Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in National Security Law

November Roundtable: Introduction Nov 2008

November Roundtable: Introduction

Human Rights & Human Welfare

An annotation of:

“Foreign Policy Myths Debunked." The Nation. October 6, 2008.


Speak Softly...With Everyone You Can, Todd Landman Nov 2008

Speak Softly...With Everyone You Can, Todd Landman

Human Rights & Human Welfare

From the Monroe Doctrine to the Bush Doctrine, United States foreign policy has been predicated on the assumption that somehow it knows what is best for the rest of the world. Monroe feared a potential encroachment from Russia and meddling in the "American" Hemisphere by the European powers and issued what originally appeared as a modest statement about resistance to intervention by any other country than the United States . Ironically enforced by the British Navy at that time, the Monroe Doctrine went far beyond its modest beginnings to set a precedent for the development of U.S. foreign policy. The …


Human Rights And The 2008 U.S. Presidential Election, Brent J. Steele Nov 2008

Human Rights And The 2008 U.S. Presidential Election, Brent J. Steele

Human Rights & Human Welfare

There has been a vivid tendency this year by the conventional keepers of Washington wisdom to explicate the two presidential candidates' foreign policy views using old frameworks of "hawk" and "dove." Not only is this binary wrong, it fundamentally obscures some rather ironic potentials for how each candidate, if elected president, will focus upon human rights in their foreign policy. McCain's neoconservative view of the world is founded upon the Wilsonian call for democratization-culminating in what he terms a "League of Democracies." To use a concept that Arnold Wolfers first coined, and one which Joshua Muravchik has proffered as well, …


Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko Nov 2008

Icworld: An Mmog-Based Approach To Analysis, Kimberly Gill, David Rolston, Wyatt Wong, Robert Pietrusko

Journal of Strategic Security

Intelligence analysts routinely work with "wicked" problems—critical,time-sensitive problems where analytical errors can lead to catastrophic consequences for the nation's security. In the analyst's world, important decisions are often made quickly, and are made based on consuming, understanding, and piecing together enormous volumes of data. The data is not only voluminous, but often fragmented, subjective, inaccurate and fluid.Why does multi-player on-line gaming (MMOG) technology matter to the IC? Fundamentally, there are two reasons. The first is technological: stripping away the gamelike content, MMOGs are dynamic systems that represent a physical world, where users are presented with (virtual) life-and-death challenges that can …


America As An Ordinary Nation, William F. Felice Nov 2008

America As An Ordinary Nation, William F. Felice

Human Rights & Human Welfare

For decades, scholars of international relations have called attention to the limits of American power. For example, in 1976 Cornel University Press published America as an Ordinary Country: U.S. Foreign Policy and the Future , edited by Richard Rosecrance. As the title indicates, Rosecrance's book analyzed the impact of the economic, military, and foreign policy setbacks of the 1970s on U.S. power. Suddenly the U.S. seemed less the powerful, "indispensible" leader and more the vulnerable, "ordinary" country unable to control external forces lashing the society's economy and foreign policy. These insights led many scholars to call for a reassessment of …


Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler Nov 2008

Research Note: Using The Iterate And Dots Databases, Peter A. Flemming, Edward Mickolus, Todd Sandler

Journal of Strategic Security

For more than three decades, Vinyard Software's two ITERATE (International Terrorism: Attributes of Terrorist Events) datasets have set the standard in events research for terrorism researchers. It has recently been supplemented by the DOTS (Data on Terrorist Subjects) biographies project, which covers all terrorists, supporters, and other individuals mentioned in the ITERATE project.


Books Received Nov 2008

Books Received

Journal of Strategic Security

No abstract provided.


Dividing Up Intelligence Education, Robert Clark, Ph.D Nov 2008

Dividing Up Intelligence Education, Robert Clark, Ph.D

Journal of Strategic Security

At this year's annual conference of the International Association for Intelligence Education (IAFIE) in Monterey, CA, the keynote speaker posed the question, "How much do you need intelligence education outside the beltway?" Which led to a second question discussed during the conference: "What should such education look like?" In short, what should we be teaching in universities? What should we leave to the intelligence community as training? And what could be done in either or both settings? The first question of any educational effort is:What are we preparing students for?


