Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

PDF

2019

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 59

Full-Text Articles in Entire DC Network

From The Editor, Antulio J. Echevarria Ii Nov 2019

From The Editor, Antulio J. Echevarria Ii

The US Army War College Quarterly: Parameters

No abstract provided.


Taking The War Colleges From Good To Great, Richard D. Hooker Jr. Nov 2019

Taking The War Colleges From Good To Great, Richard D. Hooker Jr.

The US Army War College Quarterly: Parameters

No abstract provided.


Parameters Winter 2019 – 2020, Usawc Press Nov 2019

Parameters Winter 2019 – 2020, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Australia's Lessons, Rhys Crawley Nov 2019

Australia's Lessons, Rhys Crawley

The US Army War College Quarterly: Parameters

This article analyzes Australia’s contribution to the Afghanistan War from 2001 to 2014. It recommends policymakers and practitioners consider applying a whole-of-government approach, embedding personnel in coalition headquarters, and limiting reliance on Special Forces soldiers in future interventions.


Book Reviews, Usawc Press Nov 2019

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Denmark's Lessons, Sten Rynning Nov 2019

Denmark's Lessons, Sten Rynning

The US Army War College Quarterly: Parameters

This article argues despite opportunities to learn valuable strategic lessons from Denmark’s effort in the Afghanistan War (2001–14), Danish civil authorities implemented a comprehensive approach policy that failed to establish a bridge to lessons learned by the military. Denmark’s experience in the Afghanistan War demonstrates promises and perils of lessons learned processes.


Norway's Lessons, Harald Hoiback Nov 2019

Norway's Lessons, Harald Hoiback

The US Army War College Quarterly: Parameters

This article argues Norway’s minor role in the Afghanistan War (2001–14) included opportunities to learn about the evolution of military deployments over the course of a prolonged counterinsurgency-focused conflict, the civilian and military dynamics, and the political challenges of contributing to such a conflict.


Educating Strategic Lieutenants At West Point, Scott A. Silverstone Nov 2019

Educating Strategic Lieutenants At West Point, Scott A. Silverstone

The US Army War College Quarterly: Parameters

This article argues West Point responded to the changing strategic environment from the end of the Cold War through the post-9/11 period by innovating its curriculum. Over the past several decades, however, the academy’s educational model has remained remarkably stable, rooted in an enduring commitment to a rigorous liberal education as the best preparation for officers confronting the inherent uncertainties of future wars.


Article Index, Usawc Press Nov 2019

Article Index, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Making The War Colleges Better, Richard A. Lacquement Jr Nov 2019

Making The War Colleges Better, Richard A. Lacquement Jr

The US Army War College Quarterly: Parameters

No abstract provided.


Deconstructing Perceptions Of The Border Patrol At The U.S.-Mexico Border, Claire H. Woodward Oct 2019

Deconstructing Perceptions Of The Border Patrol At The U.S.-Mexico Border, Claire H. Woodward

Student Publications

The U.S.-Mexico border is a space for public debate on the legal and political aspects of immigration. Politicization of the southern border has resulted in polarized public opinion regarding immigration, leading to discrepancies between public perceptions of the Border Patrol and agents’ perceptions of their job. Agents’ work requires emotional labor, and lack of training for difficult encounters, pressure within the agency to detach from emotions, and public outcry lead to dissonance in agent perceptions of their own role in immigration enforcement. In addition, economic, ethnic, and gender-based factors contribute to agent identities, which intersect with perceptions of their roles …


Terrorism And Its Legal Aftermath: The Limits On Freedom Of Expression In Canada’S Anti-Terrorism Act & National Security Act, Percy Sherwood Oct 2019

Terrorism And Its Legal Aftermath: The Limits On Freedom Of Expression In Canada’S Anti-Terrorism Act & National Security Act, Percy Sherwood

FIMS Publications

This analysis aims to demonstrate how s. 83.221 in Bill C-51 is likely to violate freedom of expression guaranteed under the Charter. The first section employs the two-step Irwin Toy analysis to show that the speech offense infringes upon s. 2(b) of the Charter. The second section uses the Oakes test to determine whether the breach of freedom of expression is a reasonable limit. On whether the speech offense can be justified under s. 1 of the Charter as a reasonable limit, the legislation fails at the third and fourth step of the Oakes test. Section three of this paper …


Table Of Contents, Seattle University Law Review Sep 2019

Table Of Contents, Seattle University Law Review

Seattle University Law Review

No abstract provided.


