Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Columbia Journal of Transnational Law (3)
- Chinese People's Liberation Army (1)
- Columbia Law Review (1)
- Computer crime (1)
- Constitutional text (1)
-
- Cross-border hacking (1)
- Cyber conflict (1)
- Cyber espionage (1)
- Decentralized system (1)
- Distributed Denial of Service (DDoS) (1)
- Duke Journal of Comparative and International Law (1)
- Global War on Terror (1)
- Good faith reliance (1)
- International Law Commission (ILC) (1)
- International criminal law (1)
- International law (1)
- Law enforcement (1)
- Law of Armed Conflict (LOAC) (1)
- Malicious software (1)
- Manifest illegality (1)
- Manifest unlawfulness (1)
- Non-international armed conflict (NIAC) (1)
- Objective test (1)
- Piracy attack (1)
- Piracy laws (1)
- Piracy tribunal (1)
- Pirate attack (1)
- Political practice (1)
- Significance approach (1)
- Sole executive agreement (1)
Articles 1 - 5 of 5
Full-Text Articles in Law
International Dealmaking At The White House: Toward A Viable Test Of Allowable Sole Executive Agreements, Joshua Abbuhl
International Dealmaking At The White House: Toward A Viable Test Of Allowable Sole Executive Agreements, Joshua Abbuhl
National Security Law Program
The Constitution's Treaty Clause states that the President "shall have Power, by and with the Advice and Consent of the Senate, to make Treaties, provided two thirds of the Senators present concur." This clause represents the only instance in which the Constitution describes a process by which the United States can conclude agreements with foreign governments. However, the President regularly enters international agreements on his own authority and without the assent of a supermajority of the Senate. This Note explores when the President may lawfully enter such agreements, known as "sole executive agreements."
Using Force On Land To Suppress Piracy At Sea: The Legal Landscape Of A Largely Untapped Strategy, Steven R. Obert
Using Force On Land To Suppress Piracy At Sea: The Legal Landscape Of A Largely Untapped Strategy, Steven R. Obert
National Security Law Program
On May 14, 2012, a combat helicopter operated by European Union Naval Forces (EUNAVFOR) struck a pirate base ashore in Somalia. The raid destroyed several fiberglass skiffs on the beach in Haradheere, a town on the coast of central Somalia. The attack represented a new tactic used in the protracted and evolving international effort to fight maritime piracy off the coast of Somalia. It was the first time that force ashore, first authorized by the United Nations Security Council in 2008, had been publicly acknowledged.
Though recently receding, piracy off the coast of Somalia has had a destabilizing effect on …
Hackback: Permitting Retaliatory Hacking By Non-State Actors As Proportionate Countermeasures To Transboundary Cyberharm, Jan E. Messerschmidt
Hackback: Permitting Retaliatory Hacking By Non-State Actors As Proportionate Countermeasures To Transboundary Cyberharm, Jan E. Messerschmidt
National Security Law Program
Cyberespionage has received even greater attention in the wake of reports of persistent and brazen cyberexploitation of U.S. and Canadian firms by the Chinese military. But the recent disclosures about NSA surveillance programs have made clear that a national program of cyberdefense of private firms' intellectual property is politically infeasible. Following the lead
of companies like Google, private corporations may increasingly resort to the use of self-defense, hacking back against cross-border incursions on the Internet. Most scholarship, however, has surprisingly viewed such actions as outside the ambit of international law. This Note provides a novel account of how international law …
Changing Tides: An Adaptable Prosecution Approach To Piracy’S Shifting Problem, Jessica Piquet
Changing Tides: An Adaptable Prosecution Approach To Piracy’S Shifting Problem, Jessica Piquet
National Security Law Program
Although piracy off the coast of Somalia has captured worldwide attention, attacks in this region are decreasing while other regions are experiencing increases in pirate activity. This Note expands upon prior research into prosecution models for combatting piracy off the coast of Somalia to determine the adaptability and sustainability of these methods as applied to piracy in other regions. In examining the three most common prosecution models currently used and proposed (prosecution by domestic courts in regional states, prosecution by the capturing state or by a state with a significant nexus to the attack, and prosecution by a specialized piracy …
"So Vast An Area Of Legal Irresponsibility"? The Superior Orders Defense And Good Faith Reliance On Advice Of Counsel, Mark W.S. Hobel
"So Vast An Area Of Legal Irresponsibility"? The Superior Orders Defense And Good Faith Reliance On Advice Of Counsel, Mark W.S. Hobel
National Security Law Program
This Note argues that the modern superior orders defense represents the most relevant and just paradigm for assessing the potential criminal liability of U.S. interrogators who claim that they were authorized and counseled by government lawyers prior to using techniques that likely constituted torture. However, recent U.S. law, most importantly sections of the Detainee Treatment Act of 2005, constitutes an extension of the superior orders defense as it would apply to interrogators, and may not only fully immunize government officials and agents involved in interrogations, but also disrupt emerging international legal norms surrounding the superior orders defense.
Part I of …