Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- US Army War College (446)
- University of South Florida (118)
- Seattle University School of Law (111)
- Embry-Riddle Aeronautical University (102)
- Georgetown University Law Center (55)
-
- University of Tennessee, Knoxville (47)
- University of Michigan Law School (45)
- University of Miami Law School (33)
- American University Washington College of Law (32)
- Maurer School of Law: Indiana University (32)
- Selected Works (32)
- University of Denver (30)
- University of Nebraska - Lincoln (30)
- Duke Law (28)
- University of Pennsylvania Carey Law School (22)
- The Catholic University of America, Columbus School of Law (21)
- University of Georgia School of Law (21)
- U.S. Naval War College (19)
- William & Mary Law School (19)
- Columbia Law School (17)
- Purdue University (17)
- Brooklyn Law School (15)
- Colby College (14)
- University of Maryland Francis King Carey School of Law (14)
- Brigham Young University Law School (13)
- Emory University School of Law (13)
- Roger Williams University (13)
- Washington and Lee University School of Law (13)
- Mitchell Hamline School of Law (12)
- SelectedWorks (12)
- Keyword
-
- National security (132)
- Terrorism (78)
- China (60)
- Russia (54)
- International law (45)
-
- National Security (43)
- Parameters (43)
- Human rights (42)
- Afghanistan (37)
- NATO (35)
- Privacy (35)
- Cybersecurity (34)
- Technology (31)
- Security (30)
- United States (30)
- Counterterrorism (29)
- Terrorism / counterterrorism (27)
- Homeland security (26)
- Surveillance (26)
- War on terror (26)
- Middle East (23)
- Foreign policy (22)
- Iraq (22)
- War (22)
- Military (21)
- Law (20)
- Strategy (20)
- Drones (19)
- Nuclear weapons (19)
- Radicalization (19)
- Publication Year
- Publication
-
- The US Army War College Quarterly: Parameters (443)
- Journal of Strategic Security (108)
- Seattle University Law Review (82)
- Annual ADFSL Conference on Digital Forensics, Security and Law (74)
- Faculty Scholarship (59)
-
- Georgetown Law Faculty Publications and Other Works (53)
- International Journal of Nuclear Security (46)
- Human Rights & Human Welfare (30)
- Space, Cyber, and Telecommunications Law Program: Faculty Publications (27)
- University of Miami National Security & Armed Conflict Law Review (26)
- Seattle Journal for Social Justice (25)
- All Faculty Scholarship (23)
- Georgia Journal of International & Comparative Law (20)
- Articles (19)
- International Law Studies (19)
- American University National Security Law Brief (18)
- Articles by Maurer Faculty (16)
- Michigan Journal of International Law (16)
- Catholic University Journal of Law and Technology (15)
- Michigan Law Review (14)
- Security Files (14)
- Faculty Publications (12)
- Publications (12)
- Faculty Articles (11)
- International Bulletin of Political Psychology (11)
- Libraries Faculty and Staff Presentations (10)
- William Mitchell Law Review (10)
- Military Cyber Affairs (9)
- Penn State Journal of Law & International Affairs (9)
- Law Faculty Scholarship (8)
- Publication Type
Articles 1 - 30 of 1692
Full-Text Articles in Entire DC Network
From The Editor In Chief, Antulio J. Echevarria Ii
From The Editor In Chief, Antulio J. Echevarria Ii
The US Army War College Quarterly: Parameters
Welcome to the Summer 2024 issue of Parameters. We open this issue with a special “In Memoriam” by General Charles A. Flynn, Commander US Army Pacific, honoring the life and legacies of our director and consummate colleague, Carol V. Evans. We dedicate this issue to her. General Flynn’s memoriam is followed by an In Focus commentary on China’s Belt and Road Initiative. We then feature three forums covering the Russia-Ukraine War, the Middle East, and Professional Development. This issue also contains special essays on the role of professional writing, the US Army War College’s Civil-Military Relations Center, …
The Combat Path: Sustaining Mental Readiness In Ukrainian Soldiers, Oleh Hukovskyy, James C. West, Joshua C. Morganstein, Eugene F. Augusterfer, David M. Benedek, Oleg Boyko, Robert J. Ursano, Amy B. Adler
The Combat Path: Sustaining Mental Readiness In Ukrainian Soldiers, Oleh Hukovskyy, James C. West, Joshua C. Morganstein, Eugene F. Augusterfer, David M. Benedek, Oleg Boyko, Robert J. Ursano, Amy B. Adler
The US Army War College Quarterly: Parameters
In Ukraine, soldiers’ psychological resilience is of paramount concern. Therefore, the Armed Forces of Ukraine have developed a new intervention, Combat Path Debriefing, designed to address combat stress and promote unit readiness for soldiers returning to combat. This article outlines the components of Combat Path Debriefing and discusses how it is rooted in principles of combat and operational stress control and the unique characteristics of Ukrainian military life. This perspective offers US and allied leaders real-world experience that can inform future efforts to support soldiers’ mental health and combat performance.
