The seemingly unstoppable growth of regional organizations, since the end of the Cold War, has been one of the defining characteristics of the current international system. Throughout this period, regionalism has taken many forms and shapes, varying from tiny associations that include no more than a few actors and focus on a single issue, to huge continental-unions that address a multitude of common problems from territorial defense to food security. Far from being solely state-led undertakings, regional organizations have also come to include a variety of actors from civil society…
Read MoreCategory: Politics
SECURITY LAW AND NON-BINDING NORMS IN SPACE: FROM PEACE TO CONFLICT
The 1967 Outer Space Treaty contains three important principles. Article II spells out the principle of non-appropriation, Article III requires all activities in outer space to conform with international law, and Article IV announces the principle that the Moon and other celestial bodies shall be used for peaceful purposes. The question was posed whether these principles continue to be effective, or whether the principles of non-appropriation and peaceful purposes are under threat. One key issue in raising this question is the relationship between peaceful purposes and war fighting in space.…
Read MoreTARGETED KILLING AS A METHOD OF COUNTER TERRORISM AND DRONES AS MEANS OF COMBAT AGAINST INTERNATIONAL TERRORISM
When one aims to describe the human rights legality of targeted killings, one has to examine the right to life. The right to life is a natural and unalienable right of men. From the point of view of its subjects, the right to life requires that no man shall be killed arbitrarily, thus it ensures the life of the individual. From the relevant international conventions a two-folded obligation seems to flow: On the one hand, states have to respect the right to life of individuals, and in certain situations– based…
Read MoreWHAT IMPACT COULD ARTIFICIAL INTELLIGENCE HAVE ON ELECTIONS?
The Experts/Researchers adopt a broad understanding of elections that encompasses more than the practical conduct of elections and includes the election campaign and the post-election period, when the election results are published and discussed. In its work, the Experts/Researchers have focused on three main areas where we believe Artificial Intelligence (AI) may have an impact on elections and democracy. In these areas, we believe there is particular cause to be vigilant and prepared to avoid negative consequences for elections and democracy: – The information and media landscape – Covert election…
Read MoreTHE SUBSTANTIVE COMPONENT OF THE RIGHT TO LIFE IN LIGHT OF TARGETED KILLINGS AND EXTRATERRITORIAL APPLICABILITY OF HUMAN RIGHTS TREATIES AND TARGETED KILLINGS
When one aims to describe the human rights legality of targeted killings, one has to examine the right to life. The right to life is a natural and unalienable right of men. From the point of view of its subjects, the right to life requires that no man shall be killed arbitrarily, thus it ensures the life of the individual. From the relevant international conventions a two-folded obligation seems to flow: On the one hand, states have to respect the right to life of individuals, and in certain situations– based…
Read MoreTHE CONSEQUENCES OF POST WAR CONFLICT RECONSTRUCTION: REVIEW
War Conflicts affect the lives of people not only due to the large scale loss of lives, but also due to the destruction that it causes on infrastructure and livelihoods. Thus, War conflicts create a long term impact on social, economic and political systems making it difficult for societies to revive back to normal on their own. The period after war conflict poses several challenges for the communities and governments to recover the economic and social systems, while maintaining stability and achieving sustainable peace. The recovery process necessitates post conflict…
Read MoreNEEDFUL VOTER FRAUD DEFINITION : VOTER FRAUD AND THE PROBLEM OF EVIDENCE : PART II
Conceptual clarity is important in evaluating evidence of fraud. We begin with a discussion of what voter fraud is and what it is not. The first problem in defining voter fraud is that as a crime, it defies precise legal meaning. In fact, there is no single accepted legal definition of voter fraud. In fact, some states do not actually criminalize ‘voter fraud,’ although they all criminalize acts that are commonly lumped together under the term, such as illegal voting, providing false information to register to vote, and multiple voting.…
Read MoreMILITARY STRATEGY IN A MORE HUMANITARIAN AGE : AN OVERVIEW WITH THE INTERNATIONAL LAW
International law has come to play an expanded role in the use of force. This expanded role has elevated evolving humanitarian law concepts over the long-standing preference for sovereignty, and has contributed to the state losing its uncontested control over the direction of war. The “state therefore has an interest in reappropriating the control and direction of war.” As Hew Strachan notes, “that is the purpose of strategy.” Arguments about international law are part of diplomacy, and “diplomatic arguments are a means to an end. They are part of a…
