Bibliography: Difference between revisions
Jump to navigation
Jump to search
(Added sources from scenario 23) |
No edit summary |
||
Line 168: | Line 168: | ||
*[http://legal.un.org/ilc/texts/instruments/english/conventions/9_1_1961.pdf Vienna Convention on Diplomatic Relations] (adopted 18 April 1961, entered into force 24 April 1964), 500 UNTS 95. |
*[http://legal.un.org/ilc/texts/instruments/english/conventions/9_1_1961.pdf Vienna Convention on Diplomatic Relations] (adopted 18 April 1961, entered into force 24 April 1964), 500 UNTS 95. |
||
*[https://treaties.un.org/doc/publication/unts/volume%201155/volume-1155-i-18232-english.pdf Vienna Convention on the Law of Treaties] (adopted 23 May 1969, entered into force 27 January 1908) 1155 UNTS 331. |
*[https://treaties.un.org/doc/publication/unts/volume%201155/volume-1155-i-18232-english.pdf Vienna Convention on the Law of Treaties] (adopted 23 May 1969, entered into force 27 January 1908) 1155 UNTS 331. |
||
− | |||
− | <!--- == Newspaper articles and online news == --> |
||
== Blog posts and other online sources == |
== Blog posts and other online sources == |
Revision as of 14:37, 16 September 2021
Books and monographs
- William H Boothby, The Law of Targeting (OUP 2012).
- William H Boothby, Weapons and the Law of Armed Conflict (OUP 2016).
- Dennis Broeders, The Public Core of the Internet (Amsterdam University Press 2015).
- Ian Brownlie, International Law and the Use of Force by States (OUP 1963).
- Oliver Corten, The Law against War (Hart Pub 2010).
- Emily Crawford, Identifying the Enemy: Civilian Participation in Armed Conflict (OUP 2015).
- James Crawford, Brownlie's Principles of Public International Law (OUP 2012).
- James Crawford, State Responsibility: The General Part (CUP 2013).
- Martin Dawidowicz, Third-Party Countermeasures in International Law (CUP 2017).
- François Delerue, Cyber Operations and International Law (CUP 2020).
- Heather H Dinniss, Cyber Warfare and the Laws of War (CUP 2012).
- Yoram Dinstein, The Conduct of Hostilities under the Law of International Armed Conflict (CUP 2016).
- Yoram Dinstein, Non-International Armed Conflicts in International Law (CUP 2014).
- Christine Gray, International Law and the use of force (OUP 2018).
- Eleni Katselli Proukaki, The Problem of Enforcement in International Law (Routledge 2010).
- Natalie Klein, Maritime Security and the Law of the Sea (OUP 2012).
- Joanna Kulesza, Due Diligence in International Law (Brill 2016).
- Kubo Mačák, Internationalized Armed Conflicts in International Law (OUP 2018).
- René Provost, International Human Rights and Humanitarian Law (CUP 2002).
- Marco Roscini, Cyber Operations and the Use of Force in International Law (OUP 2014).
- Gary D Solis, The Law of Armed Conflict: International Humanitarian Law in War (CUP 2016).
- Nigel White, The Law of International Organizations (Juris 2005).
- Noam Zamir, Classification of Conflicts in International Humanitarian Law: The Legal Impact of Foreign Intervention in Civil Wars (Edward Elgar 2017) .
Contributions to edited collections
- Russell Buchan, ‘The International Legal Regulation of State-Sponsored Cyber Espionage’ (2016) in Anna-Maria Osula and Henry Rõigas (eds) International Cyber Norms: Legal, Policy & Industry Perspectives (NATO CCD COE Publications, Tallinn 2016).
- Lindsey Cameron and others, ‘Article 3: Conflicts Not of an International Character’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
- Andrew Clapham, ‘Concept of International Armed Conflict’ in Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
- Gary P. Corn and Peter P. Pascucci, ‘The Law of Armed Conflict Implications of Covered or Concealed Cyber Operations: Perfidy, Ruses, and the Principle of Passive Distinction’ in Ronald T. P. Alcala and Eric T. Jensen (eds), The Impact of Emerging Technologies on the Law of Armed Conflict (OUP 2019).
- Jean D’Aspremont, ‘Persona Non Grata’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
- Oliver Dörr and Albrecht Randelzhofer, ‘Article 2(4)’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (OUP 2012).
