Regulating Military Force Series – Low-Intensity Cyber Operations and Regulation of the Resort to Force

Regulating Military Force Series – Low-Intensity Cyber Operations and Regulation of the Resort to Force

Regulating Military Force Series – Low-Intensity Cyber Operations and Regulation of the Resort to Force Editors’ note: The author delivered remarks on the subject of this post at the conference “International Law and the Regulation of Resort to Force: Exhaustion,...
Application of the Principle of Military Advantage in Determining Proportionality

Application of the Principle of Military Advantage in Determining Proportionality

Application of the Principle of Military Advantage in Determining Proportionality This post examines the concept of “concrete and direct military advantage” used for purposes of applying proportionality rules in targeting. It concludes that military...
Criminal Organisations Party to an Armed Conflict and the Question of Targeting

Criminal Organisations Party to an Armed Conflict and the Question of Targeting

Criminal Organisations Party to an Armed Conflict and the Question of Targeting This post is drawn from the authors’ article-length work, “Targeting Drug Lords: Challenges to IHL Between lege lata and lege ferenda” appearing in the International Review of the Red...
Securing the Maritime Domain in the Red Sea

Securing the Maritime Domain in the Red Sea

Securing the Maritime Domain in the Red Sea Since the brutal Hamas-led massacre of over 1,300 innocent Israeli citizens on October 7, 2023, Houthi rebels based in Yemen have increased their attacks on Israeli and U.S. ships in the Red Sea. A statement issued by the...
Israel – Hamas 2023 Symposium – Israel’s Right to Self-Defence against Hamas

Israel – Hamas 2023 Symposium – Israel’s Right to Self-Defence against Hamas

Israel – Hamas 2023 Symposium – Israel’s Right to Self-Defence against Hamas Recent posts (here and here) have discussed Israel’s right to use force by way of self-defence against Hamas following the October 7 attacks. The gist of the first post’s argument,...