Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- National security--Law and legislation (2)
- War (2)
- AJIL Unbound (1)
- American Journal of International Law Unbound (1)
- Amicus brief (1)
-
- Armed Attack (1)
- Asymmetric warfare (1)
- Chemical weapon (1)
- Columbia Law Review (1)
- Constitutional law (1)
- Cyber attack (1)
- Cyber law (1)
- Cyber-attacks (1)
- Cyber-warfare (1)
- Cyberspace (1)
- Cyberterrorism (1)
- Deterrence (1)
- Deterrence (Strategy) (1)
- Force (1)
- Global security (1)
- Hughes (1)
- Humanitarian crisis (1)
- International Law (1)
- International human rights law (1)
- International humanitarian law (1)
- International law (1)
- Interpretation (1)
- Jurisdiction (1)
- Jus ad bellum (1)
- Law of armed conflict (1)
Articles 1 - 7 of 7
Full-Text Articles in Law
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Faculty Scholarship
The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …
Brief Amici Curiae On Behalf Of International And Constitutional Law Experts In Support Of Petition For Certiorari, Al Bahlul V. United States , 840 F.3d 757 (D.C. Cir. 2016) (En Banc), Robert D. Sloane, Foley Hoag Llp
Brief Amici Curiae On Behalf Of International And Constitutional Law Experts In Support Of Petition For Certiorari, Al Bahlul V. United States , 840 F.3d 757 (D.C. Cir. 2016) (En Banc), Robert D. Sloane, Foley Hoag Llp
Faculty Scholarship
Amici curiae, legal experts in international and constitutional law, believe that a majority of the en banc panel in Bahlul v. United States, 840 F.3d 757 (D.C. Cir. 2016) (en banc), mistakenly affirmed Ali Hamza Ahmad Suliman al Bahlul’s conviction by a military commission for a non-international war crime. The main concurring opinion in that case misconceived how international law defines the jurisdiction of law-of-war military commissions. As amici argue below, it is the Constitution—not international law—that limits the jurisdiction of lawof-war military commissions.
"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr.
"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr.
Faculty Scholarship
If experts say a "malicious [cyber] code"' has "similar effects" to a "physical bomb,"' and that code actually causes "a stunning breach of global internet stability," is it really accurate to call that event merely an instance of a "cyber attack"?
Moreover, can you really expect to deter state and non-state actors from employing such code and similarly hostile cyber methodologies if all they think that they are risking is being labeled as a cyber-vandal subject only to law enforcement measures? Or might they act differently if it were made clear to them that such activity is considered an "armed …
Lawfare 101: A Primer, Charles J. Dunlap Jr.
Lawfare 101: A Primer, Charles J. Dunlap Jr.
Faculty Scholarship
Dunlap discusses the concept of lawfare—using law as a form of asymmetrical warfare—and provides some considerations for how to combat this phenomenon. The article establishes the intellectual framework and thematic direction for this Issue of Military Review.
Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman
Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman
Faculty Scholarship
Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …
Introduction To Symposium On Unauthorized Military Interventions For The Public Good, Monica Hakimi
Introduction To Symposium On Unauthorized Military Interventions For The Public Good, Monica Hakimi
Faculty Scholarship
On April 6, 2017, the United States launched fifty-nine Tomahawk missiles against an air base in Syria, after evidence surfaced that Bashar Al-Assad’s regime had again used chemical weapons against its people. President Trump announced that the strikes were intended “to prevent and deter the spread and use of deadly chemical weapons.” But as of this Symposium’s publication, the United States has not articulated a formal legal justification for the strikes. Instead, it reportedly circulated a document that listed several case-specific considerations that, in its view, justified the use of force. Yet the global reaction was overwhelmingly positive. Many states …
The Power To Wage War Successfully, Matthew C. Waxman
The Power To Wage War Successfully, Matthew C. Waxman
Faculty Scholarship
A century ago and in the midst of American involvement in World War I, future Chief Justice Charles Evans Hughes delivered one of the most influential lectures on the Constitution in wartime. In it he uttered his famous axiom that “the power to wage war is the power to wage war successfully.” That statement continues to echo in modern jurisprudence, though the background and details of the lecture have not previously been explored in detail. Drawing on Hughes’s own research notes, this Article examines his 1917 formulation and shows how Hughes presciently applied it to the most pressing war powers …