PIL Applicant Draft Memorial
PIL Applicant Draft Memorial
PIL Applicant Draft Memorial
TABLE OF CONTENTS
TABLE OF CONTENTS...i
INDEX OFAUTHORITIES........................................................................................................iii
STATEMENT OF JURISDICTION............v
QUESTIONS PRESENTED....vi
STATEMENT OF FACTS.................................vii
SUMMARY OF PLEADINGS............................ix
MAIN PLEADINGS......1
I The
Federal
Republic
of
Luka
violated
its
international
obligations....
...1
a. The ASSEN Agreement is binding Upon Ratificatiom..1
b. Luka Acted in Clear Bad Faith by not to enacting an enabling law..2
c. Luka Violated the ASSEN Convention on Transboundary Haze Pollution by Facilitating,
allowing and failure to prevent the 2013 Haze Crisis..5
d. Luka allowed the haze crisis by failing to take precautionary measures in order to stop
or mitigate transboundary haze.6
e. Luka failed to undertake measures to prevent and control activities related to land
and/or forest fires, thereby failing to prevent the haze crisis.7
II.Luka violated Customary law on preventing Transboundary harms by failure to exercise
due diligence.............................................................................................................8
III.
The Federal Republic Of Luka Is Responsible for the 2013 Haze Crisis that caused
severe economic and Health Problems for the People of the Republic of Megat and
must correspondingly pay compensation for the damages Caused. ...............................12
a. The Failure Of The Federal Republic Of Luka To Prevent The Use Of Fire By Private
Persons In Clearing The Moltres Forest Which Resulted In The 2013 Haze Crisis
Constitutes An Internationally Wrongful Act Making Them Liable To Pay Compensation
For The Damages Caused To The People Of The Republic Of Megat.13
b. The incident is not merely an accident due to force majeure...........................................14
CONCLUSION AND PRAYER.................................................................................................17
INDEX OF AUTHORITIES
Treaty/Convention
Declaration of the United Nations Conference on the Human Environment (Stockholm 1972)
1969 Vienna Convention on the Law of Treaties
Cases
A case of first impression on the right of a belligerent to seize neutral shipping by way of
necessity, (1925) 1KB271,295.
Armed Activities (New Application: 2002) case.
Case concerning the Barcelona Traction, Light and Power Company, Limited, Second Phase,
Judgment of 5 February 1970, ICJ Reports (1970), p. 3, at p. 32.
CASE CONCERNING UNITED STATES DIPLOMATIC AND CONSULAR STAFF IN
TEHRAN, US Vs. Iran (May 25, 1980)
Corfu Channel Case, UK Vs. Albania(1948)
Pulp Mills Case, Argentina Vs. Uraguay (2010)
Trail Smelter Arbitration(1941)
Text
David Harris. LL.M, PH.D,C.M.G. Cases and Materials on International law (2010)
Ian Brownlie, CBE, QC, FBA; PrinciplesofPublic International Law (1998)
McNair, Law Of Treaties (1905)
Online Sources
Ives, Mike. The Air Pollution thats Choking Asia. Retrieved from:
http://edition.cnn.com/2015/01/27/asia/asia-air-pollution-haze/.
Kaczorowska, Alina, (eds) 2015. Public International Law 5th Edition. p.24. Available from:
http://www.books.google.com.ph. [September 29, 2015]
Kurukulasuriya, Laland Robinson, Nicholas A.Training Manual on International
Environmental Law. Retrieved from:
http://www.unep.org/environmentalgovernance/Portals/8/documents/training_Manual.pdf
Navia, Rafael Nieto. International Peremptory Norms (Jus Cogens) and International
Humanitarian Law. Retrieved from:
http://www.iccnow.org/documents/WritingColombiaEng.pdf.
