While an important part of US innovation and culture, bankruptcy proceedings have nonetheless become a unique avenue through which foreign adversaries are able to acquire sensitive US national security technologies and intellectual property. Through a detailed analysis of the current gaps in federal regulations governing foreign investment and bankruptcy proceedings in the US, Camille Stewart provides the reader an in-depth look into exactly how foreign companies have been able to circumvent these US foreign investment regulations.
In raising awareness to an issue that could ultimately leave the United States vulnerable to destructive cyberattacks, Stewart argues that training and equipping bankruptcy judges to identify potential national security concerns in bankruptcy cases will help mitigate the exfiltration of national security-related information and technology.
Full Court Press: Preventing Foreign Adversaries from Exfiltrating National Security Technologies Through Bankruptcy Proceedings
The risk of Weapons of Mass Destruction materials falling into the hands of criminals continues to be a major security concern following 9/11. Efforts to curb the threat culminated in 2004 with U.N. Security Council Resolution 1540. Resolution 1540 created an international institution—the 1540 regime—that was intended to prevent WMD proliferation by closing legal gaps in every U.N. member state. In addition to prohibiting states from engaging in proliferation activities, the instrument obliges states to address WMD trafficking at home through both criminal law enforcement and regulatory oversight.
Since its creation, scholars and policy makers have come to view 1540 as an important foundation of the global nonproliferation and counter-terrorism regime, in part because 179 states have submitted domestic implementation country reports, and on average, countries report more than 145 new or existing domestic measures to comply with Resolution 1540 obligations. Yet, despite the alleged success of the 1540 regime, there are still gaps in the system. Drawing on fifty-two in-depth interviews, fieldwork, and observation data, Sarah Shirazyan’s article presents a novel assessment of the 1540 regime’s development and performance.
Sarah Shirazyan’s article on “Building a Universal Counter-Proliferation Regime” proceeds in four steps. First, it provides an assessment of 1540’s origins and its past performance, based on the 1540 Committee’s own metrics of success. Second, it demonstrates the regime’s weak performance, examining its effectiveness and accomplishments thus far. Third, it explains how the creation of the 1540 regime and its early institutional choices shaped its current structure and performance. In particular, how 1540’s legitimacy-building strategies have constrained the institution’s ability to effectively manage the implementation of the resolution. Finally, the article briefly explore options on how to strengthen 1540 regime to halt non-state actor proliferation.
Retired Brigadier General Kenneth Watkin’s new book, Fighting at the Legal Boundaries: Controlling the Use of Force in Contemporary Conflict, helps address some of the issues with the increasingly blurred line between international humanitarian law and human rights law. Professor Mitt Regan’s review addresses the trends that Watkin regards as posing novel challenges for states accustomed to traditional concepts of the use of force and discusses Watkin’s concepts that are especially relevant to the question of how much the traditional categories of law enforcement guided by human rights principles and armed conflict governed by international humanitarian law should continue to frame thinking about the use of force. Regan also critiques Watkin’s use of the binary framework of law enforcement and armed conflict to guide analysis.