Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1808 Full-Text Articles 1550 Authors 815077 Downloads 108 Institutions

All Articles in National Security Law

Faceted Search

1808 full-text articles. Page 4 of 60.

Transforming Election Cybersecurity, David P. Fidler 2017 Indiana University Maurer School of Law

Transforming Election Cybersecurity, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As Critical Infrastructure Under The United States Code, Allaire M. Monticollo 2017 University of Richmond

Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As Critical Infrastructure Under The United States Code, Allaire M. Monticollo

Law Student Publications

In just the past five years, the United States has suffered numerous hacks into important entities and institutions across the country by ill-intentioned actors. Private companies and government agencies alike have felt the negative impacts of security breaches by hackers infiltrating proprietary and protected systems. Even the United States political landscape has proven vulnerable to bad actors in the realm of cyber security. Furthermore, analysts have attributed some of the most recent highly publicized hacks to state-sponsored groups. As cyber security threats and opportunities for foreign hackers to infiltrate critical systems become more prevalent, it is natural to wonder where ...


The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook 2017 American University Washington College of Law

The New Fisa Court Amicus Should Be Able To Ignore Its Congressionally Imposed Duty, Ben Cook

American University Law Review

No abstract provided.


The Mental Health Of Our National Security: Protecting The Minds That Protect The Homeland, Alan Wehbé 2017 American University Washington College of Law

The Mental Health Of Our National Security: Protecting The Minds That Protect The Homeland, Alan Wehbé

American University National Security Law Brief

No abstract provided.


Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou 2017 American University Washington College of Law

Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou

American University National Security Law Brief

No abstract provided.


Strengthen Section 702: A Critical Intelligence Tool Vital To The Protection Of Our Country, Deborah Samuel Sills 2017 American University Washington College of Law

Strengthen Section 702: A Critical Intelligence Tool Vital To The Protection Of Our Country, Deborah Samuel Sills

American University National Security Law Brief

No abstract provided.


Contemporary Practice Of The United States Relating To International Law, Daugirdas Kristina, Julian Davis Mortenson 2017 University of Michigan Law School

Contemporary Practice Of The United States Relating To International Law, Daugirdas Kristina, Julian Davis Mortenson

Articles

In this section: • Congress Overrides Obama’s Veto to Pass Justice Against Sponsors of Terrorism Act • U.S. Federal Court of Appeals Upholds United Nations’ Immunity in Case Related to Cholera in Haiti • U.S.-Russian Agreements on Syria Break Down as the Syrian Conflict Continues • Russia Suspends Bilateral Agreement with United States on Disposal of Weapons-Grade Plutonium • The United States Makes Payment to Family of Italian Killed in CIA Air Strike • United States Ratifies Hague Convention on the International Recovery of Child Support and Other Forms of Family Maintenance


Fueling The Terrorist Fires With The First Amendment: Religious Freedom, The Anti-Lgbt Right, And Interest Convergence Theory, Kyle C. Velte 2017 Brooklyn Law School

Fueling The Terrorist Fires With The First Amendment: Religious Freedom, The Anti-Lgbt Right, And Interest Convergence Theory, Kyle C. Velte

Brooklyn Law Review

This article argues that there is a connection between formal equality for LGBT Americans and the United States’ foreign policy and national security interests. It makes that connection utilizing Professor Derek Bell’s interest convergence paradigm. It argues that the new agenda of the American Religious Right is one that seeks to assert quasi-theocratic and anti-Establishment positions in litigation as well as in its promulgation of anti-LGBT laws. This agenda is cloaked in the garb of “religious freedom,” but the Religious Right’s definition of “religious freedom” is one that runs counter to our long-standing understanding of that principle as ...


Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D. 2017 United States Air Force

Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.

Journal of Aviation/Aerospace Education & Research

Currently, U.S. air carriers do not provide equipment or training necessary to mitigate the risk posed by surface-to-air fire (SAFIRE) threats. These threats consist of self-guided weapons (infrared shoulder-fired surface-to-air missiles), manually-aimed threats (small arms, recoilless grenade launchers, rockets, and light anti-aircraft artillery), and hand-held lasers. Technological solutions to counter infrared shoulder-fired missiles have been explored, but were rejected due to prohibitive equipment and maintenance costs. A lower cost option, providing air-carrier pilots with SAFIRE risk-reduction training, has not been formally addressed by the air-carrier industry or the U.S. federal government. This effort will use a business concept ...


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski 2017 University of Colorado Law School

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Articles

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis ...


Lawfare 101: A Primer, Charles J. Dunlap Jr. 2017 Duke Law School

Lawfare 101: A Primer, Charles J. Dunlap Jr.

Faculty Scholarship

Dunlap discusses the concept of lawfare—using law as a form of asymmetrical warfare—and provides some considerations for how to combat this phenomenon. The article establishes the intellectual framework and thematic direction for this Issue of Military Review.


"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr. 2017 Duke Law School

"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr.

Faculty Scholarship

If experts say a "malicious [cyber] code"' has "similar effects" to a "physical bomb,"' and that code actually causes "a stunning breach of global internet stability," is it really accurate to call that event merely an instance of a "cyber attack"?

Moreover, can you really expect to deter state and non-state actors from employing such code and similarly hostile cyber methodologies if all they think that they are risking is being labeled as a cyber-vandal subject only to law enforcement measures? Or might they act differently if it were made clear to them that such activity is considered an "armed ...


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall 2016 Institute of Nuclear Security, University of Tennessee - Knoxville

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights core ...


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame 2016 University of Tennessee

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult ...


Table Of Contents, 2016 University of Tennessee, Knoxville

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor, 2016 University of Tennessee, Knoxville

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene 2016 Advanced Technology Insights, LLC (ATI)

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Student Competition Cover, 2016 University of Tennessee, Knoxville

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed 2016 University of Dhaka

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen 2016 Korea Advanced Institute of Science and Technology

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Digital Commons powered by bepress