Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Hacking (2)
- Sovereignty (2)
- Arbitration (1)
- Criminal procedure (1)
- Cyber attack (1)
-
- Cyber crime (1)
- Cyberlaw (1)
- Cybersecurity (1)
- Dark web (1)
- Encryption (1)
- Espionage (1)
- Foreign relations (1)
- Going dark (1)
- International Arbitration (1)
- International Law (1)
- International law (1)
- Jurisdiction (1)
- Law Enforcement (1)
- Law enforcement (1)
- Network Investigative Techniques (1)
- Network investigative techniques (1)
- Privacy (1)
- Res Judicata (1)
- Soft Law (1)
- Surveillance (1)
- Transnational Standards (1)
Articles 1 - 3 of 3
Full-Text Articles in Law
Soft Law And Transnational Standards In Arbitration: The Challenge Of Res Judicata, William W. Park
Soft Law And Transnational Standards In Arbitration: The Challenge Of Res Judicata, William W. Park
Faculty Scholarship
In international proceedings, a transnational “soft law” often finds expression in rules, guidelines and canons of professional associations which serve to supplement the “hard law” of national statutes and court decisions. Memorializing the experience of those who sit as arbitrators or serve as counsel, such standards contain a degree of circularity, in that relevant norms both derive from and apply to cross-border arbitration. Neither the nature nor the limits of “soft law” always present themselves with clarity. Often the litigants’ agreement fails to provide standards on controverted questions whose answers fall beyond common practice. In such instances, the integrity of …
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour
Faculty Scholarship
The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …
Tallinn, Hacking, And Customary International Law, Ahmed Ghappour
Tallinn, Hacking, And Customary International Law, Ahmed Ghappour
Faculty Scholarship
Tallinn 2.0 grapples with the application of general international law principles through various hypothetical fact patterns addressed by its experts. In doing so, its commentary sections provide a nonbinding framework for thinking about sovereignty, raising important considerations for states as they begin to articulate norms to resolve the question of precisely what kinds of nonconsensual cyber activities violate well-established international laws — a question that will likely be the focus of international lawyers in this area for some time to come.
This essay focuses on one area of state practice where states are already dealing with these issues: the use …