- Frederic Dopagne, ‘Sanctions and Countermeasures by International Organizations’ in Richard Collins and Nigel White (eds) International Organizations and the Idea of Autonomy (Routledge 2011).
- Tristan Ferraro and Lindsey Cameron, ‘Article 2: Application of the Convention’ in ICRC (ed), Commentary on the First Geneva Convention (CUP 2016).
- Hans-Peter Gasser and Knut Dörmann, ‘Protection of Civilian Population’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
- Robin Geiss and Henning Lahmann, ‘Freedom and Security in Cyberspace: Shifting the Focus Away from Military Responses Towards Non-Forcible Countermeasures and Collective Threat-Prevention’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
- Terry D. Gill, ‘Non-intervention in the Cyber Context’ in Katharina Ziolkowski (ed), Peacetime Regime for State Activities in Cyberspace (NATO CCD COE 2013).
- Douglas Guilfoyle, ‘The High Seas’ (2015) in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
- Wolff Heintschel von Heinegg, ‘Warships’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated October 2015)
- Albert J. Hoffmann, ‘Freedom of Navigation’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2011).
- Knut Ipsen, ‘Combatants and Non-Combatants’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
- Jan K. Kleffner, ‘Scope of Application of Humanitarian Law’ in Dieter Fleck (ed), The Handbook of International Humanitarian Law (3rd edn, OUP 2013).
- Jeff Kosseff, ‘Retorsion as a Response to Ongoing Cyber Operations’ in Taťána Jančárková and others (eds), 20/20 Vision: The Next Decade (NATO CCD COE 2020).
- Natalie Klein, ‘Maritime Security’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
- Doris König, ‘Flag of Ships’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2009).
- Philip Kunig, ‘Prohibition of Intervention’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2008).
- Franck Latty, ‘Actions and Omissions’ in James Crawford and others (eds), The Law of International Responsibility (OUP 2010).
- Nils Melzer, ‘Cyber Operations and jus in bello’ in Kerstin Vignard (ed), Confronting Cyberconflict (UNIDIR 2011).
- Georg Nolte and Albrecht Randelzhofer, ‘Article 51’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (OUP 2012).
- Anne Peters, ‘Article 25’ in Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (3rd edn, OUP 2012).
- Jody Prescott, ‘Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States?’ in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), 4th International Conference on Cyber Conflict (NATO CCD COE 2012).
- Przemysław Roguski, ‘Collective Countermeasures in Cyberspace: Lex lata, Progressive Development or a Bad Idea?’ in Taťána Jančárková and others (eds), 20/20 Vision: The Next Decade (NATO CCD COE 2020).
- Tassilo Singer, ‘Update to Revolving Door 2.0 – the Extension of the Period for Direct Participation in Hostilities Due to Autonomous Cyber Weapons’ in Henry Rõigas and others (eds), 9th International Conference on Cyber Conflict: Defending the Core (NATO CCD COE 2017).
- Waldemar A Solf, ‘Article 37: Prohibition of Perfidy’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
- Waldemar A Solf, ‘Article 38: Recognized Emblems’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
- Waldemar A Solf, ‘Article 39: Emblems of Nationality’ in Michael Bothe and others (eds), New Rules for Victims of Armed Conflicts (Brill 1982).
- Yoshifumi Tanaka, ‘Navigational Rights and Freedoms’ in Donald Rothwell, Alex Oude Elfernik, Karen Scott and Tim Stephens (eds), The Oxford Handbook of the Law of the Sea (OUP 2015).
- Silja Vöneky, ‘Analogy in International Law’ in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
- Sean Watts, ‘The Notion of Combatancy in Cyber Warfare’, in Christian Czosseck, Rain Ottis and Katharina Ziolkowski (eds), 4th International Conference on Cyber Conflict (NATO CCD COE 2012).
- Rüdiger Wolfrum, ‘Obligation of Result Versus Obligation of Conduct: Some Thoughts About the Implementation of International Obligations’ in Mahnoush H Arsanjani and others, Looking to the Future: Essays on International Law in Honor of Michael Reisman (Brill 2010).
- Katja Ziegler, ‘Domaine Réservé’, in Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008, updated April 2013).
