Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- US Army War College (48)
- Selected Works (25)
- University of Miami Law School (20)
- Embry-Riddle Aeronautical University (17)
- The University of Akron (10)
-
- Pepperdine University (9)
- University of Georgia School of Law (9)
- Roger Williams University (8)
- University of Michigan Law School (7)
- Georgetown University Law Center (6)
- Loyola Marymount University and Loyola Law School (6)
- The Catholic University of America, Columbus School of Law (6)
- Maurer School of Law: Indiana University (5)
- Seattle University School of Law (5)
- Fordham Law School (4)
- University of Nebraska - Lincoln (4)
- University of Tennessee, Knoxville (4)
- Southern Methodist University (3)
- University of Maryland Francis King Carey School of Law (3)
- University of Pennsylvania Carey Law School (3)
- William & Mary Law School (3)
- DePaul University (2)
- Duke Law (2)
- Notre Dame Law School (2)
- SelectedWorks (2)
- U.S. Naval War College (2)
- UIC School of Law (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of Washington School of Law (2)
- Western New England University School of Law (2)
- Keyword
-
- Terrorism (28)
- National security (18)
- International law (13)
- National Security (11)
- Privacy (11)
-
- Surveillance (11)
- Al-Qaeda (7)
- Law of war (7)
- War (7)
- 9/11 (6)
- China (6)
- Cybersecurity (6)
- Immigration (6)
- Law of armed conflict (6)
- Afghanistan (5)
- Due process (5)
- Internet (5)
- Islamic State (5)
- Military (5)
- NSA (5)
- Russia (5)
- Taliban (5)
- Technology (5)
- United States (5)
- Armed conflict (4)
- Armed conflicts (4)
- Canada (4)
- Drones (4)
- History (4)
- International humanitarian law (4)
- Publication
-
- The US Army War College Quarterly: Parameters (48)
- University of Miami National Security & Armed Conflict Law Review (20)
- Annual ADFSL Conference on Digital Forensics, Security and Law (16)
- Akron Law Review (10)
- Faculty Scholarship (8)
-
- Georgia Journal of International & Comparative Law (8)
- Pepperdine Law Review (8)
- Georgetown Law Faculty Publications and Other Works (6)
- Loyola of Los Angeles Law Review (6)
- Catholic University Journal of Law and Technology (4)
- International Journal of Nuclear Security (4)
- Law Faculty Scholarship (4)
- Seattle University Law Review (4)
- Space, Cyber, and Telecommunications Law Program: Faculty Publications (4)
- Alev Dudek (3)
- All Faculty Scholarship (3)
- Articles (3)
- Caren Myers Morrison (3)
- Faculty Journal Articles and Book Chapters (3)
- Indiana Law Journal (3)
- International Human Rights Law Journal (2)
- International Law Studies (2)
- Life of the Law School (1993- ) (2)
- Nevada Law Journal (2)
- Newsletter (2)
- Notre Dame Law Review (2)
- Steven D. Schwinn (2)
- UIC Law Review (2)
- Victor C. Romero (2)
- William & Mary Law Review (2)
- Publication Type
- File Type
Articles 241 - 251 of 251
Full-Text Articles in Entire DC Network
Touching Torture With A Ten-Foot Pole: The Legality Of Canada’S Approach To National Security Information Sharing With Human Rights-Abusing States, Craig Forcese
Osgoode Hall Law Journal
In 2011, then-Public Safety Minister Vic Toews issued “ministerial directions” to Canada’s key security and intelligence agencies on “Information Sharing with Foreign Entities.” These directions permit information sharing in exigent circumstances, even where there is substantial risk of mistreatment of an individual. After a brief chorus of condemnation, the directions sank into relative obscurity while remaining part of Canada’s national security policy framework. This article aims to reignite discussion of these policies and their controversial content, relying in large measure on documents obtained by the author directly or through journalistic researchers under access to information law. First, I examine dilemmas …
Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick
Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick
Indiana Law Journal
No abstract provided.
Brief Of Amici Curiae Former Consular Officers In Support Of Respondent, Kerry V. Din, No. 13-1402 United States Supreme Court, Ira J. Kurzban, Edward F. Ramos, Jeffrey D. Kahn, Trina Realmuto
Brief Of Amici Curiae Former Consular Officers In Support Of Respondent, Kerry V. Din, No. 13-1402 United States Supreme Court, Ira J. Kurzban, Edward F. Ramos, Jeffrey D. Kahn, Trina Realmuto
Faculty Journal Articles and Book Chapters
This brief argues that certain visa application denials, particularly those based on information originating from agencies other than the Department of State, can be qualitatively different from denials based on consular discretion. Although the end result looks the same – “Visa Denied” – denials based on database and watchlist information maintained in the United States by the Department of Homeland Security, the FBI, and other agencies, bear little resemblance to the traditional exercise of consular discretion because the specific information which requires the consular officer to deny these visas is usually not available for him or her to evaluate. Real …
Sentencing Complexities In National Security Cases, Chris Jenks
Sentencing Complexities In National Security Cases, Chris Jenks
Faculty Journal Articles and Book Chapters
Military national security courts-martial infrequently occur. When they do occur, military counsel, judges, and court personnel endeavor to perform their function at a high level. Unfortunately, the process by which the U.S. government conducts classification reviews and the military’s inexperience in national security cases often results in the form of safeguarding classified information trumping the substantive function of the underlying trial process. And by the time the sentencing phase is reached, understandable but unfortunate focus is placed on simply concluding the trial without mishandling classified information.
This article examines the sentencing complexities in military national security cases, first defining a …
Lawfare, Charles J. Dunlap Jr.
Defensive Force Against Non-State Actors: The State Of Play, Monica Hakimi
Defensive Force Against Non-State Actors: The State Of Play, Monica Hakimi
Articles
This article assesses the implications of the current Syria situation for the international law on the use of defensive force against non-State actors. The law in this area is highly unsettled, with multiple legal positions in play. After mapping the legal terrain, the article shows that the Syria situation accentuates three preexisting trends. First, the claim that international law absolutely prohibits the use of defensive force against non-State actors is increasingly difficult to sustain. States, on the whole, have supported the operation against the so-called Islamic State in Syria. Second, States still have not coalesced around a legal standard on …
The Statement And Account Clause As A National Security Freedom Of Information Act, Lawrence Rosenthal
The Statement And Account Clause As A National Security Freedom Of Information Act, Lawrence Rosenthal
Lawrence Rosenthal
Nsa And Dea Intelligence Sharing: Why It's Legal And Why Reuters And The Good Wife Got It Wrong, Melanie M. Reid
Nsa And Dea Intelligence Sharing: Why It's Legal And Why Reuters And The Good Wife Got It Wrong, Melanie M. Reid
Melanie M. Reid
The recent disclosures of secret U.S. government surveillance programs have brought to the forefront how intelligence agencies should manage the gathering and analysis of intelligence collected and when and how best to pass that information on to law enforcement. What is first collected for national security purposes can now potentially be used in a criminal trial. Law enforcement agents are said to utilize “parallel construction” to hide the original source which initiated the criminal investigation and develop their own evidence independent from this original source. Since the “wall” between intelligence agencies and law enforcement agencies fell down post-9/11 and intelligence …
The Leadership Leap: A New Approach For Homeland Security, R. Jeffery Maxfield, Rodger Broome, John R. Fisher
The Leadership Leap: A New Approach For Homeland Security, R. Jeffery Maxfield, Rodger Broome, John R. Fisher
R. Jeffery Maxfield
The world is in chaos, and unfortunately, this most likely will continue. Recent news reports are replete with stories of crises. These events demonstrate the implicit and explicit need for leadership. We believe these crises and their accompanying uncertainty are the reasons people have sought strong leaders – to bring order and sanity to an otherwise uncontrollable world. This is particularly true in homeland security and the emergency services.
Balancing Domestic Nuclear Industry Viability With International Security: Imminent Changes To Nuclear Export Control Regulations, Brendan Burke
Balancing Domestic Nuclear Industry Viability With International Security: Imminent Changes To Nuclear Export Control Regulations, Brendan Burke
Brendan Burke
In August 2013, the Department of Energy promulgated a supplemental notice of proposed rulemaking to revise the Code of Federal Regulations title 10, part 810 (part 810). Part 810 controls the export of technology pertaining to special nuclear material (SNM) and its production outside the United States by U.S. citizens or corporations. Its purpose is to protect national security interests relating to nuclear non- proliferation while facilitating civil nuclear trade. The most noteworthy changes in the proposed revision pertain to how potential trade partner host countries are classified. This classification directly affects the volume of regulatory requirements applicable to transac- …
Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley
Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley
Stephen E Henderson
The FAA Modernization and Reform Act of 2012 requires the Federal Aviation Administration to integrate unmanned aerial vehicles (UAVs), or drones, into the national airspace system by September of this year. Yet perhaps because of their chilling accuracy in targeted killings abroad, perhaps because of an increasing consciousness of diminishing privacy more generally, and perhaps simply because of a fear of the unknown, divergent UAV-restrictive legislation has been proposed in Congress and enacted in a number of states. Ultimately, given UAV utility and cost effectiveness over a vast range of tasks, widespread commercial use seems certain. So it is imperative …