Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

National security

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 173

Full-Text Articles in Entire DC Network

Operational Energy Solutions For A 21st Century Battlefield, Nestor R. Levin Jul 2024

Operational Energy Solutions For A 21st Century Battlefield, Nestor R. Levin

Space and Defense

Development of alternative energy storage and distribution capacity for the modern battlefield is a major national security interest.


On Large Language Models In National Security Applications, William N. Caballero, Philip R. Jenkins Jul 2024

On Large Language Models In National Security Applications, William N. Caballero, Philip R. Jenkins

Faculty Publications

The overwhelming success of GPT-4 in early 2023 highlighted the transformative potential of large language models (LLMs) across various sectors, including national security. This article explores the implications of LLM integration within national security contexts, analyzing their potential to revolutionize information processing, decision-making, and operational efficiency. Whereas LLMs offer substantial benefits, such as automating tasks and enhancing data analysis, they also pose significant risks, including hallucinations, data privacy concerns, and vulnerability to adversarial attacks. Through their coupling with decision-theoretic principles and Bayesian reasoning, LLMs can significantly improve decision-making processes within national security organizations. Namely, LLMs can facilitate the transition from …


National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer Jan 2024

National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer

Faculty Publications

This Essay contends that data infrastructure, when implemented on a national scale, can transform the way we conceptualize artificial intelligence (AI) governance. AI governance is often viewed as necessary for a wide range of strategic goals, including national security. It is widely understood that allowing AI and generative AI to remain self-regulated by the U.S. AI industry poses significant national security risks. Data infrastructure and AI oversight can assist in multiple goals, including: maintaining data privacy and data integrity; increasing cybersecurity; and guarding against information warfare threats. This Essay concludes that conceptualizing data infrastructure as a form of critical infrastructure …


Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky Dec 2023

Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky

UF Law Faculty Publications

This Article contends that the National Cybersecurity Strategy's software liability regime should incorporate two safe harbors. The first would shield software creators and vendors from liability for decisions related to design, implementation, and maintenance, as long as those choices follow enumerated best practices. The second—the “inverse safe harbor”—would have the opposite effect: coders and distributors who engaged in defined worst practices would automatically become liable. This Article explains the design, components, and justifications for these twin safe harbors. The software safe harbors are key parts of the overall design of the new liability regime and work in tandem with the …


Cyber Threats Risk Analysis In State Policies In Guaranteeing National Security, Bahri Gashi, Bashkim Smakaj, Ngadhnjim Brovina, Arian Kadriu Oct 2023

Cyber Threats Risk Analysis In State Policies In Guaranteeing National Security, Bahri Gashi, Bashkim Smakaj, Ngadhnjim Brovina, Arian Kadriu

UBT International Conference

Cyber threats, generally including hybrid warfare, are among the greatest challenges that states and organizations are facing in modern times. This is due to the significant evolution of technology in recent years, which has made a vast amount of information available to individuals and organizations. Such threats can cause serious damage to critical infrastructure, such as transportation, energy, and water resources, as well as communication and financial systems. They can also impact a country's national security and political stability.

To address this threat, states have implemented various policies and measures to ensure national security against the backdrop of cyber security …


Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris Oct 2023

Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris

Liberty University Journal of Statesmanship & Public Policy

Recent developments in artificial intelligence (AI) have caused concern over the ethical implications of large-scale AI implementation. As a result, leading technologists and computer scientists have advocated an incremental rather than comprehensive approach to AI development and implementation to allow ethical and structural guidelines to provide a public safety net. However, such an approach does not account for the geopolitical and national security implications of lagging behind competitors like China, who have publicly stated goals of reaching AI supremacy within the next ten years. This article presents a national security analysis of the risks to American national security by allowing …


Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas Oct 2023

Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas

Journal of Cybersecurity Education, Research and Practice

The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …


Two Visions Of Digital Sovereignty, Sujit Raman Sep 2023

Two Visions Of Digital Sovereignty, Sujit Raman

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Military Advisors, Service Strategies, And Great Power Competition, Mike Anderson Apr 2023

Military Advisors, Service Strategies, And Great Power Competition, Mike Anderson

Journal of Strategic Security

United States professional military advisors play a critical role across the spectrum of conflict within the various services’ strategies in support of the overall National Defense Strategy. In an era of great power competition, the role of advisory forces within the shadow of large-scale conflict, provide a crucial edge for the US military services fulfilling their strategic role. Within each of the services’ unique strategies - the Army’s multidomain operations, the Marine Corps expeditionary advanced base operations nested within the Navy’s broader littoral operations in a contested environment, and the Air Force’s forward projecting agile basing concept - advisors from …


