Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
- File Type
Articles 1 - 10 of 10
Full-Text Articles in Law
A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen
A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen
Global Tides
This paper attempts to explain the threat that foreign disinformation poses for the United States Intelligence Community and its allies. The paper examines Russian disinformation from both a historical and contemporary context and how its effect on Western democracies may only be exacerbated in light of Chinese involvement and evolving technologies. Fortunately, the paper also studies practices and strategies that the United States Intelligence Community and its allied foreign counterparts may use to respond. It is hoped that this study will help shed further light on Russian and Chinese disinformation campaigns and explain how the Intelligence Community can efficiently react.
The 2002 National Security Strategy: The Foundation Of A Doctrine Of Preemption, Prevention, Or Anticipatory Action, Troy Lorenzo Ewing
The 2002 National Security Strategy: The Foundation Of A Doctrine Of Preemption, Prevention, Or Anticipatory Action, Troy Lorenzo Ewing
Graduate Program in International Studies Theses & Dissertations
The terrorist attacks of September 11, 2001, initiated a strategic shift in American national security policy. For the United States, terrorism was no longer a distant phenomenon visited upon faraway regions; it had come to America with stark brutality.1 Consequently, the administration of President George W. Bush sought to advance a security strategy to counter the proliferating threat of terrorism.
The ensuing 2002 National Security Strategy articulated the willingness of the United States to oppose terrorists, and rogue nation-states by merging the strategies of "preemptive" and "preventive" warfare into an unprecedented strategy of "anticipatory action," known as the Doctrine of …
Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret
Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret
All Faculty Scholarship
The Utah Law Review brought in a panel of experts for a symposium on the legal and ethical limits of technological warfare. This roundtable discussion crystalized the issues discussed throughout the symposium. The collective experience and diversity of viewpoints of the panelists produced an unparalleled discussion of the complex and poignant issues involved in drone warfare. The open dialogue in the roundtable discussion created moments of tension where the panelists openly challenged each other’s viewpoints on the ethics and legality of drone warfare. The discussion captured in this transcript uniquely conveys the diversity of perspectives and inherently challenging legal and …
Kill-Lists And Accountability, Greg Mcneal
Kill-Lists And Accountability, Greg Mcneal
Greg McNeal
This article is a comprehensive examination of the U.S. practice of targeted killings. It is based in part on field research, interviews, and previously unexamined government documents. The article fills a gap in the literature, which to date lacks sustained scholarly analysis of the accountability mechanisms associated with the targeted killing process. The article makes two major contributions: 1) it provides the first qualitative empirical accounting of the targeted killing process, beginning with the creation of kill-lists extending through the execution of targeted strikes; 2) it provides a robust analytical framework for assessing the accountability mechanisms associated with those processes. …
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski
Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski
David A. Bray
We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …
Secrecy And Democratic Decisions, Mark A. Chinen
Secrecy And Democratic Decisions, Mark A. Chinen
Mark A. Chinen
Secrecy to protect intelligence sources and methods appears often in the nation’s discourse about controversial national security matters. Often it is asked whether such secrecy is consistent with the nation’s democratic principles and processes. I argue such principles and processes provide a framework through which we try to answer questions about secrecy and indeed legitimate them, but are often too broad to provide definitive guidance in specific cases. At the same time, the sources and methods argument itself is overbroad because of the nature of the sources and methods themselves; the tentative nature of intelligence assessments derived from those sources …
Michael Warner's "The Trouble With Normal: Sex, Politics, And The Ethics Of Queer Life": Implications For Sex And Security, Ibpp Editor
International Bulletin of Political Psychology
This article continues a series of IBPP articles on sex and security by exploring the implications of a new book on the appropriateness of public policy that bears on sexuality.
Minorities, Personnel Security, And Intelligence Operations: Beyond Morals And The Law, Ibpp Editor
Minorities, Personnel Security, And Intelligence Operations: Beyond Morals And The Law, Ibpp Editor
International Bulletin of Political Psychology
This article advocates the need for programs designed to increase the percentage of ethnic, racial, religious, and other cultural minorities within the operational units of security bureaucracies.
Trends. A Strategic Defense Initiative Against Biological Warfare: Sense? Nonsense? Mal Vu, Mal Dit?, Ibpp Editor
Trends. A Strategic Defense Initiative Against Biological Warfare: Sense? Nonsense? Mal Vu, Mal Dit?, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the Strategic Defense Initiative (SDI) that was initiated by United States (US) President Ronald Reagan during his first term.