Technology

[Marta Bo is a Senior Researcher at the T.M.C. Asser Institute and an Associate Senior Researcher at the Stockholm International Peace Research Institute (SIPRI).] [Jessica Dorsey is an Assistant Professor of International and European Law at Utrecht University and Managing Editor of Opinio Juris.] Against the backdrop of Israel’s military campaign in Gaza, noted as the most destructive in a century, and...

[Dr. Lauren Sanders is a Senior Research Fellow at the University of Queensland and a legal practitioner. She served in the Australian Army for several decades as a Signals Officer and Legal Officer.  This article represents the author’s personal views and does not reflect those of the Australian Defence Force or Australian Government.] Many States and regional and international organisations have espoused...

[Dr Guangyu Qiao-Franco is an Assistant Professor of International Relations at Radboud University and a Senior Researcher of the ERC funded AutoNorms Project at the University of Southern Denmark. ] [Mahmoud Javadi serves as an AI Governance Researcher at Erasmus University Rotterdam in The Netherlands. In this capacity, he plays a role in an EU-funded research consortium titled ‘Reignite Multilateralism via...

[Tsvetelina van Benthem is a postdoctoral research fellow at the Oxford Institute for Ethics, Law and Armed Conflict, lecturer in international law for the Oxford University Diplomatic Studies Programme and senior legal adviser at The Reckoning Project. She is a member of the core team of the Oxford Process on International Law Protections in Cyberspace, and regularly advises states and...

[Lieutenant General John (Jack) N.T. Shanahan retired from the United States Air Force in 2020 after a 36-year military career. In his final assignment he served as the inaugural Director of the U.S. Department of Defense Joint Artificial Center. As the first Director of the Algorithmic Warfare Cross-Functional Team (Project Maven), he established and led DoD’s pathfinder AI fielding program...

[Lena Trabucco is a visiting research fellow at the Stockton Center for International Law at the US Naval War College and a fellow in the Technology, Law & Security program at American University Washington College of Law.] [Magda Pacholska is a Marie Sklodowska-Curie postdoctoral fellow at the Asser Institute (The Hague), and a research fellow with the Tech, Law & Security...

[Mais Qandeel is a Senior Lecturer of International Law at Örebro University, Sweden. She holds a Ph.D. in international humanitarian law from the University of Fribourg, Switzerland.] Introduction Israel fully controls the Palestinian cyberspace and information and communications technologies (ICTs) infrastructure. It only allows the use of 3G in the West Bank and 2G in the Gaza Strip. In its current war,...

In a recent article in International Law Studies, I examined two competing positions concerning how sovereignty functions in cyberspace. The first position, "pure" sovereignty, holds that any low-intensity cyber operation that involves non-consensually penetrating a computer system located on another State’s territory violates the targeted State’s sovereignty. By contrast, the second position, "relative" sovereignty, rejects the idea that the mere...

[Juliette McIntyre is a Lecturer in Law at the University of South Australia and a PhD candidate at the University of Melbourne. Audrey Plan is an ERC a postdoctoral researcher at University College Dublin's Sutherland School of Law.] Introduction The courtroom is, as Bentham once said, a ‘theatre of justice’. Like, fr bruh. Wait, what?  The last few weeks saw, perhaps for the first...

[Sara Dal Monico is a PhD fellow in International Law at Ca’ Foscari University of Venice] Digital Sequence Information of Genetic Resources These days (almost) anything can be stored digitally, even the DNA of a plant or seed. One of the latest and emerging debates which has taken over at the Conference of the Parties of December 2022 (CoP) of the Convention...