Digitized Statecraft In Multilateral Treaty Participation: Global Quasi-Legislative Behavior Of 193 Sovereign States. By Takashi Inoguchi And Lien Thi Quynh Le. Singapore: Springer Nature, 2021., Melisa Perut, Etel Solingen, Ph.D. Apr 2023

Digitized Statecraft In Multilateral Treaty Participation: Global Quasi-Legislative Behavior Of 193 Sovereign States. By Takashi Inoguchi And Lien Thi Quynh Le. Singapore: Springer Nature, 2021., Melisa Perut, Etel Solingen, Ph.D.

Journal of Strategic Security

No abstract provided.


Role Of The State Intelligence Agency In Managing The Covid-19 Pandemic In Indonesia, Yofitri Heny Wahyuli Feb 2023

Role Of The State Intelligence Agency In Managing The Covid-19 Pandemic In Indonesia, Yofitri Heny Wahyuli

Jurnal Politik

The COVID-19 pandemic has prompted governments in various countries to involve a wide range of actors, including intelligence. Since the beginning of 2020, the State Intelligence Agency (BIN) in Indonesia has been actively involved in dealing with the COVID-19 pandemic. The deployment of intelligence bodies in handling a pandemic is a common practice that many democratic countries do. However, intelligence must operate within the confines of its mandate, function, and democratic principles. This paper will examine the issues regarding the roles of BIN in dealing with the pandemic in Indonesia. Data sources for this study were obtained by applying a …


Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu Jan 2023

Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu

American University National Security Law Brief

The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.


The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check Jan 2023

The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check

American University National Security Law Brief

Protecting critical infrastructure from cyber threats is difficult and complex. News headlines abound with reports that show how critical infrastructure—ranging from voting machines to steel mills—have become increasingly vulnerable to cyber operations from state and sophisticated nonstate actors. As critical infrastructure becomes increasingly entangled with the Internet and as new tactics, techniques, and procedures rapidly proliferate and evolve, governments and businesses alike must contend with a mutating threat environment that may put sensitive and highly important critical infrastructure assets in serious jeopardy. The vulnerabilities of critical infrastructure, which provide vital services and functions to societies, may pose a particularly tempting …


The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant Jan 2023

The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant

American University National Security Law Brief

Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …


Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling Jan 2023

Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling

Joint PIJIP/TLS Research Paper Series

No abstract provided.


A Defense Perspective On A Reliable And Sustainable Supply Of Critical Minerals, Matthew D. Zolnowski Jan 2023

A Defense Perspective On A Reliable And Sustainable Supply Of Critical Minerals, Matthew D. Zolnowski

Canada-United States Law Journal

Canada-United States Law Institute 2022 Experts' Meeting


The Private Enforcement Of National Security, Maryam Jamshidi Jan 2023

The Private Enforcement Of National Security, Maryam Jamshidi

Publications

The private enforcement of public law is a central feature of the American administrative state. As various scholars have argued, the federal government depends upon private parties to enforce public laws through litigation in order to achieve the government’s regulatory objectives. This scholarship has, however, largely overlooked the phenomenon of private enforcement in the national security arena. This Article seeks to describe and analyze national security’s private enforcement for the first time. In doing so, it explores what national security’s private enforcement reveals about the costs of private enforcement more broadly. In particular, this Article identifies an important downside to …


National Security As A Means To A Commercial End: Call For A New Approach, Yong-Shik Lee Jan 2023

National Security As A Means To A Commercial End: Call For A New Approach, Yong-Shik Lee

Nebraska Law Review

While corporations do not enjoy unfettered freedom—they are constrained by legal, political, and social requirements and expectations—governments must have legitimate grounds when they compel corporations to act. After investigating the nationwide semiconductor shortage, the U.S. Secretary of Commerce warned that the government might invoke national security to compel semiconductor producers to disclose sensitive business information. The government has also invoked national security to justify extensive tariffs imposed on imported steel and aluminum products, leading to a major trade dispute. Years of neoliberal policy have created a perceived (though not necessarily functional) separation between government and industry. This separation encourages and, …


Decision Advantage: Intelligence In International Politics From The Spanish Armada To Cyberwar. By Jennifer E. Sims. Oxford: Oxford University Press, 2022., Adam D.M. Svendsen Jan 2023

Decision Advantage: Intelligence In International Politics From The Spanish Armada To Cyberwar. By Jennifer E. Sims. Oxford: Oxford University Press, 2022., Adam D.M. Svendsen

