Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- National Security Law (4)
- International Law (3)
- Administrative Law (2)
- Computer Law (2)
- International Humanitarian Law (2)
-
- Law and Politics (2)
- Military, War, and Peace (2)
- Science and Technology Law (2)
- Air and Space Law (1)
- Education (1)
- Election Law (1)
- Gifted Education (1)
- Higher Education (1)
- Human Rights Law (1)
- Intellectual Property Law (1)
- International Relations (1)
- Internet Law (1)
- Other Education (1)
- Political Science (1)
- Social and Behavioral Sciences (1)
- Transnational Law (1)
- Institution
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Law
It's Time To Reform The U.S. Vulnerabilities Equities Process, Amy Gaudion
It's Time To Reform The U.S. Vulnerabilities Equities Process, Amy Gaudion
Faculty Scholarly Works
No abstract provided.
The Plea Of Necessity: An Oft Overlooked Response Option To Hostile Cyber Operations, Louise Arimatsu, Michael N. Schmitt
The Plea Of Necessity: An Oft Overlooked Response Option To Hostile Cyber Operations, Louise Arimatsu, Michael N. Schmitt
International Law Studies
States are increasingly focused on the measures—cyber or otherwise—that they can take in response to hostile cyber operations. Although cyber operations are usually responded to with acts of “retorsion” (acts that are lawful, although unfriendly), international law recognizes other self-help mechanisms that allow for more robust responses. In the cyber context, most attention has focused on countermeasures and self-defense. Yet, both are subject to various limitations that constrain their availability.
This article examines a further option, the so-called “plea of necessity.” It allows States to respond to a hostile cyber operation when the action taken would otherwise be unlawful but …
Cyber Trespass And Property Concepts, Adam Macleod
Foreign Cyber Interference In Elections, Michael N. Schmitt
Foreign Cyber Interference In Elections, Michael N. Schmitt
International Law Studies
In the 2020 U.S. elections, Russia authorized and conducted influence operations designed to support former President Trump, although it did not attempt to alter any technical aspect of the voting process. Russia was not alone. Iran mounted a multi-pronged covert influence campaign intended to undercut Trump’s reelection prospects, while other foreign actors–like Lebanese Hizballah, Cuba, and Venezuela–also tried to influence the election. Interestingly, China did not conduct operations designed to alter the outcome, although it did consider doing so. The phenomenon of election meddling, however, extends well beyond the United States to such countries as Austria, Estonia, France, Germany, Hungary, …
Full Spectrum Space Deterrence: From Laws To Technology, Joshua Carlson
Full Spectrum Space Deterrence: From Laws To Technology, Joshua Carlson
Honors Theses
Conflict in space is becoming an ever-real possibility, with the potential of rendering the space completely useless for future generations. Current talks are centered around limiting or preventing any weapons deployed to space, but this is not the most effective way of dealing with the issue. The focus should shift to agreeing on how nations should act responsibly in space together instead of preventing nations from acting at all. The best way of accomplishing this goal is by improving satellite design, creating agreed upon and understood rules of engagement, fostering widespread cooperation between nations, and choosing not to be the …
Responding To Hostile Cyber Operations: The “In-Kind” Option, Michael N. Schmitt, Durward E. Johnson
Responding To Hostile Cyber Operations: The “In-Kind” Option, Michael N. Schmitt, Durward E. Johnson
International Law Studies
Facing hostile cyber operations, States are crafting responsive strategies, tactics and rules of engagement. One of the major challenges in doing so is that key aspects of the international law governing cyber responses are vague, unsettled or complex. Not surprisingly, therefore, international law is markedly absent from strategies and operational concepts. Rather, they tend to take on a practical “tit-for-tat” feel as policymakers logically view “in-kind” responses as “fair play.” For them, responding in-kind surely must be lawful notwithstanding any challenges in discerning the precise legal character of the initial hostile cyber operation.
Testing that sense, this article examines the …
Five Approaches To Insuring Cyber Risks, Christopher C. French
Five Approaches To Insuring Cyber Risks, Christopher C. French
Journal Articles
Cyber risks are some of the most dangerous risks of the twenty-first century. Many types of businesses, including retail stores, healthcare entities, and financial institutions, as well as government entities, are the targets of cyber attacks. The simple reality is that no computer security system is completely safe. They all can be breached if the hackers are skilled enough and determined. Consequently, the worldwide damages caused by cyber attacks are predicted to reach $10.5 trillion by 2025. Insuring such risks is a monumental task.
The cyber insurance market currently is fragmented with hundreds of insurers selling their own cyber risk …
Self-Defense To Cyber Force: Combatting The Notion Of ‘Scale And Effect', Thomas Eaton
Self-Defense To Cyber Force: Combatting The Notion Of ‘Scale And Effect', Thomas Eaton
American University International Law Review
No abstract provided.
Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion
Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion
Faculty Scholarly Works
Months prior to the 2015 public disclosure of a data breach at the U.S. government’s Office of Personnel and Management (OPM), the Office of the Inspector General for OPM issued a report that identified significant deficiencies and material weaknesses in a number of the agency’s information systems and IT security programs. In response to the 2020 SolarWinds supply chain hack, attributed to Russia, calls are underway for inspectors general to conduct audits and inspections and to review prior inspector general assessments of information systems and vulnerabilities at federal agencies. The use of inspectors general to assess information system vulnerabilities and …