Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (84)
- National Security Law (53)
- Social and Behavioral Sciences (36)
- Military, War, and Peace (25)
- Public Affairs, Public Policy and Public Administration (20)
-
- International Law (18)
- Political Science (18)
- Defense and Security Studies (13)
- International Relations (13)
- Internet Law (11)
- Physical Sciences and Mathematics (11)
- Science and Technology Law (11)
- Computer Sciences (10)
- Business (9)
- Computer Law (8)
- Arts and Humanities (7)
- International and Area Studies (7)
- History (6)
- Privacy Law (6)
- Public Policy (6)
- Engineering (5)
- Information Security (5)
- International Trade Law (5)
- Military and Veterans Studies (5)
- Science and Technology Studies (5)
- Administrative Law (4)
- Comparative Politics (4)
- Diplomatic History (4)
- Law and Politics (4)
- Legislation (4)
- Institution
-
- University of South Florida (45)
- American University Washington College of Law (8)
- Duke Law (8)
- Mitchell Hamline School of Law (8)
- Selected Works (7)
-
- Georgetown University Law Center (4)
- San Jose State University (4)
- Franklin University (3)
- Maurer School of Law: Indiana University (3)
- Missouri State University (3)
- Purdue University (3)
- US Army War College (3)
- University at Albany, State University of New York (3)
- William & Mary Law School (3)
- Air Force Institute of Technology (2)
- Drexel University Thomas R. Kline School of Law (2)
- Fordham University (2)
- Loyola Marymount University and Loyola Law School (2)
- Penn State Dickinson Law (2)
- Penn State Law (2)
- St. Thomas University College of Law (2)
- The Catholic University of America, Columbus School of Law (2)
- Universitas Indonesia (2)
- University of Florida Levin College of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Miami Law School (2)
- University of Nebraska - Lincoln (2)
- Utah State University (2)
- Vanderbilt University Law School (2)
- Washington and Lee University School of Law (2)
- Publication Year
- Publication
-
- Journal of Strategic Security (42)
- Faculty Scholarship (10)
- William Mitchell Law Review (8)
- American University National Security Law Brief (4)
- Secrecy and Society (4)
-
- All Faculty and Staff Scholarship (3)
- Faculty Publications (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Legacy Theses & Dissertations (2009 - 2024) (3)
- MSU Graduate Theses (3)
- Military Cyber Affairs (3)
- Publications (3)
- Articles in Law Reviews & Other Academic Journals (2)
- Indiana Law Journal (2)
- Jan Kallberg (2)
- Joint PIJIP/TLS Research Paper Series (2)
- Kelly Gable (2)
- Libraries Faculty and Staff Scholarship and Research (2)
- Loyola of Los Angeles Law Review (2)
- Monographs & Collaborative Studies (2)
- Penn State Journal of Law & International Affairs (2)
- Senior Theses (2)
- UF Law Faculty Publications (2)
- William & Mary Bill of Rights Journal (2)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (1)
- All Faculty Scholarship (1)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- Articles by Maurer Faculty (1)
- Brooklyn Law Review (1)
- CGU Faculty Publications and Research (1)
- Publication Type
- File Type
Articles 1 - 30 of 173
Full-Text Articles in Entire DC Network
Operational Energy Solutions For A 21st Century Battlefield, Nestor R. Levin
Operational Energy Solutions For A 21st Century Battlefield, Nestor R. Levin
Space and Defense
Development of alternative energy storage and distribution capacity for the modern battlefield is a major national security interest.
