punctum books
Extraterritorial Jurisdiction to Enforce in Cyberspace? Bodin, Schmitt, Grotius in Cyberspace
- Mireille Hildebrandt(author)
Chapter of: Extraterritorialities in Occupied Worlds(pp. 173–201)
Export Metadata
- ONIX 3.0
- ThothCannot generate record: No publications supplied
- Project MUSECannot generate record: No BIC or BISAC subject code
- OAPENCannot generate record: Missing PDF URL
- JSTORCannot generate record: No BISAC subject code
- Google BooksCannot generate record: No BIC, BISAC or LCC subject code
- OverDriveCannot generate record: No priced EPUB or PDF URL
- Thoth
- ONIX 2.1
- EBSCO HostCannot generate record: No PDF or EPUB URL
- ProQuest EbraryCannot generate record: No PDF or EPUB URL
- EBSCO Host
- CSV
- JSON
- OCLC KBART
- BibTeX
- CrossRef DOI depositCannot generate record: This work does not have any ISBNs
- MARC 21 RecordCannot generate record: MARC records are not available for chapters
- MARC 21 MarkupCannot generate record: MARC records are not available for chapters
- MARC 21 XMLCannot generate record: MARC records are not available for chapters
Title | Extraterritorial Jurisdiction to Enforce in Cyberspace? |
---|---|
Subtitle | Bodin, Schmitt, Grotius in Cyberspace |
Contributor | Mireille Hildebrandt(author) |
DOI | https://doi.org/10.21983/P3.0131.1.12 |
Landing page | https://punctumbooks.com/titles/extraterritorialities-in-occupied-worlds/ |
License | https://creativecommons.org/licenses/by-nc-sa/4.0/ |
Copyright | Hildebrandt, Mireille |
Publisher | punctum books |
Published on | 2016-02-16 |
Long abstract | What is at stake if our justice authorities decide to hack a computer system that is physically located on a server outside the territory of the state they represent, for instance because a webbot was operated from that location,1causing serious harm to a variety of computing sys-tems in our own jurisdiction — harm that renders the perpetrator criminally liable under our own criminal law? How would we respond to Ukrainian, Chinese, Iranian, British, or Argentinian justice authorities that hack a computer system that is located within our own jurisdiction? Does it make a difference whether the hack by law enforcement authorities targets a dissident whose right to free speech is denied or a network disseminating child pornography? Should we evaluate such groping for extraordinary jurisdiction in terms of just ver-sus unjust causes (a bellum iustum privatum?) or is this about the Westphalian interplay of internal and external sovereignty? Might the attempt to extend or initiate extraterritorial jurisdiction-to-enforce be understood as an oc-cupatio, grounded in what Schmitt coined “a-legality,” or should we follow Grotius’s Mare Liberum and consider cyberspace to be a common good that requires us to reinvent natural law theory? |
Page range | pp. 173–201 |
Print length | 29 pages |
Language | English (Original) |
Contributors