Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-dfsvx Total loading time: 0 Render date: 2024-04-26T14:26:13.441Z Has data issue: false hasContentIssue false

Select Bibliography

Published online by Cambridge University Press:  14 December 2018

William H. Boothby
Affiliation:
Geneva Centre for Security Policy
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2018

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Select Bibliography

Abbott, K. W., Marchant, G. E. and Sylvester, D. J., ‘Transnational Regulation: Reality or Romanticism?’, in Hodge, G., Bowman, D. and Maynard, A. (eds.), International Handbook on Regulating Nanotechnologies (Cheltenham: Edward Elgar, 2010).Google Scholar
Abbott, K. W., Marchant, G. E. and Sylvester, D. J., ‘A Framework Convention for Nanotechnology?Environmental Law Reporter, 36 (2006), 1093110942.Google Scholar
Abuya, K., ‘Kenya’s Computer and Cybercrimes Bill 2016 Gets Approval’, techweez, 7 April 2017, available at www.techweez.com/2017/04/07/computer-cybercrimes-bill-2017-kenya-approved/.Google Scholar
Academy of Medical Sciences, the British Academy, the Royal Academy of Engineering and the Royal Society, ‘Human enhancement and the future of work’, Report from a joint workshop hosted by the, November 2012, available at www.acmedsci.ac.uk/viewFile/publicationDownloads/135228646747.pdf.Google Scholar
Ackerman, S., ‘Army’s Fingerprint and Iris Scan Databases Head for the Cloud’, Wired, 30 May 2013, at www.wired.com/2013/05/army-biometrics-cloud/.Google Scholar
Ackerman, E., ‘FAA Unveils Drone Rules: Autonomy is In, Drone Delivery is Out’, IEEE Spectrum, 16 February 2015, available at http://spectrum.ieee.org/automaton/robotics/drones/faa-proposed-commercial-drone-rules.Google Scholar
Airbus Corporation, ‘CityAirbus demonstrator passes major propulsion testing milestone’, available at www.airbus.com/newsroom/press-releases/en/2017/10/cityairbus-demonstrator-passes-major-propulsion-testing-mileston.html, accessed on 9 February 2018.Google Scholar
Aldrich, G., ‘Questions of International Law raised by the Seizure of the USS Pueblo’ (1969) 63 Proceedings of the American Society of International Law at Its Annual Meeting (1921–1969) 2.Google Scholar
Alexander, D., ‘Retired General cautions against overuse of “hated” drones’, Reuters, 7 January 2013, available at www.reuters.com/article/us-usa-afghanistan-mcchrystal/retired-general-cautions-against-overuse-ofhated-drones-idUSBRE90608O20130107.Google Scholar
Allen Institute for Brain Science, available at www.alleninstitute.org/what-we-do/brain-science/.Google Scholar
Allenby, B. R., ‘Are new Technologies Undermining the Laws of War?’, Bulletin of the Atomic Scientists, 70(1) (2014), 21.CrossRefGoogle Scholar
Altmann, J., Military Nanotechnology: Potential Applications and Preventive Arms Control (Routledge, 2006).Google Scholar
Alvelda, P., ‘Neural Engineering System Design’ (NESD), 2017, available at www.darpa.mil/program/neural-engineering-system-design.Google Scholar
An, W.-N., Chen, Z., et al., ‘Remote Target Recognition and Tracking Based on Biometric Characteristics’, 2017 Conference on Electrical Engineering and Automation Control, available at http://dpi-proceedings.com/index.php/dtetr/article/viewFile/10741/10291.CrossRefGoogle Scholar
Andenas, M., ‘Reassertion and Transformation: From Fragmentation to Convergence in International Law’, 46 Georgetown Journal of International Law (2015) 685734.Google Scholar
Annas, G. J., ‘Protecting Soldiers from Friendly Fire: The Consent Requirement for Using Investigational Drugs and Vaccines in Combat’, (1998) 24 American Journal of Law & Medicine 245, at 253.Google ScholarPubMed
Andrew, C. and Mitrokhin, V., The Mitrokhin Archive: The KGB in Europe and the West (Alan Lane/The Penguin Press, 1999).Google Scholar
Armstrong, R., et al., Bio-Inspired Innovation and National Security (Washington: National Defence University Press, 2010),CrossRefGoogle Scholar
Arreguin-Toft, I., ‘How the Weak Win Wars. A Theory of Asymmetric Conflict’, International Security, 8 December 2005, 26: 1, 93–128.CrossRefGoogle Scholar
Astor, M., ‘Microchip Implants for Employees? One Company Says Yes’, New York Times, 25 July 2017.Google Scholar
Atwood, M., ‘Margaret Atwood: The Road to Ustopia’, The Guardian, 14 October 2011.Google Scholar
Auchard, E., ‘Macron campaign was target of cyber attacks by spy-linked group’, Reuters, 24 April 2017, available at www.reuters.com/article/us-france-election-macron-cyberidUSKBN17Q200.Google Scholar
Australia, ‘Intelligence, Surveillance and Reconnaissance, Space, Electronic Warfare and Cyber Security’, Defence White Paper, 2016, at www.defence.gov.au/Whitepaper/docs/ISR-Cyber.pdf.Google Scholar
Australian Government, Australia’s Cyber Security Strategy (2016), p. 28, available at https://cybersecuritystrategy.dpmc.gov.au/assets/img/PMC-Cyber-Strategy.pdf.Google Scholar
Australian Government Department of Defence, ‘Department of Defence extends Optus Satellite contract’, 1 June 2017, available at www.minister.defence.gov.au/minister/marise-payne/media-releases/department-defence-extnds-optus-satellite-contract.Google Scholar
Backstrom, A. and Henderson, I., ‘New Capabilities in Warfare: An Overview of Contemporary Technological Developments and the Associated Legal and Engineering Issues in Article 36 Weapons Reviews’, International Review of the Red Cross, 94 (2012), 483.Google Scholar
Baird, D. and Shew, A., ‘Probing the History of Scanning Tunneling Microscopy’, in Baird, D., Nordmann, A., and Schummer, J. (eds.), Discovering the Nanoscale (IOS Press, 2004), 145156.Google Scholar
Baker, B., ‘Booming Biometrics: How Human Data Is Transforming the Battlefield’, Army Technology, 18 March 2014.Google Scholar
Balbus, J. M., et al., ‘Meeting Report: Hazard Assessment for Nanoparticles – Report from an Interdisciplinary Workshop’, Environmental Health Perspectives, 115(11) (2007), 1654.CrossRefGoogle ScholarPubMed
BBC News, ‘Anthrax Jab Side-Effects Withheld’, BBC News (21 February 2004), available at http://news.bbc.co.uk/2/hi/asia-pacific/3509037.stm.Google Scholar
BBC News, ‘Music Torture: How Heavy Metal Broke Manuel Noriega’, BBC News, 30 May 2017, available at www.bbc.co.uk/news/world-latin-america-40090809Google Scholar
Bean, J., ‘Enhanced Blast Weapons and Forward Medical Treatment’, US Army Medical Department Journal, (April–June 2004), 48–51.Google Scholar
Beard, M., Galliott, J. and Lynch, S., ‘Soldier Enhancement: Ethical Risks and Opportunities’, Australian Army Journal XII:1 (Winter 2016), 13.Google Scholar
Bell, G., Talk entitled ‘Managing the Machines: Building a New Applied Science for the 21st Century’ (2018), available at https://cecs.anu.edu.au/3a-institute.Google Scholar
Bellinger, J. B. III, legal adviser to the State Department and William J. Haynes II, Department of Defense General Counsel, 3 November 2006, available at www.defenselink.mil/news/newsarticle.aspx?id=3308.Google Scholar
Bellovin, S. M., Blaze, M., Clark, S. and Landau, S., ‘Lawful Hacking: Using Existing Vulnerabilities for Wiretapping on the Internet,’ Northwestern Journal of Technology and Intellectual Property (2014); 12(1): 364.Google Scholar
Bender, B., ‘Pentagon Considers Using Electricity to Stimulate Troops’ Brains’, Boston Globe, 18 February 2014.Google Scholar
Moses, L. Bennett, ‘Sui Generis Rules’, in Marchant, G. E., Allenby, B. R. and Heckert, J. R. (eds.), The Growing Gap between Emerging Technologies and Legal-Ethical Oversight: The Pacing Problem, Vol. 7, International Library of Ethics, Law and Technology (New York: Springer, 2011).Google Scholar
Moses, L. Bennett and Chan, J., ‘Using Big Data for Legal and Law Enforcement Decisions: Testing the New Tools’ (2014), 37(2), University of New South Wales Law Journal 643.Google Scholar
Bergeson, L. L. and Plamondon, J. E., ‘TSCA and Engineered Nanoscale Substances’, Nanotechnology Law & Business, 4 (2007), 51.Google Scholar
Berube, D. M., Nano-Hype: the Truth behind the Nanotechnology Buzz (Amherst, NY: Prometheus Books, 2006).Google Scholar
Bing, C., ‘NSA Technical Director: Sharing Hacker Information Isn’t Enough, We Need a Shared Response’, 30 March 2017, Cyberscoop, available at www.cyberscoop.com/nsa-technical-director-sharing-hacker-information-isnt-enough-need-shared-response/.Google Scholar
Binnig, G., et al., ‘Surface Studies by Scanning Tunneling Microscopy’, Physical Review Letters, 49(1) (1982), 57.CrossRefGoogle Scholar
Binnig, G. and Rohrer, H., ‘In Touch with Atoms’, Reviews of Modern Physics, 71(2) (1999), S324–330, S324.CrossRefGoogle Scholar
Binnig, G. and Rohrer, H., ‘Scanning Tunneling Microscopy’, IBM Journal of Research and Development, 44(1/2) (2000), 279.CrossRefGoogle Scholar
Bird, J. and Bird, G., ‘Human Rights and the Military: The “Chemical Soldier” (2005) 30 Alternative Law Journal 81, 8185.CrossRefGoogle Scholar
Birnbaum, M., ‘Russian Submarines are Prowling Around Vital Undersea Cables. It’s Making NATO Nervous’, The Washington Post, available at www.washingtonpost.com/world/europe/russian-submarines-are-prowling-around-vital-undersea-cables-its-making-nato-nervous/2017/12/22/d4c1f3da-e5d0-11e7-927a-e72eac1e73b6_story.html?utm_term=.c8392188f79e.Google Scholar
Blue Brain Project, Digital Reconstruction, available at https://bluebrain.epfl.ch/cms/lang/en/pid/59963.Google Scholar
Boire, R. G., ‘Civil Liberties for the Mind: At the Crossroads of Civil Liberties and the Law’, Mind Matters (Centre for Cognitive Liberty & Ethics) 1:2 (2004).Google Scholar
Boone, J., ‘US Army Amasses Biometric Data in Afghanistan’, The Guardian, 27 October 2010, at www.theguardian.com/world/2010/oct/27/us-army-biometric-data-afghanistan.Google Scholar
Boothby, W. H., The Law of Targeting (Oxford: Oxford University Press, 2012).CrossRefGoogle Scholar
Boothby, W. H., ‘How Will Weapons Reviews Address the Challenges Posed by New Technologies?’, Military Law and the Law of War Review, 52(1) (2013), 58.CrossRefGoogle Scholar
Boothby, W. H., Weapons and the Law of Armed Conflict, 2nd edn (Oxford: Oxford University Press, 2016).Google Scholar
Borger, J., ‘Chinese Warship Seizes US Underwater Drone in International Waters’, The Guardian, 16 December 2016, available at www.theguardian.com/world/2016/dec/16/china-seizes-us-underwater-drone-south-china-sea.Google Scholar
Borm, P. J. A., et al., ‘The Potential Risks of Nanomaterials: A Review Carried Out for ECETOC’, Particle and Fibre Toxicology, 3(1) (2006).CrossRefGoogle ScholarPubMed
Bostrom, N. and Sandberg, A., ‘Cognitive Enhancement: Methods, Ethics, Regulatory Challenges’, Science and Engineering Ethics 15:3 (September 2009), 312.Google ScholarPubMed
Boudette, N. E. and Vlasic, B., ‘Tesla Self-Driving System Faulted by Safety Agency in Crash’, New York Times, 12 September 2017, available at www.nytimes.com/2017/09/12/business/self-driving-cars.html.Google Scholar
Boulanin, V., Implementing Article 36 Weapon Reviews in the Light of Increasing Autonomy in Weapon Systems (November 2015) SIPRI Insights on Peace and Security, available at www.sipri.org/sites/default/files/files/insight/SIPRIInsight1501.pdf.Google Scholar
Boverhof, D. R., et al., ‘Comparative Assessment of Nanomaterial Definitions and Safety Evaluation Considerations’, Regulatory Toxicology and Pharmacology, 73(1) (2015), 137150.CrossRefGoogle ScholarPubMed
Bowman, D. M., ‘More than a Decade On: Mapping today’s Regulatory and Policy Landscape following the publication of Nanoscience and Nanotechnologies: Opportunities and Uncertainties’, NanoEthics, 11(2) (2017), 169186.CrossRefGoogle Scholar
Bowman, D. M. and Gatof, J., ‘Reviewing the Regulatory Barriers for Nanomedicine: Global Questions and Challenges’, Nanomedicine, 10(21) (2015), 3275.CrossRefGoogle ScholarPubMed
Bowman, D. M. and Hodge, G., ‘A Small Matter of Regulation: An International Review of Nanotechnology Regulation’, Columbia Science and Technology Law Review, 8 (2007), 5.Google Scholar
Bronitt, S. and Stellios, J., ‘Regulating Telecommunications Interception and Access in the Twenty-first Century: Technological Evolution or Legal Revolution?’ (2006) 24 Prometheus: Critical Studies in Innovation 413.Google Scholar
Bronitt, S. and McSherry, B., Principles of Criminal Law, 3rd edn (Sydney: Lawbook Co), 2010, 6.Google Scholar
Brownsword, R. and Goodwin, M., Law and the Technologies of the Twenty-First Century: Text and Materials (Cambridge: Cambridge University Press, 2012).CrossRefGoogle Scholar
Brueck, H., This Tiny Robot Team Could Help Stop the No. 1 Killer in America (12 January 2016) Fortune, available at http://fortune.com/2016/01/12/artery-clearing-nanobot/.Google Scholar
Brundage, M., et al., The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation (February 2018), available at https://img1.wsimg.com/blobby/go/3d82daa4–97fe-4096–9c6b-376b92c619de/downloads/1c6q2kc4v_50335.pdf.Google Scholar
Buhrow, W., Biometrics in Support of Military Operations: Lessons from the Battlefield (Boca Raton: Taylor and Francis, 2017), 6465.Google Scholar
Burgess, M., ‘Wikileaks Drops “Dark Matter”: Part Two of Its Vault 7 CIA leaks’, Wired, 24 March 2017.Google Scholar
Burkeman, O. and Norton-Taylor, R., ‘US Pilots Blame Drug for Friendly Fire Deaths’, The Guardian 4 January 2003.Google Scholar
Bushak, L., ‘Robot Surgeon Succeeds Without Help From Human Doctors’, Medical Daily, 13 May 2016, available at www.medicaldaily.com/robot-surgeon-smart-tissue-autonomous-386079.Google Scholar
