Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1,993 Full-Text Articles 1,651 Authors 886,959 Downloads 123 Institutions

All Articles in National Security Law

Faceted Search

1,993 full-text articles. Page 6 of 66.

Open Source: The Enewsletter Of Rwu Law 09-22-2017, Roger Williams University School of Law 2017 Roger Williams University

Open Source: The Enewsletter Of Rwu Law 09-22-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Saving Lives, Shalini Bhargava Ray 2017 University of Alabama School of Law

Saving Lives, Shalini Bhargava Ray

Boston College Law Review

When Alan Kurdi, a Syrian toddler, drowned in the Mediterranean while fleeing civil war in his home country, the world’s attention turned to the Syrian refugee crisis. Offers to transport and house refugees surged. Private boats set out on the Mediterranean Sea to rescue refugees dying in the water. A billionaire offered to purchase an island on which the refugees could live out their lives. This Article analyzes private humanitarian aid to asylum seekers, a subset of migrants whose claims for refugee protection have not yet been filed or adjudicated, and who typically travel without authorization. This Article determines ...


Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School of Law 2017 Roger Williams University

Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Full Supreme Court Stays Ninth Circuit Order On Refugee Assurances, Peter Margulies 2017 Roger Williams University School of Law

Full Supreme Court Stays Ninth Circuit Order On Refugee Assurances, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Toward A Non-Nuclear World: The Npt Regime – Nuclear Disarmament And The Challenge Of A Wmdfz In The Middle East, Sameh Aboul-Enein 2017 University of Tennessee, Knoxville

Toward A Non-Nuclear World: The Npt Regime – Nuclear Disarmament And The Challenge Of A Wmdfz In The Middle East, Sameh Aboul-Enein

International Journal of Nuclear Security

This paper aims to provide a comprehensive overview of various approaches for nuclear disarmament and nonproliferation with the intention of determining how best to promote a Weapons of Mass Destruction Free Zone in the Middle East (MEWMDFZ). Using a qualitative approach, I investigate historical cases of agreements regarding nonproliferation zones and examine the causes for deadlock through both a perusal of historic successes and failures and a review of relevant literature. Particular focus is given to the failure of the NPT Review Conference of 2015. Furthermore, I discuss the importance of role-play simulations and their indications of the need for ...


Ninth Circuit Protects Refugees With Assurances Of Sponsorship, Peter Margulies 2017 Roger Williams University School of Law

Ninth Circuit Protects Refugees With Assurances Of Sponsorship, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James 2017 Horangi

Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James

Journal of Digital Forensics, Security and Law

Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the ...


Warfare As Regulation, Robert Knowles 2017 Valparaiso University Law School

Warfare As Regulation, Robert Knowles

Washington and Lee Law Review

The United States government’s national security activities, including the use of force, consume more than half of all federal discretionary spending and are carried out by the world’s largest bureaucracy. Yet existing scholarship treats these activities as conduct to be regulated, rather than as forms of regulatory action.

This Article introduces a new paradigm for depicting what agencies involved in national security do. It posits that, like other agencies, the national security bureaucracy is best understood to be engaging in regulatory activity—by targeting, detaining, interrogating, and prosecuting enemies; patrolling the border; and conducting surveillance and covert actions ...


Trending @ Rwu Law: Dean Yelnosky's Post: Chelsea Manning, Professor David Coombs, And The "Wikileaks Trial" 08-28-2017, Edward Fitzpatrick, Roger Williams University School of Law 2017 Roger Williams University

Trending @ Rwu Law: Dean Yelnosky's Post: Chelsea Manning, Professor David Coombs, And The "Wikileaks Trial" 08-28-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Law School Blogs

No abstract provided.


The Transformation Of Human Rights Litigation: The Alien Tort Statute, The Anti-Terrorism Act, And Jasta, Stephen J. Schnably 2017 University of Miami School of Law

The Transformation Of Human Rights Litigation: The Alien Tort Statute, The Anti-Terrorism Act, And Jasta, Stephen J. Schnably

University of Miami International and Comparative Law Review

A quarter century ago, the prospects for federal civil litigation of international human rights violations under the Alien Tort Statute (ATS) seemed bright. With the statute’s modern revival, a decade earlier in Filártiga, foreign nationals, often with no recourse in their own countries, had a forum for judicial vindication of a broad range of wrongs by state officials, multinational corporations, and even, in limited circumstances, foreign states themselves. The Supreme Court’s Kiobel decision in 2013, however, may signal the end of the Filártiga revolution, with Congress’s seeming acquiescence: Congress, after all, could amend the ATS if it ...


Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso 2017 University of Massachusetts School of Law

Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso

University of Massachusetts Law Review

As a division of the Federal Bureau of Investigation’s National Security Branch, the Terrorist Screening Center maintains the Terrorist Watchlist, a central database for identifying individuals known or suspected to engage in terrorism or terrorist activities. Subsumed under the Terrorist Watchlist is the No Fly List, which prohibits individuals from boarding commercial aircrafts in and out of the United States. Placement on either list presumes named individuals as a potential threat to U.S. national security, yet there is no restriction preventing them from legally purchasing firearms. Following a mass shooting at an Orlando nightclub in June of 2016 ...


Behavioral Public Choice, U.S. National Security Interests, And Transnational Security Decision Making, David G. Delaney 2017 Indiana University Maurer School of Law

Behavioral Public Choice, U.S. National Security Interests, And Transnational Security Decision Making, David G. Delaney

Indiana Journal of Global Legal Studies

Transnational law both shapes and is shaped by policy decisions of public officials addressing global terrorist threats. These and other interrelated security and human rights concerns challenge executive officials in national governments and international organizations to simultaneously advance the rule of law and pursue other important welfare interests. This Article explores opportunities for transnational executives to improve their work and transnational legal frameworks. It proposes that behavioral insights into decision making and public policy making provide essential lessons for those efforts. The U.S. experience developing new policies to interrogate suspected terrorists following the Al Qaeda attacks of September 2001 ...


Maritime Law Enforcement Operations And Intelligence In An Age Of Maritime Security, Douglas Guilfoyle 2017 Faculty of Law, Monash University

Maritime Law Enforcement Operations And Intelligence In An Age Of Maritime Security, Douglas Guilfoyle

International Law Studies

This article examines maritime law enforcement operations and intelligence activities in the context of maritime security. First describing the role of navies and coast guards in maritime security, this article then explores the relationship between law enforcement operations and actionable intelligence. In particular, it focuses on maritime domain awareness (MDA), and how MDA functions as a form of intelligence. Next, the article discusses maritime domain awareness under international law before looking to the tension between intelligence collection and visit, board, search and seizure (VBSS) operations, both on the high seas and in waters under national jurisdiction. The article closes by ...


A Never Ending State Of Emergency: The Danger Of National Security In Emboldening The Color Line In America, Celeste McCaw 2017 University of Miami Law School

A Never Ending State Of Emergency: The Danger Of National Security In Emboldening The Color Line In America, Celeste Mccaw

University of Miami Race & Social Justice Law Review

No abstract provided.


Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer 2017 Seattle University School of Law

Send Us The Bitcoin Or Patients Will Die: Addressing The Risks Of Ransomware Attacks On Hospitals, Deborah R. Farringer

Seattle University Law Review

Part I of this Article describes how the healthcare industry has arrived in this place of vulnerability, including (1) the history of the movement toward EHRs through HIPAA, (2) HIPAA’s meaningful use regulations and the background of current ransomware attacks, and (3) the distinctions between these attacks and other security breaches that have plagued large insurers and health systems within the last five years. Next, Part II will examine current industry culture when it comes to cybersecurity and review current legal and business approaches to address this growing threat. Then, Part III will argue that, while the current laws ...


The Future Of U.S. Detention Under International Law: Workshop Report, International Committee of the Red Cross (ICRC), Harvard Law School Program on International Law and Armed Conflict (HLS PILAC), Stockton Center for the Study of International Law (U.S. Naval War College) 2017 U.S. Naval War College

The Future Of U.S. Detention Under International Law: Workshop Report, International Committee Of The Red Cross (Icrc), Harvard Law School Program On International Law And Armed Conflict (Hls Pilac), Stockton Center For The Study Of International Law (U.S. Naval War College)

International Law Studies

The International Committee of the Red Cross Regional Delegation for the United States and Canada, the Harvard Law School Program on International Law and Armed Conflict, and the Stockton Center for the Study of International Law at the U.S. Naval War College recently hosted a workshop titled Global Battlefields: The Future of U.S. Detention under International Law. The workshop was designed to facilitate discussion on international law issues pertaining to U.S. detention practices and policies in armed conflict. Workshop participants included members of government, legal experts, practitioners and scholars from a variety of countries. This report attempts ...


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton 2017 Fox Rothschild LLP

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at ...


The Constitution And National Security, Erwin Chemerinsky 2017 Selected Works

The Constitution And National Security, Erwin Chemerinsky

Erwin Chemerinsky

No abstract provided.


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. MacKenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law 2017 Venable LLP

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


The Legacy Of Srebrenica: Potential Consequences Of Reducing Liability For Troop Contributing Countries In Modern Un Peacekeeping Operations, Kelsey Gasseling 2017 Boston College Law School

The Legacy Of Srebrenica: Potential Consequences Of Reducing Liability For Troop Contributing Countries In Modern Un Peacekeeping Operations, Kelsey Gasseling

Boston College International and Comparative Law Review

In 2014 the District Court of The Hague returned its decision in a case concerning peacekeeper (Dutchbat) wrongdoing during the 1995 massacre at Srebrenica, Bosnia-Herzegovina. The district court dismissed the UN as party to the suit, basing this decision on the organization’s statutory immunity from prosecution. As a basis for holding the Netherlands liable for Dutchbat’s actions, the district court utilized the effective control standard. This standard triggered liability for conduct undertaken either under direct order from Dutch officials, or in violation of the mission mandate. The district court strictly interpreted effective control, concluding the Netherlands was liable ...


Digital Commons powered by bepress