Have a personal or library account? Click to login
Hostes Humani Generis: Cyberspace, the Sea, and Sovereign Control Cover

Hostes Humani Generis: Cyberspace, the Sea, and Sovereign Control

Open Access
|Feb 2013

References

  1. 1. Armitage, David. “The Elephant and the Whale: Empires of Land and Sea.” Journal for Maritime Research 9 (1) (2007): 23-36.10.1080/21533369.2007.9668360
  2. 2. Banner, Stuart. Who Owns the Sky? The Struggle to Control Airspace from the Wright Brothers On. Cambridge (MA): Harvard University Press, 2008.10.4159/9780674020498
  3. 3. Blau, John. “Battle Brewing over International Internet Regulation.” IEEESpectrum (December 2012) // http://spectrum.ieee.org/telecom/internet/battle-brewing-over-internationalinternet- regulation (accessed December 14, 2012).
  4. 4. Bodini, Stefano Piedimonte. “Fighting Maritime Piracy under the European Convention on Human Rights.” The European Journal of International Law 22 (3) (2011): 829-848.10.1093/ejil/chr052
  5. 5. Brenner, Susan W., and Marc D. Goodman. “The Emerging Consensus on Criminal Conduct in Cyberspace.” International Journal of Law and Information Technology 10 (2) (2002): 139-223.10.1093/ijlit/10.2.139
  6. 6. Burgess, Douglas R. “Hostis Humani Generi: Piracy, Terrorism and a New International Law.” University of Miami International and Comparative Law Review 13 (2006): 293-341.
  7. 7. Cade, Nicholas W. “An Adaptive Approach for an Evolving Crime: The Case for an International Cyber Court and Penal Code.” Brooklyn Journal of International Law 37 (3) (2012): 1139-1175.
  8. 8. Caral, Jose MA. Emmanuel. “Lessons from ICANN: Is the Self-regulation of the Internet Fundamentally Flawed?” International Journal of Law and Information Technology 12 (1) (2004): 1-31.10.1093/ijlit/12.1.1
  9. 9. Cerf, Vinton, Barry M. Leiner, David C. Clark, et al. “A Brief History of the Internet”, An International Electronic Publication of the Internet Society (1997) // http://www.isoc.org/oti/printversions/0797prleiner.html (accessed December 17, 2012).
  10. 10. Chik, Warren B. “‘Customary Internet-tional Law’: Creating a Body of Customary Law to Cyberspace. Part 1: Developing Rules for Transitioning Custom into Law.” Computer Law & Security Review 26 (2010): 3-44.10.1016/j.clsr.2009.11.005
  11. 11. Clough, Jonathan. “Cybercrime.” Commonwealth Law Bulletin 37 (4) (2011): 671-680.10.1080/03050718.2011.621277
  12. 12. Clough, Jonathan. “Data Theft? Cybercrime and the Increasing Criminalization of Access to Data.” Criminal Law Forum 22 (1) (2011): 145-170.10.1007/s10609-011-9133-5
  13. 13. Connery, Christopher L. “Ideologies of Land and Sea: Alfred Thayer Mahan, Carl Schmitt, and the Shaping of Global Myth.” Elements 28 (2) (2001): 173-201.10.1215/01903659-28-2-173
  14. 14. De Leon, Pablo Mendes. “The Dynamics of Sovereignty and jurisdiction in International Aviation Law”: 483-496. In: Gerard Kreijen, ed. State,Sovereignty, and International Governance. Oxford and New York: Oxford University Press, 2002.
  15. 15. Dean, Mitchell. “Nomos: Word and Myth”: 242-258. In: Louiza Odysseos and Fabio Petito, eds. The International Political Thought of Carl Schmitt: Terror,Liberal War, and the Crisis of Global Order. Abingdon and New York: Routledge, 2007.
  16. 16. Dunlap, Charles J. “Towards a Cyberspace Legal Regime in the Twenty-First Century: Considerations for American Cyber-Warriors.” Nebraska Law Review 87 (2008-2009): 712-724.
  17. 17. Frazzetto, Mark. “A Maritime Model for Cyberspace Legal Governance.” The National Strategy Forum Review (September 19, 2011) // http://nationalstrategy.wordpress.com/ (accessed November 4, 2012).
  18. 18. Geiß, Robin, and Anna Petrig. Piracy and Armed Robbery at Sea. Oxford and New York: Oxford University Press, 2011.10.1093/acprof:oso/9780199609529.001.0001
  19. 19. Ghosh, Sumit, and Elliot Turrini. Cybercrimes: A Multidisciplinary Analysis. Heidelberg: Springer, 2010.
  20. 20. Grabosky, Peter. “The Global Dimension of Cybercrime.” Global Crime 6 (1) 2004: 146-157.10.1080/1744057042000297034
  21. 21. Greenleaf, Graham. “Regulating Cyberspace: Architecture vs Law?” Universityof New South Wales Law Journal 21 (2) (1998): 593-604.
  22. 22. Grewe, Wilhelm G. The Epochs of International Law. Berlin: Walter de Gruyter, 2000.10.1515/9783110902907
  23. 23. Guilfoyle, Douglas. “Piracy off Somalia: UN Security Council Resolution 1816 and IMO Regional Counter-Piracy Efforts.” International Criminal LawQuarterly 57 (2) (2008): 690-699.10.1017/S0020589308000584
  24. 24. Harris, Alexandra and Ray Harris. “The Need for Air Space and Outer Space Demarcation.” Space Policy 22 (2006): 3-7.10.1016/j.spacepol.2005.11.004
  25. 25. Hartogh, Den, and Cees Maris. “The Commencement of Modern Age”: 91-110. In: Cees Maris and Frans Jacobs, eds. Law, Order and Freedom: A Historical Introduction to Legal Philosophy. Heidelberg; Springer, 2011.
  26. 26. Illves, Toomas Hendrik. “It‘s the Economy, Stupid!” The Security Times (September 2012): 24.
  27. 27. “Internet Regulation: A Digital Cold War?” The Economist (December 14, 2012) // http://www.economist.com/blogs/babbage/2012/12/internetregulation (accessed December 14, 2012).
  28. 28. Jarvie, Natasha. “Control of Cybercrime - Is an End to Our Privacy on the Internet a Price Worth Paying? Part 1.” Computer and Telecommunications Law Review 9 (3) (2003): 76-81.
  29. 29. Jarvie, Natasha. “Control of Cybercrime - Is an End to Our Privacy on the Internet a Price Worth Paying? Part 2.” Computer and Telecommunications Law Review 9 (4) (2003): 110-115.
  30. 30. Johnson, David and David Post. “Law and Borders - The Rise of Law in Cyberspace.” Stanford Law Review 48 (1996): 1367-1402.10.2307/1229390
  31. 31. Joint Chiefs of Staff, Department of Defense Dictionary of Military and Associated Terms. “Joint Publication 1-02” (2001) // http://www.dtic.mil/doctrine/new_pubs/jp1_02.pdf (accessed November 4, 2012).
  32. 32. Judy, Henry L., and David Satola. “Business Interests Under Attack in Cyberspace: Is International Regulation the Right Response?” Business Law Today (December 2011) // http://apps.americanbar.org/buslaw/blt/content/2011/12/article-2-judysatola.shtml (accessed November 4, 2012).
  33. 33. Kadens, Emily. “The Myth of the Customary Law Merchant.” Texas Law Review 90 (5) (2012): 1153-1206.
  34. 34. Kempe, Michael. “Beyond the Law. The Image of Piracy in the Legal Writings of Hugo Grotius”: 379-395. In: Hans W Blom, ed. Property, Piracy and Punishment: Hugo Grotius on War and Booty in De Iure Praedae - Conceptsand Contexts. Leiden: Brill, 2009.
  35. 35. Khalid, Nazery. “With a Little Help from My Friends: Maritime Capacity building Measures in the Straits of Malacca.” Contemporary Southeast Asia 31 (3) (2009): 424-446.10.1355/cs31-3c
  36. 36. Klein, Natalie. Maritime Security and the Law of the Sea. Oxford and New York: Oxford University Press, 2011.10.1093/acprof:oso/9780199566532.001.0001
  37. 37. Kleinwachter, Wolfgang. “Internet Governance Outlook 2012: Cold War or Constructive Dialogue.” Communications Law 17 (1) (2012): 14-18.