On Large Language Models In National Security Applications, William N. Caballero, Philip R. Jenkins
On Large Language Models In National Security Applications, William N. Caballero, Philip R. Jenkins
Faculty Publications
The overwhelming success of GPT-4 in early 2023 highlighted the transformative potential of large language models (LLMs) across various sectors, including national security. This article explores the implications of LLM integration within national security contexts, analyzing their potential to revolutionize information processing, decision-making, and operational efficiency. Whereas LLMs offer substantial benefits, such as automating tasks and enhancing data analysis, they also pose significant risks, including hallucinations, data privacy concerns, and vulnerability to adversarial attacks. Through their coupling with decision-theoretic principles and Bayesian reasoning, LLMs can significantly improve decision-making processes within national security organizations. Namely, LLMs can facilitate the transition from …
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
Faculty Publications
This Essay contends that data infrastructure, when implemented on a national scale, can transform the way we conceptualize artificial intelligence (AI) governance. AI governance is often viewed as necessary for a wide range of strategic goals, including national security. It is widely understood that allowing AI and generative AI to remain self-regulated by the U.S. AI industry poses significant national security risks. Data infrastructure and AI oversight can assist in multiple goals, including: maintaining data privacy and data integrity; increasing cybersecurity; and guarding against information warfare threats. This Essay concludes that conceptualizing data infrastructure as a form of critical infrastructure …
Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky
Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky
UF Law Faculty Publications
This Article contends that the National Cybersecurity Strategy's software liability regime should incorporate two safe harbors. The first would shield software creators and vendors from liability for decisions related to design, implementation, and maintenance, as long as those choices follow enumerated best practices. The second—the “inverse safe harbor”—would have the opposite effect: coders and distributors who engaged in defined worst practices would automatically become liable. This Article explains the design, components, and justifications for these twin safe harbors. The software safe harbors are key parts of the overall design of the new liability regime and work in tandem with the …
Cyber Threats Risk Analysis In State Policies In Guaranteeing National Security, Bahri Gashi, Bashkim Smakaj, Ngadhnjim Brovina, Arian Kadriu
Cyber Threats Risk Analysis In State Policies In Guaranteeing National Security, Bahri Gashi, Bashkim Smakaj, Ngadhnjim Brovina, Arian Kadriu
UBT International Conference
Cyber threats, generally including hybrid warfare, are among the greatest challenges that states and organizations are facing in modern times. This is due to the significant evolution of technology in recent years, which has made a vast amount of information available to individuals and organizations. Such threats can cause serious damage to critical infrastructure, such as transportation, energy, and water resources, as well as communication and financial systems. They can also impact a country's national security and political stability.
To address this threat, states have implemented various policies and measures to ensure national security against the backdrop of cyber security …
Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris
Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris
Liberty University Journal of Statesmanship & Public Policy
Recent developments in artificial intelligence (AI) have caused concern over the ethical implications of large-scale AI implementation. As a result, leading technologists and computer scientists have advocated an incremental rather than comprehensive approach to AI development and implementation to allow ethical and structural guidelines to provide a public safety net. However, such an approach does not account for the geopolitical and national security implications of lagging behind competitors like China, who have publicly stated goals of reaching AI supremacy within the next ten years. This article presents a national security analysis of the risks to American national security by allowing …
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Like Treating The Symptom Rather Than The Cause - The Omission Of Courses Over Terrorism In Nsa Designated Institutions, Ida L. Oesteraas
Journal of Cybersecurity Education, Research and Practice
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two programs offer a required course about terrorism. Given the fluid nature of terrorism and its threat to national infrastructure, the omission is concerning. It is recommended that NSA-certified cybersecurity programs begin implementing educational content that aim to teach about this emerging crime and justice issue. One suggestion is to embrace the …
Two Visions Of Digital Sovereignty, Sujit Raman
Two Visions Of Digital Sovereignty, Sujit Raman
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Military Advisors, Service Strategies, And Great Power Competition, Mike Anderson
Military Advisors, Service Strategies, And Great Power Competition, Mike Anderson
Journal of Strategic Security
United States professional military advisors play a critical role across the spectrum of conflict within the various services’ strategies in support of the overall National Defense Strategy. In an era of great power competition, the role of advisory forces within the shadow of large-scale conflict, provide a crucial edge for the US military services fulfilling their strategic role. Within each of the services’ unique strategies - the Army’s multidomain operations, the Marine Corps expeditionary advanced base operations nested within the Navy’s broader littoral operations in a contested environment, and the Air Force’s forward projecting agile basing concept - advisors from …
Digitized Statecraft In Multilateral Treaty Participation: Global Quasi-Legislative Behavior Of 193 Sovereign States. By Takashi Inoguchi And Lien Thi Quynh Le. Singapore: Springer Nature, 2021., Melisa Perut, Etel Solingen, Ph.D.
Digitized Statecraft In Multilateral Treaty Participation: Global Quasi-Legislative Behavior Of 193 Sovereign States. By Takashi Inoguchi And Lien Thi Quynh Le. Singapore: Springer Nature, 2021., Melisa Perut, Etel Solingen, Ph.D.