Yearbook of the International Commission 1978, vol.II, (1);
http://www.un.org/law/ilc/index.htm
Articles/Journals:
"Force majeure" and "Fortuitous event" as circumstances precluding wrongfulness: Survey of
State practice, international judicial decisions and doctrine - study prepared by the
Secretariat. Extract from the Yearbook of the International Law Commission:-1978
Document:-vol. II(1).
I.L.C Draft Articles on Transboundary Harm, supra note 21 at 392.
I.L.M. 818 [Hereinafter CBD]; Principle11, World Charter for Nature, , UNGA Res. 37/7, 37
U.N. GAOR, Suppl. (No. 51), at 17, U.N.Doc. A/37/51(Oct. 28, 1982); principle 15, Rio
Declaration supra note 21; Art. 10, Cartagena Protocol on Biosafety to theConvention on
Biological Diversity, Jan. 29, 2000, 39 I.L.M 1027; See also David Freestone and Ellen Hey.
U.N Convention on Biological Diversity, Preamble, June 5, 1992
https://ecpr.eu/Filestore/PaperProposal/f1874dac-6e16-4d9c-b936-723754fcc869.pdf
https://archive.org/stream/TallinnManual/TallinnManual_djvu.txt
http://www.sans.edu/research/security-laboratory/article/traffic-analysis
https://ccdcoe.org/sites/default/files/multimedia/pdf/Shackelford%20-%20State
%20Responsibility%20for%20Cyber%20Attacks%20Competing%20Standards%20for%20a
%20Growing%20Problem.pdf
http://www.lawctopus.com/academike/the-corfu-channel-case/
http://chicagounbound.uchicago.edu/cgi/viewcontent.cgi?article=1500&context=cjil
http://legal.un.org/ilc/texts/instruments/english/draft_articles/9_6_2001.pdf
https://www.ilsa.org/jessup/jessup16/Batch%201/UNCharterICJStatute.pdf
https://www.ilsa.org/jessup/jessup16/Batch%202/SchmittDueDiligence.pdf
https://archive.org/stream/TallinnManual/TallinnManual_djvu.txt
http://legal.un.org/ilc/texts/instruments/english/draft_articles/9_6_2001.pdf
STATEMENT OF JURISDICTION
On 01 September 2015, the State of Amestonia and the Federal Republic of Riesland, in
accordance with Article 40(1) of the Statute of the International Court of Justice, submit the
recent dispute to the court. See Special Agreement Submitted to the International Court of Justice
by the State of Amestonia and the Federal Republic of Riesland on the Differences between them
Concerning the Frost Files, signed in The Hague, The Netherlands.
QUESTIONS PRESENTED
I.
MASS
ELECTRONIC
AMESTONIAN
PUBLIC
SURVEILLANCE
PROGRAMS
FIGURES
NATIONALS
AND
AMESTONIA
IS
THEREFORE
ENTITLED
TO
AN
ORDER
II.
III.
IV.
THE
AMES
ATTRIBUTABLE
POST
AND
CHESTER
TO
RIESLAND,
&
AND
WALSINGHAM
ARE
CONSTITUTE
AN
STATEMENT OF FACTS
SUMMARY OF PLEADINGS
MAIN PLEADING
I.
The documents published on the website of The Ames Post are admissible as
evidence before the court; Rieslands mass electronic surveillance programs against
Amestonian public figures and nationals revealed in those documents violates
international law; and Amestonia is therefore entitled to an order directing the
immediate cessation of those programs with assurances of non-repetition.
A. The Documents published on the website of The Ames Post are admissible as
evidence before the court.
i.
Generally Accepted Principles of International Law
a. Ex Turpi Causa Non Oritur Actio
The Principle that a right cannot stem from a wrong is inapplicable in
leaked information because, to invoke this principle, the right, property or
B. Reislands mass electronic surveillance programs against Amestonian public figures and
nationals revealed in those documents violate international law; and Amestonia is
therefore entitled to an order directing immediate cessation of those programs with
assurance of non-repitition.
i.
