Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,024 Full-Text Articles 1,672 Authors 886,959 Downloads 124 Institutions

All Articles in National Security Law

Faceted Search

2,024 full-text articles. Page 1 of 66.

The Law Of Nations And The Constitution: An Early Modern Perspective, David M. Golove, Daniel Hulsebosch 2018 NYU School of Law

The Law Of Nations And The Constitution: An Early Modern Perspective, David M. Golove, Daniel Hulsebosch

New York University Public Law and Legal Theory Working Papers

Many American scholars, lawyers, and judges born in the latter half of the twentieth century have found it difficult to comprehend, or even recognize, the Founding generation’s commitment to the law of nations as a system of law, jurisprudence, and morality. Perhaps for similar reasons, that commitment tends to get lost in much modern historical writing. So, too, with respect to a related, but, from a legal perspective, more consequential aspect of the Founding: the prominent place of the law of nations in the constitutional reform project that culminated in the Philadelphia Convention. It was the uncertain struggle to ...


How To End “Illegal Immigration”, Kari E. Hong 2018 Boston College Law School

How To End “Illegal Immigration”, Kari E. Hong

Boston College Law School Faculty Papers

Since President Trump has taken office, it is clearer than ever that there are two ways to end “illegal immigration.” The first route — started by President Obama and ratcheted up by President Trump with relentless cruelty — is an actual effort to deport millions and exclude millions more. The second is to legalize those without status who have been, are, and will continue to contribute to America’s families, communities, and future.

This essay argues that the latter choice, restoring the paths to legalization that once were part of our nation’s laws, is the only realistic way forward to restore ...


The Operational And Administrative Militaries, Mark P. Nevitt 2018 University of Pennsylvania Law School

The Operational And Administrative Militaries, Mark P. Nevitt

Faculty Scholarship

This Article offers a new way of thinking about the military. The U.S. military’s existing legal architecture arose from tragedy: in response to operational military failures in Vietnam, the 1980 failed Iranian hostage rescue attempt and other military misadventures, Congress revamped the Department of Defense (DoD)’s organization. The resulting law, the Goldwater-Nichols Act, formed two militaries within the DoD that endure to this day. These two militaries – the operational military and the administrative military – were once opaque to the outside observer but have emerged from the shadows in light of recent conflicts. The operational military remains the ...


Sanctuary Cities And The Trump Administration: The Practical Limits Of Federal Power, Joshua W. Dansby 2018 The George Washington University Law School

Sanctuary Cities And The Trump Administration: The Practical Limits Of Federal Power, Joshua W. Dansby

The Scholar: St. Mary's Law Review on Race and Social Justice

On January 25, 2017, President Donald J. Trump signed an executive order with the supposed purpose of enhancing public safety of the interior of the United States. Part of the Administration’s plan includes threatening “sanctuary jurisdictions,” also known as “sanctuary cities,” with the loss of federal funds for failing to comply with federal law, specifically 8 U.S.C. § 1373.

There are several problems with this plan: (1) there is no solid definition for what makes a city a “sanctuary;” (2) if we accept the Administration’s allusion that a sanctuary jurisdiction is one that “willfully” refuses to comply ...


Effects Of Senate Bill 4 On Wage-Theft: Why All Workers Are At Risk In Low-Income Occupations, Daniella Salas-Chacon 2018 St. Mary's University School of Law

Effects Of Senate Bill 4 On Wage-Theft: Why All Workers Are At Risk In Low-Income Occupations, Daniella Salas-Chacon

The Scholar: St. Mary's Law Review on Race and Social Justice

Abstract forthcoming


Undocumented Crime Victims: Unheard, Unnumbered, And Unprotected, Pauline Portillo 2018 St. Mary's University School of Law

Undocumented Crime Victims: Unheard, Unnumbered, And Unprotected, Pauline Portillo

The Scholar: St. Mary's Law Review on Race and Social Justice

Abstract forthcoming


A Nation Of Informants: Reining In Post-9/11 Coercion Of Intelligence Informants, Diala Shamas 2018 Brooklyn Law School

A Nation Of Informants: Reining In Post-9/11 Coercion Of Intelligence Informants, Diala Shamas

Brooklyn Law Review

This article challenges the adequacy of the existing legal and regulatory framework governing informant recruitment and coercion practices to protect fundamental rights, informed by the Muslim-American experience. It looks at the growing law enforcement practice of recruiting informants among Muslim-American communities for intelligence gathering purposes. Although the coercion of law-abiding individuals to provide information to federal law enforcement agencies for intelligence gathering purposes implicates significant rights, it is left unregulated. Existing, albeit limited, restraints on the government agents’ ability to coerce individuals to provide information either assume a criminal context, or are driven by historical concerns over FBI corruption. As ...


No Security Through Obscurity: Changing Circumvention Law To Protect Our Democracy Against Cyberattacks, Andrew Moshirnia 2018 Brooklyn Law School

No Security Through Obscurity: Changing Circumvention Law To Protect Our Democracy Against Cyberattacks, Andrew Moshirnia

Brooklyn Law Review

Cybersecurity is increasingly vital in a climate of unprecedented digital assaults against liberal democracy. Russian hackers have launched destabilizing cyberattacks targeting the United States’ energy grid, voting machines, and political campaigns. America's existing inadequate cyber defenses operate according to a simple assumption: hide the computer code that powers critical infrastructure so that America's enemies cannot exploit undiscovered weaknesses. Indeed, the intellectual property regime relies entirely on this belief, protecting those who own the rights in computer code by punishing those who might access and copy that code. This “security through obscurity” approach has failed. Rightsholders, on their own ...


A Slap On The Wrist: Combatting Russia’S Cyber Attack On The 2016 U.S. Presidential Election, Christina Lam 2018 Boston College Law School

A Slap On The Wrist: Combatting Russia’S Cyber Attack On The 2016 U.S. Presidential Election, Christina Lam

Boston College Law Review

On June 14, 2016, suspicions emerged that Russia launched a cyber attack on the U.S. Democratic National Committee in the midst of an extremely contentious presidential election season. The damage was extensive, occurring over a series of months and resulting in numerous leaks of highly sensitive information regarding Democratic Presidential Candidate Hillary Clinton. After it was verified that Russia was behind the cyber attack, President Barack Obama relied on general and anachronistic principles of international law to issue a grossly ineffective response. Russia’s cyber attack and the U.S. response thus highlighted the ways in which international law ...


Contemporary Practice Of The United States Relating To International Law (112:3 Am J Int'l L), Jean Galbraith 2018 University of Pennsylvania Law School

Contemporary Practice Of The United States Relating To International Law (112:3 Am J Int'l L), Jean Galbraith

Faculty Scholarship

This article is reproduced with permission from the July 2018 issue of the American Journal of International Law © 2018 American Society of International Law. All rights reserved.


Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam 2018 University of Ibn Tofail

Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam

International Journal of Nuclear Security

The Shapash Nuclear Research Institute (SNRI) data book was issued by the International Atomic Energy Agency (IAEA) in 2013. The hypothetical facility data book describes the hypothetical site, which is divided into two areas: the low-security area, known as the administrative area, and the very high-security area, known as the protected area. The book contains detailed descriptions of each area’s safety and security measures, along with figures of multiple buildings in both areas, and also includes information about the site’s computer networks.

This paper aims to identify security weaknesses related to the institute’s location, the Administrative Area ...


Private Property Rights And The Public Interest In Exploration Of Outer Space, Frans G. von der Dunk 2018 University of Nebraska College of Law

Private Property Rights And The Public Interest In Exploration Of Outer Space, Frans G. Von Der Dunk

Space, Cyber, and Telecommunications Law Program Faculty Publications

The impending missions to exploit natural resources of celestial bodies may at some point start interfering with the scientific interests, including those of astrobiology, in these bodies. While the legal status of celestial bodies at the highest level is clear, uncertainty has arisen as to the extent private property rights over such objects or over their resources are legally acceptable, legally impossible, or potentially legal. This also provides for a considerable amount of uncertainty regarding how the legal framework could or may need to be changed to accommodate private interests. The article analyzes the two main international treaties relevant from ...


Contents, ADFSL 2018 Embry-Riddle Aeronautical University

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming 2018 Edith Cowan University

A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper reports on the results of a survey that is the initial phase of an action research project being conducted with the Law Society of Western Australia. The online survey forms a baseline for the expression of a targeted training regime aimed at improving the cyber security awareness and posture of the membership of the Society. The full complement of over 3000 members were given the opportunity to participate in the survey, with 122 members responding in this initial round. The survey was designed to elicit responses about information technology use and the awareness of good practices with respect ...


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth 2018 Technology Research Centre, DPG

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang 2018 Embry-Riddle Aeronautical University

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua MacMonagle 2018 East Central University, Ada Oklahoma

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical ...


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba 2018 Embry-Riddle Aeronautical University

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows ...


The Significance Of Mongolia's Foreign Policy And Security Apparatus On A Global And Regional Scale, Bolor Lkhaajav 2018 University of San Francisco

The Significance Of Mongolia's Foreign Policy And Security Apparatus On A Global And Regional Scale, Bolor Lkhaajav

Master's Projects and Capstones

Mongolia, land-locked between two politically, economically, and militarily powerful nations — Russia and China — often must balance its foreign and security policies with its two neighbors and countries beyond. When discussing Mongolia’s foreign policy and security apparatus, historians and scholars look at the international relations of East Asia as a whole. This is the case not because Mongolia’s foreign policy is insignificant but because greater powers impose greater influence on smaller states. Mongolia’s partial involvement in World War II (WWII), and the Cold War introduced new challenges as well as opportunities for Mongolia to modernize its foreign policy ...


Digital Commons powered by bepress