  38. 38. Klimburg, Alexander. “Mobilising Cyber Power.” Survival: Global politics and Strategy 53 (1) (2011): 41-60.10.1080/00396338.2011.555595
  39. 39. Koops, Bert-Jaap. “The Internet and its Opportunities for Cybercrime”: 735-754. In: M Herzog-Evans, ed. Transnational Criminology Manual. Nijmegen: Wold Legal Publishers, 2010.
  40. 40. Lessig, Lawrence. “The Law of the Horse: What Cyberlaw Might Teach.” Harvard Law Review 113 (1999): 501-546.10.2307/1342331
  41. 41. Libicki, Martin C. Cyberdeterrence and Cyberwar. Santa Monica, Arlington, and Pittsburgh: The RAND Corporation, 2009.
  42. 42. Maier, Bernhard. “How Has the Law Attempted to Tackle the Borderless Nature of the Internet?” International Journal of Law and Information Technology 18 (2) (2010): 142-175.10.1093/ijlit/eaq001
  43. 43. Marder, Michael. Groundless Existence: The Political Ontology of Carl Schmitt. New York and London: Continuum, 2010.
  44. 44. Mayer, Franz C. “The Internet and Public International Law - Worlds Apart?” European Journal of International Law 12 (3) (2001): 612-622.10.1093/ejil/12.3.617
  45. 45. Menthe, Darrel C. “Jurisdiction In Cyberspace: A Theory of International Spaces.” Michigan Telecommunications Law Review 4 (1998): 69-103.
  46. 46. Newman, David. “Contemporary Research Agenda in Border Studies: An Overview”: 33-48. In: Doris Wastl-Walter, ed. The Ash gate Research Companion to Border Studies. Farnham and Burlington: Ashgate, 2011.
  47. 47. O’Donnovan, Oliver, and Joan Lockwood O’Donnovan. “Isidore of Seville”: 204-206. In: Oliver O’Donnovan and Joan Lockwood O’Donnovan, eds. From Irenaeus to Grotius: A Sourcebook in Christian Political Thought, 100-1625. Grand Rapids and Michigan: William B. Eerdmans Publishing, 1999.
  48. 48. Odysseos, Louiza, and Fabio Petito. “The International Political Thought of Carl Schmitt”: 1-18. In: Louiza Odysseos and Fabio Petito, eds. The International Political Thought of Carl Schmitt: Terror, Liberal War, and theCrisis of Global Order. Abingdon and New York: Routledge, 2007.
  49. 49. Orji, Uchenna Jerome. “An Analysis of China’s Regulatory Response to Cybersecurity.” Computer and Telecommunications Law Review 18 (7) (2012): 212-226.
  50. 50. Pardo, Arvid. “The Law of the Sea: Its Past and its Future.” Oregon Law Review 63 (1) (1984): 7-17.
  51. 51. Reed, Chris. “Online and Offline Equivalence: Aspiration and Achievement.” International Journal of Law and Information Technology 18 (3) (2010): 248-273.10.1093/ijlit/eaq006
  52. 52. Ronzitti, Natalino. “The Use of Private Contractors in the Fight against Piracy: Policy Options”: 37-53. In: Francesco Francioni and Natalino Ronzitti, eds. War by Contract: Human Rights, Humanitarian Law, and Private Contractors. Oxford and New York: Oxford University Press, 2011.
  53. 53. “Russia Calls for Internet Revolution.” Russia Today (May 28, 2012) // http://www.rt.com/news/itu-internet-revolution-russia-386 (accessed November 4, 2012).
  54. 54. Schmitt, Carl. The Nomos of the Earth in the International Law of Jus Publicum Europaeum. New York: Telos, 2003.
  55. 55. Scott, Jennifer. “ITU Internet Regulation Blocked by UK and US.” ComputerWeekly.com (December 14, 2012) // http://www.computerweekly.com/news/2240174668/ITU-regulation-blockedby- UK-and-US (accessed December 14, 2012).
