Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Military, War, and Peace

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 304

Full-Text Articles in Entire DC Network

International Criminal Law And The Role Of Narrative In The War In Ukraine, Jonathan Hafetz Jun 2024

International Criminal Law And The Role Of Narrative In The War In Ukraine, Jonathan Hafetz

Pace International Law Review

This article examines the multiple ways that international criminal law (ICL)—the body of international law that seeks to impose criminal responsibility on individuals for international crimes—has impacted the conflict in Ukraine. Most violations remain unpunished, and ICL’s legal accountability mechanisms continue to face significant obstacles. But even absent prosecutions and trials, which remain contingent on an array of shifting factors, ICL has affected the Ukraine conflict in multiple ways.

The article focuses on how ICL has helped shape narratives about the war in Ukraine. In doing so, the article cautions against a strict law/politics dichotomy and instead focuses on the …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Cyberspace And The Jus Ad Bellum: The State Of Play, Michael N. Schmitt, Anusha S. Pakkam Apr 2024

Cyberspace And The Jus Ad Bellum: The State Of Play, Michael N. Schmitt, Anusha S. Pakkam

International Law Studies

This article examines how States are interpreting one aspect of the international law governing cyber activities, the jus ad bellum. The article focuses on two issues: (1) the prohibition on the use of force found in Article 2(4) of the UN Charter, and (2) the right of self-defense in Article 51. The critical unsettled question regarding the first issue is the threshold at which a hostile cyber operation can be characterized as a “use of force” subject to the prohibition of Article 2(4). Concerning the second issue, a number of unresolved questions plague the application of the right of …


Us-Taiwan Relations And The Future Of The Liberal Order, Christina Lai Mar 2024

Us-Taiwan Relations And The Future Of The Liberal Order, Christina Lai

The US Army War College Quarterly: Parameters

Strengthening ties with Taiwan is the best chance the United States has to preserve the liberal international order in Asia and improve its security relative to China. This study offers a normative perspective on how Taiwan can contribute to US-led international institutions and the Asian regional order and reduce conflict risk. It concludes with recommendations for the United States and its partners to integrate Taiwan into multilateral institutions in Asia.


International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze Mar 2024

International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze

The US Army War College Quarterly: Parameters

This article examines the international law of self-defense as it applies to the ongoing Israel-Hamas conflict to determine whether the October 2023 attacks by Hamas against Israel can be interpreted under Article 51 of the UN Charter as an “armed attack” that gives Israel the right to use military force in self-defense against non-state actors. It situates the conflict within ongoing legal and political debates, shows how this conflict fits into a changing global reality where the most dangerous security threats do not exclusively emanate from other states and concludes that Israel’s resort to force in the current conflict appears …


China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens Mar 2024

China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens

The US Army War College Quarterly: Parameters

This article argues that the People’s Republic of China uses its police and internal security forces as a nontraditional means of projecting strategic Landpower in the Indo-Pacific and Central Asia. Instead of limiting analysis of China’s power projection to military forces, this article employs new data on Chinese police engagements abroad to fill a gap in our understanding of the operating environment in Asia. Policymakers will gain an understanding of how these activities enhance China’s presence, partnerships, and influence across the region to inform the development of recommendations for a more effective response.


Strategy As Problem-Solving, Andrew Carr Mar 2024

Strategy As Problem-Solving, Andrew Carr

The US Army War College Quarterly: Parameters

This article proposes a new definition of strategy as problem-solving that challenges the focus on goals and assumptions of order within many post–Cold War approaches to strategy. It argues that the military needs strategy to diagnose the complex problems of the twenty-first century before they can be solved. Inspired by practitioners such as Andrew Marshall and George F. Kennan, this new definition clarifies what strategists do and offers a logic for distinguishing the use of the term strategy. Practitioners will also find problem-solving tools and pedagogies they can adopt today.


“Unwilling Or Unable”, Lucy V. Jordan Mar 2024

“Unwilling Or Unable”, Lucy V. Jordan

International Law Studies

Critics of the unwilling or unable doctrine suggest that it could undermine the United Nations collective security system and argue that it requires an unacceptable ceding of a State’s territorial sovereignty. Increased reliance on the doctrine following the terrorist attacks of 9/11, particularly in relation to the use of force against ISIL in Syria since 2014, has caused the doctrine to face significant scrutiny. The purpose of this article is to ascertain whether the unwilling or unable doctrine has reached customary international law status. If found to be the case, the doctrine would confirm the right of States to act …


Re-Imagining The Post-9/11 Authorizations For Use Of Military Force In The Era Of Emerging Consensus On Reform, Peter J. Amato Jan 2024

Re-Imagining The Post-9/11 Authorizations For Use Of Military Force In The Era Of Emerging Consensus On Reform, Peter J. Amato

Journal of Legislation

No abstract provided.