Edited books and reference texts
- Andrew Clapham, Paola Gaeta, and Marco Sassòli (eds), The 1949 Geneva Conventions: A Commentary (OUP 2015).
- Gloria Gaggioli (ed), The Use of Force in Armed Conflicts (ICRC 2013).
- Fan O Hampson and Michael Sulmeyer (eds), Getting Beyond Norms (CIGI 2017).
- Michael N Schmitt (ed), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (CUP 2017).
- Bruno Simma and others (eds), The Charter of the United Nations: A Commentary (OUP 2012).
- Rüdiger Wolfrum (ed), Max Planck Encyclopedia of Public International Law (OUP 2008).
Journal articles
- Steven Bellovin, Susan Landau and Herbert Lin, ‘Limiting the Undesired Impact of Cyber Weapons: Technical Requirements and Policy Implications’ (2017) 3(1) Journal of Cybersecurity 59.
- Jeffrey T Biller and Michael N Schmitt, ‘Classification of Cyber Capabilities and Operations as Weapons, Means, or Methods of Warfare’ (2019) 95 Int’l L Stud 179.
- Duncan Blake and Joseph Imburgia, ‘“Bloodless Weapons”? The Need to Conduct Legal Review of Certain Capabilities and the Implications of Defining Them as “Weapons”’, (2010) 66 Air Force Law Review 157.
- Vincent Boulanin and Maaike Verbruggen, Article 36 Reviews: Dealing with the Challenges Posed by Emerging Technologies (2017) SIPRI.
- Mark Bromley, ‘Export Controls, Human Security and Cyber-Surveillance Technology: Examining the Proposed Changes to the EU Dual-use Regulation’ (2017) SIPRI.
- Gary Brown and Andrew Metcalf, ‘Easier Said Than Done: Legal Reviews of Cyber Weapons’ (2014) 7 Journal of National Security Law and Policy 115.
- Gary Brown and Keira Poellet, ‘The Customary International Law of Cyberspace’ (2012) Strategic Studies Quarterly 137.
- Russell Buchan, ‘Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?’ (2012) 17 Journal of Conflict and Security Law 212.
- Elena Chachko, ‘Foreign Affairs in Court: Lessons from CJEU Targeted Sanctions Jurisprudence’ (2019) 44 Yale Journal of International Law 1.
- Luke Chircop, ‘A Due Diligence Standard of Attribution in Cyberspace’ (2018) 67 ICLQ 643.
- Gary P. Corn and Robert Taylor, ‘Sovereignty in the Age of Cyber’ (2017) 111 AJIL Unbound 207.
- Gary P. Corn and Eric T. Jensen, ‘The Use of Force and Cyber Countermeasures’ (2018) 32 Temple International and Comparative Law Journal 127.
- Martin Dawidowicz, ‘Third-Party Countermeasures: A Progressive Development of International Law? - QIL QDI’ (2016) 29 Questions of International Law 3.
- Ashley Deeks, 'An International Legal Framework for Surveillance' (2015) 55 Virginia J Int'l L 291.
- Heather H Dinniss, ‘The Nature of Objects: Targeting Networks and the Challenge of Defining Cyber Military Objectives’ (2015) 48 Isr L Rev 39.
- Cordula Droege, ‘Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians’ (2012) 94 IRRC 533.
- Dan Efrony and Yuval Shany, 'A Rule Book on the Shelf? Tallinn Manual 2.0 on Cyberoperations and Subsequent State Practice' (2018) 112 AJIL 583.
- David Fidler, ‘Economic Cyber Espionage and International Law: Controversies Involving Government Acquisition of Trade Secrets through Cyber Technologies’ (2013) 17/10 ASIL Insights.
- Carlo Focarelli, ‘International Law and Third-Party Countermeasures in the Age of Global Instant Communication’ (2016) 29 Questions of International Law 17.
- Jack Goldsmith, ‘How Cyber Changes the Laws of War’ (2013) 24 EJIL 129.
- James Green, ‘Fluctuating Evidentiary Standards for Self-Defence in the International Court of Justice’ (2009) 58 ICLQ 163.
- Erika Häger and Carolina Dackö, ‘Economic Espionage: A Report by Mannheimer Swartling’ (2018).
- Wolff Heintschel von Heinegg, 'Territorial Sovereignty and Neutrality in Cyberspace' (2013) 89 Int’l L Stud 123.
- Maziar Jamnejad and Michael Wood, ‘Prohibition of Intervention’ (2009) 22 LJIL 345.
- Jeff Kosseff, ‘Collective Countermeasures in Cyberspace’ (2020) 10 Notre Dame Journal of International and Comparative Law 1.
- David Kretzmer, ‘The Inherent Right to Self-Defence and Proportionality in Jus Ad Bellum’ (2013) 24 EJIL 235.
- Patricia Kwast, ‘Maritime Law Enforcement and the Use of Force: Reflections on the Categorisation of Forcible Action at Sea in the Light of the Guyana/Suriname Award’ (2008) 13 Journal of Conflict and Security Law 1.
- Catherine Lotrionte, ‘Countering State-Sponsored Cyber Economic Espionage Under International Law’ (2015) 40 NCJ Int'l L & Com Reg 443.
- Noam Lubell, ‘Lawful Targets in Cyber Operations: Does the Principle of Distinction Apply?’ (2013) 89 Int’l L Stud 252.
- Kubo Mačák, ‘Decoding Article 8 of the International Law Commission’s Articles on State Responsibility: Attribution of Cyber Operations by Non-State Actors’ (2016) 21 JCSL 405.
- Kubo Mačák, ‘From Cyber Norms to Cyber Rules: Re-engaging States as Law-makers’ (2017) 30 LJIL 877.
- Kubo Mačák, ‘Military Objectives 2.0: The Case for Interpreting Computer Data as Objects under International Humanitarian Law’ (2015) 48 Isr L Rev 55.
- Peter Margulies, 'Sovereignty and Cyber Attacks: Technology's Challenge to the Law of State Responsibility' (2013) 14 MJIL.
- John Merriam, ‘Affirmative Target Identification, Operationalizing the Principle of Distinction for U.S. Warfighters’ (2015) 56 Virginia JIL 83.
- Marko Milanovic, ‘Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age’ (2015) 56/1 Harv Int'l LJ.
- Noam Neuman, ‘Challenges in the Interpretation and Application of the Principle of Distinction During Ground Operations in Urban Areas’ (2018) 51 VJTL 807.
- Sean K Price, ‘Perfidy in Cyberspace: The Requirement for Human Confidence’ (2020) Harv. Nat'l Sec. J. Online.
- Darien Pun, ‘Rethinking Espionage in the Modern Era’ (2017) 18 Chicago JIL 353.
- Barrie Sander, ‘Democracy Under The Influence: Paradigms of State Responsibility for Cyber Influence Operations on Elections’ (2019) 18 Chinese JIL 1.
- Dietrich Schindler, ‘The Different Types of Armed Conflicts According to the Geneva Conventions and Protocols’ (1979) 163 RdC 117.
- Michael N Schmitt, ‘Computer Network Attack and Use of Force in International Law: Thoughts on a Normative Framework’ (1999) 37 Columbia Journal of Transnational Law 885.
- Michael N Schmitt, ‘The Interpretive Guidance on the Notion of Direct Participation in Hostilities: A Critical Analysis’ (2010) 1 Harvard National Security Journal 5.
- Michael N Schmitt, ‘Below the Threshold Cyber Operations: The Countermeasures Response Option and International Law’ (2014) 54 Virginia Journal of International Law 697.
- Michael N Schmitt, ‘International Cyber Norms: Reflections on the Path Ahead’ (2018) 111 Netherlands Military Law Review 12.
- Michael N Schmitt, ‘The Notion of ‘Objects’ during Cyber Operations: A Riposte in Defence of Interpretive and Applicative Precision’ (2015) 48 Isr L Rev 81.
- Michael N Schmitt, 'Virtual Disenfranchisement: Cyber Election Meddling in the Grey Zones of International Law' (2018) 19 Chinese JIL 30.
- Michael N. Schmitt and Sean Watts, ‘The Decline of International Humanitarian Law Opinio Juris and the Law of Cyber Warfare’ (2015) 50 Tex Int'l LJ 189.
- Michael N Schmitt and Liis Vihul, ‘Respect for Sovereignty in Cyberspace’ (2017) 95 Tex L Rev. 1639.
