Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

1715 Full-Text Articles 1477 Authors 677665 Downloads 106 Institutions

All Articles in National Security Law

Faceted Search

1715 full-text articles. Page 6 of 57.

Applying Grounded Theory Methods To Digital Forensics Research, Ahmed Almarzooqi, Andrew Jones, Richard Howley 2016 Faculty of Technology, De Montfort University

Applying Grounded Theory Methods To Digital Forensics Research, Ahmed Almarzooqi, Andrew Jones, Richard Howley

Annual Conference on Digital Forensics, Security and Law

Deciding on a suitable research methodology is challenging for researchers. In this paper, grounded theory is presented as a systematic and comprehensive qualitative methodology in the emergent field of digital forensics research. This paper applies grounded theory in a digital forensics research project undertaken to study how organisations build and manage digital forensics capabilities. This paper gives a step-by-step guideline to explain the procedures and techniques of using grounded theory in digital forensics research. The paper gives a detailed explanation of how the three grounded theory coding methods (open, axial, and selective coding) can be used in digital forensics research ...


Using Computer Behavior Profiles To Differentiate Between Users In A Digital Investigation, Shruti Gupta, Marcus Rogers 2016 Indiana University Purdue University Indianapolis

Using Computer Behavior Profiles To Differentiate Between Users In A Digital Investigation, Shruti Gupta, Marcus Rogers

Annual Conference on Digital Forensics, Security and Law

Most digital crimes involve finding evidence on the computer and then linking it to a suspect using login information, such as a username and a password. However, login information is often shared or compromised. In such a situation, there needs to be a way to identify the user without relying exclusively on login credentials. This paper introduces the concept that users may show behavioral traits which might provide more information about the user on the computer. This hypothesis was tested by conducting an experiment in which subjects were required to perform common tasks on a computer, over multiple sessions. The ...


Acceleration Of Statistical Detection Of Zero-Day Malware In The Memory Dump Using Cuda-Enabled Gpu Hardware, Igor Korkin, Iwan Nesterow 2016 Independent Researchers, Moscow, Russia

Acceleration Of Statistical Detection Of Zero-Day Malware In The Memory Dump Using Cuda-Enabled Gpu Hardware, Igor Korkin, Iwan Nesterow

Annual Conference on Digital Forensics, Security and Law

This paper focuses on the anticipatory enhancement of methods of detecting stealth software. Cyber security detection tools are insufficiently powerful to reveal the most recent cyber-attacks which use malware. In this paper, we will present first an idea of the highest stealth malware, as this is the most complicated scenario for detection because it combines both existing anti-forensic techniques together with their potential improvements. Second, we will present new detection methods which are resilient to this hidden prototype. To help solve this detection challenge, we have analyzed Windows’ memory content using a new method of Shannon Entropy calculation; methods of ...


Current Challenges And Future Research Areas For Digital Forensic Investigation, David Lillis, Brett A. Becker, Tadhg O’Sullivan, Mark Scanlon 2016 School of Computer Science, University College Dublin, Ireland

Current Challenges And Future Research Areas For Digital Forensic Investigation, David Lillis, Brett A. Becker, Tadhg O’Sullivan, Mark Scanlon

Annual Conference on Digital Forensics, Security and Law

Given the ever-increasing prevalence of technology in modern life, there is a corresponding increase in the likelihood of digital devices being pertinent to a criminal investigation or civil litigation. As a direct consequence, the number of investigations requiring digital forensic expertise is resulting in huge digital evidence backlogs being encountered by law enforcement agencies throughout the world. It can be anticipated that the number of cases requiring digital forensic analysis will greatly increase in the future. It is also likely that each case will require the analysis of an increasing number of devices including computers, smartphones, tablets, cloud-based services, Internet ...


Forensic Analysis Of Ares Galaxy Peer-To-Peer Network, Frank Kolenbrander, Nhien-An Le-Khac, Tahar Kechadi 2016 Politieacademie, The Netherlands

Forensic Analysis Of Ares Galaxy Peer-To-Peer Network, Frank Kolenbrander, Nhien-An Le-Khac, Tahar Kechadi

Annual Conference on Digital Forensics, Security and Law

Child Abuse Material (CAM) is widely available on P2P networks. Over the last decade several tools were made for 24/7 monitoring of peer-to-peer (P2P) networks to discover suspects that use these networks for downloading and distribution of CAM. For some countries the amount of cases generated by these tools is so great that Law Enforcement (LE) just cannot handle them all. This is not only leading to backlogs and prioritizing of cases but also leading to discussions about the possibility of disrupting these networks and sending warning messages to potential CAM offenders. Recently, investigators are reporting that they are ...


Keynote Speaker, Chuck Easttom 2016 Computer Security and Forensics Expert

Keynote Speaker, Chuck Easttom

Annual Conference on Digital Forensics, Security and Law

Conference Keynote Speaker, Chuck Easttom


Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal 2016 George Mason University Law School

Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal

Catholic University Journal of Law and Technology

No abstract provided.


Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa 2016 Catholic University of America, Columbus School of Law

Time To Rethink Cybersecurity Reform: The Opm Data Breach And The Case For Centralized Cybersecurity Infrastructure, Zachary Figueroa

Catholic University Journal of Law and Technology

No abstract provided.


The Legal And Political Implications Of The Nypd's Counterterrorism Operations Overseas: The International Liaison Program, Jia Ma 2016 Dickinson College

The Legal And Political Implications Of The Nypd's Counterterrorism Operations Overseas: The International Liaison Program, Jia Ma

Honors Theses By Year

This paper analyzes one of the New York Police Department’s (“NYPD”) signature international endeavors: the International Liaison Program (“ILP”). It focuses on the political and legal bases for creating and maintaining the ILP. Specifically, the paper examines arguments that the ILP may represent a violation of the U.S. constitutional principles and New York law. The paper illustrates that the existence of the ILP reflects deficiencies of the current state of counterterrorism law in the U.S. and the need to build and perfect the legal institution in the area of domestic counterterrorism operations.


Defend And Protect: National Security Restrictions On Foreign Investments In The United States, Matthew Aglialoro 2016 Cornell Law School

Defend And Protect: National Security Restrictions On Foreign Investments In The United States, Matthew Aglialoro

University of Cincinnati Law Review

No abstract provided.


A Problem Of Standards?: Another Perspective On Secret Law, Jonathan Hafetz 2016 College of William & Mary Law School

A Problem Of Standards?: Another Perspective On Secret Law, Jonathan Hafetz

William & Mary Law Review

This Article provides a new perspective on the growth of secret law in the United States. It is widely assumed that the U.S. government’s exercise of national security powers suffers from excessive secrecy. Although secrecy presents significant challenges, it does not alone explain the lack of clarity surrounding the government’s legal justifications for using military force, conducting surveillance, or exercising other national security powers. The Article argues that what is often labeled “secret law” may also be understood as a consequence of how legal standards are used in this context.

The Article draws on the larger rules ...


International Law, Legal Diplomacy, And The Counter-Isil Campaign: Some Observations, Brian Egan 2016 U.S. Naval War College

International Law, Legal Diplomacy, And The Counter-Isil Campaign: Some Observations, Brian Egan

International Law Studies

Speech as prepared for delivery by Brian Egan, Legal Adviser, U.S. Department of State; 110th Annual Meeting of the American Society of International Law Washington, DC, April 1, 2016


A Proposed Enhancement To Un Treaty Enforcement: Regular Recommendations To Civil Society, Benjamin Bloomer 2016 DePaul University

A Proposed Enhancement To Un Treaty Enforcement: Regular Recommendations To Civil Society, Benjamin Bloomer

International Human Rights Law Journal

The UN treaty body system is an imperative component in the enforcement of international human rights law, but it currently does not have the mechanisms sufficient for the effective internalization of international human rights law standards. One of its current mechanisms, namely, concluding observations, are by their nature of being addressed to states insufficient to ensure enforcement in state parties not politically, economically, socially, or culturally inclined to obey the recommendations. This article proposes a new publication that will better foster communication between civil society organizations and treaty bodies, allowing for a more highly coordinated effort of civil society in ...


