Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- US Army War College (57)
- U.S. Naval War College (28)
- American University Washington College of Law (14)
- Georgetown University Law Center (7)
- Brooklyn Law School (3)
-
- Penn State Dickinson Law (3)
- Duquesne University (2)
- Notre Dame Law School (2)
- Pace University (2)
- Purdue University (2)
- Roger Williams University (2)
- Seattle University School of Law (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Arkansas, Fayetteville (2)
- University of Nebraska - Lincoln (2)
- Villanova University Charles Widger School of Law (2)
- William & Mary Law School (2)
- American University in Cairo (1)
- Brigham Young University Law School (1)
- Chicago-Kent College of Law (1)
- Columbia Law School (1)
- Fordham Law School (1)
- James Madison University (1)
- Montclair State University (1)
- Pepperdine University (1)
- San Jose State University (1)
- Southern Methodist University (1)
- St. John's University School of Law (1)
- Suffolk University (1)
- Texas A&M University School of Law (1)
- Keyword
-
- Law of the Sea (16)
- Maritime Claims (16)
- Naval Warfare (16)
- Law of the sea (15)
- Naval warfare (14)
-
- Indo-pacific (13)
- South china sea (13)
- National security (11)
- Law of Armed Conflict (9)
- National Security (9)
- China (8)
- Parameters (8)
- Use of Force (8)
- Russia (7)
- Cyber Law (5)
- National security law (5)
- US Army War College Press (5)
- Artificial intelligence (4)
- Civil-military relations (4)
- Cyber (4)
- Cyberspace (4)
- International law (4)
- Sovereignty (4)
- Trump (4)
- USAWC Press quarterly (4)
- COVID-19 (3)
- Countermeasures (3)
- Cybersecurity (3)
- Democracy (3)
- Egypt (3)
- Publication
-
- The US Army War College Quarterly: Parameters (57)
- International Law Studies (28)
- American University National Security Law Brief (10)
- Georgetown Law Faculty Publications and Other Works (6)
- Brooklyn Journal of International Law (3)
-
- Joint PIJIP/TLS Research Paper Series (3)
- Catholic University Journal of Law and Technology (2)
- Duquesne Law Review (2)
- Faculty Scholarly Works (2)
- Faculty Scholarship (2)
- Journal of Legislation (2)
- Law Faculty Scholarship (2)
- Pace International Law Review (2)
- Seattle University Law Review (2)
- Villanova Environmental Law Journal (2)
- Arkansas Law Review (1)
- Articles in Law Reviews & Other Academic Journals (1)
- BYU Law Review (1)
- Chicago-Kent Law Review (1)
- Copyright, Fair Use, Scholarly Communication, etc. (1)
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
- Dickinson Law Review (2017-Present) (1)
- Dissertations (1)
- FORCES Initiative: Strategy, Security, and Social Systems (1)
- Faculty Book Chapters (1)
- Faculty Testimony (1)
- Fordham Law Review (1)
- Georgia Journal of International & Comparative Law (1)
- Honors Theses (1)
- James Madison Undergraduate Research Journal (JMURJ) (1)
- Publication Type
- File Type
Articles 1 - 30 of 161
Full-Text Articles in Law
Securing The Precipitous Heights: U.S. Lawfare As A Means To Confront China At Sea, In Space, And Cyberspace, Garret S. Bowman
Securing The Precipitous Heights: U.S. Lawfare As A Means To Confront China At Sea, In Space, And Cyberspace, Garret S. Bowman
Pace International Law Review
No abstract provided.
Intellectual Property & National Security, James Morrison
Intellectual Property & National Security, James Morrison
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman
Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman
FORCES Initiative: Strategy, Security, and Social Systems
This work provides historical and contemporary overviews of this critical geopolitical problem, describes the policy actors addressing this in the U.S. and selected other countries, and provides maps and information on many undersea cable work routes. These cables are chokepoints with one dictionary defining chokepoints as “a strategic narrow route providing passage through or to another region."
Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman
Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman
University of Miami Inter-American Law Review
To thwart a seemingly neve rending bombardment of cyberattacks, the U.S. Department of Defense recently implemented a new strategy – defending forward. This approach demands persistently engaging the enemy on a daily basis to disrupt cyber activity. Rather than waiting to be attacked, the United States is bringing the fight to the enemy. However, this strategy poses fascinating and complex questions of international law. In particular, because most defend forward operations fall within the gray zone of warfare, it remains unclear whether these operations violate the sovereignty of American adversaries or even third party nation states in whose cyberspace U.S. …
Murky Materiality & Scattered Standards: In Favor Of A More Uniform System Of Sst Disclosure Requirements, Megan Ganley
Murky Materiality & Scattered Standards: In Favor Of A More Uniform System Of Sst Disclosure Requirements, Megan Ganley
Fordham Law Review
The Securities and Exchange Commission (SEC) requires corporations to disclose their business in or with state sponsors of terrorism (SSTs). The SEC solicits these disclosures with varying standards arising under several different mechanisms. These mechanisms include the requirements of the materiality standard, the provisions of Regulation S-K, targeted inquiry in individually issued comment letters, and affirmative requirements mandated under specific legislation. Each of these mechanisms requires disclosure of slightly different information regarding SSTs with varying degrees of exactitude. This Note examines the SEC’s current SST disclosure framework, considering the benefits, as well as the criticisms, of these disclosure mandates. This …
Autonomous Weapons Systems And The Procedural Accounta- Bility Gap, Afonso Seixas-Nunes
Autonomous Weapons Systems And The Procedural Accounta- Bility Gap, Afonso Seixas-Nunes
Brooklyn Journal of International Law
The development and well-established principles of Internationla Humanitarian Law have been progressively establishing limits to the means and methods of warfare. Those principles and rules are necessarily applicable to future autonomous weapon systems (AWS), but questions regarding liability for violations of IHL caused by AWS have been looming the international debate. This article has two parts. The first part aims to identify a technical dimension of AWS that has been neglected by international lawyers: States responsibility for IHL violations caused by errors in AWS’ software. This article argues that “errors” can neither be identified with “malfunctions” nor attributed to human …
Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane
Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane
Brooklyn Journal of International Law
The United States (US) and United Kingdom (UK) will soon bring into force a new international law enforcement data sharing ‘CLOUD Act agreement’ (US-UK Agreement), the first of its kind under the Clarifying Lawful Overseas Use of Data Act 2018 (CLOUD Act). These agreements enable law enforcement in one state to directly request data from service providers based in the other state. They respond to long-standing concerns with the main mechanism for obtaining overseas data, mutual legal assistance (MLA). The US and UK claim the US-UK Agreement will significantly speed up data access relative to MLA while “respecting privacy and …
Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker
Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker
Brooklyn Journal of International Law
Advancements in technology allow people to place phone calls half a world away via the internet. This technology has made it easier and cheaper for consumers to communicate, but it has also made it easier for scammers to reach more unsuspecting victims. In 2020, TrueCaller, an app designed to block scam phone calls, successfully blocked, and identified 31.3 billion spam calls in 20 countries. In the same year, Americans alone lost a total of USD $ 29.8 billion to scam calls. This Note argues that phone scams continue to be lucrative, in part, because criminal prosecutions of transnational crimes are …
If You Think Ai Won't Eclipse Humanity, You're Probably Just A Human, Gary D. Brown
If You Think Ai Won't Eclipse Humanity, You're Probably Just A Human, Gary D. Brown
William & Mary Bill of Rights Journal
Building machines that can replicate human thinking and behavior has fascinated people for hundreds of years. Stories about robots date from ancient history through da Vinci to the present. Whether designed to save labor or lives, to provide companionship or protection, loyal, capable, productive machines are a dream of humanity.
The modern manifestation of this interest in using human-like technology to advance social interests is artificial intelligence (AI). This is a paper about what that interest in AI means and how it might develop in the world of national security.
This abstract has been adapted from the author's introduction.
Adding Bite To The Zone Of Twilight: Applying Kisor To Revitalize The Youngstown Tripartite, Zachary W. Singer
Adding Bite To The Zone Of Twilight: Applying Kisor To Revitalize The Youngstown Tripartite, Zachary W. Singer
Michigan Journal of Environmental & Administrative Law
In the half century and more since Justice Jackson’s famous concurrence in Youngstown Sheet & Tube Co. v. Sawyer, the fog surrounding acceptable executive power in national security and foreign affairs has only thickened. Today, whether presidents are responding to the challenges of an amorphous global war on terrorism or a global pandemic, they act against a backdrop of ambiguous constitutional and statutory authorization and shifting precedent. While Justice Jackson outlined zones of presidential power by tying that power to congressional acts, the Court subsequently watered down the test by looking to other factors, like legislative intent. At other …
Review Essay, Robert L. Bateman
Review Essay, Robert L. Bateman
The US Army War College Quarterly: Parameters
No abstract provided.