International Law Status of the Right to Privacy
The International Covenant on Civil and Political Rights (ICCPR), Universal
Declaration of Human Rights (UDHR), and International Legal Framework are
relevant in the determination of the international law status of the right to Privacy. It
must be recalled that both Reisland and Amestonia are signatories to the foregoing
covenant, declaration and instrument.
Article 17 of the ICCPR provides, No one shall be subjected to arbitrary
or unlawful interference with his privacy, family, home or correspondence, nor to
unlawful attacks on his honor and reputation. Everyone has the right to the protection
of the law against such interference or attacks.
Likewise, Article 12 of the UDHR has the exact provision on the right to
privacy.
Currently, an international legal framework on the right to privacy is
embodied in the UN General Assembly resolution 68/167 which was promulgated in
December 2013. The resolution provides the universal framework against which any
interference in individual privacy rights must be assessed. It states that the right to
privacy under international human rights law is not absolute. However, any
instance of interference must be subject to careful and critical assessment of its
necessity, legitimacy, and proportionality. A follow-up resolution on November 25,
2014 calls for the states to respect and protect the right to privacy in the digital age.
The same resolution reiterated the observance of the principles of necessity,
legitimacy, and proportionality.
From the ICCPR, the UDHR and the UN General Assembly Resolution, it is
clear that the right to privacy has international status.
ii.
of the worlds largest Internet companies, including Microsoft, Yahoo, Google Facebook,
PalTalk, AOL, Skype, YouTube and Apple.
In the aforementioned case, the Court of Appeals ruled for the appellant on the
ground that the government failed to meet the relevance standard which it said is a simple
and well established standard of law. It is a standard for obtaining every kind of
subpoena, including administrative subpoenas, grand jury subpoenas, and civil discovery
orders. What the relevance standard means, according to the court, is that there has to be
an authorized investigation and the surveillance of a specific subject (i.e. information,
individual, entity, etc.) must be relevant to such investigation. Thus, while the
government claimed that it is for purposes of countering terrorism as provided for the
Patriot Act, the court held that what the law allowed was surveillance relevant to an
investigation not just an assessment. The surveillance conducted was therefore a violation
of the right to privacy because it went beyond the scope of what the law allowed.
From this case, we submit that when surveillance must be relevant to an
authorized investigation for it to be a valid interference on the right to privacy, the
standard actually requires that the surveillance is necessary for the object of the
investigation and the extent of the surveillance must be confined within the object of that
investigation. In other words, it is akin to the principles of necessity and proportionality
set forth by the international instrument.
The principles of necessity and proportionality find the same application in the
case against Government Communications Headquarters (GCHQ), a British intelligence
agency. The Investigatory Powers Tribunal (IPT), an independent judicial body in UK
which hears complaints on surveillance by public bodies, ruled that GCHQ acted
the circumstances in which and the conditions on which public authorities were
empowered to resort to this secret and potentially dangerous interference with the right to
respect for private life and correspondence. On the necessity of the interference in a
democratic society, the Court held in Kennedy v. the United Kingdom, there has to be
adequate and effective guarantees against abuse. Further, the interest of the respondent
State in protecting its national security must be balanced against the seriousness of the
interference with the applicants right to respect for his private life.
Clearly, the principles of necessity and proportionality are established by these caselaws.
I.
II. The seizure and forfeiture of the VoR station and its equipment, and the arrest of Margaret
Mayer and the other two VoR employees, did not violate the Broadcasting Treaty, and
were in accordance with Amestonias other international law obligations.
A. Amestonia did not violate the Broadcasting Treaty
i.
Amestonia had the right to enter the VoR station in cases where there is serious threat
to public safety or order.
The Broadcasting Treaty states in Article 14(1);
The premises referenced in article 1(2) of the present Treaty shall be
inviolable, and agents of the host state may not enter those premises without the
consent of the head of the station. Such consent may be assumed only in cases of fire
or other similar disaster posing or threatening serious immediate danger to public
safety or order.
