Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

2021

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 161

Full-Text Articles in Law

Securing The Precipitous Heights: U.S. Lawfare As A Means To Confront China At Sea, In Space, And Cyberspace, Garret S. Bowman Dec 2021

Securing The Precipitous Heights: U.S. Lawfare As A Means To Confront China At Sea, In Space, And Cyberspace, Garret S. Bowman

Pace International Law Review

No abstract provided.


Intellectual Property & National Security, James Morrison Dec 2021

Intellectual Property & National Security, James Morrison

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman Dec 2021

Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman

FORCES Initiative: Strategy, Security, and Social Systems

This work provides historical and contemporary overviews of this critical geopolitical problem, describes the policy actors addressing this in the U.S. and selected other countries, and provides maps and information on many undersea cable work routes. These cables are chokepoints with one dictionary defining chokepoints as “a strategic narrow route providing passage through or to another region."


Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman Dec 2021

Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman

University of Miami Inter-American Law Review

To thwart a seemingly neve rending bombardment of cyberattacks, the U.S. Department of Defense recently implemented a new strategy – defending forward. This approach demands persistently engaging the enemy on a daily basis to disrupt cyber activity. Rather than waiting to be attacked, the United States is bringing the fight to the enemy. However, this strategy poses fascinating and complex questions of international law. In particular, because most defend forward operations fall within the gray zone of warfare, it remains unclear whether these operations violate the sovereignty of American adversaries or even third party nation states in whose cyberspace U.S. …


Murky Materiality & Scattered Standards: In Favor Of A More Uniform System Of Sst Disclosure Requirements, Megan Ganley Dec 2021

Murky Materiality & Scattered Standards: In Favor Of A More Uniform System Of Sst Disclosure Requirements, Megan Ganley

Fordham Law Review

The Securities and Exchange Commission (SEC) requires corporations to disclose their business in or with state sponsors of terrorism (SSTs). The SEC solicits these disclosures with varying standards arising under several different mechanisms. These mechanisms include the requirements of the materiality standard, the provisions of Regulation S-K, targeted inquiry in individually issued comment letters, and affirmative requirements mandated under specific legislation. Each of these mechanisms requires disclosure of slightly different information regarding SSTs with varying degrees of exactitude. This Note examines the SEC’s current SST disclosure framework, considering the benefits, as well as the criticisms, of these disclosure mandates. This …


Autonomous Weapons Systems And The Procedural Accounta- Bility Gap, Afonso Seixas-Nunes Dec 2021

Autonomous Weapons Systems And The Procedural Accounta- Bility Gap, Afonso Seixas-Nunes

Brooklyn Journal of International Law

The development and well-established principles of Internationla Humanitarian Law have been progressively establishing limits to the means and methods of warfare. Those principles and rules are necessarily applicable to future autonomous weapon systems (AWS), but questions regarding liability for violations of IHL caused by AWS have been looming the international debate. This article has two parts. The first part aims to identify a technical dimension of AWS that has been neglected by international lawyers: States responsibility for IHL violations caused by errors in AWS’ software. This article argues that “errors” can neither be identified with “malfunctions” nor attributed to human …


Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane Dec 2021

Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane

Brooklyn Journal of International Law

The United States (US) and United Kingdom (UK) will soon bring into force a new international law enforcement data sharing ‘CLOUD Act agreement’ (US-UK Agreement), the first of its kind under the Clarifying Lawful Overseas Use of Data Act 2018 (CLOUD Act). These agreements enable law enforcement in one state to directly request data from service providers based in the other state. They respond to long-standing concerns with the main mechanism for obtaining overseas data, mutual legal assistance (MLA). The US and UK claim the US-UK Agreement will significantly speed up data access relative to MLA while “respecting privacy and …


Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker Dec 2021

Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker

Brooklyn Journal of International Law

Advancements in technology allow people to place phone calls half a world away via the internet. This technology has made it easier and cheaper for consumers to communicate, but it has also made it easier for scammers to reach more unsuspecting victims. In 2020, TrueCaller, an app designed to block scam phone calls, successfully blocked, and identified 31.3 billion spam calls in 20 countries. In the same year, Americans alone lost a total of USD $ 29.8 billion to scam calls. This Note argues that phone scams continue to be lucrative, in part, because criminal prosecutions of transnational crimes are …


If You Think Ai Won't Eclipse Humanity, You're Probably Just A Human, Gary D. Brown Dec 2021

If You Think Ai Won't Eclipse Humanity, You're Probably Just A Human, Gary D. Brown

William & Mary Bill of Rights Journal

Building machines that can replicate human thinking and behavior has fascinated people for hundreds of years. Stories about robots date from ancient history through da Vinci to the present. Whether designed to save labor or lives, to provide companionship or protection, loyal, capable, productive machines are a dream of humanity.

The modern manifestation of this interest in using human-like technology to advance social interests is artificial intelligence (AI). This is a paper about what that interest in AI means and how it might develop in the world of national security.

This abstract has been adapted from the author's introduction.


