Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

License To Kill: An Analysis Of The Legality Of Fully Autonomous Drones In The Context Of International Use Of Force Law, Andrew Figueroa Mar 2019

License To Kill: An Analysis Of The Legality Of Fully Autonomous Drones In The Context Of International Use Of Force Law, Andrew Figueroa

Pace International Law Review

We live in a world of constant technological change; and with this change, comes unknown effects and consequences. This is even truer with weapons and warfare. Indeed, as the means and methods of warfare rapidly modify and transform, the effects and consequences on the laws of war are unknown. This Article addresses one such development in weapon and warfare technology—Fully Autonomous Weapons or “Killer Robots”—and discusses the inevitable use of these weapons within the current international law framework. Recognizing the current, inadequate legal framework, this Article proposes a regulation policy to mitigate the risks associated with Fully Autonomous Weapons. But …


Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher Aug 2016

Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher

Pace International Law Review

Cyber-attacks take many forms, only some of which are applicable to the law of war. This Comment discusses only those attacks sponsored by a government or non-state entity that have the goal of affecting morale or gaining political advantage, or those attacks amounting to tactical strikes on state or civilian infrastructure. In that vein, this Comment proposes the adoption of a new legal framework for determining the threshold that marks a participant in such a cyber-attack as a “cyber-combatant” by adapting the framework set by the Geneva Conventions and existing custom. This definition should encompass cyber-attacks perpetrated by states, unrecognized …