Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 2036

Full-Text Articles in National Security Law

Much Ado About Nothing?: Local Resistance And The Significance Of Sanctuary Laws, Alyssa Garcia Oct 2018

Much Ado About Nothing?: Local Resistance And The Significance Of Sanctuary Laws, Alyssa Garcia

Seattle University Law Review

This Comment explores the current constitutional discourse of sanctuary laws and compares their various components. Part I provides background on the basic policy components of sanctuary laws and modern policies. Part II explores and compares the substantive legal and political value of sanctuary laws. This section will first assess the impact of sanctuary policies on existing immigration and constitutional law. In doing so, specific sanctuary jurisdictions involved in litigation, Seattle, San Francisco, and Chicago, and their likelihood of withstanding preemption under existing doctrine will be compared. The impact sanctuary laws may have on the Tenth Amendment will next be discussed ...


Contemporary Practice Of The United States Relating To International Law (112:4 Am J Int'l L), Jean Galbraith Oct 2018

Contemporary Practice Of The United States Relating To International Law (112:4 Am J Int'l L), Jean Galbraith

Faculty Scholarship at Penn Law

This article is reproduced with permission from the October 2018 issue of the American Journal of International Law © 2018 American Society of International Law. All rights reserved.


The Law Of Nations And The Constitution: An Early Modern Perspective, David M. Golove, Daniel Hulsebosch Sep 2018

The Law Of Nations And The Constitution: An Early Modern Perspective, David M. Golove, Daniel Hulsebosch

New York University Public Law and Legal Theory Working Papers

Many American scholars, lawyers, and judges born in the latter half of the twentieth century have found it difficult to comprehend, or even recognize, the Founding generation’s commitment to the law of nations as a system of law, jurisprudence, and morality. Perhaps for similar reasons, that commitment tends to get lost in much modern historical writing. So, too, with respect to a related, but, from a legal perspective, more consequential aspect of the Founding: the prominent place of the law of nations in the constitutional reform project that culminated in the Philadelphia Convention. It was the uncertain struggle to ...


How To End “Illegal Immigration”, Kari E. Hong Sep 2018

How To End “Illegal Immigration”, Kari E. Hong

Boston College Law School Faculty Papers

Since President Trump has taken office, it is clearer than ever that there are two ways to end “illegal immigration.” The first route — started by President Obama and ratcheted up by President Trump with relentless cruelty — is an actual effort to deport millions and exclude millions more. The second is to legalize those without status who have been, are, and will continue to contribute to America’s families, communities, and future.

This essay argues that the latter choice, restoring the paths to legalization that once were part of our nation’s laws, is the only realistic way forward to restore ...


The Operational And Administrative Militaries, Mark P. Nevitt Aug 2018

The Operational And Administrative Militaries, Mark P. Nevitt

Faculty Scholarship at Penn Law

This Article offers a new way of thinking about the military. The U.S. military’s existing legal architecture arose from tragedy: in response to operational military failures in Vietnam, the 1980 failed Iranian hostage rescue attempt and other military misadventures, Congress revamped the Department of Defense (DoD)’s organization. The resulting law, the Goldwater-Nichols Act, formed two militaries within the DoD that endure to this day. These two militaries – the operational military and the administrative military – were once opaque to the outside observer but have emerged from the shadows in light of recent conflicts. The operational military remains the ...


Sanctuary Cities And The Trump Administration: The Practical Limits Of Federal Power, Joshua W. Dansby Aug 2018

Sanctuary Cities And The Trump Administration: The Practical Limits Of Federal Power, Joshua W. Dansby

The Scholar: St. Mary's Law Review on Race and Social Justice

On January 25, 2017, President Donald J. Trump signed an executive order with the supposed purpose of enhancing public safety of the interior of the United States. Part of the Administration’s plan includes threatening “sanctuary jurisdictions,” also known as “sanctuary cities,” with the loss of federal funds for failing to comply with federal law, specifically 8 U.S.C. § 1373.

There are several problems with this plan: (1) there is no solid definition for what makes a city a “sanctuary;” (2) if we accept the Administration’s allusion that a sanctuary jurisdiction is one that “willfully” refuses to comply ...


Effects Of Senate Bill 4 On Wage-Theft: Why All Workers Are At Risk In Low-Income Occupations, Daniella Salas-Chacon Aug 2018

Effects Of Senate Bill 4 On Wage-Theft: Why All Workers Are At Risk In Low-Income Occupations, Daniella Salas-Chacon

The Scholar: St. Mary's Law Review on Race and Social Justice

Abstract forthcoming


Undocumented Crime Victims: Unheard, Unnumbered, And Unprotected, Pauline Portillo Aug 2018

Undocumented Crime Victims: Unheard, Unnumbered, And Unprotected, Pauline Portillo

The Scholar: St. Mary's Law Review on Race and Social Justice

Abstract forthcoming


A Nation Of Informants: Reining In Post-9/11 Coercion Of Intelligence Informants, Diala Shamas Jul 2018

A Nation Of Informants: Reining In Post-9/11 Coercion Of Intelligence Informants, Diala Shamas

Brooklyn Law Review

This article challenges the adequacy of the existing legal and regulatory framework governing informant recruitment and coercion practices to protect fundamental rights, informed by the Muslim-American experience. It looks at the growing law enforcement practice of recruiting informants among Muslim-American communities for intelligence gathering purposes. Although the coercion of law-abiding individuals to provide information to federal law enforcement agencies for intelligence gathering purposes implicates significant rights, it is left unregulated. Existing, albeit limited, restraints on the government agents’ ability to coerce individuals to provide information either assume a criminal context, or are driven by historical concerns over FBI corruption. As ...


No Security Through Obscurity: Changing Circumvention Law To Protect Our Democracy Against Cyberattacks, Andrew Moshirnia Jul 2018

No Security Through Obscurity: Changing Circumvention Law To Protect Our Democracy Against Cyberattacks, Andrew Moshirnia

Brooklyn Law Review

Cybersecurity is increasingly vital in a climate of unprecedented digital assaults against liberal democracy. Russian hackers have launched destabilizing cyberattacks targeting the United States’ energy grid, voting machines, and political campaigns. America's existing inadequate cyber defenses operate according to a simple assumption: hide the computer code that powers critical infrastructure so that America's enemies cannot exploit undiscovered weaknesses. Indeed, the intellectual property regime relies entirely on this belief, protecting those who own the rights in computer code by punishing those who might access and copy that code. This “security through obscurity” approach has failed. Rightsholders, on their own ...


A Slap On The Wrist: Combatting Russia’S Cyber Attack On The 2016 U.S. Presidential Election, Christina Lam Jul 2018

A Slap On The Wrist: Combatting Russia’S Cyber Attack On The 2016 U.S. Presidential Election, Christina Lam

Boston College Law Review

On June 14, 2016, suspicions emerged that Russia launched a cyber attack on the U.S. Democratic National Committee in the midst of an extremely contentious presidential election season. The damage was extensive, occurring over a series of months and resulting in numerous leaks of highly sensitive information regarding Democratic Presidential Candidate Hillary Clinton. After it was verified that Russia was behind the cyber attack, President Barack Obama relied on general and anachronistic principles of international law to issue a grossly ineffective response. Russia’s cyber attack and the U.S. response thus highlighted the ways in which international law ...


Contemporary Practice Of The United States Relating To International Law (112:3 Am J Int'l L), Jean Galbraith Jul 2018

Contemporary Practice Of The United States Relating To International Law (112:3 Am J Int'l L), Jean Galbraith

Faculty Scholarship at Penn Law

This article is reproduced with permission from the July 2018 issue of the American Journal of International Law © 2018 American Society of International Law. All rights reserved.


Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam Jun 2018

Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam

International Journal of Nuclear Security

The Shapash Nuclear Research Institute (SNRI) data book was issued by the International Atomic Energy Agency (IAEA) in 2013. The hypothetical facility data book describes the hypothetical site, which is divided into two areas: the low-security area, known as the administrative area, and the very high-security area, known as the protected area. The book contains detailed descriptions of each area’s safety and security measures, along with figures of multiple buildings in both areas, and also includes information about the site’s computer networks.

This paper aims to identify security weaknesses related to the institute’s location, the Administrative Area ...


Private Property Rights And The Public Interest In Exploration Of Outer Space, Frans G. Von Der Dunk Jun 2018

Private Property Rights And The Public Interest In Exploration Of Outer Space, Frans G. Von Der Dunk

Space, Cyber, and Telecommunications Law Program Faculty Publications

The impending missions to exploit natural resources of celestial bodies may at some point start interfering with the scientific interests, including those of astrobiology, in these bodies. While the legal status of celestial bodies at the highest level is clear, uncertainty has arisen as to the extent private property rights over such objects or over their resources are legally acceptable, legally impossible, or potentially legal. This also provides for a considerable amount of uncertainty regarding how the legal framework could or may need to be changed to accommodate private interests. The article analyzes the two main international treaties relevant from ...