The Dynamics Of Us Retrenchment In The Middle East, Paul K. Macdonald, Joseph M. Parent
The Dynamics Of Us Retrenchment In The Middle East, Paul K. Macdonald, Joseph M. Parent
The US Army War College Quarterly: Parameters
This article argues that conditions favor American retrenchment from the Middle East because the United States can shift burdens to capable states in the region, there are few areas where US commitments are interdependent, and the local conquest calculus favors defense. Forward military deployments do not positively influence potential threats in the Middle East, and maintaining deployments there will detract from meeting challenges from China. Through comparisons to prior cases of great-power ordinal decline, this article puts America’s modest decline in historical perspective and finds that retrenchment policies will likely have positive consequences.
Exploring The Nexus Of Military And Society At A 50-Year Milestone, Patricia M. Shields
Exploring The Nexus Of Military And Society At A 50-Year Milestone, Patricia M. Shields
The US Army War College Quarterly: Parameters
There is an ongoing dependence and tension between the military and the society it protects. This article examines the relatively new “military and society” field using the 50-year anniversary of the journal Armed Forces & Society as a focal point. This dynamic field is influenced by world events, cultural trends, and politics. Civil-military relations is at the heart of the discourse. An international and interdisciplinary journal, Armed Forces & Society reflects the changing nature of the field over the last 50 years. I have edited the journal since 2001 and bring this experience to the discussion.
Contributor Guidelines, Usawc Press
Contributor Guidelines, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Raven Sentry: Employing Ai For Indications And Warnings In Afghanistan, Thomas W. Spahr
Raven Sentry: Employing Ai For Indications And Warnings In Afghanistan, Thomas W. Spahr
The US Army War College Quarterly: Parameters
This article examines Raven Sentry, a project that employed artificial intelligence to provide advance warning of insurgent attacks in Afghanistan. During 2019 and 2020, the Resolute Support Deputy Chief of Staff for Intelligence (J2) benefited from a command culture open to innovation, the urgency created by the US drawdown, and a uniquely talented group of personnel that, aided by commercial sector experts, built an AI system that helped predict attacks. The war’s end cut Raven Sentry short, but the experience provides important lessons on AI and the conditions necessary for successful innovation.
The Modern Energizer Bunny - Hopping Into The Nuclear Energy Revolution: The Tenth Circuit's Analysis In New Mexico Ex Rel. Balderas V. U.S. Nuclear Regulatory Commission, Jack A. Mansur
Villanova Environmental Law Journal
No abstract provided.
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Authoritarian Privacy, Mark Jia
Authoritarian Privacy, Mark Jia
Georgetown Law Faculty Publications and Other Works
Privacy laws are traditionally associated with democracy. Yet autocracies increasingly have them. Why do governments that repress their citizens also protect their privacy? This Article answers this question through a study of China. China is a leading autocracy and the architect of a massive surveillance state. But China is also a major player in data protection, having enacted and enforced a number of laws on information privacy. To explain how this came to be, the Article first turns to several top-down objectives often said to motivate China’s privacy laws: advancing its digital economy, expanding its global influence, and protecting its …
Covid-19: The Federal Government, Federalism, South Dakota, And American Indians, Jordan Janson
Covid-19: The Federal Government, Federalism, South Dakota, And American Indians, Jordan Janson
Helm's School of Government Conference - American Revival: Citizenship & Virtue
This essay assesses the roles of the federal government and its relationship with Tribal Regions and states alike. Additionally, how COVID-19 affected states and localities and how different Presidential Administrations handled and responded to the pandemic while being compared with the state of South Dakota. Assessing whether or not the federal government overstepped reveals the preparedness of states. Certain states handled COVID-19-related issues better than others, and this essay addresses how Tribal Regions in states provided Governors with extreme complexities. Finally, this essay delves into the rights and responsibilities of the federal government and the state pertaining to American Indian …
Juvenile Justice & Diminished Criminal Culpability, Mitchell F. Crusto
Juvenile Justice & Diminished Criminal Culpability, Mitchell F. Crusto
University of Miami Law Review
When regulating the bad, albeit illegal, choices made by minors, the law is conflicted. On the one hand, we have a clear national policy to ensure the safety of and to promote the positive development of our young people, yet we simultaneously criminalize minors who make bad choices. This conundrum raises a quintessential jurisprudential flaw in our legal system: We lack a unifying, overarching principle that guides the law’s relationship with minors. In a companion piece, I pose and explore such a unifying principle, which I coin as the “best interest of the minor” standard (“BIMS”). Consequently, this Article applies …
