Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

International Law

Faculty Scholarship

Series

2017

Sovereignty

Articles 1 - 5 of 5

Full-Text Articles in Law

Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour Apr 2017

Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour

Faculty Scholarship

The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …


Trade Agreements, Regulatory Sovereignty And Democratic Legitimacy, Bernard Hoekman, Charles F. Sabel Jan 2017

Trade Agreements, Regulatory Sovereignty And Democratic Legitimacy, Bernard Hoekman, Charles F. Sabel

Faculty Scholarship

Governments increasingly are seeking to use bilateral and regional trade agreements to reduce the cost-increasing effects of differences in product market regulation. They also pursue regulatory cooperation independent of trade agreements. It is important to understand what is being done through bilateral or plurilateral mechanisms to address regulatory differences, and to identify what, if any, role trade agreements can play in supporting international regulatory cooperation. This paper reflects on experience to date in regulatory cooperation and the provisions of recent trade agreements involving advanced economies that have included regulatory cooperation. We argue for a re-thinking by trade officials of the …


Markets And Sovereignty, Joseph Blocher, Mitu Gulati Jan 2017

Markets And Sovereignty, Joseph Blocher, Mitu Gulati

Faculty Scholarship

The past few decades have witnessed the growth of an exciting debate in the legal academy about the tensions between economic pressures to commodify and philosophical commitments to the market inalienability of certain items. Sex, organs, babies, and college athletics are among the many topics that have received attention. The debates often have proceeded, however, as if they involve markets on one side and the state on the other, with the relevant question being the ways in which the latter can or should try to facilitate, restrict, or rely on the former. In this article, we approach the relationship between …


Tallinn, Hacking, And Customary International Law, Ahmed Ghappour Jan 2017

Tallinn, Hacking, And Customary International Law, Ahmed Ghappour

Faculty Scholarship

Tallinn 2.0 grapples with the application of general international law principles through various hypothetical fact patterns addressed by its experts. In doing so, its commentary sections provide a nonbinding framework for thinking about sovereignty, raising important considerations for states as they begin to articulate norms to resolve the question of precisely what kinds of nonconsensual cyber activities violate well-established international laws — a question that will likely be the focus of international lawyers in this area for some time to come.

This essay focuses on one area of state practice where states are already dealing with these issues: the use …


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …