Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen Apr 2023

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen

Global Tides

This paper attempts to explain the threat that foreign disinformation poses for the United States Intelligence Community and its allies. The paper examines Russian disinformation from both a historical and contemporary context and how its effect on Western democracies may only be exacerbated in light of Chinese involvement and evolving technologies. Fortunately, the paper also studies practices and strategies that the United States Intelligence Community and its allied foreign counterparts may use to respond. It is hoped that this study will help shed further light on Russian and Chinese disinformation campaigns and explain how the Intelligence Community can efficiently react.


The 2002 National Security Strategy: The Foundation Of A Doctrine Of Preemption, Prevention, Or Anticipatory Action, Troy Lorenzo Ewing Jul 2013

The 2002 National Security Strategy: The Foundation Of A Doctrine Of Preemption, Prevention, Or Anticipatory Action, Troy Lorenzo Ewing

Graduate Program in International Studies Theses & Dissertations

The terrorist attacks of September 11, 2001, initiated a strategic shift in American national security policy. For the United States, terrorism was no longer a distant phenomenon visited upon faraway regions; it had come to America with stark brutality.1 Consequently, the administration of President George W. Bush sought to advance a security strategy to counter the proliferating threat of terrorism.

The ensuing 2002 National Security Strategy articulated the willingness of the United States to oppose terrorists, and rogue nation-states by merging the strategies of "preemptive" and "preventive" warfare into an unprecedented strategy of "anticipatory action," known as the Doctrine of …


Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret Jan 2013

Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret

All Faculty Scholarship

The Utah Law Review brought in a panel of experts for a symposium on the legal and ethical limits of technological warfare. This roundtable discussion crystalized the issues discussed throughout the symposium. The collective experience and diversity of viewpoints of the panelists produced an unparalleled discussion of the complex and poignant issues involved in drone warfare. The open dialogue in the roundtable discussion created moments of tension where the panelists openly challenged each other’s viewpoints on the ethics and legality of drone warfare. The discussion captured in this transcript uniquely conveys the diversity of perspectives and inherently challenging legal and …


Kill-Lists And Accountability, Greg Mcneal Dec 2012

Kill-Lists And Accountability, Greg Mcneal

Greg McNeal

This article is a comprehensive examination of the U.S. practice of targeted killings. It is based in part on field research, interviews, and previously unexamined government documents. The article fills a gap in the literature, which to date lacks sustained scholarly analysis of the accountability mechanisms associated with the targeted killing process. The article makes two major contributions: 1) it provides the first qualitative empirical accounting of the targeted killing process, beginning with the creation of kill-lists extending through the execution of targeted strikes; 2) it provides a robust analytical framework for assessing the accountability mechanisms associated with those processes. …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke Dec 2012

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …


Secrecy And Democratic Decisions, Mark A. Chinen Dec 2007

Secrecy And Democratic Decisions, Mark A. Chinen

Mark A. Chinen

Secrecy to protect intelligence sources and methods appears often in the nation’s discourse about controversial national security matters. Often it is asked whether such secrecy is consistent with the nation’s democratic principles and processes. I argue such principles and processes provide a framework through which we try to answer questions about secrecy and indeed legitimate them, but are often too broad to provide definitive guidance in specific cases. At the same time, the sources and methods argument itself is overbroad because of the nature of the sources and methods themselves; the tentative nature of intelligence assessments derived from those sources …


Michael Warner's "The Trouble With Normal: Sex, Politics, And The Ethics Of Queer Life": Implications For Sex And Security, Ibpp Editor Jan 2000

Michael Warner's "The Trouble With Normal: Sex, Politics, And The Ethics Of Queer Life": Implications For Sex And Security, Ibpp Editor

International Bulletin of Political Psychology

This article continues a series of IBPP articles on sex and security by exploring the implications of a new book on the appropriateness of public policy that bears on sexuality.


Minorities, Personnel Security, And Intelligence Operations: Beyond Morals And The Law, Ibpp Editor Mar 1999

Minorities, Personnel Security, And Intelligence Operations: Beyond Morals And The Law, Ibpp Editor

International Bulletin of Political Psychology

This article advocates the need for programs designed to increase the percentage of ethnic, racial, religious, and other cultural minorities within the operational units of security bureaucracies.


Trends. A Strategic Defense Initiative Against Biological Warfare: Sense? Nonsense? Mal Vu, Mal Dit?, Ibpp Editor Mar 1998

Trends. A Strategic Defense Initiative Against Biological Warfare: Sense? Nonsense? Mal Vu, Mal Dit?, Ibpp Editor

International Bulletin of Political Psychology

The author discusses the Strategic Defense Initiative (SDI) that was initiated by United States (US) President Ronald Reagan during his first term.