Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 128

Full-Text Articles in Entire DC Network

Cyberspace And The Jus Ad Bellum: The State Of Play, Michael N. Schmitt, Anusha S. Pakkam Apr 2024

Cyberspace And The Jus Ad Bellum: The State Of Play, Michael N. Schmitt, Anusha S. Pakkam

International Law Studies

This article examines how States are interpreting one aspect of the international law governing cyber activities, the jus ad bellum. The article focuses on two issues: (1) the prohibition on the use of force found in Article 2(4) of the UN Charter, and (2) the right of self-defense in Article 51. The critical unsettled question regarding the first issue is the threshold at which a hostile cyber operation can be characterized as a “use of force” subject to the prohibition of Article 2(4). Concerning the second issue, a number of unresolved questions plague the application of the right of …


Annotated Supplement To The Commander's Handbook On The Law Of Naval Operations Apr 2024

Annotated Supplement To The Commander's Handbook On The Law Of Naval Operations

International Law Studies

The Commander’s Handbook on the Law of Naval Operations is used in the United States and throughout the world as a restatement of U.S. doctrinal law positions on matters affecting the operations of the U.S. Navy, the U.S. Marine Corps, and the U.S. Coast Guard. Judge advocates and legal advisers have occasion to conduct deeper research to identify the context and source of the rules reflected in the Commander’s Handbook. Responding to this need, an Annotated Supplement to The Commander’s Handbook was produced in 1997 and published as volume 73 of International Law Studies. In the intervening decades, …


Chapter 10: Chemical, Biological, Radiological, And Nuclear Weapons Apr 2024

Chapter 10: Chemical, Biological, Radiological, And Nuclear Weapons

International Law Studies

The Commander’s Handbook on the Law of Naval Operations is used in the United States and throughout the world as a restatement of U.S. doctrinal law positions on matters affecting the operations of the U.S. Navy, the U.S. Marine Corps, and the U.S. Coast Guard. Judge advocates and legal advisers have occasion to conduct deeper research to identify the context and source of the rules reflected in the Commander’s Handbook. Responding to this need, an Annotated Supplement to The Commander’s Handbook was produced in 1997 and published as volume 73 of International Law Studies. In the intervening decades, …


Naval War College Situation: Conflict In Gregoria And Tanaka: The Law Of Targeting, Project Director: Michael N. Schmitt Dec 2023

Naval War College Situation: Conflict In Gregoria And Tanaka: The Law Of Targeting, Project Director: Michael N. Schmitt

International Law Studies

This article addresses complex law of armed conflict (LOAC) issues posed by a scenario with eight “situations” examined during a tabletop workshop conducted by the U.S. Naval War College’s Stockton Center for International Law. Participants included judge advocates from the United States and uniformed legal advisors from Israel, the Netherlands, and the United Kingdom, all of whom had extensive experience providing legal advice on targeting. Also included were academics with particular expertise in the law of armed conflict. The situations were drafted to reflect situations some of the participants had faced in international or non-international armed conflict.

The scenario involves …


Does International Humanitarian Law Confer Undue Legitimacy On Violence In War?, Kieran R.J. Tinkler Sep 2023

Does International Humanitarian Law Confer Undue Legitimacy On Violence In War?, Kieran R.J. Tinkler

International Law Studies

International humanitarian law is lauded as a civilizing force that seeks to limit the effects of war for humanitarian reasons. There is, however, an increasing sense that IHL has facilitated rather than restrained military operations by conferring undue legitimacy on violence in war. This article focuses on the nature of the relationship between legitimacy and IHL to ascertain whether this is indeed the case. It concludes that, while IHL alone cannot confer "normative legitimacy" on battlefield conduct, it does frame "empirical legitimacy." Whether such legitimacy is unwarranted is, ultimately, best judged by reference to morality. Yet insistence on the pre-eminence …


The Legal Boundaries Of (Digital) Information Or Psychological Operations Under International Humanitarian Law, Tilman Rodenhäuser Sep 2023

The Legal Boundaries Of (Digital) Information Or Psychological Operations Under International Humanitarian Law, Tilman Rodenhäuser

International Law Studies

“Information operations” or “psychological operations” have long been part of armed conflicts. Among Western militaries, they are commonly understood as the employment of communication or other means to influence the views, attitudes, or behavior of adversaries or civilian populations to achieve political and military objectives. Chinese military strategy describes “psychological offense and defense” as “a combat action that uses specific information and media to influence the psychology and behavior of the target object through rational propaganda, deterrence and emotional guidance based on strategic intentions and combat missions.” Likewise, Russian military doctrine elaborates on concepts such as “psychological warfare” and on …


