Bibliography

Books and monographs

 * William H Boothby, The Law of Targeting (OUP 2012).
 * William H Boothby, Weapons and the Law of Armed Conflict (OUP 2016).
 * Dennis Broeders, The Public Core of the Internet (Amsterdam University Press 2015).
 * Ian Brownlie, International Law and the Use of Force by States (OUP 1963).
 * Oliver Corten, The Law against War (Hart Pub 2010).
 * Emily Crawford, Identifying the Enemy: Civilian Participation in Armed Conflict (OUP 2015).
 * James Crawford, Brownlie's Principles of Public International Law (OUP 2012).
 * James Crawford, State Responsibility: The General Part (CUP 2013).
 * Martin Dawidowicz, Third-Party Countermeasures in International Law (CUP 2017).
 * François Delerue, Cyber Operations and International Law (CUP 2020).
 * Heather H Dinniss, Cyber Warfare and the Laws of War (CUP 2012).
 * Yoram Dinstein, The Conduct of Hostilities under the Law of International Armed Conflict (CUP 2016).
 * Yoram Dinstein, Non-International Armed Conflicts in International Law (CUP 2014).
 * Christine Gray, International Law and the use of force (OUP 2018).
 * Eleni Katselli Proukaki, The Problem of Enforcement in International Law (Routledge 2010).
 * Natalie Klein, Maritime Security and the Law of the Sea (OUP 2012).
 * Joanna Kulesza, Due Diligence in International Law (Brill 2016).
 * Kubo Mačák, Internationalized Armed Conflicts in International Law (OUP 2018).
 * René Provost, International Human Rights and Humanitarian Law (CUP 2002).
 * Marco Roscini, Cyber Operations and the Use of Force in International Law (OUP 2014).
 * Gary D Solis, The Law of Armed Conflict: International Humanitarian Law in War (CUP 2016).
 * Nigel White, The Law of International Organizations (Juris 2005).
 * Noam Zamir, Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars (Edward Elgar 2017).
 * Kristin E. Heckman and others, Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defence (Springer 2015)
 * Geoffrey S. Corn and others, The Law of Armed Conflict: An Operational Approach (2nd edn, Wolters Kluwer 2019)

Contributions to edited collections

 * Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (eds) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
 * Lindsey Cameron and others, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
 * Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
 * Gary P. Corn and Peter P. Pascucci, ‘The Law of Armed Conflict Implications of Covered or Concealed Cyber Operations: Perfidy, Ruses, and the Principle of Passive Distinction’ in Ronald T. P. Alcala and Eric T. Jensen (eds), The Impact of Emerging Technologies on the Law of Armed Conflict (OUP 2019).
 * Jean D’Aspremont, ‘Persona Non Grata’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
 * Oliver Dörr and Albrecht Randelzhofer, ‘Article 2(4)’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (OUP 2012).
 * Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’ in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
 * Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
 * Hans-Peter Gasser and Knut Dörmann, ‘Protection of Civilian Population’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
 * Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
 * Terry D. Gill, ‘Non-intervention in the Cyber Context’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
 * Douglas Guilfoyle, ‘The High Seas’ (2015) in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
 * Wolff Heintschel von Heinegg, ‘Warships’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated October 2015)
 * Albert J. Hoffmann, ‘Freedom of Navigation’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2011).
 * Knut Ipsen, ‘Combatants and Non-Combatants’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
 * Jan K. Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
 * Jeff Kosseff, ‘Retorsion as a Response to Ongoing Cyber Operations’ in Taťána Jančárková and others (eds), 20/20 Vision: The Next Decade (NATO CCD COE 2020).
 * Natalie Klein, ‘Maritime Security’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
 * Doris König, ‘Flag of Ships’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2009).
 * Philip Kunig, ‘Prohibition of Intervention’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2008).
 * Franck Latty, ‘Actions and Omissions’ in James Crawford and others (eds), The Law of International Responsibility (OUP 2010).
 * Nils Melzer, ‘Cyber Operations and jus in bello’ in Kerstin Vignard (ed), Confronting Cyberconflict (UNIDIR 2011).
 * Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (OUP 2012).
