Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (4)
- Human Rights Law (3)
- International Humanitarian Law (3)
- Law and Politics (3)
- Military, War, and Peace (3)
-
- Computer Law (2)
- Criminal Procedure (2)
- Fourth Amendment (2)
- International Law (2)
- Privacy Law (2)
- Public Law and Legal Theory (2)
- Science and Technology Law (2)
- Transnational Law (2)
- Administrative Law (1)
- Comparative and Foreign Law (1)
- Constitutional Law (1)
- Criminal Law (1)
- Defense and Security Studies (1)
- Immigration Law (1)
- Jurisprudence (1)
- Law Enforcement and Corrections (1)
- Law and Society (1)
- Legal History (1)
- Legal Profession (1)
- Public Affairs, Public Policy and Public Administration (1)
- Social and Behavioral Sciences (1)
- Keyword
-
- National security (2)
- United States (2)
- 2001-2009 (1)
- Actionable intelligence (1)
- Administrative Law (1)
-
- Admissible evidence (1)
- Al-Qaeda (1)
- Assassination (1)
- Avatars (1)
- Bagram (1)
- Big data (1)
- Biographic data (1)
- Biometric data (1)
- Body camera (1)
- Books (1)
- Carl Schmitt (1)
- Command and control (1)
- Constitutional Law (1)
- Counterterrorism (1)
- Covert operations (1)
- Criminal procedure (1)
- Cruel (1)
- Cybersecurity education (1)
- Cybersurveillance (1)
- Data fusion (1)
- Data science (1)
- Dataveillance (1)
- Daubert (1)
- Department of Defense (1)
- Digital forensics (1)
- Publication
- File Type
Articles 1 - 12 of 12
Full-Text Articles in National Security Law
The Need To Refocus The U.S. Government's Post-9/11 Counter-Terrorist Financing Strategy Directed At Al Qaeda To Target The Funding Of Isis, Jimmy Gurule
Jimmy Gurule
The Islamic State of Iraq and Syria ("ISIS") is the most deadly and well-funded foreign terrorist organization in the world. There are estimates that ISIS has an annual budget of over $2 billion to finance its goal of establishing a caliphate, or Islamic state, governed by its twisted version of Islamic law.1 Flush with funds, the terror group has acquired and controls large swaths of territory in Syria and Iraq, and the threat it poses extends to Jordan, Saudi Arabia, Egypt, Libya, Yemen, Lebanon, and beyond. 2 While depriving ISIS of funding is a central component of the United States …
The Icc And The Security Council: How Much Support Is There For Ending Impunity?, 26 Ind. Int'l & Comp. L. Rev. 33 (2016), Stuart Ford
Stuart Ford
No abstract provided.
Is Immigration Law National Security Law?, Shoba S. Wadhia
Is Immigration Law National Security Law?, Shoba S. Wadhia
Shoba Sivaprasad Wadhia
The debate around how to keep America safe and welcome newcomers is prominent. In the last year, cities and countries around the world, including Baghdad, Dhaka, Istanbul, Paris, Beirut, Mali and inside the United States - have been vulnerable to terrorist attacks and human tragedy. Meanwhile, the world faces the largest refugee crises since the Second World War. This article is based on remarks delivered at Emory Law Journal’s annual Thrower Symposium on February 11, 2016. It explores how national security concerns have shaped recent immigration policy in the Executive Branch, Congress and the states and the moral, legal and …
The Implausibility Of Secrecy, Mark Fenster
The Implausibility Of Secrecy, Mark Fenster
Mark Fenster
Government secrecy frequently fails. Despite the executive branch’s obsessive hoarding of certain kinds of documents and its constitutional authority to do so, recent high-profile events — among them the WikiLeaks episode, the Obama administration’s infamous leak prosecutions, and the widespread disclosure by high-level officials of flattering confidential information to sympathetic reporters — undercut the image of a state that can classify and control its information. The effort to control government information requires human, bureaucratic, technological, and textual mechanisms that regularly founder or collapse in an administrative state, sometimes immediately and sometimes after an interval. Leaks, mistakes, and open sources all …
The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler
The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler
Gary C. Kessler
"The changing face of infowar • The Advanced Persistent Threat • Examples of recent cyber attacks • Mitigation and preparation • Formalizing the response • The role(s) of education"--Overview
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Gary C. Kessler
"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview
The Command And Control Of United Nations Forces In The Era Of "Peace Enforcement", James W. Houck
The Command And Control Of United Nations Forces In The Era Of "Peace Enforcement", James W. Houck
James Houck
This Article explores how concerns regarding the United Nations' authority to make political, strategic, and operational decisions that comprise the right to command and control UN forces might be reconciled within the framework of the United Nations Charter to create a contemporary and more enduring regime for the command and control of United Nations forces. As Part II demonstrates, command and control issues are not new to the United Nations; indeed, in 1945 the signatories to the United Nations Charter created a model for the command and control of United Nations forces. While the cold war ensured that this model …
Politically Motivated Bar Discipline, James E. Moliterno
Politically Motivated Bar Discipline, James E. Moliterno
James E. Moliterno
Bar discipline and admission denial have a century-long history of misuse in times of national crisis and upheaval. The terror war is such a time, and the threat of bar discipline has once again become an overreaction to justifiable fear and turmoil. Political misuse of bar machinery is characterized by its setting in the midst of turmoil, by its target, and by its lack of merit. The current instance of politically motivated bar discipline bears the marks of its historical antecedents.
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Margaret Hu
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
Targeted Killing: A Legal And Political History, Markus Gunneflo
Targeted Killing: A Legal And Political History, Markus Gunneflo
Markus Gunneflo
Looking beyond the current debate’s preoccupation with the situations of insecurity of the second intifada and 9/11, this book reveals how targeted killing is intimately embedded in both Israeli and US statecraft and in the problematic relation of sovereign authority and lawful violence underpinning the modern state system. The book details the legal and political issues raised in targeted killing as it has emerged in practice including questions of domestic constitutional authority, the norms on the use of force in international law, the law of targeting and human rights. The distinctiveness of Israeli and US targeted killing is accounted for …
The Consequences Today Of The United States' Brutal Post-9/11 Interrogation Techniques, Peter J. Honigsberg
The Consequences Today Of The United States' Brutal Post-9/11 Interrogation Techniques, Peter J. Honigsberg
Peter J Honigsberg
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Stephen E Henderson