenters (Alaa N. Assaf and Daniil Moshnikov) gave an overview of the theories and the practice regarding territorial sovereignty in cyberspace under international law.
In his report, G.I. Bogush has examined the relationship between the international legal responsibility of states and individual criminal liability for serious violations of international law, in the light of contemporary problems facing the international legal system.
A semninar on the topic «The International Legal Principle of Non-Interference and Deterence of Cyber-Operations» was held. In her talk the speaker - Vera Rusinova - tackled the question of whether and to what extent the principle of non-interference in matters within the domestic jurisdiction, being one of the basic principles of International Law, is applicable and able to effectively deter these ‘low-intensity cyber-operations’.