 * Anne Peters, ‘Article 25’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
 * Jody Prescott, ‘Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States?’ in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), 4th International Conference on Cyber Conflict (NATO CCD COE 2012).
 * Przemysław Roguski, ‘Collective Countermeasures in Cyberspace: Lex lata, Progressive Development or a Bad Idea?’ in Taťána Jančárková and others (eds), 20/20 Vision: The Next Decade (NATO CCD COE 2020).
 * Tassilo Singer, ‘Update to Revolving Door 2.0 – the Extension of the Period for Direct Participation in Hostilities Due to Autonomous Cyber Weapons’ in Henry Rõigas and others (eds), 9th International Conference on Cyber Conflict: Defending the Core (NATO CCD COE 2017).
 * Waldemar A Solf, ‘Article 37: Prohibition of Perfidy’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
 * Waldemar A Solf, ‘Article 38: Recognized Emblems’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
 * Waldemar A Solf, ‘Article 39: Emblems of Nationality’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
 * Yoshifumi Tanaka, ‘Navigational Rights and Freedoms’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
 * Sabine Von Schorlemer, ‘Telecommunications, international regulation’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated March 2009)
 * Silja Vöneky, ‘Analogy in International Law’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
 * Sean Watts, ‘The Notion of Combatancy in Cyber Warfare’, in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), 4th International Conference on Cyber Conflict (NATO CCD COE 2012).
 * Rolf Weber, ‘A Legal Lens into Internet Governance’, in Laura DeNardis and others (eds), Researching Internet Governance: Methods, Frameworks, Futures (MIT Press 2020).
 * Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani and others, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
 * Katja Ziegler, ‘Domaine Réservé’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2013).
 * Christian Dominicé, ‘Attribution of Conduct to Multiple States and the Implication of a State in the Act of Another State’ in James Crawford and others (eds), The Law of International Responsibility (OUP 2010).
 * James Crawford, ‘State Responsibility’ in R Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
 * Marcelo Kohen, ‘The Court’s Contribution to Determining the Content of Fundamental Principles of International Law’ in Giorgio Gaja and Jenny Grote Stoutenburg (eds), Enhancing the Rule of Law through the International Court of Justice (Brill 2012).
 * Michael N Schmitt, ‘The Use of Cyber Force and International Law’ in Marc Weller (ed), Oxford Handbook on the Use of Force in International Law (OUP 2015).
 * Robin Geiss, ‘The Obligation to Respect and to Ensure Respect for the Conventions’ in Andrew Clapham, Paola Gaeta and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
 * Jeffrey Biller, ‘The Misuse of Protected Indicators in Cyberspace: Defending a Core Aspect of International Humanitarian Law’ in Henry Rõigas and others (eds), Defending the Core (CCD COE 2017).
 * Kai Ambos, ‘International Criminal Responsibility in Cyberspace’ in Nicholas Tsagourias and Russell Buchan (eds), Research Handbook on International Law and Cyberspace (Edward Elgar 2015).
 * Wibke Timmermann and William A. Schabas, ‘Incitement to Genocide’ in Paul Behrens and Ralph Henham (eds), Elements of Genocide (Routledge 2013).

Edited books and reference texts

 * Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
 * Gloria Gaggioli (ed), The Use of Force in Armed Conflicts (ICRC 2013).
 * Fan O Hampson and Michael Sulmeyer (eds), Getting Beyond Norms (CIGI 2017).
 * Michael N Schmitt (ed), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (CUP 2017).
 * Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (OUP 2012).
 * Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
 * Geoffrey S. Corn, Rachel E. VanLandingham and Shane R. Reeves (eds), U.S. Military Operations: Law, Policy, and Practice (OUP 2015).
 * Yves Sandoz, Christophe Swinarski, and Bruno Zimmermann (eds), Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949 (ICRC 1987)

Journal articles

 * Steven Bellovin, Susan Landau and Herbert Lin, ‘Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications’ (2017) 3(1) Journal of Cybersecurity 59.
 * Jeffrey T Biller and Michael N Schmitt, ‘Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare’ (2019) 95 Int’l L Stud 179.
 * Duncan Blake and Joseph Imburgia, ‘“Bloodless Weapons”? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining Them as “Weapons”’, (2010) 66 Air Force Law Review 157.