Black Hole In The Rising Sun: Japan And The Hague Convention On Child Abduction, Paul Hanley 2016 Keimyung University

Black Hole In The Rising Sun: Japan And The Hague Convention On Child Abduction, Paul Hanley

International Human Rights Law Journal

Japan has long been criticized for its failure to address the issue of international child abduction. In response to international pressure, Japan adopted the Hague Convention on the Civil Aspects of International Parental Abduction in April 2014. Despite its ratification of the treaty, great concern remains whether Japan is willing to comply with the legal obligations imposed by the Convention. This article examines Japan’s struggle with the issue of international child abduction, analyzing its traditional approach to family matters such as its “divorce by conference” system, which permits couples to negotiate issues of child custody and visitation without any ...


Human Rights In North Korea - The Pump Don't Work Cause The Vandals Took The Handles, Steven Gariepy 2016 United States Military Academy

Human Rights In North Korea - The Pump Don't Work Cause The Vandals Took The Handles, Steven Gariepy

International Human Rights Law Journal

Many cynics of the universality of international human rights point to persistent large-scale human-rights abusing regimes, such as the Democratic Republic of North Korea, as proof that there is nothing at all universal about human rights. This essay is an attempt to root out the implications of internal national policies on the suitability of international human rights whilst reinforcing their universality. The author of this essay, a military lawyer, reaches the conclusion that the pump of universal human rights don't work within the North Korea cause the vandals took the handle.


The Identification And Exploitation Of Terrorist Financing, Jacob S. Gordon 2016 Liberty University

The Identification And Exploitation Of Terrorist Financing, Jacob S. Gordon

Senior Honors Theses

Terrorism and the threat of terrorist attacks have forced the United States to place a high priority on developing a comprehensive counterterrorism strategy. A crucial component of this overarching strategy focuses on targeting the finances of a terrorist organization, hoping to eliminate or stifle their sources of funding in an effort to render the organization incapable of launching successful operations due to an absence of funding. By analyzing the most common financing options that terrorist groups use, the United States can hone its ability to disrupt the funding operations for terrorist groups. Likewise, developing a method for tracking the laundering ...


State Succession - Convention On Status Of Refugees - Lesotho’S Use Of Nyerere Letter Recognized To Effect Accession To Multilateral Convention But Refugee Definition Precludes Applicability Of Convention, William A. Pierce, William W. Poole 2016 University of Georgia School of Law

State Succession - Convention On Status Of Refugees - Lesotho’S Use Of Nyerere Letter Recognized To Effect Accession To Multilateral Convention But Refugee Definition Precludes Applicability Of Convention, William A. Pierce, William W. Poole

Georgia Journal of International & Comparative Law

No abstract provided.


The Judicial Dilemma O’Callahan V. Parker Presents To Sofa’S, Ernest V. Harris 2016 University of Georgia School of Law

The Judicial Dilemma O’Callahan V. Parker Presents To Sofa’S, Ernest V. Harris

Georgia Journal of International & Comparative Law

No abstract provided.


Toward Self-Determination - A Reappraisal As Reflected In The Declaration Of Friendly Relations, C. Don Johnson 2016 University of Georgia School of Law

Toward Self-Determination - A Reappraisal As Reflected In The Declaration Of Friendly Relations, C. Don Johnson

Georgia Journal of International & Comparative Law

No abstract provided.


West Germany’S Eastern Policy: Legal Claims And Political Realities, Manfred Zuleeg 2016 University of Bonn

West Germany’S Eastern Policy: Legal Claims And Political Realities, Manfred Zuleeg

Georgia Journal of International & Comparative Law

No abstract provided.


Digital Commons powered by bepress