Recent Posts

Your weekly selection of international law and international relations headlines from around the world: Africa At least 21 people were killed in the capital of Central African Republic on Saturday and around 100 others were wounded as Muslims attacked a mainly Christian neighborhood, senior hospital officials and a government spokesman said.. A Norwegian-flagged ship that was held in Kenya for more than a...

Announcements Queen's University Belfast has announced a position for a Lecturer in Human Rights Law. The closing date on applications is 5 October 2015. See the vacancy here. Calls for Papers/Abstracts: The American Society of International Law's Lieber Society Announces a call for papers for the 2016 Richard R. Baxter Military Writing Prize. Persons submitting papers need not be ASIL members and can be...

States whose nationals died in the attack on MH17 were understandably upset when Russia vetoed a Security Council resolution that would have created an ad hoc tribunal to prosecute those responsible for the attack. Their idea to create a treaty-based court, however, is simply not helpful: Australia’s foreign minister, Julie Bishop, will meet with her counterparts from Belgium, Malaysia, the Netherlands and Ukraine on...

Yes, the "unwilling or unable" test marches on. The latest step forward is a Just Security blog post by Kate Martin, the Director of the Center for National Security Studies, that cites absolutely nothing in defense of the test other than another scholar who cites almost nothing in defense of the test. Here is what Martin says in the context of the UK's recent drone strikes...

[Dr. Başak Çalı is Director for the Center of Global Public Law and Associate Professor of International Law at Koç University, Turkey. She the secretary general of the European Society of International Law. The following is written in her personal capacity.] It is a rare event for international lawyers to overwhelmingly agree on the content, scope and interpretation of international law....

Thanks to Kevin Govern and Duncan Hollis for providing the two previous posts (here and here) in this book symposium on Cyber War: Law and Ethics for Virtual Conflicts. In my post, I want to explore the difficulties arising from causal investigations in cyber attacks. Everyone knows that the increasing threat of cyber attacks will place immense pressure on the operational capacities for...

The ICC has always had a legitimacy problem in Uganda. In particular, as Mark Kersten ably explained earlier this year, the Court is widely viewed by Ugandans as partial to Museveni, despite the fact that the OTP is supposedly investigating both the government and the LRA: From the outset, the ICC showcased a bias towards the Government of Yoweri Museveni. In 2004 and following months...

[Kevin Govern is Associate Professor of Law at Ave Maria School of Law.] The science fiction author William Gibson coined the term cyberspace in his short story, Burning Chrome (1982), before most of the public had a concept of, let alone experience with, using networked computer systems. Science fiction has given way to cyber reality, with 42.3% of the world’s population using the Internet on a regular basis, some 741% growth between 2000-2014 alone. At the same time, cyber weapons and cyber warfare are among the most dangerous innovations in recent years. Cyber weapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide ranging potential consequences. A non-exclusive list of some notable past cyber incidents includes but is not limited to: The US director of national intelligence, James Clapper, recently told the House intelligence committee the next phase of escalating online data theft most likely will involve manipulation of digital information, with a lower likelihood of a “cyber Armageddon” of digitally triggered damage to catastrophically damage physical infrastructure. Contemporaneous with this writing, a Chinese delegation met with representatives from the FBI, the intelligence community and the state, treasury and justice departments for a “frank and open exchange about cyber issues” amounting to “urgent negotiations…on a cybersecurity deal and may announce an agreement when President Chinese President Xi Jinping arrives in Washington on a state visit on Thursday [24 September].” In this era of great cyber peril and opportunity, my colleagues and co-editors Jens Ohlin from Cornell Law School and Claire Finkelstein from the University of Pennsylvania Law School and I had the privilege of contributing to and editing a book that assembles the timely and insightful writings of renowned technical experts, industrial leaders, philosophers, legal scholars, and military officers as presented at a Center for Ethics and the Rule of Law roundtable conference entitled Cyberwar and the Rule of Law. The collected work, Cyber War – Law and Ethics for Virtual Conflicts, explores cyber warfare’s moral and legal issues in three categories. First, it addresses foundational questions regarding cyber attacks. What are they and what does it mean to talk about a cyber war? State sponsored cyber warriors as well as hackers employ ever more sophisticated and persistent means to penetrate government computer systems; in response, governments and industry develop more elaborate and innovative defensive systems. The book presents alternative views concerning whether the laws of war should apply, whether transnational criminal law or some other peacetime framework is more appropriate, or if there is a tipping point that enables the laws of war to be used. Secondly, this work examines the key principles of the law of war, or jus in bello, to determine how they might be applied to cyber-conflicts, in particular those of proportionality and necessity. It also investigates the distinction between civilian and combatant in this context, and studies the level of causation necessary to elicit a response, looking at the notion of a “proximate cause.” Finally, it analyzes the specific operational realities implicated by cyber warfare technology employed and deployed under existing and potential future regulatory regimes. Here is the full Table of Contents:

If you haven’t seen it yet, the US recently filed its amicus brief in the Haiti Cholera appeal - it is available here: Haiti US amicus 2nd Circ. Predictably, the brief makes the case for absolute external UN immunity, and advances largely the same arguments put forward in prior filings. And yet, there are a number of powerful counterarguments to the position...