Adding Bite To The Zone Of Twilight: Applying Kisor To Revitalize The Youngstown Tripartite, Zachary W. Singer Dec 2021

Adding Bite To The Zone Of Twilight: Applying Kisor To Revitalize The Youngstown Tripartite, Zachary W. Singer

Michigan Journal of Environmental & Administrative Law

In the half century and more since Justice Jackson’s famous concurrence in Youngstown Sheet & Tube Co. v. Sawyer, the fog surrounding acceptable executive power in national security and foreign affairs has only thickened. Today, whether presidents are responding to the challenges of an amorphous global war on terrorism or a global pandemic, they act against a backdrop of ambiguous constitutional and statutory authorization and shifting precedent. While Justice Jackson outlined zones of presidential power by tying that power to congressional acts, the Court subsequently watered down the test by looking to other factors, like legislative intent. At other …


Review Essay, Robert L. Bateman Nov 2021

Review Essay, Robert L. Bateman

The US Army War College Quarterly: Parameters

No abstract provided.


Sino-Indian Border Disputes In An Era Of Strategic Expansions, Roman Muzalevsky Nov 2021

Sino-Indian Border Disputes In An Era Of Strategic Expansions, Roman Muzalevsky

The US Army War College Quarterly: Parameters

The June 2020 clash between the People’s Republic of China and India in the disputed Ladakh border area resulted from the strategic expansions of both powers. Like two bubbles expanding in a contained space, these expansions were bound to collide and cause friction. This article explains how the expansions precipitated the incident and might exacerbate border disputes in the future. In pondering implications, it recommends Washington pursue a Eurasia-focused policy embracing the disputed region.


Broken Nest: Deterring China From Invading Taiwan, Jared M. Mckinney, Peter Harris Nov 2021

Broken Nest: Deterring China From Invading Taiwan, Jared M. Mckinney, Peter Harris

The US Army War College Quarterly: Parameters

Deterring a Chinese invasion of Taiwan without recklessly threatening a great-power war is both possible and necessary through a tailored deterrence package that goes beyond either fighting over Taiwan or abandoning it. This article joins cutting-edge understandings of deterrence with empirical evidence of Chinese strategic thinking and culture to build such a strategy.


The Grand Strategic Thought Of Colin S. Gray, Lukas Milevski Nov 2021

The Grand Strategic Thought Of Colin S. Gray, Lukas Milevski

The US Army War College Quarterly: Parameters

Colin S. Gray distinguished himself from other scholars in the field of strategic studies with his belief that grand strategy is indispensable, complex, and inherently agential. This article identifies key themes, continuities, conceptual relationships, and potential discontinuities from his decades of grand strategic thought. Gray’s statement that “all strategy is grand strategy” remains highly relevant today, emphasizing the importance of agential context in military environments—a point often neglected in strategic practice.


Contributor's Guidelines And Article Index, Usawc Press Nov 2021

Contributor's Guidelines And Article Index, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Commentary And Reply, Claude A. Lambert Nov 2021

Commentary And Reply, Claude A. Lambert

The US Army War College Quarterly: Parameters

No abstract provided.


Book Reviews, Usawc Press Nov 2021

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


From The Editor, Antulio J. Echevarria Ii Nov 2021

From The Editor, Antulio J. Echevarria Ii

The US Army War College Quarterly: Parameters

No abstract provided.


Parameters Winter 2021, Usawc Press Nov 2021

Parameters Winter 2021, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


The Air Littoral: Another Look, Maximilian K. Bremer, Kelly A. Grieco Nov 2021

The Air Littoral: Another Look, Maximilian K. Bremer, Kelly A. Grieco

The US Army War College Quarterly: Parameters

Assessing threats to the air littoral, the airspace between ground forces and high-end fighters and bombers, requires a paradigm change in American military thinking about verticality. This article explores the consequences of domain convergence, specifically for the Army and Air Force’s different concepts of control. It will assist US military and policy practitioners in conceptualizing the air littoral and in thinking more vertically about the air and land domains and the challenges of domain convergence.


What Went Wrong In Afghanistan?, Todd Greentree Nov 2021

What Went Wrong In Afghanistan?, Todd Greentree

The US Army War College Quarterly: Parameters

Critics of the Afghan war have claimed it was always unwinnable. This article argues the war was unwinnable the way it was fought and posits an alternative based on the Afghan way of war and the US approach to counterinsurgency in El Salvador during the final decade of the Cold War. Respecting the political and military dictates of strategy could have made America’s longest foreign war unnecessary and is a warning for the wars we will fight in the future.


Book Reviews, Usawc Press Nov 2021

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Article Index, Usawc Press Nov 2021

Article Index, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Defeat Mechanisms In Modern Warfare, Frank Hoffman Nov 2021

Defeat Mechanisms In Modern Warfare, Frank Hoffman

The US Army War College Quarterly: Parameters

This article explores the current debate about service and Joint operating concepts, starting with the Army’s multi-domain operations concept. It argues for adaptations to an old operational design technique—defeat mechanisms; updates to Joint and service planning doctrine; and discipline regarding emerging concepts. Rather than debate over attrition versus maneuver, combinations of a suite of defeat mechanisms should be applied to gain victory in the future.


