Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 164

Full-Text Articles in Entire DC Network

Maritime Incidents In The South China Sea: Measures Of Law Enforcement Or Use Of Force?, Aurel Sari Sep 2024

Maritime Incidents In The South China Sea: Measures Of Law Enforcement Or Use Of Force?, Aurel Sari

International Law Studies

China has sought to extend its control over the South China Sea at the expense of neighboring countries. In pursuing its goals, Beijing adopts a “power and law” approach, claiming extensive territorial and maritime rights in contravention of the UN Convention on the Law of the Sea and asserting these rights through coercive action in disputed waters. A key element of China’s strategy involves the use of coast guard and maritime militia vessels in an effort to portray its operations as measures of law enforcement, rather than displays of coercive power.

This article argues that the Chinese narrative of law …


Enhancing Accountability In Cyberspace Through A Three-Tiered International Governance Regime, Dan Efrony Aug 2024

Enhancing Accountability In Cyberspace Through A Three-Tiered International Governance Regime, Dan Efrony

International Law Studies

The Great Power Competition perpetuates the inability to reach a universal consensus on how to resolve normative ambiguity on the application of international law to cyberspace. Adhering to a strategy of ambiguity, the United States and its closest allies have been holding their rival States accountable for “irresponsible State behavior” in cyberspace, based on flawed legitimacy, as reflected in a weakened normative layer, and the national U.S. attribution process. Embracing collective attribution has not cured the flaws. The upshot is a poor framework for holding States accountable and an enduring vicious cycle. This article calls on the United States and …


The Defense Of Taiwan: Possible Legal Justifications, Raul (Pete) Pedrozo Aug 2024

The Defense Of Taiwan: Possible Legal Justifications, Raul (Pete) Pedrozo

International Law Studies

This article examines four possible interconnected legal arguments that can be used by the United States and its allies and partners to justify the defense of Taiwan in the event of a Chinese invasion of the island. First, the United States could recognize Taiwan as an independent nation. Second, the three joint communiqués between the United States and China are premised on an understanding that the Taiwan issue will be resolved by “peaceful” means. A Chinese invasion of Taiwan would certainly breech that understanding and allow the United States to recognize Taiwan as a sovereign State. Third, a Chinese invasion …


Collective Attribution In Cyberspace: A Rebranded Version Of Attribution Does Not Make It More Effective, Dan Efrony Jul 2024

Collective Attribution In Cyberspace: A Rebranded Version Of Attribution Does Not Make It More Effective, Dan Efrony

International Law Studies

The international community has been unsuccessful in establishing an effective legal framework for holding States accountable for cyber wrongdoing. Instead, official political attribution—collectively denouncing States for irresponsible conduct in cyberspace—has become a common substitute to encourage compliance with voluntary non-binding international norms. Since December 2017, the United States and United Kingdom, along with their closest allies, have embraced and implemented collective attributions and responses. They thereby seek to shape “rules of the road” for responsible State behavior in cyberspace and to enhance accountability and deterrence. However, these attributions rely primarily on the outcomes of American and British attribution processes that …


Cyberspace And The Jus Ad Bellum: The State Of Play, Michael N. Schmitt, Anusha S. Pakkam Apr 2024

Cyberspace And The Jus Ad Bellum: The State Of Play, Michael N. Schmitt, Anusha S. Pakkam

International Law Studies

This article examines how States are interpreting one aspect of the international law governing cyber activities, the jus ad bellum. The article focuses on two issues: (1) the prohibition on the use of force found in Article 2(4) of the UN Charter, and (2) the right of self-defense in Article 51. The critical unsettled question regarding the first issue is the threshold at which a hostile cyber operation can be characterized as a “use of force” subject to the prohibition of Article 2(4). Concerning the second issue, a number of unresolved questions plague the application of the right of …


Annotated Supplement To The Commander's Handbook On The Law Of Naval Operations Apr 2024

Annotated Supplement To The Commander's Handbook On The Law Of Naval Operations

International Law Studies

The Commander’s Handbook on the Law of Naval Operations is used in the United States and throughout the world as a restatement of U.S. doctrinal law positions on matters affecting the operations of the U.S. Navy, the U.S. Marine Corps, and the U.S. Coast Guard. Judge advocates and legal advisers have occasion to conduct deeper research to identify the context and source of the rules reflected in the Commander’s Handbook. Responding to this need, an Annotated Supplement to The Commander’s Handbook was produced in 1997 and published as volume 73 of International Law Studies. In the intervening decades, …


