Open Access. Powered by Scholars. Published by Universities.®

Military, War, and Peace Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Military, War, and Peace

Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal May 2016

Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal

Catholic University Journal of Law and Technology

No abstract provided.


The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard Jan 2016

The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard

American University National Security Law Brief

No abstract provided.


Autonomy Of Military Robots: Assessing The Technical And Legal (“Jus In Bello”) Thresholds, 32 J. Marshall J. Info. Tech. & Privacy L. 57 (2016), Remus Titiriga Jan 2016

Autonomy Of Military Robots: Assessing The Technical And Legal (“Jus In Bello”) Thresholds, 32 J. Marshall J. Info. Tech. & Privacy L. 57 (2016), Remus Titiriga

UIC John Marshall Journal of Information Technology & Privacy Law

While robots are still absent from our homes, they have started to spread over battlefields. However, the military robots of today are mostly remotely controlled platforms, with no real autonomy. This paper will disclose the obstacles in implementing autonomy for such systems by answering a technical question: What level of autonomy is needed in military robots and how and when might it be achieved, followed by a techno-legal one: How to implement the rules of humanitarian law within autonomous fighting robots, in order to allow their legal deployment? The first chapter scrutinizes the significance of autonomy in robots and the …


Cyber Force: The International Legal Implications Of The Communication Security Establishment's Expanded Mandate Under Bill C-59, Leah West Jan 2016

Cyber Force: The International Legal Implications Of The Communication Security Establishment's Expanded Mandate Under Bill C-59, Leah West

Canadian Journal of Law and Technology

Canada is about to join the ranks of Russia, China, Iran, and North Korea; countries with a declared policy and authorized program of state-sponsored cyber attacks. In the summer of 2017, the Liberal Government introduced Bill C-59 An Act 2 Respecting National Security Matters. The bill, if passed, represents the most significant overhaul to Canadian national security institutions since the establishment of the Canadian Security Intelligence Service (CSIS) as a separate organization from the Royal Canadian Mounted Police (RCMP) in 1984. One component of this sweeping reform is the introduction of The Communications Security Establishment Act (CSE Act or the …