Annotated Supplement To The Commander's Handbook On The Law Of Naval Operations
Annotated Supplement To The Commander's Handbook On The Law Of Naval Operations
International Law Studies
The Commander’s Handbook on the Law of Naval Operations is used in the United States and throughout the world as a restatement of U.S. doctrinal law positions on matters affecting the operations of the U.S. Navy, the U.S. Marine Corps, and the U.S. Coast Guard. Judge advocates and legal advisers have occasion to conduct deeper research to identify the context and source of the rules reflected in the Commander’s Handbook. Responding to this need, an Annotated Supplement to The Commander’s Handbook was produced in 1997 and published as volume 73 of International Law Studies. In the intervening decades, …
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
Fordham Law Review
This Essay contends that data infrastructure, when implemented on a national scale, can transform the way we conceptualize artificial intelligence (AI) governance. AI governance is often viewed as necessary for a wide range of strategic goals, including national security. It is widely understood that allowing AI and generative AI to remain self-regulated by the U.S. AI industry poses significant national security risks. Data infrastructure and AI oversight can assist in multiple goals, including: maintaining data privacy and data integrity; increasing cybersecurity; and guarding against information warfare threats. This Essay concludes that conceptualizing data infrastructure as a form of critical infrastructure …
The Witch-Hunt For Spies - A Critique Of The China Initiative And National Security’S Outsized Influence In Equal Protection Analysis, Winni Zhang
Washington and Lee Journal of Civil Rights and Social Justice
The U.S. Government has increased its focus on Chinese espionage in the last decade in a randomized and unpredictable way. Primarily targeting Chinese scientists and academics, the “China Initiative” has resulted in widespread targeting of individuals based on their race, ethnicity, and national origin. The program was formally terminated and said to now be a part of a broader approach to nation-state threats. However, the outcomes and effect of the economic espionage charges in the last 15 years has greatly skewed towards prosecuting Chinese individuals irrespective of the name of the program. While protections typically exist in the law to …
Foreword, Deborah W. Denno, Erica Valencia-Graham
Foreword, Deborah W. Denno, Erica Valencia-Graham
Fordham Law Review
This Foreword overviews an unprecedented Symposium on these wide ranging topics titled The New AI: The Legal and Ethical Implications of ChatGPT and Other Emerging Technologies. Hosted by the Fordham Law Review and cosponsored by Fordham University School of Law’s Neuroscience and Law Center on November 3, 2023, the Symposium brought together attorneys, judges, professors, and scientists to explore the opportunities and risks presented by AI, especially GenAI like ChatGPT. The discussion raised complex questions concerning AI sentience and personal privacy, as well as the future of legal ethics, education, and employment. Although the AI industry uniformly predicts ever more …
Subsidizing The Microchip Race: The Expanding Use Of National Security Arguments In International Trade, Victoria Walker
Subsidizing The Microchip Race: The Expanding Use Of National Security Arguments In International Trade, Victoria Walker
University of Michigan Journal of Law Reform
In 2018, China, India, the European Union, Canada, Mexico, Norway, Russia, Switzerland, and Turkey lodged complaints with the World Trade Organization’s (WTO) Dispute Settlement Body (DSB) in the case of Certain Measures on Steel and Aluminium Products. Each State alleged that the United States had violated international trade law by imposing a series of aggressive tariffs on steel and aluminum imports. President Donald Trump’s administration responded to these allegations by claiming that its actions were permissible under Article XXI of the General Agreement on Tariffs and Trade (GATT); a long-standing exception built into the international trade law framework that …
Searching Govinfo.Gov/, Bert Chapman
Searching Govinfo.Gov/, Bert Chapman
Libraries Faculty and Staff Presentations
This U.S. Government Publishing Office (GPO) database provides access to information legal, legislative, and regulatory information produced on multiple subjects by the U.S. Government. Content includes congressional bills, congressional committee hearings and prints (studies), reports on legislation, the text of laws, regulations, and executive orders and multiple U.S. Government information resources covering subjects from accounting to zoology.
Us-Taiwan Relations And The Future Of The Liberal Order, Christina Lai
Us-Taiwan Relations And The Future Of The Liberal Order, Christina Lai
The US Army War College Quarterly: Parameters
Strengthening ties with Taiwan is the best chance the United States has to preserve the liberal international order in Asia and improve its security relative to China. This study offers a normative perspective on how Taiwan can contribute to US-led international institutions and the Asian regional order and reduce conflict risk. It concludes with recommendations for the United States and its partners to integrate Taiwan into multilateral institutions in Asia.
