Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1792 Full-Text Articles 1539 Authors 815077 Downloads 108 Institutions

All Articles in National Security Law

Faceted Search

1792 full-text articles. Page 57 of 59.

Intelligence And Its Role In Protecting Against Terrorism, Richard J. Hughbank, Don Githens 2010 HALO Corporation and U.S. Army

Intelligence And Its Role In Protecting Against Terrorism, Richard J. Hughbank, Don Githens

Journal of Strategic Security

The art and science of gathering critical operational intelligence has been defined in many ways and is beyond our needs for this writing. Throughout the course of history, many wars have been fought depending heavily on various forms of intelligence. During our most recent actions in the War on Terror, intelligence analysis has played a critical role in both offensive and defensive operations in Iraq and Afghanistan. With such varying fact-finding techniques available and utilized in the defense of our country, it has become an arduous task to collect, decipher, package, prioritize, disseminate, and act upon everything that comes down ...


Toward A New Trilateral Strategic Security Relationship: United States, Canada, And Mexico, Richard J. Kilroy, Jr., Abelardo Rodríguez Sumano, Todd S. Hataley 2010 Virginia Military Institute

Toward A New Trilateral Strategic Security Relationship: United States, Canada, And Mexico, Richard J. Kilroy, Jr., Abelardo Rodríguez Sumano, Todd S. Hataley

Journal of Strategic Security

The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11) is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border"). The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very ...


Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby 2010 U.S. Army

Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby

Journal of Strategic Security

President Bill Clinton's Secretary of Defense, William Cohen, once stated that the post-Cold War world of the 1990s was a "paradox [where] American military superiority actually increase[d] the threat of... attack against [the U.S.] by creating incentives for adversaries to challenge us asymmetrically." He was alluding to the fact that the Cold War's closure was supposed to bring about a situation that encouraged peace, nation-building, and unilateral comfort for the United States. The reality that America has come to know is quite different, and some might even argue that, given the option, many people would return ...


Book Reviews, Timothy Hsia, Sheldon Greaves, Donald J. Goldstein 2010 Henley-Putnam University

Book Reviews, Timothy Hsia, Sheldon Greaves, Donald J. Goldstein

Journal of Strategic Security

No abstract provided.


Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter 2010 Green Mountain College and United States Marine Corps

Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter

Journal of Strategic Security

Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this ...


Cover & Front Matter, 2010 University of South Florida

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Rhetoric To Reality: Citizenship Delays And U.S. International Obligations In The Post-9/11 Landscape, Clifford Ashcroft-Smith 2010 Washington and Lee University School of Law

Rhetoric To Reality: Citizenship Delays And U.S. International Obligations In The Post-9/11 Landscape, Clifford Ashcroft-Smith

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


Torture And Public Policy: Mohamed V. Jeppesen Dataplan, Inc., Allows “Extraordinary Rendition” Victims To Litigate Around State Secrets Doctrine , Michael P. Jensen 2010 Brigham Young University Law School

Torture And Public Policy: Mohamed V. Jeppesen Dataplan, Inc., Allows “Extraordinary Rendition” Victims To Litigate Around State Secrets Doctrine , Michael P. Jensen

BYU Law Review

No abstract provided.


"Undead" Wartime Cases: Stare Decisis And The Lessons Of History, Harlan G. Cohen 2010 University of Georgia

"Undead" Wartime Cases: Stare Decisis And The Lessons Of History, Harlan G. Cohen

Scholarly Works

References to the “lessons of history” are ubiquitous in law. Nowhere has this been more apparent than in recent debates over U.S. counterterrorism policy. In response to the Bush Administration’s reliance on World War II-era decisions - Johnson v. Eisentrager, Ex Parte Quirin, Hirota v. MacArthur, and In re Yamashita - opponents have argued that these decisions have been rejected by the “lessons of history.” They argue that the history of wartime cases is one marked by executive aggrandizement, panic-driven attacks on civil liberties, and overly quiescent courts - none of which should be repeated.

But what does it really mean ...


The State Secrets Privilege In The Post-9/11 Era, 30 Pace L. Rev. 778 (2010), Steven D. Schwinn 2010 John Marshall Law School

The State Secrets Privilege In The Post-9/11 Era, 30 Pace L. Rev. 778 (2010), Steven D. Schwinn

Faculty Scholarship

No abstract provided.


John Brown's Constitution, Robert L. Tsai 2010 Boston College Law School

John Brown's Constitution, Robert L. Tsai

Boston College Law Review

It will surprise many Americans to learn that before John Brown and his men briefly captured Harpers Ferry, they authored and ratified a Provisional Constitution. This deliberative act built upon the achievements of the group to establish a Free Kansas, during which time Brown penned an analogue to the Declaration of Independence. These writings, coupled with Brown’s trial tactics after his arrest, cast doubts on claims that the man was a lunatic or on a suicide mission. Instead, they suggest that John Brown aimed to be a radical statesman, one who turned to extreme tactics but nevertheless remained committed ...


When Due Process Concerns Become Dangerous: The Security Council's 1267 Regime And The Need For Reform, Jared Genser, Kate Barth 2010 Boston College Law School

When Due Process Concerns Become Dangerous: The Security Council's 1267 Regime And The Need For Reform, Jared Genser, Kate Barth

Boston College International and Comparative Law Review

The United Nations Security Council adopted Resolution 1267 in 1999 in response to rising apprehension of a surge of terrorist activity within Afghan territory. Notably, the Sanctions Committee charged with enforcing the Resolution provisions did not impose asset freezes, arms prohibitions, or travel bans on entire nations suspected of supporting the Taliban. The 1267 regime instead subjected individuals and entities to these sanctions. Based on information provided by U.N. member states, such targets found themselves on the Security Council’s terrorist “blacklist,” known as the Consolidated List. The targets were neither warned of this listing nor afforded a method ...


Developing U.S. Nuclear Weapons Policy And International Law: The Approach Of The Obama Administration, Winston P. Nagan, Erin K. Slemmens 2010 University of Florida Levin College of law

Developing U.S. Nuclear Weapons Policy And International Law: The Approach Of The Obama Administration, Winston P. Nagan, Erin K. Slemmens

UF Law Faculty Publications

Prior U.S. presidential administrations have developed and adhered to the nuclear weapons policy of nuclear deterrence. This policy was largely conditioned by the Cold War and the fact that the U.S. Cold War adversary was a major threat to U.S. security because of its nuclear capability. The policy of nuclear deterrence worked on the principle of mutually assured destruction. It appears to have had the effect of discouraging recourse to nuclear weapons as instruments of war. It has also been generally perceived as a position that has an uneasy relationship with conventional international law. Even before entering ...


Classification Of Participants In Suicide Attacks And The Implications Of This Classification On The Severity Of The Sentence: The Israeli Experience In The Military Courts In Judea And Samaria As A Model To Other Nations, Amit Preiss, Chagai D. Vinizky 2010 Sha'arei Mishpat College of Law

Classification Of Participants In Suicide Attacks And The Implications Of This Classification On The Severity Of The Sentence: The Israeli Experience In The Military Courts In Judea And Samaria As A Model To Other Nations, Amit Preiss, Chagai D. Vinizky

Pace Law Review

No abstract provided.


Responses To The Ten Questions, Joshua L. Dratel 2010 Mitchell Hamline School of Law

Responses To The Ten Questions, Joshua L. Dratel

William Mitchell Law Review

No abstract provided.


Responses To The Ten Questions, John Ip 2010 Mitchell Hamline School of Law

Responses To The Ten Questions, John Ip

William Mitchell Law Review

No abstract provided.


Responses To The Ten Questions, Robert Knowles 2010 Mitchell Hamline School of Law

Responses To The Ten Questions, Robert Knowles

William Mitchell Law Review

No abstract provided.


Responses To The Ten Questions, Edward B. MacMahon Jr. 2010 Mitchell Hamline School of Law

Responses To The Ten Questions, Edward B. Macmahon Jr.

William Mitchell Law Review

No abstract provided.


Responses To The Ten Questions, Wayne McCormack 2010 Mitchell Hamline School of Law

Responses To The Ten Questions, Wayne Mccormack

William Mitchell Law Review

No abstract provided.


Responses To The Ten Questions, John T. Parry 2010 Mitchell Hamline School of Law

Responses To The Ten Questions, John T. Parry

William Mitchell Law Review

No abstract provided.


Digital Commons powered by bepress