 * Vincent Boulanin and Maaike Verbruggen, Article 36 Reviews: Dealing with the Challenges Posed by Emerging Technologies (2017) SIPRI.
 * Mark Bromley, ‘Export Controls, Human Security and Cyber-Surveillance Technology: Examining the Proposed Changes to the EU Dual-use Regulation’ (2017) SIPRI.
 * Gary Brown and Andrew Metcalf, ‘Easier Said Than Done: Legal Reviews of Cyber Weapons’ (2014) 7 Journal of National Security Law and Policy 115.
 * Gary Brown and Keira Poellet, ‘The Customary International Law of Cyberspace’ (2012) Strategic Studies Quarterly 137.
 * Russell Buchan, ‘Cyberspace, Non-State Actors and the Obligation to Prevent Transboundary Harm’ (2016) 21(3) JCSL 429.
 * Russell Buchan, ‘Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?’ (2012) 17 JCSL 212.
 * Elena Chachko, ‘Foreign Affairs in Court: Lessons from CJEU Targeted Sanctions Jurisprudence’ (2019) 44 Yale Journal of International Law 1.
 * Luke Chircop, ‘A Due Diligence Standard of Attribution in Cyberspace’ (2018) 67 ICLQ 643.
 * Gary P. Corn and Robert Taylor, ‘Sovereignty in the Age of Cyber’ (2017) 111 AJIL Unbound 207.
 * Gary P. Corn and Eric T. Jensen, ‘The Use of Force and Cyber Countermeasures’ (2018) 32 Temple International and Comparative Law Journal 127.
 * Martin Dawidowicz, ‘Third-Party Countermeasures: A Progressive Development of International Law? - QIL QDI’ (2016) 29 Questions of International Law 3.
 * Ashley Deeks, 'An International Legal Framework for Surveillance' (2015) 55 Virginia J Int'l L 291.
 * Heather H Dinniss, ‘The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives’ (2015) 48 Isr L Rev 39.
 * Cordula Droege, ‘Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians’ (2012) 94 IRRC 533.
 * Dan Efrony and Yuval Shany, 'A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice' (2018) 112 AJIL 583.
 * David Fidler, ‘Economic Cyber Espionage and International Law: Controversies Involving Government Acquisition of Trade Secrets through Cyber Technologies’ (2013) 17/10 ASIL Insights.
 * Carlo Focarelli, ‘International Law and Third-Party Countermeasures in the Age of Global Instant Communication’ (2016) 29 Questions of International Law 17.
 * Jack Goldsmith, ‘How Cyber Changes the Laws of War’ (2013) 24 EJIL 129.
 * James Green, ‘Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice’ (2009) 58 ICLQ 163.
 * Erika Häger and Carolina Dackö, ‘Economic Espionage: A Report by Mannheimer Swartling’ (2018).
 * Wolff Heintschel von Heinegg, 'Territorial Sovereignty and Neutrality in Cyberspace' (2013) 89 Int’l L Stud 123.
 * Maziar Jamnejad and Michael Wood, ‘Prohibition of Intervention’ (2009) 22 LJIL 345.
 * Ido Kilovaty, ‘An extra-territorial human right to cybersecurity’ (2020) 10 Notre Dame Journal of International and Comparative Law 35.
 * Jeff Kosseff, ‘Collective Countermeasures in Cyberspace’ (2020) 10 Notre Dame Journal of International and Comparative Law 1.
 * David Kretzmer, ‘The Inherent Right to Self-Defence and Proportionality in Jus Ad Bellum’ (2013) 24 EJIL 235.
 * Patricia Kwast, ‘Maritime Law Enforcement and the Use of Force: Reflections on the Categorisation of Forcible Action at Sea in the Light of the Guyana/Suriname Award’ (2008) 13 Journal of Conflict and Security Law 1.
 * Catherine Lotrionte, ‘Countering State-Sponsored Cyber Economic Espionage Under International Law’ (2015) 40 NCJ Int'l L & Com Reg 443.
 * Noam Lubell, ‘Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?’ (2013) 89 Int’l L Stud 252.
 * Kubo Mačák, ‘Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors’ (2016) 21 JCSL 405.