Chapter 10: Chemical, Biological, Radiological, And Nuclear Weapons Apr 2024

Chapter 10: Chemical, Biological, Radiological, And Nuclear Weapons

International Law Studies

The Commander’s Handbook on the Law of Naval Operations is used in the United States and throughout the world as a restatement of U.S. doctrinal law positions on matters affecting the operations of the U.S. Navy, the U.S. Marine Corps, and the U.S. Coast Guard. Judge advocates and legal advisers have occasion to conduct deeper research to identify the context and source of the rules reflected in the Commander’s Handbook. Responding to this need, an Annotated Supplement to The Commander’s Handbook was produced in 1997 and published as volume 73 of International Law Studies. In the intervening decades, …


“Unwilling Or Unable”, Lucy V. Jordan Mar 2024

“Unwilling Or Unable”, Lucy V. Jordan

International Law Studies

Critics of the unwilling or unable doctrine suggest that it could undermine the United Nations collective security system and argue that it requires an unacceptable ceding of a State’s territorial sovereignty. Increased reliance on the doctrine following the terrorist attacks of 9/11, particularly in relation to the use of force against ISIL in Syria since 2014, has caused the doctrine to face significant scrutiny. The purpose of this article is to ascertain whether the unwilling or unable doctrine has reached customary international law status. If found to be the case, the doctrine would confirm the right of States to act …


International Law And Acoustic Antagonism In East Asian Waters, Matt D. Montazzoli, John C. Tramazzo Feb 2024

International Law And Acoustic Antagonism In East Asian Waters, Matt D. Montazzoli, John C. Tramazzo

International Law Studies

This article analyzes a 2023 maritime incident in which the Chinese Navy Ship (CNS) Ningbo employed active sonar in the vicinity of His Majesty’s Australian Ship (HMAS) Toowoomba, while knowing that Toowoomba had divers in the water. The Chinese sonar caused injuries to the Australian divers. The article discusses the employment of acoustic devices to cause harm during peacetime and analyzes whether CNS Ningbo’s actions constituted a failure of "due regard" and other applicable legal regimes and norms. The article concludes that CNS Ningbo’s actions were an unlawful use of force and failed to demonstrate due regard, and that …


Naval War College Situation: Conflict In Gregoria And Tanaka: The Law Of Targeting, Project Director: Michael N. Schmitt Dec 2023

Naval War College Situation: Conflict In Gregoria And Tanaka: The Law Of Targeting, Project Director: Michael N. Schmitt

International Law Studies

This article addresses complex law of armed conflict (LOAC) issues posed by a scenario with eight “situations” examined during a tabletop workshop conducted by the U.S. Naval War College’s Stockton Center for International Law. Participants included judge advocates from the United States and uniformed legal advisors from Israel, the Netherlands, and the United Kingdom, all of whom had extensive experience providing legal advice on targeting. Also included were academics with particular expertise in the law of armed conflict. The situations were drafted to reflect situations some of the participants had faced in international or non-international armed conflict.

The scenario involves …


Does International Humanitarian Law Confer Undue Legitimacy On Violence In War?, Kieran R.J. Tinkler Sep 2023

Does International Humanitarian Law Confer Undue Legitimacy On Violence In War?, Kieran R.J. Tinkler

International Law Studies

International humanitarian law is lauded as a civilizing force that seeks to limit the effects of war for humanitarian reasons. There is, however, an increasing sense that IHL has facilitated rather than restrained military operations by conferring undue legitimacy on violence in war. This article focuses on the nature of the relationship between legitimacy and IHL to ascertain whether this is indeed the case. It concludes that, while IHL alone cannot confer "normative legitimacy" on battlefield conduct, it does frame "empirical legitimacy." Whether such legitimacy is unwarranted is, ultimately, best judged by reference to morality. Yet insistence on the pre-eminence …


The Legal Boundaries Of (Digital) Information Or Psychological Operations Under International Humanitarian Law, Tilman Rodenhäuser Sep 2023

The Legal Boundaries Of (Digital) Information Or Psychological Operations Under International Humanitarian Law, Tilman Rodenhäuser

International Law Studies

“Information operations” or “psychological operations” have long been part of armed conflicts. Among Western militaries, they are commonly understood as the employment of communication or other means to influence the views, attitudes, or behavior of adversaries or civilian populations to achieve political and military objectives. Chinese military strategy describes “psychological offense and defense” as “a combat action that uses specific information and media to influence the psychology and behavior of the target object through rational propaganda, deterrence and emotional guidance based on strategic intentions and combat missions.” Likewise, Russian military doctrine elaborates on concepts such as “psychological warfare” and on …


