7,582 research outputs found

    A Declaration of the Mission of University in Barlowspace

    Get PDF

    "Virtual disenfranchisement": cyber election meddling in the grey zones of international law

    Get PDF
    This Article examines remotely conducted election meddling by cyber means in the context of international law and asks whether such cyber operations qualify as "internationally wrongful acts." An internationally wrongful act requires both a breach of a legal obligation owed by one State to another under international law and attribution of the act to the former. The Article considers three possible breaches related to such meddling-violation of the requirement to respect sovereignty, intervention into the internal affairs of another State, and, when the cyber operations are not attributable to the State from which they were launched, breach of the due diligence obligation that requires States to ensure cyber operations with serious adverse consequences are not mounted from their territory. The Article then examines the various modalities for attributing a cyber operation to a State under international law. Whether cyber meddling in another State's election is unlawful, as well as the severity thereof, determines the range of responses available to the victim State. The Article concludes that the law applicable to remotely conducted meddling in another State's election is unsettled, thereby comprising a normative grey zone ripe for exploitation by States and non-State actors

    Responding to Election Meddling in the Cyberspace: An International Law Case Study on the Russian Interference in the 2016 Presidential Election

    Get PDF
    International law is not the most perfect legal regime, and, perhaps to no one’s surprise, it is even less perfect in cyberspace. The United States has been a victim to a series of malicious cyber operations in recent years, and the key question is how to respond to and deter them. This Article offers a detailed survey of the Russian interference in the 2016 presidential election in the context of international law. Adapting the framework created by Tallinn Manual 2.0 , the Article examines the international legal basis of the response measures employed by the United States and other possible alternative responses to the Russian operation. It concludes that none of these responses are both squarely supported by international law and desirable as a matter of national security police. This Article intends to show that international law contains considerable gray areas in the cyber realm that allow sophisticated adversaries like Russia to harm the core interest of the United States without substantial legal repercussions. The Article concludes by suggesting that a deterrence mechanism based on proactive national security policy would be more effective and practical than one based on international law

    The Technologies of Isolation

    Get PDF
    In this investigation of the Japanese film Kairo, I contemplate how the horrors present in the film relate to the issue of self, by examining a number of interlocking motifs. These include thematic foci on disease and technology which are more intimately and inwardly focused that the film's conclusion first appears to suggest. The true horror here, I argue, is ontological: centred on the self and its divorcing from the exterior world, especially founded in an increased use of and reliance on communicative technologies. I contend that these concerns are manifested in Kairo by presenting the spread of technology as disease-like, infecting the city and the individuals who are isolated and imprisoned by their urban environment. Finally, I investigate the meanings of the apocalypse, expounding how it may be read as hopeful for the future rather than indicative of failure or doom

    The technologies of isolation: apocalypse and self in Kurosawa Kiyoshi's Kairo

    Get PDF
    In this investigation of the Japanese film Kairo, I contemplate how the horrors present in the film relate to the issue of self, by examining a number of interlocking motifs. These include thematic foci on disease and technology which are more intimately and inwardly focused that the film's conclusion first appears to suggest. The true horror here, I argue, is ontological: centred on the self and its divorcing from the exterior world, especially founded in an increased use of and reliance on communicative technologies. I contend that these concerns are manifested in Kairo by presenting the spread of technology as disease-like, infecting the city and the individuals who are isolated and imprisoned by their urban environment. Finally, I investigate the meanings of the apocalypse, expounding how it may be read as hopeful for the future rather than indicative of failure or doom

    Analysis on China’s Cyber Diplomacy

    Get PDF

    Understanding digital intelligence and the norms that might govern it

    Get PDF
    Abstract: This paper describes the nature of digital intelligence and provides context for the material published as a result of the actions of National Security Agency contractor Edward Snowden. It looks at the dynamic interaction between demands from government and law enforcement for digital intelligence, and at the new possibilities that digital technology has opened up for meeting such demands. The adequacy of previous regimes of legal powers and governance arrangements is seriously challenged just at a time when the objective need for intelligence on the serious threats facing civil society is apparent. This paper suggests areas where it might be possible to derive international norms, regarded as promoting standards of accepted behaviour that might gain widespread, if not universal, international acceptance, for the safe practice of digital intelligence
    corecore