Knowing from the facts stated in Paragraphs 25 and 26 of the compromis
that the VoR station was the hub of unauthorized surveillance of Amestonian
activities that threatened the its national security, Amestonian police authorities
properly obtained a warrant to search the premises and seize all the assets and
property to determine the extent of the danger.
ii.
Margaret and the other two VoR employees lost their rights to immunity at the
moment they abandoned their duties at the VoR station.
Article 36 of the Broadcasting Treaty states:
All privileges and immunities provided for in this Treaty, save for those in
Article 15(1)(c) above, shall cease to have effect upon the cessation of the stations
functions as envisaged in the present Treaty.
Each station shall produce and air programs and content including news
stories, interviews, documentaries, and movies produced either in or by the operating
country, with local viewers and listeners in the host country as the target audiences.
Hence, Margaret Mayer and the other two VoR employees by acting as
collaborators in the surreptitious collection of intelligence of Amestonias highraking officials1, they have been stripped off their immunities and privileges
safeguarded by the Broadcasting Treaty. They can be considered as security theats as
which properly gives Amestonia the right to arrest them.
B. Assuming arguendo that Amestonia did violate the Broadcasting Treaty
i.
The Broadcasting Treaty is deemed to be terminated or suspended because of
Reislands substantial breach of the said treaty.
Reisland committed a material breach of the stipulations in the Broadcasting
Treaty, specifically on Art 23 (1) and (2), to wit:
Article 23.
1. Without prejudice to their privileges and immunities, it is the duty of all
persons employed by each station to respect the laws and regulations of the
host state. Those who are nationals of the operating state have an additional
duty not to interfere in the internal affairs of the host state.
2. The premises of the station must not be used in any manner incompatible
with the stations functions as envisaged in the present Treaty, in other rules
1 Paragraph 25,compromis
A material breach of the bilateral treaty by one of the parties entitles the other
to invoke the breach as a ground for terminating the treaty or suspending its
operation in whole or in part, and par. 3 of the same article provides that A material
breach of a treaty, for the purposes of the present article, consists in:
(a) A repudiation of the treaty not sanctioned by the present articles; or
(b) The violation of a provision essential to the accomplishment of the object or
purpose of the treaty.
said that naturally it does not mean that a diplomatic agent caught in the act of
committing an assault or other offence may not, on occasion, be briefly arrested by the
police of the receiving state in order to prevent the committing of the particular crime.
Diplomatic immunity cannot be more important than the security of the receiving
state. It was clear that Amestonias security had been threatened and its extent unknown.
Therefore, for the safety of our nation and the safety of the suspect diplomats, it was
prudent that the correct course of action for Amestonia was to detain Margaret and her
companion VoR employees, and to secure the effects found within the station until an
investigation and the extent of the crime could be determined.
(in 1948 the Japanese ambassador to Belgium, General Oshima, was sentenced by
a military tribunal for his war crimes durng the Second World War despite his diplomatic
status)
ii.
First, they were unable to present pertinent travel documents on their exit
from Amestonia upon apprehension by the Border Patrol.5 It is standard protocol to
ask entering or leaving non-citizens of a State to for identification. Because they
were unable to do so, they were rightfully put under custody.
In Union of India v Paul Nanickan and Anr 9, the Supreme Court of India
stated: the object of preventive detention is not to punish a man for having done
something but to intercept him, before he does it, and to prevent him from doing it.
Applying the abovementioned, even if no criminal charge has been filed
against Mayer and the VoR employees prior to the arrest, detaining them is
considered lawful for Amestonias security and public order. A warrant of arrest was
then subsequently served to Mayer and her companions.
iii.
The premises of the mission must not be used in any manner incompatible
with the functions of the mission as laid down in the present Convention or by other
rules of general international law or by any special agreements in force between the
sending and receiving State.
