Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

How U.S. Government Policy Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman Oct 2019

How U.S. Government Policy Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman

Libraries Faculty and Staff Presentations

Artificial intelligence is affecting many areas of our lives and governmental policy. National security is one arena in which artificial intelligence is playing an increasingly important and controversial role. U.S. Government and military agencies are producing a steadily expanding corpus of publicly available literature on this topic. This literature documents how these agencies have this topic's national security implications historically and currently while also addressing potentially emerging national security issues where artificial intelligence will intersect with national security. This presentation demonstrates examples of the growing variety of publicly available national security artificial intelligence literature while also addressing the implications of …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Bribes V. Bombs: A Study In Coasean Warfare, Gideon Parchomovsky, Peter Siegelman Sep 2007

Bribes V. Bombs: A Study In Coasean Warfare, Gideon Parchomovsky, Peter Siegelman

All Faculty Scholarship

The use of bribes to co-opt an enemy’s forces can be a more effective way to wage war than the conventional use of force: Relative to bombs, bribes can save lives and resources, and preserve civic institutions. This essay evaluates the efficacy and normative desirability of selectively substituting bribes for bombs as a means of warfare. We show how inter-country disparities in wealth, differences in military strength, the organization of the bribing and recipient forces, uncertainty about the outcome of the conflict, and communications technology can contribute to the efficacy of bribes. We discuss methods for enforcing bargains struck between …


The War On Terrorism And Civil Liberties, Jules Lobel Jan 2002

The War On Terrorism And Civil Liberties, Jules Lobel

Articles

Throughout American history, we have grappled with the problem of balancing liberty versus security in times of war or national emergency. Our history is littered with sordid examples of the Constitution's silence during war or perceived national emergency. The Bush Administration’s War on Terror has once again forced a reckoning requiring Americans to balance liberty and national security in wartime. President Bush has stated, "[w]e believe in democracy and rule of law and the Constitution. But we're under attack.” President Bush, Attorney General Ashcroft and other governmental leaders have argued that in war, "the Constitution does not give foreign enemies …