Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Entire DC Network

Political Extremism And Domestic Terrorism In America, Mark Potok Apr 2019

Political Extremism And Domestic Terrorism In America, Mark Potok

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Cyberspace: The 21st Century Battlefield, Cameron Ryan Scullen Apr 2019

Cyberspace: The 21st Century Battlefield, Cameron Ryan Scullen

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Prefatory Matter & Table Of Contents Apr 2019

Prefatory Matter & Table Of Contents

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Prefatory Matter And Table Of Contents Apr 2019

Prefatory Matter And Table Of Contents

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Stealing Press Credentials: Law Enforcement Identity Misappropriation Of The Press In The Cyber Era, Andy T. Wang Apr 2019

Stealing Press Credentials: Law Enforcement Identity Misappropriation Of The Press In The Cyber Era, Andy T. Wang

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Allied Pressure: Enforcing International Obligations Forbidding The Payment Of Ransoms For Kidnapped Western Nationals, Andrew R. Schindler Jul 2015

Allied Pressure: Enforcing International Obligations Forbidding The Payment Of Ransoms For Kidnapped Western Nationals, Andrew R. Schindler

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Front Matter And Table Of Contents Jul 2015

Front Matter And Table Of Contents

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


The Computer Fraud And Abuse Act: Protecting The United States From Cyber-Attacks, Fake Dating Profiles, And Employees Who Check Facebook At Work, Kristin Westerhorstmann Jul 2015

The Computer Fraud And Abuse Act: Protecting The United States From Cyber-Attacks, Fake Dating Profiles, And Employees Who Check Facebook At Work, Kristin Westerhorstmann

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Biodefense And Constitutional Constraints, Laura K. Donohue Apr 2014

Biodefense And Constitutional Constraints, Laura K. Donohue

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Transnational Influences On Financial Crime, Jeremy Kuester Feb 2014

Transnational Influences On Financial Crime, Jeremy Kuester

University of Miami National Security & Armed Conflict Law Review

Transnational Crime can loosely be defined as a crime that occurs across borders and is differentiated from domestic and international crime by the absence of a single sovereign or supranational power that has absolute jurisdiction over the crime. The dynamics of actors in transnational spaces, as well as the lack of a clear enforcing authority in such spaces, creates significant challenges to efforts to disrupt and deter transnational crime. Addressing these types of crimes requires a holistic approach from state and non-­‐state actors using a variety of tools, many of which are not traditionally law enforcement in nature. Focusing on …


Promoting Partnerships To Combat Illicit Trafficking, Celina Realuyo Feb 2014

Promoting Partnerships To Combat Illicit Trafficking, Celina Realuyo

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Human Trafficking: An Issue Of Human And National Security, Roza Pati Feb 2014

Human Trafficking: An Issue Of Human And National Security, Roza Pati

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Front Matter And Table Of Contents Oct 2013

Front Matter And Table Of Contents

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Cyber Utilities Infrastructure And Government Contracting, Corey P. Gray Oct 2013

Cyber Utilities Infrastructure And Government Contracting, Corey P. Gray

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Sun Tzu’S Battle For Your Footnotes: The Emergent Role Of Libraries In Judicial Warfare, Mark Mccary Oct 2013

Sun Tzu’S Battle For Your Footnotes: The Emergent Role Of Libraries In Judicial Warfare, Mark Mccary

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Non-State Armed Groups And Technology: The Humanitarian Tragedy At Our Doorstep?, Colonel Dave Wallace, Major Shane Reeves Oct 2013

Non-State Armed Groups And Technology: The Humanitarian Tragedy At Our Doorstep?, Colonel Dave Wallace, Major Shane Reeves

University of Miami National Security & Armed Conflict Law Review

Technological advances are altering the contemporary asymmetric conflicts between non-­‐state armed groups and state actors. This article discusses the humanitarian consequences of these changing conflicts by first illustrating the dangers posed by non-­‐state armed groups gaining access to advanced technologies. A subsequent examination of the increasing ability of non-­‐state armed groups to use new technologies, such as cyber operations, to mitigate state actor advantages and the resultant risks to civilian populations follows. The article concludes that the humanitarian challenges presented by this growing intimacy between non-­‐state armed groups and technology, whether through a potentially devastating attack or by the dramatic …


The Application Of The Administrative Procedure Act To Private-­‐Public Sector Partnerships In Homeland Security, Michael James Weiss Oct 2013

The Application Of The Administrative Procedure Act To Private-­‐Public Sector Partnerships In Homeland Security, Michael James Weiss

University of Miami National Security & Armed Conflict Law Review

Increasingly, the U.S. federal government is turning to the use of private-­public sector partnerships (“PPP”), especially in the area of homeland security. Although these partnerships have numerous benefits, there are several problems that arise in their practice, particularly when they are used in homeland security.

This note will outline and detail these problems, including deputization, excessive congressional oversight, and management and accountability. In addition, this note will present solutions to resolving the issue of centralization. In other words, this note will advocate for a single agency that implements, manages, and creates rules for all PPPs within the Department of Homeland …


Standing Our Ground: A Study Of Southeast Asian Counterterrorism Conventions Contributing To A Peaceful Existence, Major Dennis Hager Jul 2011

Standing Our Ground: A Study Of Southeast Asian Counterterrorism Conventions Contributing To A Peaceful Existence, Major Dennis Hager

University of Miami National Security & Armed Conflict Law Review

Less than a year after the September 11th attacks on New York and Washington D.C., terrorist groups in Southeast Asia carried out a number of high profile attacks in the region. In an area ripe for global terrorism the effects of counter‐terrorism conventions can be measured and the possibility of progress in the global war observed. The regional cooperation inherent in these conventions has been crucial to the success of peace for this region, and is especially significant considering the immense cultural and political differences among these nations.

With fourteen official languages and over 500 million people living in an …