7,582 research outputs found
"Virtual disenfranchisement": cyber election meddling in the grey zones of international law
This Article examines remotely conducted election meddling by cyber means in the context of international law and asks whether such cyber operations qualify as "internationally wrongful acts." An internationally wrongful act requires both a breach of a legal obligation owed by one State to another under international law and attribution of the act to the former. The Article considers three possible breaches related to such meddling-violation of the requirement to respect sovereignty, intervention into the internal affairs of another State, and, when the cyber operations are not attributable to the State from which they were launched, breach of the due diligence obligation that requires States to ensure cyber operations with serious adverse consequences are not mounted from their territory. The Article then examines the various modalities for attributing a cyber operation to a State under international law. Whether cyber meddling in another State's election is unlawful, as well as the severity thereof, determines the range of responses available to the victim State. The Article concludes that the law applicable to remotely conducted meddling in another State's election is unsettled, thereby comprising a normative grey zone ripe for exploitation by States and non-State actors
Responding to Election Meddling in the Cyberspace: An International Law Case Study on the Russian Interference in the 2016 Presidential Election
International law is not the most perfect legal regime, and, perhaps to no one’s surprise, it is even less perfect in cyberspace. The United States has been a victim to a series of malicious cyber operations in recent years, and the key question is how to respond to and deter them. This Article offers a detailed survey of the Russian interference in the 2016 presidential election in the context of international law. Adapting the framework created by Tallinn Manual 2.0 , the Article examines the international legal basis of the response measures employed by the United States and other possible alternative responses to the Russian operation. It concludes that none of these responses are both squarely supported by international law and desirable as a matter of national security police. This Article intends to show that international law contains considerable gray areas in the cyber realm that allow sophisticated adversaries like Russia to harm the core interest of the United States without substantial legal repercussions. The Article concludes by suggesting that a deterrence mechanism based on proactive national security policy would be more effective and practical than one based on international law
The Technologies of Isolation
In this investigation of the Japanese film Kairo, I contemplate how the horrors present in the film relate to the issue of self, by examining a number of interlocking motifs. These include thematic foci on disease and technology which are more intimately and inwardly focused that the film's conclusion first appears to suggest. The true horror here, I argue, is ontological: centred on the self and its divorcing from the exterior world, especially founded in an increased use of and reliance on communicative technologies. I contend that these concerns are manifested in Kairo by presenting the spread of technology as disease-like, infecting the city and the individuals who are isolated and imprisoned by their urban environment. Finally, I investigate the meanings of the apocalypse, expounding how it may be read as hopeful for the future rather than indicative of failure or doom
The technologies of isolation: apocalypse and self in Kurosawa Kiyoshi's Kairo
In this investigation of the Japanese film Kairo, I contemplate how the horrors present in the film relate to the issue of self, by examining a number of interlocking motifs. These include thematic foci on disease and technology which are more intimately and inwardly focused that the film's conclusion first appears to suggest. The true horror here, I argue, is ontological: centred on the self and its divorcing from the exterior world, especially founded in an increased use of and reliance on communicative technologies. I contend that these concerns are manifested in Kairo by presenting the spread of technology as disease-like, infecting the city and the individuals who are isolated and imprisoned by their urban environment. Finally, I investigate the meanings of the apocalypse, expounding how it may be read as hopeful for the future rather than indicative of failure or doom
Recommended from our members
“Discover your own Ireland”: Virtual Ireland(s) for an international audience
Copyright @ 2009 University of GlasgowThe opening years of the twenty-first century can be characterised by the increased overlap between cyberspace and the physical world; virtual reality is more real than it has ever been. The rising popularity of web 2.0 forms of self-expression and user generated content such as Facebook, MySpace and blogging have resulted in it becoming the largest growth area on the internet.
This essay hopes to explore how the uptake and familiarity with web technology by Irish people has overflowed into their lives and cultural expressions via the use of ‘virtual communities’. As the forums for representing the virtual self continue to evolve and multiply, debates over the multiple meanings of Irishness will thrive as the ‘new Irish’ continue to reinterpret the complexities of their identity using web technology
Recommended from our members
Trust in the digital world - the return of the kings of old
Drawing principally on examples and literature from the Anglosphere, the author argues that the high salience given to "trust" and "trustworthiness" in recent scholarly literature, and which (notably in Putnam's work) attributes declining trust to a widely mistrusted mass media does not acknowledge the trustbuilding potential (realised in some instances) of interactive "Web 2.0" applications. Drawing on O'Neill's proposal that trust inheres in dialogue and mutual checking and verification, the author argues that "Web 2.0" media provide a variety of instances where the "dialogic" character of "Web 2.0" has established and enhanced trustworthiness. He argues normatively for a combination of "Web 2.0" interactivity and the adoption and implementation of self-regulatory codes in order to enhance the trustworthiness of the media
Understanding digital intelligence and the norms that might govern it
Abstract: This paper describes the nature of digital intelligence and provides context for the material published as a result of the actions of National Security Agency contractor Edward Snowden. It looks at the dynamic interaction between demands from government and law enforcement for digital intelligence, and at the new possibilities that digital technology has opened up for meeting such demands. The adequacy of previous regimes of legal powers and governance arrangements is seriously challenged just at a time when the objective need for intelligence on the serious threats facing civil society is apparent. This paper suggests areas where it might be possible to derive international norms, regarded as promoting standards of accepted behaviour that might gain widespread, if not universal, international acceptance, for the safe practice of digital intelligence
- …