Buzea, C., Ivan, P. and Robbie, K., ‘Nanomaterials and Nanoparticles: Sources and Toxicity’, Biointerphases, 2(4) (2007), 1771.CrossRefGoogle ScholarPubMed
Caldwell, J., et al., ‘Modafinil’s Effects on Simulator Performance and Mood in Pilots during 37 Hours without Sleep’, Aviation, Space and Environmental Medicine 75:9 (September 2004), 777784.Google Scholar
Caiyu, L., ‘China’s First Quantum Information Network Will Prevent Hacking: Expert’, Global Times, 9 July 2017.Google Scholar
Canada Communications Security Establishment, Cyber Threats to Canada’s Democratic Process, 7 June 2017, available at www.cse-cst.gc.ca/sites/default/files/cse-cyber-threat-assessment-e.pdf.Google Scholar
Carter, L., Burnett, D., Drew, S., Marle, G., Hagadorn, L., Bartlett-McNeill, D. and Irvine, N., Submarine Cables and the Oceans: Connecting the World, at 8 (UNEP-WCMC Biodiversity Series No. 31, ICPC / UNEP-WCMC (2009), available at www.iscpc.org/documents/?id=132.Google Scholar
Carozza, P. G., ‘Human Dignity’, in Shelton, D. (ed.) The Oxford Handbook of International Human Rights Law (Oxford: Oxford University Press, 2013) 345359, 354.Google Scholar
Carter, A. B., Lettre, M. and Smith, S., ‘Keeping the Technological Edge’, 129. See also H. Kleinberg, ‘On War in Space’, (2007) 5 Astropolitics, 19.Google Scholar
Casey-Maslen, S., Corney, N. and Dymond-Bass, A., ‘The Review of Weapons under International Humanitarian Law and Human Rights Law’, in Casey-Maslen, S. (ed.), Weapons under International Human Rights Law (Cambridge: Cambridge University Press, 2014).CrossRefGoogle Scholar
Casey-Maslen, S. and Connolly, S., Police Use of Force under International Law (New York: Cambridge University Press, 2017).CrossRefGoogle Scholar
Chameau, J.-L., et al., Emerging and Readily Available Technologies and National Security: A Framework for Addressing Ethical, Legal, and Societal Issues (Washington: National Academies Press , 2014) 72.Google Scholar
Chambers, C., ‘Neuro-Enhancement in the Military: Far-Fetched or an Inevitable Future’, The Guardian, 7 October 2016.Google Scholar
Champion, E., ‘Thirty-five Arguments against Google Glass’, Reluctant Habits (14 March 2013), available at www.edrants.com/thirty-five-arguments-against-google-glass/ accessed 17 February 2018.Google Scholar
Chan, E., ‘The Food and Drug Administration and the Future of the Brain-Computer Interface: Adapting FDA Device Law to the Challenges of Human-Machine Enhancement,’ John Marshall Journal of Computer and Information Law (2007); 25: 117164.Google Scholar
Chatterjee, A., ‘The Ethics of Neuroenhancement’, Handbook of Clinical Neurology, 118 (2013), 323.CrossRefGoogle ScholarPubMed
Chaudhry, Q., et al., Final Report: A Scoping Study to Identify Gaps in Environmental Regulation for the Products and Applications of Nanotechnologies (2006) Safe Nano www.safenano.org/media/109893/DEFRA2005-Review_of_gaps_in_environmental_regulation_for_the%20products_and_applications_of_nanotechnologies.pdf.Google Scholar
Chengzhi, L., ‘The Chinese GNSS System development and policy analysis’, (2013) 29 Space Policy, 9.Google Scholar
Chemical Watch, ‘EU Consults on Nanomaterial Definition: Revision of Recommendation Three Years Late’, Chemical Watch, 19 September 2017, available at https://chemicalwatch.com/59016/eu-consults-onnanomaterial-definition.Google Scholar
International Committee of the Red Cross, ‘Rule 154. Obedience to Superior Orders’, Customary International Humanitarian Law Database, available at https://ihl-databases.icrc.org/customary-ihl/eng/docs/v1_rul_rule154.Google Scholar
Cho, E. S., et al., ‘Graphene Oxide/Metal Nanocrystal Multilaminates as the Atomic Limit for Safe and Selective Hydrogen Storage’, Nature Communications, (2016) www.nature.com/articles/ncomms10804.pdf.CrossRefGoogle Scholar
Clausen, Jens, et al., ‘Help, Hope, and Hype: Ethical Dimensions of Neuroprosthetics’ Science, 30 Jun 2017:. 356, 6345, 1338–1339, DOI: 10.1126/science.aam7731.CrossRefGoogle Scholar
CNN, ‘Bush presents Congressional Medal of Honor’, 16 July 2001, available at http://edition.cnn.com/TRANSCRIPTS/0107/16/se.02.html.Google Scholar
Coats, D. R., ‘Worldwide Threat Assessment of the US Intelligence Community’, 11 May 2017, available at www.dni.gov/files/documents/Newsroom/Testimonies/SSCI%20Unclassified%20SFR%20-%20Final.pdf.Google Scholar
Coglianese, C. and Lehr, D., ‘Regulating by Robot: Administrative Decision Making in the Machine-Learning Age,’ Georgetown Law Journal (2017); 105: 11471223.Google Scholar
Kadosh, R. Cohen, ‘Using Transcranial Electrical Stimulation to Enhance Cognitive Functions in the Typical and Atypical Brain”, 4 (March 2013), Translational Neuroscience, 20–33.CrossRefGoogle Scholar
Cole, R. H., Operation Just Cause: The Planning and Execution of Joint Operations in Panama, February 1988-January 1990 (Joint History Office, Office of the Chairman of the Joint Chiefs of Staff, Washington 1995) 59–60.Google Scholar
Collins, P., ‘The Value of Respect: What Does It Mean for an Army?’, Journal of Military Ethics 16:12, 2.Google Scholar
Committee on Opportunities in Neuroscience for Future Army Applications, Opportunities in Neuroscience for Future Army Applications (2009), 117, available at www.ncbi.nlm.nih.gov/books/NBK207983/.Google Scholar
Committee on Toxicity of Chemicals in Food, Consumer Products and the Environment, The Toxicology of Nanoparticles Used in Healthcare Products (2006) HM Government, available at https://cot.food.gov.uk/sites/default/files/cot/cotstatementnanomats200701.pdf.Google Scholar
Conte, A., ‘Drones with facial recognition technology will end anonymity, everywhere’, Business Insider, 27 May 2013, available at www.businessinsider.com/facial-recognition-technology-and-drones-2013-5?IR=T.Google Scholar
Cosumano, J. M. Jr, ‘A Day without Space: Ensuring It Doesn’t Happen’, Summer 2002, Army Space Journal, 2–3.Google Scholar
Corbyn, Z. ‘Crispr: Is It A Good Idea to “Upgrade” Our DNA?’ The Observer (London) 10 May 2015.Google Scholar
Corera, G., ‘NHS Cyber attack was “launched by North Korea”’, BBC News, 16 June 2017, available at www.bbc.co.uk/news/technology-40297493.Google Scholar
Corfield, G., ‘BAe Systems’ Autonomous Research Aircraft Flies Itself To Scotland’, The Register, 5 December 2016, available at www.theregister.co.uk/2016/12/05/bae_systems_autonomous_flying/.Google Scholar
Lt Col DrCornum, R. Caldwell, J. and Lt Col Cornum, K., ‘Stimulant Use in Extended Flight Operations’, Airpower Journal (Spring 1997), 57, available online: https://pdfs.semanticscholar.org/8128/64ff145b4a3916b824311ed1dbb554384178.pdf.Google Scholar
Crowley, M., ‘The Use of Incapacitants in Law Enforcement’, in Casey-Maslen (ed.), Weapons under International Human Rights Law, 357– 381, 358.CrossRefGoogle Scholar
Daily Telegraph, ‘Google Removes 640 Videos From Youtube Promoting Terrorism’, 18 June 2012, available at www.telegraph.co.uk/technology/google/9337993/Google-removes-640-videos-from-YouTube-promoting-terrorism.html.Google Scholar
Dando, M., ‘Find the Time to Discuss New Bioweapons’, Nature, 535 (2016), 9.CrossRefGoogle ScholarPubMed
Daoust, I., Coupland, R. and Ishoey, R., ‘New Wars, New Weapons? The Obligation of States to Assess the Legality of Means and Methods of Warfare’ (2002) 846 IRRC 345, 348.Google Scholar
DARPA Launches Biological Technologies Office, 1 April 2014, available at www.darpa.mil/news-events/2014-04-01.Google Scholar
Dearden, L., ‘ISIS Videos Targeted by Artificial Intelligence That Can Detect Propaganda Before It’s Uploaded’, The Independent, 13 February 2018, available at www.independent.co.uk/news/uk/home-news/isis-videos-artificial-intelligence-propaganda-ai-homeoffice-islamic-state-radicalisation-asi-data-a8207246.html.Google Scholar
Deeks, A., ‘Confronting and Adapting: Intelligence Agencies and International Law,’ Virginia Law Review (2016); 102(3): 599685.Google Scholar
Defense Advanced Research Projects Agency (DARPA), Systems of Neuromorphic Adapted Plastic Scalable Electronics (SyNAPSE), available at www.darpa.mil/program/systems-of-neuromorphic-adaptive-plastic-scalable-electronics.Google Scholar
Defense Advanced Research Projects Agency (DARPA), ‘Boosting Synaptic Plasticity to Accelerate Learning’, 16 March 2016, available at www.darpa.mil/newsevents/2016-03-16.Google Scholar
Defense Advanced Research Projects Agency, ‘Atoms to Product: Aiming to make Nanoscale Benefits Life-Sized’ (Media Release, 22 August 2014), available at www.darpa.mil/news-events/2014-08/22.Google Scholar
Defence Science Institure, Symposium, ‘Future Technologies for Personal Protection’, 7–8 November 2013, available at www.defencescienceinstitute.com/2012/09/10/dsi-dstosymposium-future-technologies-personal-protection/.Google Scholar
Denette, N., ‘Supreme Court Rejects Federal Government’s Argument That Omar Khadr Is an Adult Offender’, National Post, 14 May 2015, at http://nationalpost.com/news/canada/supreme-court-rejects-tory-argument-that-omar-khadr-was-adult-offender.Google Scholar
Department of Defense USA, ‘Department of Defense Directive’ (3000.03E), 25 April 2013, revised 27 September 2017, available at www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodd/300003p.pdf?ver=2017-09-27-125836-647.Google Scholar
de Zwart, M., ‘GOOGLE in Space? How Will Space Governance Accommodate Non-State Actors?’, (May 27, 2016), RUMLAE Research Paper No. 16–21, available at SSRN: https://ssrn.com/abstract=2809409.Google Scholar
de Zwart, M. and Stephens, D., ‘Non-Military Space Testing in the Woomera Prohibited Area: Opportunities for the Australian Space Industry?’, (2017) 45 Federal Law Review, 39.CrossRefGoogle Scholar
DiCarlo, J. J., ‘To Advance Artificial Intelligence, Reverse-Engineer the Brain,’ Wired, 3 February 2018.Google Scholar
Diehl BGT Mutual Active Protection System, described at www.defense-update.com/20110112_maps.html.Google Scholar
Dillow, C., ‘A Synthetic Brain Synapse Is Constructed from Carbon Nanotubes,’ Popular Science, 22 April 2011.Google Scholar
Dinniss, H. and Kleffner, J. K., ‘Soldier 2.0: Military Human Enhancement and International Law’, International Law Studies 92:432 (2016).Google Scholar
Dinstein, Y., The Conduct of Hostilities under the Law of International Armed Conflict, 3rd edn, (2016), 237–238.CrossRefGoogle Scholar
District Court for the District of Columbia, 16 February 2018; Case 1:18-cr-00032-DLF, available at www.justice.gov/file/1035477/download.Google Scholar
Dolnik, A. and Pilch, R., ‘The Moscow Theater Hostage Crisis: The Perpetrators, their Tactics and the Russian Response’ (2003) 8 International Negotiation 577, 600–601.Google Scholar
Dombe, A. R., ‘Biometric Target Recognition’, 19 March 2017, available at www.israeldefense.co.il/node/28881.Google Scholar
Donaldson, K., ‘The UK Would Respond to a Russian Cyber Attack with the Weapon of Its Own Choice’, Bloomberg, 18 December 2017.Google Scholar
Dorn, A. W., Keeping Watch: Monitoring, Technology and Innovation in UN Peace Operations (Tokyo: United Nations University Press, 2011), 2.Google Scholar
Doswald-Beck, L. (ed.) San Remo Manual on International Law Applicable to Armed Conflicts at Sea (Cambridge/San Remo: Cambridge University Press/International Institute of Humanitarian Law, 1995).CrossRefGoogle Scholar
Doswald-Beck, L., ‘Humanitarian Law in Future Wars’, in Schmitt, M. and Green, L. (eds.), The Law of Armed Conflict: Into the Next Millennium (Newport, RI: Naval War College, 2006) 139.Google Scholar
Dugué, G., Akemann, W. and Knöpfel, T., ‘A Comprehensive Concept of Optogenetics’, in Knöpfel, T. and Boyden, E. (eds.), Optogenetics: Tools for Controlling and Monitoring Neuronal Activity (New York: Elsevier, 2012).Google Scholar
Dymond-Bass, A. and Corney, N., ‘The Use of “Less-Lethal” Weapons in Law Enforcement’, in Casey-Maslen, S. (ed.), Weapons under International Human Rights Law (New York: Cambridge University Press, 2014).Google Scholar
Eckstein, M., ‘Navy Releases Details of New FFG(X) Guided Missile Frigate Program in Request to Industry’, 10 July 2017, available at https://news.usni.org/2017/07/10/navy-releases-details-of-new-ffgx-guided-missile-frigate-program-in-request-to-industry.Google Scholar
Eigler, D., ‘From the Bottom up: Building Things with Atoms’, in Timp, G. (ed.), Nanotechnology (Springer, 1999), 425435.Google Scholar
Eisenberg, A., ‘When Robotic Surgery Leaves Just a Scratch’, New York Times, 17 November 2012.Google Scholar
Emery, A. C., ‘Zero-Day Responsibility: The Benefits of a Safe Harbor for Cyber Security Research’, 57 Jurimetrics 4, Summer 2017, 483, 488489.Google Scholar
Enemark, C., ‘“Non-Lethal” Weapons and the Occupation of Iraq: Technology, Ethics and Law’ (2008) 21(2) Cambridge Review of International Affairs 199, 201.CrossRefGoogle Scholar
Environmental Protection Agency, Nanotechnology white paper (2007) US Government, available at www.epa.gov/sites/production/files/2015-01/documents/nanotechnology_whitepaper.pdf.Google Scholar
Estes, A., ‘The Pentagon is Putting Its Big Brother Data Collection in the Cloud’, Gizmodo, 01 June 2013, at www.gizmodo.com.au/2013/06/the-pentagon-is-putting-its-big-brother-data-collection-in-the-cloud/.Google Scholar
Estrada, A., ‘Modafinil as a Replacement for Dextroamphetamine for Sustaining Alertness in Military Helicopter Pilots’, Aviation, Space and Environmental Medicine, Vol. 83, No 6 (June 2012): 557.CrossRefGoogle ScholarPubMed
European Commission, Regulatory Aspects of Nanotechnologies: SEC(2008) 2036 (17 June 2008), available at https://ec.europa.eu/research/industrial_technologies/pdf/policy/comm_2008_0366_en.pdf.Google Scholar
European Commission, Second Regulatory Review on Nanomaterials (COM(2012) 572 final) (2012) , available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri%3DCOM:2012:0572:FIN:en:PDF.Google Scholar
European Commission, Draft Recommendation for tackling illegal material online, dated February 2018, available at https://edri.org/files/illegal_content_ec_draft_recommendation_201802.pdf.Google Scholar
European Court on Human Rights, Guide on Article 8 of The European Convention on Human Rights: Right to Respect for Private and Family Life (30 April 2017), available at www.echr.coe.int/Documents/Guide_Art_8_ENG.pdf.Google Scholar
European Data Protection Supervisor, Opinion 9/2016, ‘EDPS Opinion on Personal Information Management Systems: Towards more user empowerment in managing and processing personal data’, 20 October 2016, available at https://secure.edps.europa.eu/EDPSWEB/webdav/site/mySite/shared/Documents/Consultation/Opinions/2016/16–10–20_PIMS_opinion_EN.pdf.Google Scholar
FAA Advisory Circular 21–2 dated 21 June 2016, available at www.faa.gov/uas/media/AC_107-2_AFS-1_Signed.pdf.Google Scholar
Fan, S., ‘New Bionic Arm Blurs Line between Self and Machine for Wearers’ Singularity Hub, 4 April 2018, available at https://singularityhub.com/2018/04/04/new-bionic-arm-blurs-line-between-self-and-machine-for-wearers/#sm.0000ae0n81dp1ecg115s6ehz1nqub.Google Scholar
Farahany, N. A., ‘A Neurological Foundation for Freedom,’ Stanford Technology Law Review (7 December 2011): 11–53.Google Scholar
Feder, B. J. and Zeller, T. Jr, ‘Identity Badge Worn under Skin Approved for Use in Health Care’, 14 October 2014, www.nytimes.com/2004/10/14/technology/identity-badge-worn-under-skin-approved-for-use-in-health-care.html?_r=0.Google Scholar
Fein, G., ‘Surface Navy 2018: Saab’s NuMNS Extends MCM Operations’, 11 January 2018, available at www.janes.com/article/77005/surface-navy-2018-saab-s-mumns-extends-mcm-operations.Google Scholar
Fenrick, W. J., ‘The Conventional Weapons Convention: A Modest but Useful Treaty’, 279 IRRC 498 (1990) 500.Google Scholar
Fenrick, W., ‘The Law Applicable to Targeting and Proportionality after Operation Allied Force: A View from the Outside’ (2000) YIHL 51.Google Scholar
Fidler, D. P., ‘The International Legal Implications of “Non-Lethal” Weapons’ (1999) 21 Michigan Journal of International Law 51, 63.Google Scholar
Fidler, D. P., ‘The Meaning of Moscow: “Non-Lethal”‘Weapons and International Law in the 21st Century’, (2005) 859 IRRC 525 at pages 540–544.Google Scholar
Fidler, D. P., ‘Requiem for the Internet Freedom Strategy,’ Net Politics, 17 October 2017.Google Scholar
Fioretti, J., ‘French Privacy Watchdog Raps WhatsApp over Facebook Data Sharing’, Reuters, 18 December 2017, available at www.reuters.com/article/us-whatsapp-privacy-france/french-privacy-watchdog-raps-whatsapp-over-facebookdata-sharing-idUSKBN1EC285.Google Scholar
Food and Drug Administration, Is the Product a Medical Device?, available at www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/Overview/ClassifyYourDevice/ucm051512.htm.Google Scholar
Food and Drug Administration, Nanotechnology: a Report of the US Food And Drug Administration Nanotechnology Task Force (2007), US Government, available at www.fda.gov/ScienceResearch/SpecialTopics/Nanotechnology/ucm2006659.htm.Google Scholar
Food Standards Agency, Report of the FSA regulatory review (2008) HM Government, available at www.food.gov.uk/sites/default/files/multimedia/pdfs/nanoregreviewreport.pdf.Google Scholar
Hansen, S. Foss, et al., ‘Late Lessons from Early Warnings for Nanotechnology’, Nature Nanotechnology, 3(8) (2008), 444447.CrossRefGoogle Scholar
Foust, J., ‘Debating a Code of Conduct for Space’ The Space Review (online) 7 March 2011, www.thespacereview.com/article/1794/1.Google Scholar
Foust, J., ‘United Arab Emirates to Establish Human Spaceflight Program’, Space News (online) http://spacenews.com/united-arab-emirates-to-establish-human-spaceflight-program, 2 October 2017.Google Scholar
Friedman, R. A., ‘Why Are We Drugging Our Soldiers?’, New York Times, 21 April 2012.Google Scholar
Fuller, L., The Morality of Law (New Haven, CT: Yale University Press, 1969).Google Scholar
G7 Group of States, Declaration on Responsible States [sic] Behaviour in Cyberspace, full text available at www.esteri.it/mae/resource/doc/2017/04/declaration_on_cyberspace.pdf.Google Scholar
Gallego, J., ‘New Dust-Sized Implants May be the Key to Monitoring Your Internal Health’, Futurism, 5 August 2016.Google Scholar
Ganapati, P., ‘Surgical Robots Operate with Precision’, Wired, 9 November 2009, available at www.wired.com/2009/09/surgical-robots/.Google Scholar
Garlic, C. M., ‘Guidance by Clicks: The Unauthorized Practice of Law in a Technology Driven World,’ Trinity Law Review (2014); 19: 267307.Google Scholar
Gavaghan, C. and Moore, J, A Review of the Adequacy of New Zealand’s Regulatory Systems to Manage the Possible Impacts of Manufactured Nanomaterials (2011), available at www.academyconferences.com/pdf/nznanoreview.pdf.Google Scholar
Giles, J., ‘Beta-blockers Tackle Memories of Horror’, Nature (28 July 2005), 436, 448–449.Google Scholar
Global Commission, meeting at Las Vegas on 27 July 2017 as described at https://cyberstability.org/news/645–2/.Google Scholar
Goldblatt, J., Agreements for Arms Control: A Critical Survey (Stockholm International Peace Research Institute, 1982), 89.Google Scholar
Gonzalez, R., ‘Neuroscientists Just Launched an Atlas of the Developing Human Brian,’ Wired, 7 December 2017, available at www.wired.com/story/neuroscientists-just-launched-an-atlas-of-the-developing-human-brain/?mbid=BottomRelatedStories.Google Scholar
Greely, H. T., ‘Regulating Human Biological Enhancements: Questionable Justifications and International Complications’, Santa Clara Journal of International Law 4:2 (2006), 88.Google Scholar
Green, M. P. and Burnett, D. R., ‘Security of International Submarine Cable Infrastructure – Time to Rethink?’, in Nordquist, M. H., et al. eds., Legal Challenges in Maritime Security, (Dordrecht/Boston: Martinus Nijhoff, 2008).Google Scholar
Greenfield, A., Radical Technologies (New York: Verso, 2017).Google Scholar
Greenwood, C., ‘The Advisory Opinion on Nuclear Weapons and the Contribution of the International Court to International Humanitarian Law’ (1997), 316 IRRC 65, 73.CrossRefGoogle Scholar
Grigsby, A., ‘Year in Review: Militaries Got More Cyber in 2016,’ Net Politics, 26 December 2016.Google Scholar
Gross, M. L., ‘Bioethics and Armed Conflict: Mapping the Moral Dimensions of Medicine and War’, Hastings Centre Report 34, no 6 (2004), 23.CrossRefGoogle ScholarPubMed
Grush, L., ‘SpaceX Makes Aerospace History with Successful Launch and Landing of a Used Rocket’, 30 March 2017, theverge.com (online), www.theverge.com/2017/3/30/15117096/spacex-launch-reusable-rocket-success-falcon-9-landing.Google Scholar
The Guardian, ‘Mystery of Sonic Weapon Attacks at US Embassy in Cuba Deepens’, The Guardian, 15 September 2017, available at www.theguardian.com/world/2017/sep/14/mystery-of-sonic-weaponattacks-at-us-embassy-in-cuba-deepens.Google Scholar
The Guardian, ‘Russia Names Gas Used to End Siege’, The Guardian, 30 October 2002, available at www.theguardian.com/world/2002/oct/30/russia.Google Scholar
Haber, L. F., The Poison Cloud: Chemical Warfare in the First World War (Oxford: Oxford University Press, 1986).Google Scholar
Hambling, D., ‘Ships Fooled in GPS Spoofing Attack Suggest Russian Cyberweapon’, 10 August 2017, available at www.newscientist.com/article/2143499-ships-fooled-in-gps-spoofing-attack-suggest-russian-cyberweapon/.Google Scholar
The Hamlyn Symposium 2017, Surgical Robot Challenge 2017, available at http://hamlyn.doc.ic.ac.uk/hsmr/events/surgicalrobot-challenge-2017Google Scholar
Hansen, J., ‘Female Sex Hormone May Save Injured Soldiers on the Battlefield’, University of Alabama News Portal, 21 October 2015: www.uab.edu/medicine/news/latest/item/874-female-sex-hormone-may-save-injured-soldiers-on-the-battlefield.Google Scholar
Hansen, S., et al., ‘A Critical Analysis of the Environmental Dossiers from the OECD Sponsorship Programme for the Testing of Manufactured Nanomaterials’, Environmental Science: Nano, 4(2) (2017), 282291.Google Scholar
Hanson, H., ‘China’s Censorship Fingers Reach into Our Cyberspace’, The Weekend Australian, 24 June 2017, available at www.theaustralian.com.au/news/inquirer/chinas-censorship-fingers-reach-into-our-cyberspace/news-story/846944042e1e4227782611979a211cae.Google Scholar
Haque, J. and Bashir, O., ‘Banned Outfits in Pakistan Operate Openly on Facebook’, 13 June 2017, Dawn.Google Scholar
Hardesty, L., ‘Explained: Neural Networks,’ MIT News, 14 April 2017, available at http://news.mit.edu/2017/explained-neural-networks-deep-learning-0414.Google Scholar
Harris, D. J., O’Boyle, M., Bates, E. P. and Buckley, C. M., Law of the European Convention on Human Rights 3rd edn (Oxford: Oxford University Press, 2014).Google Scholar
Harris, G., Davis, J. Hirshfeld and London, E., ‘U.S. Expels 15 Cuban Diplomats, in Latest Sign Détente May Be Ending’, New York Times, 3 October 2017.Google Scholar
Harrison, R. G.Unpacking the Three C’s: Congested, Competitive, and Contested Space’ (2013) 11.3 Astropolitics. 123.CrossRefGoogle Scholar
Harrison, T., ‘Chaos and Uncertainty: The FYI 2014 Defense Budget and Beyond’, Centre for Strategic and Budgetary Assessments, October 2013, 11–12.Google Scholar
Harrison Dinniss, H. A. and Kleffner, J. K.Soldier 2.0: Military Human Enhancement Technologies’ (2016) 92 International Law Studies 432, available at http://digital-commons.usnwc.edu/ils/vol92/iss1/14/.Google Scholar
Hart, H. L. A., The Concept of Law (Oxford: Oxford University Press, 1961).Google Scholar
Haynes, C., ‘Report to the UN General Assembly of the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions,’ A/HRC/23/47 dated 9 April 2013, available at www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A-HRC-23-47_en.pdf.Google Scholar
Hawkins, J., ‘What Intelligent Machines Need to Learn from the Neocortex’, IEEE Spectrum, 2 June 2017, available at https://spectrum.ieee.org/computing/software/what-intelligentmachines-need-to-learn-from-the-neocortex.Google Scholar
Parks, W. Hays, ‘Air War and the Law of War’ (1990) 32 (1) The Air Force Law Review 1, 113–116.Google Scholar
Parks, W. Hays, ‘Conventional Weapons and Weapons Reviews’, 8 Yearbook of International Humanitarian Law (2005) 55.Google Scholar
Parks, W. Hays, ‘Means and Methods of Warfare, Symposium Issued in Honour of Edward R. Cummings’, 38 George Washington International Law Review (2006) 511, 536 at note 25.Google Scholar
Heal, C. ’Sid’, ‘The Quest for the “Magic Bullet” ‘in Dando, M. (ed.) Non-lethal Weapons: Technological and Operations Prospects (London: Jane’s Information Group, 2000) 3242, 35–36.Google Scholar
Health and Safety Executive, Review of the Adequacy of Current Regulatory Regimes to Secure Effective Regulation of Nanoparticles Created by Nanotechnology: the Regulations Covered by HSE (2006) HM Government K. www.hse.gov.uk/nanotechnology/regulatoryreview.pdf.Google Scholar
Hearn, K., ‘Future Soldiers Could Get Enhanced Minds’ (19 March 2001) United Press International, available at www.geocities.ws/marksrealm/project457.html.Google Scholar
Hema, C. R., Elakkiya, A. and Paulraj, M. P., ‘Biometric Identification Using Electroencephalography’, 106 International Journal of Computer Applications 15 (November 2014), 17.Google Scholar
Henckaerts, J.-M. and Doswald-Beck, L., ‘Customary International Humanitarian Law, Vol 1: Rules’ ICRC (2005) (Customary Law study), 237, Rule 70.CrossRefGoogle Scholar
Hepburn, Col. M. ‘Wound Stasis System’, available at www.darpa.mil/program/wound-stasis-system.Google Scholar
Heppner, G. and Gillmann, R., ‘Autonomy of Mobile Robots’. In W. Heintschel von Heinegg, et al., eds., Dehumanization of Warfare, 77, 80–81.CrossRefGoogle Scholar
Hobe, S., ‘Legal Aspects of Space Tourism’, (2007–2008) 86 Nebraska Law Review, 439.Google Scholar
Hoet, P. H., Brüske-Hohlfeld, I. and Salata, O. V., ‘Nanoparticles–Known and Unknown Health Risks’, Journal of Nanobiotechnology, 2(1) (2004).CrossRefGoogle ScholarPubMed
Hogben, G. (ed.), ‘ENISA Briefing: Behavioural Biometrics’, 18 February 2010, available at www.enisa.europa.eu/publications/behavioural-biometrics.Google Scholar
Hope, C., ‘Google: We’ll make new tools to tackle terrorists online’, The Daily Telegraph, 30 March 2017, available at www.telegraph.co.uk/news/2017/03/30/google-facebook-agree-setnew-industry-board-accelerate-removal/.Google Scholar
House of Commons Foreign Affairs Committee, ‘Global Security: Non-Proliferation’, Fourth Report of Session 2008–09 (3 June 2009), available at https://publications.parliament.uk/pa/cm200809/cmselect/cmfaff/222/222.pdf.Google Scholar
Huang, Z. and Mačák, K., ‘Towards the International Rule of Law in Cyberspace: Contrasting Chinese and Western Approaches’, 16 Chinese Journal of International Law (2017) 271.CrossRefGoogle Scholar
Hull, M., ‘Nanotechnology Risk Management and Small Business: a Case Study of the Nanosafe Framework’, in Hull, M. and Bowman, D. M. (eds.), Nanotechnology Environmental Health and Safety: Risks, Regulation and Management (New York: Elsevier, 2010), 247295.CrossRefGoogle Scholar
Human Rights Watch, ‘Losing Humanity: The Case Against Killer Robots’ (2012), available at www.hrw.org/sites/default/files/reports/arms1112ForUpload_0_0.pdf.Google Scholar
Hunton and Williams, ‘New Data Processing Requirements Take Effect in Russia’, Hunton Privacy Blog, 29 August 2017, available at www.huntonprivacyblog.com/2017/08/29/new-data-processing-notice-requirements-take-effect-russia/.Google Scholar
ICRC, ‘Toxic Chemicals as Weapons for Law Enforcement: A Threat to Life and International Law?’, September 2012, available at www.icrc.org/en/document/toxic-chemicals-weapons-lawenforcement-threat-life-and-international-law.Google Scholar
IEEE, ‘Special Report: Can We Copy the Brain?’, IEEE Spectrum (2017), available at https://spectrum.ieee.org/static/special-report-can-we-copy-the-brain.Google Scholar
Ienca, M. and Andorno, R., ‘Towards New Human Rights in the Age of Neuroscience and NeurotechnologyLife Sciences, Society and Policy (2017) 13:5.Google ScholarPubMed
India Today, ‘SC asks govt, others to mull ways to check sex offence videos’, India Today, 20 March 2017, available at http://indiatoday.intoday.in/story/sc-asks-govt-others-to-mullways-to-check-sex-offence-videos/1/908579.html.Google Scholar
Interfax-Ukraine, Ukraine with NATO’s support prepares creation of cyber security centre, KyivPost, 5 April 2017, available at www.kyivpost.com/ukraine-politics/ukraine-natos-support-prepares-creation-cyber-security-centre.html.Google Scholar
International Committee of the Red Cross, ‘Biological Weapons Review Conference: ICRC Statement’, ICRC, 8 November 2016, available at www.icrc.org/en/document/biological-weapons-reviewconference-statement-icrc.Google Scholar
International Committee of the Red Cross, ‘Rule 154. Obedience to Superior Orders’, Customary International Humanitarian Law Database, available at https://ihl-databases.icrc.org/customary-ihl/eng/docs/v1_rul_rule154.Google Scholar
Investigatory Powers Act 2016, available at www.legislation.gov.uk/ukpga/2016/25/contents/enacted.Google Scholar
Jackson, M., ‘UK Government Confirm Move to Force ISPs into Blocking “Adult” Sites’, ISP Review, 21 November 2016, available at www.ispreview.co.uk/index.php/2016/11/uk-government-confirm-move-force-isps-blocking-adult-sites.html.Google Scholar
Jacobsen, A., ‘Engineering Humans for War’, The Atlantic, 23 September 2015.Google Scholar
Jain, A. K. and Kumar, A., ‘Biometric Recognition: An Overview’, in Mordini, E. and Tzovaras, D. (eds.), Second Generation Biometrics: The Ethical, Legal and Social Context, The International Library of Ethics, Law and Technology, vol. 11. (Dordrecht: Springer, 2012), 4978.Google Scholar
Jie, J., ‘Personal Information Leakage on the Rise in China’, People’s Daily Online, 31 March 2017, available at http://en.people.cn/n3/2017/0331/c90000–9197748.html.Google Scholar
Joannopoulos, J. and Davis, F., Institute for Soldier Nanotechnologies (18 June 2015), Massachusetts Institute of Technology, available at http://web.mit.edu/annualreports/pres15/2015.18.06.pdf.Google Scholar
John-Hopkins, M. , ‘Regulating the Conduct of Urban Warfare: Lessons from Contemporary Asymmetric Armed Conflicts’, International Review of the Red Cross 92:878 (June 2010), 471.CrossRefGoogle Scholar
Johnson, D., Nanoparticles Found in Brains Come from External Sources (8 September 2016) IEEE Spectrum http://spectrum.ieee.org/nanoclast/semiconductors/materials/nanoparticles-found-in-brains-comes-from-external-sources.Google Scholar
Johnston, H., et al., ‘Engineered Nanomaterial Risk. Lessons Learnt from Completed Nanotoxicology Studies: Potential Solutions to Current and Future Challenges’, Critical Reviews in Toxicology, 43(1) (2013), 120.CrossRefGoogle ScholarPubMed
Johnston, I., ‘Tiny Implant Could Connect Humans and Machines Like Never Before’, 3 August 2016, www.independent.co.uk/news/science/neural-dust-implant-sensor-brain-nerves-humans-machines-prosthetics-berkeley-a7170251.html.Google Scholar
Juengst, E., ‘Can Enhancement Be Distinguished from Prevention in Genetic Medicine?’, The Journal of Medicine and Philosophy 22 (1997), 125142.CrossRefGoogle ScholarPubMed
Juengst, E., ‘The Meaning of Enhancement’, in Parens, E. (ed.), Enhancing Human Traits: Ethical and Social Implications (Washington, DC: Georgetown University Press, 1998), 2947.Google Scholar
Junod, T., ‘Elon Musk: Triumph of His Will’ 15 November 2012, Esquire (online), available at www.esquire.com/news-politics/a16681/elon-musk-interview-1212/.Google Scholar
Kalshoven, F., ‘Belligerent Reprisals Revisited’ (1990) 21 Netherlands Yearbook of International Law 43.CrossRefGoogle Scholar
Kamieński, Ł., Shooting Up: A History of Drugs and War (New York: Oxford University Press, 2016).Google Scholar
Kanunnikova, T., ‘Russia Offers to Draft International Convention on Combating Cybercrime’, 23 March 2017, available at http://russianconstruction.com/news-1/26888-russia-offers-to-draft-international-convention-on-combating-cybercrime.html.Google Scholar
Kaspersky, A. O. ‘Lab, Lazarus under the Hood’, 3 April 2017, available at https://securelist.com/blog/sas/77908/lazarus-under-the-hood/.Google Scholar
Katz, R. D., ‘Friendly Fire: The Mandatory Military Anthrax Vaccination Program, Duke Law Journal 50 (2001), 18351865.CrossRefGoogle ScholarPubMed
Kelly, J., Is Medical Ethics in Armed Conflict Identical to Medical Ethics in Times of Peace? (Newcastle: Cambridge Scholars Publishing, 2013).Google Scholar
Kahn, J., ‘Nano’s Big Future’ (2006) 209(6) National Geographic 98.Google Scholar
Kelly, J., ‘Gas Warfare in International Law’, Military Law Review, 1 (1960), 35.Google Scholar
Keuter, J.Rules of the Road in Space: Does a Code of Conduct Improve US Security?’ quoted in J. Beard ‘Soft Law’s Failure on the Horizon: The International Code of Conduct for Outer Space Activities’ (2017) 38.2 Pennsylvania Journal of International Law 335 at 376.Google Scholar
Khandeparkar, U., ‘Behind the Nano Hype’, Wall Street Journal, (19 January 2009).Google Scholar
Khanna, P. and Khanna, A., The Pleasure and Danger of Augmented Reality, BIG THINK, http://bigthink.com/hybrid-reality/the-pleasure-and-danger-of-augmented-reality (accessed 13 September 2018).Google Scholar
Kharpal, A., ‘Apple vs FBI: All You Need to Know’, 29 March 2016, available at www.cnbc.com/2016/03/29/apple-vs-fbi-all-you-need-to-know.html.Google Scholar
Kidd, T. and Ward, S., ‘A New Century for Unmanned Maritime Systems, October-December 2012, available at www.doncio.navy.mil/chips/ArticleDetails.aspx?ID=4195.Google Scholar
Kim, J., Georgetown University Otolaryngology Department, cited in Zachary Cohen, ‘New Audio Adds to Mystery of Attacks on US Diplomats’ (14 October 2017) CNN, available at http://edition.cnn.com/2017/10/13/politics/cuba-us-diplomats-acoustic-weapons/index.html.Google Scholar
Kjølberg, K. and Wickson, F., ‘Social and Ethical Interactions Wwth Nano: Mapping the Early Literature’, NanoEthics, 1(2) (2007), 89104.CrossRefGoogle Scholar
Klein, N., Maritime Security and the Law of the Sea, . (Oxford: Oxford University Press, 2011).CrossRefGoogle Scholar
Kobler, A. J., ‘Will There Be a Neurolaw Revolution?,’ Indiana Law Journal (2014); 89: 807845.Google Scholar
Koch, C., ‘To Keep Up with AI, We’ll Need High-Tech Brains,’ Wall Street Journal, 27 October 2017.Google Scholar
Koplow, D., ‘Tangled up in Khaki and Blue: Lethal and Non-Lethal Weapons in Recent Confrontations’ (2005) 36 Georgetown Journal of International Law 703808, 708.Google Scholar
Koplow, D. A., Non-Lethal Weapons: The Law and Policy of Revolutionary Technologies for the Military and Law Enforcement (New York: Cambridge University Press, 2009).Google Scholar
Koranyi, B., ‘G20 to Jointly Fight Bank Sector Hacking’, Reuters, 17 March 2017, available at http://uk.reuters.com/article/us-g20-germany-cyber-idUKKBN16O2F0.Google Scholar
Kosal, M., Nanotechnology for Chemical and Biological Defense (New York: Springer, 2009).CrossRefGoogle Scholar
Kosslyn, J. and Yu, C., ‘Fact Check Now Available in Google Search and News Round the World’, Google Blog, 7 April 2017, available at https://blog.google/products/search/fact-check-now-available-google-search-and-news-around-world/.Google Scholar
Krabbenborg, L., ‘DuPont and Environmental Defense Fund Co-Constructing a Risk Framework for Nanoscale Materials: An Occasion to Reflect on Interaction Processes in a Joint Inquiry’, NanoEthics, 7(1) (2013), 4554.CrossRefGoogle Scholar
Kraska, J., Maritime Power and the Law of the Sea (Oxford: Oxford University Press, 2011).CrossRefGoogle Scholar
Thakur, V. Kumar and Thakur, M. Kumari, Handbook of Sustainable Polymers: Structure and Chemistry (Abingdon: Taylor and Francis, 2016).Google Scholar
Kwang, K., Changes to Singapore’s Cybercrime Law Passed, Channel News Asia, 3 April 2017, available at www.kyivpost.com/ukraine-politics/ukraine-natos-support-prepares-creation-cyber-security-centre.html.Google Scholar
Lalaj, A. Burning Secrets of the Corfu Channel Incident (Woodrow Wilson International Center Cold War History Project Working paper #70, September 2014).Google Scholar
Larsen, P., ‘Issues Relating to Civilian and Military Dual Uses of GNSS’, (2001) 17 Space Policy, 111.CrossRefGoogle Scholar
Lauterpacht, H., ed., Oppenheim’s International Law Vol II (Reissue of 1952 edn, Longmans 1955), available at http://www.gutenburg.org/files/41047/41047-h/41047-h.htm).Google Scholar
Lawand, K., ‘A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977’, ICRC (2006).Google Scholar
Leheny, R, Statement submitted to the Subcommittee on Terrorism, Unconventional Threats and Capabilities, House Armed Services Committee, United States House of Representatives, 20 May 2009, 24, available at www.darpa.mil/attachments/TestimonyArchived%20(May%2020%202009).pdf.Google Scholar
Lehrer, J., ‘The forgetting pill: How a new drug can erase your worst memories’, WIRED, 17 February 2012, www.wired.com/2012/02/ff_forgettingpill/.Google Scholar
Leins, K., ‘Shining a Regulatory Spotlight on New Lasers: Regulation of the Use of Nanolaser Technologies in Armed Conflict’, Jurimetrics, 56 (2016), 261278.Google Scholar
Letts, D., ‘Naval Mines: Legal Considerations in Armed Conflict and Peacetime’ (2016) 98/102 International Review of the Red Cross 543.Google Scholar
Letts, D. and McLaughlin, R., ‘Call-Out Powers for the Australian Defence Force in an Age of Terrorism: Some Legal Implications’ (2017) No 85 Australian Institute of Administrative Law Forum 63, 7579.Google Scholar
Levasseur-Moreau, J., et al., ‘Non-Invasive Brain Stimulation Can Induce Paradoxical Facilitation. Are These Neuroenhancements Transferable and Meaningful to Security Services?’, Frontiers in Neuroscience Vol. 7, 449 (August 2013), 2.Google ScholarPubMed
Levi-Faur, D. and Comaneshter, H., ‘The Risks of Regulation and the Regulation of Risks: The Governance of Nanotechnology’, in Hodge, G., Bowman, D. and Ludlow, K. (eds.), New Global Frontiers in Regulation: The Age of Nanotechnology (Cheltenham: Edward Elgar, 2007), 149165, 150.Google Scholar
Levy, S., ‘Brain-Machine Interface Isn’t Sci-Fi Anymore,’ Wired, 13 September 2017, available at www.wired.com/story/brain-machine-interface-isnt-sci-fi-anymore/?mbid=BottomRelatedStories.Google Scholar
Li, S. Z., et al., ‘Biometrics at a Distance’, in Tistarelli, M., Li, S. Z. and Chellappa, R. (eds.), Handbook of Remote Biometrics: for Surveillance and Security (New York: Springer, 2009).Google Scholar
Liivoja, R., Leins, K. and McCormack, T., ‘Emerging Technologies of Warfare’, in Liivoja, R. and McCormack, T. (eds.), Routledge Handbook of the Law of Armed Conflict (Routledge, 2016), 603, 620.CrossRefGoogle Scholar
Lin, A. C., ‘Size Matters: Regulating Nanotechnology’, Harvard Environmental Law Review, 31 (2007), 349.Google Scholar
Lin, P., ‘Ethical Blowback from Emerging Technologies’, Journal of Military Ethics 9:4 (2010), 324325.CrossRefGoogle Scholar
Lin, P., ‘Could Human Enhancement Turn Soldiers into Weapons That Violate International Law? Yes’, The Atlantic, 4 January 2013.Google Scholar
Lin, P. and Allhoff, F., ‘Against Unrestricted Human Enhancement’, 18 Journal of Evolution and Technology 1, May 2008, 35, 4.Google Scholar
Lin, P., Mehlman, M. J. and Abney, K., ‘Enhanced Warfighters: Risk, Ethics and Policy’, Report Prepared for the Greenwall Foundation, January 2013, 13.Google Scholar
Logan, B. K., ‘Methamphetamine – Effect on Human Performance and Behaviour’, Forensic Science Review 14:133 (2002), 136.Google Scholar
Lomas, N., ‘Facebook Expands its Hate-fighting Counterspeech Initiative in Europe’, 23 June 2017, available at https://techcrunch.com/2017/06/23/facebook-expands-its-hate-fighting-counterspeech-initiative-in-europe/.Google Scholar
Lomas, N., ‘UK Kicks Off Driverless Car Law Review to Get Tech on the Road by 2021’, TechCrunch, 7 March 2018, available at https://techcrunch.com/2018/03/07/uk-kicks-off-driverless-car-law-review-to-get-tech-on-the-road-by-2021/.Google Scholar
LRAD Corporation, ‘Extended Range Communication & Scalable Escalation of Force’, available at www.lradx.com/application/defense/.Google Scholar
Luber, B. and Lisanby, S. H., ‘Enhancement of Human Cognitive Performance Using Transcranial Magnetic Stimulation’, Neuroimage 85: 03 (15 January 2014), 67.CrossRefGoogle ScholarPubMed
Ludlow, K., Bowman, D. M. and Hodge, G. A., ‘A Review of Possible Impacts of Nanotechnology on Australia’s Regulatory Framework: Final Report’, Monash University Law, available at www.researchgate.net/publication/265997359_A_Review_of_Possible_Impacts_of_Nanotechnology_on_Australia’s_Regulatory_Framework.Google Scholar
