Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (43)
- National Security Law (28)
- Military, War, and Peace (15)
- Social and Behavioral Sciences (14)
- International Law (12)
-
- Political Science (8)
- Public Affairs, Public Policy and Public Administration (7)
- Internet Law (6)
- Science and Technology Law (5)
- Arts and Humanities (4)
- Business (4)
- International Relations (4)
- International and Area Studies (4)
- Comparative and Foreign Law (3)
- Constitutional Law (3)
- Defense and Security Studies (3)
- History (3)
- International Trade Law (3)
- Transnational Law (3)
- Administrative Law (2)
- American Politics (2)
- Business Organizations Law (2)
- Communications Law (2)
- Computer Law (2)
- Computer Sciences (2)
- Diplomatic History (2)
- History of Science, Technology, and Medicine (2)
- International Humanitarian Law (2)
- Law and Politics (2)
- Physical Sciences and Mathematics (2)
- Institution
-
- University of South Florida (45)
- Mitchell Hamline School of Law (8)
- American University Washington College of Law (4)
- San Jose State University (4)
- Loyola Marymount University and Loyola Law School (2)
-
- Maurer School of Law: Indiana University (2)
- Penn State Law (2)
- The Catholic University of America, Columbus School of Law (2)
- Universitas Indonesia (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Miami Law School (2)
- William & Mary Law School (2)
- Brooklyn Law School (1)
- Case Western Reserve University School of Law (1)
- Cornell University Law School (1)
- Duke Law (1)
- Fordham Law School (1)
- James Madison University (1)
- Kennesaw State University (1)
- Liberty University (1)
- Louisiana State University Law Center (1)
- Penn State Dickinson Law (1)
- St. Thomas University College of Law (1)
- U.S. Naval War College (1)
- US Army War College (1)
- University of Nebraska - Lincoln (1)
- Vanderbilt University Law School (1)
- Washington and Lee University School of Law (1)
- Publication Year
- Publication
-
- Journal of Strategic Security (42)
- William Mitchell Law Review (8)
- American University National Security Law Brief (4)
- Secrecy and Society (4)
- Military Cyber Affairs (3)
-
- Indiana Law Journal (2)
- Loyola of Los Angeles Law Review (2)
- Penn State Journal of Law & International Affairs (2)
- William & Mary Bill of Rights Journal (2)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (1)
- Brooklyn Law Review (1)
- Canada-United States Law Journal (1)
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Cornell International Law Journal (1)
- Dickinson Law Review (2017-Present) (1)
- Duke Journal of Comparative & International Law (1)
- Fordham Law Review (1)
- International Law Studies (1)
- James Madison Undergraduate Research Journal (JMURJ) (1)
- Journal of Cybersecurity Education, Research and Practice (1)
- Jurnal Politik (1)
- Liberty University Journal of Statesmanship & Public Policy (1)
- Louisiana Law Review (1)
- Maryland Law Review (1)
- Maryland Series in Contemporary Asian Studies (1)
- Nebraska Law Review (1)
- St. Thomas Law Review (1)
- The US Army War College Quarterly: Parameters (1)
- University of Miami International and Comparative Law Review (1)
Articles 1 - 30 of 93
Full-Text Articles in Entire DC Network
Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris
Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris
Liberty University Journal of Statesmanship & Public Policy
Recent developments in artificial intelligence (AI) have caused concern over the ethical implications of large-scale AI implementation. As a result, leading technologists and computer scientists have advocated an incremental rather than comprehensive approach to AI development and implementation to allow ethical and structural guidelines to provide a public safety net. However, such an approach does not account for the geopolitical and national security implications of lagging behind competitors like China, who have publicly stated goals of reaching AI supremacy within the next ten years. This article presents a national security analysis of the risks to American national security by allowing …
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
Digitized Statecraft In Multilateral Treaty Participation: Global Quasi-Legislative Behavior Of 193 Sovereign States. By Takashi Inoguchi And Lien Thi Quynh Le. Singapore: Springer Nature, 2021., Melisa Perut, Etel Solingen, Ph.D.
Digitized Statecraft In Multilateral Treaty Participation: Global Quasi-Legislative Behavior Of 193 Sovereign States. By Takashi Inoguchi And Lien Thi Quynh Le. Singapore: Springer Nature, 2021., Melisa Perut, Etel Solingen, Ph.D.