The Strategic Use Of Ransomware Operations As A Method Of Warfare, Jeffrey Biller Aug 2023

The Strategic Use Of Ransomware Operations As A Method Of Warfare, Jeffrey Biller

International Law Studies

This article examines the potential use and legal limitations of ransomware to achieve strategic effects in armed conflicts. Ransomware is defined here as the temporary encryption of data until some pre-condition is met to release the encryption. The article focuses on international law as applicable to a State’s use of ransomware against another State, where both are parties to an existing international armed conflict. The author finds that international humanitarian law does not currently prohibit most uses of ransomware against non-military related targets in armed conflicts. While the encryption of data may be a legal violation when it inhibits the …


Should Have Known Better? The Standard Of Knowledge For Command Responsibility In International Criminal Law, Roee Bloch May 2023

Should Have Known Better? The Standard Of Knowledge For Command Responsibility In International Criminal Law, Roee Bloch

International Law Studies

The criminal doctrine of command responsibility has a rich legal history, which makes it a widely recognized, if unsettled, concept of international criminal law. This article focuses on a key element of command responsibility: the commander’s knowledge of a subordinate's crimes. This article argues that current customary law instructs to apply a standard of actual knowledge of the commander, rather than the lower standard of constructive knowledge. The article reaches this conclusion by observing the primary shaping factor of international law—State behavior. Through the example of six diverse legal systems, the article demonstrates how the approach of legislative, executive, and …


Aid And Assistance As A “Use Of Force” Under The Jus Ad Bellum, Michael N. Schmitt, W. Casey Biggerstaff Apr 2023

Aid And Assistance As A “Use Of Force” Under The Jus Ad Bellum, Michael N. Schmitt, W. Casey Biggerstaff

International Law Studies

Although the prohibition of the use of force is a cornerstone of international law, our understanding of what constitutes a “use of force” under Article 2(4) of the UN Charter nonetheless continues to evolve. While the term was traditionally understood to mean armed force, emerging interpretations are expanding our understanding of the prohibition’s breadth. The Charter’s text, travaux préparatoires, and subsequent interpretations and practice by States, reinforced by the persuasive reasoning of the International Court of Justice, all confirm that the notion of force extends to indirect force, which includes military support provided to parties to a conflict. Yet, to …


The Shadow Of Success: How International Criminal Law Has Come To Shape The Battlefield, Gabriella Blum Mar 2023

The Shadow Of Success: How International Criminal Law Has Come To Shape The Battlefield, Gabriella Blum

International Law Studies

The rise of international criminal law (ICL) has undoubtedly contributed to the development and enforcement of international humanitarian law (IHL). Yet, there are also important and oft-overlooked ways in which it has done the opposite. By labeling certain violations of the laws of war as “criminal” and setting up dedicated mechanisms for prosecution and punishment of offenders, the content, practice, and logic of ICL are displacing those of IHL. With its doctrinal precision, elaborate institutions, and the seemingly irresistible claim of political and moral priority, ICL is overshadowing the more diffuse, less institutionalized, and more difficult to enforce IHL.

But …


Some Reflections On The Threshold For International Armed Conflict And On The Application Of The Law Of Armed Conflict In Any Armed Conflict, T.D. Gill Oct 2022

Some Reflections On The Threshold For International Armed Conflict And On The Application Of The Law Of Armed Conflict In Any Armed Conflict, T.D. Gill

International Law Studies

This essay discusses the threshold of application of international humanitarian law (IHL) in both international (IAC) and non-international armed conflicts (NIAC). In relation to IAC it questions whether the International Committee of the Red Cross (ICRC) “first shot” approach is the most appropriate, since it opens the way for the intensification of conflicts beyond what is necessary in relation to relatively minor armed incidents and argues that the humanitarian protection clauses of IHL should be separated from the rules governing hostilities and makes a case for the application of ad bellum considerations of necessity and proportionality to act as a …


The Legal Requirement For Command And The Future Of Autonomous Military Platforms, Rain Liivoja, Eve Massingham, Simon Mckenzie Sep 2022

The Legal Requirement For Command And The Future Of Autonomous Military Platforms, Rain Liivoja, Eve Massingham, Simon Mckenzie

International Law Studies

Technologically advanced armed forces extensively use platforms that can be controlled remotely and do not require an on-board crew. Increasingly, these systems have the capacity to function with some degree of autonomy. The use of autonomous functionality is not specifically prohibited or regulated by the law of armed conflict but the use of autonomous functions in military systems remains governed by the general principles and rules of international law.

