By Andru E. Wall* — Click here to read the full text of the Article Modern warfare requires close integration of military and intelligence forces. The Secretary of Defense possesses authorities under Title 10 and Title 50 and is best suited to lead US government operations against external unconventional and cyber threats. Titles 10 and […]
Loving the Cyber Bomb? The Dangers of Threat Inflation in Cybersecurity Policy
By Jerry Brito* & Tate Watkins** — Click here to read the full text of the Article There has been no shortage of attention devoted to cybersecurity, with a wide range of experts warning of potential doomsday scenarios should the government not act to better secure the Internet. But this is not the first time […]
Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure
By Steven M. Bellovin*, Scott O. Bradner**, Whitfield Diffie***, Susan Landau****, and Jennifer Rexford***** — Click here to read the full text of the Article In an effort to protect its computer systems from malevolent actors, the U.S. government has developed a series of intrusion-detection and intrusion- prevention systems aimed at monitoring and screening traffic […]
Post-Human Humanitarian Law: The Law of War in the Age of Robotic Weapons
By Vik Kanwar* — Click here to read the full text of the Review Essay Vik Kanwar reviews: P.W. Singer, Wired for War: The Robotics Revolution and Conflict in the 21st Century (Penguin Press 2009), Ronald Arkin, Governing Lethal Behavior in Autonomous Robots (Chapman & Hall 2009), William H. Boothby, Weapons and the Law of […]
Detention
By Phillip B. Heymann* — Click here to read the full text of the Essay In response to various scholarly commentaries, Professor Philip Heymann argues that applying the law of war outside of the “normal state-against-state context,” in order to justify military detention, involves an “increased risk of mistakes, unfairness, and resentment by our allies,” […]
Untangling Attribution
By David D. Clark* and Susan Landau** — Click here to read the full text of the Essay As a result of increasing Internet insecurity — DDoS attacks, spam, cybercrime, and data theft — there have been calls for an Internet architecture that would link people to packets (the fundamental communications unit used in the […]
