Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

International law

Science and Technology Law

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 50

Full-Text Articles in Law

The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman Oct 2023

The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman

University of Miami Law Review

The evolution of Artificial Intelligence (“A.I.”) from a speculative concept depicted in science fiction to its integration into various aspects of everyday life has brought about complex challenges for contemporary legislators. The proliferation of A.I. technology has led to a growing recognition of the need for regulation, as it poses both promises and threats to society. On the one hand, A.I. has the potential to enhance efficiency in various fields, such as medicine and automation of routine tasks. On the other hand, if left unregulated, A.I. has the potential to undermine democratic principles and infringe upon fundamental rights. Thus, legislators …


Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton Jul 2023

Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Advances in information technology have irrevocably changed the nature of war crimes investigations. The pursuit of accountability for the most serious crimes of concern to the international community now invariably requires access to digital evidence. The global reach of platforms like Facebook, YouTube, and Twitter means that much of that digital evidence is held by U.S. social media companies, and access to it is subject to the U.S. Stored Communications Act.

This is the first Article to look at the legal landscape facing international investigators seeking access to digital evidence regarding genocide, war crimes, crimes against humanity, and aggression. It …


Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu Jan 2023

Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu

American University National Security Law Brief

The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.


Deepfake Fight: Ai-Powered Disinformation And Perfidy Under The Geneva Conventions, David Nicholas Allen Nov 2022

Deepfake Fight: Ai-Powered Disinformation And Perfidy Under The Geneva Conventions, David Nicholas Allen

Notre Dame Journal on Emerging Technologies

Deception and disinformation are as much a part of the battlefield as bullets and bombs. However, just like with bullets and bombs, if the law does not properly regulate a capability’s use the capability could degrade faith in the law. In this respect, this paper examines deepfake technology, a modern artificial intelligence-based capability that can generate superficially-perfect yet wholly invented media content. The paper looks ahead to its potential future applications in armed conflict, processes the ways in which current law contemplates such deception, and distills recommendations for improving governance where needed.


Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas Jun 2022

Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas

Catholic University Law Review

Recent amendments to Chinese Intelligence Laws codify affirmative obligations upon domestic companies and citizens alike, namely, that they must assist and support the Chinese Communist Party (CCP) in its intelligence gathering efforts. Coupling these laws with the international prevalence of Huawei, a Chinese telecommunications company comprising two-thirds of 5G equipment outside China, CCP compromised 5G equipment is an unassailable reality. This article explores five intelligence allied nations and how each has respectively addressed the risk posed by Huawei. It argues each nation’s policies are deducible to three primary approaches, categorically including: (1) promulgation of law explicitly excluding Huawei 5G equipment; …


Out Of This World: 3d Printing And Space Law Regulation, Caitlyn Fischer Jan 2022

Out Of This World: 3d Printing And Space Law Regulation, Caitlyn Fischer

Catholic University Journal of Law and Technology

3D printing will be a valuable asset in the exploration and human expansion into space. This comment examines the current international treaties and U.S. domestic laws that may affect and impose requirements on 3D printing manufacturers seeking to print in space. These treaties are self-executing and therefore leave it up to Congress to take action to keep the U.S. in compliance with international space law. Congress can do this by granting agencies like the FCC and FAA authority to regulate. In order to utilize 3D printing technology in space and reap the benefits it has to offer, the U.S. should …


Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali Jan 2021

Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali

Catholic University Journal of Law and Technology

This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.


Innovative Thinking: Modernizing Outer Space Governance, Diane M. Janosek Jan 2021

Innovative Thinking: Modernizing Outer Space Governance, Diane M. Janosek

Catholic University Journal of Law and Technology

Space security is essential to global safety and prosperity. International treaties should modernize and reflect the world’s innovation in space and governance needs. One must look back to 1967 for the inaugural “Outer Space Treaty,” the first and only binding multilateral agreement for peaceful space use and exploration. In 50 years, technologies and space capabilities have evolved; an updated global treaty and agreement should be developed and evaluated. Both China and Russia have demonstrated their capability to degrade and/or destroy adversaries’ satellites in space. Space wars are no longer a hypothetical. The future once discussed and anxiously anticipated after Sputnik …