Myths, Reasonable Disagreement, And A League Of Democracies, James Pattison Nov 2008

Myths, Reasonable Disagreement, And A League Of Democracies, James Pattison

Human Rights & Human Welfare

The United States ' election in 2004 was based on a number of foreign policy myths. Three of the most obvious were:

  • The war in Iraq was necessary as a response to the threat of international terrorism. As a result, the world is now a safer place;
  • The institutions of the UN are corrupt and do nothing but restrict American power;
  • Al Qaeda and international terrorism more generally are extremely significant threats to American national security


Strategic Security As A New Academic Discipline, Sheldon Greaves, Ph.D Nov 2008

Strategic Security As A New Academic Discipline, Sheldon Greaves, Ph.D

Journal of Strategic Security

The creation of Henley-Putnam University was an effort to create an academic institution for the purpose of offering degree programs in intelligence management, counterterrorism, and personal protection; subjects that arguably did not exist as academic disciplines when the school was conceived. The experience of two of the co-founders of the school, Nirmalya Bhowmick and Dr. Michael Corcoran, indicated that the training of officers tasked with vital security and intelligence work was carried out by partnering young officers with a training officer to help the new officer learn on the job. The effectiveness of this training depended to a great extent …


Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs Nov 2008

Short Takes: Intelligence-Service Psychology: A German Perspective, Sven Max Litzcke, Helmut Müller-Enbergs

Journal of Strategic Security

To date, four German volumes in the series "Intelligence-Service Psychology" (Nachrichtendienstpsychologie) have been published. These volumes generated interest in both the German and non-German speaking communities. It was therefore decided to translate some of the basic articles of the series into English (Litzcke, Müller-Enbergs & Ungerer, 2008), making them accessible to a wider range of readers. This article contains abbreviated versions of the articles in the book.


Book Reviews, Bart Bechtel, Jeffrey Ahn Nov 2008

Book Reviews, Bart Bechtel, Jeffrey Ahn

Journal of Strategic Security

Fair Play: The Moral Dilemmas of Spying. By James M. Olson.

The Corporate Spy: Industrial Espionage and Counterintelligence inthe Multinational Enterprise with Case Studies (Abridged Version) by Edward M. Roche.


Cover & Front Matter Nov 2008

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Intelligence And Human Rights: A View From Venus, Peter Gill Jan 2008

Intelligence And Human Rights: A View From Venus, Peter Gill

Human Rights & Human Welfare

A review of:

Intelligence and Human Rights in the Era of Global Terrorism. By Steve Tsang (ed.). Westport, Connecticut: Praeger Security International, 2007.

and

War by Other Means: An Insider’s Account of the War on Terror. By John Yoo. New York: Atlantic Monthly Press, 2006.


Conflicts Between The Commander In Chief And Congress: Concurrent Power Over The Conduct Of War, Jules Lobel Jan 2008

Conflicts Between The Commander In Chief And Congress: Concurrent Power Over The Conduct Of War, Jules Lobel

Articles

The Bush Administration argues that the Commander in Chief has exclusive power to decide what military tactics to use to defeat a wartime enemy. The Administration's constitutional position that Congress may not permissibly interfere with these Executive Commander in Chief powers has been heavily criticized, particularly with respect to the Executive power to interrogate prisoners or engage in warrantless wiretapping on American citizens and its argument that Congress cannot limit the Iraq war. Yet, many critics concur in the Administration's starting point - that the President has exclusive authority over battlefield operations.

This article challenges that assumption. It argues that …


A Running Start: Getting “Law Ready” During A Presidential Transition, James E. Baker Jan 2008

A Running Start: Getting “Law Ready” During A Presidential Transition, James E. Baker

Georgetown Law Faculty Publications and Other Works

We are headed for our first wartime Presidential transition in forty years. The good news is that this has prompted uncommon attention to the process of transition. The bad news is that transitions are difficult in the best of circumstances; forewarned does not always equal prepared. The United States handles transitions well on a strategic level. Strategic continuity is found in the Constitution. Transition is also part of the rhythm of government. The intelligence community, for example, has a sound tradition of briefing candidates and Presidents-elect. However, there is tactical vulnerability. An outgoing administration may hesitate to initiate all but …


Torture And The Biopolitics Of Race, Dorothy E. Roberts Jan 2008

Torture And The Biopolitics Of Race, Dorothy E. Roberts

All Faculty Scholarship

No abstract provided.