Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Parameters (3)
- Russia (3)
- Air Force (2)
- Cyberspace (2)
- Geneva Conventions (2)
-
- Joint professional military education (2)
- NATO (2)
- Navy (2)
- PME (2)
- US Army War College Press (2)
- 1898–1945 (1)
- 1944–1946 (1)
- A2/AD (1)
- AI (1)
- AI Superpowers (1)
- AI Superpowers: China (1)
- Air warfare (1)
- Algorithm (1)
- America (1)
- And Battlefield Effectiveness (1)
- And the New World Order (1)
- Android (1)
- Anti-access/area denial (1)
- Army (1)
- Army officers (1)
- Artificial Intelligence (1)
- Atomic Assurance: The Alliance Politics of Nuclear Proliferation (1)
- Autonomous Weapons (1)
- Baltic states (1)
- Bill Clinton (1)
Articles 1 - 19 of 19
Full-Text Articles in Entire DC Network
Taking The War Colleges From Good To Great, Richard D. Hooker Jr.
Taking The War Colleges From Good To Great, Richard D. Hooker Jr.
The US Army War College Quarterly: Parameters
No abstract provided.
Educating Strategic Lieutenants At West Point, Scott A. Silverstone
Educating Strategic Lieutenants At West Point, Scott A. Silverstone
The US Army War College Quarterly: Parameters
This article argues West Point responded to the changing strategic environment from the end of the Cold War through the post-9/11 period by innovating its curriculum. Over the past several decades, however, the academy’s educational model has remained remarkably stable, rooted in an enduring commitment to a rigorous liberal education as the best preparation for officers confronting the inherent uncertainties of future wars.
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Making The War Colleges Better, Richard A. Lacquement Jr
Making The War Colleges Better, Richard A. Lacquement Jr
The US Army War College Quarterly: Parameters
No abstract provided.
Defining Critical Infrastructure For A Global Application, Colleen M. Newbill
Defining Critical Infrastructure For A Global Application, Colleen M. Newbill
Indiana Journal of Global Legal Studies
A Google search for the phrase "critical infrastructure" turns up 189 million results in little more than a half second: ''global critical infrastructure" has 151 million results; and "definition of critical infrastructure" yields 71.5 million results. The list of what industries and sectors fall under the critical infrastructure designation expands as time progresses and technology develops. As the threat of cyberattacks increases and this frontier of terrorism continues to emerge, attacks on critical infrastructure are high on the list of concerns and the need for protective measures imperative. The focus on protecting critical infrastructure does not stop at the borders …
The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan
Brooklyn Journal of International Law
Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …
Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii
Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii
University of Michigan Journal of Law Reform
On February 19, 2018, United Nations Secretary-General Antonio Guterres claimed that he was “absolutely convinced” that “the next war will begin with a massive cyber-attack to destroy military capacity . . . and paralyze basic infrastructure.” The Secretary-General’s greatest concern, however, is that he believes “there is no regulatory scheme for that type of warfare, it is not clear how the Geneva Convention or international humanitarian law applies to it.” Although Additional Protocol I to the Geneva Conventions (AP I) targeting laws generally identify who and what States may target in war, it expressly limits itself to attacks affecting people …
Comrades Or Foes: Did The Russians Break The Law Or New Ground For The First Amendment?, Artem M. Joukov, Samantha M. Caspar
Comrades Or Foes: Did The Russians Break The Law Or New Ground For The First Amendment?, Artem M. Joukov, Samantha M. Caspar
Pace Law Review
This Article discusses the recent decision by the United States Federal Government to indict more than a dozen Russian nationals for conspiracy to defraud the United States of America. The Government accused the Russians of staging protests, distributing false propaganda, and spreading political messages and ideologies online in an effort to affect the outcome of the 2016 Presidential Election. We argue that while the Defendants violated several other laws, the majority of the acts the Government classifies as a conspiracy to defraud the United States should not be considered criminal. Rather, these acts are protected political speech under the First …
Political Extremism And Domestic Terrorism In America, Mark Potok