Maritime Autonomous Vehicles Within The International Law Framework To Enhance Maritime Security, Natalie Klein Aug 2019

Maritime Autonomous Vehicles Within The International Law Framework To Enhance Maritime Security, Natalie Klein

International Law Studies

Technological developments necessitate a review of long-standing and diverse international legal principles. The law of the sea is no exception in this regard where the introduction of different Maritime Autonomous Vehicles (MAVs) has prompted consideration of how the laws of naval warfare and rules governing the safety of international shipping accommodate these craft. This paper shifts the focus to the international laws relating to maritime security. It assesses how well the existing international legal framework for maritime security can account for the use of MAVs by law enforcement agencies and by non-state actors who are turning to MAVs for criminal …


Defining Critical Infrastructure For A Global Application, Colleen M. Newbill Aug 2019

Defining Critical Infrastructure For A Global Application, Colleen M. Newbill

Indiana Journal of Global Legal Studies

A Google search for the phrase "critical infrastructure" turns up 189 million results in little more than a half second: ''global critical infrastructure" has 151 million results; and "definition of critical infrastructure" yields 71.5 million results. The list of what industries and sectors fall under the critical infrastructure designation expands as time progresses and technology develops. As the threat of cyberattacks increases and this frontier of terrorism continues to emerge, attacks on critical infrastructure are high on the list of concerns and the need for protective measures imperative. The focus on protecting critical infrastructure does not stop at the borders …


Cyber!, Andrea M. Matwyshyn Jul 2019

Cyber!, Andrea M. Matwyshyn

Andrea Matwyshyn

This Article challenges the basic assumptions of the emerging legal area of “cyber” or “cybersecurity.” It argues that the two dominant “cybersecurity” paradigms—information sharing and deterrence—fail to recognize that corporate information security and national “cybersecurity” concerns are inextricable. This problem of “reciprocal security vulnerability” means that in practice our current legal paradigms channel us in suboptimal directions. Drawing insights from the work of philosopher of science Michael Polanyi, this Article identifies three flaws that pervade the academic and policy analysis of security, exacerbating the problem of reciprocal security vulnerability—privacy conflation, incommensurability, and internet exceptionalism. It then offers a new paradigm—reciprocal …


The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan Jul 2019

The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan

Brooklyn Journal of International Law

Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …


“Going Dark” – The Challenge Facing Law Enforcement In The 21st Century, James Christie May 2019

“Going Dark” – The Challenge Facing Law Enforcement In The 21st Century, James Christie

Economic Crime Forensics Capstones

The role of law enforcement on all levels is to prevent, detect, and investigate criminal activity. A fundamental function of law enforcement is to collect intelligence and evidence to combat criminal and terrorist activity. In numerous instances, intelligence and evidence of criminal activity appear in the form of communications and electronic data. To be effective, law enforcement requires the ability to intercept and access these communications and the electronic data pursuant to legal authority.


Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik May 2019

Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …


Comrades Or Foes: Did The Russians Break The Law Or New Ground For The First Amendment?, Artem M. Joukov, Samantha M. Caspar Apr 2019

Comrades Or Foes: Did The Russians Break The Law Or New Ground For The First Amendment?, Artem M. Joukov, Samantha M. Caspar

Pace Law Review

This Article discusses the recent decision by the United States Federal Government to indict more than a dozen Russian nationals for conspiracy to defraud the United States of America. The Government accused the Russians of staging protests, distributing false propaganda, and spreading political messages and ideologies online in an effort to affect the outcome of the 2016 Presidential Election. We argue that while the Defendants violated several other laws, the majority of the acts the Government classifies as a conspiracy to defraud the United States should not be considered criminal. Rather, these acts are protected political speech under the First …


Preserving Reef-Building Coral Genetic Resources With Assisted Migration: Balancing Precaution And Risk, Richard J. Bartz, Annie Brett Apr 2019

Preserving Reef-Building Coral Genetic Resources With Assisted Migration: Balancing Precaution And Risk, Richard J. Bartz, Annie Brett

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Political Extremism And Domestic Terrorism In America, Mark Potok Apr 2019

Political Extremism And Domestic Terrorism In America, Mark Potok

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Does "Meaningful Human Control" Have Potential For The Regulation Of Autonomous Weapon Systems?, Kevin Neslage Apr 2019

Does "Meaningful Human Control" Have Potential For The Regulation Of Autonomous Weapon Systems?, Kevin Neslage

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Exoatmospheric Plowshares: Using A Nuclear Explosive Device For Planetary Defense Against An Incoming Asteroid, David A. Koplow Apr 2019

Exoatmospheric Plowshares: Using A Nuclear Explosive Device For Planetary Defense Against An Incoming Asteroid, David A. Koplow

Georgetown Law Faculty Publications and Other Works

What should be done if we suddenly discover a large asteroid on a collision course with Earth? The consequences of an impact could be enormous—scientists believe that such a strike 60 million years ago led to the extinction of the dinosaurs, and something of similar magnitude could happen again. Although no such extraterrestrial threat now looms on the horizon, astronomers concede that they cannot detect all the potentially hazardous “near-Earth objects,” and even more striking, they acknowledge that if such a danger were discerned, there is currently no proven capability for diverting or destroying it.

One possible response to this …


Dogs Of War Get A New Lease On Life: Why The Military Extraterritorial Jurisdiction Act Violates The Eighth Amendment In Light Of United States V. Slatten, Michael D. Stinnett-Kassoff Mar 2019

Dogs Of War Get A New Lease On Life: Why The Military Extraterritorial Jurisdiction Act Violates The Eighth Amendment In Light Of United States V. Slatten, Michael D. Stinnett-Kassoff

Washington and Lee Journal of Civil Rights and Social Justice

The United States has relied on Private Military Firms (PMFs) extensively to carry out its numerous overseas military missions since the end of the Cold War. Civilians and contractors have always had a place in American wars, even during the American Revolution and beyond. But the recent American incursions into Afghanistan and Iraq brought an unprecedented number of private contractors into the forefront of these conflict zones, the discussions surrounding them, and the legal questions arising from their ashes. Particularly, private contractors in Iraq seemed to be operating in a legal grey area—they clearly were not soldiers, and they clearly …


Anti-Access Strategies In The Pacific: The United States And China, Sam J. Tangredi Mar 2019

Anti-Access Strategies In The Pacific: The United States And China, Sam J. Tangredi

The US Army War College Quarterly: Parameters

No abstract provided.


Russia's A2/Ad Capabilities: Real And Imagined, Keir Giles, Mathieu Boulegue Mar 2019

Russia's A2/Ad Capabilities: Real And Imagined, Keir Giles, Mathieu Boulegue

The US Army War College Quarterly: Parameters

No abstract provided.


Human Security In The Arctic: Implications For The United States Army, C. Anthony Pfaff Mar 2019

Human Security In The Arctic: Implications For The United States Army, C. Anthony Pfaff

The US Army War College Quarterly: Parameters

No abstract provided.


Projecting Stability: A Deployable Nato Police Command, Massimo Pani, Karen J. Finkenbinder Mar 2019

Projecting Stability: A Deployable Nato Police Command, Massimo Pani, Karen J. Finkenbinder

The US Army War College Quarterly: Parameters

No abstract provided.


Analogical Thinking: The Sine Qua Non For Using History Well, Richard A. Lacquement Jr. Mar 2019

Analogical Thinking: The Sine Qua Non For Using History Well, Richard A. Lacquement Jr.

The US Army War College Quarterly: Parameters

No abstract provided.