State Sovereignty and Self-Defense in Cyberspace: a Normative Framework for Balancing Legal Rights

Total Page:16

File Type:pdf, Size:1020Kb

State Sovereignty and Self-Defense in Cyberspace: a Normative Framework for Balancing Legal Rights Emory International Law Review Volume 26 Issue 2 2012 State Sovereignty and Self-Defense in Cyberspace: A Normative Framework for Balancing Legal Rights Catherine Lotrionte Follow this and additional works at: https://scholarlycommons.law.emory.edu/eilr Recommended Citation Catherine Lotrionte, State Sovereignty and Self-Defense in Cyberspace: A Normative Framework for Balancing Legal Rights, 26 Emory Int'l L. Rev. 825 (2012). Available at: https://scholarlycommons.law.emory.edu/eilr/vol26/iss2/12 This Symposium is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory International Law Review by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. LOTRIONTE GALLEYSPROOFS2 5/28/2013 1:28 PM STATE SOVEREIGNTY AND SELF-DEFENSE IN CYBERSPACE: A NORMATIVE FRAMEWORK FOR BALANCING LEGAL RIGHTS ∗ Catherine Lotrionte Today’s threats recognize no national boundaries, are connected, and must be addressed at the global and regional as well as the national levels.1 When warranted, [the United States] will respond to hostile acts in cyberspace as we would to any other threat to our country. All states possess an inherent right to self-defense . [We recognize] that hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners . .2 America must also face the rapidly growing threat from cyber- attacks. Now, we know hackers steal people’s identities and infiltrate private emails. We know foreign countries and companies swipe our corporate secrets. Now our enemies are also seeking the ability to sabotage our power grid, our financial institutions, and our air traffic control systems. We cannot look back years from now and wonder why we did nothing in the face of real threats to our security and our 3 economy. ∗ Catherine Lotrionte is the Director of the Institute for Law, Science & Global Security and Visiting Assistant Professor of Government at Georgetown University. Dr. Lotrionte has served as Counsel to the President’s Foreign Intelligence Advisory Board at the White House and as Assistant General Counsel at the Central Intelligence Agency. Dr. Lotrionte is the Director and Founder of the Cyber Project at Georgetown University and a Life Member of the Council on Foreign Relations. 1 Secretary-General’s High-level Panel on Threats, Challenges and Change, A More Secure World: Our Shared Responsibility, at 11, U.N. Doc. A/59/565 (Dec. 2, 2004) [hereinafter U.N. Report, A More Secure World]. 2 DEP’T OF DEF., CYBERSPACE POLICY REPORT 2, 7 (2011) [hereinafter CYBERSPACE POLICY REPORT]. 3 Barack Obama, State of the Union Address (Feb. 12, 2013) (discussing the threats the United States faces from adversaries in cyber and noting the Executive Order that President Obama signed earlier in the day, Executive Order on Improving Critical Infrastructure Cybersecurity, designed to strengthen U.S. cyber defenses through information sharing and standards for cyber security); see also Exec. Order No. 13,636, 78 Fed. Reg. 11,739 (Feb. 12, 2013). LOTRIONTE GALLEYSPROOFS2 5/28/2013 1:28 PM 826 EMORY INTERNATIONAL LAW REVIEW [Vol. 26 INTRODUCTION Few issues in international relations are as controversial as the use of force and the legal framework that justifies a state’s use of force in self-defense. Indeed, the very development of the discipline in international law lies in attempts by states, the United Nations, and international courts to wrestle with the question of when force may legitimately be used within the international realm. Over the centuries, states have struggled to define the right to use force as they face new threats from new actors and new weapons entering the arena of conflict. This Article grapples with the contemporary topic of when a state can invoke forcible measures in cyberspace against non-state actors. To address this issue, this Article discusses the current threats to states that exist in cyberspace, identifies the international law on the use of force and discusses recent state practice as well as the pronouncements of international courts on the topic. Difficult questions in the context of cyber operations are posed and challenging conclusions are drawn from the development of the law. Ultimately, this Article provides a framework for state decision-makers to use to determine whether the state can legally use force in self-defense in cyberspace against non-state actors residing in another state’s territory. Overall, it is an indication of the increasing maturity of international law that it is capable of facing up to the complex challenges of these new threats while continuing to search for the path forward that maintains and enhances the rule of law and minimizes conflict within the international community. It is clear that “cyber warfare” is not a technical legal term and it has been argued by some to be even misleading and unhelpful.4 There is a concern by some that the term will glorify those criminals responsible for most malicious action in the cyber domain, exaggerate the threat, and distort the understanding of particular conflicts that take place in cyberspace, just as the use of the term “war on terror” arguably has done. Regardless, the rhetoric of “cyber warfare” has some significance for the law on the use of force because it can be used to justify the use of self-defense against other states and non-state actors accused of carrying out a cyber attack against a state. Today, state officials from around the globe warn that a state’s most critical infrastructure—power plants, gas pipelines, traffic control systems, and water 4 See, e.g., Cyber Security and International Law: Meeting Summary, CHATHAM HOUSE 3 (May 29, 2012) (summary of remarks by Mary Ellen O’Connell). LOTRIONTE GALLEYSPROOFS2 5/28/2013 1:28 PM 2012] SOVEREIGNTY AND SELF-DEFENSE IN CYBER SPACE 827 treatment plants—are at risk of attack by adversaries.5 Military and intelligence officials have repeatedly warned that malicious hackers could disrupt critical infrastructure with the click of a mouse, causing severe economic loss, persistent blackouts or even mass casualties.6 The issue of how to protect the state from such attacks, internationally, has not been resolved, leaving significant differences between states, and between commentators, on this issue. In March 2003, the United States argued that Iraq was developing weapons of mass destruction, and undertook Operation Iraqi Freedom. The invasion of Iraq was bitterly contested internationally. After the invasion, U.N. Secretary- General Kofi Annan spoke of “a fork in the road” and declared that “this may be a moment no less decisive than 1945 itself, when the U.N. was founded.”7 Questions were raised about the effectiveness of the United Nations, and international law more generally, to deal with new threats. Some states, like the United States, seemed to argue that states were no longer obliged to wait until there was agreement in the Security Council before acting unilaterally or in ad hoc coalitions against the terrorist threats.8 This position represented a fundamental change to the principles on which world peace and stability have been based for the last fifty-eight years under the U.N. Charter framework. In response, the Secretary-General set up a High-level Panel on Threats, Challenges and Change, to examine global peace and security issues, identify how collective security may address these threats, and recommend changes that may be needed. In 2004 the group issued its report, A More Secure World.9 In 2005 the Secretary-General issued his own report, In Larger Freedom.10 In all of these instruments there was a recognition that the nature of twenty-first century threats had changed such that even the most powerful states were vulnerable.11 However, the consensus from all of the reports was that no change in the U.N. Charter provisions on the use of force was needed. The long-established prohibition on the use of force in Article 2(4) and the right of 5 Obama, supra note 3. 6 See text accompanying notes 32–57. 7 U.N. GAOR, 58th Sess., 7th plen. mtg. at 3, U.N. Doc. A/58/PV.7 (Sept. 23, 2003). 8 See, e.g., WHITE HOUSE, THE NATIONAL SECURITY STRATEGY OF THE UNITED STATES OF AMERICA 25 (2002). 9 Supra note 1. 10 U.N. Secretary-General, In Larger Freedom: Towards Development, Security, and Human Rights for All, U.N. Doc. A/59/2005 (Mar. 21, 2005) [hereinafter U.N. Secretary-General, In Larger Freedom]. 11 U.N. Report, A More Secure World, supra note 1, at 11. LOTRIONTE GALLEYSPROOFS2 5/28/2013 1:28 PM 828 EMORY INTERNATIONAL LAW REVIEW [Vol. 26 self-defense in Article 51 were adequate to meet the new threats.12 Nevertheless, international law on the use of force, its content, application, and effectiveness in dealing with the cyber threats has been the object of much debate. Indeed, cyber instability poses the same challenge to international peace and security as the threats of terrorism, transnational organized crime, poverty, infectious diseases, environmental degradation, and nuclear, biological chemical, and radiological weapons, as outlined in the U.N. reports.13 If consensus on the rules related to the use of force in cyberspace is not achieved, the result will be a self-help system within the cyber domain, with potential spillover into the kinetic sphere. Within this domain mistrust will dominate, and opportunities for cooperation for long-term stability and mutual gain will be lost. The principles related to the use of force have long helped—although not perfectly—world peace and stability. They stand firmly against aggression,14 facilitate a minimum level of order, and can facilitate a stable basis for exchange, agreement, human creativity, and innovative opportunity in cyberspace.