Instigator And Proxy Liability In The Context Of Information Operations, Carolyn Sharp Sep 2023

Instigator And Proxy Liability In The Context Of Information Operations, Carolyn Sharp

Brigham Young University Journal of Public Law

No abstract provided.


A Historical Perspective On Today’S Recruiting Crisis, Brian Mcallister Linn Aug 2023

A Historical Perspective On Today’S Recruiting Crisis, Brian Mcallister Linn

The US Army War College Quarterly: Parameters

This article analyzes the US Army’s successive recruiting crises, identifying their consistent patterns and the efforts to resolve them, and makes three provocative arguments. First, there is a long-standing institutional tension between recruiting personnel for the combat arms and technical and administrative specialists. Second, many of today’s talent management problems were first identified in a 1907 General Staff report and reiterated in subsequent studies. Third, the Army has pursued innovative recruitment strategies, but much of their success depended on factors outside the service’s control. The essay concludes with four history-based recruiting lessons and an affirmation that the 2019 Army People …


Parameters Autumn 2023, Usawc Press Aug 2023

Parameters Autumn 2023, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


A Call To Action: Lessons From Ukraine For The Future Force, Katie Crombe, John A. Nagl Aug 2023

A Call To Action: Lessons From Ukraine For The Future Force, Katie Crombe, John A. Nagl

The US Army War College Quarterly: Parameters

Fifty years ago, the US Army faced a strategic inflection point after a failed counterinsurgency effort in Vietnam. In response to lessons learned from the Yom Kippur War, the United States Army Training and Doctrine Command was created to reorient thinking and doctrine around the conventional Soviet threat. Today’s Army must embrace the Russo-Ukrainian conflict as an opportunity to reorient the force into one as forward-thinking and formidable as the Army that won Operation Desert Storm. This article suggests changes the Army should make to enable success in multidomain large-scale combat operations at today’s strategic inflection point.


Autumn Book Reviews, Usawc Press Aug 2023

Autumn Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Urban Resistance To Occupation: An Underestimated Element Of Land Warfare, Kevin D. Stringer, Jelle J. H. Hooiveld Aug 2023

Urban Resistance To Occupation: An Underestimated Element Of Land Warfare, Kevin D. Stringer, Jelle J. H. Hooiveld

The US Army War College Quarterly: Parameters

With the world trending toward urbanization, and Russia and China acting aggressively toward Ukraine and Taiwan, respectively, the conduct of irregular warfare in built-up environments—specifically, urban resistance to occupation—merits greater study. The authors’ Dutch-language and primary source research on the Netherlands’ World War II urban resistance to German occupation makes this article unique. It provides deeper insights into the occupation experiences of a highly urbanized, densely populated country in which clandestine underground and auxiliary elements played paramount roles in resistance efforts for most of the occupation period. It also illustrates the feasibility of overt, guerrilla-based activity in urban environments during …


The European Union’S Post Brexit Agenda And Priority In Defense-Security Sectors, Bayu Wicaksono, Henny Saptatia Drajati Nugrahani Jul 2023

The European Union’S Post Brexit Agenda And Priority In Defense-Security Sectors, Bayu Wicaksono, Henny Saptatia Drajati Nugrahani

Journal of Strategic and Global Studies

ABSTRACT

This research aims to explore the European Union’s agenda and priority in defence and security sectors in post Brexit era. This study is analyzed based on two research questions are: first, what are the impacts of Brexit on the European Union (EU) defense-security sectors, and the second is, what are the EU’s agenda and priority in defense-security sectors in the Post-Brexit era. The method of this research is descriptive qualitative. The analyses of the study is using Barry Buzan and Ole Waever's Regional Security Complex Theory (RSCT). The findings of this study are: first, as the impact of Brexit, …


Responding To Future Pandemics: Biosecurity Implications And Defense Considerations, Diane Dieuliis, James Giordano May 2023

Responding To Future Pandemics: Biosecurity Implications And Defense Considerations, Diane Dieuliis, James Giordano

The US Army War College Quarterly: Parameters

In an evolving and expanding biothreat landscape caused by emerging biotechnologies, increases in global infectious disease outbreaks, and geopolitical instability, the Department of Defense now faces challenges that alter its traditional approach to biothreats and prompt the need for modernized, improved preparedness for—and response to—potential biothreat scenarios. These challenges further complicate specific weaknesses revealed by the COVID-19 pandemic, including the Department’s inability to sustain the military mission while meeting intragovernmental expectations to assist with civilian public health resources and services.


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen Apr 2023

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen

Global Tides

This paper attempts to explain the threat that foreign disinformation poses for the United States Intelligence Community and its allies. The paper examines Russian disinformation from both a historical and contemporary context and how its effect on Western democracies may only be exacerbated in light of Chinese involvement and evolving technologies. Fortunately, the paper also studies practices and strategies that the United States Intelligence Community and its allied foreign counterparts may use to respond. It is hoped that this study will help shed further light on Russian and Chinese disinformation campaigns and explain how the Intelligence Community can efficiently react.


Aid And Assistance As A “Use Of Force” Under The Jus Ad Bellum, Michael N. Schmitt, W. Casey Biggerstaff Apr 2023

Aid And Assistance As A “Use Of Force” Under The Jus Ad Bellum, Michael N. Schmitt, W. Casey Biggerstaff

International Law Studies

Although the prohibition of the use of force is a cornerstone of international law, our understanding of what constitutes a “use of force” under Article 2(4) of the UN Charter nonetheless continues to evolve. While the term was traditionally understood to mean armed force, emerging interpretations are expanding our understanding of the prohibition’s breadth. The Charter’s text, travaux préparatoires, and subsequent interpretations and practice by States, reinforced by the persuasive reasoning of the International Court of Justice, all confirm that the notion of force extends to indirect force, which includes military support provided to parties to a conflict. Yet, to …


Analisis Hukum Terhadap Perlindungan Nasabah Dalam Menggunakan Internet Banking Di Indonesia (Studi Kasus Bank X), Salsabila Putrianda Jan 2023

Analisis Hukum Terhadap Perlindungan Nasabah Dalam Menggunakan Internet Banking Di Indonesia (Studi Kasus Bank X), Salsabila Putrianda

"Dharmasisya” Jurnal Program Magister Hukum FHUI

With the present development of technology and the internet, everything has been made easier. One sector that is affected by the development of information and communication technology is Banking, an economic sub-sector that mobilizes public funds. Behind the convenience obtained from the use of Internet Banking, there are also risks that can be used in the use of this service, among others, many violations of law regarding personal data via the Internet and also regarding financial risks suffered by bank customers in the use of Internet Banking The IT criminals cause the Banking industry to be able to prepare security …


After Action: The U.S. Drone Program's Expansion Of International Law Justification For Use Of Force Against Imminent Threats, Elodie O. Currier Jan 2023

After Action: The U.S. Drone Program's Expansion Of International Law Justification For Use Of Force Against Imminent Threats, Elodie O. Currier

Vanderbilt Law Review

Until the 2000s, the United States' attempts to shift international legal norms on imminence to allow for greater use of armed force abroad were largely unsuccessful. In the past two decades, however, drone use and careful legal gamesmanship by U.S. officials have opened an unprecedentedly broad allowance for use of force in imminent self-defense. As drones become increasingly available to state and non-state actors, this permissive regime poses a threat to national and international security. This Note analyzes two decades of international customary law formation around drone use outside of armed conflict through a new lens post U.S.-withdrawal of Afghanistan. …


Universal Forms Of Influence: Support For Women On Boards, Cindy A. Schipani, Paula J. Caproni Jan 2023

Universal Forms Of Influence: Support For Women On Boards, Cindy A. Schipani, Paula J. Caproni

Seattle University Law Review

There are various efforts underway to increase gender diversity on corporate boards, including legislation in California, a recent SEC approved comply or explain rule for companies listed on the Nasdaq stock exchange, and efforts by institutional investors such as State Street and BlackRock to recognize the value diversity brings to corporate decisionmaking. Although some of these efforts are being contested in the courts, many companies have begun to comply with these initiatives.

This Article is organized as follows. Part I provides an overview of several efforts to increase gender diversity on boards along with numerous research studies showcasing the benefits …