The diplomatic immunity and inviolability of the premises of the mission
should be understood to lie on the premise that it would not be used in contravention
to the purpose of the present Convention. Certainly, the promulgation of the Vienna
Convention on Diplomatic Relations cannot have been for the purpose on
threatening the security of another State. The intention of the Convention should
prevail over its letter. The Preamble of the present Convention provides:
xxx
Having in mind the purposes and principles of the Charter of the United
Nations concerning the sovereign equality of States, the maintenance of international
peace and security, and the promotion of friendly relations among nations,
Believing that an international convention on diplomatic intercourse,
privileges and immunities would contribute to the development of friendly relations
among nations, irrespective of their differing constitutional and social systems
Realizing that the purpose of such privileges and immunities is not to
benefit individuals but to ensure the efficient performance of the functions of
diplomatic missions as representing States.
III.
The detention of Joseph Kafker under the Terrorism Act violated international law,
and Amestonia is therefore entitled to his immediate release, the disclosure of all
information which formed the basis of his apprehension, and the payment of
compensation for his detention.
A. The detention of Joseph Kafker falls under the purview of arbitrary detention
which violates the international law
i.
The prohibition of arbitrary deprivation of liberty in international law
The prohibition of arbitrary deprivation of liberty is recognized in all major
international and regional instruments for the promotion and protection of human rights.
These include articles 9 of the Universal Declaration of Human Rights and the
International Covenant on Civil and Political Rights, article 6 of the African Charter of
Human and Peoples Rights (African Charter), article 7, paragraph 1, of the American
Convention on Human Rights (American Convention), article 14 of the Arab Charter on
Human Rights (Arab Charter), and article 5, paragraph 1, of the European Convention for
the Protection of Human Rights and Fundamental Freedoms.10
ii.
Political Rights, and the prohibition of arbitrary deprivation of liberty is widely enshrined
in national constitutions and legislation and follows closely the international norms and
standards on the subject. This widespread ratification of international treaty law on
arbitrary deprivation of liberty, as well as the widespread translation of the prohibition
into national laws, constitute a near universal State practice evidencing the customary
nature of the arbitrary deprivation of liberty prohibition. Moreover, many United Nations
resolutions confirm the opinioiuris supporting the customary nature of these rules: first,
10Deliberations of the Working Group on Arbitrary Detention,
http://www.ohchr.org/Documents/Issues/Detention/CompilationWGADDeliberation.pd
f
resolutions speaking of the arbitrary detention prohibition with regard to a specific State
that at the time was not bound by any treaty prohibition of arbitrary detention; second,
resolutions of a very general nature on the rules relating to arbitrary detention for all
States, without distinction according to treaty obligations. Such resolutions demonstrate
the consensus that the prohibition of arbitrary deprivation of liberty is of a universally
binding nature under customary international law.11
iii.
11Supra
12 Universal Declaration of Human Rights
every 21 days. The Human Rights Committee has stated that in order to avoid a
characterization of arbitrariness, detention should not continue beyond the period
for which the State party can provide appropriate justification.14
b. The National Security Tribunal is not a competent, independent and
impartial tribunal to hear the case of Kafker, thus violating his right to fair
and public hearing
Article 14 of the same Covenant further provides:
1. All persons shall be equal before the courts and tribunals. In the
determination of any criminal charge against him, or of his rights and obligations
in a suit at law, everyone shall be entitled to a fair and public hearing by a
competent, independent and impartial tribunal established by law. The press
and the public may be excluded from all or part of a trial for reasons of morals,
public order (order public) or national security in a democratic society, or when
the interest of the private lives of the parties so requires, or to the extent strictly
necessary in the opinion of the court in special circumstances where publicity
would prejudice the interests of justice; but any judgment rendered in a criminal
case or in a suit at law shall be made public except where the interest of juvenile
persons otherwise requires or the proceedings concern matrimonial disputes or the
guardianship of children.
cause of the charge against him; he was not given the discretion to communicate with
counsel of his own choosing, as his lawyer was selected from a list of approved special
advocates of the State of Reisland; he was not permitted either to consult with his client
or to share with him any of the secret information said to substantiate the allegations
against him, depriving him of any facility for the preparation of his defence; the bureau
officers who served as witnesses testifying via video conferencing, with their faces and
voices obscured regarding the need to detain Kafker is in contravention of his right to
examine, or have examined, the witnesses against him and to obtain the attendance and
examination of witnesses on his behalf under the same conditions as witnesses against
him.
v.
