Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Regulation-Tolerant Weapons, Regulation-Resistant Weapons And The Law Of War, Sean Watts Aug 2015

Regulation-Tolerant Weapons, Regulation-Resistant Weapons And The Law Of War, Sean Watts

International Law Studies

The historical record of international weapons law reveals both regulation-tolerant weapons and regulation-resistant weapons, identifiable by a number of criteria, including effectiveness, novelty, deployment, medical compatibility, disruptiveness and notoriety. This article identifies these criteria both to explain and inform existing weapons law, and also to facilitate efforts to identify weapons and emerging technology that may prove susceptible to future law of war regulation. By charting both the history and methodology of weapons law with a view toward identifying forces and influences that have made some weapons susceptible to international regulation and made others resistant, this article offers a starting point …


Emerging Technologies And Loac Signaling, Eric Talbot Jensen Aug 2015

Emerging Technologies And Loac Signaling, Eric Talbot Jensen

International Law Studies

As States seek to weaponize new technologies such as robotics, cyber tools and nanotechnology, the current law of armed conflict (LOAC) that guides the employment of existing weapons will signal rules and principles that should guide national decisions on what new technologies to weaponize and how to do so in a way that ensures compliance with battlefield regulation. LOAC has served this "signaling" function historically with respect to innovative weapon systems such as balloons, submarines, airplanes, and nuclear weapons, and will continue to do so as nations look forward to potentially weaponizing emerging technologies.


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Law Of War Developments Issue Introduction, David Glazier Apr 2015

Law Of War Developments Issue Introduction, David Glazier

Loyola of Los Angeles Law Review

No abstract provided.


Regulating Cyber-Security, Nathan Alexander Sales Jan 2015

Regulating Cyber-Security, Nathan Alexander Sales

Northwestern University Law Review

The conventional wisdom is that this country’s privately owned critical infrastructure—banks, telecommunications networks, the power grid, and so on—is vulnerable to catastrophic cyber-attacks. The existing academic literature does not adequately grapple with this problem, however, because it conceives of cyber-security in unduly narrow terms: most scholars understand cyber-attacks as a problem of either the criminal law or the law of armed conflict. Cyber-security scholarship need not run in such established channels. This Article argues that, rather than thinking of private companies merely as potential victims of cyber-crimes or as possible targets in cyber-conflicts, we should think of them in administrative …