One existing international law concept may constrain the use of autonomous capabilities in military vessels and aircraft. This is the notion that military units must be “under the command” of an …


Targeting A Satellite: Contrasting Considerations Between The Jus Ad Bellum And The Jus In Bello, Hitoshi Nasu Mar 2022

Targeting A Satellite: Contrasting Considerations Between The Jus Ad Bellum And The Jus In Bello, Hitoshi Nasu

International Law Studies

With the development and greater availability of counter-space capabilities, satellites are becoming a prime target of military threats. However, the legal assessment for the targeting of a satellite requires careful analysis because of its impacts on terrestrial activities and the potential to affect the rights and interests of third parties when their payloads are carried by the targeted satellite. With these two unique characteristics in mind, this article unravels the complexity of international legal regimes applicable to military operations conducted against a satellite by contrasting threshold legal considerations necessary for the identification and application of relevant legal requirements under the …


Cyber Peacekeeping Operations And The Regulation Of The Use Of Lethal Force, Nicholas Tsagourias, Giacomo Biggio Feb 2022

Cyber Peacekeeping Operations And The Regulation Of The Use Of Lethal Force, Nicholas Tsagourias, Giacomo Biggio

International Law Studies

Peacekeeping is an essential tool at the disposal of the United Nations for the maintenance of international peace and security. The growing relevance of cyber technologies presents itself as an opportunity to adapt peacekeeping to the challenges of a rapidly evolving security landscape. This article introduces the notion of "cyber-peacekeeping," defined as the incorporation and use of cyber capabilities by peacekeepers. It discusses the legal basis for cyber-peacekeeping and the foundational principles of consent, impartiality, and use of defensive force. The article examines the use of lethal force by cyber-peacekeepers under the law of armed conflict paradigm. It considers the …


The Plea Of Necessity: An Oft Overlooked Response Option To Hostile Cyber Operations, Louise Arimatsu, Michael N. Schmitt Aug 2021

The Plea Of Necessity: An Oft Overlooked Response Option To Hostile Cyber Operations, Louise Arimatsu, Michael N. Schmitt

International Law Studies

States are increasingly focused on the measures—cyber or otherwise—that they can take in response to hostile cyber operations. Although cyber operations are usually responded to with acts of “retorsion” (acts that are lawful, although unfriendly), international law recognizes other self-help mechanisms that allow for more robust responses. In the cyber context, most attention has focused on countermeasures and self-defense. Yet, both are subject to various limitations that constrain their availability.

This article examines a further option, the so-called “plea of necessity.” It allows States to respond to a hostile cyber operation when the action taken would otherwise be unlawful but …


Application Of The Due Diligence Principle To Cyber Operations, Tomohiro Mikanagi Jul 2021

Application Of The Due Diligence Principle To Cyber Operations, Tomohiro Mikanagi

International Law Studies

The discreet use of proxies by States renders it difficult to prove attribution to States under the existing rules of attribution. On the other hand, the due diligence principle, if applicable, does not require attribution but can lead to the invocation of State responsibility for cyber operations emanating from the territory of other States. In the Corfu Channel judgment the ICJ recognized “every State’s obligation not to allow knowingly its territory to be used for acts contrary to the rights of other States,” and UN Member States agreed that existing international law applies to cyber operations. However, the UN Members …


Legal Advisers In The Field During Armed Conflict, Yoram Dinstein May 2021

Legal Advisers In The Field During Armed Conflict, Yoram Dinstein

International Law Studies

Additional Protocol I to the Geneva Conventions of 1949 requires that legal advisers be made available to military commanders, particularly during hostilities. This treaty stipulation was quite innovative in 1977, but it has achieved widespread implementation, even among non-Contracting Parties. It is noteworthy that the United States—which objects to numerous provisions of Additional Protocol I—does not dissent from the article requiring legal advisers. A study of the practice of States, made by the International Committee of the Red Cross, confirms that the norm requiring that legal advisers be made available to advise military commanders in time of armed conflict currently …


Neutrality And Cyberspace: Bridging The Gap Between Theory And Reality, Noam Neuman Apr 2021

Neutrality And Cyberspace: Bridging The Gap Between Theory And Reality, Noam Neuman

International Law Studies

While there exists a broad consensus among States that international law generally applies to the cyber domain, particular views regarding the applicability of the law of neutrality have rarely been put forward, and presently there seems to be insufficient State practice and domain-specific opinio juris in this regard. Against this backdrop, several attempts have been made throughout the years to apply certain neutrality rules to cyberspace by referring to analogies from other domains. However, this legal regime provides an emblematic example of what the introduction of traditional rules of international law, formulated with the physical domains of warfare in mind, …


Protection Of Data In Armed Conflict, Robin Geiss, Henning Lahmann Feb 2021

Protection Of Data In Armed Conflict, Robin Geiss, Henning Lahmann

International Law Studies

This article presents a novel way to conceptualize the protection of data in situations of armed conflict. Although the question of the targeting of data through adversarial military cyber operations and its implications for the qualification of such conduct under International Humanitarian Law has been on scholars’ and states’ radar for the last few years, there remain a number of misunderstandings as to how to think about the notion of “data.” Based on a number of fictional scenarios, the article clarifies the pertinent terminology and makes some expedient distinctions between various types of data. It then analyzes how existing international …


Legal Reviews Of War Algorithms, Tobias Vestner, Altea Rossi Feb 2021

Legal Reviews Of War Algorithms, Tobias Vestner, Altea Rossi

International Law Studies

States and scholars recognize legal reviews of weapons, means or methods of warfare as an essential tool to ensure the legality of military applications of artificial intelligence (AI). Yet, are existing practices fit for this task? This article identifies necessary adaptations to current practices. For AI-enabled systems that are used in relation to targeting, legal reviews need to assess the systems’ compliance with additional rules of international law, in particular targeting law under international humanitarian law (IHL). This article discusses the procedural ramifications thereof. The article further finds that AI systems’ predictability problem needs to be addressed by the technical …


Command Accountability For Ai Weapon Systems In The Law Of Armed Conflict, James Kraska Jan 2021

Command Accountability For Ai Weapon Systems In The Law Of Armed Conflict, James Kraska

International Law Studies

The use of artificial intelligence (AI) in weapon systems enhances the ability of operational forces to fuse multispectral sensors to understand the warfighting environment, positively identify, track, and select targets, and engage them with the most appropriate effects. The potential for AI to help close the “kill chain” has raised concern that this creates a gap in accountability between the decisions of humans and the acts of machines, with humans no longer accountable for decisions made during armed conflict. This study suggests that there is no gap because the military commander is always directly and individually accountable for the employment …


Israel’S Perspective On Key Legal And Practical Issues Concerning The Application Of International Law To Cyber Operations, Roy Schöndorf Jan 2021

Israel’S Perspective On Key Legal And Practical Issues Concerning The Application Of International Law To Cyber Operations, Roy Schöndorf

International Law Studies

The speech given by the Israeli Deputy Attorney General (International Law) at the Naval War College’s event on “Disruptive Technologies and International Law” sets out, for the first time, Israel’s position on the application of international law to cyber operations. Consistent with the position taken by the vast majority of States thus far, Israel considers that international law applies to such operations. The speech stresses that questions pertaining to the identification and application of relevant legal rules remain, given the profound differences between the cyber domain and traditional domains of warfare—land, sea, and air. Therefore, in Israel’s view, a cautious …


Encirclement, Deprivation, And Humanity: Revising The San Remo Manual Provisions On Blockade, Tom Dannenbaum Jan 2021

Encirclement, Deprivation, And Humanity: Revising The San Remo Manual Provisions On Blockade, Tom Dannenbaum

International Law Studies

Among the most pernicious trends in contemporary armed conflict is the return of mass starvation in war, in some cases as its primary source of human suffering. This has prompted a renewed focus on the relevant rules of international humanitarian law (IHL). On some issues, there is relative consensus. On the issue of deprivation by encirclement, however, there is confusion.

Some have questioned whether the prohibition on the starvation of civilians as a method of warfare applies to encirclements at all, particularly in the naval context. Others have interpreted the prohibition vanishingly narrowly. In contrast to the more extreme of …


Armed Conflicts In Outer Space: Which Law Applies?, Frans G. Von Der Dunk Jan 2021

Armed Conflicts In Outer Space: Which Law Applies?, Frans G. Von Der Dunk

International Law Studies

So far, outer space has merely become involved in terrestrial armed conflicts as part of the supportive infrastructure for military activities. Unfortunately, the risk that this changes is considerably growing, and it can no longer be excluded that (armed) force will become used in outer space, either directed towards Earth or within outer space itself.

