Too Dangerous to Disclose? FOIA, Courtroom “Visual Theory,” and the Legal Battle Over Detainee Abuse Photographs

2018 ◽  
Vol 43 (04) ◽  
pp. 1164-1187 ◽  
Author(s):  
Anna Veronica Banchik

As law deepens its engagement with visual data, legal scholars have expressed concern that courts all too often uphold photographic evidence as objective representations of truth, rather than as necessarily partial portrayals of reality. To combat this naïve realism in legal institutions, some are incorporating insights from media studies in calling for a jurisprudence of the visual. Drawing on an ongoing lawsuit over the disclosure of detainee abuse photographs taken in Iraq and Afghanistan after September 11, I suggest this project expand its scope to examine litigants' interpretations of images in courtrooms, as well as concerns beyond photographic objectivity that arise in disclosure disputes, including images' unique privacy implications and national security risks. Though the stakes in this case are atypical, these specific concerns are to varying degrees more germane. Having all been raised before, they are likely to be heard again, if only by a single judge or jury.

Author(s):  
Melvyn P. Leffler

This chapter considers the end of the Cold War as well as its implications for the September 11 attacks in 2001, roughly a decade after the Cold War ended. While studying the Cold War, the chapter illustrates how memory and values as well as fear and power shaped the behavior of human agents. Throughout that struggle, the divergent lessons of World War II pulsated through policymaking circles in Moscow and Washington. Now, in the aftermath of 9/11, governments around the world drew upon the lessons they had learned from their divergent national experiences as those experiences had become embedded in their respective national memories. For policymakers in Washington, memories of the Cold War and dreams of human freedom tempted the use of excessive power with tragic consequences. Memory, culture, and values played a key role in shaping the evolution of U.S. national security policy.


2011 ◽  
Vol 1 (1) ◽  
pp. 35-40 ◽  
Author(s):  
Matthew Warren ◽  
Shona Leitch

Australia has developed sophisticated national security policies and physical security agencies to protect against current and future security threats associated with critical infrastructure protection and cyber warfare protection. In this paper, the authors examine some common security risks that face Australia and how government policies and strategies have been developed and changed over time, for example, the proposed Australian Homeland Security department. This paper discusses the different steps that Australia has undertaken in relation to developing national policies to deal with critical infrastructure protection.


2019 ◽  
Vol 185 (3-4) ◽  
pp. 330-333 ◽  
Author(s):  
Sean D Mclaughlin ◽  
Ramey L Wilson

Abstract Developing, cultivating, and sustaining medical interoperability strengthens the support we provide to the warfighter by presenting our Commanders options and efficiencies to the way we can enable their operations. As our national security and defense strategies change the way our forces are employed to address our security risks throughout the world, some military commands will find they cannot provide adequate medical care without working in concert with willing and available partners.This article proposes a tiered framework that allows medical personnel to further describe and organize their engagement activities around the concept and practicalities of medical interoperability. As resources become diverted to other theaters or missions expand beyond assigned capabilities, medical interoperability provides Commanders with options to medically enable their missions through their partnerships with others. This framework links and connects activities and engagements to build partner capacity with long-term or regional interoperability among our partners and challenges engagement planners to consider ways to build interoperability at all four tiers when planning or executing health engagements and global health development. Using this framework when planning or evaluating an engagement or training event will illuminate opportunities to develop interoperability that might have otherwise been unappreciated or missed.


Author(s):  
Marianna Sokolova

The article examines the prospects and risks associated with the development of quantum technologies in the perspective of the US-China technological rivalry. In the coming decades, quantum technologies will act as a driving force for technological development, and the priority in the development and use of this innovative technology will pave the way for global technological leadership in national security, digital economy, military and defense industries. A number of future risks are predicted, among them those related to the socially fair use of quantum technologies, geopolitical and national security aspects of their use, and the need to create regulatory mechanisms (including international ones) and standards for quantum technologies. The question is raised about the current ethical initiatives of the IT and business communities to prevent the risks associated with quantum technologies in the future.


2021 ◽  
pp. 207-229
Author(s):  
Tetiana FASOLKO ◽  
Petro SEMYANCHUK ◽  
Olha FEDORCHUK

The exceptional importance, extreme necessity and permanent relevance of the study of national security problems of Ukraine are substantiated. The essence of Ukraine’s national security is clarified through protection of national interests and strengthening of national position in the spheres of health care, childhood protection, social policy, pension provision, housing and communal services, migration policy, financial services market, property rights protection, stock market and securities circulation, fiscal and customs policy, trade, business, banking services, investment policy, auditing, monetary policy, licensing, industry, agriculture, transport, communications, energy and energy saving, operation natural monopolies, subsoil use, land and water resources, minerals, education, science, science technology and innovation policy, cultural development, information protection, information technology, freedom of speech and information security, cyber security and cyber defence, ecology and environmental protection, law enforcement, anti-corruption, border activities, defence, and other areas of public administration. Elements of national security of Ukraine are grouped into economic, social, informational, educational-scientific, law enforcement, defence, ecological and cultural blocks, as well as a block of other spheres of public administration. The technique of calculation of the parameters defining level of stability and durability of national security of Ukraine is developed and offered on the basis of theoretical approach. The essence of risks, dangers and threats to the national security of Ukraine is highlighted. Variants and cases of inverse curvilinear dependence between the probability of occurrence of risks in the sphere of national security of Ukraine and the degree of stability and strength of national security of Ukraine are established, modelled and characterized. With the help of the defined integral, the methods of calculating losses and loss of benefits of the state, legal entities and individuals due to the occurrence of risks, as well as the field of spread of national security risks of Ukraine are outlined. The classification and attempt to calculate the probability of occurrence of national security risks of Ukraine by elements and blocks is made.


2020 ◽  
Author(s):  
Muhammad Firdaus

Supply chain security is a vital component of American national security. United State officials have continued to warn that 5G infrastructure equipment built by Huawei could be subverted by China to conduct espionage. There has been an intense investigation on Huawei, ranging from their software development processes to allegations of back doors. While it may be debated if Huawei is a pawn in a trade war or national security risks, it reinforces the importance of knowing one’s ecosystem. This article summarizes a panel discussion at the RSA2020 cybersecurity conference in San Francisco, titled "How to Reduce Supply Chain Risk: Lessons from Efforts to Block Huawei" was moderated by Craig Spiezle, founder of Agelight Advisory and Research Group, with panelists Katie Arrington, cyber information security officer of acquisitions for the U.S. Department of Defense; Donald Andy Purdy, chief security officer of Huawei Technologies USA; Bruce Schneier, security researcher and lecturer at the Harvard Kennedy School; and Kathryn Waldron, a fellow at R Street Institute. This session uses Huawei as a case study for best practices to assess risk and provide transparency to all stakeholders.


Sign in / Sign up

Export Citation Format

Share Document