Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,036 Full-Text Articles 1,685 Authors 886,959 Downloads 125 Institutions

All Articles in National Security Law

Faceted Search

2,036 full-text articles. Page 2 of 66.

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba 2018 Embry-Riddle Aeronautical University

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows ...


Investigative Practices For Large Money Laundering Crimes, Mary Hutley-Washington 2018 La Salle University

Investigative Practices For Large Money Laundering Crimes, Mary Hutley-Washington

Economic Crime Forensics Capstones

Reportedly, governments, states departments, analysts and law enforcement state, "money laundering has a corrosive effect on a country’s economy. The degree of destruction caused by money laundering interrupts the business flow, runs the risk of financial burdens on banks, and ruins countless countries’ reputation for allowing widespread laundering. Money laundering’s significant consequences are the exposure to the communities; because of the criminal elements individuals are subjected to laundering, i.e., fraud, drug trafficking, and other financial crimes” (Freeman, 2011). It is no surprise that internationally all communities want the battle against money laundering and its use to finance ...


The Significance Of Mongolia's Foreign Policy And Security Apparatus On A Global And Regional Scale, Bolor Lkhaajav 2018 University of San Francisco

The Significance Of Mongolia's Foreign Policy And Security Apparatus On A Global And Regional Scale, Bolor Lkhaajav

Master's Projects and Capstones

Mongolia, land-locked between two politically, economically, and militarily powerful nations — Russia and China — often must balance its foreign and security policies with its two neighbors and countries beyond. When discussing Mongolia’s foreign policy and security apparatus, historians and scholars look at the international relations of East Asia as a whole. This is the case not because Mongolia’s foreign policy is insignificant but because greater powers impose greater influence on smaller states. Mongolia’s partial involvement in World War II (WWII), and the Cold War introduced new challenges as well as opportunities for Mongolia to modernize its foreign policy ...


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D 2018 GJ Software Forensics

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues ...


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac 2018 University of Texas at San Antonio

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed ...


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik 2018 Sam Houston State University

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence ...


Military Justice: A Very Short Introduction (Book Review), Mark Patrick Nevitt 2018 University of Pennsylvania Law School

Military Justice: A Very Short Introduction (Book Review), Mark Patrick Nevitt

Faculty Scholarship at Penn Law

This short essay reviews Professor Eugene Fidell’s recently published book, “Military Justice A Very Short Introduction” (Oxford Press). This book is a welcome addition to military law and military justice literature more generally. Eugene Fidell, a professor at Yale Law School, brings a tremendous breadth of experience as both a scholar and military justice practitioner. He also possesses a keen observational and critical eye to the subject of military justice practiced here and abroad.

The book review first provides an overview of Professor Fidell’s book, its organizational set-up, and where it sits in the broader context of military ...


Cybersecurity And The Rights Of The Internet User In France, Jennifer Cross 2018 Augusta Judicial Circuit Law Office of the Public Defender

Cybersecurity And The Rights Of The Internet User In France, Jennifer Cross

Georgia Journal of International & Comparative Law

No abstract provided.


The School To Deportation Pipeline, Laila L. Hlass 2018 Tulane University

The School To Deportation Pipeline, Laila L. Hlass

Georgia State University Law Review

The United States immigration regime has a long and sordid history of explicit racism, including limiting citizenship to free whites, excluding Chinese immigrants, deporting massive numbers of Mexican immigrants and U.S. citizens of Mexican ancestry, and implementing a national quotas system preferencing Western Europeans. More subtle bias has seeped into the system through the convergence of the criminal and immigration law regimes.

Immigration enforcement has seen a rise in mass immigrant detention and deportation, bolstered by provocative language casting immigrants as undeserving undesirables: criminals, gang members, and terrorists. Immigrant children, particularly black and Latino boys, are increasingly finding themselves ...


The Failure Of International Law In Palestine, Svetlana Sumina, Steven Gilmore 2018 St. Mary's University School of Law

The Failure Of International Law In Palestine, Svetlana Sumina, Steven Gilmore

The Scholar: St. Mary's Law Review on Race and Social Justice

Abstract forthcoming


Prisoner's Dilemma—Exhausted Without A Place Of Rest(Itution): Why The Prison Litigation Reform Act's Exhaustion Requirement Needs To Be Amended, Ryan Lefkowitz 2018 Syracuse University

Prisoner's Dilemma—Exhausted Without A Place Of Rest(Itution): Why The Prison Litigation Reform Act's Exhaustion Requirement Needs To Be Amended, Ryan Lefkowitz

The Scholar: St. Mary's Law Review on Race and Social Justice

The Prison Litigation Reform Act (PLRA) passed in 1996 in an effort to curb litigation from prisoners. The exhaustion requirement of the PLRA requires prisoners to fully exhaust any administrative remedies available to them before filing a lawsuit concerning any aspect of prison life. If a prisoner fails to do so, the lawsuit is subject to dismissal. The exhaustion requirement applies to all types of prisoner lawsuits, from claims filed for general prison conditions to excessive force and civil rights violations. It has been consistently and aggressively applied by the courts, blocking prisoners’ lawsuits from ever going to trial. Attempts ...


