Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

Series

2015

Institution
Keyword
Publication

Articles 1 - 30 of 49

Full-Text Articles in Law

The Us Space Launch Competitiveness Act Of 2015, Frans Von Der Dunk Nov 2015

The Us Space Launch Competitiveness Act Of 2015, Frans Von Der Dunk

Space, Cyber, and Telecommunications Law Program: Faculty Publications

On November 25, 2015, President Obama signed into law the US Commercial Space Launch Competitiveness Act (H.R. 2262). This Act encompasses four titles: I. Spurring Private Aerospace Competitiveness and Entrepreneurship (acronym: SPACE), II. Commercial Remote Sensing, III. Office of Space Commerce, and IV. Space Resource Exploration and Utilization.

Title I amends the Commercial Space Launch Act, which comprises the licensing regime for launches, reentries, and launch port activities, including those carrying spaceflight participants on board.

Title II amends the Land Remote Sensing Policy Act, which allowed for the licensing of private commercial satellite remote-sensing operations, and essentially requires the Secretary …


Doj’S “All-Tools” Approach To Cyber And National Security, Peter Margulies Oct 2015

Doj’S “All-Tools” Approach To Cyber And National Security, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law Oct 2015

Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Newsroom: Future Of Cybersecurity, Roger Williams University School Of Law Oct 2015

Newsroom: Future Of Cybersecurity, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies Oct 2015

Schrems And The Faa’S “Foreign Affairs” Prong: The Costs Of Reform, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Trending @ Rwulaw: Professor Peter Margulies's Post: Cybersecurity: A 'Must-Know' For Lawyers And Citizens, Peter Margulies Oct 2015

Trending @ Rwulaw: Professor Peter Margulies's Post: Cybersecurity: A 'Must-Know' For Lawyers And Citizens, Peter Margulies

Law School Blogs

No abstract provided.


Newsletter Fall 2015 Oct 2015

Newsletter Fall 2015

Newsletter

No abstract provided.


Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker Oct 2015

Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker

Homeland Security Publications

No abstract provided.


Mutually Assured Survival: An Analysis Of Globalization’S Influence On Nuclear Disarmament, Ryan Zehner Oct 2015

Mutually Assured Survival: An Analysis Of Globalization’S Influence On Nuclear Disarmament, Ryan Zehner

Independent Study Project (ISP) Collection

Nuclear arms have revolutionized the ways by which human beings are able to harm one another. Omnipresent in the status quo is a nuclear tension, and whether subtly or more overtly, this tension underlies a great many international relationships. While Westphalian paranoia and neorealist power perceptions encourage populations to continue placing their faith in nuclear umbrellas and deterrence strategies, scholars and activists increasingly claim that without the realization of universal disarmament, humanity concedes to the inevitability of future nuclear detonation.

New disarmament initiatives concentrate heavily on the implications of nuclear weaponry in a sense that supersedes the security of only …


Ratification, Reporting, And Rights: Quality Of Participation In The Convention Against Torture, Cossette D. Creamer, Beth A. Simmons Aug 2015

Ratification, Reporting, And Rights: Quality Of Participation In The Convention Against Torture, Cossette D. Creamer, Beth A. Simmons

All Faculty Scholarship

The core international human rights treaty bodies play an important role in monitoring implementation of human rights standards through consideration of states parties’ reports. Yet very little research explores how seriously governments take their reporting obligations. This article examines the reporting record of parties to the Convention against Torture, finding that report submission is heavily conditioned by the practices of neighboring countries and by a government’s human rights commitment and institutional capacity. This article also introduces original data on the quality and responsiveness of reports, finding that more democratic—and particularly newly democratic—governments tend to render higher quality reports.


Defining Foreign Affairs In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies Jul 2015

Defining Foreign Affairs In Section 702 Of The Fisa Amendments Act: The Virtues And Deficits Of Post-Snowden Dialogue On U.S. Surveillance Policy, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Newsroom: Margulies On Terror Suspect Arrest, Roger Williams University School Of Law Jun 2015

Newsroom: Margulies On Terror Suspect Arrest, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


What Price Security?, Singapore Management University Jun 2015

What Price Security?, Singapore Management University

Perspectives@SMU

Non-state actors have muddied the global security picture but the fundamental problems remain unchanged from those millenia ago


The President's Wartime Detention Authority : What History Teaches Us, Anirudh Sivaram May 2015

The President's Wartime Detention Authority : What History Teaches Us, Anirudh Sivaram

Harvey M. Applebaum ’59 Award

This thesis examines the extent of the President’s wartime detention authority over citizens (in particular, detention authority pursuant to Article II of the U.S. Constitution) through a legal-historical lens. Some Presidents (Abraham Lincoln, Franklin Roosevelt, George W. Bush) have historically relied on Article II authority for detention, while others (Ulysses Grant, Barack Obama) have disclaimed the notion that such authority exists. Clarifying the scope and source of the Presidential detention authority over citizens bears both theoretical and real-world relevance. Theoretically, it lies at the confluence of two central American constitutional traditions – the separation of powers, and the protection of …


New Start From Old Beginnings?, Michaela Ruhlmann Apr 2015

New Start From Old Beginnings?, Michaela Ruhlmann

History Capstone Research Papers

This paper examines the extent of which START I and New START achieved effective balance of power between the United States and Russia. It addresses the purpose, agreements and the impact of START I and New Start on the effectiveness in accomplishing global balance of power. This paper argues that while the original START I accomplished a global balance of power by equalizing reduction of nuclear arsenals in both countries, but that New START did not accomplish a long-term global balance of power. To best demonstrate this, “New START from Old Beginnings?” covers START I’s historical context, examine its actual …


Newsletter Spring 2015 Apr 2015

Newsletter Spring 2015

Newsletter

No abstract provided.


No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott Apr 2015

No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott

Occasional Papers Series

Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …


Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern Apr 2015

Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern

All Faculty Scholarship

Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …


Constitutionalism And The Foundations Of The Security State, Aziz Rana Apr 2015

Constitutionalism And The Foundations Of The Security State, Aziz Rana

Cornell Law Faculty Publications

Scholars often argue that the culture of American constitutionalism provides an important constraint on aggressive national security practices. This Article challenges the conventional account by highlighting instead how modern constitutional reverence emerged in tandem with the national security state, critically functioning to reinforce and legitimize government power rather than primarily to place limits on it. This unacknowledged security origin of today’s constitutional climate speaks to a profound ambiguity in the type of public culture ultimately promoted by the Constitution. Scholars are clearly right to note that constitutional loyalty has created political space for arguments more respectful of civil rights and …


Presidential Power And Enjoining The Obama Immigration Plan, Peter Margulies Feb 2015

Presidential Power And Enjoining The Obama Immigration Plan, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue Feb 2015

Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …


Surveillance, Secrecy, And The Search For Meaningful Accountability, Sudha Setty Jan 2015

Surveillance, Secrecy, And The Search For Meaningful Accountability, Sudha Setty

Faculty Scholarship

One of the most intractable problems in the debate around maintaining the rule of law while combating the threat of terrorism is the question of secrecy and transparency. In peacetime, important tenets to the rule of law include transparency of the law, limits on government power, and consistency of the law as applied to individuals in the policy. Yet the post-9/11 decision-making by the Bush and Obama administrations is characterized with excessive secrecy that stymies most efforts to hold the government accountable for its abuses. Executive branch policy with regard to detention, interrogation, targeted killing and surveillance are kept secret, …


The United States, In Comparative Counter-Terrorism, Sudha Setty Jan 2015

The United States, In Comparative Counter-Terrorism, Sudha Setty

Faculty Scholarship

The United States, like all other democratic nations that have suffered terrorist attacks, continues to struggle with questions of how to keep its population safe while maintaining the principles of democracy and the rule of law. This Book Chapter discusses the United States' counterterrorism policies, particularly since the September 11 terrorist attacks, and the resulting changes in societal viewpoints, political agendas, and the legal authority to combat terrorism and threats of terrorism.

The government’s aggressive counterterrorism stance has influenced actions and policies outside the United States. The Author’s exploration of counterterrorism policies in the United States include: criminal law and …


The Commander In Chief's Authority To Combat Climate Change, Mark P. Nevitt Jan 2015

The Commander In Chief's Authority To Combat Climate Change, Mark P. Nevitt

Faculty Articles

This Article first outlines the myriad national security threats posed by a changing climate, addressing the President’s and Congress’s powers to plan, study, and invest in climate-resilient infrastructure at military installations that are vulnerable to a rise in sea levels. Second, this Article asserts that climate change will stress and test persistent separation of powers concerns at home and abroad. Specifically, the President has less authority to protect military infrastructure domestically in the face of congressional intransigence, but has comparably greater authority as Commander in Chief to respond to climate-induced events abroad. Third, this Article argues that the threat of …


Effective Exercise Of ‘In-Space Jurisdiction’: The Us Approach And The Problems It Is Facing, Frans G. Von Der Dunk Jan 2015

Effective Exercise Of ‘In-Space Jurisdiction’: The Us Approach And The Problems It Is Facing, Frans G. Von Der Dunk

Space, Cyber, and Telecommunications Law Program: Faculty Publications

As mankind moves closer to the fiftieth anniversary of the conclusion of the Outer Space Treaty, the framework international treaty laying down the baseline regime for space activities, it may be considered a major achievement that the treaty, as well as some of its offspring—notably the Rescue Agreement, Liability Convention, and Registration Convention—seem to be as relevant as ever. This is a major feat in an international era of many fundamental changes in the geopolitical, economic, and social context.

Nevertheless, the increasing involvement of private entities in many fields of space activity beyond the (by now) more “traditional” ones of …


About The New Pca Rules And Their Application To Satellite Communication Disputes, Frans G. Von Der Dunk Jan 2015

About The New Pca Rules And Their Application To Satellite Communication Disputes, Frans G. Von Der Dunk

Space, Cyber, and Telecommunications Law Program: Faculty Publications

In 2011 the PCA Optional Rules for Arbitration of Disputes Relating to Outer Space Activities were adopted. The present contribution addresses the possible relevance of these new rules for disputes regarding international satellite communication, noting the existence of various dispute settlement regimes already available and analyzing their respective usefulness for such international satellite communications disputes.


The “Space Side” To “Harmful Interference”—Evaluating Regulatory Instruments In Addressing Interference Issues In The Context Of Satellite Communications, Frans G. Von Der Dunk Jan 2015

The “Space Side” To “Harmful Interference”—Evaluating Regulatory Instruments In Addressing Interference Issues In The Context Of Satellite Communications, Frans G. Von Der Dunk

Space, Cyber, and Telecommunications Law Program: Faculty Publications

Interference issues in the context of satellite communications can, in principle, be tackled with legal means from a variety of angles, due to the multifaceted character of both interference and satellite communications as a sector. From that perspective, the present contribution addresses the most important regulatory instruments available to address the particular aspects of satellite communications related to their usage of outer space, and represents a first summary effort to evaluate their particular scope, approach, and general effectiveness.


Brief Of Amici Curiae Former Consular Officers In Support Of Respondent, Kerry V. Din, No. 13-1402 United States Supreme Court, Ira J. Kurzban, Edward F. Ramos, Jeffrey D. Kahn, Trina Realmuto Jan 2015

Brief Of Amici Curiae Former Consular Officers In Support Of Respondent, Kerry V. Din, No. 13-1402 United States Supreme Court, Ira J. Kurzban, Edward F. Ramos, Jeffrey D. Kahn, Trina Realmuto

Faculty Journal Articles and Book Chapters

This brief argues that certain visa application denials, particularly those based on information originating from agencies other than the Department of State, can be qualitatively different from denials based on consular discretion. Although the end result looks the same – “Visa Denied” – denials based on database and watchlist information maintained in the United States by the Department of Homeland Security, the FBI, and other agencies, bear little resemblance to the traditional exercise of consular discretion because the specific information which requires the consular officer to deny these visas is usually not available for him or her to evaluate. Real …


The Limits Of The Freedoms Act’S Amicus Curiae, Chad Squitieri Jan 2015

The Limits Of The Freedoms Act’S Amicus Curiae, Chad Squitieri

Scholarly Articles

The federal government’s power to engage in surveillance for national security purposes is extensive. In an effort to reform the current national surveillance regime, scholars have called for, among other things, the creation of a “special advocate” to counter the government’s arguments before the Foreign Intelligence Surveillance Court. Feeling political pressure to improve an ever-unpopular national surveillance regime, lawmakers passed the USA FREEDOM Act (“Freedom Act”). Section 401 of the Freedom Act provides for the creation of an “amicus curiae,” a position that differs from earlier conceptions of a “special advocate” in important respects. This Essay examines those differences, and …


Lawfare, Charles J. Dunlap Jr. Jan 2015

Lawfare, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.