Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- International law (4)
- Cybersecurity (2)
- Infrastructure (2)
- Technology (2)
- 114th Congress (1)
-
- 5G technology (1)
- Acquisition (1)
- Anti-satellite weapons (1)
- Artificial intelligence (1)
- BCI (1)
- Blocking statutes (1)
- Braincomputerinterfacing (1)
- CACRs (1)
- CFIUS (1)
- COVID-19 (1)
- China (1)
- Chinese intelligence laws (1)
- Committee on Foreign Investment in the United States (1)
- Criminal law (1)
- Cuba (1)
- Cuban Assets Control Regulations (1)
- Cuban Embargo (1)
- Cybercrime (1)
- Data security (1)
- Emerging technology (1)
- European Union (1)
- Export Control Act of 1949 (1)
- FCC (1)
- FIRRMA (1)
- Foreign Investment Risk Review Modernization Act (1)
Articles 1 - 9 of 9
Full-Text Articles in International Law
Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas
Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas
Catholic University Law Review
Recent amendments to Chinese Intelligence Laws codify affirmative obligations upon domestic companies and citizens alike, namely, that they must assist and support the Chinese Communist Party (CCP) in its intelligence gathering efforts. Coupling these laws with the international prevalence of Huawei, a Chinese telecommunications company comprising two-thirds of 5G equipment outside China, CCP compromised 5G equipment is an unassailable reality. This article explores five intelligence allied nations and how each has respectively addressed the risk posed by Huawei. It argues each nation’s policies are deducible to three primary approaches, categorically including: (1) promulgation of law explicitly excluding Huawei 5G equipment; …
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Catholic University Journal of Law and Technology
This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.
Innovative Thinking: Modernizing Outer Space Governance, Diane M. Janosek
Innovative Thinking: Modernizing Outer Space Governance, Diane M. Janosek
Catholic University Journal of Law and Technology
Space security is essential to global safety and prosperity. International treaties should modernize and reflect the world’s innovation in space and governance needs. One must look back to 1967 for the inaugural “Outer Space Treaty,” the first and only binding multilateral agreement for peaceful space use and exploration. In 50 years, technologies and space capabilities have evolved; an updated global treaty and agreement should be developed and evaluated. Both China and Russia have demonstrated their capability to degrade and/or destroy adversaries’ satellites in space. Space wars are no longer a hypothetical. The future once discussed and anxiously anticipated after Sputnik …
The More Things Change, The More They Stay The Same: The United States, Trade Sanctions, And International Blocking Acts, Meaghan Jennison
The More Things Change, The More They Stay The Same: The United States, Trade Sanctions, And International Blocking Acts, Meaghan Jennison
Catholic University Law Review
When the United States unilaterally withdrew from the Joint Comprehensive Plan of Action (“JCPOA,” colloquially known as the Iran Nuclear Deal) in May of 2018, that withdrawal signaled not only the United States withdrawal from that deal, of which it had been one of the chief negotiators, but also of a new level of trade engagement by the United States and the Trump Administration within the international community. European countries, in an attempt to continue existing business relationships with the Iranians, pulled an old tool from their toolbox – the blocking statute – to attempt to allow European and multinational …
Investments And Security: Balancing International Commerce And National Security With Expanded Authority For The Committee On Foreign Investment In The United States, Christopher Jusuf
Investments And Security: Balancing International Commerce And National Security With Expanded Authority For The Committee On Foreign Investment In The United States, Christopher Jusuf
Catholic University Journal of Law and Technology
What happens when the interests of international trade conflict with those of national security? This article analyzes this question within the context of the Committee on Foreign Investment in the United States (CFIUS), an obscure but increasingly powerful executive panel that exercises the president's broad authority to unilaterally interfere with and stop international mergers and acquisitions. With the passage of the Foreign Investment Risk Review Modernization Act (FIRRMA), CFIUS is more powerful now than it has ever been, and should be a key consideration for any company seeking to do business with foreign investors. This is especially true as America …
The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland
The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland
Catholic University Journal of Law and Technology
Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …
Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao
Catholic University Journal of Law and Technology
No abstract provided.
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Catholic University Journal of Law and Technology
No abstract provided.
The Defend Trade Secrets Act Of 2015, S. 1890, H.R. 3326, 114th Congress (2015), Joseph K.C. Doukmetzian
The Defend Trade Secrets Act Of 2015, S. 1890, H.R. 3326, 114th Congress (2015), Joseph K.C. Doukmetzian
Catholic University Journal of Law and Technology
No abstract provided.