Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- National Security Law (3202)
- Military, War, and Peace (1449)
- Social and Behavioral Sciences (927)
- Public Affairs, Public Policy and Public Administration (827)
- Defense and Security Studies (758)
-
- International Law (703)
- Arts and Humanities (528)
- History (488)
- Constitutional Law (474)
- Military History (456)
- Human Rights Law (355)
- President/Executive Department (311)
- Comparative and Foreign Law (293)
- Law and Politics (289)
- Criminal Law (267)
- Political Science (244)
- Legislation (233)
- Privacy Law (232)
- Computer Law (225)
- Science and Technology Law (225)
- Law and Society (224)
- International Humanitarian Law (223)
- Immigration Law (222)
- Civil Rights and Discrimination (218)
- Public Affairs (211)
- Internet Law (201)
- Business (190)
- Transnational Law (189)
- Criminal Procedure (182)
- Institution
-
- US Army War College (440)
- University of Michigan Law School (166)
- Georgetown University Law Center (132)
- Selected Works (122)
- University of Miami Law School (118)
-
- University of South Florida (114)
- Seattle University School of Law (110)
- Embry-Riddle Aeronautical University (102)
- Mitchell Hamline School of Law (100)
- U.S. Naval War College (87)
- American University Washington College of Law (84)
- Roger Williams University (84)
- University of Georgia School of Law (82)
- Colby College (80)
- Maurer School of Law: Indiana University (63)
- William & Mary Law School (50)
- University of Tennessee, Knoxville (47)
- Columbia Law School (46)
- Duke Law (46)
- University of Pennsylvania Carey Law School (38)
- SelectedWorks (35)
- University of Colorado Law School (35)
- Brigham Young University Law School (34)
- Brooklyn Law School (34)
- Pace University (33)
- UIC School of Law (33)
- University of Maryland Francis King Carey School of Law (33)
- University of Nebraska - Lincoln (33)
- University of Richmond (33)
- University of Denver (31)
- Keyword
-
- Terrorism (324)
- National security (314)
- National Security (119)
- United States (80)
- International law (77)
-
- Counterterrorism (74)
- Surveillance (69)
- Security (68)
- China (67)
- Privacy (67)
- Human rights (64)
- Russia (62)
- 9/11 (59)
- War on terror (57)
- Afghanistan (55)
- War (54)
- Law of Armed Conflict (52)
- Immigration (50)
- Cybersecurity (48)
- Torture (48)
- Executive power (46)
- Detention (45)
- Military (45)
- United Nations (45)
- Self-defense (44)
- Treaties (44)
- Espionage (43)
- NATO (43)
- Parameters (43)
- Law of the Sea (42)
- Publication Year
- Publication
-
- The US Army War College Quarterly: Parameters (437)
- Faculty Scholarship (138)
- Georgetown Law Faculty Publications and Other Works (123)
- Journal of Strategic Security (108)
- William Mitchell Law Review (91)
-
- International Law Studies (87)
- University of Miami National Security & Armed Conflict Law Review (83)
- Security Files (80)
- Seattle University Law Review (77)
- Annual ADFSL Conference on Digital Forensics, Security and Law (74)
- Georgia Journal of International & Comparative Law (74)
- Michigan Journal of International Law (61)
- All Faculty Scholarship (58)
- Law Faculty Scholarship (58)
- Michigan Law Review (55)
- International Journal of Nuclear Security (46)
- Articles (43)
- American University National Security Law Brief (37)
- Publications (34)
- Faculty Publications (32)
- Human Rights & Human Welfare (31)
- Articles by Maurer Faculty (29)
- Journal Articles (27)
- Space, Cyber, and Telecommunications Law Program: Faculty Publications (27)
- University of Richmond Law Review (27)
- Seattle Journal for Social Justice (26)
- University of Miami Law Review (26)
- UIC Law Review (22)
- Articles in Law Reviews & Other Academic Journals (20)
- UF Law Faculty Publications (18)
- Publication Type
Articles 1951 - 1980 of 3203
Full-Text Articles in National Security Law
The Internet, New Media, And The Evolution Of Insurgency, Steven Metz
The Internet, New Media, And The Evolution Of Insurgency, Steven Metz
The US Army War College Quarterly: Parameters
No abstract provided.
From The Archives, Usawc Press
From The Archives, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
American Landpower And The Middle East Of 2030, Michael R. Eastman
American Landpower And The Middle East Of 2030, Michael R. Eastman
The US Army War College Quarterly: Parameters
No abstract provided.
Coin Is Dead—Long Live Transformation, Cora Ford, Patrick Rose, Howard Body
Coin Is Dead—Long Live Transformation, Cora Ford, Patrick Rose, Howard Body
The US Army War College Quarterly: Parameters
No abstract provided.
