A resilience agenda is an essential part of protecting national security in a digital age. Emphasizing resilience offers several benefits: 1) Resilience is threat agnostic or at least relatively threat neutral; 2) its inward focus emphasizes actions under the control of a targeted country, rather than attempting to change behaviors of external adversaries; and 3) because resilience can address multiple threats simultaneously, it may be less subject to politicization. This Article identifies tactics to bolster resilience against digitally enabled threats across three temporal phases: anticipating and preparing for disruptions, adapting to and withstanding disruptions, and recovering from disruptions. This Article concludes that a resilience strategy is ours to imagine and pursue, and doing so is a crucial step to strengthen national security for a digital age.
Privacy
This Article considers the national security implications of the legal vacuum concerning modern enhancements of data mining. Its key insight is to distinguish big data as an emergent entity from the countless events that constitute collectable information. The distinction allows us to think separately about the property entitlements and regulatory constraints attributable to the elements and the systems. This analytical step in turn clarifies which legal approaches may advance national security interests consistent with other values and commitments.
In the spring of 2020, when the editors of The University of Chicago Legal Forum chose “Law for the Next Pandemic” as the theme for their upcoming fall symposium, the title seemed rather pessimistic. Really, we’re going to have to do all of this again?
This Comment evaluates the extent to which the CARES Act Modifications sustainably balance individual privacy expectations with strong public interests in obtaining SUD records and integrated care. Moreover, it suggests avenues to fill gaps in protection for individuals with SUD after their information has been disclosed.
This Comment will analyze deepfakes in the interpersonal con-text—specifically the use of technology to make deepfaked nonconsensual pornography. Because deepfake images and videos appear so real, the scale of potentially negative impact is especially alarming.
Absent from the docket, and flying under the public’s radar, was another, different form of abortion restriction: the reason-based abortion ban. This Comment will focus on the possible constitutional justifications for these laws and subsequently undermine them.
Many women long to be mothers one day. Motherhood can take different forms; it can be adopting children, birthing biological children, or nurturing a stepchild, to name a few options. Some women who want biologically related children run a high risk of their children being born with an incurable disease, endangering their chance for biological children to lead healthy lives.
Observers have long debated the propriety of certain market exchanges involving the body, including prostitution, organ and gamete selling, commercial surrogacy, and blood and plasma markets, so called “contested commodities” or “taboo trades.” Although such disputes about the nature of market boundaries are long-standing, particularly in the context of the human body, recent years have seen a renewed focus on the ways in which attitudes about the proper scope of commercial exchange shape markets—and, indeed, dictate whether exchange for money occurs at all.