Amending Insurrection: Restoring The Balance Of Power In The Insurrection Act, Jeremy S Campbell Nov 2021

Amending Insurrection: Restoring The Balance Of Power In The Insurrection Act, Jeremy S Campbell

Texas A&M Law Review

The Insurrection Act allows the president to domestically deploy and utilize the federal standing army and state militias to perform functions normally performed by domestic law enforcement. The president can invoke the Act when circumstances make it impracticable to enforce domestic law by normal means, when the execution of the law is obstructed such that it deprives citizens of rightful legal protections, or upon the request of a state. Under the current version of the Act, the president possesses the sole and absolute discretion to determine when it is invoked during the two former instances above. When invoked, the Act …


Twenty Years After The Anthrax Terrorist Attacks Of 2001: Lessons Learned And Unlearned For The Covid-19 Response, Lawrence O. Gostin, Jennifer B. Nuzzo Oct 2021

Twenty Years After The Anthrax Terrorist Attacks Of 2001: Lessons Learned And Unlearned For The Covid-19 Response, Lawrence O. Gostin, Jennifer B. Nuzzo

Georgetown Law Faculty Publications and Other Works

The 20th anniversary of the terrorist attacks on September 11, 2001, resulted in deep national reflection. Less remembered are the events that began to unfold 7 days later as anonymous letters laced with deadly anthrax (Bacillus anthracis) spores began arriving at postal facilities, media companies, and congressional offices. The first death from inhaled anthrax exposure occurred on October 5, with an additional 4 deaths and 17 infections over the ensuing months.

The anthrax attacks exposed a health system ill-equipped to respond to acute emergencies. This article explores the lessons learned, and unlearned, from the anthrax attacks, through to …


In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller Oct 2021

In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller

International Law Studies

States currently endorse three different positions concerning the international wrongfulness of cyber operations that penetrate computer systems located on the territory of another state but do not rise to the level of a use of force or prohibited intervention. The first position is that such low-intensity cyber operations are never wrongful, because sovereignty is a principle of international law, not a primary rule that can be independently violated. The second is that low-intensity cyber operations are always wrongful, because sovereignty is a primary rule of international law that is violated by any non-consensual penetration of a computer system located on …


Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder Oct 2021

Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder

Dickinson Law Review (2017-Present)

Cyberattacks against U.S. targets are becoming increasingly common. To effectively combat these attacks, law enforcement officers need the tools to respond to and prevent cyberattacks before they can occur.

In recent years, hackers have launched cyberattacks against infrastructural targets such as power grids, oil and gas distribution computer systems, and telecommunications networks. Cyberattacks have also targeted U.S. government websites, including the U.S. Department of Transportation and the U.S. Department of Treasury. Recently, a cyberattack against SolarWinds, a Texas-based I.T. company, compromised the computer and network systems of federal, state, and local governments; critical infrastructure entities; and other private sector organizations. …


Congressional Oversight Of Modern Warfare: History, Pathologies, And Proposals For Reform, Oona A. Hathaway, Tobias Kuehne, Randi Michel, Nicole Ng Oct 2021

Congressional Oversight Of Modern Warfare: History, Pathologies, And Proposals For Reform, Oona A. Hathaway, Tobias Kuehne, Randi Michel, Nicole Ng

William & Mary Law Review

Despite significant developments in the nature of twenty-first century warfare, Congress continues to employ a twentieth century oversight structure. Modern warfare tactics, including cyber operations, drone strikes, and special operations, do not neatly fall into congressional committee jurisdictions. Counterterrorism and cyber operations, which are inherently multi-jurisdictional and highly classified, illustrate the problem. In both contexts, over the past several years Congress has addressed oversight shortcomings by strengthening its reporting requirements, developing relatively robust oversight regimes. But in solving one problem, Congress has created another: deeply entrenched information silos that inhibit the sharing of information about modern warfare across committees. This …


Reassessing The Ahistorical Judicial Use Of William Winthrop And Frederick Bernays Wiener, Joshua E. Kastenberg Oct 2021

Reassessing The Ahistorical Judicial Use Of William Winthrop And Frederick Bernays Wiener, Joshua E. Kastenberg

Faculty Scholarship

Government lawyers, like the courts continue to cite to Winthrop. Most recently, in the pending appeal titled Larabee v. Harker, the government ‘s counsel quoted Winthrop for the proposition that “retired officers are a part of the army and so triable by court-martial—a fact indeed never admitting of question.” It is unlikely that the government’s counsel considered the matters presented in this brief article, or that Winthrop rested his statement on dicta rather than any constitutional statement on jurisdiction. Likewise, whatever criticism may be given to Justice Alito’s Ortiz dissent, I am not suggesting that either he, or Justice Neil …