Journal of Strategic Security
No abstract provided.
Military Advisors, Service Strategies, And Great Power Competition, Mike Anderson
Military Advisors, Service Strategies, And Great Power Competition, Mike Anderson
Journal of Strategic Security
United States professional military advisors play a critical role across the spectrum of conflict within the various services’ strategies in support of the overall National Defense Strategy. In an era of great power competition, the role of advisory forces within the shadow of large-scale conflict, provide a crucial edge for the US military services fulfilling their strategic role. Within each of the services’ unique strategies - the Army’s multidomain operations, the Marine Corps expeditionary advanced base operations nested within the Navy’s broader littoral operations in a contested environment, and the Air Force’s forward projecting agile basing concept - advisors from …
Role Of The State Intelligence Agency In Managing The Covid-19 Pandemic In Indonesia, Yofitri Heny Wahyuli
Role Of The State Intelligence Agency In Managing The Covid-19 Pandemic In Indonesia, Yofitri Heny Wahyuli
Jurnal Politik
The COVID-19 pandemic has prompted governments in various countries to involve a wide range of actors, including intelligence. Since the beginning of 2020, the State Intelligence Agency (BIN) in Indonesia has been actively involved in dealing with the COVID-19 pandemic. The deployment of intelligence bodies in handling a pandemic is a common practice that many democratic countries do. However, intelligence must operate within the confines of its mandate, function, and democratic principles. This paper will examine the issues regarding the roles of BIN in dealing with the pandemic in Indonesia. Data sources for this study were obtained by applying a …
Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu
American University National Security Law Brief
The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.
The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check
The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check
American University National Security Law Brief
Protecting critical infrastructure from cyber threats is difficult and complex. News headlines abound with reports that show how critical infrastructure—ranging from voting machines to steel mills—have become increasingly vulnerable to cyber operations from state and sophisticated nonstate actors. As critical infrastructure becomes increasingly entangled with the Internet and as new tactics, techniques, and procedures rapidly proliferate and evolve, governments and businesses alike must contend with a mutating threat environment that may put sensitive and highly important critical infrastructure assets in serious jeopardy. The vulnerabilities of critical infrastructure, which provide vital services and functions to societies, may pose a particularly tempting …
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
American University National Security Law Brief
Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …
A Defense Perspective On A Reliable And Sustainable Supply Of Critical Minerals, Matthew D. Zolnowski
A Defense Perspective On A Reliable And Sustainable Supply Of Critical Minerals, Matthew D. Zolnowski
Canada-United States Law Journal
Canada-United States Law Institute 2022 Experts' Meeting
National Security As A Means To A Commercial End: Call For A New Approach, Yong-Shik Lee
National Security As A Means To A Commercial End: Call For A New Approach, Yong-Shik Lee
Nebraska Law Review
While corporations do not enjoy unfettered freedom—they are constrained by legal, political, and social requirements and expectations—governments must have legitimate grounds when they compel corporations to act. After investigating the nationwide semiconductor shortage, the U.S. Secretary of Commerce warned that the government might invoke national security to compel semiconductor producers to disclose sensitive business information. The government has also invoked national security to justify extensive tariffs imposed on imported steel and aluminum products, leading to a major trade dispute. Years of neoliberal policy have created a perceived (though not necessarily functional) separation between government and industry. This separation encourages and, …
Creating Light At Tunnel’S End: Ukraine’S Post-War Urban Recovery, Russell W. Glenn
Creating Light At Tunnel’S End: Ukraine’S Post-War Urban Recovery, Russell W. Glenn
Journal of Strategic Security
The US response to Iraq’s recovery in the aftermath of 2003 Operation Iraqi Freedom suffered from an initial conclusion that it was the country’s petroleum infrastructure rather than its electrical networks that were in greater need of recovery resources. The resulting misallocation of resources delayed power restoration to much of the country and frustrated those in affected regions.