International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze
International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze
The US Army War College Quarterly: Parameters
This article examines the international law of self-defense as it applies to the ongoing Israel-Hamas conflict to determine whether the October 2023 attacks by Hamas against Israel can be interpreted under Article 51 of the UN Charter as an “armed attack” that gives Israel the right to use military force in self-defense against non-state actors. It situates the conflict within ongoing legal and political debates, shows how this conflict fits into a changing global reality where the most dangerous security threats do not exclusively emanate from other states and concludes that Israel’s resort to force in the current conflict appears …
Parameters Spring 2024, Usawc Press
Parameters Spring 2024, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens
China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens
The US Army War College Quarterly: Parameters
This article argues that the People’s Republic of China uses its police and internal security forces as a nontraditional means of projecting strategic Landpower in the Indo-Pacific and Central Asia. Instead of limiting analysis of China’s power projection to military forces, this article employs new data on Chinese police engagements abroad to fill a gap in our understanding of the operating environment in Asia. Policymakers will gain an understanding of how these activities enhance China’s presence, partnerships, and influence across the region to inform the development of recommendations for a more effective response.
Strategy As Problem-Solving, Andrew Carr
Strategy As Problem-Solving, Andrew Carr
The US Army War College Quarterly: Parameters
This article proposes a new definition of strategy as problem-solving that challenges the focus on goals and assumptions of order within many post–Cold War approaches to strategy. It argues that the military needs strategy to diagnose the complex problems of the twenty-first century before they can be solved. Inspired by practitioners such as Andrew Marshall and George F. Kennan, this new definition clarifies what strategists do and offers a logic for distinguishing the use of the term strategy. Practitioners will also find problem-solving tools and pedagogies they can adopt today.
Rethinking The Relevance Of Self-Deterrence, Jeffrey H. Michaels
Rethinking The Relevance Of Self-Deterrence, Jeffrey H. Michaels
The US Army War College Quarterly: Parameters
Self-deterrence is critically understudied in deterrence theory. Similarly, deterrence practitioners prefer to focus on adversaries’ threats rather than seeking to account for the full scope of fears influencing the decision calculus of policymakers. Through historical case studies, this article identifies where self-deterrence has occurred, highlights the benefits of incorporating the concept in future strategic planning and intelligence assessments, and recommends that policymakers, strategists, and analysts acknowledge self-deterrence as an important factor when preparing for future wars.
From The Editor In Chief, Antulio J. Echevarria Ii
From The Editor In Chief, Antulio J. Echevarria Ii
The US Army War College Quarterly: Parameters
Welcome to the Spring 2024 issue of Parameters. Readers will note a few differences in the formatting for this issue: we are now using endnotes instead of footnotes to facilitate switching from pdf to html via Adobe's Liquid App; also, readers will be able to click on each endnote number to view the full endnote and then switch back to the text to resume reading. Please drop us a note to let us know how you like the changes. More are coming!
Cyber Security: A Lawyer’S Ethical Duty, Meagan Folmar
Cyber Security: A Lawyer’S Ethical Duty, Meagan Folmar
St. Mary's Journal on Legal Malpractice & Ethics
No abstract provided.
Decentralizing The Nigerian Police Force: A Plausible Approach To Hinterland Securities, Amobi P. Chiamogu, Uchechukwu P. Chiamogu
Decentralizing The Nigerian Police Force: A Plausible Approach To Hinterland Securities, Amobi P. Chiamogu, Uchechukwu P. Chiamogu
Journal of African Conflicts and Peace Studies
The structure of the Nigerian police has overtime depicted a centralized composition that negate principles of power sharing in a federal system of government. The complexities and diverse nature of policing in Nigeria remains the bane to effective and virile administration and management of the organization. The office of the Commissioner of Police vis-à-vis those of State Governors spell contradictions in power configuration from both the Constitution and the Police Act. The enactment of vigilante services and neighbourhood watches by state governments are indicative of a failing security system especially at the component units of the Nigerian federation. The hinterlands …
Stakeholder Capitalism’S Greatest Challenge: Reshaping A Public Consensus To Govern A Global Economy, Leo E. Strine Jr., Michael Klain
Stakeholder Capitalism’S Greatest Challenge: Reshaping A Public Consensus To Govern A Global Economy, Leo E. Strine Jr., Michael Klain
Seattle University Law Review
The Berle XIV: Developing a 21st Century Corporate Governance Model Conference asks whether there is a viable 21st Century Stakeholder Governance model. In our conference keynote article, we argue that to answer that question yes requires restoring—to use Berle’s term—a “public consensus” throughout the global economy in favor of the balanced model of New Deal capitalism, within which corporations could operate in a way good for all their stakeholders and society, that Berle himself supported.
The world now faces problems caused in large part by the enormous international power of corporations and the institutional investors who dominate their governance. These …