 * Kubo Mačák, ‘From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers’ (2017) 30 LJIL 877.
 * Kubo Mačák, ‘Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law’ (2015) 48 Isr L Rev 55.
 * Peter Margulies, ‘Surveillance by Algorithm: The NSA, Computerized Intelligence Collection and Human Rights’ (2016) 68 Fla. L. Rev. 1084.
 * Peter Margulies, 'Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility' (2013) 14 MJIL.
 * John Merriam, ‘Affirmative Target Identification, Operationalizing the Principle of Distinction for U.S. Warfighters’ (2015) 56 Virginia JIL 83.
 * Marko Milanovic, ‘Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age’ (2015) 56/1 Harv Int'l LJ.
 * Noam Neuman, ‘Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas’ (2018) 51 VJTL 807.
 * Sean K Price, ‘Perfidy in Cyberspace: The Requirement for Human Confidence’ (2020) Harv. Nat'l Sec. J. Online.
 * Darien Pun, ‘Rethinking Espionage in the Modern Era’ (2017) 18 Chicago JIL 353.
 * Barrie Sander, ‘Democracy Under The Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections’ (2019) 18 Chinese JIL 1.
 * Dietrich Schindler, ‘The Different Types of Armed Conflicts According to the Geneva Conventions and Protocols’ (1979) 163 RdC 117.
 * Michael N Schmitt, ‘Computer Network Attack and Use of Force in International Law: Thoughts on a Normative Framework’ (1999) 37 Columbia Journal of Transnational Law 885.
 * Michael N Schmitt, ‘The Interpretive Guidance on the Notion of Direct Participation in Hostilities: A Critical Analysis’ (2010) 1 Harvard National Security Journal 5.
 * Michael N Schmitt, ‘Below the Threshold Cyber Operations: The Countermeasures Response Option and International Law’ (2014) 54 Virginia Journal of International Law 697.
 * Michael N Schmitt, ‘International Cyber Norms: Reflections on the Path Ahead’ (2018) 111 Netherlands Military Law Review 12.
 * Michael N Schmitt, ‘The Notion of ‘Objects’ during Cyber Operations: A Riposte in Defence of Interpretive and Applicative Precision’ (2015) 48 Isr L Rev 81.
 * Michael N Schmitt, 'Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law' (2018) 19 Chinese JIL 30.
 * Michael N. Schmitt and Sean Watts, ‘The Decline of International Humanitarian Law Opinio Juris and the Law of Cyber Warfare’ (2015) 50 Tex Int'l LJ 189.
 * Michael N Schmitt and Liis Vihul, ‘Respect for Sovereignty in Cyberspace’ (2017) 95 Tex L Rev. 1639.
 * Nicholas Tsagourias  'Cyber Attacks, Self-Defence and the Problem of Attribution' (2012) 17 (2) JCSL 23.
 * Beth Van Schaack, ‘The United States' position on the extra-territorial application of human rights obligations: Now is the time for change’ (2014) 90 Int’l L Stud 20.
 * David Wallace, ‘Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis’ (2018) Tallinn Paper No. 11.
 * Beatrice A. Walton, ‘Duties Owed: Low-Intensity Cyber Attacks and Liability for Transboundary Torts in International Law’ (2017) 126 YaleLJ 1460.
 * Sean Watts and Theodore Richard, 'Baseline Territorial Sovereignty and Cyberspace' (2018) 22 Lewis & Clark L Rev. 771.
 * Laurent Gisel, Tilman Rodenhäuser and Knut Dörmann, ‘Twenty years on: International humanitarian law and the protection of civilians against the effects of cyber operations during armed conflicts’ (2020) 102 IRRC 913.
 * Marko Milanovic and Michael N Schmitt, ‘Cyber Attacks and Cyber (Mis)information Operations during a Pandemic’, (2020) 11 Journal of National Security Law & Policy 247.
 * Harriet Moynihan, ‘The Vital Role of International Law in the Framework for Responsible State Behaviour in Cyberspace’ (2020) 5 Journal of Cyber Policy.
 * Marco Roscini, ‘Evidentiary Issues in International Disputes Related to State Responsibility for Cyber Operations’ (2015) 50 Texas International Law Journal 1.
