Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- National Security Law (3202)
- Military, War, and Peace (1449)
- Social and Behavioral Sciences (927)
- Public Affairs, Public Policy and Public Administration (827)
- Defense and Security Studies (758)
-
- International Law (703)
- Arts and Humanities (528)
- History (488)
- Constitutional Law (474)
- Military History (456)
- Human Rights Law (355)
- President/Executive Department (311)
- Comparative and Foreign Law (293)
- Law and Politics (289)
- Criminal Law (267)
- Political Science (244)
- Legislation (233)
- Privacy Law (231)
- Computer Law (225)
- Law and Society (225)
- Science and Technology Law (225)
- International Humanitarian Law (223)
- Immigration Law (222)
- Civil Rights and Discrimination (218)
- Public Affairs (211)
- Internet Law (201)
- Business (190)
- Transnational Law (189)
- Criminal Procedure (182)
- Institution
-
- US Army War College (440)
- University of Michigan Law School (166)
- Georgetown University Law Center (132)
- Selected Works (122)
- University of Miami Law School (119)
-
- University of South Florida (114)
- Seattle University School of Law (110)
- Embry-Riddle Aeronautical University (102)
- Mitchell Hamline School of Law (100)
- U.S. Naval War College (87)
- American University Washington College of Law (84)
- Roger Williams University (84)
- University of Georgia School of Law (82)
- Colby College (80)
- Maurer School of Law: Indiana University (63)
- William & Mary Law School (50)
- University of Tennessee, Knoxville (47)
- Columbia Law School (46)
- Duke Law (46)
- University of Pennsylvania Carey Law School (38)
- SelectedWorks (35)
- University of Colorado Law School (35)
- Brigham Young University Law School (34)
- Brooklyn Law School (34)
- Pace University (33)
- UIC School of Law (33)
- University of Maryland Francis King Carey School of Law (33)
- University of Nebraska - Lincoln (33)
- University of Richmond (33)
- University of Denver (31)
- Keyword
-
- Terrorism (324)
- National security (314)
- National Security (119)
- United States (80)
- International law (77)
-
- Counterterrorism (74)
- Surveillance (69)
- Security (68)
- China (67)
- Privacy (67)
- Human rights (64)
- Russia (62)
- 9/11 (59)
- War on terror (57)
- Afghanistan (55)
- War (54)
- Law of Armed Conflict (52)
- Immigration (50)
- Cybersecurity (48)
- Torture (48)
- Executive power (46)
- Detention (45)
- Military (45)
- United Nations (45)
- Self-defense (44)
- Treaties (44)
- Espionage (43)
- NATO (43)
- Parameters (43)
- Law of the Sea (42)
- Publication Year
- Publication
-
- The US Army War College Quarterly: Parameters (437)
- Faculty Scholarship (138)
- Georgetown Law Faculty Publications and Other Works (123)
- Journal of Strategic Security (108)
- William Mitchell Law Review (91)
-
- International Law Studies (87)
- University of Miami National Security & Armed Conflict Law Review (83)
- Security Files (80)
- Seattle University Law Review (77)
- Annual ADFSL Conference on Digital Forensics, Security and Law (74)
- Georgia Journal of International & Comparative Law (74)
- Michigan Journal of International Law (61)
- All Faculty Scholarship (58)
- Law Faculty Scholarship (58)
- Michigan Law Review (55)
- International Journal of Nuclear Security (46)
- Articles (43)
- American University National Security Law Brief (37)
- Publications (34)
- Faculty Publications (32)
- Human Rights & Human Welfare (31)
- Articles by Maurer Faculty (29)
- Journal Articles (27)
- Space, Cyber, and Telecommunications Law Program: Faculty Publications (27)
- University of Miami Law Review (27)
- University of Richmond Law Review (27)
- Seattle Journal for Social Justice (26)
- UIC Law Review (22)
- Articles in Law Reviews & Other Academic Journals (20)
- UF Law Faculty Publications (18)
- Publication Type
Articles 2011 - 2040 of 3203
Full-Text Articles in National Security Law
The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler
The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler
Security Studies & International Affairs - Daytona Beach
"The changing face of infowar • The Advanced Persistent Threat • Examples of recent cyber attacks • Mitigation and preparation • Formalizing the response • The role(s) of education"--Overview
The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler
The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler
Applied Aviation Sciences - Daytona Beach
No abstract provided.
Sharing Secrets: Examining Deferred Action And Transparency In Immigration Law, Shoba Sivaprasad Wadhia
Sharing Secrets: Examining Deferred Action And Transparency In Immigration Law, Shoba Sivaprasad Wadhia
The University of New Hampshire Law Review
[Excerpt] “This Article is about deferred action and transparency in related immigration cases falling under the jurisdiction of the Department of Homeland Security (DHS). While scholars from other genres have written extensively on the topic of prosecutorial discretion, the subject is largely absent from immigration scholarship, with the exception of early research conducted by Leon Wildes in the late 1970s and early 2000s, and a law review article I published in 2010 outlining the origins of prosecutorial discretion in immigration law and related lessons that can be drawn from administrative law and criminal law. That article ends with specific recommendations …
Mill, Holmes, Brandeis And A True Threat To Brandenburg, Mark Strasser
Mill, Holmes, Brandeis And A True Threat To Brandenburg, Mark Strasser
Brigham Young University Journal of Public Law
No abstract provided.
Be Careful What You Wish For: Changing Doctrines, Changing Technologies And The Lower Cost Of War, Rosa Brooks
Be Careful What You Wish For: Changing Doctrines, Changing Technologies And The Lower Cost Of War, Rosa Brooks
Georgetown Law Faculty Publications and Other Works
The collective security structure created by the U.N. Charter is becoming shakier than ever, and two recent trends pose particular challenges to Charter rules on the use of force. The first trend involves a normative shift in understandings of state sovereignty, and the second trend involves improvements in technology--specifically, the rapid evolution of unmanned aerial vehicles, precision weapons, and surveillance technologies. Each trend on its own raises difficult issues. Together, they further call into question international law’s ability to meaningfully constrain the use of force by states.
The Assault Of Jamie Leigh Jones: How One Woman's Horror Story Is Changing Arbitration In America, Jeffrey Adams
The Assault Of Jamie Leigh Jones: How One Woman's Horror Story Is Changing Arbitration In America, Jeffrey Adams
Pepperdine Dispute Resolution Law Journal
This article examines Jones v. Halliburton Co., the "Al Franken Amendment" to the 2010 U.S. Defense Department Budget (Franken Amendment) that was created in response to Jones, and the impact that both could have on mandatory arbitration clauses in employment contracts in the future. Part II recounts the troubling events that led to Jones and the inclusion of the Franken Amendment in the 2010 Defense Department Budget. Part III details the arguments made for and against the inclusion of the Franken Amendment. Part IV analyzes the impact that the Franken Amendment could have on mandatory arbitration clauses in contacts in …
The Regulation Of Extremist Speech In The Era Of Mass Digital Communications: Is Brandenburg Tolerance Obsolete In The Terrorist Era?, Nadine Strossen
The Regulation Of Extremist Speech In The Era Of Mass Digital Communications: Is Brandenburg Tolerance Obsolete In The Terrorist Era?, Nadine Strossen
Pepperdine Law Review
No abstract provided.
The Muted Rise Of The Silent Witness Rule In National Security Litigation: The Eastern District Of Virginia's Answer To The Fight Over Classified Information At Trial, Jonathan M. Lamb
Pepperdine Law Review
The state secrets problem is emblematic of a judicial issue which is not confined to the civil cases in which the privilege is asserted - the tension between the government's interest in protecting classified information and society's interest in justice by resolution on the merits. The United States must be allowed to prosecute terrorists, conspirators, and enemies by using classified information as evidence; but how may the government act as a civil defendant without invoking the state secrets privilege to dismiss actions before trial (or pre-discovery)? The answer might be a little known evidentiary doctrine called the silent witness rule. …
The Proposed U.S. Missile Defense For Europe And The Old Continent's Reaction, Aleksandra Lencznarowicz
The Proposed U.S. Missile Defense For Europe And The Old Continent's Reaction, Aleksandra Lencznarowicz
Claremont-UC Undergraduate Research Conference on the European Union
No abstract provided.
Adapting To The Twenty-First Century: A Flexible Nato, Sarah Bohman
Adapting To The Twenty-First Century: A Flexible Nato, Sarah Bohman
Claremont-UC Undergraduate Research Conference on the European Union
No abstract provided.
A Sea Change In Security: How The ‘War On Terror’ Strengthened Human Rights, Michael Galchinsky
A Sea Change In Security: How The ‘War On Terror’ Strengthened Human Rights, Michael Galchinsky
English Faculty Publications
In many ways the Bush administration's "war on terror" weakened states' respect for their human rights obligations, and the UN Security Council's initial response to 9/11 seemed to follow the Bush administration's lead. In keeping with its historical lack of engagement with human rights questions, the SC in 2001-2003 did little to ensure that the counter-terrorism measures it demanded of states would take their obligations under human rights and humanitarian law into account. However, starting in 2002, a backlash against the perceived excesses wrought by the SC’s counter-terrorism measures gained momentum. Other UN bodies, as well as NGOs, regional intergovernmental …
Stoney Road Out Of Eden: The Struggle To Recover Insurance For Armenian Genocide Deaths And Its Implications For The Future Of State Authority, Contract Rights, And Human Rights, Jeffrey W. Stempel, Sarig Armenian, David Mcclure
Stoney Road Out Of Eden: The Struggle To Recover Insurance For Armenian Genocide Deaths And Its Implications For The Future Of State Authority, Contract Rights, And Human Rights, Jeffrey W. Stempel, Sarig Armenian, David Mcclure
Scholarly Works
The Armenian Genocide during the waning days of the Ottoman Empire continues to represent one of history’s underappreciated atrocities. Comparatively few people even know about the 1.5 million deaths or the government-sponsored extermination attempt that provided Hitler with a blueprint for the Nazi Holocaust. Unlike the Holocaust, however, there was never any accounting demanded of those responsible for the Armenian Genocide. In the aftermath of both tragedies, insurers seized upon the resulting disarray and victimization to deny life insurance benefits owed as a result of the killings. American-based litigation to vindicate rights under the Armenian polices faced substantial legal and …
Judicial Formalism And The State Secrets Privilege, Sudha Setty
Judicial Formalism And The State Secrets Privilege, Sudha Setty
Faculty Scholarship
Congress has, in the last few years, toyed with the idea of attempting to rein in the executive’s increasing reliance on the state secrets privilege as a means of escaping the possibility of accountability. The Author examines one high-profile case, that of Binyam Mohamed and other plaintiffs claiming that they had been subject to extraordinary rendition, torture, and prolonged detention. The Mohamed litigation offers evidence of a disturbing trend of U.S. courts retreating to formalistic reasoning to extend unwarranted deference to the executive branch in security-related contexts. In this essay the Author limits her analysis to the recent jurisprudence surrounding …
Carlos Figueroa On State Power And Democracy: Before And During The Presidency Of George W. Bush. By Andrew Kolin. New York, Ny: Palgrave Macmillan, 2011. 251pp., Carlos Figueroa
Human Rights & Human Welfare
A review of:
State Power and Democracy: Before and During the Presidency of George W. Bush. By Andrew Kolin. New York, NY: Palgrave Macmillan, 2011. 251pp.
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
Michigan Telecommunications & Technology Law Review
In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …
The Rise Of National Security Secrets, Sudha Setty
The Rise Of National Security Secrets, Sudha Setty
Faculty Scholarship
Professor Aziz Rana urges a broad and populist reconsideration of the idea that the administration and military are best positioned to make decisions about national security issues. This Article calls for a rethinking of national security secrecy as well. The centralization of security decision-making power in the early Cold War era fostered a culture of government secrecy, with Congress and the judiciary enabling the rise of national security secrecy out of fear that they were ill-equipped to make security-related decisions, and public fear of internal and international security threats trumping concerns about legitimacy or democratic accountability. This culture of secrecy …
National Security Interest Convergence, Sudha Setty
National Security Interest Convergence, Sudha Setty
Faculty Scholarship
Over a decade after the attacks of September 11, 2001, lawmakers, scholars, activists, and policy makers continue to confront the questions of whether and to what extent robust counterterrorism laws and policies should be reined in to protect against the abuse of civil rights and the marginalization of outsider groups. This Article uses political and critical race theory to identify areas of national security interest convergence in which political will can be marshaled to limit some national security policies.
Legislators act in their political self-interest — both in terms of responding to party forces and constituents — in casting votes …
Introduction: Targeting In An Asymmetrical World, D. A. Jeremy Telman
Introduction: Targeting In An Asymmetrical World, D. A. Jeremy Telman
Law Faculty Publications
This is the introduction to a collection of articles to be published in the Valparaiso University Law Review. The articles address the challenges presented by non-traditional warfare and non-traditional combatants in the contexts of the War on Terror and the trend toward multilateral and humanitarian interventions. Two of the contributions, those of Jonathan Hafetz and David Frakt, detail the hybrid model, part criminal law, part law of war, that the United States developed for addressing the status of detainees in the War on Terror. Two of the contributions, those of Rachel VanLandingham and Iain Pedden, propose international models for addressing …
Intolerable Abuses: Rendition For Torture And The State Secrets Privilege, D. A. Jeremy Telman
Intolerable Abuses: Rendition For Torture And The State Secrets Privilege, D. A. Jeremy Telman
Law Faculty Publications
In Mohamed v. Jeppesen Dataplan, Inc., the Ninth Circuit, sitting en banc, dismissed a complaint brought by five men claiming to have been victims of the U.S. government’s extraordinary rendition program, alleged to involve international kidnapping and torture at foreign facilities. Procedurally required to accept plaintiffs’ allegations as true, the court nonetheless dismissed the complaint before discovery had begun based on the state secrets privilege and the Totten doctrine, finding that the very subject matter of plaintiffs’ complaint was a state secret and that the defendant corporation could not defend itself without evidence subject to the privilege. This Article contends …
The Consequences Of A "War" Paradigm For Counterterrorism: What Impact On Basic Rights And Values?, Laurie R. Blank
The Consequences Of A "War" Paradigm For Counterterrorism: What Impact On Basic Rights And Values?, Laurie R. Blank
Georgia Law Review
Policy makers have used the rhetoric of "war"
throughout the past century to describe a major
governmental or societal effort to combat an evil that
threatens society, national security or other communal
good. It is both a rhetorical tool and a resource
mobilization, and above all a coalescing of authority to
meet the challenge, whether poverty, drugs or-most
recently-terrorism. Soon after 9/11 made al Qaeda a
household word, the Bush Administration characterized
U.S. efforts to defeat al Qaeda as the "War on Terror."
Here, however, the terminology of "war" goes far beyond
rhetoric, resource re-allocation and centralizing of
authority. When …
Efficiency In Bello And Ad Bellum: Making The Use Of Force Too Easy?, Kenneth Anderson
Efficiency In Bello And Ad Bellum: Making The Use Of Force Too Easy?, Kenneth Anderson
Contributions to Books
This article criticizes a widely asserted claim that drones make the resort to force and violence — war — “too easy.” Attractive on the surface to many, this article says that “too easy” is not a coherent notion as applied in war. The “too easy” argument comes in two forms, a moral argument and a maximization of social welfare argument. The maximization of social welfare version (on which the article focuses) frames “too easy” as a matter of creating an “inefficient” level of disincentive to use of force on account of insufficient risks to one’s own forces in so doing …
The Logic Of Terrorism, F.E. Guerra-Pujol
A Rational Choice Reflection On The Balance Among Individual Rights, Collective Security, And Threat Portrayals Between 9/11 And The Invasion Of Iraq, Robert Bejesky
Barry Law Review
No abstract provided.
Beyond War: Bin Laden, Escobar, And The Justification Of Targeted Killing, Luis E. Chiesa, Alexander K.A. Greenawalt
Beyond War: Bin Laden, Escobar, And The Justification Of Targeted Killing, Luis E. Chiesa, Alexander K.A. Greenawalt
Elisabeth Haub School of Law Faculty Publications
Using the May 2011 killing of Osama bin Laden as a case study, this Article contributes to the debate on targeted killing in two distinct ways, each of which has the result of downplaying the centrality of international humanitarian law (IHL) as the decisive source of justification for targeted killings.
First, we argue that the IHL rules governing the killing of combatants in wartime should be understood to apply more strictly in cases involving the targeting of single individuals, particularly when the targeting occurs against nonparadigmatic combatants outside the traditional battlefield. As applied to the bin Laden killing, we argue …
Sow What You Reap? Using Predator And Reaper Drones To Carry Out Assassinations Or Targeted Killings Of Suspected Islamic Terrorists, Thomas M. Mcdonnell
Sow What You Reap? Using Predator And Reaper Drones To Carry Out Assassinations Or Targeted Killings Of Suspected Islamic Terrorists, Thomas M. Mcdonnell
Elisabeth Haub School of Law Faculty Publications
This article explores whether targeted killing of suspected Islamist terrorists comports with international law generally, whether any special rules apply in so-called “failed states,” and whether deploying attack drones poses special risks for the civilian population, for humanitarian and human rights law, and for the struggle against terrorism. Part I of this article discusses the Predator Drone and its upgraded version Predator B, the Reaper, and analyzes their technological capabilities and innovations. Part II discusses international humanitarian law and international human rights law as applied to a state’s targeting and killing an individual inside or outside armed conflict or in …
Cash Or Credit: The Importance Of Financial Sector Stability In Rule Of Law Operations, Katherine E. Peterson
Cash Or Credit: The Importance Of Financial Sector Stability In Rule Of Law Operations, Katherine E. Peterson
Katherine Peterson
“Rule of Law” missions occur in a variety of circumstances, each mission differing from the last by location, context, extent of operations, participants, or a combination of all of these things and more. These operations can occur during, or immediately after, an armed conflict, intra- or interstate, a natural disaster, or other destabilizing or destructive event. The United States, international organizations, and other developed countries play a significant role in rebuilding these states so that they may one day achieve “Rule of Law.” The U.S. Military defines Rule of Law as “a principle of governance in which all persons, institutions …
Regulating From Typewriters In An Internet Age: The Development & Regulation Of Mass Media Usage In Presidential Campaigns, Anthony J. King
Regulating From Typewriters In An Internet Age: The Development & Regulation Of Mass Media Usage In Presidential Campaigns, Anthony J. King
Anthony J. King
The American election process has become a misleading process of campaign promises and self-promotion, thus diluting its primary and most fundamental purpose. This discrepancy can be traced to three primary groups; (1) the candidates, who supplied the motive; (2) the mass media, who supplied the means; and (3) the electorate, who so far have allowed it to happen. Seeking to remedy the situation lawmakers have turned to regulations of the media in attempt to assure fairness and nurture the marketplace of ideas. These numerous attempts at fairness have been met with a mixed reception and mixed results leading to questions …
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Lawrence J. Trautman Sr.
In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …
Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil
Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil
William Marra
The United States is in the midst of a national debate about the role drone aircraft should play in warfare abroad and law enforcement at home. Armed drones hunt enemies abroad 24 hours a day, seven days a week. Drones have begun to patrol our domestic skies too, on the lookout for suspicious activity. But contemporary drones are merely the “Model T” of robot technology. Today, humans are still very much “in the loop”: humans decide when to launch a drone, where it should fly, and whether it should take action against a suspect. But as drones develop greater autonomy, …
Square Pegs And Round Holes: Mexico, Drugs, And International Law, Craig A. Bloom
Square Pegs And Round Holes: Mexico, Drugs, And International Law, Craig A. Bloom
Craig A Bloom
The drug-related violence in Mexico has become so ubiquitous that President Calderon is using the Mexican Army to fight the drug cartels. This paper argues that this situation rises to the level of a non-international armed conflict and discusses the international legal obligations and rights that arise from that designation under international humanitarian law. It then proposes several means of ensuring compliance with these rights and obligations.
Under international humanitarian law, to qualify as a non-international armed conflict, there must be protracted armed violence involving at least one sufficiently organized non-state party. This requirement does not give any guidance on …