  56. 56. Stahl, William M. “The Uncharted Waters of the Cyberspace: Applying the Principles of International Maritime Law to the Problem of Cybersecurity.” Georgia Journal of International and Comparative Law 40 (2011): 247-273.
  57. 57. Touloumis, Tara. “Buccaneers and Bucks from the Internet: Pirate Bay and the Entertainment Industry.” Seton Hall Journal of Sports & EntertainmentLaw 19 (2009): 253-281.
  58. 58. Treves, Tullio. “Piracy, Law of the Sea, and Use of Force: Developments off the Coast of Somalia.” European Journal of International Law 20 (2) (2009): 399-414.10.1093/ejil/chp027
  59. 59. US Department of State. “Fast Facts on United States Submitting Initial Proposals to World Telecom Conference” (August 1, 2012) // http://www.state.gov/e/eb/rls/fs/2012/195921.htm (accessed November 4, 2012).
  60. 60. Wang, James C. F. Handbook on Ocean Politics and Law. Westport: Greenwood Press, 1992.
  61. 61. Webb, Walter Prescott. The Great Frontier. Reno: University of Nevada Press, 2003.
  62. 62. Williams, Alison J. “A Crisis in Aerial Sovereignty? Considering the Implications of Recent Military Violations of National Airspace.” Area 42 (1) (2010): 51-59.10.1111/j.1475-4762.2009.00896.x
  63. 63. Williams, Alison J. “Blurring Boundaries / Sharpening Borders: Analysing the US’s Use of Military Aviation Technologies to Secure International Borders, 2001-2008”: 283-300. In: Doris Wastl-Walter, ed. The Ashgate ResearchCompanion to Border Studies. Farnham and Burlington: Ashgate, 2011.
  64. 64. Yar, Majid. “The Novelty of ‘Cybercrime’: An Assessment in Light of Routine Activity Theory.” European Journal of Criminology 2 (2005): 407-427.10.1177/147737080556056
  65. 65. Zekos, Georgios I. “Globalisation and States’ Cyber- Territory.” Web Journalof Current Legal Issues 5 (2001) [pagination not available].
  66. 66. Zhou, Chenfeng Vincent, Christopher Leckie, and Shanika Karunasekera. “A Survey of Coordinated Attacks and Collaborative Intrusion Detection.” Computers & Security 19 (2010): 124-140.10.1016/j.cose.2009.06.008
  67. 1. Anglo-Norwegian Fisheries Case. I.C.J. Reports 1951, 116.
  68. 2. Convention on Cybercrime. Council of Europe. CETS no. 185 (Budapest; November 23, 2001).
  69. 3. eDate Advertising GmbH v X (C-509/09) and Olivier Martinez and RobertMartinez v MGN Limited (C-161/10). European Court of Justice. Opinion of Advocate General Cruz Villalon (March 29, 2011).
  70. 4. League against Racism and Antisemitism (LICRA), French Union of JewishStudents v Yahoo! Inc. (USA), Yahoo France. Tribunal de Grande Instance de Paris (The County Court of Paris). Interim Court Order (November 20, 2000). Electronic Business Law Reports 1(3) (2001): 110-120.
  71. 5. Medvedyev and Others v France. ECHR Grand Chamber. Application no. 3394/03 (March 29, 2010).
  72. 6. The Situation in Somalia. United Nations Security Council. Resolution no.
  73. 1816. UN Docs. S/RES/1816 (2008).
  74. 7. Towards a General Policy on the Fight against Cyber Crime. The Council and the Committee of the Regions. Communication from the Commission to the European Parliament. COM/2007/0267 Final. {SEC(2007) 641} {SEC(2007) 642}.
Language: English
Page range: 132 - 163
Published on: Feb 8, 2013
Published by: Faculty of Political Science and Diplomacy and the Faculty of Law of Vytautas Magnus University (Lithuania)
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2013 Julija Kalpokienė, Ignas Kalpokas, published by Faculty of Political Science and Diplomacy and the Faculty of Law of Vytautas Magnus University (Lithuania)
This work is licensed under the Creative Commons License.