Journal of Strategic Security
No abstract provided.
Role Of The State Intelligence Agency In Managing The Covid-19 Pandemic In Indonesia, Yofitri Heny Wahyuli
Role Of The State Intelligence Agency In Managing The Covid-19 Pandemic In Indonesia, Yofitri Heny Wahyuli
Jurnal Politik
The COVID-19 pandemic has prompted governments in various countries to involve a wide range of actors, including intelligence. Since the beginning of 2020, the State Intelligence Agency (BIN) in Indonesia has been actively involved in dealing with the COVID-19 pandemic. The deployment of intelligence bodies in handling a pandemic is a common practice that many democratic countries do. However, intelligence must operate within the confines of its mandate, function, and democratic principles. This paper will examine the issues regarding the roles of BIN in dealing with the pandemic in Indonesia. Data sources for this study were obtained by applying a …
Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu
American University National Security Law Brief
The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.
The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check
The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check
American University National Security Law Brief
Protecting critical infrastructure from cyber threats is difficult and complex. News headlines abound with reports that show how critical infrastructure—ranging from voting machines to steel mills—have become increasingly vulnerable to cyber operations from state and sophisticated nonstate actors. As critical infrastructure becomes increasingly entangled with the Internet and as new tactics, techniques, and procedures rapidly proliferate and evolve, governments and businesses alike must contend with a mutating threat environment that may put sensitive and highly important critical infrastructure assets in serious jeopardy. The vulnerabilities of critical infrastructure, which provide vital services and functions to societies, may pose a particularly tempting …
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
American University National Security Law Brief
Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …
Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling
Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling
Joint PIJIP/TLS Research Paper Series
No abstract provided.
A Defense Perspective On A Reliable And Sustainable Supply Of Critical Minerals, Matthew D. Zolnowski
A Defense Perspective On A Reliable And Sustainable Supply Of Critical Minerals, Matthew D. Zolnowski
Canada-United States Law Journal
Canada-United States Law Institute 2022 Experts' Meeting
The Private Enforcement Of National Security, Maryam Jamshidi
The Private Enforcement Of National Security, Maryam Jamshidi
Publications
The private enforcement of public law is a central feature of the American administrative state. As various scholars have argued, the federal government depends upon private parties to enforce public laws through litigation in order to achieve the government’s regulatory objectives. This scholarship has, however, largely overlooked the phenomenon of private enforcement in the national security arena. This Article seeks to describe and analyze national security’s private enforcement for the first time. In doing so, it explores what national security’s private enforcement reveals about the costs of private enforcement more broadly. In particular, this Article identifies an important downside to …
National Security As A Means To A Commercial End: Call For A New Approach, Yong-Shik Lee
National Security As A Means To A Commercial End: Call For A New Approach, Yong-Shik Lee
Nebraska Law Review
While corporations do not enjoy unfettered freedom—they are constrained by legal, political, and social requirements and expectations—governments must have legitimate grounds when they compel corporations to act. After investigating the nationwide semiconductor shortage, the U.S. Secretary of Commerce warned that the government might invoke national security to compel semiconductor producers to disclose sensitive business information. The government has also invoked national security to justify extensive tariffs imposed on imported steel and aluminum products, leading to a major trade dispute. Years of neoliberal policy have created a perceived (though not necessarily functional) separation between government and industry. This separation encourages and, …
Decision Advantage: Intelligence In International Politics From The Spanish Armada To Cyberwar. By Jennifer E. Sims. Oxford: Oxford University Press, 2022., Adam D.M. Svendsen
Decision Advantage: Intelligence In International Politics From The Spanish Armada To Cyberwar. By Jennifer E. Sims. Oxford: Oxford University Press, 2022., Adam D.M. Svendsen
Journal of Strategic Security