Sino-Indian Border Disputes In An Era Of Strategic Expansions, Roman Muzalevsky
Sino-Indian Border Disputes In An Era Of Strategic Expansions, Roman Muzalevsky
The US Army War College Quarterly: Parameters
The June 2020 clash between the People’s Republic of China and India in the disputed Ladakh border area resulted from the strategic expansions of both powers. Like two bubbles expanding in a contained space, these expansions were bound to collide and cause friction. This article explains how the expansions precipitated the incident and might exacerbate border disputes in the future. In pondering implications, it recommends Washington pursue a Eurasia-focused policy embracing the disputed region.
Broken Nest: Deterring China From Invading Taiwan, Jared M. Mckinney, Peter Harris
Broken Nest: Deterring China From Invading Taiwan, Jared M. Mckinney, Peter Harris
The US Army War College Quarterly: Parameters
Deterring a Chinese invasion of Taiwan without recklessly threatening a great-power war is both possible and necessary through a tailored deterrence package that goes beyond either fighting over Taiwan or abandoning it. This article joins cutting-edge understandings of deterrence with empirical evidence of Chinese strategic thinking and culture to build such a strategy.
The Grand Strategic Thought Of Colin S. Gray, Lukas Milevski
The Grand Strategic Thought Of Colin S. Gray, Lukas Milevski
The US Army War College Quarterly: Parameters
Colin S. Gray distinguished himself from other scholars in the field of strategic studies with his belief that grand strategy is indispensable, complex, and inherently agential. This article identifies key themes, continuities, conceptual relationships, and potential discontinuities from his decades of grand strategic thought. Gray’s statement that “all strategy is grand strategy” remains highly relevant today, emphasizing the importance of agential context in military environments—a point often neglected in strategic practice.
Contributor's Guidelines And Article Index, Usawc Press
Contributor's Guidelines And Article Index, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Commentary And Reply, Claude A. Lambert
Commentary And Reply, Claude A. Lambert
The US Army War College Quarterly: Parameters
No abstract provided.
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
From The Editor, Antulio J. Echevarria Ii
From The Editor, Antulio J. Echevarria Ii
The US Army War College Quarterly: Parameters
No abstract provided.
Parameters Winter 2021, Usawc Press
Parameters Winter 2021, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
The Air Littoral: Another Look, Maximilian K. Bremer, Kelly A. Grieco
The Air Littoral: Another Look, Maximilian K. Bremer, Kelly A. Grieco
The US Army War College Quarterly: Parameters
Assessing threats to the air littoral, the airspace between ground forces and high-end fighters and bombers, requires a paradigm change in American military thinking about verticality. This article explores the consequences of domain convergence, specifically for the Army and Air Force’s different concepts of control. It will assist US military and policy practitioners in conceptualizing the air littoral and in thinking more vertically about the air and land domains and the challenges of domain convergence.
What Went Wrong In Afghanistan?, Todd Greentree
What Went Wrong In Afghanistan?, Todd Greentree
The US Army War College Quarterly: Parameters
Critics of the Afghan war have claimed it was always unwinnable. This article argues the war was unwinnable the way it was fought and posits an alternative based on the Afghan way of war and the US approach to counterinsurgency in El Salvador during the final decade of the Cold War. Respecting the political and military dictates of strategy could have made America’s longest foreign war unnecessary and is a warning for the wars we will fight in the future.
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Article Index, Usawc Press
Article Index, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Defeat Mechanisms In Modern Warfare, Frank Hoffman
Defeat Mechanisms In Modern Warfare, Frank Hoffman
The US Army War College Quarterly: Parameters
This article explores the current debate about service and Joint operating concepts, starting with the Army’s multi-domain operations concept. It argues for adaptations to an old operational design technique—defeat mechanisms; updates to Joint and service planning doctrine; and discipline regarding emerging concepts. Rather than debate over attrition versus maneuver, combinations of a suite of defeat mechanisms should be applied to gain victory in the future.
