Now showing items 1-10 of 34
Sean Watts, Law-of-War Perfidy, 219 Mil. L. Rev. 106 (2014).
The structural role of law-of-war perfidy is widely unappreciated and misunderstood. More than a prohibition of underhanded or dishonorable conduct, the prohibition of perfidy is an essential buttress to the law of war as ...
Under siege: International humanitarian law and Security Council practice concerning siege operations
Sean Watts, Under Siege: International Humanitarian Law and Security Council Practice Concerning Siege Operations, Research and Policy Paper, Counterterrorism and Humanitarian Engagement Project (May 2014), blogs.law.harvard.edu/cheproject/files/2013/10/CHE-Project-IHL-and-SC-Practice-concerning-Urban-Siege-Operations.pdf.
This paper demonstrates that while siege operations, as traditionally practiced, are not technically prohibited, they are now significantly limited by IHL in both international armed conflict and non-international armed ...
Sean Watts, Constitutional Law (Int'l Humanitarian Law Clinic at Emory Univ. Sch. of Law, International Humanitarian Law Teaching Supplement Vol. 3, 2014), http://law.emory.edu/_includes/documents/sections/clinics/constitutional-law-1.pdf.
Reciprocity and the law of war
Sean Watts, Reciprocity and the Law of War, 50 Harv. Int'l L.J. 365 (2009).
This article examines how the principle of reciprocity operates within the international law of war. Tracing the historical development and application of the law, the article demonstrates that the existing law of war ...
Combatant status and computer network attack
Sean Watts, Combatant Status and Computer Network Attack, 50 Va. J. Int'l L. 391 (2010).
The national security implications of computer network attacks (CNA) have become far-reaching and have prompted major adjustments to our nation's defense structure and strategy. One of the current President's early executive ...
Notion of combatancy in cyber warfare
Sean Watts, The Notion of Combatancy in Cyber Warfare, in 2012 4th International Conference on Cyber Conflict: Proceedings 235 (Christian Czosseck, Rain Ottis & Katharina Ziolkowski eds., 2012).
This paper proposes an alternate test for combatant status in cyber warfare focused on State affiliation. Long an important, yet overlooked criterion for combatant status, State affiliation enjoys solid textual support in ...
Tallinn manual on the international law applicable to cyber warfare
Tallinn Manual on the International Law Applicable to Cyber Warfare (Michael N. Schmitt ed., 2013) (prepared by the International Group of Experts) (member of the International Group of Experts).
The product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter ...
Low-intensity computer network attack and self-defense
Sean Watts, Low-Intensity Computer Network Attack and Self-Defense, 87 Int'l L. Stud. 59 (2011), reprinted in 41 Israel Yearbook on Human Rights 83 (Yoram Dinstein ed., 2011).
Newly created State cyber security agencies, the reality of cyber attacks, and evolutions in cyber attack strategy will have important effects on the UN Charter's security regime, specifically the law governing States' ...
Cyber conflict: Once far-fetched, now a global threat
Sean Watts, Cyber Conflict: Once Far-Fetched, Now a Global Threat, Creighton Law., Fall 2013, at 12.
Report on United States law of armed conflict investigations and prosecution practices
Sean Watts, Report on United States Law of Armed Conflict Investigations and Prosecution Practices, in Israel's Mechanisms for Examining and Investigating Complaints and Claims of Violations of the Laws of Armed Conflict According to International Law 485 (Turkel Comm'n ed., 2013).
This report responds to interrogatories provided by the report sponsors concerning United States law of armed conflict investigation and prosecution practices and policies. Where possible the report relies on