Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 68

Full-Text Articles in National Security Law

Food And Agricultural Security Strategy And Its Implementation Under Public Health Security And Bioterrorism Preparedness And Response Act Of 2002, Vivek V. Nemane May 2021

Food And Agricultural Security Strategy And Its Implementation Under Public Health Security And Bioterrorism Preparedness And Response Act Of 2002, Vivek V. Nemane

Journal of Food Law & Policy

The U.S. agricultural system can be described as concentrated, specialized and industrialized. A typical food chain generally involves agricultural production, storage, processing and distribution. In the U.S. agricultural and food system, most production, distribution and processing is done in a consolidated and centralized manner.


Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion Jan 2021

Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion

Faculty Scholarly Works

Months prior to the 2015 public disclosure of a data breach at the U.S. government’s Office of Personnel and Management (OPM), the Office of the Inspector General for OPM issued a report that identified significant deficiencies and material weaknesses in a number of the agency’s information systems and IT security programs. In response to the 2020 SolarWinds supply chain hack, attributed to Russia, calls are underway for inspectors general to conduct audits and inspections and to review prior inspector general assessments of information systems and vulnerabilities at federal agencies. The use of inspectors general to assess information system vulnerabilities and …


When Can Nations Go To War? Politics And Change In The Un Securtiy System, Charlotte Ku Sep 2019

When Can Nations Go To War? Politics And Change In The Un Securtiy System, Charlotte Ku

Charlotte Ku

In an appreciation of Harold Jacobson written for the American Journal of International Law, the author concluded that following the events of September 11, 2001, we would need the kind of gentle wisdom Harold Jacobson brought to his tasks more than ever. The author also recalled Harold Jacobson's own observation in Networks of Interdependence that his assessment of the global political system was an optimistic, but not a naive one. These qualities of quiet determination to get to the bottom of an issue and of optimism stemmed from a fundamental belief that individuals, armed with information and the opportunity …


The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim Apr 2018

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim

Indiana Law Journal

On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …


The Security And Human Rights Dilemma: An Inquiry Into U.S.-Ethiopia Diplomatic Relations 1991-2012, Seife Ayalew Jan 2018

The Security And Human Rights Dilemma: An Inquiry Into U.S.-Ethiopia Diplomatic Relations 1991-2012, Seife Ayalew

Northwestern Journal of Human Rights

In the post-1991 U.S.-Ethiopian diplomacy, the use of foreign policy as a framework to advance the cause of human rights has faced several challenges rooted in the way human rights is defined and the intricate interests vested in the U.S. foreign policy establishment. This article elucidates the limitations and challenges of diplomatic machinery as a framework for advancing the cause of human rights. First, human rights in the U.S. foreign policy machine have been given a marginal or subordinate place in diplomatic priorities. Second, the Government of Ethiopia’s (GOE) resistance and tough diplomatic measures and Ethiopia’s strategic importance to the …


Contrasting Perspectives And Preemptive Strike: The United States, France, And The War On Terror, Sophie Clavier Nov 2017

Contrasting Perspectives And Preemptive Strike: The United States, France, And The War On Terror, Sophie Clavier

Maine Law Review

A few years ago, Samuel P. Huntington's article in Foreign Affairs, "The Clash of Civilizations?" described a "West vs. the Rest" conflict leading to the assumption of an essentially unified Western civilization settling "[g]lobal political and security issues ... effectively ... by a directorate of the United States, Britain and France" and centered around common core values "using international institutions, military power and economic resources to run the world in ways that will . . . protect Western interests . . . .” Against the West, the specter of disorder and fundamentalism was looming and would precipitate conflicts. This widely …


Unilateral And Multilateral Preventive Self-Defense, Stéphanie Bellier Nov 2017

Unilateral And Multilateral Preventive Self-Defense, Stéphanie Bellier

Maine Law Review

The governing principle of the collective security system created by the United Nations Charter in 19451 is the rule prohibiting the use of force in Article 2(4), which provides that "All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purpose of the United Nations." This rule prohibiting the use of force was considered revolutionary at the time because it transformed into international law ideas which had for centuries, if not millennia, preoccupied the minds of people …


Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law Sep 2017

Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso Aug 2017

Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso

University of Massachusetts Law Review

As a division of the Federal Bureau of Investigation’s National Security Branch, the Terrorist Screening Center maintains the Terrorist Watchlist, a central database for identifying individuals known or suspected to engage in terrorism or terrorist activities. Subsumed under the Terrorist Watchlist is the No Fly List, which prohibits individuals from boarding commercial aircrafts in and out of the United States. Placement on either list presumes named individuals as a potential threat to U.S. national security, yet there is no restriction preventing them from legally purchasing firearms. Following a mass shooting at an Orlando nightclub in June of 2016, which was …


Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick May 2017

Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


Security Clearance Conundrum: The Need For Reform And Judicial Review, Heidi Gilchrist May 2017

Security Clearance Conundrum: The Need For Reform And Judicial Review, Heidi Gilchrist

University of Richmond Law Review

No abstract provided.


Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan Apr 2017

Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan

Penn State Journal of Law & International Affairs

No abstract provided.


A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott Apr 2017

A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott

Penn State Journal of Law & International Affairs

No abstract provided.


The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown Apr 2017

The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown

Penn State Journal of Law & International Affairs

No abstract provided.


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox Mar 2017

"I Want My File": Surveillance Data, Minimization, And Historical Accountability, Douglas Cox

University of Richmond Law Review

No abstract provided.


Keynote Address: The Digital Forevermore, Thomas J. Ridge Mar 2017

Keynote Address: The Digital Forevermore, Thomas J. Ridge

University of Richmond Law Review

No abstract provided.


Issue 3: Table Of Contents Mar 2017

Issue 3: Table Of Contents

University of Richmond Law Review

No abstract provided.


Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks Mar 2017

Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks

University of Richmond Law Review

No abstract provided.


Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein Feb 2017

Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein

Life of the Law School (1993- )

No abstract provided.


Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein Jan 2017

Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein

Law School Blogs

No abstract provided.


Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran Nov 2016

The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran

International Journal of Nuclear Security

In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …


Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky Jun 2016

Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky

Law School Blogs

No abstract provided.


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein Mar 2016

Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein

Life of the Law School (1993- )

No abstract provided.


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


"The Long And Winding Road": Reflections On America's War(S) On Terrorism And Counterterrorism Efforts Post 9/11, Francis J. Larkin Mar 2015

"The Long And Winding Road": Reflections On America's War(S) On Terrorism And Counterterrorism Efforts Post 9/11, Francis J. Larkin

University of Massachusetts Law Review

September 11, 2001 was surely evil incarnate. But out of the shadows and embers of such devilish devastation, going forward, for society to “endure”‖, let alone “prevail”, a “lasting good” must emerge; an enduring immutable and sustainable commitment to peace and non-violence. And, of course, any “lasting good”‖, however utopian or pragmatic would surely require destruction and eradication of terrorism in all of its diverse incarnations; the eradication and destruction of the machinery of terrorism wherever it is found. Long range, it must be the goal, aspiration and belief that out of the seeds and memory of 9/11 there might …