Ludlow, K., Bowman, D. M. and Kirk, D. D., ‘Hitting the Mark or Falling Short with Nanotechnology Regulation?’, Trends in Biotechnology, 27(11) (2009), 615620, 615.Google ScholarPubMed
McCann, K., ‘Government “blocked” from Accessing Twitter Data to Help Spot Terrorist Plots’, The Telegraph, 25 April 2017, available at www.telegraph.co.uk/news/2017/04/25/government-blocked-accessing-twitter-data-help-spot-terrorist/.Google Scholar
McCormack, T. L. H., ‘A Non Liquet on Nuclear Weapons – The ICJ Avoids the Application of General Principles of International Humanitarian Law’ (1997), 316 IRRC 76.Google Scholar
McCulloch, W. S. and Pitts, W., ‘A Logical Calculus of the Ideas Immanent in Nervous Activity,’ Bulletin of Mathematical Biophysics (1943); 5: 115133.CrossRefGoogle Scholar
McGregor, L., ‘Are Declaratory Orders Appropriate for Continuing Human Rights Violations? The Case of Khadr v Canada’ (2010) 10:3 Human Rights Law Review 487.Google Scholar
McLaughlin, R., ‘The Use of Lethal Force by Military Forces on Law Enforcement Operations – Is There a “Lawful Authority”?’ (2009) 37:3 Federal Law Review 441.CrossRefGoogle Scholar
McLaughlin, R., ‘Unmanned Naval Vehicles at Sea: USVs, UUVs, and the Adequacy of the Law’ (2011) 21:2 Journal of Law Information and Science 100.CrossRefGoogle Scholar
McLaughlin, R., ‘Dangerous Waters and International Law: The Corfu Channel Case, Warships, and Sovereignty Irritants’, in Bannelier, K., Christakis, T.e and Heathcote, S. (eds.), The ICJ and the Evolution of International Law: The Enduring Impact of the Corfu Channel Case (Abingdon: Routledge, 2012).Google Scholar
McLaughlin, R., ‘State Responsibility for Third Country Deployed/Embedded Military Personnel Engaged in Armed Conflict’, EJIL Talk!, 10 September 2015, at www.ejiltalk.org/state-responsibility-for-third-country-deployed-embedded-military-personnel-engaged-in-armed-conflict/.Google Scholar
McLaughlin, R. and Stephens, D., ‘International Humanitarian Law in the Maritime Context: Conflict Characterization in Judicial and Quasi-Judicial Contexts’, in Jinks, D., Maogoto, J. and Solomon, S. (eds.), Applying International Humanitarian Law in Judicial and Quasi-Judicial Bodies: International and Domestic Aspects (The Hague: TMC Asser Press, 2014).Google Scholar
Mack, A., ‘Why Big Nations Lose Small Wars: The Politics of Asymmetric Conflict’, World Politics 27:2 (January 1975), available online at: https://web.stanford.edu/class/polisci211z/2.2/Arreguin-Toft%20IS%202001.pdf.CrossRefGoogle Scholar
Maher, B., et al., ‘Magnetite Pollution Nanoparticles in the Human Brain’, Proceedings of the National Academy of Sciences of the United States of America, 113(39) (2016), 1079710801.CrossRefGoogle ScholarPubMed
Marasco, P. D., et al., ‘Illusory Movement Perception Improves Motor Control for Prosthetic Hands’ (2018) 10(432) Science Translational Medicine, available at http://stm.sciencemag.org/content/10/432/eaao6990.CrossRefGoogle ScholarPubMed
Marauhn, T., ‘Meaningful Human Control – And the Politics of International Law’ in W Heintschel von Heinegg, et al. (eds.) Dehumanization of Warfare, 2018, 207, 210–212.CrossRefGoogle Scholar
Marchant, G. E., Allenby, B. R. and Herkert, J. R. (eds.), vol. 7, The Growing Gap between Emerging Technologies and Legal-Ethical Oversight: The Pacing Problem (New York: Springer, 2011).CrossRefGoogle Scholar
Marcus, D., ‘Famine Crimes in International Law’, American Journal of International Law, 97(2) (2003), 245, 262–264.Google Scholar
Markoff, G., ‘Explanation of Position at the Conclusion of the 2016–2017 Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security’, US Department of State, 23 June 2017, available at www.state.gov/s/cyberissues/releasesandremarks/272175.htm.Google Scholar
Marshall, A., ‘War by Poison’ (1934) Nature 952–953.CrossRefGoogle Scholar
Marshall, A., ‘Congress Unites (Gasp) to Spread Self-Driving Cars Across America’, Wired 6 September 2017.Google Scholar
Maslen, H., Douglas, T., Kadosh, R. Cohen, Levy, N. and Savulescu, J., ‘Mind Machines. The Regulation of Cognitive Enhancement Devices: Extending the Medical Model”, Oxford Martin Policy Paper, 2014.CrossRefGoogle Scholar
Massingham, E., ‘Conflict Without Casualties … A Note of Caution: Non-Lethal Weapons and International Humanitarian Law’ (2012) 886 International Review of the Red Cross 673, 678.CrossRefGoogle Scholar
Matheson, M. J., ‘The United States Position on the Relation of Customary International Law to the 1977 Protocols Additional to the 1949 Geneva Conventions’ (1987) 2 AU JILP 419.Google Scholar
Mathews, R., ‘Chemical and Biological Weapons’, in Liivoja, R. and McCormack, T. (eds.), Routledge Handbook of the Law of Armed Conflict (London: Routledge, 2016), 229230.Google Scholar
Matsuura, J., Nanotechnology Regulation and Policy Worldwide (Boston and London: Artech House, 2006).Google Scholar
Matthieu, G. and Williams-Jones, B., ‘Examining the National Regulatory Environment of Medical Devices: Major Issues in the Risk-Benefit Assessment of High-Risk Devices,’ McGill Journal of Law and Health (2015–2016); 9: 1767.Google Scholar
Maynard, A. D., et al., ‘Safe Handling of Nanotechnology’, Nature, 444(7117) (2006), 267269.CrossRefGoogle ScholarPubMed
Maynard, A. D., ‘Don’t Define NanomaterialsNature, 475(7354) (2011), 31.Google ScholarPubMed
Maynard, A., ‘Frankenstein Foods, Nanotech and the Trouble with Communicating Technology’, World Economic Forum, 10 October 2016, available at www.weforum.org/agenda/2016/10/the-trouble-with-technology-innovation.Google Scholar
Mayor, A., Greek Fire, Poison Arrows, and Scorpion Bombs: Biological and Chemical Weapons in the Ancient World (New York: Overlook Press, 2009).Google Scholar
Medvedev, S., ‘Data Protection in Russian Federation: Overview’, Thomson Reuters, 2017, available at https://uk.practicallaw.thomsonreuters.com/2–502–2227?transitionType=Default&contextData=(sc.Default)&firstPage=true.Google Scholar
Mehlman, M. J., Lin, P. and Abney, K., ‘Enhanced Warfighters: A Policy Framework”, in M. L. Gross and D. Carrick (eds.), Military Medical Ethics for the 21st century, 121–124.Google Scholar
Meier, M. W., ‘Lethal Autonomous Weapon Systems (LAWS): Conducting a Comprehensive Weapons Review’, 30 Temple Int’l & Comp L J 1 (2016) 119, 120.Google Scholar
Meili, C. and Widmer, M., ‘Voluntary Measures in Nanotechnology Risk Governance: The Difficulty of Holding the Wolf by the Ears’, in Hodge, G., Bowman, D. M. and Maynard, A. (eds.), International Handbook on Regulating Nanotechnologies (Cheltenham: Edward Elgar, 2010), 446461.Google Scholar
Menn, J., ‘A Scramble at Cisco Exposes Uncomfortable Truths about US Cyber Defense’, Reuters, 30 March 2017, available at http://uk.reuters.com/article/us-usa-cyber-defense-idUKKBN17013U.Google Scholar
Mermelstein, L. D., ‘Ethics Update: Lawyers Must Keep Up with Technology,’ American Bar Association (2013), available at www.americanbar.org/publications/blt/2013/03/keeping_current.html.Google Scholar
Meron, T., ‘The Martens Clause, Principles of Humanity and Dictates of Public Conscience’, The American Journal of International Law, 94(1) (2000), 78.CrossRefGoogle Scholar
Meyer, J. M., ‘Tearing Down the Façade: A Critical Look at the Current Law on Targeting the Will of the Enemy and Air Force Doctrine’ (2001) 51 Air Force Law Review 143.Google Scholar
Meyer, P., ‘Dark Forces Awaken: The Prospects for Cooperative Space Security’, (2016) The Nonproliferation Review, 23 34, 495, 496.CrossRefGoogle Scholar
MForce website, available at www.hrsid.com/product-mforce.Google Scholar
Miller, J. W., ‘US Steel Accuses China of Hacking’, Wall Street Journal, 28 April 2016.Google Scholar
Miller, W., ‘The British Experience in Northern Ireland: A Model for Modern Peacemaking Operations’, US Army Command and General Staff College, Fort Leavenworth, 1993, 40, at www.dtic.mil/dtic/tr/fulltext/u2/a264419.pdf.CrossRefGoogle Scholar
Mola, R. ‘How Things Work: Space Fence: The New Early-Warning System to Protect Spacecraft from Orbiting Junk’, Air & Space Magazine, February 2016, www.airspacemag.com/space/how-things-work-space-fence-180957776/.Google Scholar
Monica, J., Van Calster, G. and Agapi, P. (2014), ‘A Nanotechnology Legal Framework’, in Hull, M. and Bowman, D. M. (eds.), Nanotechnology Environmental Health and Safety: Risks, Regulation and Management, 2nd edn, (New York: Elsevier), pp.265312.Google Scholar
Moriuchi, P. and Ladd, W., ‘China Altered Public Vulnerability Data to Conceal MSS Influence, Recorded Future’, 9 March 2018, available at www.recordedfuture.com/chinese-vulnerability-data-altered/.Google Scholar
Morozov, E. ‘The Perils of Perfection’ New York Times, 3 March 2013.Google Scholar
Moses, L. B., ‘Report of the Symposium on Ethical, Legal and Social Implications of Emerging Military Technologies, 29–30 May 2017’, Melbourne Law School, August 2017.Google Scholar
NASA, ‘Artificial Intelligence, NASA Data Used to Discover Eighth Planet Circling Distant Star’, 14 December 2017, available at www.nasa.gov/press-release/artificial-intelligence-nasa-dataused-to-discover-eighth-planet-circling-distant-star.Google Scholar
Nasu, H., ‘Nanotechnology and Challenges to International Humanitarian Law: A Preliminary Legal Assessment’, International Review of the Red Cross, 94 (2012), 653672.CrossRefGoogle Scholar
Nasu, H. and Faunce, T., ‘Nanotechnology and the International Law of Weaponry: Towards International Regulation of Nano-Weapons’ (2009) 20 Journal of Law, Information and Science 21, 3443.Google Scholar
Nasu, H. and Faunce, T., ‘Nanotechnology and the International Law of Weaponry: Towards International Regulation of Nano-Weapons’, Journal of Law, Information and Science, 22 (2009), 2154, available at https://law.anu.edu.au/sites/all/files/users/u9705219/nanoweapons_int_law_0.pdf.Google Scholar
Nasu, H. and McLaughlin, R. (eds.), New Technologies and the Law of Armed Conflict (The Hague: Asser Press, 2014) 145.CrossRefGoogle Scholar
National Academies of Sciences, Engineering, and Medicine, Thriving on Our Changing Planet: A Decadal Strategy for Earth Observation from Space (2018), available at www.nap.edu/catalog/24938/thriving-on-our-changing-planet-a-decadal-strategy-for-earth.Google Scholar
National Research Council, Opportunities in Neuroscience for Future Military Applications (Washington: National Academies Press, 2009).Google Scholar
NATO, ‘Policy on non-lethal weapons’, NATO, (13 October 1999, updated 6 November 2008) para 3, available at www.nato.int/cps/ic/natohq/official_texts_27417.htm?selectedLocale=en.Google Scholar
Nelliss, S. and Cadell, C., ‘Apple Moves To Store Icloud Keys In China, Raising Human Rights Fears’, Reuters 24 February 2018, available at www.reuters.com/article/us-china-apple-icloud-insight/apple-moves-to-store-icloud-keys-in-china-raising-human-rights-fears-idUSKCN1G8060.Google Scholar
New York Times, ‘Prosthetic Limbs, Controlled by Thought’, New York Times, 20 May 2015, available at www.nytimes.com/2015/05/21/technology/a-bionic-approach-to-prosthetics-controlled-by-thought.html (accessed 9 March 2018).Google Scholar
Ngo, D., ‘Pinterest is Now Blocked by China’s Great Firewall’, C/Net, 16 March 2017, available at www.cnet.com/uk/news/pinterest-blocked-in-china-great-firewall/.Google Scholar
Niemtus, Z., ‘The Disrupters – Humans 2.0: Meet the Entrepreneur Who Wants to Put a Chip in Your Brain,’ The Guardian, 14 December 2017.Google Scholar
Nobel Peace Prize in Chemistry 2016, Nobelprize.org, available at www.nobelprize.org/nobel_prizes/chemistry/laureates/2016.Google Scholar
Norris, A., Legal Issues Relating to Unmanned Maritime Systems, available at www.iqpc.com/media/1002182/50661.pdf.Google Scholar
Novakovic, V., et al., ‘Brain Stimulation in Posttraumatic Stress Disorder’, European Journal of Psychotraumatology 2 (2011).Google Scholar
Oberhaus, D., ‘The First Spy Satellites Had to Drop Gigantic Buckets of Film Back to Earth’, 22 April 2017, Motherboard (online), https://motherboard.vice.com/en_us/article/jpzpkg/the-first-spy-satellites-had-to-drop-gigantic-buckets-of-film-back-to-earth.Google Scholar
O’Connell, R. L., Of Arms and Men (Oxford: Oxford University Press, 1989).Google Scholar
O’Neill, S., ‘British Spy in IRA Arrested on Murder and Torture Charges’, The Times, 31 January 2018, 5.Google Scholar
Oppenheim, L., International Law, Vol. II, 7th edn et seq. (7th ed. by Hersch Lauterpacht, London 1952).Google Scholar
O’Rourke, R., ‘Navy Frigate (FFX[X]) Program: Background and Issue for Congress’, 8 December 2017, available at https://fas.org/sgp/crs/weapons/R44972.pdf; www.naval-technology.com/projects/standard-missile-6/.Google Scholar
OECD, OECD Chemical Studies Show Way Forward for Nanomaterial Safety (9 June 2015), available at www.oecd.org/chemicalsafety/nanosafety/news-nanomaterial-safety.htm.Google Scholar
Office of Director of National Intelligence, ‘IARPA launches “Odin” Program to harden biometric technology against attacks’, News Release 22–17 dated 19 October 2017, available at www.dni.gov/index.php/newsroom/press-releases/item/1808-iarpa-launches-odin-program-to-harden-biometric-technology-against-attacks.Google Scholar
Office of the United Nations High Commissioner for Human Rights, ‘Egypt extends its assault on freedom of expression by blocking dozens of websites UN experts warn’, 30 August 2017, available at www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=22008&LangID=E.Google Scholar
Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, Study on Next-Generation Unmanned Undersea Systems (Washington, DC, October 2016), available at www.acq.osd.mil/dsb/reports/2010s/Next-Generation_Unmanned_Undersea_Systems.pdf.Google Scholar
Osborne, H. and Elgot, J., ‘MPs Summon Mark Zuckerberg and Accuse Facebook of Misleading Them’, The Guardian, 20 March 2018.Google Scholar
Ostrower, J., ‘Airbus “Flying Car” Takes to The Skies for the First Time’, CNN Tech, 1 February 2018, available at http://money.cnn.com/2018/02/01/technology/airbus-vahana-firstflights/index.html.Google Scholar
Oswald, B., Durham, H. and Bates, A. (eds.), Documents on the Law of UN Peace Operations, (Oxford: Oxford University Press, 2010).Google Scholar
Owens, K., ‘Wireless Underwater Charging Tech Will Bring a New Level of Autonomy for UUVs’, September 1, 2017, available at https://defensesystems.com/articles/2017/09/01/navy-drone-uuv.aspx.Google Scholar
Paine, T. ‘Bombs in Orbit? Verification and Violation under the Outer Space Treaty’, The Space Review, 19 March 2018.Google Scholar
Panditl, R., ‘New Joint Doctrine Stresses Space, Cyber, Special Ops in War-Fighting’, Times of India, 25 April 2017.Google Scholar
Pedrozo, R. (Pete), ‘Military Activities in the Exclusive Economic Zone: East Asia Focus’, 90 International Law Studies (2014), 514543, 525 et seq.Google Scholar
Pelegrín-Borondo, J., Reinares-Lara, E. and Olarte-Pascual, C., ‘Assessing the Acceptance of Technological Implants (the Cyborg): Evidences and Challenges’, (2017) 70 Computers in Human Behaviour, 104112, 105.CrossRefGoogle Scholar
Perlroth, N., and Krauss, C., ‘A Cyber Attack in Saudi Arabia Had a Deadly Goal: Experts Fear Another Try’, New York Times, 15 March 2018, available at www.nytimes.com/2018/03/15/technology/saudi-arabia-hacks-cyberattacks.html.Google Scholar
Perkins, J. B., ‘Operation Praying Mantis: The Surface View’ (1989) 115:5 US Naval Institute Proceedings 1035, at www.usni.org/magazines/proceedings/1989-05/operation-praying-mantis-surface-view.Google Scholar
The PEW Charitable Trusts, ‘Project on Emerging Nanotechnologies’, available at www.pewtrusts.org/en/archived-projects/project-on-emerging-nanotechnologies.Google Scholar
Pham, M., ‘Vietnam Urges Firms to Stop Youtube and Facebook Ads in Protest over Fake Content’, Reuters, 16 March 2017, available at www.reuters.com/article/us-vietnam-google-idUSKBN16N110.Google Scholar
Phoenix, E., ‘NI State Papers: Concern over Use of Plastic Bullets’, BBC, 28 December 2013, at www.bbc.com/news/uk-northern-ireland-25425779.Google Scholar
Piesing, M., ‘Medical Robotics: Would you Trust a Robot with a Scalpel?’, The Guardian, 10 October 2014.Google Scholar
Pilkington, E, ‘Judge Approves Use of “Truth Serum” on Accused Aurora Shooter James Holmes’, The Guardian (12 March 2013).Google Scholar
Pincus, W., ‘Senate Boosts Funding for Laser Weapons’, Washington Post, 22 September 2008.Google Scholar
Pitman, R. K., Sanders, K. M., , R. M. Zusman, et al., ‘Pilot Study of Secondary Prevention of Posttraumatic Stress Disorder with Propranolol’, Biological Psychiatry 51:2 (2002), 189192.CrossRefGoogle ScholarPubMed
Poland, C. A., et al., ‘Carbon Nanotubes Introduced into the Abdominal Cavity of Mice Show Asbestos-Like Pathogenicity in a Pilot Study’, Nature Nanotechnology, 3(7) (2008), 423428.CrossRefGoogle ScholarPubMed
Polavaram, S. and Ascoli, G., ‘Neuroinformatics,’ Scholarpedia, 2015, doi: 10(11):1312, available at www.scholarpedia.org/article/Neuroinformatics.CrossRefGoogle Scholar
Pop, A., ‘Autonomous Weapon Systems: A Threat to Human Dignity’, ICRC Humanitarian Law and Policy Blog, 10 April 2018.Google Scholar
Popken, B., ‘Twitter Deleted 200,000 Russian Troll Tweets’, NBC News, 14 February 2018, available at www.nbcnews.com/tech/social-media/now-available-more-200-000-deleted-russian-troll-tweets-n844731.Google Scholar
Potts, L., ‘The Police “Super-Recognisers” Putting Names to Faces’, BBC News, 19 October 2015, available at www.bbc.co.uk/news/uk-england-34544199.Google Scholar
Prescott, J. M., ‘Building the Ethical Cyber Commander and the Law of Armed Conflict,’ Rutgers Computer and Technology Law Journal (2014); 40: 4277.Google Scholar
Priddy, A., ‘The Use of Weapons in Counterpiracy Operations’, in Casey-Maslen (ed.), Weapons under International Human Rights Law, 2014, 122 – 160, 154.CrossRefGoogle Scholar
Privacy, Data Protection and Cyber Security Law Review, Edition 3, Russia dated November 2016, available at http://thelawreviews.co.uk/edition/the-privacy-data-protection-and-cybersecurity-law-review-edition-3/1140166/russia.Google Scholar
Program on Humanitarian Policy and Conflict Research at Harvard University, HPCR Manual on International Law Applicable to Air and Missile Warfare (Cambridge: Cambridge University Press, 2013).Google Scholar
Pusateri, A. E., ‘US Department of Defence Haemorrhage and Resuscitation Research and Development Program’, presented at the Remote Damage Control Resuscitation Conference, Bergen, Norway, 19 June 2002, available at: http://rdcr.org/wp-content/uploads/symp2012pdf/US%20Department%20of%20Defense%20Hemorrhage%20and%20Resuscitation%20Research%20and%20Development%20Program%20-%20Anthony%20Pusateri.pdf.Google Scholar
Puscas, I., ‘La Quête du Soldat Augmenté’, Le Monde Diplomatique, September 2017, 3.Google Scholar
Quinn, A. G.The New Age of Space Law: The Outer Space Treaty and the Weaponization of Space’, (2008) 17 Minnesota Journal of International Law 475, 479–480.Google Scholar
Quzhi, H., ‘The Outer Space Treaty in Perspective’ (1997) 40 Proceedings on the Law of Outer Space 51, 53.Google Scholar
Radchenko, S., The Soviet Union and the North Korean Seizure of the USS Pueblo: Evidence from Russian Archives, Woodrow Wilson International Center Cold War History Project Working paper #47, 7 July 2011.Google Scholar
Radio Free Europe/Radio Liberty, ‘Telegram App Under the Gun in Russia After Court Ruling’, 20 March 2018, available at www.rferl.org/a/russia-telegram-messaging-app-under-pressure-fsb-supreme-court/29111309.html.Google Scholar
Ram, A., ‘DeepMind Develops AI to Diagnose Eye Diseases,’ Financial Times, 4 February 2018.Google Scholar
Ramey, R., ‘Armed Conflict on the Final Frontier: The Law of War in Space’, (2000) 48 Air Force Review, 1, 13.Google Scholar
Rasmussen, K., et al., ‘Review of Achievements of the OECD Working Party on Manufactured Nanomaterials’ Testing and Assessment Programme: From Exploratory Testing to Test Guidelines’, Regulatory Toxicology and Pharmacology, 74 (2016), 147160.CrossRefGoogle Scholar
Ravilious, K., ‘The Secrets of Sonic Weapons’ (8 November 2005) The Guardian www.theguardian.com/science/2005/nov/08/g2.weaponstechnology.Google Scholar
Rayner, G., ‘WhatsApp Accused of Giving Terrorists a Secret Place to Hide as It Refuses to Hand Over Private Messages’, Daily Telegraph, 27 March 2017.Google Scholar
Regulation (EU) 2016/679 of 27 April 2016, available at http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679&from=EN, (2016 LAWS Report), para13.Google Scholar
Report of the 2016 Informal Meeting of Experts on Lethal Autonomous Weapon Systems, submitted by the Chairperson, available at www.unog.ch/80256EDD006B8954/(httpAssets)/DDC13B243BA863E6C1257FDB00380A88/$file/ReportLAWS_2016_AdvancedVersion.pdf.Google Scholar
Reschke, S., van Erp, J. B. F., Brouwer, A. M. and Grootjen, M., ‘Neural and Biological Soldier Enhancement: From SciFi to Deployment’, Paper Presented at the NATO RTO Human Factors and Medicine Panel, Sofia, 5–7 October 2009, http://publica.fraunhofer.de/documents/N-194631.html.Google Scholar
Reuters, ‘Germany Adopts Self-Driving Vehicles Law’, Reuters, 12 May 2017, available at www.reuters.com/article/us-germany-autos-self-driving/germany-adopts-self-driving-vehicles-lawidUSKBN1881HYGoogle Scholar
Reynolds, G., ‘Environmental Regulation of Nanotechnology: Some Preliminary Observations’, Environmental Law Reporter, 31(6) (2001), 10681.Google Scholar
Reynolds, G., ‘Nanotechnology and Regulatory Policy: Three Phases’, Harvard Journal of Law and Technology, 17(1) (2003), 179, 185 citing E. Drexler, Engines of Creation (Oxford: Oxford University Press, 1990), 56–63.Google Scholar
Rice, J., ‘Seaweb Acoustic Communication and Navigation Network’, available at https://calhoun.nps.edu/bitstream/handle/10945/40396/rice_seaweb.pdf?sequence=1&isAllowed=y.Google Scholar
Richardson, J., ‘Inside the Race to Hack the Human Brain,’ Wired, 16 November 2017, available at www.wired.com/story/inside-the-race-to-build-a-brain-machine-interface/?mbid=BottomRelatedStories.Google Scholar
Riches, J. R., et al., ‘Analysis of Clothing and Urine from Moscow Theatre Siege Casualties Reveals Carfentanil and Remifentanil Use’ (2012) 36(9) Journal of Analytical Toxicology 647656.CrossRefGoogle ScholarPubMed
Riley-Smith, B., et al., ‘Airports and Nuclear Power Stations on Terror Alert As Government Officials Warn of Credible Cyber Threat’, Daily Telegraph, 2 April 2017, available at www.telegraph.co.uk/news/2017/04/01/airports-nuclear-power-stations-terror-alert-government-officials/.Google Scholar
Ritchie, A. and Gibbons, J., ‘Letter to Editor: Plastic Bullets in Northern Ireland’ (1990) 301(6764) British Medical Journal 1332.CrossRefGoogle Scholar
Roach, K., ‘The Supreme Court at the Bar of Politics: The Afghan Detainee and Omar Khadr Cases’ (2010) 28 National Journal of Constitutional Law 115.Google Scholar
Roach, J. A. and Smith, R. W., Excessive Maritime Claims, 3rd edn (Leiden/Boston: Martinus Nijhoff, 2012).CrossRefGoogle Scholar
Roberts, A., Is International Law International? (Oxford: Oxford University Press, 2017).CrossRefGoogle Scholar
Roco, M. C., ‘International Perspective on Government Nanotechnology Funding in 2005’, Journal of Nanoparticle Research, 7(6) (2005), 707712.Google Scholar
Rogers, A. P. V., Law on the Battlefield, 3rd edn (Manchester: Manchester University Press, 2012).Google Scholar
Rogers, C. A, ‘A Slow March towards Thought Crime: How the Department of Homeland Security’s Fast Program Violates the Fourth Amendment’, 64 American University Law Review 2 (2014), 337, 384.Google Scholar
Rohter, L., ‘The Noriega Case: Panama City; Papal Envoy Asserts Psychology, Not Ultimatum, Swayed Noriega’, New York Times, 6 January 1990.Google Scholar
Rosenfeld, E., ‘US-China Agree Not to Conduct Cybertheft of Intellectual Property’, CNBC, 25 September 2015, available at www.cnbc.com/2015/09/25/us-china-agree-to-not-conductcybertheft-of-intellectual-property-white-house.html.Google Scholar
Rossi, S., et al., ‘Safety, Ethical Considerations, and Application Guidelines for the Use of Transcranial Magnetic Stimulation in Clinical Practice and Research’, Clinical Neurophysiology 120 (2009), 20182024.Google ScholarPubMed
Rowe, P. J., Defence, the Legal Implications (London: Brassey’s 1987).Google Scholar
Rowell, W., ‘Haemorrhage Control: Lessons from the Military’, Emergency Nurse Vol. 21, No 7 (November 2013): 22.CrossRefGoogle ScholarPubMed
The Royal Society, ‘Brain Wave Module 3: Neuroscience, Conflict and Security’, February 2012, available at https://royalsociety.org/~/media/Royal_Society…/brain-waves/2012–02–06-BW3.pdf.Google Scholar
Royal Society and Royal Academy of Engineering, Nanoscience and Nanotechnologies: Opportunities and Uncertainties (Royal Society, 2004).Google Scholar
Ruan, L., ‘Internet Censorship: How China Does It’, The Strategist, 9 October 2017, available at www.aspistrategist.org.au/internet-censorship-how-china-does-it/.Google Scholar
Ryan, M. and Lamothe, D., ‘Pentagon: Chinese Naval Ship Seized an Unmanned US Underwater Vehicle in South China Sea’, Washington Post, 17 December 2016, available at www.washingtonpost.com/news/checkpoint/wp/2016/12/16/defense-official-chinese-naval-ship-seized-an-unmanned-u-s-ocean-glider/?utm_term=.2df1a5ad523d.Google Scholar
Saab Corporation, ‘Naval Laser Warning Systems’, available at https://saab.com/naval/electronic-warfare/naval-laser-warning-systems/nlws/.Google Scholar
Saeed, S., ‘German Cyber Security Chief: Army attacked over 284,000 times this year’, Politico, 3 April 2017, available at www.politico.eu/article/german-cybersecurity-chief-army-attacked-over-284000-times-this-year/.Google Scholar
Sample, I., ‘Wired Awake’, The Guardian, 29 July 2014.Google Scholar
Sample, I. and Evans, R., ‘MoD Bought Thousands of Stay Awake Pills in Advance of War in Iraq’, The Guardian, 29 July 2004.Google Scholar
Sandoz, Y., et al. (eds.), Commentary on the Additional Protocols of 8 June 1977 to the Geneva Conventions of 12 August 1949 (Geneva: ICRC, 1987).Google Scholar
Sanger, D. E. and Perlroth, N., ‘6 Chinese Men Indicted in Theft of Code from US Tech Companies’, New York Times, 19 May 2015.Google Scholar
Sassoli, M., ‘Legitimate Targets of Attacks under International Humanitarian Law’, HCPR Policy Brief (January 2003).Google Scholar
Schaefer, M. ‘The Contours of Permissionless Innovation in the Outer Space Domain’ (March 28, 2017). University of Pennsylvania Journal of International Law, Vol. 39, No. 1, 2017, available at https://ssrn.com/abstract=2942526.Google Scholar
Scharre, P., ‘Human Judgment and Lethal Decision-Making in War’, ICRC Humanitarian Law and Policy Blog, 11 April 2018.Google Scholar
Schindler, P., ‘Expanded safeguards for advertisers’, 21 March 2017, available at https://blog.google/topics/ads/expanded-safeguards-for-advertisers/.Google Scholar
Schmitt, M. N., ‘War, Technology and International Humanitarian Law’, Harvard University HPCR Occasional Paper Series, (Summer 2005), 48.Google Scholar
Schmitt, M. N. ‘International Law and Military Operations in Space’, in A. von Bogdandy and R. Wolfrum (eds.), Max Planck Yearbook of United Nations Law, 2006, volume 10, 200.Google Scholar
Schmitt, M. N., ‘Military Necessity and Humanity in International Humanitarian Law: Preserving the Delicate Balance’, Virginia Journal of International Law 50:4 (2010), 795839.Google Scholar
Schmitt, M. N., ‘Tallinn Manual 2.0 on the International Law of Cyber Operations: What It Is and Isn’t’, Just Security, 9 February 2017, available at www.justsecurity.org/37559/tallinn-manual-2-0-international-law-cyber-operations/.CrossRefGoogle Scholar
Schmitt, M. N. and Biller, J., ‘The NotPetya Cyber Operation as a Case Study in International Law’, EjilTalk, 11 July 2017.Google Scholar
Schmitt, M. N. and Goddard, David S., ‘International Law and the Military Use of Unmanned Maritime Systems’, 98 International Review of the Red Cross 1–26 (August 2016).Google Scholar
Schmitt, M. and Thurner, J., ‘Out of the Loop – Autonomous Weapon Systems and the Law of Armed Conflict’, Harvard National Security Journal, 4 (2013), 231, 275.Google Scholar
Schmitt, M. and Vihul, L., ‘International Cyber Law Politicized: The UN GGE’s Failure to Advance Cyber Norms’, Just Security, 30 June 2017.Google Scholar
Schmitt, M., et al. (eds.), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Cambridge: Cambridge University Press, 2017).CrossRefGoogle Scholar
Schrogl, K.-U. and Neumann, J., ‘[Outer Space Treaty] Article IV’, in Hobe, S., Schmidt-Tedd, B. and Schrogl, K.-U. (eds.), Cologne Commentary on Space Law Volume 1; Outer Space Treaty, Cologne: Carl Heymanns, 2009.Google Scholar
Schwab, K., ‘The Fourth Industrial Revolution: What It Means, How to Respond’, World Economic Forum, Geneva, 14 January 2016, available at www.weforum.org/agenda/2016/01/the-fourth-industrial-revolution-what-it-means-and-how-to-respond/.Google Scholar
Sechrist, M., Cyberspace in Deep Water: Protecting Undersea Communication Cables By Creating an International Public–Private Partnership (Harvard Kennedy School, 23 March 2010), available at http://belfercenter.hks.harvard.edu/files/PAE_final_draft_-_043010.pdf.Google Scholar
Sennaar, K., ‘Facial Recognition Applications: Security, Retail and Beyond’, Techemergence, 16 November 2017.Google Scholar
Shachtman, N., ‘Squirrel=Super Soldier’, WIRED 3 December 2007, available at www.wired.com/2007/03/soldiers-if-you/.Google Scholar
Shahani, A., Microsoft President Urges Nuclear-Like Limits on Cyberweapons (16 May 2017) National Public Radio www.npr.org/sections/alltechconsidered/2017/05/16/528555400/microsofts-president-reflects-on-cyberattack-helping-pirates-and-the-nsa.Google Scholar
Shanker, T. and Richtel, M., ‘In New Military, Data Overload Can Be Deadly’ New York Times, 16 January 2011.Google Scholar
Shaohui, T. (ed.), ‘International Strategy of Cooperation on Cyberspace’, 1 March 2017, available at http://news.xinhuanet.com/english/china/2017–03/01/c_136094371.htm.Google Scholar
Shen, F. X., ‘Law and Neuroscience 2.0’, Arizona State Law Journal (2016).Google Scholar
Shen, F. X., ‘The Overlooked History of Neurolaw,’ Fordham Law Review (2016); 85: 667695.Google Scholar
Shen, F. X., ‘Neurolegislation: How U.S. Legislators Are Using Brain Science’, Harvard Journal of Law & Technology (2016).Google Scholar
Shepard, B., ‘UAB to Start First Human Trials of Drug to Prevent Death Due to Severe Blood Loss’, 21 October 2015, available at https://uab.edu/news/innovation/item/6624-uab-to-start-first-human-trials-of-drug-to-prevent-death-due-to-severe-blood-loss.Google Scholar
Sherstobitoff, R., ‘Hidden Cobra Targets Turkish Financial Sector with New Bankshot Implant’, 8 March 2018, available at https://securingtomorrow.mcafee.com/mcafee-labs/hidden-cobra-targets-turkish-financial-sector-new-bankshot-implant/.Google Scholar
Sherwell, P., ‘Blind Man Describes Joy at Seeing Wife for First Time in Decade Thanks to ‘Bionic Eye’, The Telegraph, 24 February 2015.Google Scholar
Siegel, J. Z. and Crockett, M., ‘How Serotonin Shapes Moral Judgment and Behavior’, Annals of the New York Academy of Sciences, Issue: Sociability, Responsibility and Criminality: From Lab to Law (2013), 44.CrossRefGoogle Scholar
Simon, M., ‘A Robot Ear Surgeon Drills into the Future of Medicine’, Wired, 15 March 2017 available at www.wired.com/2017/03/robotear-surgeon-drills-future-medicine/.Google Scholar
Sky, ‘Websites we’ve blocked under order of the High Court’, available at www.sky.com/help/articles/websites-blocked-under-order-of-the-high-court.Google Scholar
Smaglik, P., ‘Building for the Future’, Nature, 408(6812) (2000), 622; IBM Research – Nanotechnology (2002) IBM www.research.ibm.com/pics/nanotech/defined.shtml.CrossRefGoogle Scholar
Smith, B., ‘The Need for a Digital Geneva Convention’, Microsoft Blog dated 14 February 2017, available at https://blogs.microsoft.com/on-the-issues/2017/02/14/need-digital-geneva-convention/#sm.00001e7re9mi1sd8owxcuwmn80906.Google Scholar
Smith, R., The Utility of Force (London: Allen Lane, 2005).Google ScholarPubMed
Som, C., et al., ‘The Importance of Life Cycle Concepts for the Development of Safe Nanoproducts’, Toxicology, 269 (2010), 160169.Google ScholarPubMed
Spaight, J. M., Aircraft in War (London: Macmillan, 1914).Google Scholar
Sparrow, R., ‘The Social Impacts of Nanotechnology: An Ethical and Policy Analysis’, in Maynard, A. and Stilgoe, J. (eds.), The Ethics of Nanotechnology, Geoengineering and Clean Energy (Routledge, 2017), 179.Google Scholar
Sparrow, R., ‘Ethics as a Source of Law: The Martens Clause and Autonomous Weapons’ on International Committee of the Red Cross Blog (14 November 2017).Google Scholar
Stadlmeier, S., ‘CPU and Keyboard: Weapons of Mass Disruption?’ in von Heinegg, W. Heintschel, Frau, R. and Singer, T. (eds.), Dehumanization of Warfare (Springer, Cham, Switzerland, 2018).Google Scholar
Stanley, E., ‘Neuroplasticity, Mind Fitness, and Military Effectiveness’, in R. Armstrong, Bio-Inspired Innovation, 259–269.Google Scholar
Stark, H., ‘A Bipartisan Bill to Strengthen Cyber Security for the Internet of Things’, 20 August 2017, available at www.forbes.com/sites/haroldstark/2017/08/20/a-bipartisan-bill-to-strengthen-cybersecurity-for-the-internet-of-things/#3f51e1a95a5f.Google Scholar
State Coroner of NSW, Inquest into the Deaths Arising from the Lindt Café Siege: Findings and Recommendations, May 2017, ch14, especially paras 5–47, at www.lindtinquest.justice.nsw.gov.au/Documents/findings-and-recommendations.pdf.Google Scholar
Steer, C., Translating Guilt: Identifying Leadership Liability for Mass Atrocity Crimes (The Hague: Asser Press, 2017).CrossRefGoogle Scholar
Stephens, D. and Fitzpatrick, M., ‘Legal Aspects of Contemporary Naval Mine Warfare’ (1999) 21:4 Loyola of Los Angeles International and Comparative Law Journal 553.Google Scholar
Stockton, P. N. and Golabek-Goldman, N., ‘Curbing the Market for Cyber Weapons’, 32 Yale Law and Policy Review 239, (2013) 248.Google Scholar
Stokes, E., ‘Nanotechnology and the Products of Inherited Regulation’, Journal of Law and Society, 39(1) (2012), 93112.CrossRefGoogle Scholar
Stokes, E. and Bowman, D. M., ‘Regulatory Inheritance and Emerging: Technologies: the Case of Nanotechnologies and Synthetic Biology’, European Journal of Risk Regulation, 2 (2012), 235241.CrossRefGoogle Scholar
Stout, D., ‘US Pilots Avoid Prosecution for Bombing Canadian Troops’, New York Times, 19 June 2003.Google Scholar
Stupp, C., ‘France Eyes EU Law to Crack Down on Terrorists’ Use of Social Media,’ Euractiv, 16 February 2018.Google Scholar
Subsea World News, ‘Persistent Littoral Undersea Surveillance (PLUS) System Completes Initial in-Water Testing’, Subsea World News, 28 October 2013, available at https://subseaworldnews.com/2013/10/28/persistent-littoral-undersea-surveillance-plus-system-completes-initial-in-water-testing/.Google Scholar
Sukumar, A. M., ‘The UN GGE Failed: Is International Law in Cyberspace Doomed as Well?,’ Lawfare, 4 July 2017, available at https://lawfareblog.com/un-gge-failed-international-law-cyberspace-doomed-well.Google Scholar
Surden, H., ‘Machine Learning and the Law,’ Washington Law Review (2014); 89: 87115.Google Scholar
Susskind, R., The Future of Law: Facing the Challenges of Information Technology (Oxford: Clarendon Press 1996).Google Scholar
Swanson, R. L. II, et al., ‘Neurological Manifestations Among US Government Personnel Reporting Directional Audible and Sensory Phenomena in Havana, Cuba’, Journal of the American Medical Association Preliminary Communication, 15 February 2018.Google Scholar
Sweeney, E., ‘“Troubles” Legacy: Derry Used as Testing Ground for Plastic Bullets’, Derry Journal, 26 April 2016, at www.derryjournal.com/news/troubles-legacy-derry-used-as-testing-ground-for-plastic-bullets-1-7348893.Google Scholar
Tafirenyika, M., ‘Drones are Effective in Protecting Civilians – Herve Ladsous’, Africa Renewal, April 2016, at www.un.org/africarenewal/magazine/april-2016/drones-are-effective-protecting-civilians.Google Scholar
Talpalariu, D., ‘Airport Speech and Brain Scans Identify the Terrorist in You’, Softpedia, 3 December 2008.Google Scholar
Tether, T., Subcommittee on Terrorism, Unconventional Threats and Capabilities, House Armed Services Committee, United States House of Representatives, 27 March 2003, available at www.darpa.mil/attachments/TestimonyArchived(March%2027%202003).pdf.Google Scholar
The Economist, ‘Know Your Enemy: How to Make Soldiers’ Brains Better at Noticing Threats’, 27 July 2017, available at www.economist.com/news/science-and-technology/21725543-target-recognition-warfare-how-make-soldiers-brains-better-noticing. (accessed 13 February 2018).Google Scholar
The Local, ‘German government wants “backdoor” access to every digital device’: Report, 1 December 2017, available at www.thelocal.de/20171201/german-government-wants-backdoor-access-to-every-digital-device-report.Google Scholar
The Scientific Committee on Emerging and Newly Identified Health Risks, Nanomaterials (2006), available at http://ec.europa.eu/health/scientific_committees/opinions_layman/en/nanotechnologies/l-3/5-nanoparticles-consumer-products.htm#0p0.Google Scholar
Thielman, S., ‘Yahoo Hack: 1bn Accounts Compromised by Biggest Data Breach in History’; the Guardian 15 December 2016, available at www.theguardian.com/technology/2016/dec/14/yahoo-hack-security-of-one-billion-accounts-breached.Google Scholar
Thomas, D., ‘Facebook to Tackle Fake News with Education Campaign’, BBC News, 6 April 2017, available at www.bbc.com/news/technology-39517033.Google Scholar
Thomas, M. L. and Russo, M. B., ‘Neurocognitive Monitors: Toward the Prevention of Cognitive Performance Decrements and Catastrophic Failures in the Operational Environment’, Aviation Space and Environmental Medicine 78:5 (May 2007), 144145.Google ScholarPubMed
Thurnher, J. at Thurnher, J. S., ‘Feasible Precautions in Attack and Autonomous Weapons’, in W. Heintschel von Heinegg, et al., (eds.), Dehumanization of Warfare , 99, 108–114.CrossRefGoogle Scholar
Tikk, E. and Kerttunen, M., ‘The Alleged Demise of the UN GGE: An Autopsy and Eulogy’, Cyber Policy Institute, 2017, available at http://cpi.ee/wp-content/uploads/2017/12/2017-Tikk-Kerttunen-Demise-of-the-UN-GGE-2017–12–17-ET.pdf.Google Scholar
Tikk, E. and Kerttunen, M., ‘Cyber Treaty Is Coming: Что делать?’, Cyber Policy Institute (2018), 5, available at http://cpi.ee/wp-content/uploads/2018/02/Cyber-Treaty-is-Coming-Tikk-Kerttunen.pdf.Google Scholar
Tovey, A., ‘Rise of The Machines: How Robot Brickies Could Be on Site Soon’, Daily Telegraph, 27 June 2017.Google Scholar
Townsend, M. and Helm, T., ‘Threat of Russian Cyber Reprisal Puts UK Finance, Power and Water on High Alert’, The Guardian, 18 March 2018, available at www.theguardian.com/world/2018/mar/17/uk-finance-power-water-on-high-alert-threat-russian-cyber-reprisal-grows.Google Scholar
Travis, A. and Arthur, C., ‘EU Court Backs Right To Be Forgotten: Google Must Amend Results on Request’, the Guardian, 13 May 2014.Google Scholar
Tronchetti, F., ‘Legal Aspects of the Military Uses of Outer Space’, in von der Dunk, F. and Tronchetti, F. (eds.), Handbook of Space Law, (Cheltenham: Edward Elgar, 2015.Google Scholar
Troy, M., ‘USS John McCain Destroyer: Who’s At Fault When Ships Collide?’, ABC News, 21 August 2017, available at www.abc.net.au/news/2017-08-21/uss-john-mccain-destroyer:-whos-at-fault-when-ships-collide/8827516.Google Scholar
Tucker, J. B. (ed.), Innovation, Dual Use, and Security: Managing the Risks of Emerging Biological and Chemical Technologies (Cambridge, MA: Massachusetts Institute of Technology Press, 2012).Google Scholar
Tucker, R. W., The Law of War and Neutrality at Sea, p. (Washington, DC, 1955).Google Scholar
Turing, A., ‘Intelligent Machinery: A Report,’ National Physical Laboratory (1948), available at www.alanturing.net/intelligent_machinery/.Google Scholar
UK Department for Digital, Culture, Media and Sport, Secure by Design: Improving the cyber security of consumer Internet of Things Report, available at www.gov.uk/government/uploads/system/uploads/attachment_data/file/686089/Secure_by_Design_Report_.pdf.Google Scholar
UK Government Press Release ‘Rocketing to success - Space Industry Act to unlock billions for the UK economy’, 16 March 2018, available at www.gov.uk/government/news/rocketing-to-success-space-industry-act-to-unlock-billions-for-the-uk-economy.Google Scholar
UNIDIR, ‘Framing Discussions on the Weaponisation of Increasingly Autonomous Technologies’, (2014), available at www.unidir.org/files/publications/pdfs/framing-discussionson-the-weaponization-of-increasingly-autonomous-technologies-en-606.pdf.Google Scholar
United States Navy MK 15 - Phalanx Close-In Weapons System, described at www.navy.mil/navydata/fact_display.asp?cid=2100&tid=487&ct=2.Google Scholar
University of Canterbury, ‘Simulating friendly fire to learn how to avoid it’, 05 April 2016, available at www.canterbury.ac.nz/news/2016/simulating-friendly-fire-to-learn-how-to-avoid-it.htmlGoogle Scholar
University of Southern California Neuroimaging and Informatics Institute, ‘The Human Connectome Project’, available at www.humanconnectomeproject.orgGoogle Scholar
Urban, K. R., ‘Performance Enhancement at the Cost of Potential Brain Plasticity: Neural Ramifications of Nootropic Drugs in the Healthy Developing Brain’, Frontiers in Systems Neuroscience, Vol. 8, No 38 (May 2014), 2.Google ScholarPubMed
USAF Judge Advocate General’s Department, Air Force Operations and the Law, A Guide for Air and Space Forces (2002), 47.Google Scholar
US Defense Advanced Research Projects Agency (DARPA), Towards a High-Resolution, Implantable Neural Interface, available at www.darpa.mil/news-events/2017-07-10.Google Scholar
US Department of Defense, ‘Description of Medals’, http://valor.defense.gov/Description-of-Awards/.Google Scholar
US Department of Defense, Non-Lethal Weapons Program, ‘Active Denial Technology’, available at http://jnlwp.defense.gov/Future-Non-Lethal-Weapons/Active-Denial-Technology/.Google Scholar
US Department of Defense, Non-Lethal Weapons Program, ‘Distributed Sound and Light Array’, available at http://jnlwp.defense.gov/Developing-Non-Lethal-Weapons/Distributed-Sound-and-Light-Array/.Google Scholar
US Department of Homeland Security, Future Attribute Screening Technology Factsheet, 2 March 2016, available at www.dhs.gov/publication/future-attribute-screening-technology.Google Scholar
US Department of Transportation, 23 February 2018, available at www.transportation.gov/AV.Google Scholar
US Director of National Intelligence website, available at www.iarpa.gov/index.php/research-programs/best.Google Scholar
Food, US and Administration, Drug, Computer-Assisted Surgical Systems, last updated 29 July 2015, available at www.fda.gov/MedicalDevices/ProductsandMedicalProcedures/SurgeryandLifeSupport/ComputerAssistedSurgicalSystems/default.htm.Google Scholar
USNI, ‘Report to Congress on Navy Laser, Railgun and Hypervelocity Projectiles’, 26 February, 2018, available at https://news.usni.org/2017/12/05/report-congress-navy-laser-railgun-hypervelocity-projectiles-2.Google Scholar
USNI, ‘Report to Congress on US Navy Destroyer Programs’, 5 October 2017, available at https://news.usni.org/2017/10/05/report-congress-u-s-navy-destroyer-programs-2.Google Scholar
US National Research Council, An Assessment of Non-Lethal Weapons Science and Technology (Washington, DC: The National Academies Press, 2003).Google Scholar
Van de Meent, H., Hopman, M. T. and Frölke, J. P., ‘Walking Ability and Quality of Life in Subjects with Transfemoral Amputation: A Comparison of Osseointegration with Socket Prostheses’, Archives of Physical Medicine and Rehabilitation (2013),94: 21742178.CrossRefGoogle ScholarPubMed
Vance, A., Elon Musk, Tesla, SpaceX and the Quest for a Fantastic Future, (Harper Collins, 2015).Google Scholar
Vasterling, J. J., et al., ‘Neuropsychological Outcomes of Army Personnel Following Deployment to the Iraq War’, Journal of the American Medical Association 296, 5 (August 2006), 526528.Google Scholar
Viswanath, B. and Kim, S., ‘Influence of Nanotoxicity on Human Health and Environment: The Alternative Strategies’, Review of Environmental Contamination and Toxicology, 242 (2017), 61104.Google ScholarPubMed
Vlasic, I. A., ‘Space Law and the Military Applications of Space Technology’, in Jasentuliyana, N. (ed.) Perspectives on International Law, (Kluwer Law International, London, 1995).Google Scholar
Voelz, G., ‘Catalysts of Military Innovation: A Case Study of Defense Biometrics’, 23 Defense ARJ 2, April 2016, 178, 185.Google Scholar
von Heinegg, W. Heintschel, ‘The International Law of Mine Warfare at Sea’, 23 Israel Yearbook of Human Rights, 5376 (1993).Google Scholar
von Heinegg, W. Heintschel, ‘Protecting Critical Submarine Cyber Infrastructure: Legal Status and Protection of Submarine Communications Cables under International Law’, in Ziolkowski, K. (ed.), Peacetime Regime for State Activities in Cyberspace (Tallinn: NATO, CCD COE, 2013).Google Scholar
von Heinegg, W. Heintschel, ‘Unmanned Maritime Systems: Does the Increasing Use of Naval Weapon Systems Present a Challenge for IHL?’, in von Heinegg, W. Heintschel, Frau, R. and Singer, T. (eds.), Dehumanization of Warfare: Legal Implications of New Weapon Technologies (New York: Springer, 2018).CrossRefGoogle Scholar
Wagner, J., ‘China’s Cybersecurity Law: What You Need to Know,’ The Diplomat, 1 June 2017, available at http://thediplomat.com/2017/06/chinas-cybersecurity-law-what-you-need-to-know/.Google Scholar
Waldrop, E.Integration of Military and Civilian Space Assets: Legal and National Security Implications’ (2004) 55 Air Force Review 157.Google Scholar
Walker, G. (ed.), Definitions for the Law of the Sea, p. 241 (Leiden/Boston: Martinus Nijhoff, 2012).CrossRefGoogle Scholar
Wall, A. E., ‘Legal and Ethical Lessons of NATO’s Kosovo Campaign’, US Naval War College International Law Studies, Vol. 78, Parts III and IV.Google Scholar
Wallace, D., ‘Trends in Traumatic Limb Amputation in Allied Forces in Iraq and Afghanistan,’ Journal of Military and Veterans Health (2012).Google Scholar
Wallace, D. and Reeves, S., ‘Modern Weapons and the Law of Armed Conflict’, in Corn, G. S., VanLandingham, R. E., and Reeves, S. R. (eds.), U.S. Military Operations: Law, Policy, and Practice (New York: Oxford University Press, 2016) 41, 58–59.Google Scholar
Wang, J. and Dortmans, P., ‘Nanotechnology: Selected Topics and Potential Military Application’ (Paper presented at Land Warfare Conference, Melbourne, Australia, 27–30 September 2004) http://dspace.dsto.defence.gov.au/dspace/handle/1947/2559 69–81.Google Scholar
Washington Post Staff, ‘Full Transcript: FBI Director James Comey Testifies on Russian Interference in 2016’, The Washington Post, 20 March 2017, available at www.washingtonpost.com/news/post-politics/wp/2017/03/20/full-transcript-fbi-director-james-comey-testifies-on-russian-interference-in-2016-election/?utm_term=.6b6ef8d4c68d.Google Scholar
Watkin, K., ‘Chemical Agents and “Expanding” Bullets: Limited Law Enforcement Exceptions and Unwarranted Handcuffs?’, in Helm, A. M. (ed.), The Law of War in the 21st Century: Weaponry and the Use of Force (US Naval War College International Law Studies, Vol. 82, 2006) 193, 196–197.Google Scholar
Wettach, T. M., ‘Rebalancing Cyber Security in Asia’, The Diplomat, 16 December 2016, available at http://thediplomat.com/2016/11/rebalancing-cybersecurity-in-asia/.Google Scholar
Webster, G., ‘Observations on China’s New International Cyberspace Cooperation Strategy’, Lawfare blog, 7 March 2017, available at www.lawfareblog.com/observations-chinas-newinternational-cyberspace-cooperation-strategy.Google Scholar
Weymouth, L., ‘Russia Is a Threat…to All of Europe’, Foreign Policy, 24 March 2017, available at http://foreignpolicy.com/2017/03/24/russia-lithuania-nato-grybauskaite-putin-trump-interview/.Google Scholar
Wheelis, M., ‘Will the “New Biology” Lead to New Weapons?’, Arms Control Today, 34(6) (2004), 6.Google Scholar
White, M., ‘New Tech Helps Facebook Remove 99% of IS Posts Before Users Flag It Up’, Sky News, 29 November 2017, available at https://news.sky.com/story/new-tech-helpsfacebook-remove-99-of-is-posts-before-users-flag-it-up-11148386.Google Scholar
White House, The National Security Strategy of the United States of America (September 2002), available at www.state.gov/documents/organization/63562.pdf.Google Scholar
Whitehouse, D.,. ‘First dog in space died within hours’, BBC News, 28 October 2002, available at http://news.bbc.co.uk/2/hi/science/nature/2367681.stm.Google Scholar
Widler, T., et al., ‘Organisational Risk Management of Nanomaterials Using SUNDS: The Contribution of CENARIOS®’ in Murphy, F., McAlea, E. M. and Mullins, M. (eds.), Managing Risk in Nanotechnology (New York: Springer International, 2016), 219235.CrossRefGoogle Scholar
Wiles, P., ‘Metropolitan Police’s Use of Facial Recognition Technology at the Notting Hill Carnival, 2017’, Press Release, 23 August 2017.Google Scholar
Williams, G., Textbook of Criminal Law, 2nd edn (London: Stevens and Son, 1983).Google Scholar
Williams, I., Rum: A Social and Sociable History (New York: Nation Books, 2005).Google Scholar
Willoughby, A., ‘Biometric Surveillance and the Right to Privacy’, 36 IEEE Technology and Society Magazine 3, September 2017, available at http://ieeexplore.ieee.org/document/8038135/.CrossRefGoogle Scholar
Wilson, R. F., ‘Nanotechnology: The Challenge of Regulating Known Unknowns’, The Journal of Law, Medicine & Ethics, 34(4) (2006), 704713.Google ScholarPubMed
Wong, K., ‘Australia Seeks Guidance on Quantum Technologies’, 11 January 2018, available at www.janes.com/article/77006/australia-seeks-guidance-on-quantum-technologies.Google Scholar
Wong, K. ‘Sea Sentinels: Chinese Unmanned Maritime Systems Gain Traction’, available at www.janes.com/images/assets/219/77219/Sea_sentinels_Chinese_unmanned_maritime_systems_gain_traction.pdf.Google Scholar
Wong, K., ‘Australia Seeks Guidance on Quantum Technologies’, 11 January 2018, available at www.janes.com/article/77006/australia-seeks-guidance-on-quantum-technologies.Google Scholar
Woodward, J. Jr, ‘Using Biometrics to Achieve Identity Dominance in the Global War on Terrorism’ (September–October 2005) LXXXV No.5 Military Review 30 at 31.Google Scholar
Woolf, N., ‘DDoS Attack That Disrupted Internet Was Largest of Its Kind in History, Experts Say’, The Guardian, 26 October 2016.Google Scholar
Wrathall, L. R., ‘The Vulnerability of Subsea Infrastructure to Underwater Attack: Legal Shortcomings and the Way Forward’, 12 San Diego Int’l Law Journal (2010–2011), 223261, at 228.Google Scholar
Wroe, D., ‘New Sabotage Laws for Cyber Attacks on Australia’s Critical Infrastructure’, Sydney Morning Herald, 8 December 2017, available at www.smh.com.au/federal-politics/political-news/new-sabotage-laws-for-cyber-attacks-on-australias-critical-infrastructure-20171207-h00oc2.html.Google Scholar
Wu, S. S. and Goodman, M., ‘Neural Devices Will Change Humankind: What Legal Issues Will Follow?,’ American Bar Association SciTech Lawyer (Winter 2012).Google Scholar
Xia, S., ‘China Establishes Its First Cyber Court in Hangzhou: Thank You Alibaba’, China Law Blog, 16 August 2017, available at www.chinalawblog.com/2017/08/china-establishes-its-firstcyber-court-in-hangzhou-thank-you-alibaba.html.Google Scholar
Xuequan, M., ‘China asks online group, WeChat account admins to take responsibility’, Xinhuanet, 19 September 1917, available at http://news.xinhuanet.com/english/2017–09/08/c_136592568.htm.Google Scholar
Yang, G. Z., et al., ‘Medical robotics: Regulatory, Ethical And Legal Considerations for Increasing Levels of Autonomy’, 2 Science Robotics 4, 15 March 2017, available at http://robotics.sciencemag.org/content/2/4/eaam8638.full.CrossRefGoogle ScholarPubMed
Yin, H., et al., ‘Structure-Guided Chemical Modification of Guide RNA Enables Potent Non-Viral in Vivo Genome Editing’, Nature Biotechnology (2017), nature.com/articles/doi:10.1038/nbt.4005.CrossRefGoogle Scholar
Young, M., ‘Neural Network Finds 8-Planet System,’ Sky & Telescope, 15 December 2017.Google Scholar
Zaidi, D., ‘Inside China’s Growing Use of Facial Recognition Technology’ Venture Beat, 15 February 2018.Google Scholar
Zanders, J. P., ‘The Chemical Weapons Convention and Universality: A Question of Quality over Quantity?’, Disarmament Forum, 4 (2002), 23.Google Scholar
Zanders, J. P., ‘International Norms against Chemical and Biological Warfare: An Ambiguous Legacy’, (2003) 8(2) JCSL 391, 407–408.Google Scholar
Zorpette, G., ‘The Benefits of Building an Artificial Brain,’ IEEE Spectrum, 31 May 2017, available at https://spectrum.ieee.org/computing/hardware/can-we-copy-the-brain.Google Scholar
Zyga, L., Microbots can clean up polluted water (11 April 2016) Phys Org, available at https://phys.org/news/2016–04-microbots-polluted.html.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Select Bibliography
  • Edited by William H. Boothby
  • Book: New Technologies and the Law in War and Peace
  • Online publication: 14 December 2018
  • Chapter DOI: https://doi.org/10.1017/9781108609388.017
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Select Bibliography
  • Edited by William H. Boothby
  • Book: New Technologies and the Law in War and Peace
  • Online publication: 14 December 2018
  • Chapter DOI: https://doi.org/10.1017/9781108609388.017
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Select Bibliography
  • Edited by William H. Boothby
  • Book: New Technologies and the Law in War and Peace
  • Online publication: 14 December 2018
  • Chapter DOI: https://doi.org/10.1017/9781108609388.017
Available formats
×