Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Force (2)
- Self-defense (2)
- Armed attack (1)
- Bureaucracy (1)
- Classification (1)
-
- Cyber (1)
- Cyber-attacks (1)
- Drones (1)
- Espionage Act (1)
- European Journal of International Law (1)
- First Amendment (1)
- Freedom of information (1)
- Harvard Law Review (1)
- Informal sanctions (1)
- Intelligence (1)
- International Law Studies (1)
- International Law Studies Series U.S. Naval War College (1)
- Obama (1)
- Official Secrets Act (1)
- Pentagon Papers (1)
- Reporter’s privilege (1)
- Secrecy (1)
- Snowden (1)
- Social norms (1)
- Transparency (1)
- UN Charter (1)
- Underenforcement (1)
- Whistleblowers (1)
- WikiLeaks (1)
Articles 1 - 3 of 3
Full-Text Articles in Law
Regulating Resort To Force: Form And Substance Of The Un Charter Regime, Matthew C. Waxman
Regulating Resort To Force: Form And Substance Of The Un Charter Regime, Matthew C. Waxman
Faculty Scholarship
Much of the international legal debate about regulating force and self-defence takes place on a substantive axis, focusing on the scope of force prohibitions and exceptions. This article instead focuses on their doctrinal form, or modes of argumentation and analysis through which facts are assessed in relation to legal directives, to illuminate how many of the assumptions about substantive policy goals and risks tend to be coupled with other assumptions about the way international law operates in this field. It shows that the flexible, adaptable standards favoured by some states, scholars, and other international actors and the fixed rules and …
Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman
Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman
Faculty Scholarship
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …
The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen
The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen
Faculty Scholarship
The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, roughly a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice.
This Article challenges the standard account of that disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an …