Latest in Readings


Readings: “A New Strategy for Reducing the Threat of Dangerous Øday Sales to Global Security and the Economy,” by Michele Golabek-Goldman

We have discussed the manifold challenges of zero day vulnerabilities quite a lot on this blog – why they are central to the cybersecurity challenge, how their discovery is vital to both offensive and defensive postures in cybersecurity, optimal USG policy on stockpiling v.

FISA: 702 Collection

Readings: NSA Report on the 702 Program

Below is the text of a Report/public comment on the 702 program submitted by the NSA Civil Liberties and Privacy Office to the Privacy and Civil Liberties Oversight Board (PCLOB), dated April 16, 2014. It doesn't appear to have received much notice so far (and doesn't seem to be online yet).  The following text of the Report is taken from a pdf issued on NSA letterhead, dated April 16, 2014:



Readings: A Critique of 'Jus Post Bellum' in International Law, by Eric De Brabandere

In the past two decades or so, an enormous amount of academic international law and policy attention has gone to the concept of jus post bellum, or "post conflict justice."  There are various ways of rendering the phrase with varying intellectual or political commitments implied - "post-conflict transitional justice," "law and obligations applicable to the post-conflict," or "moral obligations of parties to a conflict after the conflict," and so on.

International Law: LOAC

Readings: "Charting the Legal Geography of NIAC" by Michael Schmitt

I'll be participating this week in a Naval War College workshop on "Legal Implications of Autonomous Weapons," and since my presentation topic at the workshop is "area of operations" with respect to autonomous weapons, I thought it might be a good idea to check on any recent scholarship on what has come to be called the "legal geography" of conflict.

Relationship between LOAC and IHRL

Readings: "Using Force on Land to Suppress Piracy at Sea," by Steven R. Obert

Although piracy in the Indian Ocean by Somali pirates is sharply down in the last year or two, threats remain and an increase in attacks is far from impossible.  After all, little has been done to disrupt the land-based organizational, logistical, and financial structures of  Somali piracy.  Nearly all anti-piracy use-of-force actions have taken place at sea, without direct repercussions for the pirates ashore.  Not all, however; on May 14, 2012, a helicopter gunship belonging to the European Union Naval Force attacked a Somali pirate base on land, destroying several fiberglass skiffs.

International Law

Readings: Caelum Liberam: Air Defense Identification Zones Outside Sovereign Airspace, by Peter A. Dutton

Given all the discussion around China's controversial announcement this past week of an "Air Defense Identification Zone" in the East China Sea, it seems like a good moment for a Reading on the law and state practice of ADIZ.  Peter A.

Targeted Killing: Drones

Readings: Christine Fair, "Drones, Spies, Terrorists and Second-Class Citizenship in Pakistan - A Review Essay"

Georgetown University political scientist C. Christine Fair has been a leading voice in challenging much of the conventional wisdom about the nature of conflict in Pakistan, including the role of US drones, the Pakistani Taliban, and Pakistan's military.

Subscribe to Lawfare