Whether the cause is war or a catastrophe sparked by Mother Nature, accurately identifying and correctly prioritizing post-disaster requirements is fundamental to an effective and efficient response. Ukraine has demonstrated a commendable ability to repair war damage even as conflict continues, but …
Decision Advantage: Intelligence In International Politics From The Spanish Armada To Cyberwar. By Jennifer E. Sims. Oxford: Oxford University Press, 2022., Adam D.M. Svendsen
Decision Advantage: Intelligence In International Politics From The Spanish Armada To Cyberwar. By Jennifer E. Sims. Oxford: Oxford University Press, 2022., Adam D.M. Svendsen
Journal of Strategic Security
This article provides an annotated review essay of Jennifer E. Sims’ book, Decision Advantage (2022). She communicates several valuable insights into how intelligence manifests in international affairs. Qualities are accomplished through Sims’ development of the concept and theory of ‘decision advantage’ in a variety of intelligence contexts, articulated via a series of different historical case studies ranging chronologically from the Spanish Armada to Cyberwar. Alongside acknowledging intelligence systems and engineering, notions of ‘intelligence power’ and ‘intelligence advantage(s)’ emerge as central, together with ideas of agility and adaptability amongst exponents. While undeniably forming a useful start, what Sims’ work ultimately discloses …
Understanding Pakistan’S Nuclear Security Regime, Tahir Azad, Karl Dewey
Understanding Pakistan’S Nuclear Security Regime, Tahir Azad, Karl Dewey
Journal of Strategic Security
Following Russia’s invasion of Ukraine in February 2022 there has been renewed attention on the security and protection of civilian nuclear infrastructure. This has been a long-standing issue in Pakistan, where the security of the country’s nuclear estate has attracted considerable international attention for decades. However, rather than looking at Pakistan’s civilian estate, assessments have instead prioritised the security of the country’s nuclear arsenal. They have also been widely divergent: Western analysts have raised serious concerns over Pakistan’s ability to secure sensitive nuclear materials, the country’s domestic instability and its poor non-proliferation history. In contrast Pakistani officials downplay these risks, …
The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader
The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader
Vanderbilt Journal of Transnational Law
On May 26, 2021, the General Assembly of the United Nations adopted a resolution approving the drafting of a new global treaty on cybercrime, which commenced in February 2022. The proposed UN agreement on cybercrime regulation has garnered significant criticism among the international community, namely by state delegates, human rights advocates, and nongovernmental organizations. Fears stem from the belief that such a treaty would be used to legitimize abusive practices and undermine fundamental human rights. National cybercrime laws already unduly restrict human rights. However, at a time where the global community has moved toward a digital world, it becomes even …
Balancing Grand Strategy For America To Offset Thucydides’S Trap With China, Anubhav S. Goswami
Balancing Grand Strategy For America To Offset Thucydides’S Trap With China, Anubhav S. Goswami
Journal of Strategic Security
China’s vastly increased economic and military might has alarmed the United States about sustaining its relative power in the world. Observing the growing influence of Beijing in the international world order, experts of ‘great power competition’ are now asking: What will be the reaction of the United States once China achieves parity or even comes close to achieving parity with Washington? As could be expected from its nature, the question has generated sharp polarising viewpoints but none has spawned more interest and controversy than Harvard Professor Graham T. Allison’s ‘Thucydides’ Trap’ discourse which argues that China’s spectacular rise could lead …
Strategy In An Uncertain Domain: Threat And Response In Cyberspace, Joe Devanny, Luiz Rogerio Franco Goldoni, Breno Pauli Medeiros
Strategy In An Uncertain Domain: Threat And Response In Cyberspace, Joe Devanny, Luiz Rogerio Franco Goldoni, Breno Pauli Medeiros
Journal of Strategic Security
Over the last decade, "cyber power" has become an increasingly prominent concept and instrument of national strategy. This article explores the nature of contemporary cyber power, focusing on how states should respond to "cyber uncertainty." Cases of cyber operations against Estonia, Georgia, and Ukraine, as well as cyber operations conducted (and suffered) by the United States, highlight the evolving role of cyber operations as an instrument of statecraft. Given the complexity of cyber forensics and the polluted information environment of the global public sphere, the public diplomacy of coordinated attribution statements cannot be expected to cut through conclusively or uniformly. …
Tiktok, Cfius, And The Splinternet, Jake T. Seiler
Tiktok, Cfius, And The Splinternet, Jake T. Seiler
University of Miami International and Comparative Law Review
This note will discuss the role that the Committee on Foreign Investment in the United States (“CFIUS” or “the Committee”) has played in foreign relations and how it contributes to the balkanization of the internet today. The Committee is an interagency body that reviews foreign investments for potential national security threats. Recently, CFIUS has been in the spotlight for its role in the sale of TikTok, a cellphone app owned by a popular Chinese corporation, ByteDance. While much of CFIUS’ review in the past has been focused on Chinese-owned corporations, there is much debate about whether or not countries should …
Revisiting Domestic Intelligence, John P. Sullivan, Genevieve Lester
Revisiting Domestic Intelligence, John P. Sullivan, Genevieve Lester
Journal of Strategic Security
This article looks at the evolution of US domestic intelligence prior to and since 9/11 in light of the Capitol attacks. It also reviews the literature and practice of intelligence reform in the context of foreign comparative experience (France, UK, Canada, Australia). It looks at the promise of fusion centers, cocontemporay domestic intelligence models, and the continuing need for domestic intelligence reform.
