Conflict in Cyberspace and International Law Ido Kilovaty a Thesis Submitted in Partial Fulfillment of the Requirements For

Total Page:16

File Type:pdf, Size:1020Kb

Conflict in Cyberspace and International Law Ido Kilovaty a Thesis Submitted in Partial Fulfillment of the Requirements For Conflict in Cyberspace and International Law Ido Kilovaty A thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Juridical Science (S.J.D.) at the Georgetown University Law Center 2017 1 Published as: Law journal publications Doxfare – Election Hacking as Prohibited Intervention 9 HARVARD NATIONAL SECURITY JOURNAL (Forthcoming Fall 2017) World Wide Web of Exploitations: The Case of Peacetime Cyber Espionage Operations Under International Law: Towards a Contextual Approach 18 COLUMBIA SCIENCE AND TECHNOLOGY LAW REVIEW 42 (2017) Virtual Violence – Disruptive Cyberspace Operations as "Attacks" under International Humanitarian Law 22 MICHIGAN TELECOMMUNICATION AND TECHNOLOGY LAW REVIEW 113 (2017) ICRC, NATO and the U.S. – Direct Participation in “Hacktivities” – Targeting Private Contractors in Cyberspace under the Law of Armed Conflict 15 DUKE LAW AND TECHNOLOGY REVIEW 1 (2016) Op-eds Want to Keep Hackers Out of Gadgets? Try International Law WIRED.COM (February 7, 2017). Violence in Cyberspace: Are Disruptive Cyberspace Operations Legal under International Humanitarian Law? JUST SECURITY (March 3, 2017). The Democratic National Committee Hack: Information as Interference JUST SECURITY (August 1, 2016). Will “Cyber Bonds” Mitigate Transnational Cyberspace Threats? JUST SECURITY (June 15, 2016). 2 ABSTRACT Conflict in Cyberspace and International Law Ido Kilovaty In this dissertation, through four separately published articles, I address several contentious questions with regard to offensive cyberspace capabilities and the role of international law in the digital era. Offensive cyberspace capabilities, which for clarity purposes I refer to as “cyber- attacks,” are operations in cyberspace that target the confidentiality, integrity, and availability (colloquially known as the CIA triad) of information technology systems.1 Throughout these four articles, I explore contemporary international law as it applies to cyber conflict. I argue interntional law, at present, is not always well-suited to fully address the full breadth of challenges presented by the increasing use of cyber-attacks by states. Moreover, cyber-attacks are not used exclusively by states. For example, civilians and certain organized groups are finding this domain appealing for achieving their ends. In Doxfare, I challenge the prevalent view that the prohibition on intervention, in order to be triggered, should be accompanied with a coercive act. The context of this paper is the 2016 U.S. election interference, allegedly orchestrated by the Russian government, carried out primarily through cyberspace. This interference, in the form of hacking the Democratic National Committee and John Podesta’s e-mail accounts, as well as publishing these e-mails through WikiLeaks (“doxing”), challenges the very basic notions of wrongful interference under contemporary international law. The crux of the difficulty is in international law’s inability in delegitimizing transnational hacking for political purposes, because these acts are often non-coercive, a 1 Mike Gault, The CIA Secret to Cybersecurity That No One Seems to Get, WIRED (Dec. 20, 2015), https://www.wired.com/2015/12/the-cia-secret-to-cybersecurity-that-no-one-seems-to-get. 3 constitutive element of the norm on non-intervention. This paper argues, that in order to address transnational election interferences, international law should adapt by redefining the boundaries of the norm on non-intervention, given that interventions could be in the form of non-coercive hacking and doxing. World Wide Web provides a new theory to address cyber espionage through international law. Traditionally, while most domestic legal systems make foreign espionage illegal, international law does not explicitly prohibit inter-state espionage, neither does it condemn this well-established practice. This article argues that changes in surveillance technology enable some serious threats to international peace and security, and should therefore be treated in a more nuanced manner under international law – that is, an evaluation of the nature of espionage, the data collected, and the possible nature of future use of that data. This approach rejects the blanket legitimization of espionage provided by international law, considering how cyber espionage could potentially threaten human rights, such as the right to privacy.2 Virtual Violence considers the extent to which international humanitarian law protects civilians, in an armed conflict, from cyber-attacks that are not kinetic in nature. Intuitively, direct effects resulting from cyber-attacks may vary from minor inconvenience, to disruption and interruption, and more rarely – to kinetic effects. Translating into the international humanitarian law taxonomy – whether disruptive cyber-attacks qualify as “attacks,” therefore requiring that the adversary using them comply with the rules on conduct of hostilities – distinction, military necessity, proportionality, and humanity.3 By analyzing current cases of disruptive cyber-attacks, 2 See Art. 17 of the International Covenant on Civil and Political Rights (ICCPR). 