Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

Journal

2019

Articles 1 - 19 of 19

Full-Text Articles in Entire DC Network

Taking The War Colleges From Good To Great, Richard D. Hooker Jr. Nov 2019

Taking The War Colleges From Good To Great, Richard D. Hooker Jr.

The US Army War College Quarterly: Parameters

No abstract provided.


Educating Strategic Lieutenants At West Point, Scott A. Silverstone Nov 2019

Educating Strategic Lieutenants At West Point, Scott A. Silverstone

The US Army War College Quarterly: Parameters

This article argues West Point responded to the changing strategic environment from the end of the Cold War through the post-9/11 period by innovating its curriculum. Over the past several decades, however, the academy’s educational model has remained remarkably stable, rooted in an enduring commitment to a rigorous liberal education as the best preparation for officers confronting the inherent uncertainties of future wars.


Book Reviews, Usawc Press Nov 2019

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Making The War Colleges Better, Richard A. Lacquement Jr Nov 2019

Making The War Colleges Better, Richard A. Lacquement Jr

The US Army War College Quarterly: Parameters

No abstract provided.


Defining Critical Infrastructure For A Global Application, Colleen M. Newbill Aug 2019

Defining Critical Infrastructure For A Global Application, Colleen M. Newbill

Indiana Journal of Global Legal Studies

A Google search for the phrase "critical infrastructure" turns up 189 million results in little more than a half second: ''global critical infrastructure" has 151 million results; and "definition of critical infrastructure" yields 71.5 million results. The list of what industries and sectors fall under the critical infrastructure designation expands as time progresses and technology develops. As the threat of cyberattacks increases and this frontier of terrorism continues to emerge, attacks on critical infrastructure are high on the list of concerns and the need for protective measures imperative. The focus on protecting critical infrastructure does not stop at the borders …


The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan Jul 2019

The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan

Brooklyn Journal of International Law

Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …


Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii Jun 2019

Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii

University of Michigan Journal of Law Reform

On February 19, 2018, United Nations Secretary-General Antonio Guterres claimed that he was “absolutely convinced” that “the next war will begin with a massive cyber-attack to destroy military capacity . . . and paralyze basic infrastructure.” The Secretary-General’s greatest concern, however, is that he believes “there is no regulatory scheme for that type of warfare, it is not clear how the Geneva Convention or international humanitarian law applies to it.” Although Additional Protocol I to the Geneva Conventions (AP I) targeting laws generally identify who and what States may target in war, it expressly limits itself to attacks affecting people …


Comrades Or Foes: Did The Russians Break The Law Or New Ground For The First Amendment?, Artem M. Joukov, Samantha M. Caspar Apr 2019

Comrades Or Foes: Did The Russians Break The Law Or New Ground For The First Amendment?, Artem M. Joukov, Samantha M. Caspar

Pace Law Review

This Article discusses the recent decision by the United States Federal Government to indict more than a dozen Russian nationals for conspiracy to defraud the United States of America. The Government accused the Russians of staging protests, distributing false propaganda, and spreading political messages and ideologies online in an effort to affect the outcome of the 2016 Presidential Election. We argue that while the Defendants violated several other laws, the majority of the acts the Government classifies as a conspiracy to defraud the United States should not be considered criminal. Rather, these acts are protected political speech under the First …


Political Extremism And Domestic Terrorism In America, Mark Potok Apr 2019

Political Extremism And Domestic Terrorism In America, Mark Potok

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Cyberspace: The 21st Century Battlefield, Cameron Ryan Scullen Apr 2019

Cyberspace: The 21st Century Battlefield, Cameron Ryan Scullen

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Prefatory Matter & Table Of Contents Apr 2019

Prefatory Matter & Table Of Contents

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Prefatory Matter And Table Of Contents Apr 2019

Prefatory Matter And Table Of Contents

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Stealing Press Credentials: Law Enforcement Identity Misappropriation Of The Press In The Cyber Era, Andy T. Wang Apr 2019

Stealing Press Credentials: Law Enforcement Identity Misappropriation Of The Press In The Cyber Era, Andy T. Wang

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Peeling Back The Onion Of Cyber Espionage After Tallinn 2.0, David A. Wallace, Amy H. Mccarthy, Mark Visger Apr 2019

Peeling Back The Onion Of Cyber Espionage After Tallinn 2.0, David A. Wallace, Amy H. Mccarthy, Mark Visger

Maryland Law Review

Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force. Its provisions on cyber espionage will be instrumental to states in grappling with complex legal problems in the area of digital spying. The law of cyber espionage as outlined by Tallinn 2.0, however, is substantially based on rules that have evolved outside of the digital context, and there exist serious ambiguities and limitations in its framework. This Article will explore gaps in the legal structure and consider future options available to states in light of this underlying mismatch.


Russia's A2/Ad Capabilities: Real And Imagined, Keir Giles, Mathieu Boulegue Mar 2019

Russia's A2/Ad Capabilities: Real And Imagined, Keir Giles, Mathieu Boulegue

The US Army War College Quarterly: Parameters

No abstract provided.


Congress-In-Chief: Congressional Options To Compel Presidential War-Making, Clark H. Campbell Jan 2019

Congress-In-Chief: Congressional Options To Compel Presidential War-Making, Clark H. Campbell

American University National Security Law Brief

No abstract provided.


The Operational And Administrative Militaries, Mark P. Nevitt Jan 2019

The Operational And Administrative Militaries, Mark P. Nevitt

Georgia Law Review

Admiral James Stavridis collapsed in his chair, exhausted. The four-star Navy admiral had just finished a six-month whirlwind tour of over thirty nations, flying on a state-of-the-art military aircraft surrounded by an enormous staff. He met with leaders from every member of the North Atlantic Treaty Organization (NATO), the heads of Russia and Israel, and several prospective U.S. and NATO allies. Not surprisingly, he met with each nation’s senior military leaders and ministers of defense in an effort to strengthen military-to-military relations and reinforce the bonds of the Atlantic Alliance that date back to General Eisenhower and the end of …


How I Learned To Stop Worrying And Love The Bots, And How I Learned To Start Worrying About Democracy Instead, Antonio F. Perez Jan 2019

How I Learned To Stop Worrying And Love The Bots, And How I Learned To Start Worrying About Democracy Instead, Antonio F. Perez

Catholic University Journal of Law and Technology

This essay reviewing Striking Power, John Yoo and Jeremy Rabkin's new book on the legal and policy implications of autonomous weapons, takes issue with the book’s assumptions and; therefore its conclusions. The essay argues that, because of technological and ethical limitations, discriminate and effective use of autonomous weapons may not serve as an adequate substitute for traditional manpower-based military forces. It further argues that traditional conceptions of international law could prove more durable than Yoo and Rabkin suggest, and finally it concludes by suggesting that a grand strategy relying primarily on technological elites managing autonomous weapons actually threatens to …


Artificial Intelligence Is Here, Get Ready!, Jessica G. Martz Jan 2019

Artificial Intelligence Is Here, Get Ready!, Jessica G. Martz

Catholic University Journal of Law and Technology

No one is certain whether Artificial Intelligence (“AI”) will make the future a better place or make it look like an apocalyptic Hollywood blockbuster. An opinion that is emerging among experts and nation-state leaders is that the nation-states that lead in AI advancements and implementation will likely have a greater influence on and power over the world economic and national security stages. The goal of this book review is to encourage the reader to enter the conversation about the role AI will play in global society and American life because AI will influence the job market in the near future. …