Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 84

Full-Text Articles in Entire DC Network

Updating The Caroline Doctrine: A Relic In An Age Of Hypersonic Weapons, David S. Jonas, Tyler Breeden Jan 2024

Updating The Caroline Doctrine: A Relic In An Age Of Hypersonic Weapons, David S. Jonas, Tyler Breeden

American University International Law Review

The United States dropped “Little Boy” and “Fat Man” on the cities of Hiroshima and Nagasaki in 1945, bringing an end to World War II and killing between 110,000 and 210,000 people. Japan surely needed much more than rock and roll to help them—especially since Japan had no nuclear weapons of their own to deter the United States from attacking with nuclear weapons. Nuclear weapons technology has evolved considerably in the years since 1945, when only the United States possessed nuclear weapons. Nine states now have or are suspected of having them, and at least one other state appears to …


Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton Jul 2023

Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Advances in information technology have irrevocably changed the nature of war crimes investigations. The pursuit of accountability for the most serious crimes of concern to the international community now invariably requires access to digital evidence. The global reach of platforms like Facebook, YouTube, and Twitter means that much of that digital evidence is held by U.S. social media companies, and access to it is subject to the U.S. Stored Communications Act.

This is the first Article to look at the legal landscape facing international investigators seeking access to digital evidence regarding genocide, war crimes, crimes against humanity, and aggression. It …


Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland Jan 2023

Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland

American University Law Review

In the wake of the United States Supreme Court’s devastating decision to strip Americans of their constitutional right to abortion in Dobbs v. Jackson Women’s Health Organization, data privacy is more salient than ever. Without adequate data regulations, state governments and anti-abortion activists alike can harass and prosecute pregnant people attempting to exercise their bodily autonomy. This comment argues that the United States has violated its obligations under the International Covenant on Civil and Political Rights (ICCPR) Article 17 by failing to protect against interference with the use and collection of reproductive health data. Further, this comment analyzes interpretations of …


Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu Jan 2023

Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu

American University National Security Law Brief

The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.


The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check Jan 2023

The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check

American University National Security Law Brief

Protecting critical infrastructure from cyber threats is difficult and complex. News headlines abound with reports that show how critical infrastructure—ranging from voting machines to steel mills—have become increasingly vulnerable to cyber operations from state and sophisticated nonstate actors. As critical infrastructure becomes increasingly entangled with the Internet and as new tactics, techniques, and procedures rapidly proliferate and evolve, governments and businesses alike must contend with a mutating threat environment that may put sensitive and highly important critical infrastructure assets in serious jeopardy. The vulnerabilities of critical infrastructure, which provide vital services and functions to societies, may pose a particularly tempting …


Letter Form The Editor, Wayne Rash, Iii Jan 2023

Letter Form The Editor, Wayne Rash, Iii

American University National Security Law Brief

In our last issue of The National Security Law Brief, Vol. 13, No. 1, we highlighted the dynamism that makes National Security Law such an exciting field. In this issue, No. 2, we continue with the dynamism theme. National security law is a field in constant change that often leaves us questioning how these changes will shape the law.


The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant Jan 2023

The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant

American University National Security Law Brief

Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …


Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski Jan 2023

Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski

American University National Security Law Brief

Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …


Into The Valley Of The Shadow Of Death: War Crimes Committed In Service Of Russia's Crusade To Destroy Ukraine, Chris Galarza Jan 2023

Into The Valley Of The Shadow Of Death: War Crimes Committed In Service Of Russia's Crusade To Destroy Ukraine, Chris Galarza

American University National Security Law Brief

When Russian tanks rolled across the border into Ukraine during the early morning of February 24, 2022, most in the American defense and diplomatic establishment were shocked and sure the war would be over in a few days. Credible open-source tactical and strategic analysis predicted that Ukraine’s regular military forces would be defeated in “days or weeks” as long as Russian military forces were determined to pursue their objectives. The United States Government was so sure that Kyiv was under imminent threat of capture that they offered to evacuate President Volodymyr Zelenskyy so that he could rule from exile, rather …


Revisiting Goldwater-Nichols: Why Making The Joint Staff A General Staff Will Improve Civilian Control Of The Military And Refine The Constitutional Balance Of War Powers, Michael D. Minerva Jan 2023

