Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1903

Full-Text Articles in National Security Law

"Thou Shalt Not Ration Justice": The Importance Of Autism Insurance Reform For Military Autism Families, And The Economic And National Security Implications Of Improving Access To Aba Therapy Under Tricare, Ariana Cernius Apr 2018

"Thou Shalt Not Ration Justice": The Importance Of Autism Insurance Reform For Military Autism Families, And The Economic And National Security Implications Of Improving Access To Aba Therapy Under Tricare, Ariana Cernius

Journal of Legislation

No abstract provided.


Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo Apr 2018

Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo

International Journal of Nuclear Security

Nuclear energy’s distinctive characteristics give rise to special educational requirements. These requirements are necessary to not only address the danger of nuclear proliferation, but also to build capacity for a secure nuclear fuel circle. In this paper, I assess the status of educational capacity in nuclear security both in response to, and in support of, Kenya’s nuclear power program. I highlight the nuclear security educational infrastructure’s key features in the context of nuclear power, noting the low capacity at Kenyan universities. I identify the steps required to ensure that the country’s dynamic nuclear regulatory infrastructural framework ...


The Operational And Administrative Militaries, Mark P. Nevitt Apr 2018

The Operational And Administrative Militaries, Mark P. Nevitt

Faculty Scholarship

This Article offers a new way of thinking about the military. The U.S. military’s existing legal architecture arose from tragedy: in response to operational military failures in Vietnam, the 1980 failed Iranian hostage rescue attempt and other military misadventures, Congress revamped the Department of Defense (DoD)’s organization. The resulting law, the Goldwater-Nichols Act, formed two militaries within the DoD that endure to this day. These two militaries – the operational military and the administrative military – were once opaque to the outside observer but have emerged from the shadows in light of recent conflicts. The operational military remains the ...


Clearing The Air: Does Choosing Agency Deference In Security Clearance Rulings Dilute Constitutional Challenges?, Frank Russo Mar 2018

Clearing The Air: Does Choosing Agency Deference In Security Clearance Rulings Dilute Constitutional Challenges?, Frank Russo

Catholic University Law Review

The ability to obtain a security clearance has a wide-ranging impact from job placement to questions of fitness in a presidential election. Sustaining a functional career in intelligence, national security, and many other federal fields within the United States is nearly impossible without proper security clearance. In 2016, the importance of proper clearance evolved into a national debate as each presidential candidate staked claims that their opposition should be excluded from receiving sensitive material.

This Comment begins with a detailed history of modern security clearance procedures and MSPB reviews of clearance revocations. Part I focuses on those who need security ...


Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt Mar 2018

Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt

Faculty Scholarship

What best explains how “Everything Became War and the Military Became Everything?”— the provocative title of a recent book by Professor Rosa Brooks of Georgetown Law. In this Essay, I turn to the Department of Defense’s (DoD) unique agency design as the vehicle to address this question. Specifically, I first describe and analyze the role that the 1947 National Security Act and 1986 Goldwater-Nichols Act play in incentivizing organizational behavior within the DoD. These two Acts have broad implications for national security governance. Relatedly, I address the consequences of these two core national security laws, focusing on the rise ...


National Security Letters And Intelligence Oversight, Michael J. Greenlee Mar 2018

National Security Letters And Intelligence Oversight, Michael J. Greenlee

Michael Greenlee

The history of NSL [national security letter] powers can serve as an illuminating example of the post­-Church Committee development of intelligence investigations. Many of the Church Committee findings and recommendations concerning the need for expanded oversight to prevent the executive branch from violating or ignoring the law, excessively using intrusive investigation techniques, and conducting overbroad investigations with inadequate controls on the retention and dissemi­nation of the information gathered are all reflected in the development of NSL powers and authorities from their creation in 1978 through passage of the PlRA [USA PATRIOT Improvement and Reauthorization Act] in 2006. At ...


Being Seen Like A State: How Americans (And Britons) Built The Constitutional Infrastructure Of A Developing Nation, Daniel Hulsebosch Mar 2018

Being Seen Like A State: How Americans (And Britons) Built The Constitutional Infrastructure Of A Developing Nation, Daniel Hulsebosch

New York University Public Law and Legal Theory Working Papers

This Article develops the argument that the Federal Constitution of 1787 was conceptualized, drafted, and put into operation not only for American citizens but also for foreign audiences. In a world without supranational governing institutions, a constitution—at least, the Federal Constitution—might serve to promote peaceable international relations based on reciprocal trade and open credit. That at least was the Enlightenment-inflected hope. Did it work? If early Americans engaged in constitution-making in large part to demonstrate their capacity for self-government, selfdiscipline, and commercial openness to foreign audiences, did anyone notice? Or was it all, regardless of diplomatic purposes and ...


From Imperial To International Law: Protecting Foreign Expectations In The Early United States, Daniel Hulsebosch Mar 2018

From Imperial To International Law: Protecting Foreign Expectations In The Early United States, Daniel Hulsebosch

New York University Public Law and Legal Theory Working Papers

This Essay argues that several principles associated with modern international investment law and dispute resolution arose in the wake of the American Revolution, as the revolutionaries and Britons sought to restructure trade relations, previously regulated by imperial law, under new treaties and the law of nations. They negotiated such problems as the currency in which international debts would be paid; the ability of foreign creditors pursue domestic collection remedies; whether creditors had to exhaust those remedies before their nation could resort to international arbitration; and the form of state-state arbitration of private disputes. The specific setting of these negotiations—the ...


Rendition In Extraordinary Times, Margaret L. Satterthwaite, Alexandra M. Zetes Mar 2018

Rendition In Extraordinary Times, Margaret L. Satterthwaite, Alexandra M. Zetes

New York University Public Law and Legal Theory Working Papers

The practice of rendition—the involuntary transfer of an individual across borders without recourse to extradition or deportation proceedings—is not new. Indeed, the practice of snatching a defendant for trial—“rendition to justice”—has been used by governments for more than a century. Although rendition has been controversial in human rights circles, it has been celebrated by many as crucial in the fight against impunity for grave crimes. Former U.S. President George W. Bush was criticized for the “novel” practice of “extraordinary rendition”—the transfer of suspects to locations known for the systematic use of torture, including secret ...


The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska Mar 2018

The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska

International Journal of Nuclear Security

There is no doubt that the NPT regime is far from being equal for all states involved. As the predominant hegemonic power since WWII, the United States plays a major role in deciding the fates of non-great power proliferators. This article tries to find the logical explanation of the phenomenon whereby some nuclear proliferators are absolved regardless of their active accumulation of nuclear arsenals while others are labeled as “rogue states” and ordered to disarm. The article suggests that a particular proliferator’s political regime could affect the way in which its state is approached by the U.S., known ...


Pathologizing “Radicalization” And The Erosion Of Patient Privacy Rights, Kelly Morgan Feb 2018

Pathologizing “Radicalization” And The Erosion Of Patient Privacy Rights, Kelly Morgan

Boston College Law Review

Countering Violent Extremism (“CVE”) is a counterterrorism strategy ostensibly aimed at preventing “radicalization” through risk assessment and intervention. CVE involves recruitment of helping professionals, including mental health care providers, to monitor their patients for signs of “vulnerability to radicalization,” make referrals to “de-radicalization” programs, and participate in multidisciplinary intervention teams. Broad national security and public safety exceptions within existing privacy laws allow mental health professionals participating in CVE to make potentially harmful disclosures of private patient information. This Note argues that professional associations representing mental health care providers should develop policies to limit and regulate members’ participation in CVE.


Tracing The American State Of Exception From The George W. Bush, Barack Obama, And Donald Trump Presidencies, Arthur Percy Sherwood Feb 2018

Tracing The American State Of Exception From The George W. Bush, Barack Obama, And Donald Trump Presidencies, Arthur Percy Sherwood

Western Journal of Legal Studies

The state of exception has come to weaken the rule of law; that is, it has enabled the sovereign to not only increase its political power but to suspend the law itself. This investigation demonstrates how the post–9/11 state of exception (or of emergency, necessity, or martial law) is increasingly used as the basis of contemporary American governance. This form of governance has been intensified since 9/11 by suspending normal rules and procedures and replacing them with extrajudicial measures that unduly jeopardize fundamental freedoms. The first section develops a framework for the state of exception that draws ...


Back Matter, Adfsl Feb 2018

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl Feb 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Contents, Adfsl Feb 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


United To Deter: Dealing With New Means Of Supporting Terror, Frank A. Florio Feb 2018

United To Deter: Dealing With New Means Of Supporting Terror, Frank A. Florio

University of Miami International and Comparative Law Review

No abstract provided.


The Theory And Practice At The Intersection Between Human Rights And Humanitarian Law, Monica Hakimi Feb 2018

The Theory And Practice At The Intersection Between Human Rights And Humanitarian Law, Monica Hakimi

Reviews

The United States is more than fifteen years into a fight against terrorism that shows no sign of abating and, with the change in administration, appears to be intensifying. Other Western democracies that have historically been uneasy about U.S. counterterrorism policies have, in recent years, shifted toward those policies. And armed nonstate groups continue to commit large-scale acts of violence in multiple distinct theaters. The legal issues that these situations present are not entirely new, but neither are they going away. Recent publications, like the three works under review, thus provide useful opportunities to reflect on and refine our ...


“Frankly Unthinkable”: The Constitutional Failings Of President Trump’S Proposed Muslim Registry, A. Reid Monroe-Sheridan Feb 2018

“Frankly Unthinkable”: The Constitutional Failings Of President Trump’S Proposed Muslim Registry, A. Reid Monroe-Sheridan

Maine Law Review

On several occasions during the 2016 presidential campaign, Donald Trump endorsed the creation of a mandatory government registry for Muslims in the United States— not just visitors from abroad, but American citizens as well. This astonishing proposal has received little attention in legal scholarship to date, even though Trump has refused to renounce the idea following his election to the presidency. In this Article, I attempt to address President Trump’ s proposal in several ways. First, I aim to provide a thorough analysis demonstrating unequivocally that such a “ Muslim registry,” with the characteristics President Trump has endorsed, would violate the ...


Newsroom: Interrogation Expert Warns Against Use Of Torture 2-2-2018, Roger Williams University School Of Law Feb 2018

Newsroom: Interrogation Expert Warns Against Use Of Torture 2-2-2018, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


A Muslim Registry: The Precursor To Internment?, Sahar F. Aziz Jan 2018

A Muslim Registry: The Precursor To Internment?, Sahar F. Aziz

Sahar F. Aziz

Being political scapegoats in the indefinite ‘war on terror’ is the new normal for Muslims in America. With each federal election cycle or terrorist attack in a Western country comes a spike in Islamophobia. Candidates peddle tropes of Muslims as terrorists in campaign materials and political speeches to solicit votes. Government officials call for bold measures – extreme vetting, bans, and mass deportations – to regulate and exclude Muslim bodies from U.S. soil. The racial subtext is that Muslims in the United States are outsiders who do not belong to the political community. A case in point is the “Muslim Ban ...


Disciplining Deference: Strengthening The Role Of The Federal Courts In The National Security Realm, Dominic X. Barceleau Jan 2018

Disciplining Deference: Strengthening The Role Of The Federal Courts In The National Security Realm, Dominic X. Barceleau

Notre Dame Law Review

This Note will argue that federal courts need to be more “disciplined” in their deference determinations in order to effectively check the Executive’s power. Part I will look at the Constitution and its allocation of foreign relations powers for evidence of the appropriate amount of deference that ought to be shown by the judiciary. While the text of the Constitution is largely silent on this question, Part I will show that this silence does not exclude a role for the judiciary in foreign affairs. Part II will proceed to discuss several important Supreme Court decisions that have helped to ...


The Corporate Governance Of National Security, Andrew Verstein Jan 2018

The Corporate Governance Of National Security, Andrew Verstein

Washington University Law Review

At hundreds of companies, the government installs former spies and military officers to run the business without shareholder oversight, putting security before profits in order to protect vital projects from potentially treasonous influences. Through procedures I call “National Security Corporate Governance,” corporate boardrooms have quietly become instruments of national defense, marrying the efficiency norms of corporate law and the protective ambitions of national security. How is this achieved, and how successfully? Using a variety of research approaches – including Freedom of Information Act (FOIA) requests, archival searches, telephone interviews, and in-person conversations with industry insiders – this Article illuminates a secretive government ...


Venezuela Public Health Issue, Luke Vargas Jan 2018

Venezuela Public Health Issue, Luke Vargas

Global Public Health

While every country around the world faces a form of public health issues, the issues that the country of Venezuela faces are different. Their public health problem is not a disease that can be solved by science, or a cure. It’s a problem that can only be solved by the people within the county itself. The country of Venezuela now lacks the proper medical supplies needed to help cure diseases and normal vaccinations, and the only ones to blame is their government. Because their government has now refused to pay their debts to the surrounding countries they have now ...


Cybersecurity And The New Era Of Space Activities, David P. Fidler Jan 2018

Cybersecurity And The New Era Of Space Activities, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Contemporary Practice Of The United States Relating To International Law (112:1 Am J Int'l L), Jean Galbraith Jan 2018

Contemporary Practice Of The United States Relating To International Law (112:1 Am J Int'l L), Jean Galbraith

Faculty Scholarship

This article is reproduced with permission from the January 2018 issue of the American Journal of International Law © 2018 American Society of International Law. All rights reserved.

Once the PDF is open, individual articles are accessible either by scrolling down or by clicking on the bookmark symbol.


Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich Jan 2018

Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich

Brooklyn Law Review

In recent years, “home grown” terrorists—individuals inspired to violence after watching terrorist videos online—have been responsible for devastating attacks in the United States and across Europe. Such terrorist propaganda falls outside the realm of the First Amendment’s protection because it has been proven to indoctrinate attackers, thus inciting imminent lawless action. Seizing on this, victims’ families have brought suits alleging that social media platforms, including Twitter, Facebook, and Google, provided material support to terrorists in violation of the Anti-Terrorism Act (ATA). The Communications Decency Act (CDA), however, has served as an impenetrable shield against these claims, protecting ...


A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson Dec 2017

A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson

Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the ...


International Journal Of Information Privacy, Security And Integrity, James Stewart, Maurice Dawson Dec 2017

International Journal Of Information Privacy, Security And Integrity, James Stewart, Maurice Dawson

Maurice Dawson

Research on cyber security related to social engineering has expanded from its purely technological orientation into explaining the role of human behavior in detecting deception. In the broadest definition, social engineering, in the context of information security, is the manipulation of individuals to perform actions that cause harm or increase the probability of causing future harm. Human personality traits significantly contribute to the probability that an individual is susceptible to manipulation related to social engineering deception attacks and exploits (Maurya, 2013). The outcome of the attacks and objective is the alteration of normal and rational decision making as described in ...


Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson Dec 2017

Legal Issues: Security And Privacy With Mobile Devices, Brian Leonard, Maurice Dawson

Maurice Dawson

Privacy and security are two items being woven into the fabric of American law concerning mobile devices. This chapter will review and analyze the associated laws and policies that are currently in place or have been proposed to ensure proper execution of security measures for mobile and other devices while still protecting individual privacy. This chapter will address the fact that as the American society significantly uses mobile devices, it is imperative to understand the legal actions surrounding these technologies to include their associated uses. This chapter will also address the fact that with 9/11 in the not so ...


Neutrality And Outer Space, Wolff Heintschel Von Heinegg Dec 2017

Neutrality And Outer Space, Wolff Heintschel Von Heinegg

International Law Studies

This article discusses the law of neutrality as it pertains to belligerent operations in and through outer space as well as belligerent outer space operations involving the territory and national airspace of neutral States. As far as the latter is concerned, the traditional law of neutrality is fully applicable. Accordingly, international law prohibits belligerents from launching space objects from neutral territory or through neutral national airspace. While neutral States may not provide belligerents with outer space assets or the use of communications infrastructure located in their territories, they are not obliged to prevent their nationals from providing any of the ...