Additional Keywords: Domestic Intelligence, Intelligence Reform, Intelligence Fusion
Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla
Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla
Journal of Strategic Security
According to the U.S. Department of Justice, in 2014, the Russian government-connected Internet Research Agency (IRA) initiated an information operation on social media platforms to manipulate the U.S. population concerning the 2016 U.S. presidential elections. This has revealed that social media platforms enable the spread of fake news among the masses globally and can thus become a means of disrupting the electoral process for foreign actors. This article addresses state-sponsored disinformation operations on social media that target foreign voters. It considers it crucial to counter such operations to protect the security and integrity of the elections in the digital age, …
Domains Of Peace: Cyberspace And The First Global Expression Without War, Matt Flynn
Domains Of Peace: Cyberspace And The First Global Expression Without War, Matt Flynn
Journal of Strategic Security
The ongoing war in Ukraine appears to validate war as it always is. A look at the evolution of domains offers something different. When this step is taken, it becomes clear that humanity chooses the violence defining war. Cyber realities today reveal how technological innovation has stymied war, taking humanity into a pre-existing condition repudiating war and leaving cyberspace as the first global expression without war. Once accepting that truth, nations can contemplate the discovery of a domain offering an expression of peace as a cognitive battlespace overrides the physical application of use of force. This feat means peace finds …
Military Leadership By Intellectual Officers: A Case Study Of The Idf, Haim Yogev, Ronen A. Cohen, Eyal Lewin
Military Leadership By Intellectual Officers: A Case Study Of The Idf, Haim Yogev, Ronen A. Cohen, Eyal Lewin
Journal of Strategic Security
Morris Janowitz believed that for an army to be victorious it needs to be led by as many intellectual forces as possible, just as any organization needs organizational intellectualism to prosper. It is agreed in scholarly literature that the intellectual must author various articles and manifestos to express their viewpoints, mindset, and philosophy in the public sphere. Based on Janowitz’s belief and using the Israeli Defense Forces (IDF) as a case study, this research offers a model for a generic research methodology that can be practiced elsewhere. The mission was to find the extent to which the higher echelons of …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
If You Think Ai Won't Eclipse Humanity, You're Probably Just A Human, Gary D. Brown
If You Think Ai Won't Eclipse Humanity, You're Probably Just A Human, Gary D. Brown
William & Mary Bill of Rights Journal
Building machines that can replicate human thinking and behavior has fascinated people for hundreds of years. Stories about robots date from ancient history through da Vinci to the present. Whether designed to save labor or lives, to provide companionship or protection, loyal, capable, productive machines are a dream of humanity.
The modern manifestation of this interest in using human-like technology to advance social interests is artificial intelligence (AI). This is a paper about what that interest in AI means and how it might develop in the world of national security.
This abstract has been adapted from the author's introduction.
