Defending the FSA Against Russia — the Jus ad Bellum Perspective

It's been widely reported over the past few days that Russia has been bombing the Free Syrian Army under the pretext of joining the fight against ISIS. That development spurred an interesting post at Lawfare by Bobby Chesney about whether Art. II of the Constitution -- the Commander-in-Chief Clause -- would permit the US to defend the FSA, which it has been...

The UN General Assembly is set to vote once again (for the 24th consecutive year) on a Cuba-sponsored resolution condemning the United States' economic, commercial, and financial embargo against Cuba.  This resolution will probably get near majority support, and perhaps even unanimous support.  Indeed, there are rumors that the U.S. government itself may abstain from voting against the resolution, which is...

[Matt Brown is a current LLM student at Leiden University, studying Public International Law, with a specific interest in international criminal law, transitional justice and cultural heritage law. He tweets about these and other topics @_mattbrown.] The International Criminal Court concerns itself with the ‘most serious crimes of concern to the international community.’ Often we understand this term to reflect examples...

Announcements Queen's University Belfast has announced a position for a Lecturer in Human Rights Law. The closing date on applications is 5 October 2015. See the vacancy here. Calls for Papers/Abstracts: The American Society of International Law's Lieber Society Announces a call for papers for the 2016 Richard R. Baxter Military Writing Prize. Persons submitting papers need not be ASIL members and can be...

States whose nationals died in the attack on MH17 were understandably upset when Russia vetoed a Security Council resolution that would have created an ad hoc tribunal to prosecute those responsible for the attack. Their idea to create a treaty-based court, however, is simply not helpful: Australia’s foreign minister, Julie Bishop, will meet with her counterparts from Belgium, Malaysia, the Netherlands and Ukraine on...

Yes, the "unwilling or unable" test marches on. The latest step forward is a Just Security blog post by Kate Martin, the Director of the Center for National Security Studies, that cites absolutely nothing in defense of the test other than another scholar who cites almost nothing in defense of the test. Here is what Martin says in the context of the UK's recent drone strikes...

The ICC has always had a legitimacy problem in Uganda. In particular, as Mark Kersten ably explained earlier this year, the Court is widely viewed by Ugandans as partial to Museveni, despite the fact that the OTP is supposedly investigating both the government and the LRA: From the outset, the ICC showcased a bias towards the Government of Yoweri Museveni. In 2004 and following months...

[Kevin Govern is Associate Professor of Law at Ave Maria School of Law.] The science fiction author William Gibson coined the term cyberspace in his short story, Burning Chrome (1982), before most of the public had a concept of, let alone experience with, using networked computer systems. Science fiction has given way to cyber reality, with 42.3% of the world’s population using the Internet on a regular basis, some 741% growth between 2000-2014 alone. At the same time, cyber weapons and cyber warfare are among the most dangerous innovations in recent years. Cyber weapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide ranging potential consequences. A non-exclusive list of some notable past cyber incidents includes but is not limited to: The US director of national intelligence, James Clapper, recently told the House intelligence committee the next phase of escalating online data theft most likely will involve manipulation of digital information, with a lower likelihood of a “cyber Armageddon” of digitally triggered damage to catastrophically damage physical infrastructure. Contemporaneous with this writing, a Chinese delegation met with representatives from the FBI, the intelligence community and the state, treasury and justice departments for a “frank and open exchange about cyber issues” amounting to “urgent negotiations…on a cybersecurity deal and may announce an agreement when President Chinese President Xi Jinping arrives in Washington on a state visit on Thursday [24 September].” In this era of great cyber peril and opportunity, my colleagues and co-editors Jens Ohlin from Cornell Law School and Claire Finkelstein from the University of Pennsylvania Law School and I had the privilege of contributing to and editing a book that assembles the timely and insightful writings of renowned technical experts, industrial leaders, philosophers, legal scholars, and military officers as presented at a Center for Ethics and the Rule of Law roundtable conference entitled Cyberwar and the Rule of Law. The collected work, Cyber War – Law and Ethics for Virtual Conflicts, explores cyber warfare’s moral and legal issues in three categories. First, it addresses foundational questions regarding cyber attacks. What are they and what does it mean to talk about a cyber war? State sponsored cyber warriors as well as hackers employ ever more sophisticated and persistent means to penetrate government computer systems; in response, governments and industry develop more elaborate and innovative defensive systems. The book presents alternative views concerning whether the laws of war should apply, whether transnational criminal law or some other peacetime framework is more appropriate, or if there is a tipping point that enables the laws of war to be used. Secondly, this work examines the key principles of the law of war, or jus in bello, to determine how they might be applied to cyber-conflicts, in particular those of proportionality and necessity. It also investigates the distinction between civilian and combatant in this context, and studies the level of causation necessary to elicit a response, looking at the notion of a “proximate cause.” Finally, it analyzes the specific operational realities implicated by cyber warfare technology employed and deployed under existing and potential future regulatory regimes. Here is the full Table of Contents:

Latin  America is a trendy place for ICJ litigation these days with Colombia, Nicaragua, Costa Rica, Chile and Bolivia all currently embroiled in ICJ cases.  Indeed, it seems like Nicaragua alone is generating almost half of the ICJ's current docket.  On Thursday (September 24), the ICJ will (finally) issue its ruling on Chile's preliminary objections to its jurisdiction over Bolivia's demand...

U.S. and Chinese negotiators are apparently very close to working out an agreement to limit the use of cyberweapons against each other.  There is talk that this agreement will be concluded before Chinese President Xi Jinping's state visit to the U.S. next week.  The agreement will be pretty narrow in scope and apparently would not address the acts of cyber-theft and espionage...