This section allows you to access several publications on extraterritorial obligations.
At this stage, you will be able to see publications by the ETO Consortium as well as compilations edited by academics (most of whom are members of the ETO Consortium).
Note! We will shortly have larger databases available: a collection of articles and books by academics. And at later stage two databases bringing together ETO-related publications by civil-society organizations and UN pronouncements on ETOs.
Beneath, you can access key publications: those by the ETO Consortium, all open access articles of the Routledge Handbook on Extraterritorial Human Rights Obligations, as well as some other useful articles.
Cybersecurity and extraterritorial obligations of states
Ensuring cybersecurity is a common interest-based obligation for states. This applies independently of borders, especially as failing to ensure cybersecurity in one state means endangering cybersecurity in all states. Human rights-related extraterritorial obligations of states oblige states to ensure an adequate level of cybersecurity and are important normative vectors for an increasingly robust protection of […]
Extraterritorial military action
Human rights bodies have clarified that extraterritorial human rights obligations (ETOs) apply in situations of armed conflict. ETOs arise whenever a State exercises effective control over a person or territory, or has the ability to infringe upon a person’s human rights. In particular, the degree of control exercised in a given context determines the extent […]
Arms trade and weapons export control
International arms sales are a thriving business giving rise to a host of legal concerns for both the supplying and the recipient countries. How much due diligence is a ‘sending’ state required to engage in before weapons are sold? Does state authorization effectively obviate the existence of fault in corporate officials supplying arms later to […]
Surveillance and cyber operations
This chapter examines the extent to and the basis on which human rights treaties apply extraterritorially to state surveillance and cyber operations. The chapter outlines how the traditional models of extraterritorial application, the spatial and the personal, apply to surveillance and cyber operations, examining older case law in that regard. It then looks at recent […]
Extraordinary rendition. A classic example of the USA avoiding ETOs as seen from Europe
This chapter examines the Central Intelligence Agency’s (CIA) extraordinary rendition programme from the perspective of its consequences for European states which provided assistance. Extraordinary rendition, the term given to the kidnapping by US state officials (CIA) of persons suspected of terrorist involvement from the state where they are present and their (involuntary) transport to another […]