Deep Fakes: The Algorithms That Create And Detect Them And The National Security Risks They Pose, Nick Dunard
Deep Fakes: The Algorithms That Create And Detect Them And The National Security Risks They Pose, Nick Dunard
James Madison Undergraduate Research Journal (JMURJ)
The dissemination of deep fakes for nefarious purposes poses significant national security risks to the United States, requiring an urgent development of technologies to detect their use and strategies to mitigate their effects. Deep fakes are images and videos created by or with the assistance of AI algorithms in which a person’s likeness, actions, or words have been replaced by someone else’s to deceive an audience. Often created with the help of generative adversarial networks, deep fakes can be used to blackmail, harass, exploit, and intimidate individuals and businesses; in large-scale disinformation campaigns, they can incite political tensions around the …
Peran Negara D Alam Menjaga Kedaulatan Pada Ruang Maya (Cyberspace) Sebagai Upaya Perlindungan Terhadap Masyarakat, Nurharis Wijaya
Peran Negara D Alam Menjaga Kedaulatan Pada Ruang Maya (Cyberspace) Sebagai Upaya Perlindungan Terhadap Masyarakat, Nurharis Wijaya
"Dharmasisya” Jurnal Program Magister Hukum FHUI
Development of Internet technology has the potential to boost economic growth of a country. On the other hand, Internet technology also increases the amount and form of threat to the sovereignty of a state in the virtual world. Sovereignty in cyberspace become an important topic in the discussion of national and international security. In the context of the definition of space was no longer relevant in the light confined to the Regional Land, Sea, and Air. Developments Period increasingly cradles State with indulgence will ease in accessing information technology, which is certainly without successfully taking on the role that space-Maya …
National Security As A Public Interest Consideration In Uk Merger Control, Ioannis Kokkoris
National Security As A Public Interest Consideration In Uk Merger Control, Ioannis Kokkoris
Journal of Strategic Security
The article will discuss the boundaries of UK merger control set by national security concerns against the background of public interest considerations in the decisional practice of the competent authorities. The article will first present an overview of the existing legal framework for considering public interest when reviewing mergers and acquisitions in strategic industries or companies. It will then present the main precedents where issues of national security were raised and will discuss how the CMA and the Secretary of State assessed these transactions from both a competition and national security angle. Finally, the article will present the recent legislative …
Psychological Casualties As A Source Of Friction During War And A Mediator Of Coerced Peace Efforts, Karl Umbrasas
Psychological Casualties As A Source Of Friction During War And A Mediator Of Coerced Peace Efforts, Karl Umbrasas
Journal of Strategic Security
The United States homeland does not enjoy sanctuary in the twenty-first century geopolitical environment. Near-peer rivals, such as China and Russia, have capabilities that can impact the United States homeland during a high-end war. Adversaries’ aerospace capabilities have the potential to cause large volumes of psychological casualties among the United States population. Psychological casualties during a high-end war could serve as the basis for a mass call to end a war due to the altered information processing seen among traumatized people. Such a call to end a war could result in unfavorable peace settlements. The United States homeland must improve …
Strategic Security In Northern Europe: The Implications Of Russian Anti-Access/Area Denial Strategies In Developing Complex Threat Environments, Herb Kemp Phd
Journal of Strategic Security
Anti-Access/Area Denial (A2/AD) is a term that came into use to describe an environment in which an air and air defense force could use a combination of surface-launched ballistic missiles, surface and air launched cruise missiles and long-range surface-to-air missiles to prevent an opposing force from accessing or operating within a large airspace effectively. The descriptions and subsequent analyses of the penetrability of these environments often rests on assessments of the capabilities of just a few newly developed missiles and may fail to consider the additional complexity induced by the large array of the entire complement of air, land and …
Secrecy In U.S. National Security: Why A Paradigm Shift Is Needed, Steven Aftergood
Secrecy In U.S. National Security: Why A Paradigm Shift Is Needed, Steven Aftergood
Secrecy and Society
No abstract provided.
Winning The Digital War: Cyber Ideology And The Spectrum Of Conflict, Matthew Flynn
Winning The Digital War: Cyber Ideology And The Spectrum Of Conflict, Matthew Flynn
Journal of Strategic Security
Cyberspace allows ideology to dictate who wins a war. That technological medium has marginalized violence to such an extent that a belligerent must make a cognitive effort a priority. That focus means humanity has at last reached a coveted threshold where ideas determine a war’s outcome. This article traces that evolution along the “spectrum of conflict,” a military categorization encompassing all of war. This act of reductionism must confront cyber realities that alter an understanding of war as one driven by acts of violence. This feat means a digital peace finds an equal footing with war arising from a cyber …