Open Access. Powered by Scholars. Published by Universities.®

National Security Commons

Open Access. Powered by Scholars. Published by Universities.®

965 Full-Text Articles 798 Authors 415,171 Downloads 82 Institutions

All Articles in National Security

Faceted Search

965 full-text articles. Page 1 of 30.

Swatting Political Discourse: A Domestic Terrorism Threat, Matthew James Enzweiler 2015 Notre Dame Law School

Swatting Political Discourse: A Domestic Terrorism Threat, Matthew James Enzweiler

Notre Dame Law Review

This Note will attempt to address the question of whether or not incidents of swatting aimed at contrary political ideals meet the characterization of domestic terrorism in the post–9/11 era. In particular, there will be consideration of the extent to which treatment of political swatting as domestic terrorism is consistent with the maintenance of the delicate balance between public safety concerns and protection of the constitutional values of free speech and free expression. This Note will proceed in four parts. Part I will examine the growth of telecommunication manipulation practices from products of curiosity to an alarming means ...


The Law Of Naval Warfare And China’S Maritime Militia, James Kraska, Michael Monti 2015 U.S. Naval War College

The Law Of Naval Warfare And China’S Maritime Militia, James Kraska, Michael Monti

International Law Studies

China operates a vast network of fishing vessels that form a maritime militia equipped and trained to conduct intelligence, communications, and targeting support for the People's Liberation Army Navy. Fishing vessels normally are exempt from capture or attack in the law of naval warfare unless they are integrated into the naval forces, but distinguishing between legitimate fishing vessels and maritime militia during naval warfare is virtually impossible.


Cover, 2015 University of Tennessee, Knoxville

Cover

International Journal of Nuclear Security

No abstract provided.


Masthead, 2015 University of Tennessee, Knoxville

Masthead

International Journal of Nuclear Security

No abstract provided.


From The Editor, 2015 University of Tennessee, Knoxville

From The Editor

International Journal of Nuclear Security

No abstract provided.


Student Writing Competition, 2015 University of Tennessee, Knoxville

Student Writing Competition

International Journal of Nuclear Security

No abstract provided.


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu 2015 Pepperdine University

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the ...


Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner 2015 Seattle University School of Law

Authorized Investigation: A Temperate Alternative To Cyber Insecurity, Casey M. Bruner

Seattle University Law Review

This Note aims to show that legal structures created to protect the Internet in its original form are completely insufficient to protect what the Internet has become. This antiquated legal framework is exacerbating the problem. The breadth of activity that the current law restricts severely limits the remedies that cyberattack victims can pursue, and it must be updated. While full hack-back may prove necessary in the long run, I argue for a more temperate initial response to the problem—I call this response “authorized investigation.” Specifically, the Computer Fraud and Abuse Act should be amended to allow victims access to ...


Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini 2015 Seattle University School of Law

Trading Privacy For Angry Birds: A Call For Courts To Reevaluate Privacy Expectations In Modern Smartphones, Jeremy Andrew Ciarabellini

Seattle University Law Review

Of all the smartphone uses, the calling function is probably used the least. Rather, individuals more commonly use their smartphone for surfing the web, checking Facebook, and playing games. Highlighting the “smart” in smartphone, these phones often know more about their users’ daily activities than the users. Without requiring any sort of input, smartphones can tell the user how many steps they walk each day, when it is time to leave for work (also, of course, determining the traveling time with the most up-to-date traffic reports), and when an item recently ordered on Amazon will be delivered. Smartphone users may ...


Masthead, 2015 University of Miami Law School

Masthead

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Justice Delayed; Justice Denied? Causes And Proposed Solutions Concerning Delays In The Award Of Veterans' Benefits, Michael P. Allen 2015 University of Miami Law School

Justice Delayed; Justice Denied? Causes And Proposed Solutions Concerning Delays In The Award Of Veterans' Benefits, Michael P. Allen

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Post-Deployment Treatment For Successful Reintegration, Michelle Zielenski 2015 University of Miami Law School

Post-Deployment Treatment For Successful Reintegration, Michelle Zielenski

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


The History Of Veterans Benefits: From The Time Of The Colonies To World War Two, Mariano Ariel Corcilli 2015 University of Miami Law School

The History Of Veterans Benefits: From The Time Of The Colonies To World War Two, Mariano Ariel Corcilli

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


A High Price To Pay: Combat Injury In Iraq And Afghanistan, George D. Garcia 2015 University of Miami Law School

A High Price To Pay: Combat Injury In Iraq And Afghanistan, George D. Garcia

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Editor In Chief Comment, 2015 University of Miami Law School

Editor In Chief Comment

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Front Matter And Table Of Contents, 2015 University of Miami Law School

Front Matter And Table Of Contents

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Challenges In Assessing And Assisting Military Personnel With Mild Traumatic Brain Injuries, Robert A. Seegmiller 2015 University of Miami Law School

Challenges In Assessing And Assisting Military Personnel With Mild Traumatic Brain Injuries, Robert A. Seegmiller

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Best Emerging Holistic Advocacy Practices To Break The Cyclical Trauma, Depression, Alienation And Criminalization Afflicting Our Returning War Heroes, Paul Freese, Natalie Klasky 2015 University of Miami Law School

Best Emerging Holistic Advocacy Practices To Break The Cyclical Trauma, Depression, Alienation And Criminalization Afflicting Our Returning War Heroes, Paul Freese, Natalie Klasky

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Lawyering Wars: Failing Leadership, Risk Aversion, And Lawyer Creep—Should We Expect More Lone Survivors?, Arthur Rizer 2015 West Virginia University

Lawyering Wars: Failing Leadership, Risk Aversion, And Lawyer Creep—Should We Expect More Lone Survivors?, Arthur Rizer

Indiana Law Journal

“We are a nation of laws, not men.” This motto—made famous by the Supreme Court case Marbury v. Madison1—has existed since the founding of the United States. This maxim embodies the sentiment that, in order to prevent tyranny, citizens should be governed by fixed law rather than the whims of a dictator. In his decision, Chief Justice John Marshall did not qualify his remarks by saying, “we are a nation of laws, except in time of war.” Indeed with the modern U.S. military, Cicero’s observation that “[l]aws are inoperative in war” has never been further ...


Editor In Chief Comment And Acknowledgments, 2015 University of Miami Law School

Editor In Chief Comment And Acknowledgments

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Digital Commons powered by bepress