This article provides an annotated review essay of Jennifer E. Sims’ book, Decision Advantage (2022). She communicates several valuable insights into how intelligence manifests in international affairs. Qualities are accomplished through Sims’ development of the concept and theory of ‘decision advantage’ in a variety of intelligence contexts, articulated via a series of different historical case studies ranging chronologically from the Spanish Armada to Cyberwar. Alongside acknowledging intelligence systems and engineering, notions of ‘intelligence power’ and ‘intelligence advantage(s)’ emerge as central, together with ideas of agility and adaptability amongst exponents. While undeniably forming a useful start, what Sims’ work ultimately discloses …
Understanding Pakistan’S Nuclear Security Regime, Tahir Azad, Karl Dewey
Understanding Pakistan’S Nuclear Security Regime, Tahir Azad, Karl Dewey
Journal of Strategic Security
Following Russia’s invasion of Ukraine in February 2022 there has been renewed attention on the security and protection of civilian nuclear infrastructure. This has been a long-standing issue in Pakistan, where the security of the country’s nuclear estate has attracted considerable international attention for decades. However, rather than looking at Pakistan’s civilian estate, assessments have instead prioritised the security of the country’s nuclear arsenal. They have also been widely divergent: Western analysts have raised serious concerns over Pakistan’s ability to secure sensitive nuclear materials, the country’s domestic instability and its poor non-proliferation history. In contrast Pakistani officials downplay these risks, …
Creating Light At Tunnel’S End: Ukraine’S Post-War Urban Recovery, Russell W. Glenn
Creating Light At Tunnel’S End: Ukraine’S Post-War Urban Recovery, Russell W. Glenn
Journal of Strategic Security
The US response to Iraq’s recovery in the aftermath of 2003 Operation Iraqi Freedom suffered from an initial conclusion that it was the country’s petroleum infrastructure rather than its electrical networks that were in greater need of recovery resources. The resulting misallocation of resources delayed power restoration to much of the country and frustrated those in affected regions.
Whether the cause is war or a catastrophe sparked by Mother Nature, accurately identifying and correctly prioritizing post-disaster requirements is fundamental to an effective and efficient response. Ukraine has demonstrated a commendable ability to repair war damage even as conflict continues, but …
The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader
The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader
Vanderbilt Journal of Transnational Law
On May 26, 2021, the General Assembly of the United Nations adopted a resolution approving the drafting of a new global treaty on cybercrime, which commenced in February 2022. The proposed UN agreement on cybercrime regulation has garnered significant criticism among the international community, namely by state delegates, human rights advocates, and nongovernmental organizations. Fears stem from the belief that such a treaty would be used to legitimize abusive practices and undermine fundamental human rights. National cybercrime laws already unduly restrict human rights. However, at a time where the global community has moved toward a digital world, it becomes even …
A Proposed Sec Cyber Data Disclosure Advisory Commission, Lawrence J. Trautman, Neal Newman
A Proposed Sec Cyber Data Disclosure Advisory Commission, Lawrence J. Trautman, Neal Newman
Faculty Scholarship
Constant cyber threats result in: intellectual property loss; data disruption; ransomware attacks; theft of valuable company intellectual property and sensitive customer information. During March 2022, The Securities and Exchange Commission (SEC) issued a proposed rule addressing Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure, which requires: 1. Current reporting about material cybersecurity incidents; 2. Periodic disclosures about a registrant’s policies and procedures to identify and manage cybersecurity risks; 3. Management’s role in implementing cybersecurity policies and procedures; 4. Board of directors’ cybersecurity expertise, if any, and its oversight of cybersecurity risk; 5. Registrants to provide updates about previously reported cybersecurity …
Emerging Technologies, Evolving Threats: Next-Generation Security Challenges, Tamara Bonaci, Katina Michael, Pablo Rivas, Lindsay J. Roberston, Michael Zimmer
Emerging Technologies, Evolving Threats: Next-Generation Security Challenges, Tamara Bonaci, Katina Michael, Pablo Rivas, Lindsay J. Roberston, Michael Zimmer
Computer Science Faculty Research and Publications
Security is a fundamental human requirement. We desire the security of our person against injury, security of our capability to provide for our families, security of income linked to needs (food, water, clothing, and shelter), and much more. Most also hope for security of a way of life that is fulfilling and pleasant and peaceful [1] . In 2003, Alkire [2] defined “human security” as: “[t]he objective … to safeguard the vital core of all human lives from critical pervasive threats, in a way that is consistent with long-term human fulfillment.” Today most of the world’s population is highly dependent, …