This raises serious issues in the legal context, where space law so far has been premised on the hope that armed conflicts in outer space could be avoided whereas the law of armed conflict was not required so far to deal with the use of …


Responding To Hostile Cyber Operations: The “In-Kind” Option, Michael N. Schmitt, Durward E. Johnson Jan 2021

Responding To Hostile Cyber Operations: The “In-Kind” Option, Michael N. Schmitt, Durward E. Johnson

International Law Studies

Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of engagement. One of the major challenges in doing so is that key aspects of the international law governing cyber responses are vague, unsettled or complex. Not surprisingly, therefore, international law is markedly absent from strategies and operational concepts. Rather, they tend to take on a practical “tit-for-tat” feel as policymakers logically view “in-kind” responses as “fair play.” For them, responding in-kind surely must be lawful notwithstanding any challenges in discerning the precise legal character of the initial hostile cyber operation.

Testing that sense, this article examines the …


Common Article 1 And The Duty To "Ensure Respect", Michael N. Schmitt, Sean Watts Dec 2020

Common Article 1 And The Duty To "Ensure Respect", Michael N. Schmitt, Sean Watts

International Law Studies

Common Article 1 to the four 1949 Geneva Conventions requires Parties to those instruments to “respect and to ensure respect for the present Convention in all circumstances.” The provision is a corollary to the general international legal obligation of States to honor their treaty commitments, expressed classically in the maxim pacta sunt servanda.

Yet, academics and private organizations now use Common Article 1 as a vehicle to reimagine States’ enforcement obligations under the Geneva Conventions. Reinterpreting the article beyond its original meaning, they claim the article includes an “external” obligation—a duty on the part of all States to use …


Autonomous Cyber Weapons And Command Responsibility, Russell Buchan, Nicholas Tsagourias Dec 2020

Autonomous Cyber Weapons And Command Responsibility, Russell Buchan, Nicholas Tsagourias

International Law Studies

Autonomous cyber weapons have made their way onto the battlefield, raising the question of whether commanders can be held criminally responsible under command responsibility when war crimes are committed. The doctrine of command responsibility has a long history in international criminal law and comprises three core elements: the existence of a superior-subordinate relationship, the commander’s knowledge of the crime, and the commander’s failure to prevent or repress the subordinate’s criminal actions. This article unpacks the content of these elements and applies them to autonomous cyber weapons by treating them as being analogous to soldiers since they operate within an organized …


The Human Dimension Of Peace And Aggression, Chiara Redaelli Dec 2020

The Human Dimension Of Peace And Aggression, Chiara Redaelli

International Law Studies

Since the adoption of the Charter of the United Nations, the current international legal framework has drastically changed. In its traditional understanding, aggression is “the supreme international crime” aimed at protecting sovereignty and the territorial integrity of states. On the other hand, the U.N. Charter endorses an understanding of peace in the negative sense, that is, as mere absence of war. As human rights have gained momentum, they have helped reshape the legal landscape, a phenomenon referred to as the humanization of international law. How do peace and aggression fit within the humanized legal framework? This article will investigate the …


Autonomy And Precautions In The Law Of Armed Conflict, Eric Talbot Jensen Nov 2020

Autonomy And Precautions In The Law Of Armed Conflict, Eric Talbot Jensen

International Law Studies

Already a controversial topic, legal debate and broader discussions concerning the amount of human control required in the employment of autonomous weapons—including autonomous cyber capabilities—continues. These discussions, particularly those taking place among States that are Parties to the 1980 Certain Conventional Weapons Convention, reveal a complete lack of consensus on the requirement of human control and serve to distract from the more important question with respect to autonomy in armed conflict: under what conditions could autonomous weapons “select” and “attack” targets in a manner that complies with the law of armed conflict (LOAC).

This article analyzes the specific LOAC rules …


Will Cyber Autonomy Undercut Democratic Accountability?, Ashley Deeks Oct 2020

Will Cyber Autonomy Undercut Democratic Accountability?, Ashley Deeks

International Law Studies

In recent years, legislative bodies such as the U.S. Congress and the U.K. Parliament have struggled to maintain a role for themselves in government decisions to conduct military operations against foreign adversaries. Some of these challenges arise from constitutional structures, but they are also due to the changing nature of conflict: a shift away from large-scale kinetic operations and toward smaller-scale operations—including cyber operations—that are less visible and that do not require robust legislative support. These modern operations leave legislatures to engage in ex post and sometimes ineffective efforts to hold their executive branches accountable for international uses of force …