Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in International Law
Politik Hukum Pengambilalihan Flight Information Region (Fir) Dari Singapura, Canris Bahri P.S
Politik Hukum Pengambilalihan Flight Information Region (Fir) Dari Singapura, Canris Bahri P.S
"Dharmasisya” Jurnal Program Magister Hukum FHUI
Sovereignty is one of the conditions for the establishment of a country, the sovereignty of the state is the full and highest power in a country to regulate its entire territory which includes land, water and air space above it without interference from the governments of other countries. State sovereignty in airspace based on the 1944 Chicago convention on International Civil Aviation is "Complete" and "Exclusive". Recognition of the Archipelago's Sovereignty based on the 1982 International Convention on the Law of the Sea (UNCLOS) also includes the air space above it. However, there are problems that arise in the implementation …
The Law And Politics Of Ransomware, Asaf Lubin
The Law And Politics Of Ransomware, Asaf Lubin
Articles by Maurer Faculty
What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between 20,000 and 30,000 per day in the United States alone. That is a ransomware attack every eleven seconds, each of which cost victims …
Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman
Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman
University of Miami Inter-American Law Review
To thwart a seemingly neve rending bombardment of cyberattacks, the U.S. Department of Defense recently implemented a new strategy – defending forward. This approach demands persistently engaging the enemy on a daily basis to disrupt cyber activity. Rather than waiting to be attacked, the United States is bringing the fight to the enemy. However, this strategy poses fascinating and complex questions of international law. In particular, because most defend forward operations fall within the gray zone of warfare, it remains unclear whether these operations violate the sovereignty of American adversaries or even third party nation states in whose cyberspace U.S. …
In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller
In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller
International Law Studies
States currently endorse three different positions concerning the international wrongfulness of cyber operations that penetrate computer systems located on the territory of another state but do not rise to the level of a use of force or prohibited intervention. The first position is that such low-intensity cyber operations are never wrongful, because sovereignty is a principle of international law, not a primary rule that can be independently violated. The second is that low-intensity cyber operations are always wrongful, because sovereignty is a primary rule of international law that is violated by any non-consensual penetration of a computer system located on …
Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin
Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin
Books & Book Chapters by Maurer Faculty
Professor Lubin's contribution is "Cyber Law and Espionage Law as Communicating Vessels," pp. 203-225.
Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws …
Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman
Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman
Faculty Scholarship
Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …
Tallinn, Hacking, And Customary International Law, Ahmed Ghappour
Tallinn, Hacking, And Customary International Law, Ahmed Ghappour
Faculty Scholarship
Tallinn 2.0 grapples with the application of general international law principles through various hypothetical fact patterns addressed by its experts. In doing so, its commentary sections provide a nonbinding framework for thinking about sovereignty, raising important considerations for states as they begin to articulate norms to resolve the question of precisely what kinds of nonconsensual cyber activities violate well-established international laws — a question that will likely be the focus of international lawyers in this area for some time to come.
This essay focuses on one area of state practice where states are already dealing with these issues: the use …
States, Markets, And Gatekeepers: Public-Private Regulatory Regimes In An Era Of Economic Globalization, Christopher M. Bruner
States, Markets, And Gatekeepers: Public-Private Regulatory Regimes In An Era Of Economic Globalization, Christopher M. Bruner
Michigan Journal of International Law
This Article illuminates the spectrum of international economic regimes through discussion of an under-theorized regulatory structure in which traditional distinctions between State and market, public and private power, hard and soft law, and international and domestic policy realms, essentially collapse-the "public-private gatekeeper."
The Internet As A Threat To Sovereignty? Thoughts On The Internet's Role In Strengthening National And Global Governance, Henry H. Perritt Jr.
The Internet As A Threat To Sovereignty? Thoughts On The Internet's Role In Strengthening National And Global Governance, Henry H. Perritt Jr.
All Faculty Scholarship
No abstract provided.