Balancing Grand Strategy For America To Offset Thucydides’S Trap With China, Anubhav S. Goswami
Balancing Grand Strategy For America To Offset Thucydides’S Trap With China, Anubhav S. Goswami
Journal of Strategic Security
China’s vastly increased economic and military might has alarmed the United States about sustaining its relative power in the world. Observing the growing influence of Beijing in the international world order, experts of ‘great power competition’ are now asking: What will be the reaction of the United States once China achieves parity or even comes close to achieving parity with Washington? As could be expected from its nature, the question has generated sharp polarising viewpoints but none has spawned more interest and controversy than Harvard Professor Graham T. Allison’s ‘Thucydides’ Trap’ discourse which argues that China’s spectacular rise could lead …
Strategy In An Uncertain Domain: Threat And Response In Cyberspace, Joe Devanny, Luiz Rogerio Franco Goldoni, Breno Pauli Medeiros
Strategy In An Uncertain Domain: Threat And Response In Cyberspace, Joe Devanny, Luiz Rogerio Franco Goldoni, Breno Pauli Medeiros
Journal of Strategic Security
Over the last decade, "cyber power" has become an increasingly prominent concept and instrument of national strategy. This article explores the nature of contemporary cyber power, focusing on how states should respond to "cyber uncertainty." Cases of cyber operations against Estonia, Georgia, and Ukraine, as well as cyber operations conducted (and suffered) by the United States, highlight the evolving role of cyber operations as an instrument of statecraft. Given the complexity of cyber forensics and the polluted information environment of the global public sphere, the public diplomacy of coordinated attribution statements cannot be expected to cut through conclusively or uniformly. …
Tiktok, Cfius, And The Splinternet, Jake T. Seiler
Tiktok, Cfius, And The Splinternet, Jake T. Seiler
University of Miami International and Comparative Law Review
This note will discuss the role that the Committee on Foreign Investment in the United States (“CFIUS” or “the Committee”) has played in foreign relations and how it contributes to the balkanization of the internet today. The Committee is an interagency body that reviews foreign investments for potential national security threats. Recently, CFIUS has been in the spotlight for its role in the sale of TikTok, a cellphone app owned by a popular Chinese corporation, ByteDance. While much of CFIUS’ review in the past has been focused on Chinese-owned corporations, there is much debate about whether or not countries should …
Revisiting Domestic Intelligence, John P. Sullivan, Genevieve Lester
Revisiting Domestic Intelligence, John P. Sullivan, Genevieve Lester
Journal of Strategic Security
This article looks at the evolution of US domestic intelligence prior to and since 9/11 in light of the Capitol attacks. It also reviews the literature and practice of intelligence reform in the context of foreign comparative experience (France, UK, Canada, Australia). It looks at the promise of fusion centers, cocontemporay domestic intelligence models, and the continuing need for domestic intelligence reform.
Additional Keywords: Domestic Intelligence, Intelligence Reform, Intelligence Fusion
Framing The Future Of The Us Military Profession, Richard A. Lacquement Jr., Thomas P. Galvin
Framing The Future Of The Us Military Profession, Richard A. Lacquement Jr., Thomas P. Galvin
Monographs & Collaborative Studies
The military profession needs to be redefined by examination of its expertise and jurisdictions of practice, whereas previously the focus was on securing its professional identity. Twenty years ago, the original Future of the Army Profession research project responded to growing concerns among officers that the Army was no longer a profession in light of the post–Cold War drawdown and the onset of global operations including Iraq and Afghanistan. Today, the profession faces recurrent challenges raised by the changing character of war, the renewal of great-power competition, crises surrounding issues of sexual harassment and assault, the effects of a major …
Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla
Securing Elections Through International Law: A Tool For Combatting Disinformation Operations?, İrem Işik, Ömer F. Bi̇ldi̇k, Tayanç T. Molla
Journal of Strategic Security
According to the U.S. Department of Justice, in 2014, the Russian government-connected Internet Research Agency (IRA) initiated an information operation on social media platforms to manipulate the U.S. population concerning the 2016 U.S. presidential elections. This has revealed that social media platforms enable the spread of fake news among the masses globally and can thus become a means of disrupting the electoral process for foreign actors. This article addresses state-sponsored disinformation operations on social media that target foreign voters. It considers it crucial to counter such operations to protect the security and integrity of the elections in the digital age, …