Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1901 Full-Text Articles 1595 Authors 886959 Downloads 114 Institutions

All Articles in National Security Law

Faceted Search

1901 full-text articles. Page 6 of 63.

The European Union And The Outer Space Treaty: Will The Twain Ever Meet?, Frans G. von der Dunk 2017 University of Nebraska College of Law

The European Union And The Outer Space Treaty: Will The Twain Ever Meet?, Frans G. Von Der Dunk

Space, Cyber, and Telecommunications Law Program Faculty Publications

In spite of the envisaged Brexit and other crises and problems currently threatening the European Union (EU), that half-way house between a group of cooperating states and a single quasi-federal union of states remains an important player in today’s world, also – at least from a bird’s eye view – in terms of outer space. Its member states Germany and France have the largest space budgets of all European states (discounting the Russian Federation as a European state), and the European flagship projects Galileo and Copernicus, with the European Commission on behalf of the Union in the driver’s seat ...


The Second African National Space Law: The Nigerian Nasrda Act And The Draft Regulations On Licensing And Supervision, Frans G. von der Dunk 2017 University of Nebraska-Lincoln

The Second African National Space Law: The Nigerian Nasrda Act And The Draft Regulations On Licensing And Supervision, Frans G. Von Der Dunk

Space, Cyber, and Telecommunications Law Program Faculty Publications

The number of countries with more or less comprehensive national space legislation addressing in particular the authorization and supervision of private space activities continues to grow, and several more countries are currently in the process of adding themselves to that list. One of the more recent and most interesting ones among them is Nigeria, as the second African country after South Africa and—after Brazil—the second leading spacefaring nation from the developing world, to draft, further to a fairly recently established succinct framework law, a set of regulations addressing precisely those issues.

The paper briefly recaps the underlying international ...


Nsst 475: Security In The 21st Century—A Peer Review Of Teaching Project Benchmark Portfolio, Tyler R. White 2017 University of Nebraska - Lincoln

Nsst 475: Security In The 21st Century—A Peer Review Of Teaching Project Benchmark Portfolio, Tyler R. White

UNL Faculty Course Portfolios

This benchmark course portfolio is the culmination of a year’s long planning and execution process to improve an existing capstone course NSST 475. This course has two goals: to teach students about subject matter and to expose them to structured analytic techniques (SATs) before they graduate. This course is a minor capstone which means that the students come from a diverse set of disciplinary backgrounds. I targeted two course objectives to examine for this project with the intention of employing backward course design to think through what students should be learning and how I can improve that process. This ...


Contemporary Practice Of The United States Relating To International Law, Daugirdas Kristina, Julian Davis Mortenson 2017 University of Michigan Law School

Contemporary Practice Of The United States Relating To International Law, Daugirdas Kristina, Julian Davis Mortenson

Articles

In this section: • Congress Overrides Obama’s Veto to Pass Justice Against Sponsors of Terrorism Act • U.S. Federal Court of Appeals Upholds United Nations’ Immunity in Case Related to Cholera in Haiti • U.S.-Russian Agreements on Syria Break Down as the Syrian Conflict Continues • Russia Suspends Bilateral Agreement with United States on Disposal of Weapons-Grade Plutonium • The United States Makes Payment to Family of Italian Killed in CIA Air Strike • United States Ratifies Hague Convention on the International Recovery of Child Support and Other Forms of Family Maintenance


Averting A New Nuclear Arms Race, Michael Anthony Calhoun 2017 Ouachita Baptist University

Averting A New Nuclear Arms Race, Michael Anthony Calhoun

Honors Theses

The first goal of this thesis is to defend the claim that working towards nuclear disarmament is a rational, ethically pressing, and urgent goal. I will parse, condense, and array the arguments of statesmen, military leaders, philosophers, peace advocates, scientists, and religious leaders against the continued production, modernization, and maintaining of nuclear arsenals. After this, I will examine the current challenges to nuclear disarmament and promising and pragmatic options on the way to a world without nuclear weapons, with a focus on United States’ policy.


Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As Critical Infrastructure Under The United States Code, Allaire M. Monticollo 2017 University of Richmond

Protecting America's Elections From Foreign Tampering: Realizing The Benefits Of Classifying Election Infrastructure As Critical Infrastructure Under The United States Code, Allaire M. Monticollo

Law Student Publications

In just the past five years, the United States has suffered numerous hacks into important entities and institutions across the country by ill-intentioned actors. Private companies and government agencies alike have felt the negative impacts of security breaches by hackers infiltrating proprietary and protected systems. Even the United States political landscape has proven vulnerable to bad actors in the realm of cyber security. Furthermore, analysts have attributed some of the most recent highly publicized hacks to state-sponsored groups. As cyber security threats and opportunities for foreign hackers to infiltrate critical systems become more prevalent, it is natural to wonder where ...


Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D. 2017 United States Air Force

Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.

Journal of Aviation/Aerospace Education & Research

Currently, U.S. air carriers do not provide equipment or training necessary to mitigate the risk posed by surface-to-air fire (SAFIRE) threats. These threats consist of self-guided weapons (infrared shoulder-fired surface-to-air missiles), manually-aimed threats (small arms, recoilless grenade launchers, rockets, and light anti-aircraft artillery), and hand-held lasers. Technological solutions to counter infrared shoulder-fired missiles have been explored, but were rejected due to prohibitive equipment and maintenance costs. A lower cost option, providing air-carrier pilots with SAFIRE risk-reduction training, has not been formally addressed by the air-carrier industry or the U.S. federal government. This effort will use a business concept ...


Government Speech And The War On Terror, Helen Norton 2017 University of Colorado Law School

Government Speech And The War On Terror, Helen Norton

Articles

The government is unique among speakers because of its coercive power, its substantial resources, its privileged access to national security and intelligence information, and its wide variety of expressive roles as commander-in-chief, policymaker, educator, employer, property owner, and more. Precisely because of this power, variety, and ubiquity, the government's speech can both provide great value and inflict great harm to the public. In wartime, more specifically, the government can affirmatively choose to use its voice to inform, inspire, heal, and unite -- or instead to deceive, divide, bully, and silence.

In this essay, I examine the U.S. government's ...


Investigative Journalism And Counter Terrorism Laws, Clive Walker 2017 University of Leeds

Investigative Journalism And Counter Terrorism Laws, Clive Walker

Notre Dame Journal of Law, Ethics & Public Policy

Since terrorism is now perceived as a primary and pervasive threat to state security, many states have adopted broad legal definitions of “terrorism” and, upon that basis, have enacted correspondingly expansive policing powers and criminal offences. As a dramatic instance of how these approaches, which affect major Western jurisdictions such as the U.S. and U.K., this paper will focus on the paradigm case of David Miranda. In August 2013, Miranda was transporting computer materials (including files from security agencies) supplied by Edward Snowden, a former contractor with the U.S. National Security Agency, to journalist Glenn Greenwald to ...


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski 2017 University of Colorado Law School

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Articles

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis ...


The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler 2017 Indiana University Maurer School of Law

The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Lawfare 101: A Primer, Charles J. Dunlap Jr. 2017 Duke Law School

Lawfare 101: A Primer, Charles J. Dunlap Jr.

Faculty Scholarship

Dunlap discusses the concept of lawfare—using law as a form of asymmetrical warfare—and provides some considerations for how to combat this phenomenon. The article establishes the intellectual framework and thematic direction for this Issue of Military Review.


"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr. 2017 Duke Law School

"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr.

Faculty Scholarship

If experts say a "malicious [cyber] code"' has "similar effects" to a "physical bomb,"' and that code actually causes "a stunning breach of global internet stability," is it really accurate to call that event merely an instance of a "cyber attack"?

Moreover, can you really expect to deter state and non-state actors from employing such code and similarly hostile cyber methodologies if all they think that they are risking is being labeled as a cyber-vandal subject only to law enforcement measures? Or might they act differently if it were made clear to them that such activity is considered an "armed ...


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall 2016 Institute of Nuclear Security, University of Tennessee - Knoxville

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights core ...


Table Of Contents, 2016 University of Tennessee, Knoxville

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan 2016 Middlebury Institute of International Studies (MIIS)

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor, 2016 University of Tennessee, Knoxville

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene 2016 Advanced Technology Insights, LLC (ATI)

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame 2016 University of Tennessee

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult ...


Student Competition Cover, 2016 University of Tennessee, Knoxville

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Digital Commons powered by bepress