Waking Sleeping Beauty? Exploring The Challenges Of Cyber-Deterrence By Punishment, 2023 Catholic University of Lyon
Waking Sleeping Beauty? Exploring The Challenges Of Cyber-Deterrence By Punishment, Thibault Moulin
Loyola of Los Angeles International and Comparative Law Review
No abstract provided.
Center For Health & Homeland Security Newsletter, Spring 2023, 2023 University of Maryland Francis King Carey School of Law
Center For Health & Homeland Security Newsletter, Spring 2023
Newsletter
No abstract provided.
Climate Security Insights From The Covid-19 Response, 2023 Emory University School of Law
Climate Security Insights From The Covid-19 Response, Mark Nevitt
Indiana Law Journal
The climate change crisis and COVID-19 crisis are both complex collective action problems. Neither the coronavirus nor greenhouse gas (GHG) emissions respect political borders. Both impose an opportunity cost that penalizes inaction. They are also increasingly understood as nontraditional, novel security threats. Indeed, COVID-19’s human cost is staggering, with American lives lost vastly exceeding those lost in recent armed conflicts. And climate change is both a threat accelerant and a catalyst for conflict—a characterization reinforced in several climate-security reports. To counter COVID-19, the President embraced martial language, stating that he will employ a “wartime footing” to “defeat the virus.” Perhaps …
Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, 2023 University of Washington School of Law
Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang
Articles
In the early 2000s, shortly before the September 11 attacks, Daniel J. Solove noted that computer databases in the United States were controlled by public as well as private bureaucracies. In that sense, Solove argued, the "Big Brother" metaphor "fails to capture the most important dimension of the database problem." In his 2008 Lockhart lecture, constitutional law scholar Jack M. Balkin argued that the United States has gradually transformed from a welfare and national security state to a National Surveillance State: "a new form of governance that features the collection, collation, and analysis of information about populations both in the …
U.S. Government Information Resources For Accountability On U.S. Assistance To Ukraine, 2023 Purdue University
U.S. Government Information Resources For Accountability On U.S. Assistance To Ukraine, Bert Chapman
Libraries Faculty and Staff Presentations
Provides detailed coverage of U.S. Government information resources documenting accountability for U.S. civilian and military assistance to Ukraine. Includes U.S. laws, agencies involved in U.S. arms export policy, Defense Department resources and data, Defense Dept. Inspector General reports, Government Accountability Office reports, congressional committee hearings, a letter from a congressional committee to the Secretaries of Defense and State and U.S. Agency for International Development administrator, congressional debate, and congressional recorded votes.
Was The Colonial Cyberattack The First Act Of Cyberwar Against The U.S.? Finding The Threshold Of War For Ransomware Attacks, 2023 St. John's University School of Law
Was The Colonial Cyberattack The First Act Of Cyberwar Against The U.S.? Finding The Threshold Of War For Ransomware Attacks, Liam P. Bradley
St. John's Law Review
(Excerpt)
On May 7, 2021, “DarkSide,” a foreign hacker group, conducted a ransomware attack against the Colonial Pipeline (“Colonial”). That morning, Colonial discovered a “ransom note demanding cryptocurrency.” The attack forced the shutdown of the Colonial Pipeline, stopping the daily delivery of 2.5 million barrels (MMBbls) of “gasoline, jet fuel and diesel” to the East Coast. The shutdown created fuel shortages, impacted financial markets, and panicked the public. The resulting fuel shortages and economic impacts “triggered a comprehensive federal response” on May 11, 2021. On May 12, CEO Joseph Blount paid a ransom of nearly $5 million in bitcoin to …
From The Acting Editor In Chief, 2023 US Army War College
From The Acting Editor In Chief, Conrad C. Crane
The US Army War College Quarterly: Parameters
Welcome to the Spring 2023 issue of Parameters. This issue consists of an In Focus special commentary and the SRAD Director’s Corner focused on Afghanistan, three forums, and two Reviews and Replies.
Daoism And Design: Mapping The Conflict In Syria, 2023 US Army War College
Daoism And Design: Mapping The Conflict In Syria, Ned Beechinor Marsh, Heather S. Gregg
The US Army War College Quarterly: Parameters
In contemporary military operations, some problems are so complex they do not give way to linear solutions but require problem management instead. Combining the fundamentals of Dao De Jing philosophy with the US military design process offers a new perspective to analyze complex security problems, devise management strategies, and plan military operations. Applying this new approach to the complex security environment in Syria allows for a nonlinear mapping of long-term goals and a new perspective on relationships between key actors, environmental factors that restrict changes in the security environment, and where planners should focus their attention.