Amending Insurrection: Restoring The Balance Of Power In The Insurrection Act, Jeremy S Campbell
Amending Insurrection: Restoring The Balance Of Power In The Insurrection Act, Jeremy S Campbell
Texas A&M Law Review
The Insurrection Act allows the president to domestically deploy and utilize the federal standing army and state militias to perform functions normally performed by domestic law enforcement. The president can invoke the Act when circumstances make it impracticable to enforce domestic law by normal means, when the execution of the law is obstructed such that it deprives citizens of rightful legal protections, or upon the request of a state. Under the current version of the Act, the president possesses the sole and absolute discretion to determine when it is invoked during the two former instances above. When invoked, the Act …
Twenty Years After The Anthrax Terrorist Attacks Of 2001: Lessons Learned And Unlearned For The Covid-19 Response, Lawrence O. Gostin, Jennifer B. Nuzzo
Twenty Years After The Anthrax Terrorist Attacks Of 2001: Lessons Learned And Unlearned For The Covid-19 Response, Lawrence O. Gostin, Jennifer B. Nuzzo
Georgetown Law Faculty Publications and Other Works
The 20th anniversary of the terrorist attacks on September 11, 2001, resulted in deep national reflection. Less remembered are the events that began to unfold 7 days later as anonymous letters laced with deadly anthrax (Bacillus anthracis) spores began arriving at postal facilities, media companies, and congressional offices. The first death from inhaled anthrax exposure occurred on October 5, with an additional 4 deaths and 17 infections over the ensuing months.
The anthrax attacks exposed a health system ill-equipped to respond to acute emergencies. This article explores the lessons learned, and unlearned, from the anthrax attacks, through to …
In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller
In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller
International Law Studies
States currently endorse three different positions concerning the international wrongfulness of cyber operations that penetrate computer systems located on the territory of another state but do not rise to the level of a use of force or prohibited intervention. The first position is that such low-intensity cyber operations are never wrongful, because sovereignty is a principle of international law, not a primary rule that can be independently violated. The second is that low-intensity cyber operations are always wrongful, because sovereignty is a primary rule of international law that is violated by any non-consensual penetration of a computer system located on …
Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder
Cyberterrorism And The Public Safety Exception To Miranda, Mitch Snyder
Dickinson Law Review (2017-Present)
Cyberattacks against U.S. targets are becoming increasingly common. To effectively combat these attacks, law enforcement officers need the tools to respond to and prevent cyberattacks before they can occur.
In recent years, hackers have launched cyberattacks against infrastructural targets such as power grids, oil and gas distribution computer systems, and telecommunications networks. Cyberattacks have also targeted U.S. government websites, including the U.S. Department of Transportation and the U.S. Department of Treasury. Recently, a cyberattack against SolarWinds, a Texas-based I.T. company, compromised the computer and network systems of federal, state, and local governments; critical infrastructure entities; and other private sector organizations. …
Congressional Oversight Of Modern Warfare: History, Pathologies, And Proposals For Reform, Oona A. Hathaway, Tobias Kuehne, Randi Michel, Nicole Ng
Congressional Oversight Of Modern Warfare: History, Pathologies, And Proposals For Reform, Oona A. Hathaway, Tobias Kuehne, Randi Michel, Nicole Ng
William & Mary Law Review
Despite significant developments in the nature of twenty-first century warfare, Congress continues to employ a twentieth century oversight structure. Modern warfare tactics, including cyber operations, drone strikes, and special operations, do not neatly fall into congressional committee jurisdictions. Counterterrorism and cyber operations, which are inherently multi-jurisdictional and highly classified, illustrate the problem. In both contexts, over the past several years Congress has addressed oversight shortcomings by strengthening its reporting requirements, developing relatively robust oversight regimes. But in solving one problem, Congress has created another: deeply entrenched information silos that inhibit the sharing of information about modern warfare across committees. This …
Reassessing The Ahistorical Judicial Use Of William Winthrop And Frederick Bernays Wiener, Joshua E. Kastenberg
Reassessing The Ahistorical Judicial Use Of William Winthrop And Frederick Bernays Wiener, Joshua E. Kastenberg
Faculty Scholarship
Government lawyers, like the courts continue to cite to Winthrop. Most recently, in the pending appeal titled Larabee v. Harker, the government ‘s counsel quoted Winthrop for the proposition that “retired officers are a part of the army and so triable by court-martial—a fact indeed never admitting of question.” It is unlikely that the government’s counsel considered the matters presented in this brief article, or that Winthrop rested his statement on dicta rather than any constitutional statement on jurisdiction. Likewise, whatever criticism may be given to Justice Alito’s Ortiz dissent, I am not suggesting that either he, or Justice Neil …