* forthcoming scholarship
Chris Jenks (Judge Advocate General’s Corps)
Abstract:
Recent assertions of the political question doctrine by battlefield contractor defendants in tort litigation have brought new life to the doctrine while raising new questions. The lawsuits stem from incidents in both Iraq and Afghanistan and include plaintiffs ranging from local nationals suing contract interrogators and interpreters, to contract employees suing another contractor following insurgent attacks, to U.S. service members suing contractors after vehicle and airplane crashes. The lawsuits involve tort claims, which on their face do not conjure up images of a constitutional power struggle, but in at least fifteen cases thus far contractor defendants have asserted the political question doctrine as a defense. The political question doctrine addresses whether the judiciary should review government action or decisions and yet contractors are asserting the doctrine in cases where the government is not a named party and has remained conspicuously silent. This article analyzes the confused application of the political question doctrine to battlefield related contractor tort litigation and proposes a methodology to bring clarity to future decisions. Absent a more rigid analytical approach by the judiciary and a change in the government’s attitude, the confusion surrounding the political question doctrine and the inconsistency of its application to the inevitable future contractor cases will only grow.
“From Nuclear War to Net War: Analogizing Cyber Attacks in International Law”
Berkley Journal of International Law (BJIL), Vol. 25, No. 3, 2009
SCOTT SHACKELFORD, University of Cambridge Department of Politics and International Studies, Stanford Law School
Email: sjshacke@gmail.com
On April 27, 2007, Estonia suffered a crippling cyber attack launched from outside its borders. It is still unclear what legal rights a state has as a victim of a cyber attack. For example, even if Estonia could conclusively prove that Russia was behind the March 2007 attack there is no clear consensus on how Estonia could legally respond, whether with armed force, its own cyber attack, or some other measure. The scholarly literature dealing with these questions, as well as the ethical, humanitarian, and human rights implications of information warfare (IW) on national and international security is scarce. Treatments of IW outside the orthodox international humanitarian law (IHL) framework are nearly non-existent. This underscores the tension between classifying cyber attacks as merely criminal, or as a matter of state survival calling for the same responses as conventional threats to national security.
International law has been slow to adapt. The facts on the ground, and the widespread, amorphous use and rapid evolution of the internet in many ways challenge state sovereignty. I will advocate that the best way to ensure a comprehensive regime for cyber attacks is through a new international accord dealing exclusively with cyber security and its status in international law. Yet, the international community lacks the political will to tackle this issue directly. Until such an accord becomes politically viable, it is critical to examine how existing treaty systems may extend to cover the novel facts presented by cybe attacks. Together, existing treaties form a dual track approach to cyber attacks – one that is available for cyber attacks that do not rise to the level of an armed attack, and another that is activated once an armed attack occurs. To that end this paper will examine the most apt analogues in international law to form an appropriate legal regime for the various types of cyber attacks ? whether it is humanitarian law (laws of war), human rights law (regulation of nation states behavior), or some novel combination of these and other treaty systems. In framing this regime, it will be argued that cyber attacks represent a threat to international peace and security as daunting and horrific as nuclear war. Yet the nuclear non-proliferation model is not a useful analogy since the technology necessary to conduct IW is already widespread in the international community. Instead, other analogies will rely on communications and cyber law, space law, and the law of the sea. The main failings of existing international treaties that touch on cyber law though are that most do not carry enforcement provisions. Nor do they specify how the frameworks change or fall away entirely during an armed attack. Nevertheless, regardless of whether or not cyber attacks fall below the threshold of an armed attack these bodies of law have a role to play in forming an appropriate regime. The cyber attack on Estonia in April, 2007, presents an example of the dire need for clarity in the international law of non-conventional warfare using modern technology.
“Counter-Terrorism Law and Inchoate Offences”
GABRIEL HALLEVY, Ono Academic College, Faculty of Law
Email: hallevy@ono.ac.il
The modern definitions of the inchoate offences are well known in the criminal law since the Middle Ages both in European-Continent legal systems and in the English Common Law. They were mostly developed by the case-laws of the Star Chamber Court, which was abolished in 1640. The inchoate offences include three basic offences: Attempt, Conspiracy and Solicitation, but different legal systems defined some other offences as inchoate, such as the Aider and Abettor in Britain after the full validation of the Serious Crimes Act, 2007, c.27, s.44. In this paper it is argued, that there is a very intensive interaction between the fight against terrorism and inchoate offences. The fight against terrorism effects the definition of inchoate offences, and inchoate offences are used as a major instrument of criminal law in the legal fight against terrorism.