Recommended publications
  • The Pulitzer Prizes 2020 Winne
    WINNERS AND FINALISTS 1917 TO PRESENT TABLE OF CONTENTS Excerpts from the Plan of Award ..............................................................2 PULITZER PRIZES IN JOURNALISM Public Service ...........................................................................................6 Reporting ...............................................................................................24 Local Reporting .....................................................................................27 Local Reporting, Edition Time ..............................................................32 Local General or Spot News Reporting ..................................................33 General News Reporting ........................................................................36 Spot News Reporting ............................................................................38 Breaking News Reporting .....................................................................39 Local Reporting, No Edition Time .......................................................45 Local Investigative or Specialized Reporting .........................................47 Investigative Reporting ..........................................................................50 Explanatory Journalism .........................................................................61 Explanatory Reporting ...........................................................................64 Specialized Reporting .............................................................................70
    [Show full text]
  • The New Investor Tom C.W
    The New Investor Tom C.W. Lin EVIEW R ABSTRACT A sea change is happening in finance. Machines appear to be on the rise and humans on LA LAW LA LAW the decline. Human endeavors have become unmanned endeavors. Human thought and UC human deliberation have been replaced by computerized analysis and mathematical models. Technological advances have made finance faster, larger, more global, more interconnected, and less human. Modern finance is becoming an industry in which the main players are no longer entirely human. Instead, the key players are now cyborgs: part machine, part human. Modern finance is transforming into what this Article calls cyborg finance. This Article offers one of the first broad, descriptive, and normative examinations of this sea change and its wide-ranging effects on law, society, and finance. The Article begins by placing the rise of artificial intelligence and computerization in finance within a larger social context. Next, it explores the evolution and birth of a new investor paradigm in law precipitated by that rise. This Article then identifies and addresses regulatory dangers, challenges, and consequences tied to the increasing reliance on artificial intelligence and computers. Specifically, it warns of emerging financial threats in cyberspace, examines new systemic risks linked to speed and connectivity, studies law’s capacity to govern this evolving financial landscape, and explores the growing resource asymmetries in finance. Finally, drawing on themes from the legal discourse about the choice between rules and standards, this Article closes with a defense of humans in an uncertain financial world in which machines continue to rise, and it asserts that smarter humans working with smart machines possess the key to better returns and better futures.
    [Show full text]
  • Indigenous Policy Journal of the Indigenous Studies Network (Isn)
    INDIGENOUS POLICY JOURNAL OF THE INDIGENOUS STUDIES NETWORK (ISN) Vol. XXV, No. 1 On The Web at: http://www.indigenouspolicy.org/ipjblog/ Summer 2014 COMPILED Junr 15, 2014 - ISSN 2158-4168 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Indigenous Policy (IPJ) publishes articles, commentary, reviews, news, and announcements concerning Native American and international Indigenous affairs, issues, events, nations, groups and media. We invite commentary and dialogue in and between issues. TABLE OF CONTENTS ISN and IPJ information p. 1 Upcoming Events p. 4 Ongoing Activities: Environmental Activities p. 16 U.S. Activities p. 21 International Activities p. 25 Indian & Indigenous Developments Environmental Developments p. 32 U.S. Developments p. 66 International Developments p. 162 Dialoguing: Mark Trahant, "An ‘honorable’ budget? No, but it’s headed in the right direction for Indian Country," p. 225 Mark Trahant, "A year of action for Indian Country" p. 227 Mark Trahant, "Deep in the budget: Line by line predictions about Indian health" p. 228 Mark Trahant, "Expanding access to oral health means changing the law to back tribal sovereignty" p. 230 Mark Trahant, "Tribes are large employers ... and those employees make the best customers" p. 232 Mark Trahant, "Frightening words: Indian Health Service is out of money, making you wait for care" p. 233 Mark Trahant, "A note to Paul Ryan: Indian health funding is a treaty obligation, not from war on poverty" p. 235 Mark Trahant, "The Katie John case: Alaska Natives shouldn’t wait a century to get a fair shake" p. 236 Mark Trahant, "New Year with new (old) stories for Indian Country" p. 237 "NAIPC calls for Cancellation of the United Nations World Conference on Indigenous Peoples" p.
    [Show full text]
  • Witmtimes Tudyfornumorder.Qrk
    In Between The Lines: How The New York Times Frames Youth The New York City Youth Media Study is a collaborative project between We INTERRUPT This Message, a national media training and strategy center, and Youth Force, a youth–led South Bronx organizing group. We partnered to publish a youth– conducted study of The New York Times by a group of South Bronx youth. Study Conducted By SHAQUESHA ALEQUIN, , student at Arturo LA’TOYA WARE, , student at Arturo Schomburg Schomburg Satellite Academy, Youth Force Satellite Academy, Youth Force “Most people go through life fighting battles and “I am a very good/friend and my hand/will never get heard. I am not to be silenced.” always be open.” ERIKA FLORENCE, , student at Arturo JOSEPH VAZQUEZ, , student at Arturo Schomburg Satellite Academy, Youth Force Schomburg Satellite Academy, Youth Force “I am a strong black woman on the move in an “Strong, Spiritual, Poetic, Revolutionary Soldier.” upward spiral to success.” HAYDEN MEDOZA, , student at Arturo Schomburg Satellite Academy, Youth Force “Never Lose, Just Constantly Improve.” Research Support JOSEPH LOUALLEN, , student at Arturo Schomburg Satellite Academy, Youth Force SHA-KING GRAHAM, , Youth Force TASHA WILLIAMS, , Youth Force LUIS ROSA, , student at Arturo Schomburg Satellite Academy, Youth Force Project Staff LISA FIGUEROA, , Youth Force PIA INFANTE, , We INTERRUPT This Message PRINCE SERNA, , Youth Force Invaluable Contributors Over the course of the past year, we received invaluable training and support. Thanks to those who con- tributed: Kim Barber, Mara Benitez, Sarah Xochitl Bervera, Ludovic Blain, LaDedra Bown, Adelaide Chen, Hunter Cutting, Malkia Cyril, Kim Deterline, Lori Dorfman, Sam Feneque, Cassie Finelle, Abraham Garcia, Jesse Ehrensaft- Hawley, Janine Jackson, Kim McGillicuddy, Sofia Quintero, Kavita Rajanna, and Makani Themba–Nixon.
    [Show full text]
  • Boston College International and Comparative Law Review
    BOSTON COLLEGE INTERNATIONAL AND COMPARATIVE LAW REVIEW Vol. XXX Spring 2007 No. 2 ARTICLES Reinforcing Refugee Protection in the Wake of the War on Terror Edwin Odhiambo-Abuya [pages 277–330] Abstract: This Article examines how the Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (CAT) can be used as a practical tool to enhance the protection of per- sons who have fled their home States in search of asylum in the wake of the global “war on terror.” It compares and contrasts provisions of CAT to similar provisions contained in international refugee law. This Article contends that, in some respects, the protection provisions of CAT are wider than those found in international refugee law, and, in other re- spects, narrower than those found in international refugee law. It con- cludes by suggesting strategies for meeting the challenges ahead. Settlement of Disputes Under the Central America–Dominican Republic–United States Free Trade Agreement David A. Gantz [pages 331–410] Abstract: The Central America–Dominican Republic–United States Free Trade Agreement (CAFTA-DR) is one of nearly a dozen post-North Ameri- can Free Trade Agreements (NAFTA) free trade agreements (FTAs) that the United States has concluded with nations in Latin America, the Middle East, and Asia since 2000. All of these newer agreements are based on NAFTA, but they differ in significant respects, particularly in the chapters relating to dispute settlement. Most significantly, the changes reflect U.S. government experience with NAFTA dispute settlement, particularly with regard to actions brought by private investors against the United States and other NAFTA governments under NAFTA’s investment protection provi- sions (Chapter 11).
