Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1779

Full-Text Articles in National Security Law

Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso Aug 2017

Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso

University of Massachusetts Law Review

As a division of the Federal Bureau of Investigation’s National Security Branch, the Terrorist Screening Center maintains the Terrorist Watchlist, a central database for identifying individuals known or suspected to engage in terrorism or terrorist activities. Subsumed under the Terrorist Watchlist is the No Fly List, which prohibits individuals from boarding commercial aircrafts in and out of the United States. Placement on either list presumes named individuals as a potential threat to U.S. national security, yet there is no restriction preventing them from legally purchasing firearms. Following a mass shooting at an Orlando nightclub in June of 2016 ...


Maritime Law Enforcement Operations And Intelligence In An Age Of Maritime Security, Douglas Guilfoyle Jul 2017

Maritime Law Enforcement Operations And Intelligence In An Age Of Maritime Security, Douglas Guilfoyle

International Law Studies

This article examines maritime law enforcement operations and intelligence activities in the context of maritime security. First describing the role of navies and coast guards in maritime security, this article then explores the relationship between law enforcement operations and actionable intelligence. In particular, it focuses on maritime domain awareness (MDA), and how MDA functions as a form of intelligence. Next, the article discusses maritime domain awareness under international law before looking to the tension between intelligence collection and visit, board, search and seizure (VBSS) operations, both on the high seas and in waters under national jurisdiction. The article closes by ...


A Never Ending State Of Emergency: The Danger Of National Security In Emboldening The Color Line In America, Celeste Mccaw Jul 2017

A Never Ending State Of Emergency: The Danger Of National Security In Emboldening The Color Line In America, Celeste Mccaw

University of Miami Race & Social Justice Law Review

No abstract provided.


Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer Jun 2017

Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer

Seattle University Law Review

Part I of this Article describes how the healthcare industry has arrived in this place of vulnerability, including (1) the history of the movement toward EHRs through HIPAA, (2) HIPAA’s meaningful use regulations and the background of current ransomware attacks, and (3) the distinctions between these attacks and other security breaches that have plagued large insurers and health systems within the last five years. Next, Part II will examine current industry culture when it comes to cybersecurity and review current legal and business approaches to address this growing threat. Then, Part III will argue that, while the current laws ...


The Future Of U.S. Detention Under International Law: Workshop Report, International Committee Of The Red Cross (Icrc), Harvard Law School Program On International Law And Armed Conflict (Hls Pilac), Stockton Center For The Study Of International Law (U.S. Naval War College) Jun 2017

The Future Of U.S. Detention Under International Law: Workshop Report, International Committee Of The Red Cross (Icrc), Harvard Law School Program On International Law And Armed Conflict (Hls Pilac), Stockton Center For The Study Of International Law (U.S. Naval War College)

International Law Studies

The International Committee of the Red Cross Regional Delegation for the United States and Canada, the Harvard Law School Program on International Law and Armed Conflict, and the Stockton Center for the Study of International Law at the U.S. Naval War College recently hosted a workshop titled Global Battlefields: The Future of U.S. Detention under International Law. The workshop was designed to facilitate discussion on international law issues pertaining to U.S. detention practices and policies in armed conflict. Workshop participants included members of government, legal experts, practitioners and scholars from a variety of countries. This report attempts ...


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at ...


The Constitution And National Security, Erwin Chemerinsky Jun 2017

The Constitution And National Security, Erwin Chemerinsky

Erwin Chemerinsky

No abstract provided.


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


The Legacy Of Srebrenica: Potential Consequences Of Reducing Liability For Troop Contributing Countries In Modern Un Peacekeeping Operations, Kelsey Gasseling May 2017

The Legacy Of Srebrenica: Potential Consequences Of Reducing Liability For Troop Contributing Countries In Modern Un Peacekeeping Operations, Kelsey Gasseling

Boston College International and Comparative Law Review

In 2014 the District Court of The Hague returned its decision in a case concerning peacekeeper (Dutchbat) wrongdoing during the 1995 massacre at Srebrenica, Bosnia-Herzegovina. The district court dismissed the UN as party to the suit, basing this decision on the organization’s statutory immunity from prosecution. As a basis for holding the Netherlands liable for Dutchbat’s actions, the district court utilized the effective control standard. This standard triggered liability for conduct undertaken either under direct order from Dutch officials, or in violation of the mission mandate. The district court strictly interpreted effective control, concluding the Netherlands was liable ...


Fragmented Wars: Multi-Territorial Military Operations Against Armed Groups, Noam Lubell May 2017

Fragmented Wars: Multi-Territorial Military Operations Against Armed Groups, Noam Lubell

International Law Studies

Recent years have seen the emergence of significant legal debate surrounding the use of force against armed groups located in other States. With time, it has become clear that in many cases such operations are not confined to the territory of one other State, but expand to encompass multiple territories and often more than one armed group. This article examines multi-territorial conflicts with armed groups through the lens of several legal frameworks. Among other topics, it analyses the questions surrounding the extension of self-defense into multiple territories, the classification of the hostilities with the group and between involved States, the ...


With Chelsea Manning's Release, Lead Trial Attorney Coombs Recalls Case: Rwu Law Professor David E. Coombs Revisits Issues In The Case, Looks Forward To Teaching Again Next Year 05-17-2017, Edward Fitzpatrick May 2017

With Chelsea Manning's Release, Lead Trial Attorney Coombs Recalls Case: Rwu Law Professor David E. Coombs Revisits Issues In The Case, Looks Forward To Teaching Again Next Year 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick May 2017

Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


Space Weapons And The Law, Bill Boothby May 2017

Space Weapons And The Law, Bill Boothby

International Law Studies

Outer space is of vital importance for numerous civilian and military functions in the modern world. The idea of a space weapon involves something used, intended or designed for employment in, to or from outer space to cause injury or damage to the enemy during an armed conflict. Non-injurious, non-damaging space activities that adversely affect enemy military operations or capacity, though not involving the use of weapons, will nevertheless be methods of warfare. Article III of the Outer Space Treaty makes it clear that international law, including weapons law, applies in outer space. Accordingly, the superfluous injury/unnecessary suffering and ...


A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr May 2017

A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr

Senior Honors Theses

Since the 9/11 attacks, American legislation and legal policy in regards to classifying and processing captured terrorists has fallen short of being fully effective and lawful. Trial and error by the Bush and Obama administrations has uncovered two key lessons: (1) captured terrorists are not typical prisoners of war and thus their detainment must involve more legal scrutiny than the latter; and (2) captured terrorists are not ordinary criminals and thus the civilian criminal court system, due to constitutional constraints, is not capable of adequately trying every count of terrorism. Other nations, including France and Israel, approach this problem ...


Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan Apr 2017

Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan

Penn State Journal of Law & International Affairs

No abstract provided.


Air Traffic Control: How Mexican Cartels Are Utilizing Drones To Traffic Narcotics Into The United States, Britton Shields Apr 2017

Air Traffic Control: How Mexican Cartels Are Utilizing Drones To Traffic Narcotics Into The United States, Britton Shields

Penn State Journal of Law & International Affairs

No abstract provided.


Legal Status Of Drones Under Loac And International Law, Vivek Sehrawat Apr 2017

Legal Status Of Drones Under Loac And International Law, Vivek Sehrawat

Penn State Journal of Law & International Affairs

No abstract provided.


The Innocent Combatant: Preserving Their Jus In Bello Protections, Mark "Max" Maxwell, Richard V. Meyer Apr 2017

The Innocent Combatant: Preserving Their Jus In Bello Protections, Mark "Max" Maxwell, Richard V. Meyer

Penn State Journal of Law & International Affairs

No abstract provided.


A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott Apr 2017

A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott

Penn State Journal of Law & International Affairs

No abstract provided.


The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown Apr 2017

The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown

Penn State Journal of Law & International Affairs

No abstract provided.


War In The 21st Century And Collected Works Apr 2017

War In The 21st Century And Collected Works

Penn State Journal of Law & International Affairs

No abstract provided.


Newsroom: Rwu Wins Cyber Crime Moot At Ucla 04-24-2017, Roger Williams University School Of Law Apr 2017

Newsroom: Rwu Wins Cyber Crime Moot At Ucla 04-24-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


All The News That’S Worth The Risk: Improving Protection For Freelance Journalists In War Zones, Lindsay R. Grossman Apr 2017

All The News That’S Worth The Risk: Improving Protection For Freelance Journalists In War Zones, Lindsay R. Grossman

Boston College International and Comparative Law Review

Although war journalism has existed for centuries, changes in the nature of armed conflict and its coverage have put the danger for modern journalists at an all time high. The traditional war correspondent has been replaced in recent years by the independent freelance journalist. While the former receives the full protection and financial backing of his respective news organization and the American military, the latter works on his own, often living in dangerous war zones with little or no training, insurance, or equipment. This new mode of journalism has proved especially dangerous in the current conflict in Syria, where terrorist ...


Targeted Killings—Never Not An Act Of International Criminal Law Enforcement, Barry Kellman Apr 2017

Targeted Killings—Never Not An Act Of International Criminal Law Enforcement, Barry Kellman

Boston College International and Comparative Law Review

Defenders of targeted killings proffer a straightforward elaboration of military necessity in the context of modern technological capabilities and conclude that killing members of terrorist organizations is legal under international law. In this essay, I assert that targeted killings to combat terrorist threats should not be governed predominantly by the law of war but should be synthesized with widely recognized principles of international criminal justice. Targeted killings are now the only aspect of counter-terrorism policy that operates outside constraints of criminal justice and beyond judicial review. That many people are being killed without anything like due process of law undermines ...


Unsafe Harbor: The European Union's Demand For Heightened Data Privacy Standards In Schrems V. Irish Data Protection Commissioner, Christina Lam Apr 2017

Unsafe Harbor: The European Union's Demand For Heightened Data Privacy Standards In Schrems V. Irish Data Protection Commissioner, Christina Lam

Boston College International and Comparative Law Review

In 1995, the European Union adopted the Data Protection Directive to govern the processing, use, and exchange of personal data. The United States refused to enact similar legislation, consequently jeopardizing ongoing and future data transfers with the European Union. To prevent economic catastrophe, the United States negotiated with the European Union to reach the Safe Harbor Agreement and, on July 26, 2000, the European Commission formally recognized the agreement as compliant with the Data Protection Directive in its Safe Harbor Decision. In 2013, U.S. data protection standards were once again placed under the microscope when Edward Snowden leaked information ...


Prioritizing National Security At The Expense Of Refugee Rights: The Effects Of H.T. V. Land Baden-Württenberg, Thomas F. Lampert Apr 2017

Prioritizing National Security At The Expense Of Refugee Rights: The Effects Of H.T. V. Land Baden-Württenberg, Thomas F. Lampert

Boston College International and Comparative Law Review

Tensions are high in member states of the European Union as they struggle to accommodate a record number of refugees while simultaneously confronting seemingly regular terrorist attacks. In response to this crisis, the European Court of Justice’s decision in H.T. v. Land Baden-Württenberg continued a trend that began after September 11, 2001, in which countries implement policies that diminish and threaten the rights of refugees. Specifically, the European Court of Justice ruled that legislation governing the distribution of residence permits to refugees impliedly allowed for the revocation of a residence permit from a refugee accused of terrorist activities ...


Willful Blindness Or Deliberate Indifference: The United States' Abdication Of Legal Responsibility To Refugees, Abed A. Ayoub, Yolanda C. Rondon Apr 2017

Willful Blindness Or Deliberate Indifference: The United States' Abdication Of Legal Responsibility To Refugees, Abed A. Ayoub, Yolanda C. Rondon

Barry Law Review

No abstract provided.


A Troubling Equation In Contracts For Government Funded Scientific Research: "Sensitive But Unclassified" = Secret But Unconstitutional, Leslie Gielow Jacobs Mar 2017

A Troubling Equation In Contracts For Government Funded Scientific Research: "Sensitive But Unclassified" = Secret But Unconstitutional, Leslie Gielow Jacobs

Leslie Gielow Jacobs

No abstract provided.


If George Washington Did It, Does That Make It Constitutional? : History's Lessons For Wartime Military Tribunals, Martin S. Lederman Mar 2017

If George Washington Did It, Does That Make It Constitutional? : History's Lessons For Wartime Military Tribunals, Martin S. Lederman

Georgetown Law Faculty Publications and Other Works

Congress has recently authorized military commissions to try individuals for domestic-law offenses—such as providing material support to terrorism, and conspiring to commit law-of-war offenses—in addition to offenses against the international laws of war. Such military tribunals lack the civilian jury and independent judge that Article III of the Constitution guarantees. The constitutionality of such an abrogation of Article III’s criminal-trial guarantees has been debated in many of the Nation’s wars, without clear resolution. The Article III question is now the subject of a potentially landmark case, al Bahlul v. United States, that will be before the ...


The Big Lebowski: The Dude’S Lessons In Law And Leadership For Military And National Security Attorneys, Ryan A. Little Mar 2017

The Big Lebowski: The Dude’S Lessons In Law And Leadership For Military And National Security Attorneys, Ryan A. Little

Pace Law Review

The Big Lebowski is a cultural phenomenon that has prompted academic research into the nature of cult cinema, provided fodder for a host of law review quotes, and motivated a tradition of fan festivals and midnight screenings. However, most viewers do not realize that The Big Lebowski also serves as an engaging training tool for military and national security attorneys.

Disguised as an impish play on film noir and hard-boiled detective fiction, The Big Lebowski’s unpretentious treatment of delicate topics contains poignant lessons for military and national security attorneys that include: (1) the risks facing national security attorneys when ...