Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Knowledge Management

GQ: The Guantanamo Quagmire

Pearlman, Adam Ross, GQ: The Guantanamo Quagmire (June 9, 2016). Stanford Law & Policy Review, Vol. 27, 2016. Available for download at SSRN:

“Accepting for argument’s sake the twin premises that sending Operation Enduring Freedom detainees to Guantanamo Bay (GTMO) was in line with the international and domestic law of detention as it then existed, and that detaining suspected terrorists at GTMO achieved its core purpose of removing threats from the battlefield, and further allowed for the collection of useful intelligence from the detainees, this article examines why the GTMO is considered by many to be a “lightning rod,” a “political football,” or even an “albatross.”  As I have previously written, the government’s ultimate inability to successfully defend its application of prior habeas precedents has had significant legal consequences, including operational law incentives to lethally target combatants, and the development of international guidelines to fill supposed “legal ambiguities” in the rules troops must apply when detaining enemy forces in international armed conflicts. See “Meaningful Review and Process Due: How Guantanamo Detention is Changing the Battlefield,” Harvard National Security Journal (2015) – This article further examines the relationships and differences between law, policy, and politics in the context of detainee-related operations at GTMO. Taking a broad view of foreign policy and international relations, it examines how related but nonetheless discrete issues (e.g., law of war detention at GTMO versus intelligence interrogation at black sites) have been conflated in ways that have long-term legal and policy consequences, and that the name “Guantanamo Bay” is thus a cue for controversies that are perhaps as often mythical as grounded in fact.  Part I traces the evolution of American foreign policy and global leadership as driven by moral values. Part II examines two post-9/11 counterterrorism detention scandals often discussed in tandem with (if not entirely conflated with) GTMO — the Central Intelligence Agency’s (CIA) so-called rendition, detention, and interrogation (RDI) program, and the Abu Ghraib prisoner abuse scandal — that undercut the moral high ground and human rights focus around which successive presidential administrations conducted international relations. Part III analyzes the dynamics of modern communications and the influence of globalized, decentralized, and instant reporting of news on U.S. national security policymaking, particularly with respect to GTMO and detention-related issues. Part IV concludes by laying out the long-term consequences of the resulting dubious conventional wisdom that several aspects of U.S. detention policy violate international law, and asserts that a significant factor in GTMO’s supposed radioactivity has been self-imposed by failing adequately to articulate and defend legal and strategic decisions made early on, and subsequently adopting the human rights community’s talking points in high-level political rhetoric, which have made GTMO more politically toxic than necessary.”

Searching for the Internet of Things on the Web: Where It Is and What It Looks Like

Searching for the Internet of Things on the Web: Where It Is and What It Looks Like. Ali Shemshadi, Quan Z. Sheng, Wei Emma Zhang, Aixin Sun, Yongrui Qin, Lina Yao  (Submitted on 23 Jul 2016). “The Internet of Things (IoT), in general, is a compelling paradigm that aims to connect everyday objects to the… Continue Reading

Combined Measurement of the Higgs Boson Mass in pp Collisions at s√=7 and 8 TeV with the ATLAS and CMS Experiments

A remarkable example of and tribute to the 5154 authors from around the world who collaborated as scholars to publish this paper jointly. Combined Measurement of the Higgs Boson Mass in pp Collisions at s√=7 and 8 TeV with the ATLAS and CMS Experiments “A measurement of the Higgs boson mass is presented based on… Continue Reading

British University Tests Drones That Scan For Evidence Of Landmines

Popular Science: “Landmines never stop waiting. The simple machines are explosives with triggers, set in the ground primed and ready for someone to set them off. For landmines, the war never ends. For humans, war does, and the landmines that once marked the front line between warring factions can change instead to deadly artifacts, a… Continue Reading

HHS issues funding opportunities for Info Sharing and Analysis Organization for health and public health sector

“The U.S. Department of Health and Human Services’ (HHS) Office of the National Coordinator for Health Information Technology (ONC) and Assistant Secretary for Preparedness and Response (ASPR) today announced two cooperative agreement funding opportunities for an Information Sharing and Analysis Organization (ISAO) for the Healthcare and Public Health sector.  “Establishing robust threat information sharing infrastructure… Continue Reading

BBC open access to archive of plans for response to nuclear war

BBC Magazine – The BBC’s detailed plans for nuclear war: “For the first time, the BBC has given detailed access to the plans it drew up in the Cold War for a Wartime Broadcasting System to operate in the event of nuclear war. Paul Reynolds, a former BBC diplomatic and foreign correspondent, has been studying… Continue Reading

Law Journals: Submissions and Ranking, 2008 – 2015

Washington and Lee School of Law – “The purpose of the Law Journal Rankings Project is to give scholars a resource to locate law journals by subject, country or publication, or ranking (where available), to display journal editorial information, and to facilitate an author’s article submission to those journals. . The site currently ranks journals… Continue Reading

Report – Mitigating the Cybersecurity Skills Shortage

Mitigating the Cybersecurity Skills Shortage – Top Insights and Actions from Cisco Security Advisory Services “Increasingly sophisticated threat campaigns. High-profile data breaches. Determined threat actors. The sophistication of the technology and tactics used by criminals has outpaced the ability of IT and security professionals to address these threats. Security Magazine reports that “most organizations do… Continue Reading

Report by 3 companies – Cyber resiliency in the Fourth Industrial Revolution

Cyber resiliency in the Fourth Industrial Revolution – A roadmap for global leaders facing emerging cyber threats “The First Industrial Revolution, in the late 18th century, was driven largely by steam engines. The second, in the late 19th century, introduced mass production and the division of labor. The third, in the late 20th century, involved… Continue Reading

St. Louis Fed releases beta forecasting game

“The St. Louis Fed has developed a forecasting game to go with FRED, called FREDcast (still in beta).  There is a link to a training webinar:” [via Katrina Stierholz, Federal Reserve Bank of St. Louis] Continue Reading

Vintage Aerial – photos of the places where memories were made

“Vintage Aerial has over 25 million photos, taken in 41 states over the second half of the twentieth century. If you are looking for an aerial photograph of a rural area or small township, we most likely have your picture. Start your search now by selecting your state and county…” Continue Reading

Announcing the development of SocArXiv, an open social science archive

“SocArXiv announces a partnership with the Center for Open Science to develop a free, open access, open source archive for social science research. The initiative responds to growing recognition of the need for faster, open sharing of research on a truly open access platform for the social sciences. Papers on SocArXiv will be permanently available… Continue Reading