Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in National Security Law

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion Jan 2021

Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion

Faculty Scholarly Works

Months prior to the 2015 public disclosure of a data breach at the U.S. government’s Office of Personnel and Management (OPM), the Office of the Inspector General for OPM issued a report that identified significant deficiencies and material weaknesses in a number of the agency’s information systems and IT security programs. In response to the 2020 SolarWinds supply chain hack, attributed to Russia, calls are underway for inspectors general to conduct audits and inspections and to review prior inspector general assessments of information systems and vulnerabilities at federal agencies. The use of inspectors general to assess information system vulnerabilities and …


Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law Sep 2017

Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick May 2017

Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein Feb 2017

Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein

Life of the Law School (1993- )

No abstract provided.


Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein Jan 2017

Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein

Law School Blogs

No abstract provided.


Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky Jun 2016

Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky

Law School Blogs

No abstract provided.


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein Mar 2016

Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein

Life of the Law School (1993- )

No abstract provided.


Book Review, Angela Mae Kupenda Jan 2013

Book Review, Angela Mae Kupenda

Journal Articles

LIBERTY & SECURITY, authored by Human Rights Law Professor Conor Gearty, is a book that is relevant and fills a void through the question it explores. Gearty, while admitting that the terms liberty and security are susceptible to a host of meanings, does not seek in this book to define a more precise meaning for these terms. Rather, the book focuses on the “for how many” question (p.2). Gearty asks and answers whether liberty and security are “to be for all or just the few?”


Inspection And Seizure Of Seizure Of "Armed And Equipped" Somali Pirates: Lessons From The British And American Anti-Slavery Squadrons (1808-1860), John I. Winn Jan 2013

Inspection And Seizure Of Seizure Of "Armed And Equipped" Somali Pirates: Lessons From The British And American Anti-Slavery Squadrons (1808-1860), John I. Winn

Seattle University Law Review SUpra

No abstract provided.


Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …


Disappearing Government Information And The Internet's Public Domain, Susan Nevelow Mart Jan 2011

Disappearing Government Information And The Internet's Public Domain, Susan Nevelow Mart

Publications

This article surveys the types and amounts of information that have been removed from the Internet since September 11th. Information has been removed in the name of national security as well as for reasons of seeming political expediency. After discussing the bases of some of the rationales for removing the information, and the legal underpinnings of continued access, the article suggests several forms of advocacy that could be used to return the information to the public's domain.


International Human Rights Law And Security Detention, Douglass Cassel Jan 2009

International Human Rights Law And Security Detention, Douglass Cassel

Journal Articles

This article analyzes the grounds, procedures, and conditions required by International Human Rights Law for preventive detention of suspected terrorists as threats to security. Such detention is generally permitted, provided it is based on grounds and procedures previously established by law; is not arbitrary, discriminatory, or disproportionate; is publicly registered and subject to fair and effective judicial review; and the detainee is not mistreated and is compensated for any unlawful detention. In Europe, however, preventive detention for security purposes is generally not permitted. If allowed at all, it is permitted only when a State in time of national emergency formally …


The Internet's Public Domain: Access To Government Information On The Internet, Susan Nevelow Mart Jan 2009

The Internet's Public Domain: Access To Government Information On The Internet, Susan Nevelow Mart

Publications

This article surveys the types and amounts of information that have been removed from the Internet since September 11th. Information has been removed in the name of national security as well as for reasons of seeming political expediency. After discussing the bases of some of the rationales for removing the information, and the legal underpinnings of continued access, the article suggests several forms of advocacy that could be used to return the information to the public's domain.


Self-Regulation For Safety And Security: Final Minutes Or Finest Hour?, Douglas C. Michael Jan 2006

Self-Regulation For Safety And Security: Final Minutes Or Finest Hour?, Douglas C. Michael

Law Faculty Scholarly Articles

The terrorist attacks of September 11, 2001, and the accounting and auditing crisis later caused by the Enron and Worldcom scandals of that same year, created a great sense of insecurity in many Americans. In this Article, I analyze the federal government's response to crisis. I first define what a crisis is: a sudden, existential threat to which the entity has insufficient resources to respond. I then explain how regulation for safety and security is unique in two aspects: perceptions matter, and the assistance of the regulated entities is essential. I proceed by describing and analyzing the regulatory history and …


Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart Jan 2006

Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart

Publications

Ms. Mart examines the legal bases of the public's right to access government information, reviews the types of information that have recently been removed from the Internet, and analyzes the rationales given for the removals. She suggests that the concerted use of the Freedom of Information Act by public interest groups and their constituents is a possible method of returning the information to the Internet.


Their Liberties, Our Security: Democracy And Double Standards, David Cole Jan 2003

Their Liberties, Our Security: Democracy And Double Standards, David Cole

Georgetown Law Faculty Publications and Other Works

Some maintain that a "double standard" for citizens and noncitizens is perfectly justified. The attacks of September 11 were perpetrated by nineteen Arab noncitizens, and we have reason to believe that other Arab noncitizens are associated with the attackers and will seek to attack again. Citizens, it is said, are presumptively loyal; noncitizens are not. Thus, it is not irrational to focus on Arab noncitizens. Moreover, on a normative level, if citizens and noncitizens were treated identically, citizenship itself might be rendered meaningless. The very essence of war involves the drawing of lines in the sand between citizens of our …


American Exceptionalism And The International Law Of Self-Defense, Mary Ellen O'Connell Jan 2002

American Exceptionalism And The International Law Of Self-Defense, Mary Ellen O'Connell

Journal Articles

Following the September 11th attacks in the United States (U.S.), one could make a case for America's use of force in Afghanistan as a lawful exercise of the right of self-defense. But the proposals to invade Iraq following September 11th cannot be so defended. Those proposals did not concern defending the basic security of the U.S. in the sense that basic security defense is currently understood in the international community. They concerned, rather, defense of a more expansive concept of security, a concept wherein the U.S. need not tolerate antagonistic regimes with the potential to harm U.S. interests. The invasion …