Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1804 Full-Text Articles 1547 Authors 815077 Downloads 108 Institutions

All Articles in National Security Law

Faceted Search

1804 full-text articles. Page 1 of 60.

Material Support Laws And Critical Race Theory, Nichole M. Pace 2017 University of Washington Tacoma

Material Support Laws And Critical Race Theory, Nichole M. Pace

Access*: Interdisciplinary Journal of Student Research and Scholarship

The paper examines terrorism designation and material support laws for structural racism using Critical Race Theory. Legislation concerning terrorist organizations continues to limit efforts of humanitarian organizations and refugee applicants. The impact of such legislation extends beyond the designated terrorist organizations to the communities and countries they inhabit. This article describes the legal statutes and issues related to terrorist designation and material support laws before defining Critical Race Theory. The article seeks to understand the structural racism involved in the defined statutes and procedures. Using Critical Race Theory, the article defines how material support laws and terrorist designation procedures are ...


Newsroom: Ap: Margulies On New Travel Ban 09-27-2017, Jill Colvin, Mark Sherman, Roger Williams University School of Law 2017 Associated Press

Newsroom: Ap: Margulies On New Travel Ban 09-27-2017, Jill Colvin, Mark Sherman, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Open Source: The Enewsletter Of Rwu Law 09-22-2017, Roger Williams University School of Law 2017 Roger Williams University

Open Source: The Enewsletter Of Rwu Law 09-22-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Saving Lives, Shalini Bhargava Ray 2017 University of Alabama School of Law

Saving Lives, Shalini Bhargava Ray

Boston College Law Review

When Alan Kurdi, a Syrian toddler, drowned in the Mediterranean while fleeing civil war in his home country, the world’s attention turned to the Syrian refugee crisis. Offers to transport and house refugees surged. Private boats set out on the Mediterranean Sea to rescue refugees dying in the water. A billionaire offered to purchase an island on which the refugees could live out their lives. This Article analyzes private humanitarian aid to asylum seekers, a subset of migrants whose claims for refugee protection have not yet been filed or adjudicated, and who typically travel without authorization. This Article determines ...


Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School of Law 2017 Roger Williams University

Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Trending @ Rwu Law: Dean Yelnosky's Post: Chelsea Manning, Professor David Coombs, And The "Wikileaks Trial" 08-28-2017, Edward Fitzpatrick, Roger Williams University School of Law 2017 Roger Williams University

Trending @ Rwu Law: Dean Yelnosky's Post: Chelsea Manning, Professor David Coombs, And The "Wikileaks Trial" 08-28-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Law School Blogs

No abstract provided.


The Transformation Of Human Rights Litigation: The Alien Tort Statute, The Anti-Terrorism Act, And Jasta, Stephen J. Schnably 2017 University of Miami School of Law

The Transformation Of Human Rights Litigation: The Alien Tort Statute, The Anti-Terrorism Act, And Jasta, Stephen J. Schnably

University of Miami International and Comparative Law Review

A quarter century ago, the prospects for federal civil litigation of international human rights violations under the Alien Tort Statute (ATS) seemed bright. With the statute’s modern revival, a decade earlier in Filártiga, foreign nationals, often with no recourse in their own countries, had a forum for judicial vindication of a broad range of wrongs by state officials, multinational corporations, and even, in limited circumstances, foreign states themselves. The Supreme Court’s Kiobel decision in 2013, however, may signal the end of the Filártiga revolution, with Congress’s seeming acquiescence: Congress, after all, could amend the ATS if it ...


Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso 2017 University of Massachusetts School of Law

Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso

University of Massachusetts Law Review

As a division of the Federal Bureau of Investigation’s National Security Branch, the Terrorist Screening Center maintains the Terrorist Watchlist, a central database for identifying individuals known or suspected to engage in terrorism or terrorist activities. Subsumed under the Terrorist Watchlist is the No Fly List, which prohibits individuals from boarding commercial aircrafts in and out of the United States. Placement on either list presumes named individuals as a potential threat to U.S. national security, yet there is no restriction preventing them from legally purchasing firearms. Following a mass shooting at an Orlando nightclub in June of 2016 ...


Maritime Law Enforcement Operations And Intelligence In An Age Of Maritime Security, Douglas Guilfoyle 2017 Faculty of Law, Monash University

Maritime Law Enforcement Operations And Intelligence In An Age Of Maritime Security, Douglas Guilfoyle

International Law Studies

This article examines maritime law enforcement operations and intelligence activities in the context of maritime security. First describing the role of navies and coast guards in maritime security, this article then explores the relationship between law enforcement operations and actionable intelligence. In particular, it focuses on maritime domain awareness (MDA), and how MDA functions as a form of intelligence. Next, the article discusses maritime domain awareness under international law before looking to the tension between intelligence collection and visit, board, search and seizure (VBSS) operations, both on the high seas and in waters under national jurisdiction. The article closes by ...


