Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen Dec 2011

President Obama And The Changing Cyber Paradigm, Eric Talbot Jensen

Faculty Scholarship

Among the most important issues for American National Security is the national response to the growing threat from cyber activities. This threat is both ubiquitous and potentially catastrophic as recently demonstrated by both the recent decision by the UK to prioritize cyber capabilities over putting in service an air-capable aircraft carrier and the targeted effectiveness of the STUXNET worm. The evolving cyber paradigm will force the United States to reevaluate the way in which it thinks of both national security and the concept of armed conflict. To combat this threat, President Obama must refocus America’s attention, by both reallocating the …


Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron Jan 2011

Network Accountability For The Domestic Intelligence Apparatus, Frank Pasquale, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


The Military-Industrial Complex, Charles J. Dunlap Jr. Jan 2011

The Military-Industrial Complex, Charles J. Dunlap Jr.

Faculty Scholarship

In his 1961 farewell address, President Eisenhower cautioned against a future in which a powerful military-industrial complex manipulated policy to the detriment of American interests. Dunlap argues that, fifty years later, Eisenhower’s fears have not been realized; in fact, the military-industrial enterprise is in decline. Certainly, the U.S. military owes its continued preeminence to both the quality of its combatants and the superiority of its weaponry. Yet as the manpower-centric strategies in Afghanistan and Iraq replaced technology-centric operations; as complicated defense acquisitions laws deterred companies from obtaining contracts; and as the economic downturn and rising national deficit have strained budgets, …


Responses To The Ten Questions, Charles J. Dunlap Jr. Jan 2011

Responses To The Ten Questions, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


The Mottled Legacy Of 9/11: A Few Reflections On The Evolution Of The International Law Of Armed Conflict, Charles J. Dunlap Jr. Jan 2011

The Mottled Legacy Of 9/11: A Few Reflections On The Evolution Of The International Law Of Armed Conflict, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Measure Twice, Shoot Once: Higher Care For Cia-Targeted Killing, Afsheen John Radsan, Richard Murphy Jan 2011

Measure Twice, Shoot Once: Higher Care For Cia-Targeted Killing, Afsheen John Radsan, Richard Murphy

Faculty Scholarship

For almost a decade, the United States has deployed unmanned aerial vehicles, or "drones," to kill targeted members of Al Qaeda and the Taliban. Central Intelligence Agency (CIA) drone strikes in Pakistan have, in particular, stirred strong debates over the legality of such actions. Some commentators insist that these strikes are legal under international humanitarian law (IHL) or as a matter of self-defense. Others insist that the United States' targeted killing amounts to murder.

It is critical for the law to determine how to control killer drones and the future of warfare. As technology evolves, drones will develop sharper senses …


Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman Jan 2011

Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman

Faculty Scholarship

In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."

To what extent is …


Open Service And Our Allies: A Report On The Inclusion Of Openly Gay And Lesbian Servicemembers In U. S. Allies' Armed Forces, Suzanne B. Goldberg Jan 2011

Open Service And Our Allies: A Report On The Inclusion Of Openly Gay And Lesbian Servicemembers In U. S. Allies' Armed Forces, Suzanne B. Goldberg

Faculty Scholarship

In the wake of the Obama Administration's pledge to repeal "Don't Ask, Don't Tell" in the United States, the Columbia Law School Sexuality & Gender Law Clinic undertook a review of how allies of the United States moved from a policy of banning gay and lesbian servicemembers from serving in the armed forces to a policy of allowing these servicemembers to serve openly ("open service"). In documenting this review, this report aims to provide information about the decision to implement open service and the mechanics of the transition to open service in Australia, Canada, Israel, and the United Kingdom. In …


Cyber-Attacks And The Use Of Force: Back To The Future Of Article 2(4), Matthew C. Waxman Jan 2011

Cyber-Attacks And The Use Of Force: Back To The Future Of Article 2(4), Matthew C. Waxman

Faculty Scholarship

This Article makes two overarching arguments. First, strategy is a major driver of legal evolution. Most scholarship and commentary on cyber-attacks capture only one dimension of this point, focusing on how international law might be interpreted or amended to take account of new technologies and threats. The focus here, however, is on the dynamic interplay of law and strategy – strategy generates reappraisal and revision of law, while law itself shapes strategy – and the moves and countermoves among actors with varying interests, capabilities, and vulnerabilities. The purpose is not to come down in favor of one legal interpretation or …