Editor's Shelf, Usawc Press
Editor's Shelf, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
The Afghanistan Experience: Democratization By Force, Cora Sol Goldstein
The Afghanistan Experience: Democratization By Force, Cora Sol Goldstein
The US Army War College Quarterly: Parameters
No abstract provided.
Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay
Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay
Security Studies & International Affairs - Daytona Beach
This article analyzes the phenomenon of homeland security through the development of four conceptual lenses that were created out of the existing literatures in criminal justice, public administration, organization behavior, risk management, international relations, and the overlap between them. Using terrorism as a proxy for the homeland security enterprise, these conceptual lenses include: (1) homeland security as a criminal justice problem which views terrorism as a crime; (2) homeland security as a international relations problem which views terrorism as a war; (3) homeland security as an organization design problem which views terrorism as a network of sub-state transnational actors; and …
“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez
“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez
IP Theory
No abstract provided.
National Security Policy Constraints On Technological Innovation: A Case Study Of The Invention Secrecy Act Of 1951, Dorothy K. Mcallen
National Security Policy Constraints On Technological Innovation: A Case Study Of The Invention Secrecy Act Of 1951, Dorothy K. Mcallen
Master's Theses and Doctoral Dissertations
Recent studies indicate that the United States is trailing other countries in technological innovation and competitiveness. This case study examined national security policy constraints on technological innovation, specifically the Invention Secrecy Act. It focused on the social constructs of collaboration and interdisciplinary knowledge in the aerospace industry. The methodology included historical research, data collection, and semi-structured interviews with experts from academia, general industry, government and public policy, aerospace/defense industry, and federal government. The results of the study suggested that since World War II, national security policies have not been clearly and consistently defined, interpreted, or implemented. This lack of clarity …
Pnr In 2011: Recalling Ten Years Of Transatlantic Cooperation In Pnr Information, Valentin M. Pfisterer
Pnr In 2011: Recalling Ten Years Of Transatlantic Cooperation In Pnr Information, Valentin M. Pfisterer
University of Miami National Security & Armed Conflict Law Review
In Fall 2011, U.S. and EU negotiators agreed on new parameters for the collection, processing, use, storage and crossborder transfer of Passenger Name Record (PNR) data. 2011 also marks the tenth anniversary of the September 11, 2001 terrorist attacks on the World Trade Center in New York City and the Pentagon in Washington D.C., which provides the historic reason for the cooperation in this area. These two events thus provide a timely basis and background against which to review the ten year history of the cooperation between the U.S. and the EU in PNR information management.
This article maps the …
Masthead
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Front Matter And Table Of Contents
Front Matter And Table Of Contents
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
How Puppet Masters Create Genocide: A Study In The State-Sponsored Killings In Rwanda And Cambodia, Joel H. Feigenbaum
How Puppet Masters Create Genocide: A Study In The State-Sponsored Killings In Rwanda And Cambodia, Joel H. Feigenbaum
University of Miami National Security & Armed Conflict Law Review
This paper calls on the United States to assess where its true interests lie in evaluating genocide and mass killings. Through an examination of the social and political factors which were paramount in bringing about the atrocities in Cambodia in the late 1970s and Rwanda in the mid-1990s, the U.S. is urged to take heed of the tried-and-true methods used by ruthless regimes throughout history in bringing about the destruction of their own citizenry. Consideration of the psychological imperatives necessary for ordinary men or women to depart from the standard boundaries of civilized society and butcher their neighbors and countrymen …
Silent Partners: Private Forces, Mercenaries, And International Humanitarian Law In The 21st Century, Steven R. Kochheiser
Silent Partners: Private Forces, Mercenaries, And International Humanitarian Law In The 21st Century, Steven R. Kochheiser
University of Miami National Security & Armed Conflict Law Review
In response to gritty accounts of firefights involving private forces like Blackwater in Iraq and Afghanistan, many legal scholars have addressed the rising use of private forces—or mercenaries—in the 21st century under international law. Remarkably, only a few have attempted to understand why these forces are so objectionable. This is not a new problem. Historically, attempts to control private forces by bringing them under international law have been utterly ineffective, such as Article 47 of Additional Protocol II to the Geneva Conventions. In Silent Partners, I propose utilizing the norm against mercenary use as a theoretical framework to understand at …
Weak Loyalties: How The Rule Of Law Prevents Coups D’État And Generates Long-Term Political Stability, Ivan Perkins
Weak Loyalties: How The Rule Of Law Prevents Coups D’État And Generates Long-Term Political Stability, Ivan Perkins
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Who Decides On Security?, Aziz Rana
Who Decides On Security?, Aziz Rana
Cornell Law Faculty Publications
Despite over six decades of reform initiatives, the overwhelming drift of security arrangements in the United States has been toward greater—not less— executive centralization and discretion. This Article explores why efforts to curb presidential prerogative have failed so consistently. It argues that while constitutional scholars have overwhelmingly focused their attention on procedural solutions, the underlying reason for the growth of emergency powers is ultimately political rather than purely legal. In particular, scholars have ignored how the basic meaning of "security" has itself shifted dramatically since World War II and the beginning of the Cold War in line with changing ideas …