Revisiting Goldwater-Nichols: Why Making The Joint Staff A General Staff Will Improve Civilian Control Of The Military And Refine The Constitutional Balance Of War Powers, Michael D. Minerva

American University National Security Law Brief

As the United States has progressively become more involved globally since World War II, the U.S. military is being stretched beyond the professional military competency straining civilian control of the military. To remedy this, it is again time to revisit our national security structure, and adopt a General Staff in place of the Joint Staff. Following World War II and the destruction of the German General Staff by the Nazi Party, the General Staff as an institution has been emotionally rejected in the United States without a careful historical and legal examination of how that institution operates under varying forms …


Hostility Is In The Eye Of The Beholder: Why Congress Should Decriminalize Hostile Work Environment Sexual Harassment In The Military, Adam J. Crane Jan 2023

Hostility Is In The Eye Of The Beholder: Why Congress Should Decriminalize Hostile Work Environment Sexual Harassment In The Military, Adam J. Crane

Criminal Law Practitioner

In 2022, for the first time in American history, Congress enacted legislation criminalizing hostile work environment sexual harassment. More serious types of sexual harassment have long been criminal under the Uniform Code of Military Justice, but hostile work environment harassment is a civil wrong, not a crime, and should not have been made into one. Section 539D of the National Defense Authorization Act for Fiscal Year 2022 (now listed under Article 134, UCMJ (Sexual Harassment), is both unconstitutional and counterproductive. It violates the Fifth Amendment for vagueness by failing to provide fair notice of what is prohibited, and the First …


Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling Jan 2023

Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Securing Patent Law, Charles Duan Jan 2023

Securing Patent Law, Charles Duan

Articles in Law Reviews & Other Academic Journals

A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …


Sunshine Laws Behind The Clouds: Limited Transparency In A Time Of National Emergency, Ira P. Robbins Nov 2022

Sunshine Laws Behind The Clouds: Limited Transparency In A Time Of National Emergency, Ira P. Robbins

Articles in Law Reviews & Other Academic Journals

The COVID-19 pandemic dramatically changed the way citizens lived their lives, businesses operated, and governments functioned. With most people forced to stay home, the pandemic also disrupted how people received their news and other essential information. Public records and public meetings had to adapt to face the growing challenges in a locked-down world. While some governmental bodies were able to keep up with the threat that COVID-19 posed against transparency, others either failed to acclimate to the new normal or actively took advantage of the circumstances to limit how much the public knew not only about the crisis, but about …


Letter From The Editor, Ryan Nelson Jan 2022

Letter From The Editor, Ryan Nelson

American University National Security Law Brief

No abstract provided.


The New Great Wall Against China, Paul Rose Jan 2022

The New Great Wall Against China, Paul Rose

American University National Security Law Brief

This essay documents some of the recent changes in foreign investment law as a manifestation of increasing concerns with Chinese investment specifically and globalization more generally. The essay first shows how foreign investment laws in major economies have become increasingly illiberal since the Financial Crisis. Next, the essay considers the justification and impact of recent United States rules designed to reduce Chinese investment. Comparing data on merger and acquisition activity in the United States with the number of filings made to the Committee on Foreign Investment in the United States (CFIUS), the essay documents that although merger and acquisition activity …


The American Security Drone Act: America's Paper Tiger Vs. China's Trojan Horse, Susan E. Upward Jan 2022

The American Security Drone Act: America's Paper Tiger Vs. China's Trojan Horse, Susan E. Upward

American University National Security Law Brief

The skies above America have been increasingly inundated with small unmanned aircraft systems (sUAS) operated by both government agencies and civilians alike. The majority of these drones are manufactured by Da-Jiang Innovations (DJI), a Chinese company that continues to emerge as a national security threat. The risk posed by these drones stems not only from physical access to American airspace, but also from the surreptitious transmittal of information back behind the “Great Firewall of China” via DJI mobile device applications. However, current pending legislation is inadequate to effectively counter this threat. Instead, the United States should take a more comprehensive …


President Of The United States, Destroyer Of Worlds: Considering Congress's Authority To Enact A Nuclear No-First-Use Law, John Ramming Chappell Jan 2022

President Of The United States, Destroyer Of Worlds: Considering Congress's Authority To Enact A Nuclear No-First-Use Law, John Ramming Chappell

American University National Security Law Brief

This article argues that Congress can exercise its constitutional war powers to enact a law restricting the President from using nuclear weapons first. The article contends that using a nuclear weapon is qualitatively different from conventional warfare and that the first use of nuclear weapons marks a decision to enter into war. Therefore, nuclear first use is not a battlefield decision within the President’s commander in chief power but rather a choice to enter the United States into a new type of conflict that could pose a direct, immediate, and existential threat to the U.S. homeland. Regulating that decision falls …


Widening The Lens On Content Moderation, Jenna Ruddock, Justin Sherman Jul 2021

Widening The Lens On Content Moderation, Jenna Ruddock, Justin Sherman

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.