    [Show full text]
  • Calling All Tchotchkes and New Friends for OPC Party Panel on The
    THE MONTHLY NEWSLETTER OF THE OVERSEAS PRESS CLUB OF AMERICA, NEW YORK, NY • February 2013 Calling All Tchotchkes and New Friends for OPC Party What will this than half way thru EVENT PREVIEW: MARCH 8 year’s Tchotchke Par- the billing cycle. So a by Aimee Vitrak ty feature? It’s up to New Young Member Dust off your Qadaffi carpets, Al- enough raucous cor- will pay $70 for a year banian belt buckles, Barbie burkas respondents to RSVP and a half member- and any other “liberated” items from and bring a potential ship. overseas postings for the OPC’s OPC member. OPC The event will be second Tchotchke Party on Friday, member Yvonne Dun- hosted again by OPC March 8. The evening will have Col. el-Qadaffi carpet cocktails, dim sum and a Foreign leavy and husband Board member Minky Correspondent story night. Joost Schiereck have Worden and Gordon Crovitz at their This event is also a membership generously agreed to donate $30 home located at 55 Liberty Street, recruitment effort. Next year, the toward the $100 memberships for penthouse 30, on March 8 at 7 p.m. OPC celebrates its 75th anniversary; Young members (under 35 years of RSVP is essential. Call the OPC at every member of the international age). New members will also have 212-626-9220 or e-mail boots@op- reporting community should be en- an extended time since we are more cofamerica.org couraged to join an organization that supports press freedom, and journal- ists, around the world. Panel on the Shia and Sunni Divide The first Tchotchke Party, held in nott, Executive Editor of Global- EVENT PREVIEW: MARCH 13 March 2011, went over so big that it Post, which is launching a multi- was featured as a “Talk of the Town” News events roiling in the Mid- part series on the issue.
    [Show full text]
  • Brokaw Receives Standing Ovation at Awards Dinner War Portrayed
    THE MONTHLY NEWSLETTER OF THE OVERSEAS PRESS CLUB OF AMERICA, NEW YORK, NY • April/May 2013 Brokaw Receives Standing Ovation at Awards Dinner mie Doran arrived EVENT RECAP: APRIL 24 wearing a tartan kilt by Aimee Vitrak and Fabio Bucci- The past year was just as daunt- arelli wore aviator ing in terms of press freedom and sunglasses, but they its toll on journalists and journalism were award winners as in years past, but the mood in the so shaking up the room managed to be festive. Per- status quo seemed a haps journalists have grown numb part of their job and to the bad news, or at least decided gave a rebel quality to honor those journalists who were to the room. tenacious and even lucky enough The candle that is Michael Dames lit at the beginning to walk away from scenes in Syria, Tom Brokaw accepts the OPC President’s Award China, Southern Africa, Nigeria, of the dinner hon- launched an internet campaign free- Honduras, Afghanistan and many ors those journalists other dangerous and difficult places who are killed or missing in action. jamesfoley.org to raise awareness to tell the story, when so many of This year’s tribute was again a mov- for their son’s situation and to urge their compatriots have not. ing one with Diane and John Foley the Syrian government to release The 74th OPC Annual Awards lighting the candle for all journal- him. The Foleys are all-too familiar Dinner started on the thirty-fifth ists and in particular, for their son to concerns of journalist safety and floor of the Mandarin Oriental James Foley who has been missing press freedom as James was also where guests mingled around two in action in Syria since Thanksgiv- taken for a month by the Libyan well-stocked bars, rounds of hors ing Day 2012.
