Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Autonomous Weapons And Accountability: Seeking Solutions In The Law Of War, Kelly Cass Apr 2015

Autonomous Weapons And Accountability: Seeking Solutions In The Law Of War, Kelly Cass

Loyola of Los Angeles Law Review

Autonomous weapons are increasingly used by militaries around the world. Unlike conventional unmanned weapons such as drones, autonomous weapons involve a machine deciding whether to deploy lethal force. Yet, because a machine cannot have the requisite mental state to commit a war crime, the legal scrutiny falls onto the decision to deploy an autonomous weapon. This Article focuses on the dual questions arising from that decision: how to regulate autonomous weapon use and who should be held criminally liable for an autonomous weapon’s actions. Regarding the first issue, this Article concludes that regulations expressly limiting autonomous weapon use to non-human …


Trade Regulation - Export Controls - Cocom Agrees On New Multilateral Export Guidelines Allowing Eastern Bloc To Purchase Low Level Technology Legally, Jackie L. Masden Jan 2015

Trade Regulation - Export Controls - Cocom Agrees On New Multilateral Export Guidelines Allowing Eastern Bloc To Purchase Low Level Technology Legally, Jackie L. Masden

Georgia Journal of International & Comparative Law

No abstract provided.