Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- International law (4)
- Law of war (2)
- Use of force (2)
- AUMF (1)
- Afghanistan (1)
-
- Air gaps (1)
- American (1)
- Antarctic Treaty System (1)
- Arctic Council (1)
- Arctic indigenous peoples (1)
- Attribution (1)
- Bargaining (1)
- Battle (1)
- Bribery (1)
- Causation (1)
- Citizens (1)
- Commission on the Limits of the Continental Shelf (1)
- Conditions to terminate a UN resolution (1)
- Conflict (1)
- Congress (1)
- Contracts (1)
- Convention on the Regulation of Antarctic Mineral Resource Activities (1)
- Counter-Terrorism (1)
- Court (1)
- Crimes against humanity (1)
- Criminal law (1)
- Critical infrastructure (1)
- Cyber attack (1)
- Cyberattack (1)
- Cybersecurity (1)
Articles 1 - 9 of 9
Full-Text Articles in International Relations
Polar Opposites: Assessing The State Of Environmental Law In The World’S Polar Regions, Mark Nevitt, Robert V. Percival
Polar Opposites: Assessing The State Of Environmental Law In The World’S Polar Regions, Mark Nevitt, Robert V. Percival
All Faculty Scholarship
Climate change is fundamentally transforming both the Arctic and Antarctic polar regions. Yet they differ dramatically in their governing legal regimes. For the past sixty years the Antarctic Treaty System (ATS), a traditional “hard law” international law treaty system, effectively de-militarized the Antarctic region and halted competing sovereignty claims. In contrast, the Arctic region lacks a unifying Arctic treaty and is governed by the newer “soft law” global environmental law model embodied in the Arctic Council’s collaborative work. Now climate change is challenging this model. It is transforming the geography of both polar regions, breaking away massive ice sheets in …
Ending Security Council Resolutions, Jean Galbraith
Ending Security Council Resolutions, Jean Galbraith
All Faculty Scholarship
The Security Council resolution implementing the Iran deal spells out the terms of its own destruction. It contains a provision that allows any one of seven countries to terminate its key components. This provision – which this Comment terms a trigger termination – is both unusual and important. It is unusual because, up to now, the Security Council has almost always either not specified the conditions under which resolutions terminate or used time-based sunset clauses. It is important not only for the Iran deal, but also as a precedent and a model for the use of trigger terminations in the …
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
All Faculty Scholarship
Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret
Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret
All Faculty Scholarship
The Utah Law Review brought in a panel of experts for a symposium on the legal and ethical limits of technological warfare. This roundtable discussion crystalized the issues discussed throughout the symposium. The collective experience and diversity of viewpoints of the panelists produced an unparalleled discussion of the complex and poignant issues involved in drone warfare. The open dialogue in the roundtable discussion created moments of tension where the panelists openly challenged each other’s viewpoints on the ethics and legality of drone warfare. The discussion captured in this transcript uniquely conveys the diversity of perspectives and inherently challenging legal and …
Advantaging Aggressors: Justice & Deterrence In International Law, Paul H. Robinson, Adil Ahmad Haque
Advantaging Aggressors: Justice & Deterrence In International Law, Paul H. Robinson, Adil Ahmad Haque
All Faculty Scholarship
Current international law imposes limitations on the use of force to defend against unlawful aggression that improperly advantage unlawful aggressors and disadvantage their victims. The Article gives examples of such rules, governing a variety of situations, showing how clearly unjust they can be. No domestic criminal law system would tolerate their use.
There are good practical reasons why international law should care that its rules are perceived as unjust. Given the lack of an effective international law enforcement mechanism, compliance depends to a large degree upon the moral authority with which international law speaks. Compliance is less likely when its …
Adoption Of The Responsibility To Protect, William W. Burke-White
Adoption Of The Responsibility To Protect, William W. Burke-White
All Faculty Scholarship
This book chapter traces the legal and political origins of the Responsibility to Protect doctrine from its early origins in the International Commission on Intervention and State Sovereignty through the 2005 World Summit Outcome Document and up to January 2011. The chapter examines the legal meaning of the Responsibility to Protect, the obligations the Responsibility imposes on states and international institutions, and its implications in for the international legal and political systems. The chapter argues that while the Responsibility to Protect has developed with extraordinary speed, it is still a norm in development rather than a binding legal rule. Its …
Bribes V. Bombs: A Study In Coasean Warfare, Gideon Parchomovsky, Peter Siegelman
Bribes V. Bombs: A Study In Coasean Warfare, Gideon Parchomovsky, Peter Siegelman
All Faculty Scholarship
The use of bribes to co-opt an enemy’s forces can be a more effective way to wage war than the conventional use of force: Relative to bombs, bribes can save lives and resources, and preserve civic institutions. This essay evaluates the efficacy and normative desirability of selectively substituting bribes for bombs as a means of warfare. We show how inter-country disparities in wealth, differences in military strength, the organization of the bribing and recipient forces, uncertainty about the outcome of the conflict, and communications technology can contribute to the efficacy of bribes. We discuss methods for enforcing bargains struck between …
Human Rights And National Security: The Strategic Correlation, William W. Burke-White
Human Rights And National Security: The Strategic Correlation, William W. Burke-White
All Faculty Scholarship
No abstract provided.