This is the old version of the H2O platform and is now read-only. This means you can view content but cannot create content. You can access the new platform at https://opencasebook.org. Thank you.

Purpose: To provide an understanding of the international law that governs when it is legitimate to begin war, what counts as war for those purposes, and what counts as neutrality (and breaches of neutrality). The jus ad bellum is governed primarily by the United Nations Charter and customary international law. EDIT PLAYLIST INFORMATION DELETE PLAYLIST

Edit playlist item notes below to have a mix of public & private notes, or:

MAKE ALL NOTES PUBLIC (7/7 playlist item notes are public) MAKE ALL NOTES PRIVATE (0/7 playlist item notes are private)
  1. 3 Show/Hide More Department of Defense, An Assessment of International Legal Issues in Information Operations, 1999
    An early and influential DOD analysis that is one of the most comprehensive public documents on DOD thinking about these issues.
  2. 4 Show/Hide More Michael N. Schmitt, Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework, Columbia Journal of Transnational Law 37:885-937, 1999
    This journal article is an important and influential early conceptual analysis on the acceptability under the jus ad bellum of computer network attack.
  3. 5 Show/Hide More Matthew C. Waxman, Cyber Attacks and the Use of Force, Back to the Future of Article 2(4), The Yale Journal of International Law 36, 2011
    This article provides an analysis of the conceptual puzzles of applying jus ad bellum to the cyber domain, as well as an analysis of strategic issues raised by legal considerations.
  4. 6 Show/Hide More Michael N. Schmitt, Cyber Operations and the Jus ad Bellum Revisited, Villanova Law Review 56, 2011
    In this piece the author revisits his prominent analysis of jus ad bellum twelve years later.
  5. 7 Show/Hide More Department of Defense Cyberspace Policy Report, 2011
    A report from the DoD on its attitude toward foreign cyber threats, including the circumstances under which a cyber attack will warrant a military response.

Playlist Information

May 21, 2013

Author Stats

Jack Goldsmith and a Berkman Center Cybersecurity Team

Other Playlists by Jack Goldsmith and a Berkman Center Cybersecurity Team

Find Items

Search below to find items, then drag and drop items onto playlists you own. To add items to nested playlists, you must first expand those playlists.

Leitura Garamond Futura Verdana Proxima Nova Dagny Web
small medium large extra-large