Technology

[Jimena Sofía Viveros Álvarez serves as the Chief of Staff and Head Legal Advisor to Justice Loretta Ortiz at the Mexican Supreme Court as well as a member of the UN Secretary General's High-Level Advisory Body on AI. Her prior roles include national leadership positions at the Federal Judicial Council, the Ministry of Security, and the Ministry of Finance, where...

[Dr Ingvild Bode is Associate Professor at the Centre for War Studies, University of Southern Denmark.  She is the Principal Investigator of the European Research Council-funded project AutoNorms: Weaponised Artificial Intelligence, Norms, and Order (08/2020-07/2025) and also serves as the co-chair of the IEEE-SA Research Group on AI and Autonomy in Defence Systems. Anna Nadibaidze is a researcher for the European Research Council funded...

[Georgia Hinds is a Legal Adviser with the ICRC in Geneva, working on the legal and humanitarian implications of autonomous weapons, AI and other new technologies of warfare. Before joining the ICRC, she worked in the Australian Government, advising on public international law including international humanitarian and human rights law, and international criminal law, and served as a Reservist Officer...

[Marta Bo is a Senior Researcher at the T.M.C. Asser Institute and an Associate Senior Researcher at the Stockholm International Peace Research Institute (SIPRI).] [Jessica Dorsey is an Assistant Professor of International and European Law at Utrecht University and Managing Editor of Opinio Juris.] Against the backdrop of Israel’s military campaign in Gaza, noted as the most destructive in a century, and...

[Dr. Lauren Sanders is a Senior Research Fellow at the University of Queensland and a legal practitioner. She served in the Australian Army for several decades as a Signals Officer and Legal Officer.  This article represents the author’s personal views and does not reflect those of the Australian Defence Force or Australian Government.] Many States and regional and international organisations have espoused...

[Dr Guangyu Qiao-Franco is an Assistant Professor of International Relations at Radboud University and a Senior Researcher of the ERC funded AutoNorms Project at the University of Southern Denmark. ] [Mahmoud Javadi serves as an AI Governance Researcher at Erasmus University Rotterdam in The Netherlands. In this capacity, he plays a role in an EU-funded research consortium titled ‘Reignite Multilateralism via...

[Tsvetelina van Benthem is a postdoctoral research fellow at the Oxford Institute for Ethics, Law and Armed Conflict, lecturer in international law for the Oxford University Diplomatic Studies Programme and senior legal adviser at The Reckoning Project. She is a member of the core team of the Oxford Process on International Law Protections in Cyberspace, and regularly advises states and...

[Lieutenant General John (Jack) N.T. Shanahan retired from the United States Air Force in 2020 after a 36-year military career. In his final assignment he served as the inaugural Director of the U.S. Department of Defense Joint Artificial Center. As the first Director of the Algorithmic Warfare Cross-Functional Team (Project Maven), he established and led DoD’s pathfinder AI fielding program...

[Lena Trabucco is a visiting research fellow at the Stockton Center for International Law at the US Naval War College and a fellow in the Technology, Law & Security program at American University Washington College of Law.] [Magda Pacholska is a Marie Sklodowska-Curie postdoctoral fellow at the Asser Institute (The Hague), and a research fellow with the Tech, Law & Security...

[Mais Qandeel is a Senior Lecturer of International Law at Örebro University, Sweden. She holds a Ph.D. in international humanitarian law from the University of Fribourg, Switzerland.] Introduction Israel fully controls the Palestinian cyberspace and information and communications technologies (ICTs) infrastructure. It only allows the use of 3G in the West Bank and 2G in the Gaza Strip. In its current war,...

In a recent article in International Law Studies, I examined two competing positions concerning how sovereignty functions in cyberspace. The first position, "pure" sovereignty, holds that any low-intensity cyber operation that involves non-consensually penetrating a computer system located on another State’s territory violates the targeted State’s sovereignty. By contrast, the second position, "relative" sovereignty, rejects the idea that the mere...