Stephen A. Moore

Stephen A. MooreClass of 2014
Webmaster, Volume 39
Staff, Volume 38

Cyber Attacks and the Beginnings of an International Cyber Treaty

Stephen Moore

Volume 39 - Issue 1, Fall 2013, Page 223

Full Article Text PDF PDF
Cite as: Stephen Moore,  Cyber Attacks and the Beginnings of an International Cyber Treaty, 39 N.C. J. Int'l L. & Com. Reg. 223 (2013)

Categories: Cyberwarfare

Blog Posts

Sneak Preview: Balancing Freedom of Speech on the Internet Under International Law

Freedom of speech is a fundamental human right which allows people to communicate freely. However, inappropriate communication often leads to conflicts in society. Inappropriate communication can provoke anger and ignite flame wars between people. In particular, inappropriate communication in cultural diversity can easily constitute intercultural or cross-cultural conflict. The “Innocence of Muslims” is an example of inappropriate communication which...

No Comments | Posted by Stephen A. Moore on Mon. April 7, 2014 8:00 AM
Categories: International Law

Sneak Preview: The Limits of Regulatory Science in the Governance of Trangenic Plant Agriculture and Food Systems

The current national and transnational regulatory and policy framework for transgenic plant agriculture and food is arguably largely defined by science. Notably, transgenic plant agriculture policy deference to science is ostensibly premised on the general perception that science is neutral, objective, reliable, and agnostic. This is exemplified by cases that range from Alliance for Bio-integrity v Donna Shalala, European Communities: Measures Affecting the Approval and Marketing of Biotech Products, to European Commission v Republic of Poland, in which conscientious, ethical, religious, and cultural oppositional grounds to transgenic plant agriculture and food were trumped by scientific imperatives. However, the lack of unanimity of views amongst scientists on...

No Comments | Posted by Stephen A. Moore on Fri. April 4, 2014 1:00 PM
Categories: International Law

Sneak Preview: International Sugar Trade

“You can’t expect both ends of a sugar cane are as sweet.” – Chinese Proverb

This ancient Chinese proverb holds true for not only the varying degrees of sweetness at the ends of a sugar cane, but also for the realities of the international sugar trade. Sugar as a commodity is a major player in the agricultural sector, and the price of sugar impacts markets worldwide.

No Comments | Posted by Stephen A. Moore on Mon. March 10, 2014 8:00 AM
Categories: Free Trade, United Nations

Sneak Preview: Public Policy and the Recognition of Foreign Judgments in Canada

By: Lucien J. Dhooge

This article analyzes Canadian litigation captioned Yaiguaje v. Chevron Corporation which seeks recognition of an $18.2 billion judgment entered in Ecuador in 2011 in what has been labeled as one of the world’s largest environmental lawsuits. The article examines Chevron’s involvement in Ecuador through its predecessor in interest (Texaco) and the history of proceedings in Ecuador, Canada, and the United States and before the Permanent Court of Arbitration. The article then discusses the recognition of foreign judgments in Canada with emphasis upon the public policy defense. The article concludes that utilization of this defense presents significant issues affecting the reputation and credibility of the Canadian judiciary and its liberal approach with respect to recognition of foreign judgments.

No Comments | Posted by Stephen A. Moore on Fri. November 8, 2013 8:00 AM
Categories: Canada

Sneak Preview: What Remains of the Alien Tort Statute After Kiobel?

By: Matteo M. Winkler

The U.S. Supreme Court held in Kiobel v. Royal Dutch Petroleum Co. (PDF), 133 S. Ct. 1659 (2013), that the Alien Tort Statute (ATS), the well-known 200-years-old statute that entitles aliens to sue before federal courts for torts committed in violation of the law of nations, does not apply extraterritorially. The Court followed the 2010 decision in Morrison v. National Australia Bank (PDF), 130 S. Ct. 2869 (2010), that excluded from the reach of U.S. courts any F-cubed actions, i.e. actions that present three foreign elements such as foreign plaintiffs, foreign defendants and facts happened in a foreign forum.

Kiobel concerned claims for damages for grave violations of human rights allegedly committed against the Ogoni community in Nigeria by the subsidiaries of the Shell group operating in the country. It was a typical F-cubed case, and the Court found it very easy to apply Morrison as leading precedent.

No Comments | Posted by Stephen A. Moore on Wed. November 6, 2013 8:00 AM
Categories: International Human Rights, U.S. Supreme Court

Sneak Preview: Cyber Attacks and the Beginnings of a Cyber Treaty

The helicopters hummed along the broken Pakistani terrain, their mission accomplished. Osama Bin Laden was dead and the entire SEAL Team Six crew was safe. In three and a half hours the team had entered Pakistani airspace, assaulted the compound in Abbottabad, and returned to Afghanistan, all before the Pakistani government was ever aware of the incursion. The Pakistani air defense never detected the helicopters in its airspace. Some speculated it was this inability to detect U.S. forces that most damaged U.S.-Pakistani relations, more than the actual invasion of Pakistani territory. “Never had the [Pakistani] military, the strongest institution in the country, been so humiliated since it lost three wars to India.” Programmers and hackers stationed at U.S. Cyber Command in Ft. Meade, Maryland, could have contributed to the undetected incursion, using cyber technologies to infiltrate and turn off Pakistan’s air defense system simultaneous to the U.S.’s physical assault.