A Never Ending State Of Emergency: The Danger Of National Security In Emboldening The Color Line In America, Celeste McCaw 2017 University of Miami Law School

A Never Ending State Of Emergency: The Danger Of National Security In Emboldening The Color Line In America, Celeste Mccaw

University of Miami Race & Social Justice Law Review

No abstract provided.


Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer 2017 Seattle University School of Law

Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer

Seattle University Law Review

Part I of this Article describes how the healthcare industry has arrived in this place of vulnerability, including (1) the history of the movement toward EHRs through HIPAA, (2) HIPAA’s meaningful use regulations and the background of current ransomware attacks, and (3) the distinctions between these attacks and other security breaches that have plagued large insurers and health systems within the last five years. Next, Part II will examine current industry culture when it comes to cybersecurity and review current legal and business approaches to address this growing threat. Then, Part III will argue that, while the current laws ...


The Future Of U.S. Detention Under International Law: Workshop Report, International Committee of the Red Cross (ICRC), Harvard Law School Program on International Law and Armed Conflict (HLS PILAC), Stockton Center for the Study of International Law (U.S. Naval War College) 2017 U.S. Naval War College

The Future Of U.S. Detention Under International Law: Workshop Report, International Committee Of The Red Cross (Icrc), Harvard Law School Program On International Law And Armed Conflict (Hls Pilac), Stockton Center For The Study Of International Law (U.S. Naval War College)

International Law Studies

The International Committee of the Red Cross Regional Delegation for the United States and Canada, the Harvard Law School Program on International Law and Armed Conflict, and the Stockton Center for the Study of International Law at the U.S. Naval War College recently hosted a workshop titled Global Battlefields: The Future of U.S. Detention under International Law. The workshop was designed to facilitate discussion on international law issues pertaining to U.S. detention practices and policies in armed conflict. Workshop participants included members of government, legal experts, practitioners and scholars from a variety of countries. This report attempts ...


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton 2017 Fox Rothschild LLP

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at ...


The Constitution And National Security, Erwin Chemerinsky 2017 Selected Works

The Constitution And National Security, Erwin Chemerinsky

Erwin Chemerinsky

No abstract provided.


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. MacKenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law 2017 Venable LLP

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


The Legacy Of Srebrenica: Potential Consequences Of Reducing Liability For Troop Contributing Countries In Modern Un Peacekeeping Operations, Kelsey Gasseling 2017 Boston College Law School

The Legacy Of Srebrenica: Potential Consequences Of Reducing Liability For Troop Contributing Countries In Modern Un Peacekeeping Operations, Kelsey Gasseling

Boston College International and Comparative Law Review

In 2014 the District Court of The Hague returned its decision in a case concerning peacekeeper (Dutchbat) wrongdoing during the 1995 massacre at Srebrenica, Bosnia-Herzegovina. The district court dismissed the UN as party to the suit, basing this decision on the organization’s statutory immunity from prosecution. As a basis for holding the Netherlands liable for Dutchbat’s actions, the district court utilized the effective control standard. This standard triggered liability for conduct undertaken either under direct order from Dutch officials, or in violation of the mission mandate. The district court strictly interpreted effective control, concluding the Netherlands was liable ...


Fragmented Wars: Multi-Territorial Military Operations Against Armed Groups, Noam Lubell 2017 University of Essex

Fragmented Wars: Multi-Territorial Military Operations Against Armed Groups, Noam Lubell

International Law Studies

Recent years have seen the emergence of significant legal debate surrounding the use of force against armed groups located in other States. With time, it has become clear that in many cases such operations are not confined to the territory of one other State, but expand to encompass multiple territories and often more than one armed group. This article examines multi-territorial conflicts with armed groups through the lens of several legal frameworks. Among other topics, it analyses the questions surrounding the extension of self-defense into multiple territories, the classification of the hostilities with the group and between involved States, the ...


Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick 2017 Roger Williams University School of Law

Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


With Chelsea Manning's Release, Lead Trial Attorney Coombs Recalls Case: Rwu Law Professor David E. Coombs Revisits Issues In The Case, Looks Forward To Teaching Again Next Year 05-17-2017, Edward Fitzpatrick 2017 Roger Williams University

With Chelsea Manning's Release, Lead Trial Attorney Coombs Recalls Case: Rwu Law Professor David E. Coombs Revisits Issues In The Case, Looks Forward To Teaching Again Next Year 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


Space Weapons And The Law, Bill Boothby 2017 U.S. Naval War College

Space Weapons And The Law, Bill Boothby

International Law Studies

Outer space is of vital importance for numerous civilian and military functions in the modern world. The idea of a space weapon involves something used, intended or designed for employment in, to or from outer space to cause injury or damage to the enemy during an armed conflict. Non-injurious, non-damaging space activities that adversely affect enemy military operations or capacity, though not involving the use of weapons, will nevertheless be methods of warfare. Article III of the Outer Space Treaty makes it clear that international law, including weapons law, applies in outer space. Accordingly, the superfluous injury/unnecessary suffering and ...


Digital Commons powered by bepress