Beyond Privacy & Security: The Role of the Telecommunications Industry in...
From the perspective of private industry, Mieke Eoyang examines the interplay between US national security electronic surveillance and the US telecommunications companies that are necessary...
View ArticleProxy War Ethics
In this article, Anthony Pfaff discusses what ethical norms should govern proxy war and the relationships that sustain them; the way the existence of a benefactor-proxy relationship complicates the...
View ArticleUnderstanding Cyber Collateral Damage
In this article, Sasha Romanosky and Zachary Goldman address the problem of how to define “collateral damage” in the cyber realm. Arguing that unintended effects on data alone can constitute collateral...
View ArticleBefore Privacy, Power: The Structural Constitution & the Challenge of Mass...
The rich legal literature that has grown up to assess the constitutionality of bulk communications collection by the government has focused overwhelmingly—and understandably—on the challenge such...
View ArticleJust War and Conduct in War: An Airman’s Reflection
The business that we are all somehow associated with—of contemplating war, preparing for war, deterring war, initiating war, prosecuting war, providing relief in war, ending war, recovering from war—is...
View Article