Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Scholarly Works

International Law

2021

Articles 1 - 2 of 2

Full-Text Articles in Law

Introduction To The Symposium On Frédéric Mégret, "Are There 'Inherently Sovereign Functions' In International Law?", Melissa J. Durkee Jan 2021

Introduction To The Symposium On Frédéric Mégret, "Are There 'Inherently Sovereign Functions' In International Law?", Melissa J. Durkee

Scholarly Works

Imagine a future in which the U.S. government has closed the postal service, shuttered its administrative apparatus, and stopped funding education. Confirmation battles have dismantled the federal judiciary, with most adjudication now performed by private arbitrators. After years of erosion of public standards, corporate environmental and labor practices are now left to voluntary self-regulation and market pressures. Private military and security companies command and regulate a vast military infrastructure, executing contracts to meet U.S. intelligence and defense requirements. Prisons have been fully privatized. After losing faith in elections, the U.S. populace no longer insists on them. The country is administered …


Self-Defense To Cyber Force: Combatting The Notion Of 'Scale And Effect', Thomas Eaton Jan 2021

Self-Defense To Cyber Force: Combatting The Notion Of 'Scale And Effect', Thomas Eaton

Scholarly Works

The ability to reach out, with a few keystrokes or a couple lines of code, through the interconnected world of cyberspace and create militarily advantageous effects 10,000 miles away has changed warfare as previously conceived, perhaps more than any other advancement in any other domain of war. Cyber weapons are weapons, and whatever law applies to conventional weapons equally applies to cyber weapons. Long before cyber operations were even science fiction, there was much debate over what constituted a use of force that would justify force in response. In many ways, the debate over what constitutes cyber-attacks has been pasted …