Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin Jun 2017

Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin

Cornell Law Faculty Publications

When it was revealed that the Russian government interfered in the 2016 U.S. presidential election by hacking into the email system of the Democratic National Committee and releasing its emails, international lawyers were divided over whether the cyber-attack violated international law. President Obama seemingly went out of his way to describe the attack as a mere violation of “established international norms of behavior,” though some international lawyers were more willing to describe the cyber-attack as a violation of international law. However, identifying the exact legal norm that was contravened turns out to be harder than it might otherwise appear. To …


Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour Apr 2017

Searching Places Unknown: Law Enforcement Jurisdiction On The Dark Web, Ahmed Ghappour

Faculty Scholarship

The use of hacking tools by law enforcement to pursue criminal suspects who have anonymized their communications on the dark web presents a looming flashpoint between criminal procedure and international law. Criminal actors who use the dark web (for instance, to commit crimes or to evade authorities) obscure digital footprints left behind with third parties, rendering existing surveillance methods obsolete. In response, law enforcement has implemented hacking techniques that deploy surveillance software over the Internet to directly access and control criminals’ devices. The practical reality of the underlying technologies makes it inevitable that foreign-located computers will be subject to remote …


Trade Agreements, Regulatory Sovereignty And Democratic Legitimacy, Bernard Hoekman, Charles F. Sabel Jan 2017

Trade Agreements, Regulatory Sovereignty And Democratic Legitimacy, Bernard Hoekman, Charles F. Sabel

Faculty Scholarship

Governments increasingly are seeking to use bilateral and regional trade agreements to reduce the cost-increasing effects of differences in product market regulation. They also pursue regulatory cooperation independent of trade agreements. It is important to understand what is being done through bilateral or plurilateral mechanisms to address regulatory differences, and to identify what, if any, role trade agreements can play in supporting international regulatory cooperation. This paper reflects on experience to date in regulatory cooperation and the provisions of recent trade agreements involving advanced economies that have included regulatory cooperation. We argue for a re-thinking by trade officials of the …


Markets And Sovereignty, Joseph Blocher, Mitu Gulati Jan 2017

Markets And Sovereignty, Joseph Blocher, Mitu Gulati

Faculty Scholarship

The past few decades have witnessed the growth of an exciting debate in the legal academy about the tensions between economic pressures to commodify and philosophical commitments to the market inalienability of certain items. Sex, organs, babies, and college athletics are among the many topics that have received attention. The debates often have proceeded, however, as if they involve markets on one side and the state on the other, with the relevant question being the ways in which the latter can or should try to facilitate, restrict, or rely on the former. In this article, we approach the relationship between …


Tallinn, Hacking, And Customary International Law, Ahmed Ghappour Jan 2017

Tallinn, Hacking, And Customary International Law, Ahmed Ghappour

Faculty Scholarship

Tallinn 2.0 grapples with the application of general international law principles through various hypothetical fact patterns addressed by its experts. In doing so, its commentary sections provide a nonbinding framework for thinking about sovereignty, raising important considerations for states as they begin to articulate norms to resolve the question of precisely what kinds of nonconsensual cyber activities violate well-established international laws — a question that will likely be the focus of international lawyers in this area for some time to come.

This essay focuses on one area of state practice where states are already dealing with these issues: the use …


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …