Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

PDF

2013

Institution
Keyword
Publication
Publication Type

Articles 121 - 131 of 131

Full-Text Articles in Entire DC Network

On “The Lure Of Strike”, Charles J. Dunlap Jr. Jan 2013

On “The Lure Of Strike”, Charles J. Dunlap Jr.

Faculty Scholarship

This commentary is in response to the special commentary, “The Lure of Strike” by Conrad Crane published in the Summer 2013 issue of Parameters (vol. 43, no. 2).


Inspection And Seizure Of Seizure Of "Armed And Equipped" Somali Pirates: Lessons From The British And American Anti-Slavery Squadrons (1808-1860), John I. Winn Jan 2013

Inspection And Seizure Of Seizure Of "Armed And Equipped" Somali Pirates: Lessons From The British And American Anti-Slavery Squadrons (1808-1860), John I. Winn

Seattle University Law Review Online

No abstract provided.


Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay Jan 2013

Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay

Security Studies & International Affairs - Daytona Beach

Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …


Drones And The International Rule Of Law, Rosa Brooks Jan 2013

Drones And The International Rule Of Law, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

This essay will proceed in four parts. First, it will briefly discuss the concept of the international rule of law. Second, it will offer a short factual background on US drone strikes (to the extent that it is possible to provide factual background on a practice so shrouded in secrecy). Third, it will highlight some of the key ways in which post 9/11 US legal theories relating to the use of force challenge previously accepted concepts and seek to redefine previously well-understood terms. Fourth, it will offer brief concluding thoughts on the future of the international rule of law in …


National Security Pedagogy: The Role Of Simulations, Laura K. Donohue Jan 2013

National Security Pedagogy: The Role Of Simulations, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

This article challenges the dominant pedagogical assumptions in the legal academy. It begins by briefly considering the state of the field of national security, noting the rapid expansion in employment and the breadth of related positions that have been created post-9/11. It considers, in the process, how the legal academy has, as an institutional matter, responded to the demand.

Part III examines traditional legal pedagogy, grounding the discussion in studies initiated by the American Bar Association, the Carnegie Foundation, and others. It suggests that using the law-writ-large as a starting point for those interested in national security law is a …


Drones And Cognitive Dissonance, Rosa Brooks Jan 2013

Drones And Cognitive Dissonance, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

There’s something about drones that makes sane people crazy. Is it those lean, futurist profiles? The activities drone technologies enable? Or perhaps it’s just the word itself–drone–a mindless, unpleasant, dissonant thrum. Whatever the cause, drones seem to produce an unusual kind of cognitive dissonance in many people.

Some demonize drones, denouncing them for causing civilian deaths or enabling long-distance killing, even as they ignore the fact that the same (or worse) could be said of many other weapons delivery systems. Others glorify them as a low-cost way to “take out terrorists,” despite the strategic vacuum in which most …


Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman Jan 2013

Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman

Faculty Scholarship

When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …


Access To Government Information Is A Foundation Of American Democracy—But The Courts Don't Get It, Frederick A. O. Schwarz Jr. Jan 2013

Access To Government Information Is A Foundation Of American Democracy—But The Courts Don't Get It, Frederick A. O. Schwarz Jr.

Oklahoma Law Review

No abstract provided.


Overview And Operation Of U.S. Financial Sanctions, Including The Example Of Iran, Barry E. Carter, Ryan Farha Jan 2013

Overview And Operation Of U.S. Financial Sanctions, Including The Example Of Iran, Barry E. Carter, Ryan Farha

Georgetown Law Faculty Publications and Other Works

Financial sanctions are increasingly being used in the mix of international economic sanctions being employed by the United Nations, regional entities, and individual countries, including the United States. These financial sanctions have become more focused and effective as the tools and techniques have improved significantly for tracing and identifying the financial transactions of terrorists, weapons proliferators, human rights violators, drug cartels, and others. These sanctions can not only freeze financial assets and prohibit or limit financial transactions, but they also impede trade by making it difficult to pay for the export or import of goods and services.

In spite of …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron Dec 2012

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David Gray, Danielle Citron

David C. Gray

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Dec 2012

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Danielle Keats Citron

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and explores …