Journal of Strategic Security

This article provides an annotated review essay of Jennifer E. Sims’ book, Decision Advantage (2022). She communicates several valuable insights into how intelligence manifests in international affairs. Qualities are accomplished through Sims’ development of the concept and theory of ‘decision advantage’ in a variety of intelligence contexts, articulated via a series of different historical case studies ranging chronologically from the Spanish Armada to Cyberwar. Alongside acknowledging intelligence systems and engineering, notions of ‘intelligence power’ and ‘intelligence advantage(s)’ emerge as central, together with ideas of agility and adaptability amongst exponents. While undeniably forming a useful start, what Sims’ work ultimately discloses …


Understanding Pakistan’S Nuclear Security Regime, Tahir Azad, Karl Dewey Jan 2023

Understanding Pakistan’S Nuclear Security Regime, Tahir Azad, Karl Dewey

Journal of Strategic Security

Following Russia’s invasion of Ukraine in February 2022 there has been renewed attention on the security and protection of civilian nuclear infrastructure. This has been a long-standing issue in Pakistan, where the security of the country’s nuclear estate has attracted considerable international attention for decades. However, rather than looking at Pakistan’s civilian estate, assessments have instead prioritised the security of the country’s nuclear arsenal. They have also been widely divergent: Western analysts have raised serious concerns over Pakistan’s ability to secure sensitive nuclear materials, the country’s domestic instability and its poor non-proliferation history. In contrast Pakistani officials downplay these risks, …


Creating Light At Tunnel’S End: Ukraine’S Post-War Urban Recovery, Russell W. Glenn Jan 2023

Creating Light At Tunnel’S End: Ukraine’S Post-War Urban Recovery, Russell W. Glenn

Journal of Strategic Security

The US response to Iraq’s recovery in the aftermath of 2003 Operation Iraqi Freedom suffered from an initial conclusion that it was the country’s petroleum infrastructure rather than its electrical networks that were in greater need of recovery resources. The resulting misallocation of resources delayed power restoration to much of the country and frustrated those in affected regions.

Whether the cause is war or a catastrophe sparked by Mother Nature, accurately identifying and correctly prioritizing post-disaster requirements is fundamental to an effective and efficient response. Ukraine has demonstrated a commendable ability to repair war damage even as conflict continues, but …


The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader Nov 2022

The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader

Vanderbilt Journal of Transnational Law

On May 26, 2021, the General Assembly of the United Nations adopted a resolution approving the drafting of a new global treaty on cybercrime, which commenced in February 2022. The proposed UN agreement on cybercrime regulation has garnered significant criticism among the international community, namely by state delegates, human rights advocates, and nongovernmental organizations. Fears stem from the belief that such a treaty would be used to legitimize abusive practices and undermine fundamental human rights. National cybercrime laws already unduly restrict human rights. However, at a time where the global community has moved toward a digital world, it becomes even …


A Proposed Sec Cyber Data Disclosure Advisory Commission, Lawrence J. Trautman, Neal Newman Oct 2022

A Proposed Sec Cyber Data Disclosure Advisory Commission, Lawrence J. Trautman, Neal Newman

Faculty Scholarship

Constant cyber threats result in: intellectual property loss; data disruption; ransomware attacks; theft of valuable company intellectual property and sensitive customer information. During March 2022, The Securities and Exchange Commission (SEC) issued a proposed rule addressing Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure, which requires: 1. Current reporting about material cybersecurity incidents; 2. Periodic disclosures about a registrant’s policies and procedures to identify and manage cybersecurity risks; 3. Management’s role in implementing cybersecurity policies and procedures; 4. Board of directors’ cybersecurity expertise, if any, and its oversight of cybersecurity risk; 5. Registrants to provide updates about previously reported cybersecurity …


Emerging Technologies, Evolving Threats: Next-Generation Security Challenges, Tamara Bonaci, Katina Michael, Pablo Rivas, Lindsay J. Roberston, Michael Zimmer Sep 2022

Emerging Technologies, Evolving Threats: Next-Generation Security Challenges, Tamara Bonaci, Katina Michael, Pablo Rivas, Lindsay J. Roberston, Michael Zimmer

Computer Science Faculty Research and Publications

Security is a fundamental human requirement. We desire the security of our person against injury, security of our capability to provide for our families, security of income linked to needs (food, water, clothing, and shelter), and much more. Most also hope for security of a way of life that is fulfilling and pleasant and peaceful [1] . In 2003, Alkire [2] defined “human security” as: “[t]he objective … to safeguard the vital core of all human lives from critical pervasive threats, in a way that is consistent with long-term human fulfillment.” Today most of the world’s population is highly dependent, …


Balancing Grand Strategy For America To Offset Thucydides’S Trap With China, Anubhav S. Goswami Jul 2022

Balancing Grand Strategy For America To Offset Thucydides’S Trap With China, Anubhav S. Goswami

Journal of Strategic Security

China’s vastly increased economic and military might has alarmed the United States about sustaining its relative power in the world. Observing the growing influence of Beijing in the international world order, experts of ‘great power competition’ are now asking: What will be the reaction of the United States once China achieves parity or even comes close to achieving parity with Washington? As could be expected from its nature, the question has generated sharp polarising viewpoints but none has spawned more interest and controversy than Harvard Professor Graham T. Allison’s ‘Thucydides’ Trap’ discourse which argues that China’s spectacular rise could lead …


Strategy In An Uncertain Domain: Threat And Response In Cyberspace, Joe Devanny, Luiz Rogerio Franco Goldoni, Breno Pauli Medeiros Jul 2022

Strategy In An Uncertain Domain: Threat And Response In Cyberspace, Joe Devanny, Luiz Rogerio Franco Goldoni, Breno Pauli Medeiros

Journal of Strategic Security

Over the last decade, "cyber power" has become an increasingly prominent concept and instrument of national strategy. This article explores the nature of contemporary cyber power, focusing on how states should respond to "cyber uncertainty." Cases of cyber operations against Estonia, Georgia, and Ukraine, as well as cyber operations conducted (and suffered) by the United States, highlight the evolving role of cyber operations as an instrument of statecraft. Given the complexity of cyber forensics and the polluted information environment of the global public sphere, the public diplomacy of coordinated attribution statements cannot be expected to cut through conclusively or uniformly. …


Tiktok, Cfius, And The Splinternet, Jake T. Seiler May 2022

Tiktok, Cfius, And The Splinternet, Jake T. Seiler

University of Miami International and Comparative Law Review

This note will discuss the role that the Committee on Foreign Investment in the United States (“CFIUS” or “the Committee”) has played in foreign relations and how it contributes to the balkanization of the internet today. The Committee is an interagency body that reviews foreign investments for potential national security threats. Recently, CFIUS has been in the spotlight for its role in the sale of TikTok, a cellphone app owned by a popular Chinese corporation, ByteDance. While much of CFIUS’ review in the past has been focused on Chinese-owned corporations, there is much debate about whether or not countries should …


Revisiting Domestic Intelligence, John P. Sullivan, Genevieve Lester Apr 2022

Revisiting Domestic Intelligence, John P. Sullivan, Genevieve Lester

Journal of Strategic Security

This article looks at the evolution of US domestic intelligence prior to and since 9/11 in light of the Capitol attacks. It also reviews the literature and practice of intelligence reform in the context of foreign comparative experience (France, UK, Canada, Australia). It looks at the promise of fusion centers, cocontemporay domestic intelligence models, and the continuing need for domestic intelligence reform.

Additional Keywords: Domestic Intelligence, Intelligence Reform, Intelligence Fusion


Framing The Future Of The Us Military Profession, Richard A. Lacquement Jr., Thomas P. Galvin Jan 2022

Framing The Future Of The Us Military Profession, Richard A. Lacquement Jr., Thomas P. Galvin

Monographs & Collaborative Studies

The military profession needs to be redefined by examination of its expertise and jurisdictions of practice, whereas previously the focus was on securing its professional identity. Twenty years ago, the original Future of the Army Profession research project responded to growing concerns among officers that the Army was no longer a profession in light of the post–Cold War drawdown and the onset of global operations including Iraq and Afghanistan. Today, the profession faces recurrent challenges raised by the changing character of war, the renewal of great-power competition, crises surrounding issues of sexual harassment and assault, the effects of a major …


Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla Jan 2022

Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla

Journal of Strategic Security

According to the U.S. Department of Justice, in 2014, the Russian government-connected Internet Research Agency (IRA) initiated an information operation on social media platforms to manipulate the U.S. population concerning the 2016 U.S. presidential elections. This has revealed that social media platforms enable the spread of fake news among the masses globally and can thus become a means of disrupting the electoral process for foreign actors. This article addresses state-sponsored disinformation operations on social media that target foreign voters. It considers it crucial to counter such operations to protect the security and integrity of the elections in the digital age, …