Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- US Army War College (56)
- Seattle University School of Law (17)
- Selected Works (5)
- University of Miami Law School (5)
- Duke Law (4)
-
- Embry-Riddle Aeronautical University (4)
- Georgetown University Law Center (4)
- University of Michigan Law School (4)
- Cleveland State University (3)
- Purdue University (3)
- SelectedWorks (3)
- University of Maryland Francis King Carey School of Law (3)
- Pepperdine University (2)
- University of Massachusetts Boston (2)
- University of Nebraska - Lincoln (2)
- Western Kentucky University (2)
- Barry University School of Law (1)
- Brigham Young University Law School (1)
- Claremont Colleges (1)
- Columbia Law School (1)
- Florida International University College of Law (1)
- Fordham Law School (1)
- Maurer School of Law: Indiana University (1)
- Mississippi College School of Law (1)
- Pace University (1)
- University at Buffalo School of Law (1)
- University of California, Irvine School of Law (1)
- University of Oklahoma College of Law (1)
- Keyword
-
- Terrorism (7)
- Iran (6)
- Drones (5)
- Law and Society (5)
- National Security (5)
-
- Nuclear weapons (5)
- Surveillance (5)
- Africa (4)
- Homeland security (4)
- Jurisprudence (4)
- NSA (4)
- United States (4)
- War (4)
- Afghanistan (3)
- China (3)
- Climate change (3)
- Constitutional Law (3)
- Cybersecurity (3)
- Fourth Amendment (3)
- Iraq (3)
- Islam (3)
- Middle East (3)
- National security (3)
- Parameters (3)
- Privacy (3)
- Security (3)
- US Options in Syria (3)
- US military (3)
- Weapons of mass destruction (3)
- Women in Battle (3)
- Publication
-
- The US Army War College Quarterly: Parameters (56)
- Seattle Journal for Social Justice (16)
- Faculty Scholarship (9)
- University of Miami National Security & Armed Conflict Law Review (5)
- Georgetown Law Faculty Publications and Other Works (4)
-
- David Barnhizer (3)
- Applied Aviation Sciences - Daytona Beach (2)
- Journal Articles (2)
- Journal of Business & Technology Law (2)
- Kevin H. Govern (2)
- Libraries Faculty and Staff Scholarship and Research (2)
- Masters Theses & Specialist Projects (2)
- Michigan Journal of International Law (2)
- Security Studies & International Affairs - Daytona Beach (2)
- Space, Cyber, and Telecommunications Law Program: Faculty Publications (2)
- Center for Governance and Sustainability Publications (1)
- Claremont-UC Undergraduate Research Conference on the European Union (1)
- Collaborative Institute for Oceans, Climate and Security Publications (1)
- Danielle Keats Citron (1)
- David C. Gray (1)
- Faculty Publications (1)
- Indiana Law Journal (1)
- Jeremy Straub (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Libraries Faculty and Staff Presentations (1)
- Michael I Niman Ph.D. (1)
- Michigan Law Review (1)
- Oklahoma Law Review (1)
- Pace International Law Review Online Companion (1)
- Pepperdine Law Review (1)
- Publication Type
Articles 121 - 131 of 131
Full-Text Articles in Entire DC Network
On “The Lure Of Strike”, Charles J. Dunlap Jr.
On “The Lure Of Strike”, Charles J. Dunlap Jr.
Faculty Scholarship
This commentary is in response to the special commentary, “The Lure of Strike” by Conrad Crane published in the Summer 2013 issue of Parameters (vol. 43, no. 2).
Inspection And Seizure Of Seizure Of "Armed And Equipped" Somali Pirates: Lessons From The British And American Anti-Slavery Squadrons (1808-1860), John I. Winn
Seattle University Law Review Online
No abstract provided.
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay
Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay
Security Studies & International Affairs - Daytona Beach
Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …
Drones And The International Rule Of Law, Rosa Brooks
Drones And The International Rule Of Law, Rosa Brooks
Georgetown Law Faculty Publications and Other Works
This essay will proceed in four parts. First, it will briefly discuss the concept of the international rule of law. Second, it will offer a short factual background on US drone strikes (to the extent that it is possible to provide factual background on a practice so shrouded in secrecy). Third, it will highlight some of the key ways in which post 9/11 US legal theories relating to the use of force challenge previously accepted concepts and seek to redefine previously well-understood terms. Fourth, it will offer brief concluding thoughts on the future of the international rule of law in …
National Security Pedagogy: The Role Of Simulations, Laura K. Donohue
National Security Pedagogy: The Role Of Simulations, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
This article challenges the dominant pedagogical assumptions in the legal academy. It begins by briefly considering the state of the field of national security, noting the rapid expansion in employment and the breadth of related positions that have been created post-9/11. It considers, in the process, how the legal academy has, as an institutional matter, responded to the demand.
Part III examines traditional legal pedagogy, grounding the discussion in studies initiated by the American Bar Association, the Carnegie Foundation, and others. It suggests that using the law-writ-large as a starting point for those interested in national security law is a …
Drones And Cognitive Dissonance, Rosa Brooks
Drones And Cognitive Dissonance, Rosa Brooks
Georgetown Law Faculty Publications and Other Works
There’s something about drones that makes sane people crazy. Is it those lean, futurist profiles? The activities drone technologies enable? Or perhaps it’s just the word itself–drone–a mindless, unpleasant, dissonant thrum. Whatever the cause, drones seem to produce an unusual kind of cognitive dissonance in many people.
Some demonize drones, denouncing them for causing civilian deaths or enabling long-distance killing, even as they ignore the fact that the same (or worse) could be said of many other weapons delivery systems. Others glorify them as a low-cost way to “take out terrorists,” despite the strategic vacuum in which most …
Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman
Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman
Faculty Scholarship
When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …
Access To Government Information Is A Foundation Of American Democracy—But The Courts Don't Get It, Frederick A. O. Schwarz Jr.
Access To Government Information Is A Foundation Of American Democracy—But The Courts Don't Get It, Frederick A. O. Schwarz Jr.
Oklahoma Law Review
No abstract provided.
Overview And Operation Of U.S. Financial Sanctions, Including The Example Of Iran, Barry E. Carter, Ryan Farha
Overview And Operation Of U.S. Financial Sanctions, Including The Example Of Iran, Barry E. Carter, Ryan Farha
Georgetown Law Faculty Publications and Other Works
Financial sanctions are increasingly being used in the mix of international economic sanctions being employed by the United Nations, regional entities, and individual countries, including the United States. These financial sanctions have become more focused and effective as the tools and techniques have improved significantly for tracing and identifying the financial transactions of terrorists, weapons proliferators, human rights violators, drug cartels, and others. These sanctions can not only freeze financial assets and prohibit or limit financial transactions, but they also impede trade by making it difficult to pay for the export or import of goods and services.
In spite of …
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron
David C. Gray
On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron
Danielle Keats Citron
On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …