Journal of National Security Law & Policy

Total Page:16

File Type:pdf, Size:1020Kb

Journal of National Security Law & Policy VOLUME 10 2020 NUMBER 3 ARTICLES Countering the Cyber Enforcement Gap: Strengthening Global Capacity on Cybercrime Allison Peters & Amy Jordan Persistent Enforcement: Criminal Charges as a Response to Nation-State Malicious Cyber Activity Garrett Hinck & Tim Maurer Challenges and Opportunities in State and Local Cybercrime Enforcement Maggie Brunner Full Count?: Crime Rate Swings, Cybercrime Misses and Why We Don't Really Know the Score Eileen Decker Advancing Accurate and Objective Cybercrime Metrics Stephen Cobb Defining the Scope of ªPossession, Custody, or Controlº for Privacy Issues and the CLOUD Act Justin Hemmings, Sreenidhi Srinivasan & Peter Swire Transnational Government Hacking Jennifer Daskal Journal of National Security Law & Policy Cite this issue: 10 J. NAT’L SECURITY L. & POL’Y —— (2020) The Journal of National Security Law & Policy (ISSN 1553-3158) is a peer-reviewed journal published three times per year jointly by the Georgetown University Law Center and the Institute National Security and Counterterrorism (INSCT) of the Maxwell School of Citizenship & Public Affairs and College of Law of Syracuse University. The views expressed in this issue are those of the authors, and do not necessarily reflect the policies or opinions of the Journal, its editors and staff, Georgetown University Law Center, or SPL. Subscriptions: Subscriptions are $35.00 per year, or $15.00 per issue, payable in advance to: Journal of National Security Law & Policy, Subscriptions, 600 New Jersey Ave., N.W., Washington, D.C. 20001. Tel.: (202) 662-9423, fax: (202) 347-2570, email: lawojasubscrip- [email protected]. Subscriptions are renewed automatically upon expiration unless the subscriber sends timely notice of termination. All notifications of change of address should include both old and new address. Please notify one month in advance to ensure prompt deliv- ery. POSTMASTER: Send address changes to Journal of National Security Law & Policy, Office of Journal Administration, 600 New Jersey Ave., N.W., Washington, D.C. 20001. Submissions: To submit an article to the Journal, visit www.jnslp.com. Unsolicited manuscripts for publication are welcome. Correspondence: Please address all correspondence to: Journal of National Security Law & Policy, Williams Institute Suite, 600 New Jersey Ave., N.W., Washington, D.C. 20001. Tel: (202) 662-4072, email: [email protected]. Copyright: All articles copyright © 2020 by the Journal of National Security Law & Policy except when otherwise expressly indicated. For all articles in which it holds copyright, the Journal permits copies to be made for classroom use, under the following provisions: (1) the user notifies the Office of Journal Administration of having made such copies, (2) the author and the Journal are identified, and (3) the proper notice of copyright is affixed to each copy. Except when otherwise expressly provided, the copyright holder for every article in this issue for which the Journal does not hold the copyright grants permis- sion for copies of that article for classroom use, provided that the user notifies the author and the Office of Journal Administration of having made such copies and the author and the Journal are identified, and that the proper notice of copyright is affixed to each copy. For reprint permission for purposes other than classroom use, please contact the Office of Journal Administration at the above address or by e-mail at [email protected]. Please allow at least one business week for processing. Notice of Non-Discrimination In accordance with the requirements of Title VI of the Civil Rights Act of 1964, Title IX of the Education Amendments of 1972, section 504 of the Rehabilitation Act of 1973, Title VII of the Civil Rights Act of 1964 as amended, Section 503 of the Rehabilitation Act of 1973 and DC Human Rights Act of 1977, and the implementing regulations promulgated under each of these federal statutes, Georgetown University does not discriminate in its pro- grams, activities, or employment practices on the basis of race, color, national origin, sex, age, disability, religion, sexual orientation, gender identity and expression and other catego- ries covered by the DC Human Rights Act of 1977. The University’s compliance program under these statutes and regulations is supervised by Rosemary Kilkenny, Vice President, Institutional Diversity & Equity programs. Her office is located in Darnall Hall, Georgetown University, and her telephone number is (202) 687-4798. JOURNAL OF NATIONAL SECURITY LAW & POLICY Volume 10 2020 Number 3 EDITOR-IN-CHIEF William C. Banks FORMER EDITORS-IN-CHIEF John Cary Sims Stephen Dycus MANAGING EDITOR Todd Huntley EDITORIAL BOARD James E. Baker Kate Martin Aditya Bamzai Mary-Rose Papandrea William C. Banks Deborah Pearlstein Emily Berman Samuel J. Rascoff Phillip Carter Elizabeth Rindskopf Parker Gary Corn Milton Regan Rebecca Crootof Paul Rosenzweig Jennifer C. Daskal Marc Rotenberg Ashley Deeks Dakota Rudesill Mary DeRosa Margo Schlanger Laura Dickenson Michael N. Schmitt Laura K. Donohue Sudha Setty Eugene Fidell Shirin Sinnar David E. Graham Robert Taylor Peter Raven-Hansen Rachel VanLandingham Margaret Hu Matthew Waxman Rebecca Ingber Leah West Martin S. Lederman FACULTY JOURNAL ADVISORS Laura K. Donohue David Koplow David Luban JOURNAL ADVISOR Todd Huntley STUDENT EDITOR-IN-CHIEF Matthew W. Harden MANAGING EDITORS James Gulliksen Jonathan Greengarden Guy Mentel John Troutman EXECUTIVE NOTES EDITOR Kayla Svihovec ADMINISTRATIVE EDITOR Nicholas Kennedy LLM PEER REVIEWERS Patrick Alban Matthew Miller William Friedman Vince Romano Gary Khalil Brendan Sullivan Tarun Krishnakumar Laura West SENIOR SYMPOSIUM CO-EDITORS Gina Acevedo Paul Moe Ingrid Schulz JUNIOR SYMPOSIUM CO-EDITORS Rachel Schumacher Kyle Yoerg STAFF EDITORS Rachel Bayer Madeline Moran Michael Crowley Kristen Pappas Robert Hogan Alling Remsen Alexander Gershen Monty Roberson Carl Grif®n Jennifer Sawicki Michael Ingram Lucas Scarasso Laila Khan Adam Silow Katie Meili Sara Skutch Bryan R. Mendiola-Pla Sanaya Tamboli Nicole Molinaro This Issue has been produced in collaboration with Third Way. The Journal of National Security Law & Policy thanks Third Way for their scholarship and contributions to national security. Introduction to the Special Issue We are honored to bring you this special issue on cybercrime enforcement. All too often in the cybersecurity debate, we do not talk about the human behind the malicious cyber attacks, and what can be done to hold them accountable. We know that the impact of their crimes is widespread. We have seen cybercriminals target our cities, critical infrastructure, ®nancial sector, healthcare systems, and our election systems. Cybercrime is estimated to cost the United States between $57 billion and $108 billion annually. The Federal Bureau of Investigation (FBI), received over 450,000 cyber- crime complaints in 2019 alone. Unfortunately, in most of these incidents, the person behind them is never brought to justice. Third Way estimates that for every 1000 inci- dents reported to law enforcement, only three ever see an enforcement action. Over the past year, we set out to try and understand this enforcement gap, why it exists, and what kind of policies are required to narrow it. We recognize that this is hard, there are many challenges to investigating cybercrime and arresting cybercri- minals. Cybercriminals use technologies that help obscure their identity. They are often in countries outside the United States, some of which do not readily cooperate with us. But, it is possible. There have been successes in high pro®le cases, where law enforcement has been able to arrest cybercriminals. However, it happens far too infrequently to deter cybercriminals, and we believe that should change. To that end, Third Way has partnered with the Journal of National Security Law and Policy to bring to you a special issue on developing policy and legal reforms to improve cybercrime enforcement. This special issue includes a diverse array of viewpoints and is a ®rst step in demonstrating that there are ways to improve gov- ernments' ability to catch identify, stop, and punish cybercriminals. It is also a plat- form for a robust conversation to inspire further policy development and broader thinking about how to solve this problem, while balancing competing challenges. Over seven articles, the ®rst special issue on cybercrime enforcement covers a range of topics, from a variety of viewpoints. The issue includes both a study of the challenges to build capacity for state and local law enforcement to an in-depth examination of the global developments in cybercrime and the major challenges to international cooperation among countries. It includes a review of the use of criminal charges as a response to nation-state hacking, as well two different per- spectives, one from the public sector, and one from the private sector, on cyber- crime metrics. Finally, it includes examination of existing domestic and international juris prudence on interpreting legal terms around the CLOUD Act, and implications from the Act on transnational government hacking. We hope you enjoy reading this special issue as much as we have enjoyed producing it. Sincerely, Mieke Eoyang Vice President of the National Security Program, Third Way William Banks Editor-in-Chief, Journal of National Security Law & Policy ARTICLES Countering the Cyber Enforcement Gap: Strengthening Global Capacity on Cybercrime Allison Peters & Amy Jordan*² In March 2018, Europol, the European Union's
Recommended publications
  • Former US Counterintelligence Agent Charged with Espionage on Behalf
    Former U.S. Counterintelligence Agent Charged With Espionage on Behalf of Iran; Four Iranians Charged With a Cyber Campaign Targeting Her Former Colleagues Indictment Unsealed as U.S. Treasury Department Announces Economic Sanctions U.S. Attorney’s Office, District of Columbia Wednesday, February 13, 2019 https://www.justice.gov/usao-dc/pr/former-us-counterintelligence-agent-charged-espionage-behalf-iran- four-iranians-charged WASHINGTON – Monica Elfriede Witt, 39, a former U.S. service member and counterintelligence agent, has been indicted by a federal grand jury in the District of Columbia for conspiracy to deliver and delivering national defense information to representatives of the Iranian government. Witt, who defected to Iran in 2013, is alleged to have assisted Iranian intelligence services in targeting her former fellow agents in the U.S. Intelligence Community (USIC). Witt is also alleged to have disclosed the code name and classified mission of a U.S. Department of Defense Special Access Program. An arrest warrant has been issued for Witt, who remains at large. The same indictment charges four Iranian nationals, Mojtaba Masoumpour, Behzad Mesri, Hossein Parvar and Mohamad Paryar (the “Cyber Conspirators”), with conspiracy, attempts to commit computer intrusion and aggravated identity theft, for conduct in 2014 and 2015 targeting former co- workers and colleagues of Witt in the U.S. Intelligence Community. The Cyber Conspirators, using fictional and imposter social media accounts and working on behalf of the Iranian Revolutionary Guard Corps (IRGC), sought to deploy malware that would provide them covert access to the targets’ computers and networks. Arrest warrants have been issued for the Cyber Conspirators, who also remain at large.
    [Show full text]
  • Educational Intervention to Change Knowledge and Attitudes
    University of Kentucky UKnowledge Theses and Dissertations--Public Health (M.P.H. & Dr.P.H.) College of Public Health 2021 Educational Intervention to Change Knowledge and Attitudes Regarding Sexual Behaviors to Reduce Rates of Sexually Transmitted Infections among University of Kentucky’s Sorority Life Students. Julianna Maita University of Kentucky, [email protected] Follow this and additional works at: https://uknowledge.uky.edu/cph_etds Part of the Public Health Commons Right click to open a feedback form in a new tab to let us know how this document benefits ou.y Recommended Citation Maita, Julianna, "Educational Intervention to Change Knowledge and Attitudes Regarding Sexual Behaviors to Reduce Rates of Sexually Transmitted Infections among University of Kentucky’s Sorority Life Students." (2021). Theses and Dissertations--Public Health (M.P.H. & Dr.P.H.). 323. https://uknowledge.uky.edu/cph_etds/323 This Graduate Capstone Project is brought to you for free and open access by the College of Public Health at UKnowledge. It has been accepted for inclusion in Theses and Dissertations--Public Health (M.P.H. & Dr.P.H.) by an authorized administrator of UKnowledge. For more information, please contact [email protected]. STUDENT AGREEMENT: I represent that my capstone and abstract are my original work. Proper attribution has been given to all outside sources. I understand that I am solely responsible for obtaining any needed copyright permissions. I have obtained needed written permission statement(s) from the owner(s) of each third-party copyrighted matter to be included in my work, allowing electronic distribution (if such use is not permitted by the fair use doctrine) which will be submitted to UKnowledge as Additional File.
    [Show full text]
  • Potential Human Cost of Cyber Operations
    ICRC EXPERT MEETING 14–16 NOVEMBER 2018 – GENEVA THE POTENTIAL HUMAN COST OF CYBER OPERATIONS REPORT ICRC EXPERT MEETING 14–16 NOVEMBER 2018 – GENEVA THE POTENTIAL HUMAN COST OF CYBER OPERATIONS Report prepared and edited by Laurent Gisel, senior legal adviser, and Lukasz Olejnik, scientific adviser on cyber, ICRC THE POTENTIAL HUMAN COST OF CYBER OPERATIONS Table of Contents Foreword............................................................................................................................................. 3 Acknowledgements ............................................................................................................................. 4 Executive summary ............................................................................................................................. 5 Introduction....................................................................................................................................... 10 Session 1: Cyber operations in practice .………………………………………………………………………….….11 A. Understanding cyber operations with the cyber kill chain model ...................................................... 11 B. Operational purpose ................................................................................................................. 11 C. Trusted systems and software supply chain attacks ...................................................................... 13 D. Cyber capabilities and exploits ..................................................................................................
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • Covert Networks a Comparative Study Of
    COVERT NETWORKS A COMPARATIVE STUDY OF INTELLIGENCE TECHNIQUES USED BY FOREIGN INTELLIGENCE AGENCIES TO WEAPONIZE SOCIAL MEDIA by Sarah Ogar A thesis submitted to Johns Hopkins University in conformity with the requirements for the degree of Master of Arts Baltimore, Maryland December 2019 2019 Sarah Ogar All Rights Reserved Abstract From the Bolshevik Revolution to the Brexit Vote, the covert world of intelligence has attempted to influence global events with varying degrees of success. In 2016, one of the most brazen manifestations of Russian intelligence operations was directed against millions of Americans when they voted to elect a new president. Although this was not the first time that Russia attempted to influence an American presidential election, it was undoubtedly the largest attempt in terms of its scope and the most publicized to date. Although much discussion has followed the 2016 election, there have not been much concerted historical analysis which situates the events of 2016 within the global timeline of foreign intelligence collection. This paper argues that the onset of social media has altered intelligence collection in terms of its form, but not in terms of its essence. Using the case study method, this paper illustrates how three different nations apply classical intelligence techniques to the modern environment of social media. This paper examines how China has utilized classical agent recruitment techniques through sites like LinkedIn, how Iran has used classical honey trap techniques through a combination of social media sites, and how Russia has employed the classical tactics of kompromat, forgery, agents of influence and front groups in its modern covert influence campaigns.
    [Show full text]
  • Please Send Cash Or Check To...Greg Buell PO Box 214 Key West
    2/24/2019 4 MD Wives Coup D'Etat Please Send cash or check to..... Greg Buell PO Box 214 Key West FL 33041 [email protected] CELL phone 3054345276 Copyright 2019 New Look inside Amazon lets you read 43 pages... Click Here --------- New Amazon Paperback Book "Secret Files on the 2019 Windmill Car's" ------ Click Here Paperback: 548 pages ISBN-10: 1793855374 ISBN-13: 978-1793855374 Product Dimensions: 8.5 x 1.2 x 11 inches. https://www.amazon.com/dp/1793855374 Click Here... Amazon Paperback + Kindle link to WindmillCAR's and Gravity Engines in 2018 Oui Oui click here for Greg in French on Amazon WindmillCAR's + RV's http://www.electricwindmillcar.com/ 1/679 2/24/2019 4 MD Wives Coup D'Etat 2-24-2019 Waiting for the Trump-Kim Nobel Peace Prize For Ending the Korean War. There is no oil in Korea, grin. 2-24-2019 Why the Priesthood Needs 4 Wife's - Prince Trump-Salman! Ivanka will say to dad maybe next time we will spend more time and money on the Rx Pink Recipe for the Starbucks Pink Latte... Dad spent all his gas money on war not war on cancer. Small Fry 2 will be the Title of Ivanka's book Steve Jobs will be on the cover. http://www.electricwindmillcar.com/ 2/679 2/24/2019 4 MD Wives Coup D'Etat 2-24-2019 Gas Station Owners in China; See the New World Order and War Crime Orders. "China’s Entrepreneurs Are Wary of Its Future With No Gas Stations..
    [Show full text]
  • U.S. and Iranian Strategic Competition April 26 2012
    a report of the csis burke chair in strategy U.S. and Iranian Strategic Competition: The Sanctions game: Energy, Arms Control, and Regime Change Authors Anthony H. Cordesman Bradley Bosserman Sam Khazai April 2012 The Arleigh A. Burke Chair in Strategy has prepared this book as part of a project supported by the Smith Richardson Foundation. Iran V: Sanctions Competition AHC April 26, 2012 ii EXECUTIVE SUMMARY This report analyzes US and Iranian strategic competition in four key areas—sanctions, energy, arms control, and regime change. It shows that shifts in the nature and intensity of sanctions on Iran have radically changed this aspect of US and Iranian competition since the Fall of 2011. This escalation has been spurred by Iran’s ongoing missile deployments and nuclear programs, as reported in sources like the November 2011 IAEA report highlighting the probable military dimensions of Iran’s nuclear program. It has also been spurred by incidents like an Iranian assassination plot against the Saudi Ambassador to the US, an Iranian-government-sponsored mob attack on the British Embassy in Tehran on November 30, 2011, and Iranian threats to “close” the Gulf to oil exports. A New Round of Sanctions Iran’s steady progress towards the capability to build nuclear weapons has led to a new round of sanctions from the US and its allies. Washington has sought to further isolate Iran economically through new US sanctions on the Iranian Central Bank and Iranian companies involved in its nuclear industry, including the petrochemical and oil industry. Iran’s primary source of revenue—crude oil exports—is further threatened by a unanimous decision by the European Union on January 23rd to impose a full embargo on the import of Iranian oil and petrochemicals.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Former Cardinal Expelled As Pope Confronts Abuse
    C M Y K Nxxx,2019-02-17,A,001,Bs-4C,E2 Late Edition Today, sunshine and clouds, high 38. Tonight, a little snow, sleet and freezing rain, low 32. Tomorrow, morning snow, 1-2 inches total, high 40. Weather map is on Page C8. VOL. CLXVIII ... No. 58,241 © 2019 The New York Times Company NEW YORK, SUNDAY, FEBRUARY 17, 2019 $6.00 FORMER CARDINAL EXPELLED AS POPE CONFRONTS ABUSE RARE STEP BY VATICAN A Sign That Top Prelates Are Not Immune to Severe Discipline By ELIZABETH DIAS and JASON HOROWITZ Pope Francis has expelled Theodore E. McCarrick, a former cardinal and archbishop of Wash- ington, from the priesthood, after the church found him guilty of sex- ually abusing minors and adult seminarians over decades, the Vatican said on Saturday. The move appears to be the first time any cardinal has been de- frocked for sexual abuse — mark- ing a critical moment in the Vati- can’s handling of a scandal that has gripped the church for nearly two decades. It is also the first time an American cardinal has been removed from the priest- hood. In a statement on Saturday, the Vatican said Mr. McCarrick had been dismissed after he was tried and found guilty of several crimes, TYLER HICKS/THE NEW YORK TIMES including soliciting sex during Saleh Raken was playing near his home in Baida, Yemen, when a land mine blew off his lower leg. Mines have killed as many as 920 civilians and wounded thousands. confession and “sins” with minors and with adults, “with the aggra- vating factor of the abuse of power.” While the Vatican has de- Critical of U.S., Hidden Calamity in Yemen’s Civil War: A Million Land Mines frocked hundreds of priests for sexual abuse of minors, few of the Spying Suspect Nearly four years after Saudi is horrendous,” said Loren Persi church’s leaders have faced se- By DAVID D.