The Strategic Use Of Ransomware Operations As A Method Of Warfare, Jeffrey Biller Aug 2023

The Strategic Use Of Ransomware Operations As A Method Of Warfare, Jeffrey Biller

International Law Studies

This article examines the potential use and legal limitations of ransomware to achieve strategic effects in armed conflicts. Ransomware is defined here as the temporary encryption of data until some pre-condition is met to release the encryption. The article focuses on international law as applicable to a State’s use of ransomware against another State, where both are parties to an existing international armed conflict. The author finds that international humanitarian law does not currently prohibit most uses of ransomware against non-military related targets in armed conflicts. While the encryption of data may be a legal violation when it inhibits the …


The Newport Manual On The Law Of Naval Warfare, James Kraska, Raul "Pete" Pedrozo, David Letts, Wolff Heintschel Von Heinegg, Rob Mclaughlin, James Farrant, Yurika Ishii, Gurpreet S. Khurana, Koki Sato May 2023

The Newport Manual On The Law Of Naval Warfare, James Kraska, Raul "Pete" Pedrozo, David Letts, Wolff Heintschel Von Heinegg, Rob Mclaughlin, James Farrant, Yurika Ishii, Gurpreet S. Khurana, Koki Sato

International Law Studies

The Newport Manual on the Law of Naval Warfare is the first effort to restate the law of naval warfare as a purely lex lata exercise since 1955. It is designed to provide a practical guide for commanders and seafarers, lawyers and officials, and educators and students. In doing so, the Manual also factors in the developments in warfighting technologies in recent decades, which have significantly influenced the nature of war at sea.


Should Have Known Better? The Standard Of Knowledge For Command Responsibility In International Criminal Law, Roee Bloch May 2023

Should Have Known Better? The Standard Of Knowledge For Command Responsibility In International Criminal Law, Roee Bloch

International Law Studies

The criminal doctrine of command responsibility has a rich legal history, which makes it a widely recognized, if unsettled, concept of international criminal law. This article focuses on a key element of command responsibility: the commander’s knowledge of a subordinate's crimes. This article argues that current customary law instructs to apply a standard of actual knowledge of the commander, rather than the lower standard of constructive knowledge. The article reaches this conclusion by observing the primary shaping factor of international law—State behavior. Through the example of six diverse legal systems, the article demonstrates how the approach of legislative, executive, and …


Aid And Assistance As A “Use Of Force” Under The Jus Ad Bellum, Michael N. Schmitt, W. Casey Biggerstaff Apr 2023

Aid And Assistance As A “Use Of Force” Under The Jus Ad Bellum, Michael N. Schmitt, W. Casey Biggerstaff

International Law Studies

Although the prohibition of the use of force is a cornerstone of international law, our understanding of what constitutes a “use of force” under Article 2(4) of the UN Charter nonetheless continues to evolve. While the term was traditionally understood to mean armed force, emerging interpretations are expanding our understanding of the prohibition’s breadth. The Charter’s text, travaux préparatoires, and subsequent interpretations and practice by States, reinforced by the persuasive reasoning of the International Court of Justice, all confirm that the notion of force extends to indirect force, which includes military support provided to parties to a conflict. Yet, to …


The Shadow Of Success: How International Criminal Law Has Come To Shape The Battlefield, Gabriella Blum Mar 2023

The Shadow Of Success: How International Criminal Law Has Come To Shape The Battlefield, Gabriella Blum

International Law Studies

The rise of international criminal law (ICL) has undoubtedly contributed to the development and enforcement of international humanitarian law (IHL). Yet, there are also important and oft-overlooked ways in which it has done the opposite. By labeling certain violations of the laws of war as “criminal” and setting up dedicated mechanisms for prosecution and punishment of offenders, the content, practice, and logic of ICL are displacing those of IHL. With its doctrinal precision, elaborate institutions, and the seemingly irresistible claim of political and moral priority, ICL is overshadowing the more diffuse, less institutionalized, and more difficult to enforce IHL.

