![]() |
| Pix credit here |
My friend and Jonathan A. Meyer, who among the many things that occupy his time also serves as ABA Co-Chair, International Committee, Senior Lawyers Division and the ABA Committee On National Security Law reminded me of a quite interesting and useful 2023 program organized by the ABA Senior Lawyers Division, China in Southeast Asia and Russia in Eastern Europe: Discerning Patterns.
Many people perceive Russia and China as the dominant powers for the rest of this century. With this on the horizon, it may be necessary to understand the political cultures and world views of such state actors and their impact on other states and non-state actors, particularly in the perception of law and conflict. Might the worldview of such actors and their perception of law offer a way forward in identifying the signatures of such actors in their methods and operations? Might that allow the US and its allies better identification of the actors and proxies involved in applying traditional tools of US foreign policy and national security, such as export controls and economic sanctions? Our panel of experts analyzes these and other pressing questions in comparing culturally determined perceptions of law and how such perceptions may assist in the attribution and identification of the actors involved. Speakers: James Bergeron, Political Advisor to Allied Maritime Command, North Atlantic Treaty Organization, Northwood, United Kingdom Dr. Elizabeth G. Chan, CEO, Global Risk Mitigation Foundation, Honolulu County, Hawaii Geoffrey Goodale, Partner, Duane Morris LLP, New Alexandria, VA Sandra L. Hodgkinson, Leonardo DRS, Arlington, VA Milton Bearden, Lone Star REElements, LLC, Austin, TX Jonathan D.T. Ward, Atlas Organization, Washington, D.C. Moderator: Jonathan Meyer, Attorney at Law, New York, NYThis program emerged out of discussion in an earlier event, “Global Operators: Cyber Hacking and Attribution,” where the question is asked whether political cultures or “world views” of cyber operators influence their methods of operations, and thus leave an unintended fingerprint, and further asks whether it is possible to compare, contrast and identify the methods and assumptions employed by State Actors and their proxies, including non state actors, and whether that might bring us closer to identification and attribution of liability?

No comments:
Post a Comment