Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

Brigham Young University Law School

Faculty Scholarship

Articles 1 - 6 of 6

Full-Text Articles in Law

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen Dec 2014

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen

Faculty Scholarship

The last few years are full of reports of cyber incidents, some of which have caused significant damage. Each of these cyber events raise important questions about the role and responsibility of States with respect to cyber incidents. The answer to these questions revolves in large part around the international law doctrine of sovereignty. The extent to which nations exercise sovereignty over cyberspace and cyber infrastructure will provide key answers to how much control States must exercise and how much responsibility States must accept for harmful cyber activities when they fail to adequately do so. This article argues that States …


Disaggregating Disasters, Lisa Grow Sun, Ronnell Andersen Jones Jan 2013

Disaggregating Disasters, Lisa Grow Sun, Ronnell Andersen Jones

Faculty Scholarship

In the years since the September 11 attacks, scholars and commentators have criticized the emergence of both legal developments and policy rhetoric that blur the lines between war and terrorism. Unrecognized, but equally as damaging to democratic ideals—and potentially more devastating in practical effect—is the expansion of this trend beyond the context of terrorism to a much wider field of nonwar emergencies. Indeed, in recent years, war and national security rhetoric has come to permeate the legal and policy conversations on a wide variety of natural and technological disasters. This melding of disaster and war for purposes of justifying exceptions …


Cyber Deterrence, Eric Talbot Jensen Dec 2012

Cyber Deterrence, Eric Talbot Jensen

Faculty Scholarship

Cyber operations by both state actors and non-state actors are increasing in frequency and severity. As nations struggle to defend their networks and infrastructure, their ability to apply the principles of deterrence to cyber activities correspondingly increases in importance. Cyber deterrence offers much more flexibility and increased options from traditional deterrence methodologies developed in the Cold War’s nuclear age. In addition to traditional retaliation, cyber deterrence includes options such as taking legal action; and making networks invisible, resilient, and interdependent. It also presents new ways to view and apply accepted methodologies such as invulnerability. As the U.S. continues to develop …


President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen Dec 2011

President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen

Faculty Scholarship

Among the most important issues for American National Security is the national response to the growing threat from cyber activities. This threat is both ubiquitous and potentially catastrophic as recently demonstrated by both the recent decision by the UK to prioritize cyber capabilities over putting in service an air-capable aircraft carrier and the targeted effectiveness of the STUXNET worm. The evolving cyber paradigm will force the United States to reevaluate the way in which it thinks of both national security and the concept of armed conflict. To combat this threat, President Obama must refocus America’s attention, by both reallocating the …


Cyber Warfare And Precautions Against The Effects Of Attacks, Eric Talbot Jensen Dec 2009

Cyber Warfare And Precautions Against The Effects Of Attacks, Eric Talbot Jensen

Faculty Scholarship

Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated networks. Additionally, the government relies almost completely on civilian providers for computer software and hardware products, services, and maintenance. This near-complete intermixing of civilian and military computer infrastructure makes many of those civilian objects and providers legitimate targets under the law of armed conflict. Other civilian networks, services, and communications may suffer collateral damage from legitimate attacks on government targets. To protect those civilian objects and providers from the effects of attacks, the law of armed conflict requires a state to segregate its military assets from the civilian population and …


Computer Attacks On Critical National Infrastructure: A Use Of Force Invoking The Right Of Self-Defense, Eric Talbot Jensen Dec 2002

Computer Attacks On Critical National Infrastructure: A Use Of Force Invoking The Right Of Self-Defense, Eric Talbot Jensen

Faculty Scholarship

Computer networks create tremendously increased capabilities but also represent equally increased vulnerabilities. These vulnerabilites are especially acute in relation to potential attacks on critical national infrasturucture. This Article proposes that international law must evolve to recognize that attacks against a nation's critical national infrastructure from any source constitute a use of force. Such attacks, therefore, give the victim state the right to proportional self-defense - including anticipatory self-defense - even if the computer network attack is not an armed attack under Article 51 of the United Nations Charter. Due to the instantaneous nature of computer network attacks, the right to …