- Nicholas Tsagourias 'Cyber Attacks, Self-Defence and the Problem of Attribution' (2012) 17 (2) JCSL 23.
- David Wallace, ‘Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis’ (2018) Tallinn Paper No. 11.
- Sean Watts and Theodore Richard, 'Baseline Territorial Sovereignty and Cyberspace' (2018) 22 Lewis & Clark L Rev. 771.
International treaties, reports and other public documents
- Agreement on Trade-Related Aspects of Intellectual Property Rights, Annex 1C to the Agreement Establishing the World Trade Organization (signed on 15 April 1994 in Marrakesh), 1869 UNTS 299
- American Convention on Human Rights (open for signature from 22 November 1969, entered into force 18 July 1978), 1144 UNTS 123.
- Charter of Fundamental Rights of the European Union (2012) OJ C326/391.
- Charter of the United Nations (adopted 26 June 1945, entered into force 24 October 1945) 1 UNTS 16.
- Convention for the Protection of Human Rights and Fundamental Freedoms (opened to the signature in Rome on 4 November 1950, entered into force 3 September 1953) ETS 5.
- Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation (signed 23 September 1971, entered into force 26 January 1973) 974 UNTS 178 (“Montreal Convention”).
- Council of Europe, Convention on Cybercrime (adopted 23 November 2001, entered into force 1 July 2004).
- Council of the European Union, ‘Council Conclusions on the Joint Communication to the European Parliament and the Council: Resilience, Deterrence and Defence: Building strong cybersecurity for the EU’ (Council conclusions, 20 November 2017).
- Council Regulation (EC) No 428/2009 of 5 May 2009 setting up a Community regime for the control of exports, transfer, brokering and transit of dual-use items consolidated version as of 16 December 2017.
- Documents of the United Nations Conference on International Organization (1945), vol VI, Explanatory Report to the Convention on Cybercrime.
- G7, ‘Principles and Actions on Cyber’ (Annex to the Ise-Shima Declaration from 27 May 2016).
- G8, ‘Declaration: Renewed Commitment for Freedom and Democracy’ (Summit of Deauville, 27 May 2011).
- ILC, Draft Articles on Responsibility of States for Internationally Wrongful Acts, with commentaries, Yearbook of the ILC (2001).
- ILC, Draft Articles on the Responsibility of International Organizations, with commentaries (UNYBILC, 2011).
- ILC, 'Document A/6309/ Rev.1: Reports of the International Law Commission on the second part of its seventeenth and on its eighteenth session' (UNYBILC II, 1966).
- International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171.
- International Covenant on Economic, Social and Cultural Rights (adopted 16 December 1966, entered into force 3 January 1976) 993 UNTS 3.
- ICRC, Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law (ICRC 2009).
- ICRC, International Humanitarian Law and the Challenges of Contemporary Armed Conflicts: Recommitting to Protection in Armed Conflict on the 70th Anniversary of the Geneva Conventions (ICRC 2019).
- ICRC, A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977 (Kathleen Lawand (ed), ICRC 2006).
- Organization for Security and Cooperation in Europe, Decision No. 1202, OSCE Confidence-Building Measures to Reduce the Risks of Conflict Stemming from the Use of Information and Communication Technologies (Permanent Council, 10 March 2016) PC.DEC/1202.
- Oxford Statement on the International Law Protections against Cyber Operations Targeting the Health-Care Sector (20 May 2020).
- Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol 1) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 3.
- Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed Conflicts (Protocol II) (signed 12 December 1977, entered into force 7 December 1978) 1125 UNTS 609.
- 'Sixth report on unilateral acts of States' (30 May 2003) by Victor Rodríguez Cedeño, Special Rapporteur, UN Doc A/CN.4/534.
- Statute of the International Court of Justice (adopted 26 June 1945, entered into force 24 October 1945).
- The Second Oxford Statement on International Law Protections of the Healthcare Sector During COVID-19: Safeguarding Vaccine Research (7 August 2020).
- UNGA Res 2625 (XXV), ‘Declaration on Principles of International Law concerning Friendly Relations and Co-operation among States in accordance with the Charter of the United Nations’ (24 October 1970).
- UNGA Res 55/63, ‘Combating the criminal misuse of information technologies’ (UN Doc. A/RES/55/63, 4 December 2000).