But …


Malware, A Device Under The 1988 Sua Convention, Michael Petta Mar 2023

Malware, A Device Under The 1988 Sua Convention, Michael Petta

International Law Studies

In 1988 the International Maritime Organization modernized international law in response to a vexing problem of the time—maritime terrorism. Before then, not all violent crimes against vessels amounted to piracy and therefore many maritime criminals escaped justice. To close this gap and facilitate the prosecution of those who endanger navigation, IMO member States enacted the 1988 Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation. More than three decades later, the 1988 SUA Convention may be useful to address a more modern problem—cyberattacks against commercial vessels. The 1988 treaty prohibits various acts against shipping, including the …


Russia-Ukraine Conflict: The War At Sea, Raul (Pete) Pedrozo Mar 2023

Russia-Ukraine Conflict: The War At Sea, Raul (Pete) Pedrozo

International Law Studies

Although much has been written about the Russia-Ukraine conflict, most writings have focused on land warfare. This article explores the conflict at sea and a host of legal issues arising from that aspect of the conflict. The article begins with a discussion of a series of events at sea that preceded the Russian invasion in 2022, including the Kerch Strait incidents and interference with freedom of navigation in the Black Sea. It then discusses multiple post-invasion legal issues involving the war at sea, including access to the Black Sea, maritime exclusion zones, naval mines, naval bombardment, unmanned maritime systems, targeting …


Some Reflections On The Threshold For International Armed Conflict And On The Application Of The Law Of Armed Conflict In Any Armed Conflict, T.D. Gill Oct 2022

Some Reflections On The Threshold For International Armed Conflict And On The Application Of The Law Of Armed Conflict In Any Armed Conflict, T.D. Gill

International Law Studies

This essay discusses the threshold of application of international humanitarian law (IHL) in both international (IAC) and non-international armed conflicts (NIAC). In relation to IAC it questions whether the International Committee of the Red Cross (ICRC) “first shot” approach is the most appropriate, since it opens the way for the intensification of conflicts beyond what is necessary in relation to relatively minor armed incidents and argues that the humanitarian protection clauses of IHL should be separated from the rules governing hostilities and makes a case for the application of ad bellum considerations of necessity and proportionality to act as a …


The Legal Requirement For Command And The Future Of Autonomous Military Platforms, Rain Liivoja, Eve Massingham, Simon Mckenzie Sep 2022

The Legal Requirement For Command And The Future Of Autonomous Military Platforms, Rain Liivoja, Eve Massingham, Simon Mckenzie

International Law Studies

Technologically advanced armed forces extensively use platforms that can be controlled remotely and do not require an on-board crew. Increasingly, these systems have the capacity to function with some degree of autonomy. The use of autonomous functionality is not specifically prohibited or regulated by the law of armed conflict but the use of autonomous functions in military systems remains governed by the general principles and rules of international law.

One existing international law concept may constrain the use of autonomous capabilities in military vessels and aircraft. This is the notion that military units must be “under the command” of an …


Enhancing The Security Of Shipping In Southeast Asia: The Relevance Of International Law, Robert Beckman Jun 2022

Enhancing The Security Of Shipping In Southeast Asia: The Relevance Of International Law, Robert Beckman

International Law Studies

This article outlines the principles of international law governing the right to exercise jurisdiction over ships. It then explains the relevance of UN international crimes conventions to the security of commercial ships. These conventions give States parties jurisdiction to arrest persons present in their territory who are alleged to have committed such crimes and an obligation to either prosecute or extradite them. It then explains the measures that have been taken by the International Maritime Organization to enhance the security of commercial shipping, including its Code of Practice on preventing piracy and “armed robbery against ships” and its measures to …


Active Resistance By Merchant Vessel Crews During International Armed Conflict Is Not “Direct Participation In Hostilities”, Robert Mclaughlin Apr 2022

Active Resistance By Merchant Vessel Crews During International Armed Conflict Is Not “Direct Participation In Hostilities”, Robert Mclaughlin

International Law Studies

Within the land, air, and cyber conflict contexts, the concept of "civilian direct participation in hostilities" has been subject to intense scrutiny, interpretive endeavor, and operational application over the last several decades. There is a risk, however, that interpretations and applications based on this experience may inappropriately permeate the law of naval warfare, where the scope of application of this concept is considerably narrower. This is because a key difference between allocating law of armed conflict status ashore and at sea is that the law of armed conflict status of people at sea tends to follow the status of their …


The Prohibition On Intervention Under International Law And Cyber Operations, Ori Pomson Mar 2022

The Prohibition On Intervention Under International Law And Cyber Operations, Ori Pomson