    [Show full text]
  • Pulitzer Prize Winners and Finalists
    WINNERS AND FINALISTS 1917 TO PRESENT TABLE OF CONTENTS Excerpts from the Plan of Award ..............................................................2 PULITZER PRIZES IN JOURNALISM Public Service ...........................................................................................6 Reporting ...............................................................................................24 Local Reporting .....................................................................................27 Local Reporting, Edition Time ..............................................................32 Local General or Spot News Reporting ..................................................33 General News Reporting ........................................................................36 Spot News Reporting ............................................................................38 Breaking News Reporting .....................................................................39 Local Reporting, No Edition Time .......................................................45 Local Investigative or Specialized Reporting .........................................47 Investigative Reporting ..........................................................................50 Explanatory Journalism .........................................................................61 Explanatory Reporting ...........................................................................64 Specialized Reporting .............................................................................70
    [Show full text]
  • Temple University Beasley School of Law
    Tom C.W. Lin 1719 N. Broad Street Associate Professor of Law Philadelphia, PA 19122 (215) 204-5473 [email protected] May 18, 2015 Re: Regulatory Notice 15-06: Registration of Associated Person Who Develop Algorithmic Trading Strategies Marcia E. Asquith Office of Corporate Secretary FINRA 1735 K Street, NW Washington, DC 20006-1506 Dear Ms. Asquith: I am a law professor at Temple University Beasley School of Law. I research, teach, and write in the areas of corporate law and securities regulation. This comment letter is provided in response to the solicitation by FINRA for comments on Regulatory Notice 15-06: Registration of Associated Person Who Develop Algorithmic Trading Strategies. I am supportive of FINRA’s recent efforts to review its regulatory position in the area relating to algorithmic trading and equity market structure. I encourage continuing attention and work in this important area to better protect investors and ensure the integrity of our capital markets. In particular, I would like to highlight three broad issues for FINRA’s consideration: 1. The proposed change to NASD Rule 1032 requiring the registration of certain persons “responsible for the design, development or significant modification of an algorithmic trading strategy…” should better account for the fact that many algorithmic trading programs utilize artificial intelligence that allows such programs to iterate, evolve, and change without any direct human input after initial installation. As such, a rule that is oriented solely around certain persons may not be the most optimal means towards achieving FINRA’s desired ends. 2. In lieu of focusing on specific persons relating to algorithmic trading that may be difficult for member firms to identify, FINRA can alternatively focus on member firms that 1 of 2 engage in certain forms, values, and volumes of algorithmic trading that have a meaningful impact on equity markets.
    [Show full text]
  • La-Reinvención-De-The-New-York
    ISMAEL NAFRÍA La reinvención de The New York Times © Ismael Nafría, 2017 1ª edición: Marzo de 2017 Ilustración de portada: Gabi Campanario (www.estudiocampanario.com) © Gabi Campanario por la ilustración de portada © Rosental C. Alves por el prólogo Edición: Cristina Sarró Diseño de los gráficos: Pablo González ISBN: 978-1544822792 Ismael Nafría: www.ismaelnafria.com Web del libro: www.ismaelnafria.com/nytimes Este libro ha sido posible gracias al apoyo del Centro Knight para el Periodismo en las Américas de la Universidad de Texas en Austin knightcenter.utexas.edu AGRADECIMIENTOS Todo libro lleva la firma de su autor, al que se puede considerar, justamente, su principal responsable. Pero detrás de esa firma siempre hay una serie de personas sin las cuales el libro simplemente no existiría o, en el mejor de los casos, sería mucho peor. A todas estas personas quiero agradecer, de corazón, su apoyo durante los largos meses de gestación de este proyecto. En primer lugar quiero mencionar a mi familia. Le debo muchísimo a Tina, que una vez más ha mostrado una confianza ciega en el libro y en su autor, y ha apoyado el proyecto de mil maneras, interviniendo tanto en la preparación y organización de esta obra como en su edición y revisión final. Moltes gràcies! A mis tres hijas, Clara, Laura y Blanca, les quiero agradecer la enorme ilusión que siempre han mostrado por el proyecto y la naturalidad con que han acogido durante todo este tiempo la “presencia” del Times en nuestra vida familiar. ¡Espero que os guste el resultado final! Los consejos de Clara han sido los de una joven y muy prometedora profesional de la publicidad y relaciones públicas, experta en marketing digital.
