{"id":1311,"date":"2016-05-09T08:00:25","date_gmt":"2016-05-09T12:00:25","guid":{"rendered":"https:\/\/www2.law.temple.edu\/voices\/?p=1311"},"modified":"2016-07-28T12:34:57","modified_gmt":"2016-07-28T16:34:57","slug":"financial-weapons-war","status":"publish","type":"post","link":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/","title":{"rendered":"Financial Weapons of War"},"content":{"rendered":"<p>A new type of warfare is upon us. In this new mode of war, finance is the most powerful weapon, bullets are not fired, financial institutions are the targets, and almost everyone is at risk. Instead of smart bombs, improvised explosives, and unmanned drones \u2013\u2013 economic sanctions, financial restrictions, and cyber programs are the weapons of choice. This is the reality of modern financial warfare.<\/p>\n<p>This Article offers an early examination of this new mode of war. It explores the new financial theater of war, analyzes the modern arsenal of financial weapons, highlights emerging legal tensions, and proposes key recommendations for current and future financial warfare. The Article begins with a general survey of the modern financial infrastructure, the emerging battlefield of modern warfare. Next, it provides a more detailed inventory of the financial weapons of war. It accounts for traditional weapons like economic sanctions, anti-money laundering regulations, and banking restrictions, as well as cyber weapons like distributed denial-of-service attacks, data manipulation hacks, and destructive intrusions. It also explains how these weapons are used in current conflicts with Al Qaeda, Iran, ISIS, North Korea, Russia, and Syria. The Article then contends with new tensions relating to financial hostilities, cyberattacks, and non-state actors posed by financial warfare for longstanding legal doctrines. Finally, it recommends innovative cybersecurity incentives, advanced technological stress tests, and comprehensive financial war games as three pragmatic proposals that should be undertaken in response to modern financial warfare while larger issues are still being deliberated by global policymakers. Ultimately, this Article provides an early framework for thinking and acting anew about modern financial warfare and the financial weapons of war.<\/p>\n<p><strong><a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2765010\" target=\"_blank\">Download the Paper at SSRN<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new type of warfare is upon us. In this new mode of war, finance is the most powerful weapon, bullets are not fired, financial institutions are the targets, and almost everyone is at risk. Instead of smart bombs, improvised explosives, and unmanned drones \u2013\u2013 economic sanctions, financial restrictions, and cyber programs are the weapons of choice. This is the reality of modern financial warfare. This Article offers an early examination of this new mode of war. It explores the new financial theater of war, analyzes the modern arsenal of financial weapons, highlights emerging legal tensions, and proposes key recommendations for current and future financial warfare. The Article begins with a general survey of the modern financial infrastructure, the emerging battlefield of modern warfare. Next, it provides a more detailed inventory of the financial weapons of war. It accounts for traditional weapons like economic sanctions, anti-money laundering regulations, and banking restrictions, as well as cyber weapons like distributed denial-of-service attacks, data manipulation hacks, and destructive intrusions. It also explains how these weapons are used in &hellip;<\/p>\n","protected":false},"author":3,"featured_media":1312,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[275,250,251],"audience":[],"coauthors":[252],"class_list":["post-1311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-faculty-scholarship","tag-cybersecurity","tag-finance","tag-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Financial Weapons of War - Voices at Temple<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Financial Weapons of War - Voices at Temple\" \/>\r\n<meta property=\"og:description\" content=\"A new type of warfare is upon us. In this new mode of war, finance is the most powerful weapon, bullets are not fired, financial institutions are the targets, and almost everyone is at risk. Instead of smart bombs, improvised explosives, and unmanned drones \u2013\u2013 economic sanctions, financial restrictions, and cyber programs are the weapons of choice. This is the reality of modern financial warfare. This Article offers an early examination of this new mode of war. It explores the new financial theater of war, analyzes the modern arsenal of financial weapons, highlights emerging legal tensions, and proposes key recommendations for current and future financial warfare. The Article begins with a general survey of the modern financial infrastructure, the emerging battlefield of modern warfare. Next, it provides a more detailed inventory of the financial weapons of war. It accounts for traditional weapons like economic sanctions, anti-money laundering regulations, and banking restrictions, as well as cyber weapons like distributed denial-of-service attacks, data manipulation hacks, and destructive intrusions. It also explains how these weapons are used in &hellip;\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Voices at Temple\" \/>\r\n<meta property=\"article:published_time\" content=\"2016-05-09T12:00:25+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2016-07-28T16:34:57+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2016\/05\/iphone-Stocks.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"840\" \/>\r\n\t<meta property=\"og:image:height\" content=\"560\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"Tom Lin\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tom Lin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/\"},\"author\":{\"name\":\"Beckie Schatschneider\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/#\\\/schema\\\/person\\\/505b7875ef49205bf81379b92d47f94e\"},\"headline\":\"Financial Weapons of War\",\"datePublished\":\"2016-05-09T12:00:25+00:00\",\"dateModified\":\"2016-07-28T16:34:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/\"},\"wordCount\":279,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cms\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/iphone-Stocks.png\",\"keywords\":[\"cybersecurity\",\"Finance\",\"Technology\"],\"articleSection\":[\"Faculty Scholarship\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/\",\"url\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/\",\"name\":\"Financial Weapons of War - Voices at Temple\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cms\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/iphone-Stocks.png\",\"datePublished\":\"2016-05-09T12:00:25+00:00\",\"dateModified\":\"2016-07-28T16:34:57+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/#\\\/schema\\\/person\\\/505b7875ef49205bf81379b92d47f94e\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cms\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/iphone-Stocks.png\",\"contentUrl\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cms\\\/wp-content\\\/uploads\\\/2016\\\/05\\\/iphone-Stocks.png\",\"width\":840,\"height\":560,\"caption\":\"Stock Market on iPhone\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/financial-weapons-war\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Financial Weapons of War\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/#website\",\"url\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/\",\"name\":\"Voices at Temple\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/#\\\/schema\\\/person\\\/505b7875ef49205bf81379b92d47f94e\",\"name\":\"Beckie Schatschneider\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g9dc77189f33a293d2c82a50cd24ebb9f\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g\",\"caption\":\"Beckie Schatschneider\"},\"url\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/author\\\/rschatsc\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Financial Weapons of War - Voices at Temple","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/","og_locale":"en_US","og_type":"article","og_title":"Financial Weapons of War - Voices at Temple","og_description":"A new type of warfare is upon us. In this new mode of war, finance is the most powerful weapon, bullets are not fired, financial institutions are the targets, and almost everyone is at risk. Instead of smart bombs, improvised explosives, and unmanned drones \u2013\u2013 economic sanctions, financial restrictions, and cyber programs are the weapons of choice. This is the reality of modern financial warfare. This Article offers an early examination of this new mode of war. It explores the new financial theater of war, analyzes the modern arsenal of financial weapons, highlights emerging legal tensions, and proposes key recommendations for current and future financial warfare. The Article begins with a general survey of the modern financial infrastructure, the emerging battlefield of modern warfare. Next, it provides a more detailed inventory of the financial weapons of war. It accounts for traditional weapons like economic sanctions, anti-money laundering regulations, and banking restrictions, as well as cyber weapons like distributed denial-of-service attacks, data manipulation hacks, and destructive intrusions. It also explains how these weapons are used in &hellip;","og_url":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/","og_site_name":"Voices at Temple","article_published_time":"2016-05-09T12:00:25+00:00","article_modified_time":"2016-07-28T16:34:57+00:00","og_image":[{"width":840,"height":560,"url":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2016\/05\/iphone-Stocks.png","type":"image\/png"}],"author":"Tom Lin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tom Lin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/#article","isPartOf":{"@id":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/"},"author":{"name":"Beckie Schatschneider","@id":"https:\/\/www2.law.temple.edu\/voices\/#\/schema\/person\/505b7875ef49205bf81379b92d47f94e"},"headline":"Financial Weapons of War","datePublished":"2016-05-09T12:00:25+00:00","dateModified":"2016-07-28T16:34:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/"},"wordCount":279,"commentCount":0,"image":{"@id":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/#primaryimage"},"thumbnailUrl":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2016\/05\/iphone-Stocks.png","keywords":["cybersecurity","Finance","Technology"],"articleSection":["Faculty Scholarship"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/","url":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/","name":"Financial Weapons of War - Voices at Temple","isPartOf":{"@id":"https:\/\/www2.law.temple.edu\/voices\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/#primaryimage"},"image":{"@id":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/#primaryimage"},"thumbnailUrl":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2016\/05\/iphone-Stocks.png","datePublished":"2016-05-09T12:00:25+00:00","dateModified":"2016-07-28T16:34:57+00:00","author":{"@id":"https:\/\/www2.law.temple.edu\/voices\/#\/schema\/person\/505b7875ef49205bf81379b92d47f94e"},"breadcrumb":{"@id":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/#primaryimage","url":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2016\/05\/iphone-Stocks.png","contentUrl":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2016\/05\/iphone-Stocks.png","width":840,"height":560,"caption":"Stock Market on iPhone"},{"@type":"BreadcrumbList","@id":"https:\/\/www2.law.temple.edu\/voices\/financial-weapons-war\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www2.law.temple.edu\/voices\/"},{"@type":"ListItem","position":2,"name":"Financial Weapons of War"}]},{"@type":"WebSite","@id":"https:\/\/www2.law.temple.edu\/voices\/#website","url":"https:\/\/www2.law.temple.edu\/voices\/","name":"Voices at Temple","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www2.law.temple.edu\/voices\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www2.law.temple.edu\/voices\/#\/schema\/person\/505b7875ef49205bf81379b92d47f94e","name":"Beckie Schatschneider","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g9dc77189f33a293d2c82a50cd24ebb9f","url":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g","caption":"Beckie Schatschneider"},"url":"https:\/\/www2.law.temple.edu\/voices\/author\/rschatsc\/"}]}},"jetpack_featured_media_url":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2016\/05\/iphone-Stocks.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/posts\/1311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/comments?post=1311"}],"version-history":[{"count":1,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/posts\/1311\/revisions"}],"predecessor-version":[{"id":1313,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/posts\/1311\/revisions\/1313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/media\/1312"}],"wp:attachment":[{"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/media?parent=1311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/categories?post=1311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/tags?post=1311"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/audience?post=1311"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/coauthors?post=1311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}