Read MoreNEEDFULNESS OF VOTER FRAUD DEFINITION: VOTER FRAUD AND THE PROBLEM OF EVIDENCE : PART I
Conceptual clarity is important in evaluating evidence of fraud. We begin with a discussion of what voter fraud is and what it is not. The first problem in defining voter fraud is that as a crime, it defies precise legal meaning. In fact, some states do not criminalize ‘voter fraud.’ However, they all criminalize acts that are commonly lumped together under the term, such as illegal voting, providing false information to register to vote, and multiple voting. The legal incoherence contributes to popular misunderstandings. We need a basic definition of…
Read MoreDIGITAL SILK ROUTE: PROMOTING DIGITAL AUTHORITARIANISM METHODS AND PROJECTS
China is providing different governments, with little protection of human rights, with telecommunications technology, facial-recognition hardware and analytical tools to process data. These technologies are then combined, in order to create advanced surveillance systems that can be used for policing, such as identifying political and social threats. But it also serves repressive purposes and can therefore strengthen authoritarianism. China’s export of these systems started to increase in 2012, and since 2016 it has increased even more rapidly. Many of these technological systems are on the border between public security, control…
Read MoreWAR CRIMES INTERNATIONAL ARMED CONFLICT AND INTERNALLY DISPLACED PEOPLE
After the end of the Second World War, the allies entered into two agreements. These were the Agreement for the Prosecution and Punishment of the Major War Criminals of the European Axis (London Agreement) and Charter of the International Military Tribunal (Nuremberg Charter). When the Nuremberg Trials started, the accused, all Nazi Party members who actively participated in the Nazi Regime’s activities in various capacities, were charged on four counts. These were:- a. Conspiracy to commit aggression. b. Commission of aggression. c. Crimes in the conduct of warfare. d. Crimes…
Read MorePROTECTED AREAS AND COMMUNITY LAND RIGHTS OF INDIGENOUS PEOPLE
Human actions to conserve the Earth’s biodiversity have a deep history, in which the main actors are Indigenous Peoples and local communities who have stewarded lands and resources across generations as part of their cultures and ways of life. This local conservation, which is inseparable from customary lands and resources, is distinct from the formal national and international conservation enterprise that took shape in the context of nineteenth-century colonialism, but has been greatly affected by it. Expropriation and exclusion Conservation protected areas began to be established in an era of…
Read MoreTHE POWAR OF PROXIES : WHY NON STATE SPONSORS USE LOCAL MILITARY SURROGATES
The use of proxies in warfare is typically understood as a state sponsor’s reliance on military surrogates that are outside the purview of the state’s conventional armed or security forces, and that offer services to their benefactors in exchange for tangible material support. A long-standing feature in the history of armed conflict , the reliance on surrogates has become particularly endemic in the post–World War II era, with important implications for international security. Following the attacks of September 11, 2001, and the ensuing “global war on terror,” the use of…
Read MoreTHE KEY ROLE OF STAKEHOLDERS AND EXPERTS IN SPACE AND GOVERNANCE
Institutional design includes constitutional-level rules that specify the participants, how authority is distributed, and how rules can be made, or what Hart would call “secondary rules.” Central to polycentric governance is users’ self-organization or self-governance, i.e., that users organize themselves to address shared problems and interests. In self-governance, the users of the Common pool Resources (CPRs) (e.g., fishermen fishing from the same lake, farmers using the same water basin) themselves establish, modify, and possibly enforce the rules regulating the use and protection of a common resource. As Elinor Ostrom noted,…
Read MoreDIGITAL CYBER REVOLUTION: AUTHORITARIANISM, CYBER SOVEREIGNTY AND REASSERTION OF STATE CONTROL
International law has generally recognized that, “ sovereignty is perhaps the most fundamental [principle]. From [which] emerges, inter alia, notions of non-intervention; prescriptive, enforcement, and adjudicative jurisdiction; sovereign immunity; due diligence; and territorial integrity.” A sovereign state thus maintains the right “to conduct its affairs without outside interference. Between independent states , respect for territorial sovereignty is an essential foundation of international relations.” Extending this principal of independent sovereign control to the ephemeral territory of cyber space, Russia and China have actively advocated for cyber sovereignty—“the idea that states should…
Read More