Suchergebnisse
Filter
32 Ergebnisse
Sortierung:
World Affairs Online
World Affairs Online
NON-FORCIBLE MEASURES AND THE LAW OF SELF-DEFENCE
In: The international & comparative law quarterly: ICLQ, Band 72, Heft 1, S. 1-33
ISSN: 1471-6895
AbstractThe right of self-defence is usually presented as an exception to the principle of non-use of force. Conventional wisdom therefore holds that the right of self-defence can only be relied on to justify those measures constituting a threat or use of force. This article rejects that claim. It argues that self-defence is a general right under international law and, as such, can be invoked to justify all measures necessary to repel an armed attack regardless of whether they are forcible or non-forcible in nature. To support this argument, this article examines the genesis of the right of self-defence under customary international law, the text of Article 51 of the United Nations Charter, the structure of the United Nations Charter and State practice on Article 51.
Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm
In: Journal of conflict & security law, Band 21, Heft 3, S. 429-453
ISSN: 1467-7962
Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm
In: Journal of conflict and security law, Band 21, Heft 3, S. 429-453
ISSN: 1467-7954
II. THE PALMER REPORT AND THE LEGALITY OF ISRAEL'S NAVAL BLOCKADE OF GAZA
In: The international & comparative law quarterly: ICLQ, Band 61, Heft 1, S. 264-273
ISSN: 1471-6895
On 3 January 2009 Israel deployed a naval blockade against Gaza in order to prevent materials entering or leaving Gaza that could be used by Hamas in its ongoing armed conflict with Israel.1 With the humanitarian crisis in Gaza worsening, on 31 May 2010 a flotilla of vessels carrying humanitarian aid expressed its intention to violate the naval blockade and deliver the aid to Gaza. Before violating the blockade and whilst still on the high seas, Israel sought to enforce its blockade and capture the vessels. This occurred largely without incident except in relation to the Mavi Marmara (a vessel sailing under the flag of the Comoros), which resisted capture by the Israeli special forces and continued to sail in the direction of Gaza. As Israel special forces boarded the Mavi violence ensued, with nine crew members of the Mavi being killed and dozens of others injured (principally Turkish nationals). Several members of Israel's special forces were also injured. Israel eventually assumed control of the ship and the crew members were detained and the vessel and its cargo confiscated.
Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?
In: Journal of conflict and security law, Band 17, Heft 2, S. 212-212
ISSN: 1467-7954
THE INTERNATIONAL LAW OF NAVAL BLOCKADE AND ISRAEL'S INTERCEPTION OF THE MAVI MARMARA
In: Netherlands international law review: NILR ; international law - conflict of laws, Band 58, Heft 2, S. 209-241
ISSN: 1741-6191
International Community and the Occupation of Iraq
In: Journal of conflict and security law, Band 12, Heft 1, S. 37-64
ISSN: 1467-7954
Hacking international organizations: The role of privileges, immunities, good faith and the principle of State sovereignty
In: International review of the Red Cross: humanitarian debate, law, policy, action, Band 104, Heft 919, S. 1171-1198
ISSN: 1607-5889
AbstractThis article examines the extent to which international law protects international organizations (IOs) from hacking operations committed by States. First, it analyzes whether hacking operations undertaken by member States and host States breach the privileges and immunities granted to IOs by their constitutive treaties, headquarters agreements, and conventions on privileges and immunities concerning the inviolability of their premises, property, assets, archives, documents and correspondence. The article also explores the question of whether hacking operations carried out by non-member States breach these provisions on the basis that they have passed into customary international law or because they attach to the international legal personality of IOs. Second, the article considers the question of whether hacking operations breach the principle of good faith. In this regard, it discusses the applicability of the principle of good faith to the relations between IOs, member States, host States and non-member States, and then considers how hacking operations impinge on a number of postulates emanating from good faith such as the pacta sunt servanda rule, the duty to respect the legal personality of IOs, the duties of loyalty, due regard and cooperation, and the duty not to abuse rights. Finally, the article examines the question of whether the principle of State sovereignty offers IOs indirect protection insofar as hacking can breach the sovereignty of the host State or the sovereignty of the State on whose cyber infrastructure the targeted data is resident.
Autonomous Cyber Weapons and Command Responsibility
In: International Law Studies 2020
SSRN
Automatic Cyber Defence and the Laws of War
In: German yearbook of international law: Jahrbuch für internationales Recht, Band 60, Heft 1, S. 203-237
ISSN: 2195-7304
Automatic cyber defence describes computer operations to neutralise a cyber attack. Once a system detects that it is under cyber attack, it automatically launches offensive cyber operations that pursue the attacker back to its own network with the objective of rescuing stolen data or disabling or destroying the computer hardware and software that is responsible for hosting and distributing the attacking code. The aim of this article is to examine the legality of automatic cyber defence under the law regulating the use of force in international law (jus ad bellum) and under international humanitarian law (jus in bello). Thus, the first part of this article examines automatic cyber defence in the context of the jus ad bellum by considering the legal requirements of an armed attack, necessity, and proportionality. In the second part, it examines the jus in bello aspects of automatic cyber defence and, in particular, whether it triggers an international or a non-international armed conflict and, if so, whether it can comply with the principles of distinction and proportionality.
Special Issue: Non-State Actors and Responsibility in Cyberspace: State Responsibility, Individual Criminal Responsibility and Issues of Evidence
In: Journal of conflict & security law, Band 21, Heft 3, S. 377-381
ISSN: 1467-7962
Special Issue: Non-State Actors and Responsibility in Cyberspace: State Responsibility, Individual Criminal Responsibility and Issues of Evidence
In: Journal of conflict and security law, Band 21, Heft 3, S. 377-381
ISSN: 1467-7954