3 G.A. Rep. of the Group of Governmental Experts on Developments in the Field of Information and Telecommunication in the Context of International Security, 2, U.N. Doc. A/ 70/150, para. 28(d) (July 22, 2015); Also 4 the article argues that scope of “attacks” should be adapted to afford better civilian protection from serious disruptive effects caused by cyber-attacks. In Hacktivites, I argue that the concept of direct participation in hostilities (DPH) does not consider the full breadth of cyber activities that civilians could be engaged in, potentially externalizing these civilians to being classified as civilians who directly participate in hostilities, thus losing their protected status under international humanitarian law. Such classification could mean the difference between life and death – since civilians who have taken arms and joined the hostilities are forfeiting their protection from direct attacks. Junaid Hussein, an ISIS-affiliated hacker, was the first known case of a civilian who was targeted with lethal force, in relation to his allegedly hostile cyberspace activities – including the spread of personal information about U.S. soldiers in active duty. This raises a host of questions about how the DPH’s framework constitutive elements apply in cyberspace, for example – threshold of harm. The paper concludes that there is no uniform interpretation of the DPH framework (comparing U.S., ICRC, and the Tallinn Manual), and that most of these interpretations, when applied to cyber-attacks, adopt overly broad views on what constitutes direct participation in hacktivities. I have also contributed some of my findings on specialized media platforms – such as Just Security and Wired. These op-eds are also part of my dissertation, as they demonstrate my research endeavors in a more informal context. They also illustrate my approach to legal scholarship, that outsourcing it to the broader public in a more manageable and succinct manner. see Ido Kilovaty, Virtual Violence – Disruptive Cyberspace Operations as "Attacks" under International Humanitarian Law, 22 MICH. TELECOMM. & TECH. L. REV. 113, 116 (2017). 5 Table of Contents I. Introduction page 7 II. Doxfare – Election Hacking as Prohibited Intervention page 13 III. World Wide Web of Exploitations page 59 IV. Virtual Violence page 96 V. Hacktivities page 132 VI. Op-eds page 170 6 I. Introduction While the advent of the Internet has contributed enormously to the communication between people, access to knowledge, and economic and business growth, it has also created a plethora of threats to individual security, privacy, and infrastructure. To the phenomenon enabling these threats I refer collectively as “cyber conflict.” Cyber conflict is often named the fifth domain of warfare,4 and it is constantly reshaping the way States wage conflict, in addition to how diplomacy and global affairs take place in the 21st century. Cyberspace transcends political borders, it is readily available to a wide audience, and has the potential of causing enormous harms if used in certain malicious ways. That leads to a critical question – is international law ready to meet these challenges? Many argue that cyber-attacks, and perhaps even cyber conflict, present no new challenges to international law, and that international law is sufficiently complete to apply by analogy to new weapons and technologies.5 According to this view, international law is a seamless legal system, adaptable to changes in the realities of the battlefield. This approach, however, ignores several important questions. For example, how does international law respond to the growing capability of non-state actors to cause enormous harm through cyberspace? How does the principle of distinction apply to civilians who participate in a range of hostile cyberspace activities – ranging from online hacktivism to kinetic cyber-attacks? Is cyber espionage more harmful than traditional espionage, and if so, should it be delegitimized? Does international humanitarian law regulate disruptive operations, similar to its regulation of destructive operations (“attacks”)? And, whether 4 War in the Fifth Domain, ECONOMIST (July 1, 2010), http://www.economist.com/node/16478792. 5 See Duncan Hollis, Re-Thinking the Boundaries of Law in Cyberspace 127, 146 in OHLIN, GOVERN, FINKELSTEIN, CYBER WAR: LAW AND ETHICS FOR VIRTUAL CONFLICTS (2015). 7 the principle of non-intervention
Recommended publications
  • Future War and the War Powers Resolution
    Emory International Law Review Volume 29 Issue 3 2015 Future War and the War Powers Resolution Eric Talbot Jensen Follow this and additional works at: https://scholarlycommons.law.emory.edu/eilr Recommended Citation Eric T. Jensen, Future War and the War Powers Resolution, 29 Emory Int'l L. Rev. 499 (2015). Available at: https://scholarlycommons.law.emory.edu/eilr/vol29/iss3/1 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory International Law Review by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. JENSEN GALLEYSPROOFS2 1/22/2015 11:37 AM FUTURE WAR AND THE WAR POWERS RESOLUTION ∗ Eric Talbot Jensen ABSTRACT Since its passage in 1973 over the veto of then-President Nixon, the War Powers Resolution (WPR) has been laden with controversy. Labeled as everything from ineffective to unconstitutional, the WPR has generally failed in its design to require notification and consultation to Congress by the President. Despite numerous proposals to amend the WPR, it continues to languish in the twilight of Executive war powers, and its future is bleak. With emerging technologies such as drones, cyber tools, nanotechnology, and genomics, the ineffectiveness of the WPR will prove even more profound. The WPR’s reliance on “armed forces” and “hostilities” as triggers for the reporting and consulting requirements of the statute will prove completely inadequate to regulate the use of these advanced technologies. Rather, as the President analyzes the applicability of the WPR to military operations using these advancing technologies, he will determine that the WPR is not triggered and he has no reporting requirements.
    [Show full text]
  • Geopolitics, Oil Law Reform, and Commodity Market Expectations
    OKLAHOMA LAW REVIEW VOLUME 63 WINTER 2011 NUMBER 2 GEOPOLITICS, OIL LAW REFORM, AND COMMODITY MARKET EXPECTATIONS ROBERT BEJESKY * Table of Contents I. Introduction .................................... ........... 193 II. Geopolitics and Market Equilibrium . .............. 197 III. Historical U.S. Foreign Policy in the Middle East ................ 202 IV. Enter OPEC ..................................... ......... 210 V. Oil Industry Reform Planning for Iraq . ............... 215 VI. Occupation Announcements and Economics . ........... 228 VII. Iraq’s 2007 Oil and Gas Bill . .............. 237 VIII. Oil Price Surges . ............ 249 IX. Strategic Interests in Afghanistan . ................ 265 X. Conclusion ...................................... ......... 273 I. Introduction The 1973 oil supply shock elevated OPEC to world attention and ensconced it in the general consciousness as a confederacy that is potentially * M.A. Political Science (Michigan), M.A. Applied Economics (Michigan), LL.M. International Law (Georgetown). The author has taught international law courses for Cooley Law School and the Department of Political Science at the University of Michigan, American Government and Constitutional Law courses for Alma College, and business law courses at Central Michigan University and the University of Miami. 193 194 OKLAHOMA LAW REVIEW [Vol. 63:193 antithetical to global energy needs. From 1986 until mid-1999, prices generally fluctuated within a $10 to $20 per barrel band, but alarms sounded when market prices started hovering above $30. 1 In July 2001, Senator Arlen Specter addressed the Senate regarding the need to confront OPEC and urged President Bush to file an International Court of Justice case against the organization, on the basis that perceived antitrust violations were a breach of “general principles of law.” 2 Prices dipped initially, but began a precipitous rise in mid-March 2002.
    [Show full text]
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Hacking for ISIS: the Emergent Cyber Threat Landscape
    Hacking for ISIS: The Emergent Cyber Threat Landscape By Laith Alkhouri, Alex Kassirer, & Allison Nixon April 2016 Hacking For ISIS Contents Click on a title to navigate to the page Introduction ...........................................................................................................................................2 Cyber Caliphate ...................................................................................................................................3 Islamic State Hacking Division .......................................................................................................6 Islamic Cyber Army ............................................................................................................................9 Rabitat Al-Ansar ................................................................................................................................ 12 Sons Caliphate Army ...................................................................................................................... 15 United Cyber Caliphate .................................................................................................................. 17 Techniques, Tactics, & Procedures (TTPs) .............................................................................. 20 The Future of ISIS’s Cyber Capabilities .................................................................................... 24 Conclusion .........................................................................................................................................
