Now showing items 1-10 of 27
Low-intensity computer network attack and self-defense
Sean Watts, Low-Intensity Computer Network Attack and Self-Defense, 87 Int'l L. Stud. 59 (2011), reprinted in 41 Israel Yearbook on Human Rights 83 (Yoram Dinstein ed., 2011).
Newly created State cyber security agencies, the reality of cyber attacks, and evolutions in cyber attack strategy will have important effects on the UN Charter's security regime, specifically the law governing States' ...
Tallinn manual on the international law applicable to cyber warfare
Tallinn Manual on the International Law Applicable to Cyber Warfare (Michael N. Schmitt ed., 2013) (prepared by the International Group of Experts) (member of the International Group of Experts).
The product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter ...
Notion of combatancy in cyber warfare
Sean Watts, The Notion of Combatancy in Cyber Warfare, in 2012 4th International Conference on Cyber Conflict: Proceedings 235 (Christian Czosseck, Rain Ottis & Katharina Ziolkowski eds., 2012).
This paper proposes an alternate test for combatant status in cyber warfare focused on State affiliation. Long an important, yet overlooked criterion for combatant status, State affiliation enjoys solid textual support in ...
Present and future conceptions of the status of government forces in non-international armed conflict
Sean Watts, Present and Future Conceptions of the Status of Government Forces in Non-International Armed Conflict, 88 Int'l L. Stud. 145 (2012).
Legal voids exist and operate nowhere more clearly and widely in international law than in the laws of war applicable to non-international armed conflicts (NIAC). Status of government actors in NIAC provides an intriguing ...
Domestic investigation of suspected law of armed conflict violations: United States procedures, policies, and practices
Sean Watts, Domestic Investigation of Suspected Law of Armed Conflict Violations: United States Procedures, Policies, and Practices, in 14 Yearbook of International Humanitarian Law 85 (Michael N. Schmitt & Louise Arimatsu, eds., 2012).
This article outlines the investigative procedures available under current United States domestic law for suspected LOAC violations. Formal and informal procedures available under both civil and military justice systems ...
Cyber conflict: Once far-fetched, now a global threat
Sean Watts, Cyber Conflict: Once Far-Fetched, Now a Global Threat, Creighton Law., Fall 2013, at 12.
Report on United States law of armed conflict investigations and prosecution practices
Sean Watts, Report on United States Law of Armed Conflict Investigations and Prosecution Practices, in Israel's Mechanisms for Examining and Investigating Complaints and Claims of Violations of the Laws of Armed Conflict According to International Law 485 (Turkel Comm'n ed., 2013).
This report responds to interrogatories provided by the report sponsors concerning United States law of armed conflict investigation and prosecution practices and policies. Where possible the report relies on
International law and modern armed conflict: Can law really make a difference?
Sean Watts, International Law and Modern Armed Conflict: Can Law Really Make a Difference?, Neb. Law., Nov./Dec. 2013, at 19.
Combatant status and computer network attack
Sean Watts, Combatant Status and Computer Network Attack, 50 Va. J. Int'l L. 391 (2010).
The national security implications of computer network attacks (CNA) have become far-reaching and have prompted major adjustments to our nation's defense structure and strategy. One of the current President's early executive ...
Law-of-war precautions: A cautionary note
Sean Watts, Law-of-War Precautions: A Cautionary Note, in The Impact of Emerging Technologies on the Law of Armed Conflict (Eric Talbot Jensen & Ronald T. P. Alcala eds., 2019).