Skip to main content
punctum books

Extraterritorial Jurisdiction to Enforce in Cyberspace? Bodin, Schmitt, Grotius in Cyberspace

Chapter of: Extraterritorialities in Occupied Worlds(pp. 173–201)

Export Metadata

  • ONIX 3.0
    • Thoth
      Cannot generate record: No publications supplied
    • Project MUSE
      Cannot generate record: No BIC or BISAC subject code
    • OAPEN
      Cannot generate record: Missing PDF URL
    • JSTOR
      Cannot generate record: No BISAC subject code
    • Google Books
      Cannot generate record: No BIC, BISAC or LCC subject code
    • OverDrive
      Cannot generate record: No priced EPUB or PDF URL
  • ONIX 2.1
    • EBSCO Host
      Cannot generate record: No PDF or EPUB URL
    • ProQuest Ebrary
      Cannot generate record: No PDF or EPUB URL
  • CSV
  • JSON
  • OCLC KBART
  • BibTeX
  • CrossRef DOI deposit
    Cannot generate record: This work does not have any ISBNs
  • MARC 21 Record
    Cannot generate record: MARC records are not available for chapters
  • MARC 21 Markup
    Cannot generate record: MARC records are not available for chapters
  • MARC 21 XML
    Cannot generate record: MARC records are not available for chapters
Metadata
TitleExtraterritorial Jurisdiction to Enforce in Cyberspace?
SubtitleBodin, Schmitt, Grotius in Cyberspace
ContributorMireille Hildebrandt(author)
DOIhttps://doi.org/10.21983/P3.0131.1.12
Landing pagehttps://punctumbooks.com/titles/extraterritorialities-in-occupied-worlds/
Licensehttps://creativecommons.org/licenses/by-nc-sa/4.0/
CopyrightHildebrandt, Mireille
Publisherpunctum books
Published on2016-02-16
Long abstractWhat is at stake if our justice authorities decide to hack a computer system that is physically located on a server outside the territory of the state they represent, for instance because a webbot was operated from that location,1causing serious harm to a variety of computing sys-tems in our own jurisdiction — harm that renders the perpetrator criminally liable under our own criminal law? How would we respond to Ukrainian, Chinese, Iranian, British, or Argentinian justice authorities that hack a computer system that is located within our own jurisdiction? Does it make a difference whether the hack by law enforcement authorities targets a dissident whose right to free speech is denied or a network disseminating child pornography? Should we evaluate such groping for extraordinary jurisdiction in terms of just ver-sus unjust causes (a bellum iustum privatum?) or is this about the Westphalian interplay of internal and external sovereignty? Might the attempt to extend or initiate extraterritorial jurisdiction-to-enforce be understood as an oc-cupatio, grounded in what Schmitt coined “a-legality,” or should we follow Grotius’s Mare Liberum and consider cyberspace to be a common good that requires us to reinvent natural law theory?
Page rangepp. 173–201
Print length29 pages
LanguageEnglish (Original)