    [Show full text]
  • Guerra Cibernética E Ameaças Transnacionais
    Revista da Escola de Guerra Naval Rio de Janeiro, v. 20, n.1, jan./jun. 2014 ESCOLA DE GUERRA NAVAL A Revista da Escola de Guerra Naval é um periódico especializado em Estudos Estratégicos que tem o propósito de disseminar e promover intercâmbio, em níveis nacional e internacional, de conhecimentos relativos à Defesa com ênfase na área de Ciência Política e Relações Internacionais. Desta forma, tem como objetivo proporcionar maior integração entre a Marinha do Brasil e a sociedade, publicando artigos científicos, comunicações e resenhas. COMANDANTE DA MARINHA: Almirante-de-Esquadra Eduardo Bacellar Leal Ferreira CHEFE DO ESTADO-MAIOR DA ARMADA: Almirante-de-Esquadra Wilson Barbosa Guerra DIRETOR DA ESCOLA DE GUERRA NAVAL: Contra-Almirante Antonio Fernando Garcez Faria ISSN 1809-3191 Janeiro/Junho 2014, vol. 20, n. 1 CORRESPONDÊNCIA: ESCOLA DE GUERRA NAVAL CENTRO DE ESTUDOS POLÍTICO-ESTRATÉGICOS Av. Pasteur, 480 - Praia Vermelha - Urca CEP 22290-255 Rio de Janeiro/RJ - Brasil (21) 2546-9394 [email protected] Aos cuidados do Editor Executivo da Revista da Escola de Guerra Naval Os trabalhos poderão ser apresentados em conformidade com as Instruções aos Autores, contidas na última página de cada volume, para o e-mail: [email protected] R. Esc. Guerra Naval Rio de Janeiro v. 20 n. 1 p. 1 - 264 jan./jun. 2014 A Revista da Escola de Guerra Naval é uma publicação semestral, editada pelo Centro de Estudos Político-Estratégicos (CEPE) e vinculada ao Programa de Pós-Graduação em Estudos Marítimos (PPGEM), sem fins lucrativos,que publica, prioritariamente, trabalhos originais e inéditos. A política editorial da Revista estabelece que os artigos devem apresentar uma reflexão inovadora e contribuir para o desenvolvimento de um pensamento estratégico autóctone em matéria de Defesa, particularmente, no que se refere ao poder marítimo.
    [Show full text]
  • U.S. and Iranian Strategic Competition
    Iran V: Sanctions Competition January 4, 2013 0 U.S. AND IRANIAN STRATEGIC COMPETITION Sanctions, Energy, Arms Control, and Regime Change Anthony H. Cordesman, Bryan Gold, Sam Khazai, and Bradley Bosserman April 19, 2013 Anthony H. Cordesman Arleigh A. Burke Chair in Strategy [email protected] Note: This report is will be updated. Please provide comments and suggestions to [email protected] Iran V: Sanctions Competition April, 19 2013 I Executive Summary This report analyzes four key aspects of US and Iranian strategic competition - sanctions, energy, arms control, and regime change. Its primary focus is on the ways in which the sanctions applied to Iran have changed US and Iranian competition since the fall of 2011. This escalation has been spurred by the creation of a series of far stronger US unilateral sanctions and the EU‘s imposition of equally strong sanctions – both of which affect Iran‘s ability to export, its financial system and its overall economy. It has been spurred by Iran‘s ongoing missile deployments and nuclear program, as reported in sources like the November 2011 IAEA report that highlights the probable military dimensions of Iran‘s nuclear program. And, by Iranian rhetoric, by Iranian threats to ―close‖ the Gulf to oil traffic; increased support of the Quds Force and pro-Shiite governments and non-state actors; and by incidents like the Iranian-sponsored assassination plot against the Saudi Ambassador to the US, an Iranian government instigated mob attack on the British Embassy in Tehran on November 30, 2011, and the Iranian-linked attacks against Israeli diplomats.
    [Show full text]
  • Criminal Minds Morgan and Garcia Hook up Pourrez En Quelques Cliques Trouver La Perle Rare
    Apr 20, · Penelope Garcia (Kirsten Vangsness) and Derek Morgan (Shemar Moore) were the lighthearted dynamic duo of the BAU on Criminal Minds. Their relationship was . Derek Morgan is a former Supervisory Special Agent with the FBI's Behavioral Analysis Unit. For a time, he was the acting unit chief of the BAU, taking over as Hotch stepped down temporally. Morgan specialized in explosives, fixations, and obsessive behaviors. He officially resigned from the BAU in Season Eleven in order to be with his new family. His position was taken over by Luke Alvez in. Jan 15, · Directed by Tawnia McKiernan. With Joe Mantegna, Shemar Moore, Matthew Gray Gubler, A.J. Cook. When a murder investigation opens in San Jose, Garcia is forced to delve into her past as a hacker and reconnect with her former boyfriend to help the BAU solve the case. Feb 10, · Yes, former Superman Dean Cain starred in the latest Criminal Minds as a gambling addict/murderer. It was good to see him. But there was a rewind & repeat moment that I need to talk about more. It has to do with a certain scene that featured Morgan and Garcia. You know the one. Garcia was nursing quite the hangover. J.J. called to tell her they. May 28, · Sometimes we get inside a show so much that we forget that the actors are real people with a different life than the one we see on screens. ‘Criminal Minds’ has been on the air for more than thirteen years, and you’d be surprised by the real-life spouses of the main cast.
    [Show full text]