It would not be the first such cyber attack. In 2007, Israeli bombers flew undetected into Syria, blowing up what was later determined to be a partially completed, North Korean-built nuclear enrichment facility. The bombers flew undetected not due to some new radar-absorbing technology, but because Israel used a complex cyber attack to mask its entry. Israeli programmers manipulated Syria’s air defense so that it would fail to report anything on the radar.

No Comments | Posted by Stephen A. Moore on Wed. October 30, 2013 8:00 AM
Categories: Anonymous, Customary International Law, Cyberwarfare, Osama Bin Laden, Pakistan

Sneak Preview: The Influence of Politics at the ICTY

By: Stuart Ford

The recent acquittals of Ante Gotovina and Ramush Haradinaj at the International Criminal Tribunal for the Former Yugoslavia (ICTY) have once again raised questions about the nature of the ICTY’s trials: are they predominantly legal or political? This Article attempts to answer that question through a first-of-its-kind empirical study of the ICTY’s indictments. It tests whether the ICTY’s trials are structural show trials by looking for statistically significant correlations between the components of the indictment and conviction/acquittal or sentence length. It also explores whether the indictments comply with the requirements of international criminal law, are internally consistent, and match what we understand about how serious violations of international criminal law are committed. Finally, it compares charging practices at the ICTY to charging practices in a number of domestic criminal justice systems that are broadly viewed as fair and finds that the ICTY’s charging practices fall within the range of those domestic practices. The results of this analysis suggest that the ICTY’s trials are not show trials, that they are fundamentally fair, and therefore predominantly legal in nature.

However, there is evidence that the Prosecutor has been affected by political considerations when deciding who to investigate and charge.

No Comments | Posted by Stephen A. Moore on Tue. October 29, 2013 8:00 AM
Categories: ICTY, International Dispute Resolution, Yugoslavia

Sneak Preview: Rules of Origin and the Kaesong Industrial Complex: South Korea's Uphill Battle Against the Principle of Territoriality

By: Pierce Lee

This article is a case study about the rules of origin (ROOs) dealing with products undergoing outward processing (OP) in the Kaesong Industrial Complex (KIC). OP refers to temporary exportation of goods for further manufacturing. As the word “temporary” indicates, the finished goods are usually imported back to the home country for domestic consumption or permanent exportation.

The KIC is an outward processing zone (OPZ) in North Korea in which South Korean companies have set up manufacturing plants and employ North Korean labor. The KIC plays a crucial role in inter-Korean relations, but its expansion has been limited because the products undergoing OP in the KIC are often determined to have originated in North Korea and are subject to high tariffs. To address this situation, the South Korean government has entered into many free trade agreements (FTAs) containing special provisions modifying the preferential ROOs applicable under the respective FTAs so that Kaesong products become eligible for duty-free treatment or preferential tariff rates.

A close observation of those so-called “outward processing provisions” raises several questions that are not only important for inter-Korean relations but also for international economic policy.

No Comments | Posted by Stephen A. Moore on Mon. October 28, 2013 8:00 AM
Categories: North Korea, South Korea, World Trade Organization

An Unconventional Approach: Syria and Cyber Attacks

While the debate on the U.S. approach to Syria’s chemical weapons dominated the headlines, one headline that quickly disappeared concerned a Syrian-based cyber attack against the New York Times. The Syrian Electronic Army (S.E.A.), “a group of hackers who support President Bashar al-Assad of Syria,” laid claim to intentionally bringing down the New York Times website for most of the day on August 27. The offensive included “an online attack on the company’s domain registrar” and “also forced employees of The Times to take care in sending emails.” Notably, the S.E.A. claims no ties to the Syrian government, though President al-Assad reportedly referred to the group as “a real army in a virtual reality.”

The S.E.A. previously attempted similar attacks against websites of other notable news sources, including the Washington Post, CNN, and the Financial Times. Perhaps most notably, the S.E.A. hacked the Twitter account for the Associated Press last April, posting a fake tweet which read, “Breaking: Two Explosions in the White House and Barack Obama is injured.” While the tweet was soon revealed to be false, the attack resulted in a 145-point dip in the Dow Jones Industrial Average.

No Comments | Posted by Stephen A. Moore on Tue. October 8, 2013 8:00 AM
Categories: Cyberwarfare, Syria, U.N. Security Council
UNC School of Law | Van Hecke-Wettach Hall | 160 Ridge Road, CB #3380 | Chapel Hill, NC 27599-3380 | 919.962.5106

If you are seeing this, you are either using a non-graphical browser or Netscape 4.x (4.7, 4.8, etc.) and this page appears very plain. If you are using a 4.x version of Netscape, this site is fully functional but lacks styles and optimizations available in other browsers. For full functionality, please upgrade your browser to the latest version of Internet Explorer or Firefox.