Entering The Trump Ice Age: Contextualizing The New Immigration Enforcement Regime, Bill Ong Hing 2018 University of San Francisco

Entering The Trump Ice Age: Contextualizing The New Immigration Enforcement Regime, Bill Ong Hing

Texas A&M Law Review

During the early stages of the Trump ICE age, America seemed to be witnessing and experiencing an unparalleled era of immigration enforcement. But is it unparalleled? Did we not label Barack Obama the “deporter-inchief?” Was it not George W. Bush who used the authority of the Patriot Act to round up nonimmigrants from Muslim and Arab countries, and did his ICE not commonly engage in armed raids at factories and other worksites? Are there not strong parallels that can be drawn between Trump enforcement plans and actions and those of other eras? What about the fear and hysteria that seems ...


Civil Liberty And National Security: The Implications Of The Debate For The United States Intelligence Community, Peyton Hedrick 2018 Liberty University

Civil Liberty And National Security: The Implications Of The Debate For The United States Intelligence Community, Peyton Hedrick

Senior Honors Theses

For years, the US Intelligence Community has worked to maintain the thin and often wavering line between civil liberty and national security in its attempts to protect the American people while simultaneously preserving their constitutional rights. However, this line has often shifted with the course of American history, including events such as the Alien and Sedition Acts, the establishment of the Church Committee, and the publication of the NSA’s data collection program. One of the most significant of these factors was the passage and eventual amendment of the Foreign Intelligence Surveillance Act, which opened the door to later constitutional ...


"Thou Shalt Not Ration Justice": The Importance Of Autism Insurance Reform For Military Autism Families, And The Economic And National Security Implications Of Improving Access To Aba Therapy Under Tricare, Ariana Cernius 2018 Notre Dame Law School

"Thou Shalt Not Ration Justice": The Importance Of Autism Insurance Reform For Military Autism Families, And The Economic And National Security Implications Of Improving Access To Aba Therapy Under Tricare, Ariana Cernius

Journal of Legislation

No abstract provided.


Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo 2018 Department of Physics, University of Nairobi, Kenya

Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo

International Journal of Nuclear Security

Nuclear energy’s distinctive characteristics give rise to special educational requirements. These requirements are necessary to not only address the danger of nuclear proliferation, but also to build capacity for a secure nuclear fuel circle. In this paper, I assess the status of educational capacity in nuclear security both in response to, and in support of, Kenya’s nuclear power program. I highlight the nuclear security educational infrastructure’s key features in the context of nuclear power, noting the low capacity at Kenyan universities. I identify the steps required to ensure that the country’s dynamic nuclear regulatory infrastructural framework ...


Terrorism Risk Insurance: Is It Really Working?, Rebecca Demarest 2018 Bryant University

Terrorism Risk Insurance: Is It Really Working?, Rebecca Demarest

Honors Projects in Mathematics

This paper investigates terrorism risk insurance in the United States as well as those programs offered in other countries throughout the world. In the United States, particular attention is devoted to the interaction of government with private insurers to maintain an effective insurance program. An analysis is performed comparing terrorism insurance before and after the attacks on the World Trade Center on September 11, 2001. The paper looks into actual terrorist events that have occurred focusing on 56 world-wide events that are associated with property losses greater than $10 million. This paper not only investigates the losses that were incurred ...


The Fight Over Encryption: Reasons Why Congress Must Block The Government From Compelling Technology Companies To Create Backdoors Into Their Devices, Shannon Lear 2018 Cleveland-Marshall College of Law

The Fight Over Encryption: Reasons Why Congress Must Block The Government From Compelling Technology Companies To Create Backdoors Into Their Devices, Shannon Lear

Cleveland State Law Review

Advances in technology in the past decade have blurred the line between individuals’ privacy rights and the government’s ability to access information. How should this issue be handled in a manner that balances the privacy rights of individuals and the government’s access to information in the interest of national security?

This Note proposes a bright-line rule that would continue to allow the government to obtain specific information from a data service provider without forcing the company to circumvent its own security features. Under this rule, a company shall relinquish specific information in its control or possession only by ...


The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim 2018 Indiana University

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim

Indiana Law Journal

On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept ...


Jurisdiction, The Internet, And The Good Faith Exception: Controversy Over The Government’S Use Of Network Investigative Techniques, Maureen Weidman 2018 Penn State Dickinson Law

Jurisdiction, The Internet, And The Good Faith Exception: Controversy Over The Government’S Use Of Network Investigative Techniques, Maureen Weidman

Dickinson Law Review

In February 2015, the FBI discovered a website dedicated to child pornography located on the Tor Network, a network designed to protect its users’ identities on the Internet. Due to the structure of the Tor Network, the FBI could not take down the website and identify users who previously accessed the website. Instead, the FBI kept the website operational for 30 days and applied for a search warrant in the Eastern District of Virginia to use a device called a Network Investigative Technique (“NIT”). This device operated similarly to malware and “attached” to computers accessing the website, allowing the government ...


Contemporary Practice Of The United States Relating To International Law (112:2 Am J Int'l L), Jean Galbraith 2018 University of Pennsylvania Law School

Contemporary Practice Of The United States Relating To International Law (112:2 Am J Int'l L), Jean Galbraith

Faculty Scholarship at Penn Law

This article is reproduced with permission from the April 2018 issue of the American Journal of International Law © 2018 American Society of International Law. All rights reserved.

Once the PDF is open, individual articles are accessible either by scrolling down or by clicking on the bookmark symbol.


Digital Commons powered by bepress