Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1,972 Full-Text Articles 1,642 Authors 886,959 Downloads 123 Institutions

All Articles in National Security Law

Faceted Search

1,972 full-text articles. Page 4 of 65.

Plata O Plomo: Effect Of Mexican Transnational Criminal Organizations On The American Criminal Justice System, Mark M. McPherson 2018 St. Mary's University School of Law

Plata O Plomo: Effect Of Mexican Transnational Criminal Organizations On The American Criminal Justice System, Mark M. Mcpherson

St. Mary's Law Journal

Abstract forthcoming


Finality Of A Conviction: A Noncitizen's Right To Procedural Due Process, Daniela Mondragon 2018 St. Mary's University

Finality Of A Conviction: A Noncitizen's Right To Procedural Due Process, Daniela Mondragon

St. Mary's Law Journal

Abstract forthcoming


If War Is Everywhere, Then Must The Law Be Nowhere?, Alexander K.A. Greenawalt 2018 Elisabeth Haub School of Law at Pace University

If War Is Everywhere, Then Must The Law Be Nowhere?, Alexander K.A. Greenawalt

Pace Law Faculty Publications

This response focuses on one of the most difficult questions posed by Rosa Brooks's How Everything Became War and the Military Became Everything: How should the erosion of the war / peace dichotomy impact the justifications for the use of lethal force by the United States government and what, if any, role is there for law in this context? While Brooks is unambiguously critical of Bush administration legal policies that asserted expansive executive war powers, she is less certain about the Obama administration's own reliance on the war paradigm to justify its targeted killing policies. While describing these policies ...


Treason And Terror: A Toxic Brew, B. Mitchell Simpson III 2018 Roger Williams University School of Law

Treason And Terror: A Toxic Brew, B. Mitchell Simpson Iii

Roger Williams University Law Review

No abstract provided.


What's So Great About The Declare War Clause?, Matthew C. Waxman 2018 Columbia Law School

What's So Great About The Declare War Clause?, Matthew C. Waxman

Faculty Scholarship

I have long believed two things about constitutional war powers, which my reading of Noah Feldman’s “The Three Lives of James Madison” largely confirmed. First, James Madison was brilliant and prescient about many things, but the strategy and politics of war were not among them. Second, modern constitutional critics of an imperial presidency place too much weight on the declare war clause — and especially Madison’s statements about it. Madison, indeed, worried deeply about unchecked presidential war powers. But Feldman’s book shows that Madison did not emphasize the same risks and checks so often ascribed to him today ...


Bureaucratic Resistance And The National Security State, Rebecca Ingber 2018 Boston University

Bureaucratic Resistance And The National Security State, Rebecca Ingber

Faculty Scholarship

Modern accounts of the national security state tend toward one of two opposing views of bureaucratic tensions within it: At one extreme, the executive branch bureaucracy is a shadowy “deep state,” unaccountable to the public or even to the elected President. On this account, bureaucratic obstacles to the President’s agenda are inherently suspect, even dangerous. At the other end, bureaucratic resistance to the President represents a necessary benevolent constraint on an otherwise imperial executive, the modern incarnation of the separation of powers, as the traditional checks on the President of the courts and Congress have fallen down on the ...


Neutrality And Outer Space, Wolff Heintschel von Heinegg 2017 Europa-Universität Viadrina, Frankfurt (Oder), Germany

Neutrality And Outer Space, Wolff Heintschel Von Heinegg

International Law Studies

This article discusses the law of neutrality as it pertains to belligerent operations in and through outer space as well as belligerent outer space operations involving the territory and national airspace of neutral States. As far as the latter is concerned, the traditional law of neutrality is fully applicable. Accordingly, international law prohibits belligerents from launching space objects from neutral territory or through neutral national airspace. While neutral States may not provide belligerents with outer space assets or the use of communications infrastructure located in their territories, they are not obliged to prevent their nationals from providing any of the ...


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson 2017 Plymouth Hospitals NHS Trust

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological ...


Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté 2017 Somos Environmental Protection Ltd.

Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté

International Journal of Nuclear Security

The use of radioactive sources is expanding all over the world and abreast the necessity of the enhancement of its safe and secure application is increasing too. In the nuclear industry, the safety and security are top priorities since decades. They share the same goal, to protect humans from the negative affect of the ionizing radiation. The human component of them is a significant factor and technical solutions can protect us so far and thus the culture for safety and security become a major focus. On the other hand, there are still some contradiction between recommendations and international guidance of ...


The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf 2017 Faculty of Sciences University Ibn Tofail

The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf

International Journal of Nuclear Security

Nowadays, a security regime for protecting nuclear and radiological material—providing an intelligent national regulatory institution and establishing national security laws—is necessary in order for a state to ensure security of nuclear and radiological materials used within its borders.

This paper focuses on discussing the opportunities and challenges facing the future of nuclear security after the creation of the new Moroccan Agency of Nuclear and Radiological Safety and Security.


Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison 2017 College of William & Mary Law School

Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison

William & Mary Bill of Rights Journal

When the government investigates a crime, do citizens have a duty to assist? This question was raised in the struggle between Apple and the FBI over whether the agency could compel Apple to defeat its own password protections on the iPhone of one of the San Bernardino shooters. That case was voluntarily dismissed as moot when the government found a way of accessing the data on the phone, but the issue remains unresolved.

Because of advances in technology, software providers and device makers have been able to develop almost impenetrable protection for their customers’ information, effectively locking law enforcement out ...


The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey Kahn 2017 College of William & Mary Law School

The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey Kahn

William & Mary Bill of Rights Journal

Terry v. Ohio’s “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism ...


Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn 2017 College of William & Mary Law School

Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn

William & Mary Bill of Rights Journal

No abstract provided.


Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu 2017 College of William & Mary Law School

Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu

William & Mary Bill of Rights Journal

This Essay describes emerging big data technologies that facilitate horizontal cybersurveillance. Horizontal cybersurveillance makes possible what has been termed as “sentiment analysis.” Sentiment analysis can be described as opinion mining and social movement forecasting. Through sentiment analysis, mass cybersurveillance technologies can be deployed to detect potential terrorism and state conflict, predict protest and civil unrest, and gauge the mood of populations and subpopulations. Horizontal cybersurveillance through sentiment analysis has the likely result of chilling expressive and associational freedoms, while at the same time risking mass data seizures and searches. These programs, therefore, must be assessed as adversely impacting a combination ...


What About Small Businesses? The Gdpr And Its Consequences For Small U.S.-Based Companies, Craig McAllister 2017 Brooklyn Law School

What About Small Businesses? The Gdpr And Its Consequences For Small U.S.-Based Companies, Craig Mcallister

Brooklyn Journal of Corporate, Financial & Commercial Law

Fast-approaching changes to European data privacy law will have consequences around the globe. Historically, despite having dramatically different approaches to data privacy and data protection, the European Union and the United States developed a framework to ensure that the highspeed freeway that is transatlantic data transfer moved uninterrupted. That framework was overturned in the wake of revelations regarding U.S. surveillance practices, and amidst skepticism that the United States did not adequately protect personal data. Further, the European Union enacted the General Data Protection Regulation (GDPR), a sweeping overhaul of the legal data protection landscape that will take effect in ...


Indeterminacy In The Law Of War: The Need For An International Advisory Regime, Ariel Zemach 2017 Brooklyn Law School

Indeterminacy In The Law Of War: The Need For An International Advisory Regime, Ariel Zemach

Brooklyn Journal of International Law

Indeterminacy in the law of war exacts a severe humanitarian toll, and it is not likely to be reduced by the conclusion of additional treaties. The present article argues that the adverse consequences of this indeterminacy may be mitigated through a U.N. Security Council (SC) action establishing an international advisory regime and using the broad powers of the SC to provide incentives for states to subscribe to this regime voluntarily. States subscribing to the advisory regime (“operating states”) would undertake to follow the interpretation of the law of war laid out by international legal advisors. The advisory regime would ...


The Scrivener’S Secrets Seen Through The Spyglass: Gchq And The International Right To Journalistic Expression, Matthew B. Hurowitz 2017 Brooklyn Law School

The Scrivener’S Secrets Seen Through The Spyglass: Gchq And The International Right To Journalistic Expression, Matthew B. Hurowitz

Brooklyn Journal of International Law

As part of the U.K.’s electronic surveillance program, the Government Communications Headquarters (GCHQ), started in 1909 to combat German Spies, now collects metadata from both foreigners and its own citizens. Through the express statutory authority of the Regulation of Investigatory Powers Act of 2000 (RIPA), and a loophole in section 94 of the Telecommunications Act of 1984, the GCHQ collects metadata, which is all of the information that is extrinsic to the actual contents of a communication. The GCHQ can request an authorization from a public authority—a member of its own staff—to collect traffic data, service ...


A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller 2017 Washington & Lee University School of Law

A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller

Russell A. Miller

Germany is widely regarded as a global model for the privacy protection its constitutional regime offers against intrusive intelligence-gathering and law enforcement surveillance. There is some basis for Germany’s privacy “exceptionalism,” especially as the text of the German Constitution (“Basic Law”) provides explicit textual protections that America’s Eighteenth Century Constitution lacks. The German Federal Constitutional Court has added to those doctrines with an expansive interpretation of the more general rights to dignity (Basic Law Article 1) and the free development of one’s personality (Basic Law Article 2). This jurisprudence includes constitutional liberty guarantees such as the absolute ...


Individual, Not Collective: Justifying The Resort To Force Against Members Of Non-State Armed Groups, Anthony Dworkin 2017 European Council on Foreign Relations

Individual, Not Collective: Justifying The Resort To Force Against Members Of Non-State Armed Groups, Anthony Dworkin

International Law Studies

This article proposes an alternative to the conventional way of deciding when a State may target or detain members of an armed group. Instead of asking whether there is an armed conflict between the State and the group, this article argues that we should look at the State’s justification for the use of force against the group or its members. In a non-international context, this justification is rooted in human rights law. For this reason, the authorization for the resort to force operates on an individual basis, and the State is only justified in using force against individual members ...


A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller 2017 Washington & Lee University School of Law

A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller

Boston College Law Review

Germany is widely regarded as a global model for the privacy protection its constitutional regime offers against intrusive intelligence-gathering and law enforcement surveillance. There is some basis for Germany’s privacy “exceptionalism,” especially as the text of the German Constitution (“Basic Law”) provides explicit textual protections that America’s Eighteenth Century Constitution lacks. The German Federal Constitutional Court has added to those doctrines with an expansive interpretation of the more general rights to dignity (Basic Law Article 1) and the free development of one’s personality (Basic Law Article 2). This jurisprudence includes constitutional liberty guarantees such as the absolute ...


Digital Commons powered by bepress