 * William Banks, ‘State Responsibility and Attribution of Cyber Intrusions After Tallinn 2.0’ (2017) 95 Tex. L. Rev. 1487.
 * Tomohiro Mikanagi and Kubo Mačák, ‘Attribution of Cyber Operations: An International Law Perspective on the Park Jin Hyok case’ (2020) 9 Cambridge Int’l L, J. 51.
 * Massimo Marelli, ‘Hacking humanitarians: Defining the cyber perimeter and developing a cyber security strategy for international humanitarian organizations in digital transformation’ (2020) 102 (913) IRRC 367.
 * Eric Talbot Jensen and Sean Watts, ‘A Cyber Duty of Due Diligence: Gentle Civilizer or Crude Destabilizer’ (2017) 95 Tex. L. Rev. 1555.
 * Christian Payne and Lorraine Finlay, ‘Addressing Obstacles to Cyber-Attribution’, 49 Geo. Wash. Int’l L. Rev. 535 (2017).
 * Russell Buchan, ‘Cyber Warfare and the Status of Anonymous under International Humanitarian Law' (2016) Chinese JIL 741.
 * Kubo Mačák, ‘Unblurring the lines: military cyber operations and international law’ (2021) 6(3) Journal of Cyber Policy 411
 * James Banks, ‘European Regulation of Cross-Border Hate Speech in Cyberspace: The Limits of Legislation’ (2011) 19 Eur J Crime CrL & CrJ 1.
 * Andrey Fino, ‘Defining Hate Speech – A Seemingly Elusive Task’ (2020) 18 JICL 31.
 * Shannon Fyee, ‘Tracking Hate Speech Acts as Incitement to Genocide in International Criminal Law’ (2017) 30 LJIL 523.
 * Gregory S Gordon, ‘Formulating a New Atrocity Speech Offense: Incitement to Commit War Crimes’ (2012) 43 LoyUChiLJ 281.
 * Gregory S Gordon, ‘Hate Speech and Persecution: A Contextual Approach’ (2013) 46 VandJTransnatlL 303.
 * Wibke K Timmermann, ‘The Relationship between Hate Propaganda and Incitement to Genocide: A New Trend in International Law Towards Criminalization of Hate Propaganda?’ (2005) 18 LJIL 257.
 * Richard A Wilson, ‘Inciting Genocide with Words’ (2015) 36 MichJIntlL 277.
 * Marco Roscini, ‘Gravity in the Statute of the International Criminal Court and Cyber Conduct that Constitutes, Instigates or Facilitates International Crimes’ (2019) 30 CrimLF 247.

International treaties, reports and other public documents

 * Agreement on Trade-Related Aspects of Intellectual Property Rights, Annex 1C to the Agreement Establishing the World Trade Organization (signed on 15 April 1994 in Marrakesh), 1869 UNTS 299
 * American Convention on Human Rights (open for signature from 22 November 1969, entered into force 18 July 1978), 1144 UNTS 123.
 * Charter of Fundamental Rights of the European Union (2012) OJ C326/391.
 * Charter of the United Nations (adopted 26 June 1945, entered into force 24 October 1945) 1 UNTS 16.
 * Convention for the Protection of Human Rights and Fundamental Freedoms (opened to the signature in Rome on 4 November 1950, entered into force 3 September 1953) ETS 5.
 * Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation (signed 23 September 1971, entered into force 26 January 1973) 974 UNTS 178 (“Montreal Convention”).
 * Council of Europe, Convention on Cybercrime (adopted 23 November 2001, entered into force 1 July 2004).
 * Council of the European Union, ‘Council Conclusions on the Joint Communication to the European Parliament and the Council: Resilience, Deterrence and Defence: Building strong cybersecurity for the EU’ (Council conclusions, 20 November 2017).
 * Council Regulation (EC) No 428/2009 of 5 May 2009 setting up a Community regime for the control of exports, transfer, brokering and transit of dual-use items consolidated version as of 16 December 2017.
 * Documents of the United Nations Conference on International Organization (1945), vol VI, Explanatory Report to the Convention on Cybercrime.
 * G7, ‘Principles and Actions on Cyber’ (Annex to the Ise-Shima Declaration from 27 May 2016).