The Promise And Limits Of Cyber Power In International Law: Remarks, Monica Hakimi, Ann Väljataga, Zhixiong Huang, Charles Allen, Sue Robertson, Doug Wilson Jan 2020

The Promise And Limits Of Cyber Power In International Law: Remarks, Monica Hakimi, Ann Väljataga, Zhixiong Huang, Charles Allen, Sue Robertson, Doug Wilson

Faculty Scholarship

Hi, everyone. I am Monica Hakimi from the University of Michigan Law School, and I would like to welcome you to our panel on cyber power and its limits. The topic almost does not need an introduction. We all know just from reading the news that our collective dependence on cyberspace is also a huge vulnerability, and state and non-state actors exploit this vulnerability to do one another harm. They use cyber technologies not just to spy on one another, but also, for example, to interfere in national elections, to steal trade secrets or other valuable information, to disrupt the …


Finding A Forest Through The Trees: Georgia-Pacific As Guidance For Arbitration Of International Compulsory Licensing Disputes, Karen Mckenzie Jan 2019

Finding A Forest Through The Trees: Georgia-Pacific As Guidance For Arbitration Of International Compulsory Licensing Disputes, Karen Mckenzie

Marquette Intellectual Property Law Review

This paper will examine the challenges of international compulsory licensing by examining the issue historically and legally as well as offer possible solutions. Thus, this paper will explore the challenge of balancing corporate interests against the affordability and availability of pharmaceuticals by focusing on discrete situations in developing countries, the history of compulsory licensing, and how the World Health Organization (the “WHO”) and the WTO have attempted to tackle these challenges through compulsory licensing, and it will suggest a possible framework for use in arbitration, which balances equities through a Georgia-Pacific analysis.


Can “Imfcoin” Be Scaruffi's Moneta Immaginaria?, Alexander M. Heideman Jan 2019

Can “Imfcoin” Be Scaruffi's Moneta Immaginaria?, Alexander M. Heideman

Marquette Intellectual Property Law Review

Cryptocurrencies have taken the world by storm. But these decentralized and unregulated digital fiat currencies have more in common with the currencies of ages past than many believe. These commonalities may result in the incorporation of new cryptocurrencies into older institutions. One such institution is the International Monetary Fund's Special Drawing Rights (SDRs), which has bene relegated to an afterthought in the international monetary system since the Nixon Shock in 1971. The Fund's Managing Director recently made comments that indicated that the Fund is exploring the incorporation of a cryptocurrency into the framework of the SDR, a change which China …


Interstitial Space Law, Melissa J. Durkee Jan 2019

Interstitial Space Law, Melissa J. Durkee

Scholarly Works

Conventionally, customary international law is developed through the actions and beliefs of nations. International treaties are interpreted, in part, by assessing how the parties to the treaty behave. This Article observes that these forms of uncodified international law—custom and subsequent treaty practice—are also developed through a nation’s reactions, or failures to react, to acts and beliefs that can be attributed to it. I call this “attributed lawmaking.”

Consider the new commercial space race. Innovators like SpaceX and Blue Origin seek a permissive legal environment. A Cold-War-era treaty does not seem adequately to address contemporary plans for space. The treaty does, …


Friends Of Animals V. United States Fish & Wildlife Service, Bradley E. Tinker Oct 2018

Friends Of Animals V. United States Fish & Wildlife Service, Bradley E. Tinker

Public Land & Resources Law Review

In Friends of Animals v. United States Fish & Wildlife Service, the Ninth Circuit held that the plain language of the Migratory Bird Treaty Act allows for the removal of one species of bird to benefit another species. Friends of Animals argued that the Service’s experiment permitting the taking of one species––the barred owl––to advance the conservation of a different species––the northern spotted owl––violated the Migratory Bird Treaty Act. The court, however, found that the Act delegates broad implementing discretion to the Secretary of the Interior, and neither the Act nor the underlying international conventions limit the taking of …


Supreme Court Of Canada On The Appropriateness And Scope Of A Global Website Takedown Order, Jennifer C. Daskal Oct 2018

Supreme Court Of Canada On The Appropriateness And Scope Of A Global Website Takedown Order, Jennifer C. Daskal

Articles in Law Reviews & Other Academic Journals

In Google v. Equustek, the Supreme Court of Canada ordered Google to delist all websites used by Datalink, a company that stole trade secrets from Equustek, a Canada-based information technology company. Google had agreed to do so in part, but with respect to searches that originated from google.ca only, the default browser for those in Canada. Equustek however, argued the takedowns needed to be global in order to be effective. It thus sought an injunction ordering Google to delist the allegedly infringing websites from all of Google's search engines whether accessed from google.ca, google.com, or any other entry point. Google …


Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin Jan 2018

Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin

Books & Book Chapters by Maurer Faculty

Professor Lubin's contribution is "Cyber Law and Espionage Law as Communicating Vessels," pp. 203-225.

Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws …


User-Generated Evidence, Rebecca Hamilton Jan 2018

User-Generated Evidence, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …


Sovereignty In The Age Of Cyber, Gary Corn Jan 2018

Sovereignty In The Age Of Cyber, Gary Corn

Articles in Law Reviews & Other Academic Journals

International law is a foundational pillar of the modern international order, and its applicability to both state and nonstate cyber activities is, by now, beyond question. However, owing to the unique and rapidly evolving nature of cyberspace, its ubiquitous interconnectivity, its lack of segregation between the private and public sectors, and its incompatibility with traditional concepts of geography, there are difficult and unresolved questions about exactly how international law applies to this domain. Chief among these is the question of the exact role that the principle of sovereignty plays in regulating states' cyber activities.


The Disruptive Neuroscience Of Judicial Choice, Anna Spain Bradley Jan 2018

The Disruptive Neuroscience Of Judicial Choice, Anna Spain Bradley

Publications

Scholars of judicial behavior overwhelmingly substantiate the historical presumption that most judges act impartially and independent most of the time. The reality of human behavior, however, says otherwise. Drawing upon untapped evidence from neuroscience, this Article provides a comprehensive evaluation of how bias, emotion, and empathy—all central to human decision-making—are inevitable in judicial choice. The Article offers three novel neuroscientific insights that explain why this inevitability is so. First, because human cognition associated with decision-making involves multiple, and often intersecting, neural regions and circuits, logic and reason are not separate from bias and emotion in the brain. Second, bias, emotion, …


21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, And Wmds, Mary Ellen O'Connell Aug 2016

21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, And Wmds, Mary Ellen O'Connell

Mary Ellen O'Connell

The world faces tough arms control challenges from preventing the development and use of weapons of mass destruction to regulating the new weapons of the computer revolution. This article considers what works in arms control. Using military force in violation of international law to destroy nuclear facilities, to stop weapons shipments, or to punish the use of prohibited weapons typically fails. Diplomacy paired with lawful counter-measures has the superior track record. Reviving the art of diplomacy and re-committing to authentic international law will pay dividends in peace and security.


Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher Aug 2016

Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher

Pace International Law Review

Cyber-attacks take many forms, only some of which are applicable to the law of war. This Comment discusses only those attacks sponsored by a government or non-state entity that have the goal of affecting morale or gaining political advantage, or those attacks amounting to tactical strikes on state or civilian infrastructure. In that vein, this Comment proposes the adoption of a new legal framework for determining the threshold that marks a participant in such a cyber-attack as a “cyber-combatant” by adapting the framework set by the Geneva Conventions and existing custom. This definition should encompass cyber-attacks perpetrated by states, unrecognized …


Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport Dec 2015

Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport

Catholic University Journal of Law and Technology

No abstract provided.


Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford Aug 2015

Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford

Scott Shackelford

Although there has been a relative abundance of work done on exploring the contours of the law of cyber war, far less attention has been paid to defining a law of cyber peace applicable below the armed attack threshold. Among the most important unanswered questions is what exactly nations’ due diligence obligations are to one another and to their respective private sectors. The International Court of Justice (“ICJ”) has not yet explicitly considered this topic, though it has ruled in the Corfu Channel case that one country’s territory should not be “used for acts that unlawfully harm other States.” But …


Finding The Adequate Legal Framework For The Deployment Of Ocean Renewable Energy Through Area-Based Management, Xiao Recio-Blanco Aug 2015

Finding The Adequate Legal Framework For The Deployment Of Ocean Renewable Energy Through Area-Based Management, Xiao Recio-Blanco

Xiao Recio-Blanco

The world runs on electricity, but its global distribution is uneven and incomplete. The lack of access to electricity denies some people the most basic benefits, from healthcare and sanitation to security and economic development.