Applying the foregoing elements, Joseph Kafkers detention does not meet all of
the elements to deem his detention legal. His apprehension and detention is based on
evidence which is not disclosed by the State of Reisland as the same is considered
closed material which, according to the Terrorism Act, shall not be made available to
the detainee, his or her counsel, or third parties, without the Tribunals authorization.
Amestonias Prime Minister contacted his counterpart in Riesland and demanded access
to the said secret evidence, but the same was rejected as it would allegedly endanger the
integrity of particular intelligence sources and therefore the national security of Riesland.
Thus, it ultimately fails to meet the second element, wherein information of the reasons
for the detention must be given, in order to satisfy the customary principle of affording
due process to the accused.
vi.
no court shall review the detention of any person, but every detainee shall be brought
before the Tribunal within three days of his or her detention.18
Counter-terrorism legislation, such as the Terrorism Act of 2003 of Reisland, that
permits administrative detention often allows secret evidence as the basis for indefinite
detention. As this would be inconsistent with the prohibition of arbitrary deprivation of
liberty, no person should be deprived of liberty or kept in detention on the sole basis of
evidence to which the detainee does not have the ability to respond, including in
cases of immigration, terrorism-related and other subcategories of administrative
detention. The Working Group has held that, even if lawyers of the detainee have access
to such evidence but are not allowed to share or discuss it with their client, this does not
sufficiently protect the detainees right to liberty.19
The Working Group also reiterates that the use of administrative detention
under public security legislation [or] migration laws resulting in a deprivation of
liberty for unlimited time or for very long periods without effective judicial oversight, as
a means to detain persons suspected of involvement in terrorism or other crimes, is not
compatible with international human rights law.20
vii.
The basis of Kafkers arrest and detention is also in violation of his freedom
of expression and opinion and his right to privacy
address at an international environmental law conference, a proper venue for airing his
grievances regarding the environmental issue at hand.
Furthermore, Article 12 of the Universal Declaration of Human Rights grants:
No one shall be subjected to arbitrary interference with his privacy, family, home or
correspondence, nor to attacks upon his honour and reputation. Everyone has the right to
the protection of the law against such interference or attacks.25 Likewise, Article 17 of
the ICCPR provides that no one shall be subjected to arbitrary or unlawful interference
with his privacy, family, home or correspondence, nor to unlawful attacks on his honour
and reputation and everyone has the right to the protection of the law against such
interference or attacks.
The United Nations General Assembly adopted Resolution 68/167 in December
2013, where it emphasizes that unlawful and arbitrary surveillance and/or interception of
communications, as well as unlawful or arbitrary collection of personal data, as highly
intrusive acts, violate the rights to privacy and freedom of expression and may contradict
the tenets of democratic society, and that States must ensure full compliance with their
obligations under international human rights law.26 Hence, the continuous surveillance of
Kafker, following the bugging of his devices is in gross transgression of his right to
privacy and expression.
viii.
international law
B. Kafker, as a victim of arbitrary detention, is entitled to his release and the disclosure
of all information which formed the basis of his apprehension, and the payment of
compensation for his detention.
Having exhausted all local remedies but to no avail,
Article 9 of the ICCPR provides that Anyone who has been the victim of
unlawful arrest or detention shall have an enforceable right to compensation
IV.
The cyber attacks against the computer systems of The Ames Post and Chester
&Walsingham are attributable to Riesland, and constitute an internationally
wrongful act for which Amestonia is entitled to compensation.