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming May 2018

A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper reports on the results of a survey that is the initial phase of an action research project being conducted with the Law Society of Western Australia. The online survey forms a baseline for the expression of a targeted training regime aimed at improving the cyber security awareness and posture of the membership of the Society. The full complement of over 3000 members were given the opportunity to participate in the survey, with 122 members responding in this initial round. The survey was designed to elicit responses about information technology use and the awareness of good practices with respect ...


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical ...


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows ...


Investigative Practices For Large Money Laundering Crimes, Mary Hutley-Washington May 2018

Investigative Practices For Large Money Laundering Crimes, Mary Hutley-Washington

Economic Crime Forensics Capstones

Reportedly, governments, states departments, analysts and law enforcement state, "money laundering has a corrosive effect on a country’s economy. The degree of destruction caused by money laundering interrupts the business flow, runs the risk of financial burdens on banks, and ruins countless countries’ reputation for allowing widespread laundering. Money laundering’s significant consequences are the exposure to the communities; because of the criminal elements individuals are subjected to laundering, i.e., fraud, drug trafficking, and other financial crimes” (Freeman, 2011). It is no surprise that internationally all communities want the battle against money laundering and its use to finance ...


The Significance Of Mongolia's Foreign Policy And Security Apparatus On A Global And Regional Scale, Bolor Lkhaajav May 2018

The Significance Of Mongolia's Foreign Policy And Security Apparatus On A Global And Regional Scale, Bolor Lkhaajav

Master's Projects and Capstones

Mongolia, land-locked between two politically, economically, and militarily powerful nations — Russia and China — often must balance its foreign and security policies with its two neighbors and countries beyond. When discussing Mongolia’s foreign policy and security apparatus, historians and scholars look at the international relations of East Asia as a whole. This is the case not because Mongolia’s foreign policy is insignificant but because greater powers impose greater influence on smaller states. Mongolia’s partial involvement in World War II (WWII), and the Cold War introduced new challenges as well as opportunities for Mongolia to modernize its foreign policy ...


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D May 2018

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues ...


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed ...


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik May 2018

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence ...


Military Justice: A Very Short Introduction (Book Review), Mark Patrick Nevitt May 2018

Military Justice: A Very Short Introduction (Book Review), Mark Patrick Nevitt

Faculty Scholarship at Penn Law

This short essay reviews Professor Eugene Fidell’s recently published book, “Military Justice A Very Short Introduction” (Oxford Press). This book is a welcome addition to military law and military justice literature more generally. Eugene Fidell, a professor at Yale Law School, brings a tremendous breadth of experience as both a scholar and military justice practitioner. He also possesses a keen observational and critical eye to the subject of military justice practiced here and abroad.

The book review first provides an overview of Professor Fidell’s book, its organizational set-up, and where it sits in the broader context of military ...


Cybersecurity And The Rights Of The Internet User In France, Jennifer Cross May 2018

Cybersecurity And The Rights Of The Internet User In France, Jennifer Cross

Georgia Journal of International & Comparative Law

No abstract provided.


The School To Deportation Pipeline, Laila L. Hlass May 2018

The School To Deportation Pipeline, Laila L. Hlass

Georgia State University Law Review

The United States immigration regime has a long and sordid history of explicit racism, including limiting citizenship to free whites, excluding Chinese immigrants, deporting massive numbers of Mexican immigrants and U.S. citizens of Mexican ancestry, and implementing a national quotas system preferencing Western Europeans. More subtle bias has seeped into the system through the convergence of the criminal and immigration law regimes.

Immigration enforcement has seen a rise in mass immigrant detention and deportation, bolstered by provocative language casting immigrants as undeserving undesirables: criminals, gang members, and terrorists. Immigrant children, particularly black and Latino boys, are increasingly finding themselves ...


The Failure Of International Law In Palestine, Svetlana Sumina, Steven Gilmore May 2018

The Failure Of International Law In Palestine, Svetlana Sumina, Steven Gilmore

The Scholar: St. Mary's Law Review on Race and Social Justice

Abstract forthcoming