Political Extremism And Domestic Terrorism In America, Mark Potok
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Cyberspace: The 21st Century Battlefield, Cameron Ryan Scullen
Cyberspace: The 21st Century Battlefield, Cameron Ryan Scullen
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Prefatory Matter & Table Of Contents
Prefatory Matter & Table Of Contents
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Prefatory Matter And Table Of Contents
Prefatory Matter And Table Of Contents
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Stealing Press Credentials: Law Enforcement Identity Misappropriation Of The Press In The Cyber Era, Andy T. Wang
Stealing Press Credentials: Law Enforcement Identity Misappropriation Of The Press In The Cyber Era, Andy T. Wang
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Peeling Back The Onion Of Cyber Espionage After Tallinn 2.0, David A. Wallace, Amy H. Mccarthy, Mark Visger
Peeling Back The Onion Of Cyber Espionage After Tallinn 2.0, David A. Wallace, Amy H. Mccarthy, Mark Visger
Maryland Law Review
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force. Its provisions on cyber espionage will be instrumental to states in grappling with complex legal problems in the area of digital spying. The law of cyber espionage as outlined by Tallinn 2.0, however, is substantially based on rules that have evolved outside of the digital context, and there exist serious ambiguities and limitations in its framework. This Article will explore gaps in the legal structure and consider future options available to states in light of this underlying mismatch.
Russia's A2/Ad Capabilities: Real And Imagined, Keir Giles, Mathieu Boulegue
Russia's A2/Ad Capabilities: Real And Imagined, Keir Giles, Mathieu Boulegue
The US Army War College Quarterly: Parameters
No abstract provided.
Congress-In-Chief: Congressional Options To Compel Presidential War-Making, Clark H. Campbell
Congress-In-Chief: Congressional Options To Compel Presidential War-Making, Clark H. Campbell
American University National Security Law Brief
No abstract provided.
The Operational And Administrative Militaries, Mark P. Nevitt
The Operational And Administrative Militaries, Mark P. Nevitt
Georgia Law Review
Admiral James Stavridis collapsed in his chair, exhausted. The four-star Navy admiral had just finished a six-month whirlwind tour of over thirty nations, flying on a state-of-the-art military aircraft surrounded by an enormous staff. He met with leaders from every member of the North Atlantic Treaty Organization (NATO), the heads of Russia and Israel, and several prospective U.S. and NATO allies. Not surprisingly, he met with each nation’s senior military leaders and ministers of defense in an effort to strengthen military-to-military relations and reinforce the bonds of the Atlantic Alliance that date back to General Eisenhower and the end of …
How I Learned To Stop Worrying And Love The Bots, And How I Learned To Start Worrying About Democracy Instead, Antonio F. Perez
How I Learned To Stop Worrying And Love The Bots, And How I Learned To Start Worrying About Democracy Instead, Antonio F. Perez
Catholic University Journal of Law and Technology
This essay reviewing Striking Power, John Yoo and Jeremy Rabkin's new book on the legal and policy implications of autonomous weapons, takes issue with the book’s assumptions and; therefore its conclusions. The essay argues that, because of technological and ethical limitations, discriminate and effective use of autonomous weapons may not serve as an adequate substitute for traditional manpower-based military forces. It further argues that traditional conceptions of international law could prove more durable than Yoo and Rabkin suggest, and finally it concludes by suggesting that a grand strategy relying primarily on technological elites managing autonomous weapons actually threatens to …
Artificial Intelligence Is Here, Get Ready!, Jessica G. Martz
Artificial Intelligence Is Here, Get Ready!, Jessica G. Martz
Catholic University Journal of Law and Technology
No one is certain whether Artificial Intelligence (“AI”) will make the future a better place or make it look like an apocalyptic Hollywood blockbuster. An opinion that is emerging among experts and nation-state leaders is that the nation-states that lead in AI advancements and implementation will likely have a greater influence on and power over the world economic and national security stages. The goal of this book review is to encourage the reader to enter the conversation about the role AI will play in global society and American life because AI will influence the job market in the near future. …