- UNGA Res 68/243, ‘Developments in the field of information and telecommunications in the context of international security’ (UN Doc. A/RES/68/243, 27 December 2013)
- UNGA Res 70/237, ‘Developments in the field of information and telecommunications in the context of international security’ (UN Doc. A/RES/20/237, 23 December 2015).
- UN Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, ‘Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security’ (UN Doc A/70/174, 22 July 2015).
- UN Human Rights Committee, ‘Summary Record of the 1405th Meeting’ (CCPR/C/SR.1405, 31 March 1995) [20].
- UN Human Rights Committee, ‘General Comment No. 24 on issues relating to reservations made upon ratification or accession to the Covenant or the Optional Protocols thereto, or in relation to declarations under article 41 of the Covenant’ (CCPR/C/21/Rev.1/Add.6, 11 November 1994).
- UN Human Rights Committee, ‘General Comment No. 27, Article 12: Freedom of Movement’ (CCPR/C/21/Rev.1/Add.9, 1 November 1999).
- UN Human Rights Committee, ‘General Comment No. 31 (80), The Nature of the General Legal Obligation Imposed on States Parties to the Covenant’ (CCPR/C/21/Rev.1/Add.13, 29 March 2004).
- UN Human Rights Committee, ‘General Comment No. 34, Article 19: Freedoms of opinion and expression’ (CCPR/C/GC/34, 12 September 2011).
- UN Security Council, Resolution 2321 (2016) Adopted by the Security Council at its 7821st meeting, on 30 November 2016.
- UN Human Rights Council Res 32/13, ‘The promotion, protection and enjoyment of human rights on the Internet’ (UN Doc. A/HRC/RES/32/13, 1 July 2016).
- U.S. Department of Defense, Law of War Manual (December 2016).
- Vienna Convention on Consular Relations (adopted 24 April 1963, entered into force 19 March 1967), 596 UNTS 261.
- Vienna Convention on Diplomatic Relations (adopted 18 April 1961, entered into force 24 April 1964), 500 UNTS 95.
- Vienna Convention on the Law of Treaties (adopted 23 May 1969, entered into force 27 January 1908) 1155 UNTS 331.
Blog posts and other online sources
- James Clapper, US, Director of National Intelligence, Worldwide Threat Assessment of the US Intelligence Community (26 February 2015).
- Brian Egan, US, State Department Legal Advisor, International Law and Stability in Cyberspace, Speech at Berkeley Law School (10 November 2016).
- Brian Egan, State Department Legal Adviser, “Remarks to the American Society of International Law: International Law, Legal Diplomacy, and the Counter-ISIL Campaign” (1 April 2016).
- G20 Leaders’ Communiqué (15–16 November 2015).
- Tim Maurer and Michael Schmitt, ‘Protecting Financial Data in Cyberspace: Precedent for Further Progress on Cyber Norms?’ Just Security, 14 August 2017.
- North Atlantic Treaty Organization, ‘Wales Summit Declaration’ (issued by the Head of State and Government participating in the meeting of the North Atlantic Council in Wales, 5 September 2015).
- North Atlantic Treaty Organization, ‘Warsaw Summit Communiqué’ (issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Warsaw, 9 July 2016).
- President of the United States, ‘International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World’ (2011).
- United States, ‘FACT SHEET: President Xi Jinping’s State Visit to the United States’ (25 September 2015).
- Michael N Schmitt, ‘Estonia Speaks Out on Key Rules for Cyberspace’ JustSecurity , 10 June 2019.
- Michael N Schmitt, ‘France’s Major Statement on International Law and Cyber: An Assessment’ JustSecurity, 16 September 2019.
- Michael N Schmitt and Jeffrey Biller, ‘The NotPetya Cyber Operation as a Case Study of International Law’ EJIL: Talk!, 11 July 2017.
- Michael N Schmitt and Sean Fahey, ‘WannaCry and the International Law of Cyberspace’ JustSecurity, 22 December 2017.
- Matthew Waxman, Principal Deputy Director of Policy Planning, U.S. Department of State, ‘Opening Statement to the U.N. Human Rights Committee on the Report Concerning the International Covenant on Civil and Political Rights’ (17 July 2006).
- Jeremy Wright, QC MP, UK Attorney General ‘Cyber and International Law in the 21st Century’ (23 May 2018).