Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 2011 - 2040 of 3203

Full-Text Articles in National Security Law

The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler Mar 2012

The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler

Security Studies & International Affairs - Daytona Beach

"The changing face of infowar • The Advanced Persistent Threat • Examples of recent cyber attacks • Mitigation and preparation • Formalizing the response • The role(s) of education"--Overview


The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler Mar 2012

The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler

Applied Aviation Sciences - Daytona Beach

No abstract provided.


Sharing Secrets: Examining Deferred Action And Transparency In Immigration Law, Shoba Sivaprasad Wadhia Mar 2012

Sharing Secrets: Examining Deferred Action And Transparency In Immigration Law, Shoba Sivaprasad Wadhia

The University of New Hampshire Law Review

[Excerpt] “This Article is about deferred action and transparency in related immigration cases falling under the jurisdiction of the Department of Homeland Security (DHS). While scholars from other genres have written extensively on the topic of prosecutorial discretion, the subject is largely absent from immigration scholarship, with the exception of early research conducted by Leon Wildes in the late 1970s and early 2000s, and a law review article I published in 2010 outlining the origins of prosecutorial discretion in immigration law and related lessons that can be drawn from administrative law and criminal law. That article ends with specific recommendations …


Mill, Holmes, Brandeis And A True Threat To Brandenburg, Mark Strasser Mar 2012

Mill, Holmes, Brandeis And A True Threat To Brandenburg, Mark Strasser

Brigham Young University Journal of Public Law

No abstract provided.


Be Careful What You Wish For: Changing Doctrines, Changing Technologies And The Lower Cost Of War, Rosa Brooks Mar 2012

Be Careful What You Wish For: Changing Doctrines, Changing Technologies And The Lower Cost Of War, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The collective security structure created by the U.N. Charter is becoming shakier than ever, and two recent trends pose particular challenges to Charter rules on the use of force. The first trend involves a normative shift in understandings of state sovereignty, and the second trend involves improvements in technology--specifically, the rapid evolution of unmanned aerial vehicles, precision weapons, and surveillance technologies. Each trend on its own raises difficult issues. Together, they further call into question international law’s ability to meaningfully constrain the use of force by states.


The Assault Of Jamie Leigh Jones: How One Woman's Horror Story Is Changing Arbitration In America, Jeffrey Adams Feb 2012

The Assault Of Jamie Leigh Jones: How One Woman's Horror Story Is Changing Arbitration In America, Jeffrey Adams

Pepperdine Dispute Resolution Law Journal

This article examines Jones v. Halliburton Co., the "Al Franken Amendment" to the 2010 U.S. Defense Department Budget (Franken Amendment) that was created in response to Jones, and the impact that both could have on mandatory arbitration clauses in employment contracts in the future. Part II recounts the troubling events that led to Jones and the inclusion of the Franken Amendment in the 2010 Defense Department Budget. Part III details the arguments made for and against the inclusion of the Franken Amendment. Part IV analyzes the impact that the Franken Amendment could have on mandatory arbitration clauses in contacts in …


The Regulation Of Extremist Speech In The Era Of Mass Digital Communications: Is Brandenburg Tolerance Obsolete In The Terrorist Era?, Nadine Strossen Feb 2012

The Regulation Of Extremist Speech In The Era Of Mass Digital Communications: Is Brandenburg Tolerance Obsolete In The Terrorist Era?, Nadine Strossen

Pepperdine Law Review

No abstract provided.


The Muted Rise Of The Silent Witness Rule In National Security Litigation: The Eastern District Of Virginia's Answer To The Fight Over Classified Information At Trial, Jonathan M. Lamb Feb 2012

The Muted Rise Of The Silent Witness Rule In National Security Litigation: The Eastern District Of Virginia's Answer To The Fight Over Classified Information At Trial, Jonathan M. Lamb

Pepperdine Law Review

The state secrets problem is emblematic of a judicial issue which is not confined to the civil cases in which the privilege is asserted - the tension between the government's interest in protecting classified information and society's interest in justice by resolution on the merits. The United States must be allowed to prosecute terrorists, conspirators, and enemies by using classified information as evidence; but how may the government act as a civil defendant without invoking the state secrets privilege to dismiss actions before trial (or pre-discovery)? The answer might be a little known evidentiary doctrine called the silent witness rule. …


The Proposed U.S. Missile Defense For Europe And The Old Continent's Reaction, Aleksandra Lencznarowicz Feb 2012

The Proposed U.S. Missile Defense For Europe And The Old Continent's Reaction, Aleksandra Lencznarowicz

Claremont-UC Undergraduate Research Conference on the European Union

No abstract provided.


Adapting To The Twenty-First Century: A Flexible Nato, Sarah Bohman Feb 2012

Adapting To The Twenty-First Century: A Flexible Nato, Sarah Bohman

Claremont-UC Undergraduate Research Conference on the European Union

No abstract provided.


A Sea Change In Security: How The ‘War On Terror’ Strengthened Human Rights, Michael Galchinsky Jan 2012

A Sea Change In Security: How The ‘War On Terror’ Strengthened Human Rights, Michael Galchinsky

English Faculty Publications

In many ways the Bush administration's "war on terror" weakened states' respect for their human rights obligations, and the UN Security Council's initial response to 9/11 seemed to follow the Bush administration's lead. In keeping with its historical lack of engagement with human rights questions, the SC in 2001-2003 did little to ensure that the counter-terrorism measures it demanded of states would take their obligations under human rights and humanitarian law into account. However, starting in 2002, a backlash against the perceived excesses wrought by the SC’s counter-terrorism measures gained momentum. Other UN bodies, as well as NGOs, regional intergovernmental …


Stoney Road Out Of Eden: The Struggle To Recover Insurance For Armenian Genocide Deaths And Its Implications For The Future Of State Authority, Contract Rights, And Human Rights, Jeffrey W. Stempel, Sarig Armenian, David Mcclure Jan 2012

Stoney Road Out Of Eden: The Struggle To Recover Insurance For Armenian Genocide Deaths And Its Implications For The Future Of State Authority, Contract Rights, And Human Rights, Jeffrey W. Stempel, Sarig Armenian, David Mcclure

Scholarly Works

The Armenian Genocide during the waning days of the Ottoman Empire continues to represent one of history’s underappreciated atrocities. Comparatively few people even know about the 1.5 million deaths or the government-sponsored extermination attempt that provided Hitler with a blueprint for the Nazi Holocaust. Unlike the Holocaust, however, there was never any accounting demanded of those responsible for the Armenian Genocide. In the aftermath of both tragedies, insurers seized upon the resulting disarray and victimization to deny life insurance benefits owed as a result of the killings. American-based litigation to vindicate rights under the Armenian polices faced substantial legal and …


Judicial Formalism And The State Secrets Privilege, Sudha Setty Jan 2012

Judicial Formalism And The State Secrets Privilege, Sudha Setty

Faculty Scholarship

Congress has, in the last few years, toyed with the idea of attempting to rein in the executive’s increasing reliance on the state secrets privilege as a means of escaping the possibility of accountability. The Author examines one high-profile case, that of Binyam Mohamed and other plaintiffs claiming that they had been subject to extraordinary rendition, torture, and prolonged detention. The Mohamed litigation offers evidence of a disturbing trend of U.S. courts retreating to formalistic reasoning to extend unwarranted deference to the executive branch in security-related contexts. In this essay the Author limits her analysis to the recent jurisprudence surrounding …


Carlos Figueroa On State Power And Democracy: Before And During The Presidency Of George W. Bush. By Andrew Kolin. New York, Ny: Palgrave Macmillan, 2011. 251pp., Carlos Figueroa Jan 2012

Carlos Figueroa On State Power And Democracy: Before And During The Presidency Of George W. Bush. By Andrew Kolin. New York, Ny: Palgrave Macmillan, 2011. 251pp., Carlos Figueroa

Human Rights & Human Welfare

A review of:

State Power and Democracy: Before and During the Presidency of George W. Bush. By Andrew Kolin. New York, NY: Palgrave Macmillan, 2011. 251pp.


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


The Rise Of National Security Secrets, Sudha Setty Jan 2012

The Rise Of National Security Secrets, Sudha Setty

Faculty Scholarship

Professor Aziz Rana urges a broad and populist reconsideration of the idea that the administration and military are best positioned to make decisions about national security issues. This Article calls for a rethinking of national security secrecy as well. The centralization of security decision-making power in the early Cold War era fostered a culture of government secrecy, with Congress and the judiciary enabling the rise of national security secrecy out of fear that they were ill-equipped to make security-related decisions, and public fear of internal and international security threats trumping concerns about legitimacy or democratic accountability. This culture of secrecy …


National Security Interest Convergence, Sudha Setty Jan 2012

National Security Interest Convergence, Sudha Setty

Faculty Scholarship

Over a decade after the attacks of September 11, 2001, lawmakers, scholars, activists, and policy makers continue to confront the questions of whether and to what extent robust counterterrorism laws and policies should be reined in to protect against the abuse of civil rights and the marginalization of outsider groups. This Article uses political and critical race theory to identify areas of national security interest convergence in which political will can be marshaled to limit some national security policies.

Legislators act in their political self-interest — both in terms of responding to party forces and constituents — in casting votes …


Introduction: Targeting In An Asymmetrical World, D. A. Jeremy Telman Jan 2012

Introduction: Targeting In An Asymmetrical World, D. A. Jeremy Telman

Law Faculty Publications

This is the introduction to a collection of articles to be published in the Valparaiso University Law Review. The articles address the challenges presented by non-traditional warfare and non-traditional combatants in the contexts of the War on Terror and the trend toward multilateral and humanitarian interventions. Two of the contributions, those of Jonathan Hafetz and David Frakt, detail the hybrid model, part criminal law, part law of war, that the United States developed for addressing the status of detainees in the War on Terror. Two of the contributions, those of Rachel VanLandingham and Iain Pedden, propose international models for addressing …


Intolerable Abuses: Rendition For Torture And The State Secrets Privilege, D. A. Jeremy Telman Jan 2012

Intolerable Abuses: Rendition For Torture And The State Secrets Privilege, D. A. Jeremy Telman

Law Faculty Publications

In Mohamed v. Jeppesen Dataplan, Inc., the Ninth Circuit, sitting en banc, dismissed a complaint brought by five men claiming to have been victims of the U.S. government’s extraordinary rendition program, alleged to involve international kidnapping and torture at foreign facilities. Procedurally required to accept plaintiffs’ allegations as true, the court nonetheless dismissed the complaint before discovery had begun based on the state secrets privilege and the Totten doctrine, finding that the very subject matter of plaintiffs’ complaint was a state secret and that the defendant corporation could not defend itself without evidence subject to the privilege. This Article contends …


The Consequences Of A "War" Paradigm For Counterterrorism: What Impact On Basic Rights And Values?, Laurie R. Blank Jan 2012

The Consequences Of A "War" Paradigm For Counterterrorism: What Impact On Basic Rights And Values?, Laurie R. Blank

Georgia Law Review

Policy makers have used the rhetoric of "war"
throughout the past century to describe a major
governmental or societal effort to combat an evil that
threatens society, national security or other communal

good. It is both a rhetorical tool and a resource
mobilization, and above all a coalescing of authority to
meet the challenge, whether poverty, drugs or-most
recently-terrorism. Soon after 9/11 made al Qaeda a
household word, the Bush Administration characterized
U.S. efforts to defeat al Qaeda as the "War on Terror."
Here, however, the terminology of "war" goes far beyond
rhetoric, resource re-allocation and centralizing of
authority. When …


Efficiency In Bello And Ad Bellum: Making The Use Of Force Too Easy?, Kenneth Anderson Jan 2012

Efficiency In Bello And Ad Bellum: Making The Use Of Force Too Easy?, Kenneth Anderson

Contributions to Books

This article criticizes a widely asserted claim that drones make the resort to force and violence — war — “too easy.” Attractive on the surface to many, this article says that “too easy” is not a coherent notion as applied in war. The “too easy” argument comes in two forms, a moral argument and a maximization of social welfare argument. The maximization of social welfare version (on which the article focuses) frames “too easy” as a matter of creating an “inefficient” level of disincentive to use of force on account of insufficient risks to one’s own forces in so doing …


The Logic Of Terrorism, F.E. Guerra-Pujol Jan 2012

The Logic Of Terrorism, F.E. Guerra-Pujol

Barry Law Review

No abstract provided.


A Rational Choice Reflection On The Balance Among Individual Rights, Collective Security, And Threat Portrayals Between 9/11 And The Invasion Of Iraq, Robert Bejesky Jan 2012

A Rational Choice Reflection On The Balance Among Individual Rights, Collective Security, And Threat Portrayals Between 9/11 And The Invasion Of Iraq, Robert Bejesky

Barry Law Review

No abstract provided.


Beyond War: Bin Laden, Escobar, And The Justification Of Targeted Killing, Luis E. Chiesa, Alexander K.A. Greenawalt Jan 2012

Beyond War: Bin Laden, Escobar, And The Justification Of Targeted Killing, Luis E. Chiesa, Alexander K.A. Greenawalt

Elisabeth Haub School of Law Faculty Publications

Using the May 2011 killing of Osama bin Laden as a case study, this Article contributes to the debate on targeted killing in two distinct ways, each of which has the result of downplaying the centrality of international humanitarian law (IHL) as the decisive source of justification for targeted killings.

First, we argue that the IHL rules governing the killing of combatants in wartime should be understood to apply more strictly in cases involving the targeting of single individuals, particularly when the targeting occurs against nonparadigmatic combatants outside the traditional battlefield. As applied to the bin Laden killing, we argue …


Sow What You Reap? Using Predator And Reaper Drones To Carry Out Assassinations Or Targeted Killings Of Suspected Islamic Terrorists, Thomas M. Mcdonnell Jan 2012

Sow What You Reap? Using Predator And Reaper Drones To Carry Out Assassinations Or Targeted Killings Of Suspected Islamic Terrorists, Thomas M. Mcdonnell

Elisabeth Haub School of Law Faculty Publications

This article explores whether targeted killing of suspected Islamist terrorists comports with international law generally, whether any special rules apply in so-called “failed states,” and whether deploying attack drones poses special risks for the civilian population, for humanitarian and human rights law, and for the struggle against terrorism. Part I of this article discusses the Predator Drone and its upgraded version Predator B, the Reaper, and analyzes their technological capabilities and innovations. Part II discusses international humanitarian law and international human rights law as applied to a state’s targeting and killing an individual inside or outside armed conflict or in …


Cash Or Credit: The Importance Of Financial Sector Stability In Rule Of Law Operations, Katherine E. Peterson Jan 2012

Cash Or Credit: The Importance Of Financial Sector Stability In Rule Of Law Operations, Katherine E. Peterson

Katherine Peterson

“Rule of Law” missions occur in a variety of circumstances, each mission differing from the last by location, context, extent of operations, participants, or a combination of all of these things and more. These operations can occur during, or immediately after, an armed conflict, intra- or interstate, a natural disaster, or other destabilizing or destructive event. The United States, international organizations, and other developed countries play a significant role in rebuilding these states so that they may one day achieve “Rule of Law.” The U.S. Military defines Rule of Law as “a principle of governance in which all persons, institutions …


Regulating From Typewriters In An Internet Age: The Development & Regulation Of Mass Media Usage In Presidential Campaigns, Anthony J. King Jan 2012

Regulating From Typewriters In An Internet Age: The Development & Regulation Of Mass Media Usage In Presidential Campaigns, Anthony J. King

Anthony J. King

The American election process has become a misleading process of campaign promises and self-promotion, thus diluting its primary and most fundamental purpose. This discrepancy can be traced to three primary groups; (1) the candidates, who supplied the motive; (2) the mass media, who supplied the means; and (3) the electorate, who so far have allowed it to happen. Seeking to remedy the situation lawmakers have turned to regulations of the media in attempt to assure fairness and nurture the marketplace of ideas. These numerous attempts at fairness have been met with a mixed reception and mixed results leading to questions …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil Jan 2012

Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil

William Marra

The United States is in the midst of a national debate about the role drone aircraft should play in warfare abroad and law enforcement at home. Armed drones hunt enemies abroad 24 hours a day, seven days a week. Drones have begun to patrol our domestic skies too, on the lookout for suspicious activity. But contemporary drones are merely the “Model T” of robot technology. Today, humans are still very much “in the loop”: humans decide when to launch a drone, where it should fly, and whether it should take action against a suspect. But as drones develop greater autonomy, …


Square Pegs And Round Holes: Mexico, Drugs, And International Law, Craig A. Bloom Jan 2012

Square Pegs And Round Holes: Mexico, Drugs, And International Law, Craig A. Bloom

Craig A Bloom

The drug-related violence in Mexico has become so ubiquitous that President Calderon is using the Mexican Army to fight the drug cartels. This paper argues that this situation rises to the level of a non-international armed conflict and discusses the international legal obligations and rights that arise from that designation under international humanitarian law. It then proposes several means of ensuring compliance with these rights and obligations.

Under international humanitarian law, to qualify as a non-international armed conflict, there must be protracted armed violence involving at least one sufficiently organized non-state party. This requirement does not give any guidance on …