One Treaty To Apply Them All? Defining Maritime Terrorism By Cross-References And Reservations: The Asean Region Example, 2023 U.S. Naval War College
One Treaty To Apply Them All? Defining Maritime Terrorism By Cross-References And Reservations: The Asean Region Example, Arron N. Honniball
International Law Studies
Defining terms will shape a State’s treaty obligations, the domestic legislation necessary, the availability of cooperative mechanisms, and norm diffusion. Maritime terrorism is an umbrella term referring to the piecemeal approach of treaties creating offenses for identified acts at sea. Further treaties cross-reference the offenses in a selection of global instruments to create related offenses. This includes financing of terrorism (Convention for the Suppression of the Financing of Terrorism (ICSFT)) and regional maritime terrorism (ASEAN Convention on Counter Terrorism (ACCT)). All cross-referenced instruments shall apply to define ICFST or ACCT offenses unless a State excludes, by reservation, a cross-referenced instrument …
Surveillance, State Secrets, And The Future Of Constitutional Rights, 2023 Georgetown University Law Center
Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The Supreme Court’s 2022 decision in Federal Bureau of Investigation v. Fazaga heralds a worrying trend. Over the past 15 years, as more information about how the government wields its foreign intelligence collection authorities on U.S. soil has become available, it has become clear that the government has repeatedly acted outside its constitutional and statutory limits, and at times, in flagrant disregard for judicial orders. As a result, dozens of cases challenging surveillance have been making their way through the courts. Unlike in prior eras, in certain cases it has become easier for litigants to establish an injury-in-fact in light …
Measuring Corruption As A Threat To International Security: An Emerging Indicator For Enhancement Of Global Corruption Governance, 2023 Korea National Police University
Measuring Corruption As A Threat To International Security: An Emerging Indicator For Enhancement Of Global Corruption Governance, Sungyong Kang
Michigan Journal of International Law
The conceptual changes to international security after the end of the Cold War, and particularly those following the al-Qaeda attacks of 2001, clarified the symbiotic relationship between corruption and international security: Corruption destroys the social political environment required to create human security and to ensure safety from terrorist attacks, and national borders increasingly fail to restrain its negative consequences.
To achieve human security though policy intervention in domestic affairs, global corruption governance relies on numerical indicators that measure corruption. By evaluating states through public comparison, indicators pressure states to improve their domestic institutions and structures to align them with the …
Brief For Respondents, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), 2023 University of Washington School of Law
Brief For Respondents, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Robert J. Tolchin
Court Briefs
No abstract provided.
From Well-Side Meetings To Pelican Strategy: A Context-Based Approach To Combat Corruption, 2023 Saint Mary's College of California
From Well-Side Meetings To Pelican Strategy: A Context-Based Approach To Combat Corruption, Lili Yan
Pace International Law Review
This article takes up the question of what strategy is to be used among different communities to eradicate corruption across borders. The debate between two legal scholars, Steven Salbu and Philip Nichols, over the viability of extraterritorial application of anti-bribery laws remains thought-provoking when we look at the effectiveness of the OECD Anti-bribery Convention or FCPA in curbing corruption. Empirical research shows that firms from countries with extraterritorial legal restrictions do not necessarily refrain themselves from paying bribes in foreign transactions. This article ties the Salbu-Nichols’ debate, ISCT, mediating institutions theory, and Pelican Gambits strategy together to structure a context …
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, 2023 American University Washington College of Law
Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland
American University Law Review
In the wake of the United States Supreme Court’s devastating decision to strip Americans of their constitutional right to abortion in Dobbs v. Jackson Women’s Health Organization, data privacy is more salient than ever. Without adequate data regulations, state governments and anti-abortion activists alike can harass and prosecute pregnant people attempting to exercise their bodily autonomy. This comment argues that the United States has violated its obligations under the International Covenant on Civil and Political Rights (ICCPR) Article 17 by failing to protect against interference with the use and collection of reproductive health data. Further, this comment analyzes interpretations of …
Climate Change And The Law Of National Security Adaptation, 2023 Emory University School of Law
Climate Change And The Law Of National Security Adaptation, Mark P. Nevitt
Faculty Articles
The Department of Defense (DoD) is the largest employer in the world, owns and operates an enormous global real estate portfolio, and emits more Greenhouse Gases (GHGs) than many nations. Entrusted with the national security, the DoD is now threatened by a new enemy—climate change. Climate change imperils national security infrastructure while undermining the military’s capacity to respond to climate-driven disasters at home and abroad. However, legal scholarship has yet to address what I call “the law of national security adaptation” and related questions. For example, how do environmental and climate change laws apply to the U.S. military? What laws …
Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, 2023 American University Washington College of Law
Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu
American University National Security Law Brief
The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.
The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, 2023 American University Washington College of Law
The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check
American University National Security Law Brief
Protecting critical infrastructure from cyber threats is difficult and complex. News headlines abound with reports that show how critical infrastructure—ranging from voting machines to steel mills—have become increasingly vulnerable to cyber operations from state and sophisticated nonstate actors. As critical infrastructure becomes increasingly entangled with the Internet and as new tactics, techniques, and procedures rapidly proliferate and evolve, governments and businesses alike must contend with a mutating threat environment that may put sensitive and highly important critical infrastructure assets in serious jeopardy. The vulnerabilities of critical infrastructure, which provide vital services and functions to societies, may pose a particularly tempting …
Letter Form The Editor, 2023 American University Washington College of Law
Letter Form The Editor, Wayne Rash, Iii
American University National Security Law Brief
In our last issue of The National Security Law Brief, Vol. 13, No. 1, we highlighted the dynamism that makes National Security Law such an exciting field. In this issue, No. 2, we continue with the dynamism theme. National security law is a field in constant change that often leaves us questioning how these changes will shape the law.
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, 2023 American University Washington College of Law
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
American University National Security Law Brief
Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, 2023 American University Washington College of Law
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
American University National Security Law Brief
Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …