Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1714

Full-Text Articles in National Security Law

The Big Lebowski: The Dude’S Lessons In Law And Leadership For Military And National Security Attorneys, Ryan A. Little Mar 2017

The Big Lebowski: The Dude’S Lessons In Law And Leadership For Military And National Security Attorneys, Ryan A. Little

Pace Law Review

The Big Lebowski is a cultural phenomenon that has prompted academic research into the nature of cult cinema, provided fodder for a host of law review quotes, and motivated a tradition of fan festivals and midnight screenings. However, most viewers do not realize that The Big Lebowski also serves as an engaging training tool for military and national security attorneys.

Disguised as an impish play on film noir and hard-boiled detective fiction, The Big Lebowski’s unpretentious treatment of delicate topics contains poignant lessons for military and national security attorneys that include: (1) the risks facing national security attorneys when ...


A Human Rights Perspective To Global Battlefield Detention: Time To Reconsider Indefinite Detention, Yuval Shany Mar 2017

A Human Rights Perspective To Global Battlefield Detention: Time To Reconsider Indefinite Detention, Yuval Shany

International Law Studies

This article discusses one principal challenge to detention without trial of suspected international terrorists—the international human rights law (IHRL) norm requiring the introduction of an upper limit on the duration of security detention in order to render it not indefinite in length. Part One of this article describes the “hardline” position on security detention, adopted by the United States in the immediate aftermath of the 9/11 terror attacks (followed, with certain variations, by other countries, including the United Kingdom and the State of Israel), according to which international terrorism suspects can be deprived of their liberty without trial ...


The Limits Of Inviolability: The Parameters For Protection Of United Nations Facilities During Armed Conflict, Laurie R. Blank Mar 2017

The Limits Of Inviolability: The Parameters For Protection Of United Nations Facilities During Armed Conflict, Laurie R. Blank

International Law Studies

This article examines the international legal protections for United Nations humanitarian assistance and other civilian facilities during armed conflict, including under general international law, setting forth the immunities of the United Nations, and the law of armed conflict (LOAC), the relevant legal framework during wartime. Recent conflicts highlight three primary issues: (1) collateral damage to UN facilities as a consequence of strikes on military objectives nearby and military operations in the immediate vicinity; (2) the misuse of UN facilities for military purposes; and (3) direct attacks on fighters, weapons or other equipment that cause damage to such facilities. To identify ...


Standing And Covert Surveillance, Christopher Slobogin Mar 2017

Standing And Covert Surveillance, Christopher Slobogin

Christopher Slobogin

This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the ...


Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies Feb 2017

Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies

Life of the Law School (1993- )

No abstract provided.


Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein Feb 2017

Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein

Life of the Law School (1993- )

No abstract provided.


The Catholic Just War Tradition And The War In Iraq: Just Pre-Emptive War, Just Humanitarian Intervention?, Daniel R. Strecker Feb 2017

The Catholic Just War Tradition And The War In Iraq: Just Pre-Emptive War, Just Humanitarian Intervention?, Daniel R. Strecker

Journal of Catholic Legal Studies

No abstract provided.


Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein Jan 2017

Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein

Law School Blogs

No abstract provided.


The New Era Of Doing Business With Iran: Iran’S International Commercial Transactions And Global Security, John Changiz Vafai Jan 2017

The New Era Of Doing Business With Iran: Iran’S International Commercial Transactions And Global Security, John Changiz Vafai

Pace International Law Review

On January 17, 2016, in a statement following his signing of the Joint Comprehensive Plan of Action (JCPOA) with Iran, President Obama addressed that country’s people, stating that “yours is a great civilization, with a vibrant culture that has so much to contribute to the world – in commerce, and in science and the arts.” While the former U.S. President’s evaluation of the Iranian people’s greatness is indisputable, there are questions concerning doing business with Iran which transcend conventional legal issues and commercial problems.

Given the juxtaposition of Iran’s duopolistic government structure and ideologically oriented decision-making ...


Newsroom: Nbc News: Coombs On Chelsea Manning 01-13-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Nbc News: Coombs On Chelsea Manning 01-13-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


The European Union And The Outer Space Treaty: Will The Twain Ever Meet?, Frans G. Von Der Dunk Jan 2017

The European Union And The Outer Space Treaty: Will The Twain Ever Meet?, Frans G. Von Der Dunk

Space, Cyber, and Telecommunications Law Program Faculty Publications

In spite of the envisaged Brexit and other crises and problems currently threatening the European Union (EU), that half-way house between a group of cooperating states and a single quasi-federal union of states remains an important player in today’s world, also – at least from a bird’s eye view – in terms of outer space. Its member states Germany and France have the largest space budgets of all European states (discounting the Russian Federation as a European state), and the European flagship projects Galileo and Copernicus, with the European Commission on behalf of the Union in the driver’s seat ...


The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook Jan 2017

The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook

American University Law Review

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights core ...


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult ...


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Rethinking Counterterrorism In The Age Of Isis, Sahar F. Aziz Dec 2016

Rethinking Counterterrorism In The Age Of Isis, Sahar F. Aziz

Sahar F. Aziz

Failing states are havens for terrorism. A toxic combination of social, economic, and political crises attract violent extremist groups to establish bases in these lawless areas. As the groups grow in strength, the violence spreads from the immediate vicinity to the nation, region, and sometimes even other continents. One need only look to the terrorist attacks in New York, London, Madrid, and Paris as proof that terrorists operating out of failing states eventually set their sights on attacking Western capitals. Although the underlying causes of terrorism are often local, the violence is no longer constrained within a particular country or ...


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk Dec 2016

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa Dec 2016

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to ...


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr Dec 2016

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath Dec 2016

Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath

International Journal of Nuclear Security

This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.