    [Show full text]
  • Fngtf BOSTON, MA 02203 HEALTH, EDUCATION, LABOR, and PENSIONS P: 617- 565-3170
    ELIZABETH WARREN UNITED STATES SENATE MASSACHUSETTS WASHINGTON, DC 20510-2105 P: 202- 224-4543 COMMITTEES: 2400 JFK FEDERAL BUILDING BANKING, HOUSING, AND URBAN AFFAIRS 15 NEW SUDBURY STREET tlnitfd ~tGtfS ~fnGtf BOSTON, MA 02203 HEALTH, EDUCATION, LABOR, AND PENSIONS P: 617- 565-3170 ARMED SERVICES 1550 MAIN STREET SUITE 406 SPECIAL COMMITTEE ON AGING SPRINGFIELD, MA 01103 P: 413- 788- 2690 www.warren.senate.gov September 4, 2019 The Honorable Mike Pompeo Secretary U.S. Department of State 2201 C Street, NW Washington, DC 20520 Dear Secretary Pompeo: I am writing to request information regarding recent reports that Vice President Mike Pence patronized President Donald Trump's Trump International Golf Links & Hotel Doonbeg while in Ireland - at the "suggestion" of the President. 1 This transaction - another example of what appears to be open corruption in this administration - deepens my concerns about the ongoing ethics issues related to the President's continued financial relationship with the Trump Organization and the abuse of taxpayer funds to enrich the President and his family through their business interests. During his two-day visit in Ireland earlier this week, Vice President Pence stayed at the Trump International Hotel in Doonbeg and "[flew] the hour-or-so into Dublin [on the other side of Ireland] for official meetings," rather than staying at a hotel in Dublin a short drive away.2 The Vice President's chief of staff indicated that the President encouraged the Vice President to stay at his hotel, telling him, "[Y]ou should stay at my place."3 The Vice President's decision to trek across country is "clearly not convenient.
    [Show full text]
  • The Case of Donald J. Trump†
    THE AGE OF THE WINNING EXECUTIVE: THE CASE OF DONALD J. TRUMP† Saikrishna Bangalore Prakash∗ INTRODUCTION The election of Donald J. Trump, although foretold by Matt Groening’s The Simpsons,1 was a surprise to many.2 But the shock, disbelief, and horror were especially acute for the intelligentsia. They were told, guaranteed really, that there was no way for Trump to win. Yet he prevailed, pulling off what poker aficionados might call a back- door draw in the Electoral College. Since his victory, the reverberations, commotions, and uproars have never ended. Some of these were Trump’s own doing and some were hyped-up controversies. We have endured so many bombshells and pur- ported bombshells that most of us are numb. As one crisis or scandal sputters to a pathetic end, the next has already commenced. There has been too much fear, rage, fire, and fury, rendering it impossible for many to make sense of it all. Some Americans sensibly tuned out, missing the breathless nightly reports of how the latest scandal would doom Trump or why his tormentors would soon get their comeuppance. Nonetheless, our reality TV President is ratings gold for our political talk shows. In his Foreword, Professor Michael Klarman, one of America’s fore- most legal historians, speaks of a degrading democracy.3 Many difficulties plague our nation: racial and class divisions, a spiraling debt, runaway entitlements, forever wars, and, of course, the coronavirus. Like many others, I do not regard our democracy as especially debased.4 Or put an- other way, we have long had less than a thoroughgoing democracy, in part ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– † Responding to Michael J.
    [Show full text]
  • The Case Study of Crossfire Hurricane
    TIMELINE: Congressional Oversight in the Face of Executive Branch and Media Suppression: The Case Study of Crossfire Hurricane 2009 FBI opens a counterintelligence investigation of the individual who would become Christopher Steele’s primary sub-source because of his ties to Russian intelligence officers.1 June 2009: FBI New York Field Office (NYFO) interviews Carter Page, who “immediately advised [them] that due to his work and overseas experiences, he has been questioned by and provides information to representatives of [another U.S. government agency] on an ongoing basis.”2 2011 February 2011: CBS News investigative journalist Sharyl Attkisson begins reporting on “Operation Fast and Furious.” Later in the year, Attkisson notices “anomalies” with several of her work and personal electronic devices that persist into 2012.3 2012 September 11, 2012: Attack on U.S. installations in Benghazi, Libya.4 2013 March 2013: The existence of former Secretary of State Hillary Clinton’s private email server becomes publicly known.5 May 2013: o News reports reveal Obama’s Justice Department investigating leaks of classified information and targeting reporters, including secretly seizing “two months of phone records for reporters and editors of The Associated Press,”6 labeling Fox News reporter James Rosen as a “co-conspirator,” and obtaining a search warrant for Rosen’s personal emails.7 May 10, 2013: Reports reveal that the Internal Revenue Service (IRS) targeted and unfairly scrutinized conservative organizations seeking tax-exempt status.8
    [Show full text]
  • After the Meltdown
    Tulsa Law Review Volume 45 Issue 3 Regulation and Recession: Causes, Effects, and Solutions for Financial Crises Spring 2010 After the Meltdown Daniel J. Morrissey Follow this and additional works at: https://digitalcommons.law.utulsa.edu/tlr Part of the Law Commons Recommended Citation Daniel J. Morrissey, After the Meltdown, 45 Tulsa L. Rev. 393 (2013). Available at: https://digitalcommons.law.utulsa.edu/tlr/vol45/iss3/2 This Article is brought to you for free and open access by TU Law Digital Commons. It has been accepted for inclusion in Tulsa Law Review by an authorized editor of TU Law Digital Commons. For more information, please contact [email protected]. Morrissey: After the Meltdown AFTER THE MELTDOWN Daniel J. Morrissey* We will not go back to the days of reckless behavior and unchecked excess that was at the heart of this crisis, where too many were motivated only by the appetite for quick kills and bloated bonuses. -President Barack Obamal The window of opportunityfor reform will not be open for long .... -Princeton Economist Hyun Song Shin 2 I. INTRODUCTION: THE MELTDOWN A. How it Happened One year after the financial markets collapsed, President Obama served notice on Wall Street that society would no longer tolerate the corrupt business practices that had almost destroyed the world's economy. 3 In "an era of rapacious capitalists and heedless self-indulgence," 4 an "ingenious elite" 5 set up a credit regime based on improvident * A.B., J.D., Georgetown University; Professor and Former Dean, Gonzaga University School of Law. This article is dedicated to Professor Tom Holland, a committed legal educator and a great friend to the author.
    [Show full text]
  • The Daily Gamecock, Tuesday, September 15, 2015
    University of South Carolina Scholar Commons September 2015 Fall 9-15-2015 The aiD ly Gamecock, Tuesday, September 15, 2015 The niU versity of South Carolina, Office oftude S nt Media Follow this and additional works at: https://scholarcommons.sc.edu/gamecock_2015_sep Recommended Citation The nivU ersity of South Carolina, Office of Student Media, "The aiD ly Gamecock, Tuesday, September 15, 2015" (2015). September. 6. https://scholarcommons.sc.edu/gamecock_2015_sep/6 This Newspaper is brought to you by the 2015 at Scholar Commons. It has been accepted for inclusion in September by an authorized administrator of Scholar Commons. For more information, please contact [email protected]. NEWS 1 UNIVERSITY OF SOUTH CAROLINA TUESDAY, SEPTEMBER 15, 2015 VOL. 106, NO. 14 ● SINCE 1908 Rucker, Bryan to perform at journalism school dedication Ben Crawford @BENLCRAWFORD Darius Rucker and Mark Bryan, former members of the hit band Hootie & the Blowfi sh, will play a “brief performance” at the School of Journalism and Mass Communications’ New Building Dedication ceremony on Wednesday at 6 p.m., according to College of Information and Communications Dean Charles Bierbauer. It will take place at the foot of Ben Crawford / THE DAILY GAMECOCK the Horseshoe, near Sumter St. Fraternity Council President Tim Bryson addressed chapter presidents in a meeting on Monday evening. “We kept it under wraps as long as we could, to avoid 20,000 people converging. We really don’t want that,” Bierbauer said. Journalism and information technology students who wish to attend the event must fi rst receive a Fraternity Council VP wristband Wednesday at 8:30 a.m.
    [Show full text]
  • Press Galleries* Rules Governing Press Galleries
    PRESS GALLERIES* SENATE PRESS GALLERY The Capitol, Room S–316, phone 224–0241 Director.—S. Joseph Keenan Deputy Director.—Joan McKinney Media Coordinators: Elizabeth Crowley Wendy A. Oscarson-Kirchner Amy H. Gross James D. Saris HOUSE PRESS GALLERY The Capitol, Room H–315, phone 225–3945 Superintendent.—Jerry L. Gallegos Deputy Superintendent.—Justin J. Supon Assistant Superintendents: Ric Andersen Drew Cannon Molly Cain Laura Reed STANDING COMMITTEE OF CORRESPONDENTS Maureen Groppe, Gannett Washington Bureau, Chair Laura Litvan, Bloomberg News, Secretary Alan K. Ota, Congressional Quarterly Richard Cowan, New York Times Andrew Taylor, Reuters Lisa Mascaro, Las Vegas Sun RULES GOVERNING PRESS GALLERIES 1. Administration of the press galleries shall be vested in a Standing Committee of Cor- respondents elected by accredited members of the galleries. The Committee shall consist of five persons elected to serve for terms of two years. Provided, however, that at the election in January 1951, the three candidates receiving the highest number of votes shall serve for two years and the remaining two for one year. Thereafter, three members shall be elected in odd-numbered years and two in even-numbered years. Elections shall be held in January. The Committee shall elect its own chairman and secretary. Vacancies on the Committee shall be filled by special election to be called by the Standing Committee. 2. Persons desiring admission to the press galleries of Congress shall make application in accordance with Rule VI of the House of Representatives, subject to the direction and control of the Speaker and Rule 33 of the Senate, which rules shall be interpreted and administered by the Standing Committee of Correspondents, subject to the review and an approval by the Senate Committee on Rules and Administration.
    [Show full text]
  • Sexing the Mueller Report
    SEXING THE MUELLER REPORT Ruthann Robson* I. INTRODUCTION Sexual indiscretion, misconduct, and deceit percolate throughout the extensive 2019 Report On The Investigation Into Russian Interference In the 2016 Presidential Election—known as the Mueller Report.1 President Trump’s sexual behaviors are certainly not the focus of the Mueller Report, which resulted from the Acting Attorney General’s appointment of Robert S. Mueller, III as Special Counsel for the United States Department of Justice to investigate “any links and/or coordination between the Russian government and individuals associated with the campaign of President Donald Trump,” and “any matters that arose or may arise directly from the investigation.”2 Volume I of the Mueller Report addresses Russian interference with the 2016 election and any Trump campaign links in approximately 200 pages. Volume II of the Mueller Report, which is slightly longer at 241 pages, focuses on the question of whether the president obstructed justice in connection with the Russia-related investigations, including presidential actions related to the Special Counsel’s investigation itself. Given its charge, it is both predictable and understandable that the Mueller Report only obliquely addresses President Trump’s sexual * © 2020, All rights Reserved. Professor of Law & University Distinguished Professor, City University of New York School of Law. Appreciation to the editors and staff of Stetson Law Review, and for discussions on the Mueller Report and the role of sex, to Professors Penelope Andrews, Janet Calvo, Julie Goldscheid, Ellen Podgor, and Sarah Valentine. 1. 1 ROBERT MUELLER, REPORT ON THE INVESTIGATION INTO RUSSIAN INTERFERENCE IN THE 2016 PRESIDENTIAL ELECTION (2019) [hereinafter MUELLER REPORT VOL.
    [Show full text]
  • Political Journalists Tweet About the Final 2016 Presidential Debate Hannah Hopper East Tennessee State University
    East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations Student Works 5-2018 Political Journalists Tweet About the Final 2016 Presidential Debate Hannah Hopper East Tennessee State University Follow this and additional works at: https://dc.etsu.edu/etd Part of the American Politics Commons, Communication Technology and New Media Commons, Gender, Race, Sexuality, and Ethnicity in Communication Commons, Journalism Studies Commons, Political Theory Commons, Social Influence and Political Communication Commons, and the Social Media Commons Recommended Citation Hopper, Hannah, "Political Journalists Tweet About the Final 2016 Presidential Debate" (2018). Electronic Theses and Dissertations. Paper 3402. https://dc.etsu.edu/etd/3402 This Thesis - Open Access is brought to you for free and open access by the Student Works at Digital Commons @ East Tennessee State University. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ East Tennessee State University. For more information, please contact [email protected]. Political Journalists Tweet About the Final 2016 Presidential Debate _____________________ A thesis presented to the faculty of the Department of Media and Communication East Tennessee State University In partial fulfillment of the requirements for the degree Master of Arts in Brand and Media Strategy _____________________ by Hannah Hopper May 2018 _____________________ Dr. Susan E. Waters, Chair Dr. Melanie Richards Dr. Phyllis Thompson Keywords: Political Journalist, Twitter, Agenda Setting, Framing, Gatekeeping, Feminist Political Theory, Political Polarization, Presidential Debate, Hillary Clinton, Donald Trump ABSTRACT Political Journalists Tweet About the Final 2016 Presidential Debate by Hannah Hopper Past research shows that journalists are gatekeepers to information the public seeks.
    [Show full text]