Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in National Security Law

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan Apr 2017

Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan

Penn State Journal of Law & International Affairs

No abstract provided.


A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott Apr 2017

A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott

Penn State Journal of Law & International Affairs

No abstract provided.


The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown Apr 2017

The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown

Penn State Journal of Law & International Affairs

No abstract provided.


Inspection And Seizure Of Seizure Of "Armed And Equipped" Somali Pirates: Lessons From The British And American Anti-Slavery Squadrons (1808-1860), John I. Winn Jan 2013

Inspection And Seizure Of Seizure Of "Armed And Equipped" Somali Pirates: Lessons From The British And American Anti-Slavery Squadrons (1808-1860), John I. Winn

Seattle University Law Review SUpra

No abstract provided.


Regulation Of Imports And Foregn Investment In The United States On National Security Grounds, David Scott Nance, Jessica Wasserman Jan 1990

Regulation Of Imports And Foregn Investment In The United States On National Security Grounds, David Scott Nance, Jessica Wasserman

Michigan Journal of International Law

Traditionally, concerns over the effects of trade and investment on national security have centered upon the transfer of products and technologies with potential military uses. However, national security concerns also arise with respect to the economic and military impact of imports and of foreign acquisition of domestic assets. The United States has a longstanding statute, section 232 of the Trade Expansion Act of 1962, that allows the President to restrict imports of goods on national security grounds. More recently, another statute, popularly referred to as the Exon-Florio Act, provides the President with authority to bar the acquisition of United States …