 * G8, ‘Declaration: Renewed Commitment for Freedom and Democracy’ (Summit of Deauville, 27 May 2011).
 * ILC, Draft Articles on Responsibility of States for Internationally Wrongful Acts, with commentaries, Yearbook of the ILC (2001).
 * ILC, Draft Articles on the Responsibility of International Organizations, with commentaries (UNYBILC, 2011).
 * ILC, 'Document A/6309/ Rev.1: Reports of the International Law Commission on the second part of its seventeenth and on its eighteenth session' (UNYBILC II, 1966).
 * International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171.
 * International Covenant on Economic, Social and Cultural Rights (adopted 16 December 1966, entered into force 3 January 1976) 993 UNTS 3.
 * ICRC, Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law (ICRC 2009).
 * ICRC, International Humanitarian Law and the Challenges of Contemporary Armed Conflicts: Recommitting to Protection in Armed Conflict on the 70th Anniversary of the Geneva Conventions (ICRC 2019).
 * ICRC, A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977 (Kathleen Lawand (ed), ICRC 2006).
 * ICRC, ‘International Humanitarian Law and Cyber Operations during Armed Conflicts: ICRC Position Paper’ (November 2019).
 * ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
 * Organization for Security and Cooperation in Europe, Decision No. 1202, OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies (Permanent Council, 10 March 2016) PC.DEC/1202.
 * Oxford Statement on the International Law Protections against Cyber Operations Targeting the Health-Care Sector (20 May 2020).
 * Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol 1) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 3.
 * Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed Conflicts (Protocol II) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 609.
 * 'Sixth report on unilateral acts of States' (30 May 2003) by Victor Rodríguez Cedeño, Special Rapporteur, UN Doc A/CN.4/534.
 * Statute of the International Court of Justice (adopted 26 June 1945, entered into force 24 October 1945).
 * The Second Oxford Statement on International Law Protections of the Healthcare Sector During COVID-19: Safeguarding Vaccine Research (7 August 2020).
 * UNGA Res 2625 (XXV), ‘Declaration on Principles of International Law concerning Friendly Relations and Co-operation among States in accordance with the Charter of the United Nations’ (24 October 1970).
 * UNGA Res 55/63, ‘Combating the criminal misuse of information technologies’ (UN Doc. A/RES/55/63, 4 December 2000).
 * UNGA Res 68/243, ‘Developments in the field of information and telecommunications in the context of international security’ (UN Doc. A/RES/68/243, 27 December 2013)
 * UNGA Res 70/237, ‘Developments in the field of information and telecommunications in the context of international security’ (UN Doc. A/RES/20/237, 23 December 2015).
 * UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, ‘Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security’ (UN Doc A/70/174, 22 July 2015).
 * UN Human Rights Committee, ‘Summary Record of the 1405th Meeting’ (CCPR/C/SR.1405, 31 March 1995) [20].
 * UN Human Rights Committee, ‘General Comment No. 24 on issues relating to reservations made upon ratification or accession to the Covenant or the Optional Protocols thereto, or in relation to declarations under article 41 of the Covenant’ (CCPR/C/21/Rev.1/Add.6, 11 November 1994).
 * UN Human Rights Committee, ‘General Comment No. 27, Article 12: Freedom of Movement’ (CCPR/C/21/Rev.1/Add.9, 1 November 1999).
 * UN Human Rights Committee, ‘General Comment No. 31 (80), The Nature of the General Legal Obligation Imposed on States Parties to the Covenant’ (CCPR/C/21/Rev.1/Add.13, 29 March 2004).
 * UN Human Rights Committee, ‘General Comment No. 34, Article 19: Freedoms of opinion and expression’ (CCPR/C/GC/34, 12 September 2011).
 * UN Security Council, Resolution 2321 (2016) Adopted by the Security Council at its 7821st meeting, on 30 November 2016.
 * UN Human Rights Council Res 32/13, ‘The promotion, protection and enjoyment of human rights on the Internet’ (UN Doc. A/HRC/RES/32/13, 1 July 2016).
 * U.S. Department of Defense, Law of War Manual (December 2016).
 * Vienna Convention on Consular Relations (adopted 24 April 1963, entered into force 19 March 1967), 596 UNTS 261.
 * Vienna Convention on Diplomatic Relations (adopted 18 April 1961, entered into force 24 April 1964), 500 UNTS 95.
 * Vienna Convention on the Law of Treaties (adopted 23 May 1969, entered into force 27 January 1908) 1155 UNTS 331.

Blog posts and other online sources

 * James Clapper, US, Director of National Intelligence, Worldwide Threat Assessment of the US Intelligence Community (26 February 2015).
 * Brian Egan, US, State Department Legal Advisor, International Law and Stability in Cyberspace, Speech at Berkeley Law School (10 November 2016).
 * Brian Egan, State Department Legal Advisor, “Remarks to the American Society of International Law: International Law, Legal Diplomacy, and the Counter-ISIL Campaign” (1 April 2016).
 * G20 Leaders’ Communiqué (15–16 November 2015).
 * Alexander Gamero-Garrido and others, ‘Inferring Country-Level Transit Influence of Autonomous Systems’ (on Active Internet Measurement Systems Conference, San Diego April 2019)
 * Internet Society, ‘Policy brief: Internet Shutdowns’ (Internet Society, 18 December 2019).
 * Vinit Jain and Brad Edgeworth, Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP, (Cisco Press 2017).
 * Tim Maurer and Michael Schmitt, ‘Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?’ Just Security, 14 August 2017.
 * North Atlantic Treaty Organization, ‘Wales Summit Declaration’ (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales, 5 September 2015).
 * North Atlantic Treaty Organization, ‘Warsaw Summit Communiqué’ (issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Warsaw, 9 July 2016).
 * President of the United States, ‘International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World’ (2011).
 * United States, ‘FACT SHEET: President Xi Jinping’s State Visit to the United States’ (25 September 2015).
 * United States, ‘The Commander’s Handbook on the Law of Land Warfare’ (FM 6-27, MCTP 11-10C, August 2019).
 * Michael N Schmitt, ‘Estonia Speaks Out on Key Rules for Cyberspace’ JustSecurity, 10 June 2019.
 * Michael N Schmitt, ‘France’s Major Statement on International Law and Cyber: An Assessment’ JustSecurity, 16 September 2019.
 * Michael N Schmitt and Jeffrey Biller, ‘The NotPetya Cyber Operation as a Case Study of International Law’ EJIL: Talk!, 11 July 2017.
 * Michael N Schmitt and Sean Fahey, ‘WannaCry and the International Law of Cyberspace’ JustSecurity, 22 December 2017.
 * Matthew Waxman, Principal Deputy Director of Policy Planning, U.S. Department of State, ‘Opening Statement to the U.N. Human Rights Committee on the Report Concerning the International Covenant on Civil and Political Rights’ (17 July 2006).
 * Jeremy Wright, QC MP, UK Attorney General ‘Cyber and International Law in the 21st Century’ (23 May 2018).
 * Harold Hongju Koh, ‘International Law in Cyberspace: Remarks as Prepared for Delivery to the USCYBERCOM Inter-Agency Legal Conference’ (18 September 2002), reprinted in (2012) 54 Harv. Int’l L.J. Online 1, 4.
 * Kubo Mačák, Tilman Rodenhäuser and Laurent Gisel, ‘Cyber attacks against hospitals and the COVID-19 pandemic: How strong are international law protections?’, ICRC Humanitarian Law and Policy Blog, 2 April 2020.
 * Duncan B Hollis and Tsvetelina van Benthem, ‘What Would Happen If States Started Looking at Cyber Operations as a “Threat” to Use Force?’ Lawfare (30 March 2021).
 * Tilman Rodenhäuser, ‘Hacking Humanitarians? IHL and the protection of humanitarian organizations against cyber operations’, EJIL:Talk! (16 March 2020).
 * Harriet Moynihan, ‘The Application of International Law to State Cyberattacks: Sovereignty and Non-intervention’ (2019) Chatham House.
 * Erica Häger & Carolina Dackö, ‘Economic Espionage: A Report by Mannheimer Swartling’ (2018).
 * Sina Alavi (ed), ‘The Council of Advisers’ Report on the Application of the Rome Statute of the International Criminal Court to Cyberwarfare’ (August 2021).