“Letters of Marque and Reprisal: The Constitutional Law and Practice of Privateering”
Journal of Maritime Law and Commerce, Vol. 40, No. 2, 2009
THEODORE M COOPERSTEIN, affiliation not provided to SSRN
The United States Constitution grants to the Congress the power, among others, to issue ?Letters of Marque and Reprisal.? Although the practice seems to have fallen into disuse in this century, it was an important tool of national power for the federal government created by the Framers, who placed great import on the federal government?s role in protecting international commerce and in enforcing international law.
Privateering played a significant role before and during the Revolutionary War, and it persisted in American history as an economical way to augment naval forces against an enemy in wartime. A significant outgrowth of the practice of privateering was the body of law resulting from prize court adjudications. United States courts, in deciding title to ships and goods taken prize, determined issues both of domestic and customary international law. In this manner the federal courts significantly shaped the role of international law in the United States jurisprudence as well as assured the role of the United States in the ongoing development of customary international law. Case law concerning prizes and privateering is accordingly a useful vehicle to examine the interplay of U.S. constitutional law and customary international law as they both developed through the Nineteenth Century.
Changes in the methods of warfare during the Twentieth Century diminished the role of privateering. But the Congressional authority to issue Letters of Marque and Reprisal remains. As a means to commission private actors to augment national forces in international crises, the Letter of Marque and Reprisal could yet have modern applications. It remains for innovative executive and legislative experiment to revive the ancient practice in a form befitting modern international problems.
Texas International Law Journal, Vol. 44, No. 1, 2008
DAVID L. SNYDER, Fordham University – School of Law
Email: snyderdl@gmail.com
“I call it a massacre,” said a Kurdish witness to the afternoon carnage in the streets of Baghdad, “[t]hey used the law of the jungle.” American soldiers and military officials were equally appalled at the aftermath: the plume of smoke over Nisour Square having dissipated, only the bullet-riddled, lifeless bodies of unarmed civilians remained. A banner proclaiming “[t]he Creators of Life are always Victorious” fluttered eerily overhead, an optimist’s hope for Iraqi reconstruction diminished by the tumult below. This catastrophe was not, however, the work of terrorists. Rather, the deaths occurred at the hands of employees of Blackwater USA, a private security company under contract with the U.S. Department of State, whose primary mission in Iraq is to protect U.S. diplomats.
Although five Blackwater guards were indicted in December 2008 for their roles in the attacks, private military and security firms generally continue to operate with relative impunity amidst regulatory frameworks that are porous, impracticable, and rarely utilized. The solution with the greatest enforcement capability – a 2006 amendment to the Uniform Code of Military Justice (UCMJ), which extends military courts-martial to civilian contractors participating in contingency operations – faces constitutional questions and, as of the time of this writing, a failure of executive branch implementation. The resulting lacuna is startling: there are nearly 160,000 private American contractors working in Iraq, an estimated 30,000 of which provide armed military services, but there has currently been only one prosecution for an act of violence.
This Article argues that the recent change in the UCMJ should survive constitutional attack, and that subjecting employees of private military firms to courts-martial is the only sensible and practical means to ensure battlefield discipline and accountability. Part II of this Article discusses the background of the use of private military firms by the United States, and traces the development of the domestic legal framework, culminating in the recent UCMJ amendment, applicable to the industry. Part III analyzes the constitutional issues presented by the new UCMJ provision, which subjects certain civilians to the jurisdiction of military courts-martial. Finally, Part IV argues that courts facing the inevitable challenge to the new UCMJ provision should uphold the law on a number of bases. First, the founding generation’s fear of broadly subjecting civilians to draconian military justice is not applicable to the contemporary courts-martial system. Second, the Constitution does not foreclose military trials of certain civilians; the historical record details numerous occasions, dating back to the Revolutionary War, in which civilians with close connections to the armed services were held accountable by courts-martial. Finally, a late twentieth-century opinion from the Court of Military Appeals, which effectively overturned generations of precedent and principle, was wrongly decided and anomalous, and should not foreclose current legislative attempts to hold civilians who accompany the armed forces during contingency operations responsible for illegal conduct.