Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2016

Discipline
Keyword
Publication
File Type

Articles 1 - 12 of 12

Full-Text Articles in National Security Law

The Need To Refocus The U.S. Government's Post-9/11 Counter-Terrorist Financing Strategy Directed At Al Qaeda To Target The Funding Of Isis, Jimmy Gurule Oct 2016

The Need To Refocus The U.S. Government's Post-9/11 Counter-Terrorist Financing Strategy Directed At Al Qaeda To Target The Funding Of Isis, Jimmy Gurule

Jimmy Gurule

The Islamic State of Iraq and Syria ("ISIS") is the most deadly and well-funded foreign terrorist organization in the world. There are estimates that ISIS has an annual budget of over $2 billion to finance its goal of establishing a caliphate, or Islamic state, governed by its twisted version of Islamic law.1 Flush with funds, the terror group has acquired and controls large swaths of territory in Syria and Iraq, and the threat it poses extends to Jordan, Saudi Arabia, Egypt, Libya, Yemen, Lebanon, and beyond. 2 While depriving ISIS of funding is a central component of the United States …


The Icc And The Security Council: How Much Support Is There For Ending Impunity?, 26 Ind. Int'l & Comp. L. Rev. 33 (2016), Stuart Ford Sep 2016

The Icc And The Security Council: How Much Support Is There For Ending Impunity?, 26 Ind. Int'l & Comp. L. Rev. 33 (2016), Stuart Ford

Stuart Ford

No abstract provided.


Is Immigration Law National Security Law?, Shoba S. Wadhia Aug 2016

Is Immigration Law National Security Law?, Shoba S. Wadhia

Shoba Sivaprasad Wadhia

The debate around how to keep America safe and welcome newcomers is prominent. In the last year, cities and countries around the world, including Baghdad, Dhaka, Istanbul, Paris, Beirut, Mali and inside the United States - have been vulnerable to terrorist attacks and human tragedy. Meanwhile, the world faces the largest refugee crises since the Second World War. This article is based on remarks delivered at Emory Law Journal’s annual Thrower Symposium on February 11, 2016. It explores how national security concerns have shaped recent immigration policy in the Executive Branch, Congress and the states and the moral, legal and …


The Implausibility Of Secrecy, Mark Fenster Apr 2016

The Implausibility Of Secrecy, Mark Fenster

Mark Fenster

Government secrecy frequently fails. Despite the executive branch’s obsessive hoarding of certain kinds of documents and its constitutional authority to do so, recent high-profile events — among them the WikiLeaks episode, the Obama administration’s infamous leak prosecutions, and the widespread disclosure by high-level officials of flattering confidential information to sympathetic reporters — undercut the image of a state that can classify and control its information. The effort to control government information requires human, bureaucratic, technological, and textual mechanisms that regularly founder or collapse in an administrative state, sometimes immediately and sometimes after an interval. Leaks, mistakes, and open sources all …


The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler Mar 2016

The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler

Gary C. Kessler

"The changing face of infowar • The Advanced Persistent Threat • Examples of recent cyber attacks • Mitigation and preparation • Formalizing the response • The role(s) of education"--Overview


Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler Mar 2016

Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler

Gary C. Kessler

"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview


The Command And Control Of United Nations Forces In The Era Of "Peace Enforcement", James W. Houck Feb 2016

The Command And Control Of United Nations Forces In The Era Of "Peace Enforcement", James W. Houck

James Houck

This Article explores how concerns regarding the United Nations' authority to make political, strategic, and operational decisions that comprise the right to command and control UN forces might be reconciled within the framework of the United Nations Charter to create a contemporary and more enduring regime for the command and control of United Nations forces. As Part II demonstrates, command and control issues are not new to the United Nations; indeed, in 1945 the signatories to the United Nations Charter created a model for the command and control of United Nations forces. While the cold war ensured that this model …


Politically Motivated Bar Discipline, James E. Moliterno Feb 2016

Politically Motivated Bar Discipline, James E. Moliterno

James E. Moliterno

Bar discipline and admission denial have a century-long history of misuse in times of national crisis and upheaval. The terror war is such a time, and the threat of bar discipline has once again become an overreaction to justifiable fear and turmoil. Political misuse of bar machinery is characterized by its setting in the midst of turmoil, by its target, and by its lack of merit. The current instance of politically motivated bar discipline bears the marks of its historical antecedents.


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Feb 2016

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Margaret Hu

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Targeted Killing: A Legal And Political History, Markus Gunneflo Dec 2015

Targeted Killing: A Legal And Political History, Markus Gunneflo

Markus Gunneflo

Looking beyond the current debate’s preoccupation with the situations of insecurity of the second intifada and 9/11, this book reveals how targeted killing is intimately embedded in both Israeli and US statecraft and in the problematic relation of sovereign authority and lawful violence underpinning the modern state system. The book details the legal and political issues raised in targeted killing as it has emerged in practice including questions of domestic constitutional authority, the norms on the use of force in international law, the law of targeting and human rights. The distinctiveness of Israeli and US targeted killing is accounted for …


The Consequences Today Of The United States' Brutal Post-9/11 Interrogation Techniques, Peter J. Honigsberg Dec 2015

The Consequences Today Of The United States' Brutal Post-9/11 Interrogation Techniques, Peter J. Honigsberg

Peter J Honigsberg

Commentators and researchers have written on the harsh and unlawful tactics that military interrogators employed to obtain actionable intelligence from suspected terrorists following the attacks on September 11, 2001. However, no one has painted the picture of these interrogations through the words of identified and named interrogators. This article does that, by focusing on the words and unique stories of five interrogators. The article then explores the unintended consequences that are still with us today because of the military's enhanced interrogation techniques. Much of the information in this article is not found to this detail anywhere else in the literature, …


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson Dec 2015

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible.  Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records.  And those big data records not only store our past, but thanks to data mining they are in many circumstances eerily good at predicting our future.  So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond?  How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology?  Is it meaningfully different …