    [Show full text]
  • Virtue Ethics for a Perfidious Media Marianne M
    Notre Dame Journal of Law, Ethics & Public Policy Volume 19 Article 15 Issue 2 Symposium on Media Ethics February 2014 Where Are Our Minds and What Are We Thinking - Virtue Ethics for a Perfidious Media Marianne M. Jennings Follow this and additional works at: http://scholarship.law.nd.edu/ndjlepp Recommended Citation Marianne M. Jennings, Where Are Our Minds and What Are We Thinking - Virtue Ethics for a Perfidious Media, 19 Notre Dame J.L. Ethics & Pub. Pol'y 637 (2005). Available at: http://scholarship.law.nd.edu/ndjlepp/vol19/iss2/15 This Article is brought to you for free and open access by the Notre Dame Journal of Law, Ethics & Public Policy at NDLScholarship. It has been accepted for inclusion in Notre Dame Journal of Law, Ethics & Public Policy by an authorized administrator of NDLScholarship. For more information, please contact [email protected]. WHERE ARE OUR MINDS AND WHAT ARE WE THINKING? VIRTUE ETHICS FOR A "PERFIDIOUS" MEDIA1 MARIANNE M. JENNINGS* "This story is true. The questions we raised about then-Lieutenant Bush's National Guard service are serious and legitimate." -Dan Rather, CBS News and 60 Minutes anchor after being told that the 1973 memo by Colonel Jerry Killian was forged2 "Memos on Bush Are Fake But Accurate" -New York Times headline on Rather story' 'Iregret the mistake I made during the course of this investigation, which was not conducted in good faith." -Jack Kelley, Former USA Today reporter in his resignation letter following revelations of falsehoods in his stories for which he could not produce sources "If they're all so brilliant and I'm such an affirmative-action hire, how come they didn't catch me?" -Jayson Blair, Former New York Times reporter reflecting on his resignation follow- ing revelations regarding his falsifying and plagiarizing stories4 * Professor of Legal and Ethical Studies, W.P.
    [Show full text]
  • 2013 Annual Report to Our Fellow Shareholders
    The New York Times Company 2013 Annual Report TO OUR FELLOW SHAREHOLDERS, A sharp focus on the core brand of The New York Times. A commitment to increasing shareholder value. Investment for growth, with a tight rein on costs. 2013 was a year of accomplishment for The New York Times Company, fueled by our commitment to operational and journalistic excellence and significant strides in our plan for long-term growth. In April, we announced a series of strategic initiatives, aimed at enabling us to grow revenue by leveraging The New York Times brand and the power and popularity of our exceptional journalism. Included among them is the next phase in our digital subscription/paid products strategy, international expansion and a renewed emphasis on both video production and brand extensions. We began to make progress on each of these fronts in 2013. We continue to be pleased with the growth of our digital subscription base. At the end of the year, the number of digital subscribers to The Times totaled approximately 760,000, an increase of 19% over 2012. These efforts, among others, contributed to a good year for shareholders, with strong share price performance and the reinstatement of a quarterly dividend. And in 2014 we intend to continue our emphasis on growing shareholder value. Of course, all of our efforts have at their core the unparalleled journalism of The New York Times. In 2013, The Times was awarded four Pulitzer Prizes, the highest honor in journalism. The recipients were: • David Barstow and Alejandra Xanic von Bertrab for investigative
    [Show full text]