Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in National Security Law

Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton Jul 2023

Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Advances in information technology have irrevocably changed the nature of war crimes investigations. The pursuit of accountability for the most serious crimes of concern to the international community now invariably requires access to digital evidence. The global reach of platforms like Facebook, YouTube, and Twitter means that much of that digital evidence is held by U.S. social media companies, and access to it is subject to the U.S. Stored Communications Act.

This is the first Article to look at the legal landscape facing international investigators seeking access to digital evidence regarding genocide, war crimes, crimes against humanity, and aggression. It …


Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu Jan 2023

Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu

American University National Security Law Brief

The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.


Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas Jun 2022

Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas

Catholic University Law Review

Recent amendments to Chinese Intelligence Laws codify affirmative obligations upon domestic companies and citizens alike, namely, that they must assist and support the Chinese Communist Party (CCP) in its intelligence gathering efforts. Coupling these laws with the international prevalence of Huawei, a Chinese telecommunications company comprising two-thirds of 5G equipment outside China, CCP compromised 5G equipment is an unassailable reality. This article explores five intelligence allied nations and how each has respectively addressed the risk posed by Huawei. It argues each nation’s policies are deducible to three primary approaches, categorically including: (1) promulgation of law explicitly excluding Huawei 5G equipment; …


Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali Jan 2021

Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali

Catholic University Journal of Law and Technology

This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.


Innovative Thinking: Modernizing Outer Space Governance, Diane M. Janosek Jan 2021

Innovative Thinking: Modernizing Outer Space Governance, Diane M. Janosek

Catholic University Journal of Law and Technology

Space security is essential to global safety and prosperity. International treaties should modernize and reflect the world’s innovation in space and governance needs. One must look back to 1967 for the inaugural “Outer Space Treaty,” the first and only binding multilateral agreement for peaceful space use and exploration. In 50 years, technologies and space capabilities have evolved; an updated global treaty and agreement should be developed and evaluated. Both China and Russia have demonstrated their capability to degrade and/or destroy adversaries’ satellites in space. Space wars are no longer a hypothetical. The future once discussed and anxiously anticipated after Sputnik …


Sovereignty In The Age Of Cyber, Gary Corn Jan 2018

Sovereignty In The Age Of Cyber, Gary Corn

Articles in Law Reviews & Other Academic Journals

International law is a foundational pillar of the modern international order, and its applicability to both state and nonstate cyber activities is, by now, beyond question. However, owing to the unique and rapidly evolving nature of cyberspace, its ubiquitous interconnectivity, its lack of segregation between the private and public sectors, and its incompatibility with traditional concepts of geography, there are difficult and unresolved questions about exactly how international law applies to this domain. Chief among these is the question of the exact role that the principle of sovereignty plays in regulating states' cyber activities.


Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport Dec 2015

Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport

Catholic University Journal of Law and Technology

No abstract provided.


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Energy, Environment & Sustainable Development, Lakshman D. Guruswamy Jan 2005

Energy, Environment & Sustainable Development, Lakshman D. Guruswamy

Publications

No abstract provided.