The Conservative Court And Torture Attenuation, Ari B. Rubin Jan 2021

The Conservative Court And Torture Attenuation, Ari B. Rubin

American University National Security Law Brief

No abstract provided.


An Analysis Of Domestic And Foreign Legal Mechanisms To Counter The Rise Of White Nationalism, John C. Jankosky Ii Jan 2021

An Analysis Of Domestic And Foreign Legal Mechanisms To Counter The Rise Of White Nationalism, John C. Jankosky Ii

American University National Security Law Brief

No abstract provided.


The Capitol Riot, Racism And The Future Of American Democracy, Ryan T. Williams Jan 2021

The Capitol Riot, Racism And The Future Of American Democracy, Ryan T. Williams

American University National Security Law Brief

No abstract provided.


The Case For Presumptions Of Evil: How The E.O. 13873 'Trump' Card Could Secure American Networks From Third-Party Code Threats, Caroline Elyse Burks Jan 2021

The Case For Presumptions Of Evil: How The E.O. 13873 'Trump' Card Could Secure American Networks From Third-Party Code Threats, Caroline Elyse Burks

American University National Security Law Brief

No abstract provided.


Rethinking Responsibility As Cooperation And Control: The Case Of Intelligence Agents, Raphael Bitton Jan 2021

Rethinking Responsibility As Cooperation And Control: The Case Of Intelligence Agents, Raphael Bitton

American University National Security Law Brief

No abstract provided.


The Right Of Return: The Isis Bride, Casey Hare-Osifchin Jan 2021

The Right Of Return: The Isis Bride, Casey Hare-Osifchin

American University National Security Law Brief

No abstract provided.


Letter From The Editor Jan 2021

Letter From The Editor

American University National Security Law Brief

No abstract provided.


The Artemis Accords: Employing Space Diplomacy To De-Escalate A National Security Threat And Promote Space Commercialization, Elya A. Taichman Jan 2021

The Artemis Accords: Employing Space Diplomacy To De-Escalate A National Security Threat And Promote Space Commercialization, Elya A. Taichman

American University National Security Law Brief

No abstract provided.


Private Military Contractors: The Armed Forces Absent From The War Powers Resolution, Mckinney Voss Wheeler Jan 2021

Private Military Contractors: The Armed Forces Absent From The War Powers Resolution, Mckinney Voss Wheeler

American University National Security Law Brief

Private military contractors (PMCs) are increasingly ubiquitous in international conflicts, providing security, transport services, and even fighting alongside commissioned troops in battle. Yet for the United States, the ambiguity surrounding PMCs’ role in war presents a serious threat to the constitutional balance of war powers. The Founding Fathers deliberately divided those powers between the executive and legislative branches, aware of the dangers of concentrating them too heavily; and Congress further clarified protocol with the War Powers Resolution in 1973. But the War Powers Resolution, which requires the President to notify Congress when engaging "U.S. Armed Forces" in battle, omits any …


Equal Prosecution For All: Violent Extremism At The Intersection Of Hate Crime And Terrorism, Gabrielle Leeman Jan 2021

Equal Prosecution For All: Violent Extremism At The Intersection Of Hate Crime And Terrorism, Gabrielle Leeman

American University National Security Law Brief

After a white supremacist used his vehicle as a weapon to purposefully attack anti-racism protestors in Charlottesville, Virginia in 2017, federal officials called the incident domestic terrorism. The incident, in fact, met the definition of domestic terrorism. But the perpetrator was not prosecuted under any of the available terrorism statutes. The defendant was instead charged with, and later pled guilty to, committing hate crimes. It is imperative that we recognize all forms of terrorism as terrorism and use the legal system fairly to prosecute all terrorist attacks as terrorism. But the current terrorism statutory framework hinders the ability to prosecute …