Open Access. Powered by Scholars. Published by Universities.®

National Security Commons

Open Access. Powered by Scholars. Published by Universities.®

884 Full-Text Articles 730 Authors 371,820 Downloads 75 Institutions

All Articles in National Security

Faceted Search

884 full-text articles. Page 1 of 26.

Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek 2015 Western Michigan University

Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek

Alev Dudek

In spite of ongoing improvements, integration of ethnic Turks in Germany remains a challenge from the dominant culture perspective, whereas a deeply ingrained institutional and everyday racism and the lack of legal protection against discrimination pose a challenge to full participation of ethnic Turks from another perspective. In an increasingly xenophobic Europe, particularly Germany, an increase in potential for religious and nationalist radicalization in different groups including ethnic Turks is becoming more and more evident. This increase in radical attitudes is not necessarily caused by a lack of integration, as evidenced among well-integrated individuals.

In view of recent developments toward ...


Panel I--General Discussion, Georgia Journal of International and Comparative Law 2015 University of Georgia School of Law

Panel I--General Discussion, Georgia Journal Of International And Comparative Law

Georgia Journal of International & Comparative Law

No abstract provided.


Legal Standards For Intervention In Internal Conflicts, John N. Moore 2015 University of Virginia

Legal Standards For Intervention In Internal Conflicts, John N. Moore

Georgia Journal of International & Comparative Law

No abstract provided.


Introduction, Bernard A. Ramundo 2015 George Washington University

Introduction, Bernard A. Ramundo

Georgia Journal of International & Comparative Law

No abstract provided.


Foreward, Morris I. Leibman 2015 American Bar Association Standing Committee on Law and National Security

Foreward, Morris I. Leibman

Georgia Journal of International & Comparative Law

No abstract provided.


Fair Trade: The President’S Power To Recover Captured U.S. Servicemembers And The Recent Prisoner Exchange With The Taliban, Celidon Pitt 2015 Fordham University School of Law

Fair Trade: The President’S Power To Recover Captured U.S. Servicemembers And The Recent Prisoner Exchange With The Taliban, Celidon Pitt

Fordham Law Review

The Obama Administration’s controversial exchange of five Taliban detainees for a captured U.S. soldier in May 2014 reignited a heated debate over the proper scope of wartime executive authority. From a legal perspective, the primary issue centers on the constitutional balance of power between congressional appropriations and the President’s power as Commander in Chief. A complete analysis incorporates both judicial and historical precedent to evaluate the conflict within the broader context of prisoner recovery efforts.

This Note argues that, regardless of the validity of legislative restrictions on the transfer of Guantánamo detainees, the President possessed sufficient authority ...


"The Long And Winding Road": Reflections On America's War(S) On Terrorism And Counterterrorism Efforts Post 9/11, Francis J. Larkin 2015 University of Massachusetts School of Law

"The Long And Winding Road": Reflections On America's War(S) On Terrorism And Counterterrorism Efforts Post 9/11, Francis J. Larkin

University of Massachusetts Law Review

September 11, 2001 was surely evil incarnate. But out of the shadows and embers of such devilish devastation, going forward, for society to “endure”‖, let alone “prevail”, a “lasting good” must emerge; an enduring immutable and sustainable commitment to peace and non-violence. And, of course, any “lasting good”‖, however utopian or pragmatic would surely require destruction and eradication of terrorism in all of its diverse incarnations; the eradication and destruction of the machinery of terrorism wherever it is found. Long range, it must be the goal, aspiration and belief that out of the seeds and memory of 9/11 there ...


The Legality Of President Reagan's Proposed Space-Based Ballistic Missile Defense System, John Topping 2015 University of Georgia School of Law

The Legality Of President Reagan's Proposed Space-Based Ballistic Missile Defense System, John Topping

Georgia Journal of International & Comparative Law

No abstract provided.


Combatting International Terrorism: The Role Of Congress, Dante B. Fascell 2015 United States House of Representatives

Combatting International Terrorism: The Role Of Congress, Dante B. Fascell

Georgia Journal of International & Comparative Law

No abstract provided.


Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue 2015 Georgetown University Law Center

Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of ...


Permissibility Of Colour And Racial Profiling, James Singh Gill 2015 Thompson Rivers University

Permissibility Of Colour And Racial Profiling, James Singh Gill

Western Journal of Legal Studies

Racial profiling in law enforcement is a contentious matter, particularly in light of U.S. police-citizen race tensions. The racial profiling debate has not been settled. Racial profiling proponents view it as a tool to effectively uncover criminal activity among certain racial groups. Critics find that racial profiling perpetuates racial stigmas and is largely inefficient as a policing tool. This article explores the ongoing debate and offers an overview of the Canadian judicial experience with racial profiling. The author proposes a middle-ground solution where racial profiling may be used under certain constraints imposed on law enforcement. The author suggests that ...


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo 2015 University of Pennsylvania Law School

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by two ...


Trade Regulation - Export Controls - Cocom Agrees On New Multilateral Export Guidelines Allowing Eastern Bloc To Purchase Low Level Technology Legally, Jackie L. Masden 2015 University of Georgia School of Law

Trade Regulation - Export Controls - Cocom Agrees On New Multilateral Export Guidelines Allowing Eastern Bloc To Purchase Low Level Technology Legally, Jackie L. Masden

Georgia Journal of International & Comparative Law

No abstract provided.


The Right Of Counterintervention, John A. Perkins 2015 Palmer & Dodge

The Right Of Counterintervention, John A. Perkins

Georgia Journal of International & Comparative Law

No abstract provided.


Terrorism Trials In Article Iii Courts, Laura K. Donohue 2015 Georgetown University Law Center

Terrorism Trials In Article Iii Courts, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Some individuals reject Article III courts as a forum for bringing terrorist suspects to justice on the grounds that the ordinary judicial system cannot handle such cases. As an empirical matter, this claim is simply false. Since 2001, myriad terrorism trials have progressed through the criminal system. The U.S. Department of Justice (DOJ) reports that between 2001 and 2010, there were 998 defendants indicted in terrorism prosecutions. Eighty-seven percent of the defendants were convicted on at least one charge. According to the Executive Office for the U.S. Attorneys, from FY 2004 to FY 2009, there were 3,010 ...


Lawfare, Charles J. Dunlap Jr. 2015 Duke Law School

Lawfare, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Reflections On Two Years Of Disaster Recovery, Benjamin Rajotte 2015 SelectedWorks

Reflections On Two Years Of Disaster Recovery, Benjamin Rajotte

Benjamin Rajotte

No abstract provided.


Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley 2015 University of Oklahoma College of Law

Regulating Drones Under The First And Fourth Amendments, Stephen E. Henderson, Joseph Thai, Marc Jonathan Blitz, James Grimsley

Stephen E Henderson

The FAA Modernization and Reform Act of 2012 requires the Federal Aviation Administration to integrate unmanned aerial vehicles (UAVs), or drones, into the national airspace system by September of this year. Yet perhaps because of their chilling accuracy in targeted killings abroad, perhaps because of an increasing consciousness of diminishing privacy more generally, and perhaps simply because of a fear of the unknown, divergent UAV-restrictive legislation has been proposed in Congress and enacted in a number of states. Ultimately, given UAV utility and cost effectiveness over a vast range of tasks, widespread commercial use seems certain. So it is imperative ...


High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue 2015 Georgetown University Law Center

High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security.

The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing ...


21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, And Wmds, Mary Ellen O'Connell 2015 University of Notre Dame

21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, And Wmds, Mary Ellen O'Connell

Washington University Global Studies Law Review

No abstract provided.


Digital Commons powered by bepress