War Without Violence: Leveraging The Arab Spring To Win The War On Terrorism, Pat Proctor
War Without Violence: Leveraging The Arab Spring To Win The War On Terrorism, Pat Proctor
Journal of Strategic Security
After a decade of war, the United States has failed to eradicate the threat of salafist jihadism. No matter how hard it tries, the United States cannot kill its way to victory in the war on terrorism. Sweeping changes across the Middle East—dubbed the "Arab Spring" by the media—have presented the West with a unique opportunity to pursue an alternative approach. Rather than engaging in war (politics through violence), the United States should engage in mass politics (war without violence) to compel the Arab world to reject the salafist jihadism idea. This article proposes a strategy calibrated to defeat international …
The Youth Bulge In Egypt: An Intersection Of Demographics, Security, And The Arab Spring, Daniel Lagraffe
The Youth Bulge In Egypt: An Intersection Of Demographics, Security, And The Arab Spring, Daniel Lagraffe
Journal of Strategic Security
During the Arab Spring, Egyptians revolted against decades of poor governance and failed institutions. A wide range of grievances contributed to the eventual fall of the Mubarak regime, and most of these grievances were influenced by the demographic composition of the Egyptian population. This paper argues that the youth bulge in Egypt played a major role in the political transition and as such serves as the prime example of the intersection of demographics, security, and the Arab Spring.
The Impact Of The Arab Spring On Islamist Strategies, Ioana E. Matesan
The Impact Of The Arab Spring On Islamist Strategies, Ioana E. Matesan
Journal of Strategic Security
The revolutions in Tunisia and Egypt created a contagion effect that inspired a series of uprisings by sending two signals: first, that even entrenched authoritarian regimes are vulnerable; and second, that nonviolent tactics can be effective in bringing about dramatic political changes. Subsequent developments, especially in Libya and Syria, convoluted these messages. Nonetheless, the political openings and the electoral victory of Islamists in Egypt and Tunisia continue to send the signal to many Islamist opposition groups that nonviolent means and participation in politics can be effective ways to produce political change. The chance of gaining power through electoral means can …
The Ferrini Doctrine: Abrogating State Immunity From Civil Suit For Jus Cogens Violations, Natasha Marusja Saputo
The Ferrini Doctrine: Abrogating State Immunity From Civil Suit For Jus Cogens Violations, Natasha Marusja Saputo
University of Miami National Security & Armed Conflict Law Review
Article 10 of the Italian Constitution incorporates generally recognized principles of international law. Thus, State immunity from civil suit in the domestic courts of another State—a principle generally recognized in international law—would apply in Italy. However, the protection of fundamental human rights is another generally recognized principle in international law and the ostensible conflict between these two principles has resulted in a series of controversial rulings issued by the Italian Court of Cassation. These rulings allow for the abrogation of State immunity from civil suit in the domestic courts of another State for alleged violations of jus cogens or peremptory …
Reevaluating Itar: A Holistic Approach To Regaining Critical Market Share While Simultaneously Attaining Robust National Security, Justin Levine
Reevaluating Itar: A Holistic Approach To Regaining Critical Market Share While Simultaneously Attaining Robust National Security, Justin Levine
University of Miami National Security & Armed Conflict Law Review
This note considers the application of the International Traffic and Arms Regulations (“ITAR”) framework and proposes statutory and policy modifications to promote both national security and industry growth. ITAR is the regulatory framework that controls the export of munitions and defense technologies from the United States. However, as applied, free trade is now grossly over-regulated to such an extent that both significant market share and industry opportunity have been lost and national security itself has simultaneously been threatened. Due to heavy restrictions, many previous industry partners are now looking elsewhere for trade and systematically avoiding the United States for inclusion …
Major League Security: Overcoming Legal Challenges Of Sporting Event Security Systems, Jorge Martinez
Major League Security: Overcoming Legal Challenges Of Sporting Event Security Systems, Jorge Martinez
University of Miami National Security & Armed Conflict Law Review
This article will discuss emerging threats to major sporting events and suggest methods to defend fans and athletes through strengthening security systems and procedures. One problem with strengthening security systems, however, is that in many cases, increased security means less personal privacy. This article will briefly review security measures that have traditionally been in place, juxtapose newly developed security measures, assess the effectiveness and constitutionality of each measure, and propose a working security system to be used at such events. Ultimately, an ideal security system of the future will have to incorporate developments in various fields and will take time …
Habeas Corpus Outside U.S. Territory: Omar V. Geren And Its Effects On Americans Abroad, John Wright
Habeas Corpus Outside U.S. Territory: Omar V. Geren And Its Effects On Americans Abroad, John Wright
University of Miami National Security & Armed Conflict Law Review
The contention between habeas corpus rights and national security interests has been ongoing since the ratification of the U.S. Constitution. History proves that this relationship becomes especially precarious during times of conflict, from the U.S. Civil War and continuing through the War on Terrorism, which began in 2001.
This paper focuses on one of the most recent limitations placed on the right of habeas corpus as determined by the federal judiciary: that a writ of habeas corpus will not stay the transfer of a U.S. citizen to a foreign sovereign’s authorities to face charges for alleged crimes committed within that …
Revisiting "Special Needs" Theory Via Airport Searches, Alexander A. Reinert
Revisiting "Special Needs" Theory Via Airport Searches, Alexander A. Reinert
Articles
Controversy has raged since the Transportation Security Administration (TSA) introduced Advanced Imaging Technology, capable of producing detailed images of travelers' bodies, and "enhanced" pat frisks as part of everyday airport travel. In the face of challenges in the courts and in public discourse, the TSA has justified the heightened security measures as a necessary means to prevent terrorist attacks. The purpose of this Essay is to situate the Fourth Amendment implications of the new regime within a broader historical context. Most germane, after the Federal Aviation Administration (FAA) introduced sweeping new screening of air travelers in the 1960s and 1970s …
Learning From Libya, Acting In Syria, Caitlin A. Buckley
Learning From Libya, Acting In Syria, Caitlin A. Buckley
Journal of Strategic Security
The international community has reached an impasse. The violence committed by Syrian President Assad's government against opposition forces, who have been calling for democratic reform, regime change, and expanded rights, has necessitated a response from the international community. This article explores various ways the international community could respond to the crisis in Syria and the consequences of each approach. It compares the current calamity in Syria to the crisis in Libya and examines the international community's response to the violence perpetrated by Qaddafi's regime. It further analyzes reports, primarily from the UN and news sources, about the ongoing predicament in …
Libya And Resolution 1973: The Law Of Politics, Monica Naime
Libya And Resolution 1973: The Law Of Politics, Monica Naime
Journal of Strategic Security
This paper analyzes recent developments in the intervention in Libya from the perspective of international relations and international law. The evidence suggests that states decided to intervene in Libya prior to sanction from the United Nations Security Council's Resolution 1973. The implication from the Libyan example is that politics was the impetus for the formulation and implementation of law, and not the other way around. Law "happens" in a context, and this context is shaped and bounded by international politics. This article is intended to invigorate further research into how international politics influences the creation, interpretation, and application of international …
Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole
Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole
Georgetown Law Faculty Publications and Other Works
Aziz Rana’s account of the takeover of American national security by experts, and of the public’s acceptance of that state of affairs, offers an important and novel perspective on what ails us in national security today. In this Comment, I suggest that while Rana is correct to identify our deference to experts as a central aspect of the problem, the problem is more complicated. First, the phenomenon of elite control over foreign and security policy questions is not new, but likely dates back to the founding—when elites ruled not based on expertise but on the basis of status, class, and …
Occupy Wall Street And The U.S. Army's 82nd Airborne Division: A Hypothetical Examination Of The Slippery Slope Of Military Intervention During Civil Disturbance, Mckay Smith
McKay Smith
Throughout 2011, the world was an incredibly angry place. The global economy was in disarray. The streets of Tunisia, Egypt, Libya, and Syria had erupted in unprecedented violence. While Americans watched events spiral out of control abroad, a new movement was taking shape domestically. The Occupy movement is a self-described, nonpartisan protest movement targeting economic injustice and social inequality. At its core, however, many domestic protestors also vocally deride the current state of U.S. politics. This article analyzes the Army’s authority to collect information in support of domestic operations, particularly operations aimed at quelling civil disturbance. Historically, the use of …
The Nseers Effect: A Decade Of Racial Profiling, Fear, And Secrecy, Penn State Law Immigrants' Rights Clinic, Rights Working Group
The Nseers Effect: A Decade Of Racial Profiling, Fear, And Secrecy, Penn State Law Immigrants' Rights Clinic, Rights Working Group
Center for Immigrants' Rights Clinic Publications
n the wake of the tragic attacks of September 11, 2011, the landscape of immigration law and policy in the United States changed dramatically as the government scrambled to create counterterrorism programs to respond to potential national security threats. One program is the National Security Entry-Exit Registration System (NSEERS) or "special registration" that was initiated by the Department of Justice in 2002 and inherited by the Department of Homeland Security in 2003. NSEERS served as a tool that allowed the government to systematically target Arabs, Middle Easterners, Muslims, and South Asians from designated countries for advanced scrutiny. ...The purpose of …