A. The cyber attacks against the computer systems of The Ames Post and Chester
&Walsingham are attributable to Riesland.
i.
The tracing of the IP address based on traffic analysis and conclusion that the cyber
attacks were from Rieslandic infrastructure was done by AIT, a world renowned
research-intensive academic institution with a focus on engineering and computer
science.27
The current issue lies with the tracing the IP address and pinpointing the
origin of the cyber attacks on computer networks of The Ames Post and Chester
&Walsingham. A matter which requires the capabilities of individuals or institutions
which have the sufficient technical knowledge and expertise in such area. Cyber
attacks are known to be sophisticated and are difficult to trace, especially when done
by knowledgeable hackers but such task is NOT impossible. There are established
The cyber attacks were traced back to infrastructures located in Riesland and were
Rieslandic Governmental computer Infrastructures as confirmed by AIT. Though
according to the rule is not determinative evidence for attributing such attack to that
State, as such government infrastructure may have been overrun by elements other than
legitimate actors of such state. But such rule also states that it is a very good
indication that the State in question is associated with the operation.
C. General Principle of law wherein if direct evidence is unavailable proof may be
administered by means of circumstantial evidence.
1. The Corfu Channel Case (UK v. Albania)
A portion of the dissenting opinion of Judge Azevedo in the Corfu Channel case
in agreement with the majority in accepting circumstantial evidence in international
courts:
Indirect evidence is admitted in all systems of law, and its use is recognized by
international decisions. It must be regarded as of special weight when it is based
on a series of facts linked together and leading logically to a single conclusion . . .
The proof may be drawn from inferences of fact (presomptions de fait), provided
that they leave no room for reasonable doubt.
In the UK v. Albania, more popularly referred to as the Corfu Channel Case, two
British destroyers struck mines in Albanian waters and suffered damage. The UK asked
for compensation from Albania, who in turn denied knowledge of such mines. And thus
deterred any allegation of owing compensation to the UK.
Such being the case, it was argued by the UK and as accepted by the court that
due to the fact that a State exercises exclusive control within its territory it may be
impossible to provide direct proof of facts. Wherein the victim should be given a more
liberal recourse to inferences of fact and circumstantial evidence. That such evidence
must be treated with great weight if it is based on a series of facts which when linked
together, logically leads to a single conclusion.
In this cited case, two things which corroborated each other were considered. The
first series of facts constituted of Albanias attitude before and after the incident. Which
included how the mines which were located in Albanian waters were placed, as to who
placed them, and its duty to warn passing vessels of such. Which of course it did not do.
This was stressed as the channel was already sweeped in advance and it came out clean.
The second series of facts related to Albanias capability to observe the mines. This was
considered as the North Corfu Channel was at a spot which could have been easily
monitored even with just a lookout. These two series of facts were considered and thus
lead to the conclusion that Albania had ordered the placing of such mine, had knowledge
such fact, or had acquiesced thereto.
material that could contribute to corroborating the existence of a fact. In other words,
they were treated as circumstantial evidence and were thus considered by the court in
deciding this case.
Though in this case judgment was rendered against Nicaragua for the fact that the
evidence they presented were insufficient and there was no evidence which clearly show
that the US exercised control over such contras, nonetheless it can be shown that
international tribunals accept circumstantial evidence.
3. The PulauLigitan and PulauSipadan Islands Case (Indonesia v. Malaysia)
Indonesia and Malaysia had been in dispute over which of them had sovereignty
over the islands of Ligitan and Sipadan. During arbitration Malaysia presented maps as
circumstantial evidence, to which Indonesia objected.
The courts declared these maps as failing to establish territorial title as they were
not annexed to an official text of which they form an integral part. As such, they were
merely extrinsic evidence.
Though, in its judgment the court determined that the islands under controversy
belonged to Malaysia. And a separate opinion by Judge Franck who was sitting as an ad
hoc judge in this case is a positive view on the acceptance of circumstantial evidence. He
stated that even though circumstantial evidence was inconclusive, it still allowed the
invocation of a rebuttable presumption.
Application to the case:
In the present case, there exists a series of facts and events which show that
Riesland had a positive reason for instigating the cyberattack against the computer
systems of The Ames Post and Chester &Walsingham.
information, and that it will do whatever is in its power to disrupt any further threats to
our national security.32
A few days after this statement was made, the computer systems of both Chester
&Walsingham and The Ames Post were hacked and disabled rendering 90% of the data
as unrecoverable.33
It can thus be seen that when all these facts and events when taken into
consideration as a whole, shows that Riesland is responsible for the cyber attacks on
Chester &Walsingham and The Ames Post.
B. Such cyber attacks constitute an internationally wrongful act for which Amestonia is
entitled to compensation.
i.
Draft Articles on State Responsibility/ UN Charter
1. The draft articles on State responsibility provides for what constitutes an
internationally wrongful act of a state. In the current international law, in order for a state
to be made liable for its act against another state, such act must meet the required
elements as provided.
Article 2. Elements of an internationally wrongful act of a State
There is an internationally wrongful act of a State when conduct
consisting of an action or omission:
(a) is attributable to the State under international law; and
(b) Constitutes a breach of an international obligation of the State.
32 Paragraph 35, Compromis
33 Paragraph 37, Compromis
Both the states of Riesland and Amestonia are members of the United Nations and
parties to the UN Charter and in such charter its member states have a duty of a
state not to interfere with another states sovereignty under Article 2(4) of the UN
Charter, herein cited:
Art. 2 (4). All Members shall refrain in their international relations from the
threat or use of force against the territorial integrity or political independence of
any state, or in any other manner inconsistent with the Purposes of the United
Nations.
Both The Ames Post and Chester &Walsingham were located at
Amestonia, well within its territory. The prior being its most widely read
newspaper and the latter being one of its law firms. Riesland having used means
to disrupt the computer networks and with the use of its Blaster program
destroyed the computer infrastructures of The Ames Post and Chester
&Walsingham in order to destroy that information therein. Hereby encroaching
upon the sovereign rights of Amestonia over them.
It is well accepted that for a sovereign state, infrastructures located within
a states territory is within its control. Riesland, by destroying such computer
infrastructures within Amestonias territory violated this duty which it owed as
provided in the above cited article.
iii.
Article 31 of the draft articles on state responsibility provides that a state which is
responsible for an internationally wrongful act has a duty to make reparations to
the victim state.
Article 31. Reparation
1. The responsible State is under an obligation to make full reparation for the
injury caused by the internationally wrongful act.
2. Injury includes any damage, whether material or moral, caused by the
iv.
The manual expressly states in Rule 6 thereof that a state responsible for a
cyber operation is liable for it and such act constitutes a breach of an international
obligation.
RULE 6 - Legal Responsibility of States
A. State bears international legal responsibility for a cyber
operation attributable to it and which constitutes a breach of an
international obligation.
It is a principle in international law that a state is liable for an act when:
(1) It is attributable to the state, (2) it constitutes a breach of an international legal
obligation attributable to that state. this breach may be an act or omission.
In cyberspace, such breach may be through the violation of the United
Nations Charter, for example the use of force through cyber means or a violation
of armed conflict obligations like a cyber attack on civilian objects.
Rule 30 of the Tallinn Manual describes a Cyber Attack as a cyber
operation, whether offensive or defensive, that is reasonably expected to cause
injury or death to persons or damage or destruction to objects. And according to
its drafters, should not be understood as limited to activities that release kinetic
force and what is best considered are the effects that are caused. If the
consequences are destructive, the operation is an attack.
As explained by the experts: This current rule should not be limited to
operations against individuals or physical objects but rather it is considered to
include cyber operations against data (which are non-physical entities) from the
ambit of the term attack. Whenever an attack on data results in the injury or death