scholarly journals Enabling National Security Through Dual-Use Technology

2014 ◽  
Author(s):  
Louis A. Kratz ◽  
Bradd A. Buckingham ◽  
Tzyh-Chyang Chang
Keyword(s):  

Significance It establishes a comprehensive framework for restricting export of military and dual-use products and technologies on national security grounds or for public policy reasons. It creates a legal basis for mandatory licensing or outright prohibition of the export of products, services or technologies based on their features, their end-users and end-uses, and geographical destinations. Impacts Export controls will help to maintain the international competitiveness of Chinese firms as their technological capabilities advance. Foreign companies may find themselves under investigation in China for acts they perform elsewhere. The law covers transportation, so shipping companies may need to reconsider their routing decisions.


2010 ◽  
Vol 1 (2) ◽  
pp. 20-22 ◽  
Author(s):  
Gary Marchant ◽  
Lyn Gulley
Keyword(s):  

2021 ◽  
Author(s):  
Melissa Flagg ◽  
◽  
Jack Corrigan

As dual-use technologies transform the national security landscape, the U.S. Department of Defense has established a variety of offices and programs dedicated to bringing private sector innovation into the military. However, these efforts have largely failed to drive cutting-edge commercial technology into major military platforms and systems. This report examines the shortcomings of the DOD’s current approach to defense innovation and offers recommendations for a more effective strategy.


Ethnography ◽  
2017 ◽  
Vol 19 (3) ◽  
pp. 411-430 ◽  
Author(s):  
Jesse Driscoll ◽  
Caroline Schuster

The discipline of anthropology recoils instinctively at the idea that its researchers' labor might contribute to the national security state; other disciplines celebrate the same contributions as evidence of policy impact. In this article, we examine the seductions of espionage for professionally vulnerable (untenured) researchers that employ ethnographic methods but are operating in the shadow of market incentives and the Global War on Terror. We define “extreme fieldwork” as a research design likely to yield the kinds of data that Price identifies as “Dual Use Anthropology.” The bulk of our essay is devoted to providing warrants for the claim that there are strong incentives to brand oneself as an “extreme” fieldworker – which may be the post-9/11 equivalent of chasing what Trouillot called the “savage slot.” We argue that for some topics in certain research settings, uncomfortably, the more care and effort one invests in ethnographic best practices, the more likely it is that the researcher will engage in behaviors that could be confused with spycraft.


2019 ◽  
Vol 10 (1) ◽  
pp. 171-183 ◽  
Author(s):  
Nathan Edward Clark

This article examines the dynamics of an emerging multi-use paradigm for satellite remote sensing (RS). From the beginning of the space age, RS satellites have served as dual-use technologies. The advancements to RS technology since that time have largely been driven by the security and economic interests of States. While these interests are to some extent mutually supporting, they have also created a complex environment where non-governmental actors such as commercial satellite operators are increasingly involved in matters of national security and defence. Furthermore, the growing number of RS data providers globally, and more open and easily accessible data and analysis tools online, are creating a new use paradigm for RS in civil-military relations. These developments are extending the dual-use technology dilemma to one of multi-use, where non-governmental actors, including ordinary individuals, are becoming entangled in government affairs. This article traces the trajectory of these processes, and discusses potential implications for RS capable States.


2004 ◽  
Vol 179 ◽  
pp. 804-810
Author(s):  
Richard P. Suttmeier

Review of Chinese Techno-Warriors: National Security and Strategic Competition from the Nuclear Age to the Information Age. By Evan Feigenbaum. [Stanford: Stanford University Press, 2003. 339 pp. US$ 55.00. ISBN 0-8047-4601-X.]China's growing technological capability has become the topic of the day among Western officials concerned with the national security and economic competitiveness implications of China's growing prominence. The publication of a study which attempts to explain how security and competitiveness have been linked in the evolution of Chinese technology policies is therefore quite timely. The effort to locate this linkage in the development of an ideology of techno-nationalism resonates nicely with perceptions – held by many in Western capitals – of a China with a special passion for the acquisition of dual use technology and a determination to use political means to secure economic advantage. The appearance of Evan Feigenbaum's book, which rightly locates China's technological trajectory at the centre of many of the more important questions about the Chinese future, is thus to be welcomed.


Author(s):  
William Banks

The central concepts that make up the Law of Armed Conflict (LOAC) have not been easy to adapt to cyber operations. In addition to their kinetic history and orientation, the core LOAC principles do not in most instances anticipate the kind of cyber-specific analysis that should accompany the use of increasingly advanced cyber systems and tools in conflict. Cyber operations rarely cause physical damage, much less injury or death. More often they cause cyber harm—by corrupting, manipulating or stealing data, denying access to a website, or interfering temporarily with the functionality of information systems. Or they indirectly disrupt or damage objects that are not part of the cyber domain. Measuring the harm from a cyber incident and calculating that harm in ways that the LOAC credits remains challenging, as does defining and distinguishing civilian and military objects, and accounting for the indirect effects of cyber operations. The LOAC also has not settled on a legal status for critical national security-related components of the cyber domain, including data and dual-use infrastructure.


Sign in / Sign up

Export Citation Format

Share Document