To increase access to electricity, most developing nations have relied on traditional sources of energy, namely fossil fuels, and the extension of a central electrical grid. Scholars and specialized International Organizations suggest that the implementation of renewable energy technologies through small-to-mid scale grid projects could be a reliable alternative. However, renewable energy technologies must overcome three formidable hurdles: low reliability, uneven availability, and the high …


Resolving The Energy War Through International Law And Solar Technology, Aldo Armando Cocca Jul 2015

Resolving The Energy War Through International Law And Solar Technology, Aldo Armando Cocca

Akron Law Review

A striking feature of the past decade has been a new form of war. This war, a controversy carried to extremes, apparently will not remain isolated. This conflict may be seen as a predecessor of future battles for survival, for instance a "non-renewable resources war." Such wars are not concerned with territorial boundaries; they have a much wider economic effect. They involve the entire civilized community.

The energy conflict presently has gone beyond the crisis stage. Not only is a forthcoming peace beyond the horizon, the war itself is becoming increasingly aggressive. The fact that the weapon is an exhaustible …


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, And Wmds, Mary Ellen O'Connell Jan 2015

21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, And Wmds, Mary Ellen O'Connell

Journal Articles

The world faces tough arms control challenges from preventing the development and use of weapons of mass destruction to regulating the new weapons of the computer revolution. This article considers what works in arms control. Using military force in violation of international law to destroy nuclear facilities, to stop weapons shipments, or to punish the use of prohibited weapons typically fails. Diplomacy paired with lawful counter-measures has the superior track record. Reviving the art of diplomacy and re-committing to authentic international law will pay dividends in peace and security.


Interpreting, Stephanie Jo Kent Aug 2014

Interpreting, Stephanie Jo Kent

Doctoral Dissertations

What do community interpreting for the Deaf in western societies, conference interpreting for the European Parliament, and language brokering in international management have in common? Academic research and professional training have historically emphasized the linguistic and cognitive challenges of interpreting, neglecting or ignoring the social aspects that structure communication. All forms of interpreting are inherently social; they involve relationships among at least three people and two languages. The contexts explored here, American Sign Language/English interpreting and spoken language interpreting within the European Parliament, show that simultaneous interpreting involves attitudes, norms and values about intercultural communication that overemphasize information and discount …


Banning Autonomous Killing, Mary O'Connell Nov 2013

Banning Autonomous Killing, Mary O'Connell

Mary Ellen O'Connell

Scientific research on fully autonomous weapons systems is moving rapidly. At the current pace of discovery, such fully autonomous systems will be available to military arsenals within a few decades, if not a few years. These systems operate through computer programs that will both select and attack a target without human involvement after the program is activated. Looking to the law governing resort to military force, to relevant ethical considerations, as well as the practical experience of ten years of killing using unmanned systems (drones), the time is ripe to discuss a major multilateral treaty banning fully autonomous killing. Current …


Science And Compliance In The Arctic: A Constructivist Approach To The Un Commission On The Limits Of The Continental Shelf, Sari M. Graben, Peter Harrison Jun 2013

Science And Compliance In The Arctic: A Constructivist Approach To The Un Commission On The Limits Of The Continental Shelf, Sari M. Graben, Peter Harrison

Sari M Graben

The United Nations Commission on the Limits of the Continental Shelf is expected to play an essential role in delineating the rights of the Arctic states to sea bed resources in the Arctic Ocean. Positivist theories of international law generally source Arctic state compliance to the binding effect of Article 76 of the UN Convention on the Law of the Sea. However, positivist explanations fail to answer why the Arctic states, which are authorized to establish their own limits, would accept the sovereignty costs associated with the Commission’s legal and scientific interpretations. In order to better understand how the Commission …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …