Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Security

Discipline
Institution
Publication Year
Publication
File Type

Articles 1 - 30 of 60

Full-Text Articles in Law

When Can Nations Go To War? Politics And Change In The Un Securtiy System, Charlotte Ku Sep 2019

When Can Nations Go To War? Politics And Change In The Un Securtiy System, Charlotte Ku

Charlotte Ku

In an appreciation of Harold Jacobson written for the American Journal of International Law, the author concluded that following the events of September 11, 2001, we would need the kind of gentle wisdom Harold Jacobson brought to his tasks more than ever. The author also recalled Harold Jacobson's own observation in Networks of Interdependence that his assessment of the global political system was an optimistic, but not a naive one. These qualities of quiet determination to get to the bottom of an issue and of optimism stemmed from a fundamental belief that individuals, armed with information and the opportunity …


The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans Jul 2019

The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans

Amy C. Gaudion

Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.

Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …


Smarter Finance For Cleaner Energy: Open Up Master Limited Partnerships (Mlps) And Real Estate Investment Trusts (Reits) To Renewable Energy Investment, Felix Mormann, Dan Reicher Jun 2018

Smarter Finance For Cleaner Energy: Open Up Master Limited Partnerships (Mlps) And Real Estate Investment Trusts (Reits) To Renewable Energy Investment, Felix Mormann, Dan Reicher

Felix Mormann

This policy proposal makes the case for opening Master Limited Partnerships (MLPs) and Real Estate Investment Trusts (REITs) — both well-established investment structures — to renewable energy investment. MLPs and, more recently, REITs have a proven track record for promoting oil, gas, and other traditional energy sources. When extended to renewable energy projects these tools will help promote growth, move renewables closer to subsidy independence, and vastly broaden the base of investors in America’s energy economy.


Beyond Tax Credits: Smarter Tax Policy For A Cleaner, More Democratic Energy Future, Felix Mormann Jun 2018

Beyond Tax Credits: Smarter Tax Policy For A Cleaner, More Democratic Energy Future, Felix Mormann

Felix Mormann

Solar, wind, and other renewable energy technologies have the potential to mitigate climate change, secure America’s energy independence, and create millions of green jobs. In the absence of a price on carbon emissions, however, these long-term benefits will not be realized without near-term policy support for renewables. This Article assesses the efficiency of federal tax incentives for renewables and proposes policy reform to more cost-effectively promote renewable energy through capital markets and crowdfunding.

Federal support for renewable energy projects today comes primarily in the form of tax incentives such as accelerated depreciation and, critically, tax credits. Empirical evidence reveals that …


A Model Regime Of Privacy Protection (Version 2.0), Daniel J. Solove, Chris Jay Hoofnagle Jan 2018

A Model Regime Of Privacy Protection (Version 2.0), Daniel J. Solove, Chris Jay Hoofnagle

Chris Jay Hoofnagle

This version incorporates and responds to the many comments that we received to Version 1.1, which we released on March 10, 2005.

Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of the largest data brokers in the United States with records on almost every adult American citizen, sold data on about 145,000 people to fraudulent businesses set up by identity thieves. …


A Model Regime Of Privacy Protection (Version 1.1), Daniel J. Solove, Chris Jay Hoofnagle Jan 2018

A Model Regime Of Privacy Protection (Version 1.1), Daniel J. Solove, Chris Jay Hoofnagle

Chris Jay Hoofnagle

Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of the largest data brokers in the United States with records on almost every adult American citizen, sold data on about 145,000 people to fraudulent businesses set up by identity thieves.

In the aftermath of the ChoicePoint debacle, both of us have been asked by Congressional legislative staffers, state legislative policymakers, journalists, academics, …


A Comparative Examination Of Counter-Terrorism Law And Policy, Laurent Mayali, John Yoo Dec 2017

A Comparative Examination Of Counter-Terrorism Law And Policy, Laurent Mayali, John Yoo

Laurent Mayali

This article conducts a comparative analysis of U.S. and European counter-terrorism law and policy. Recent attacks vy ISIS in the U.S., France, and Germany have revealed important differences between American and European approaches. Before September 11, 2001, the United States responded to terrorism primarily with existing law enforcement authorities, though in isolated cases it pursued military measures abroad. In this respect, it lagged behind the approach of European nations, which had confronted internal terrorism inspired vy leftwing ideology or separatist goals. But after the 9-11 attacks, the United States adopted a preventive posture that aimed to pre-empt terrorist groups before …


Introduction, Tracy Mitrano Oct 2016

Introduction, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano Oct 2016

Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano

Tracy Mitrano

The San Bernardino iPhone case burst on the scene as I was nearing the completion of this manuscript. I could not have imagined a better scenario to sum up the issues of free speech, privacy, intellectual property and security than this case. Not least because the San Bernardino Apple iPhone case generated considerable public interest and policy debate in the United States and abroad. At stake are issues such as the balance between national security and personal privacy, tensions between global technology companies and domestic law enforcement, and the potential supremacy of technology -- particularly encryption -- over traditional notions …


Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson Mar 2016

Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson

Stephen E Henderson

The dispute between the FBI and Apple Inc. over the unlocking of the iPhone used by one of the San Bernadino shooters is important to all Americans. And so it's good that it is getting a wide airing. But when it comes to issues that have complicated tradeoffs, it can be important not just that we have the conversation, but that we use the right words. And here the debate deserves very mixed reviews. . . .


Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg Jun 2015

Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg

Jan Kallberg

Humanitarian cyber operations would allow democratic states to utilise cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on the nation state itself but when the state fails to protect its citizens, then the international community can act ignoring the repressive or failed states national sovereignty. Another support for humanitarian cyber operations is the ability to capture evidence to support future prosecution for crimes against humanity. The weakest link in the chain …


Concepts Of Maritime Security: A Strategic Perspective On Alternative Visions For Good Order And Security At Sea, With Policy Implications For New Zealand, Christopher Rahman Jan 2015

Concepts Of Maritime Security: A Strategic Perspective On Alternative Visions For Good Order And Security At Sea, With Policy Implications For New Zealand, Christopher Rahman

Chris Rahman

This project originated as a research report conducted for the Royal Australian Navy’s Sea Power Centre – Australia. Its intent is not to reprise well‐worn ideas of sea power or maritime strategy, but to address conceptually what is meant by the term “maritime security” in the context of contemporary ideas of the meaning of “security” itself. In doing so, I have purposefully delved into some of the often quite dense and sometimes arcane literature and ideas regarding conceptual treatments of security. This is important, because the ideas inherent in different perspectives on maritime security often have an intellectual or political …


Australia And Maritime Security In The Northeast Indian Ocean, Chris Rahman Jan 2015

Australia And Maritime Security In The Northeast Indian Ocean, Chris Rahman

Chris Rahman

Maritime security is vital to Australia and its neighbours in the ASEANAustralia- India "triangle" - or the area of the northeast Indian Ocean. It has become a leading sphere for the construction of deeper forms of security cooperation. Nonetheless, both the "region" in question and the topic of maritime security itself are underdeveloped ideas in the context of rapidly developing relationships. Therefore, the approach pursued in this chapter focuses on four themes. First, the maritime nature of the area's geography is established. Second, different perspectives on maritime security are introduced, with an emphasis on non-traditional factors, including responses to the …


Evolving U.S. Framework For Global Maritime Security From 9/11 To The 1000-Ship Navy , Christopher Rahman Jan 2015

Evolving U.S. Framework For Global Maritime Security From 9/11 To The 1000-Ship Navy , Christopher Rahman

Chris Rahman

No abstract provided.


The Implications Of Climate Change For Maritime Security Forces, Chris Rahman Jan 2015

The Implications Of Climate Change For Maritime Security Forces, Chris Rahman

Chris Rahman

Although a consensus on the reality of climate change now prevails, the details of the problem remain unsettled. In particular, the precise local and regional impacts of the global phenomenon of climate change are unknown. The security-related consequences of such impacts are thus inherently speculative. Nevertheless, it has become an increasingly important aspect of the national security policy deliberations of many States, including both civil and defence force capability planning, to consider the potential security implications of climate change. Despite the prevailing uncertainty over specific impacts and their security implications, longrange planning can be undertaken based on the most likely …


United Nations Peacekeeping Operations And Security And Reconstruction, Muna Ndulo Dec 2014

United Nations Peacekeeping Operations And Security And Reconstruction, Muna Ndulo

Muna B Ndulo

Several studies show that despite recent increases in the number of minor conflicts, long-term trends suggest that international and civil wars are declining. Analyzing the causes of the improvement in global security since 1990, the 2006 Human Security Report argues that the United Nations played a critically important role in spearheading a huge upsurge of international conflict prevention, peacekeeping and peacebuilding activities. Although the number of wars has decreased, far too many remain — and there are still several places of instability around the globe that could easily turn into conflict areas. In August 2000, a famous UN report, the …


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


"Toiling In The Danger And In The Morals Of Despair": Risk, Security, Danger, The Constitution, And The Clinician's Dilemma, Michael L. Perlin, Alison Julia Lynch Feb 2014

"Toiling In The Danger And In The Morals Of Despair": Risk, Security, Danger, The Constitution, And The Clinician's Dilemma, Michael L. Perlin, Alison Julia Lynch

Michael L Perlin

Abstract: Persons institutionalized in psychiatric hospitals and “state schools” for those with intellectual disabilities have always been hidden from view. Such facilities were often constructed far from major urban centers, availability of transportation to such institutions was often limited, and those who were locked up were, to the public, faceless and often seen as less than human.

Although there has been regular litigation in the area of psychiatric (and intellectual disability) institutional rights for 40 years, much of this case law entirely ignores forensic patients – mostly those awaiting incompetency-to-stand trial determinations, those found permanently incompetent to stand trial, those …


"To Kill A Cleric?: The Al-Awlaki Case And The Chaplaincy Exception Under The Laws Of War", K Benson Dec 2013

"To Kill A Cleric?: The Al-Awlaki Case And The Chaplaincy Exception Under The Laws Of War", K Benson

K Benson

Anwar al-Awlaki was the first American citizen to be targeted for extrajudicial assassination by the Obama administration. While scholarly attention has focused on legality of his killing under domestic law, his status as a chaplain under International Humanitarian Law (IHL) has gone unexamined. The possibility that Anwar al-Awlaki may have been a protected person as a chaplain has profound ramifications for the legality of his killing and for the conduct of the war on terror more generally. As the definition of a "Chaplain" under IHL is under-developed at best and vague at worst, ideologues such as Mr. al-Awlaki operate in …


American Exceptionalism And The International Law Of Self-Defense, Mary Ellen O'Connell Nov 2013

American Exceptionalism And The International Law Of Self-Defense, Mary Ellen O'Connell

Mary Ellen O'Connell

No abstract provided.


International Human Rights Law And Security Detention, Douglass Cassel Nov 2013

International Human Rights Law And Security Detention, Douglass Cassel

Douglass Cassel

This article analyzes the grounds, procedures, and conditions required by International Human Rights Law for preventive detention of suspected terrorists as threats to security. Such detention is generally permitted, provided it is based on grounds and procedures previously established by law; is not arbitrary, discriminatory, or disproportionate; is publicly registered and subject to fair and effective judicial review; and the detainee is not mistreated and is compensated for any unlawful detention. In Europe, however, preventive detention for security purposes is generally not permitted. If allowed at all, it is permitted only when a State in time of national emergency formally …


Can Self-Regulation Work? Lessons From The Private Security And Military Industry, Daphne Richemond-Barak Sep 2013

Can Self-Regulation Work? Lessons From The Private Security And Military Industry, Daphne Richemond-Barak

Daphne Richemond-Barak

Various efforts have been undertaken in recent years to clarify the legal framework governing the outsourcing of security and military functions to private actors. While national and international legislation have made little progress, self-regulation has advanced steadily. The article provides the first normative assessment of self-regulation in the private security and military industry – and as such offers interesting insights for other industries that are transnational in reach and under-regulated by domestic, regional, and international law. Though industry critics tend to deplore the normative 'softness' of self-regulation and its voluntary nature, it appears to have shifted behavioral norms and triggered …


Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael Jun 2013

Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael

Associate Professor Katina Michael

It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …


Getting The Balance Right Between Information Security And Privacy Rights, Katina Michael Jun 2013

Getting The Balance Right Between Information Security And Privacy Rights, Katina Michael

Associate Professor Katina Michael

- Laws, regulations, industry guidelines, and codes for new technologies and their use - The balance between encouraging innovation and future proofing technology-related policy - The difference between the existence of legislation and the enforcement of that legislation - Citizen responses to the fear of policing and security controls


Due Process In American Military Tribunals After September 11, 2001, Gary Shaw May 2013

Due Process In American Military Tribunals After September 11, 2001, Gary Shaw

Gary M. Shaw

The Authorization for Use of Military Force ("AUMF") provides broad powers for a president after September 11, 2001. President Bush, under the AUMF, claimed he had the power to hold "enemy combatants" without due process. This gave rise to two questions that the article addresses: "Could they be held indefinitely without charges or proceedings being initiated? If proceedings had to be initiated, what process was due to the defendants?"


International Law And Ungoverned Space, Matthew Hoisington May 2013

International Law And Ungoverned Space, Matthew Hoisington

Matthew Hoisington

Ungoverned spaces, strictly defined as “spaces not effectively governed by the state” exist all over the world, presenting particular difficulties to public international law, which is historically premised on sovereignty and state control. Examples of such spaces include cyberspace, south-central Somalia and the Federally Administered Tribal Areas along the Afghan-Pakistan border. These spaces destabilize the international system in novel ways—and they might also be dangerous. Many of the terrorism plots from the late twentieth and early twenty-first century emanated from “safe havens” afforded by ungoverned spaces. The lack of governance over certain spaces also raises concerns over development, including the …


Balance Or Trade-Off? Online Security Technologies And Fundamental Rights, Mireille Hildebrandt May 2013

Balance Or Trade-Off? Online Security Technologies And Fundamental Rights, Mireille Hildebrandt

Mireille Hildebrandt

In this contribution I argue that the image of the balance is often used to defend the idea of a trade-off. To understand the drawbacks of this line of thought I will explore the relationship between online security technologies and fundamental rights, notably privacy, non-discrimination, freedom of speech and due process. After discriminating between three types of online security technologies I will trace the reconfiguration of the notion of privacy in the era of smart environments. This will lead to an inquiry into the metaphor of the scale, building on the triple test regarding the justification of the limitation of …


Securing Maritime Australia: Developments In Maritime Surveillance And Security, Clive Schofield, Ben Tsamenyi, Mary Ann Palma Mar 2013

Securing Maritime Australia: Developments In Maritime Surveillance And Security, Clive Schofield, Ben Tsamenyi, Mary Ann Palma

Professor Ben M Tsamenyi

A long coastline and extensive maritime claims mean that Australia benefits from and has responsibility for an enormous maritime jurisdiction.Within this offshore area Australia faces significant, varied, and complex maritime security and ocean policy challenges. In response, Australia has taken a number of innovative steps toward enhancing its maritime security. This article will review Australia’s past practice together with some of the more recent developments in this context, particularly efforts to enhance offshore maritime surveillance and enforcement, such as the creation of the Taskforce on Offshore Maritime Security and Border Protection Command, establishment of the Australian Maritime Identification System, and …


International Law And Ungoverned Space, Matthew Hoisington Jan 2013

International Law And Ungoverned Space, Matthew Hoisington

Matthew Hoisington

Ungoverned spaces, strictly defined as “spaces not effectively governed by the state” exist all over the world, presenting particular difficulties to public international law, which is historically premised on sovereignty and state control. Examples of such spaces include cyberspace, south-central Somalia and the Federally Administered Tribal Areas along the Afghan-Pakistan border. These spaces destabilize the international system in novel ways—and they might also be dangerous. Many of the terrorism plots from the late twentieth and early twenty-first century emanated from “safe havens” afforded by ungoverned spaces. The lack of governance over certain spaces also raises concerns over development, including the …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …