1,266 research outputs found

    Interrogation or Experimentation? Assessing Non-Consensual Human Experimentation During the War on Terror

    Get PDF
    The prohibition against non-consensual human experimentation has long been considered sacrosanct. It traces its legal roots to the Nuremberg trials although the ethical foundations dig much deeper. It prohibits all forms of medical and scientific experimentation on non-consenting individuals. The prohibition against non-consensual human experimentation is now well established in both national and international law. Despite its status as a fundamental and non-derogable norm, the prohibition against non-consensual human experimentation was called into question during the War on Terror by the CIA’s treatment of “high-value detainees.” Seeking to acquire actionable intelligence, the CIA tested the “theory of learned helplessness” on these detainees by subjecting them to a series of enhanced interrogation techniques. This Article revisits the prohibition against non-consensual human experimentation to determine whether the CIA’s treatment of detainees violated international law. It examines the historical record that gave rise to the prohibition and its eventual codification in international law. It then considers the application of this norm to the CIA’s treatment of high-value detainees by examining Salim v. Mitchell , a lawsuit brought by detainees who were subjected to enhanced interrogation techniques. This Article concludes that the CIA breached the prohibition against non-consensual human experimentation when it conducted systematic studies on these detainees to validate the theory of learned helplessness

    Towards Loop-Free Forwarding of Anonymous Internet Datagrams that Enforce Provenance

    Full text link
    The way in which addressing and forwarding are implemented in the Internet constitutes one of its biggest privacy and security challenges. The fact that source addresses in Internet datagrams cannot be trusted makes the IP Internet inherently vulnerable to DoS and DDoS attacks. The Internet forwarding plane is open to attacks to the privacy of datagram sources, because source addresses in Internet datagrams have global scope. The fact an Internet datagrams are forwarded based solely on the destination addresses stated in datagram headers and the next hops stored in the forwarding information bases (FIB) of relaying routers allows Internet datagrams to traverse loops, which wastes resources and leaves the Internet open to further attacks. We introduce PEAR (Provenance Enforcement through Addressing and Routing), a new approach for addressing and forwarding of Internet datagrams that enables anonymous forwarding of Internet datagrams, eliminates many of the existing DDoS attacks on the IP Internet, and prevents Internet datagrams from looping, even in the presence of routing-table loops.Comment: Proceedings of IEEE Globecom 2016, 4-8 December 2016, Washington, D.C., US

    Synchronization in fiber lasers arrays

    Full text link
    We consider an array of fiber lasers coupled through the nearest neighbors. The model is a generalized nonlinear Schroedinger equation where the usual Laplacian is replaced by the graph Laplacian. For a graph with no symmetries, we show that there is no resonant transfer of energy between the different eigenmodes. We illustrate this and confirm our result on a simple graph. This shows that arrays of fiber ring lasers can be made temporally coherent

    A Light-Weight Forwarding Plane for Content-Centric Networks

    Full text link
    We present CCN-DART, a more efficient forwarding approach for content-centric networking (CCN) than named data networking (NDN) that substitutes Pending Interest Tables (PIT) with Data Answer Routing Tables (DART) and uses a novel approach to eliminate forwarding loops. The forwarding state required at each router using CCN-DART consists of segments of the routes between consumers and content providers that traverse a content router, rather than the Interests that the router forwards towards content providers. Accordingly, the size of a DART is proportional to the number of routes used by Interests traversing a router, rather than the number of Interests traversing a router. We show that CCN-DART avoids forwarding loops by comparing distances to name prefixes reported by neighbors, even when routing loops exist. Results of simulation experiments comparing CCN-DART with NDN using the ndnSIM simulation tool show that CCN-DART incurs 10 to 20 times less storage overhead

    Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network

    Full text link
    We show that the mechanisms used in the name data networking (NDN) and the original content centric networking (CCN) architectures may not detect Interest loops, even if the network in which they operate is static and no faults occur. Furthermore, we show that no correct Interest forwarding strategy can be defined that allows Interest aggregation and attempts to detect Interest looping by identifying Interests uniquely. We introduce SIFAH (Strategy for Interest Forwarding and Aggregation with Hop-Counts), the first Interest forwarding strategy shown to be correct under any operational conditions of a content centric network. SIFAH operates by having forwarding information bases (FIBs) store the next hops and number of hops to named content, and by having each Interest state the name of the requested content and the hop count from the router forwarding an Interest to the content. We present the results of simulation experiments using the ndnSIM simulator comparing CCN and NDN with SIFAH. The results of these experiments illustrate the negative impact of undetected Interest looping when Interests are aggregated in CCN and NDN, and the performance advantages of using SIFAH

    United States v. George Tenet: A Federal Indictment for Torture

    Get PDF
    This Article addresses the absence of accountability for torture in the War on Terror. Part II examines the U.S. obligation under international law to investigate and prosecute acts of torture regardless of where such acts occurred. It also reviews the domestic legislation that implements this international obligation. Adopted by Congress to implement the Convention against Torture, the Torture Statute (18 U.S.C. § 2340A) establishes criminal liability for torture committed outside the United States. Part III then reviews the first and only case ever brought under the Torture Statute. Roy Belfast, Jr., a U.S. citizen, was prosecuted and subsequently convicted in 2008 for committing torture in Liberia. The Belfast case addressed several issues relating to the Torture Statute, including the definition of torture, the extraterritorial application of U.S. law, and the viability of potential defenses. Using the Belfast prosecution as a model, Part IV examines the criminal liability of George Tenet, who served as the Director of Central Intelligence during the time when several detainees listed in the SSCI Report were tortured. Tenet was responsible for the development and implementation of the CIA\u27s Detention and Interrogation Program. He personally authorized the use of enhanced interrogation techniques on high value detainees who were held at CIA black sites around the world. Finally, Part V provides a criminal indictment of Tenet based on the treatment of four detainees: Abu Zubaydah, Khalid Shaykh Muhammad, Abd al-Rahim al- Nashiri, and Ramzi Bin Al-Shibh. These detainees were held by the CIA at various facilities around the world during Tenet\u27s tenure as the Director of Central Intelligence. Under the guise of enhanced interrogation techniques, the CIA subjected each detainee to horrific treatment. They were, in fact, tortured

    The Tattered Tapestry of International Law

    Get PDF
    • …
    corecore