International Law Studies

Given that cyber technologies have made way for attempts to influence the affairs of other States in novel and unique ways, scholars have turned to the international legal rule which is prima facie most relevant in addressing such meddling; namely, the prohibition on intervention. Moreover, there appears to be quite a wide-ranging consensus in scholarship that the prohibition on intervention applies to a broad range of cyber operations. In contrast to such scholarship, this article argues that, under the lex lata, the prohibition on intervention only applies to acts amounting to a use of force or constituting support for …


Targeting A Satellite: Contrasting Considerations Between The Jus Ad Bellum And The Jus In Bello, Hitoshi Nasu Mar 2022

Targeting A Satellite: Contrasting Considerations Between The Jus Ad Bellum And The Jus In Bello, Hitoshi Nasu

International Law Studies

With the development and greater availability of counter-space capabilities, satellites are becoming a prime target of military threats. However, the legal assessment for the targeting of a satellite requires careful analysis because of its impacts on terrestrial activities and the potential to affect the rights and interests of third parties when their payloads are carried by the targeted satellite. With these two unique characteristics in mind, this article unravels the complexity of international legal regimes applicable to military operations conducted against a satellite by contrasting threshold legal considerations necessary for the identification and application of relevant legal requirements under the …


Newport Rules Of Engagement Handbook Feb 2022

Newport Rules Of Engagement Handbook

International Law Studies

The Newport Rules of Engagement Handbook is published as a guide for the development of national and multinational rules of engagement for military operations. Its purpose is to assist users in the development of ROE for training, exercises, war games, and operations.


Cyber Peacekeeping Operations And The Regulation Of The Use Of Lethal Force, Nicholas Tsagourias, Giacomo Biggio Feb 2022

Cyber Peacekeeping Operations And The Regulation Of The Use Of Lethal Force, Nicholas Tsagourias, Giacomo Biggio

International Law Studies

Peacekeeping is an essential tool at the disposal of the United Nations for the maintenance of international peace and security. The growing relevance of cyber technologies presents itself as an opportunity to adapt peacekeeping to the challenges of a rapidly evolving security landscape. This article introduces the notion of "cyber-peacekeeping," defined as the incorporation and use of cyber capabilities by peacekeepers. It discusses the legal basis for cyber-peacekeeping and the foundational principles of consent, impartiality, and use of defensive force. The article examines the use of lethal force by cyber-peacekeepers under the law of armed conflict paradigm. It considers the …


Drawing The Cyber Baseline: The Applicability Of Existing International Law To The Governance Of Information And Communication Technologies, Dapo Akande, Antonio Coco, Talita De Souza Dias Feb 2022

Drawing The Cyber Baseline: The Applicability Of Existing International Law To The Governance Of Information And Communication Technologies, Dapo Akande, Antonio Coco, Talita De Souza Dias

International Law Studies

"Cyberspace" is often treated as a new domain of State activity in international legal discourse. This has led to the assumption that for international law to apply to cyber operations carried out by States or non-State actors, "cyber-specific" State practice and opinio juris must be demonstrated. This article challenges that assumption on five different bases. First, it argues that rules of general international law are generally applicable to all domains, areas, or types of State activity. In their interpretation and application to purported new domains, limitations to their scope of application cannot be presumed. Second, this article demonstrates that the …


In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller Oct 2021

In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller

International Law Studies

States currently endorse three different positions concerning the international wrongfulness of cyber operations that penetrate computer systems located on the territory of another state but do not rise to the level of a use of force or prohibited intervention. The first position is that such low-intensity cyber operations are never wrongful, because sovereignty is a principle of international law, not a primary rule that can be independently violated. The second is that low-intensity cyber operations are always wrongful, because sovereignty is a primary rule of international law that is violated by any non-consensual penetration of a computer system located on …


The Plea Of Necessity: An Oft Overlooked Response Option To Hostile Cyber Operations, Louise Arimatsu, Michael N. Schmitt Aug 2021

The Plea Of Necessity: An Oft Overlooked Response Option To Hostile Cyber Operations, Louise Arimatsu, Michael N. Schmitt

International Law Studies

States are increasingly focused on the measures—cyber or otherwise—that they can take in response to hostile cyber operations. Although cyber operations are usually responded to with acts of “retorsion” (acts that are lawful, although unfriendly), international law recognizes other self-help mechanisms that allow for more robust responses. In the cyber context, most attention has focused on countermeasures and self-defense. Yet, both are subject to various limitations that constrain their availability.

This article examines a further option, the so-called “plea of necessity.” It allows States to respond to a hostile cyber operation when the action taken would otherwise be unlawful but …