Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- US Army War College (19)
- The Catholic University of America, Columbus School of Law (4)
- University of Miami Law School (3)
- University of Nebraska - Lincoln (3)
- University of Pennsylvania Carey Law School (3)
-
- Seattle University School of Law (2)
- Washington and Lee University School of Law (2)
- American University Washington College of Law (1)
- Brooklyn Law School (1)
- Claremont Colleges (1)
- Cleveland State University (1)
- Embry-Riddle Aeronautical University (1)
- Emory University School of Law (1)
- Georgetown University Law Center (1)
- Gettysburg College (1)
- La Salle University (1)
- Loyola Marymount University and Loyola Law School (1)
- Maurer School of Law: Indiana University (1)
- Pace University (1)
- Selected Works (1)
- Southern Methodist University (1)
- U.S. Naval War College (1)
- University of Arkansas, Fayetteville (1)
- University of Cincinnati College of Law (1)
- University of Florida Levin College of Law (1)
- University of New Mexico (1)
- University of the District of Columbia School of Law (1)
- Vanderbilt University Law School (1)
- West Virginia University (1)
- Western University (1)
- Keyword
-
- Parameters (9)
- NATO (5)
- US Army War College Press (5)
- Terrorism (4)
- Afghanistan (3)
-
- China (3)
- Russia (3)
- US Army War College (3)
- USAWC Press quarterly (3)
- War (3)
- A2/AD (2)
- Air Force (2)
- Department of Defense (2)
- Goldwater-Nichols Act (2)
- ISAF (2)
- International Security Assistance Force (2)
- Joint professional military education (2)
- Kosovo (2)
- National Security (2)
- National security (2)
- Navy (2)
- North Korea (2)
- PME (2)
- Refugees (2)
- United States (2)
- War on Terror (2)
- 1898–1945 (1)
- 1944–1946 (1)
- 1950–2000 (1)
- 3D file (1)
- Publication
-
- The US Army War College Quarterly: Parameters (19)
- All Faculty Scholarship (3)
- Catholic University Journal of Law and Technology (3)
- Space, Cyber, and Telecommunications Law Program: Faculty Publications (3)
- University of Miami National Security & Armed Conflict Law Review (3)
-
- Scholarly Articles (2)
- Seattle University Law Review (2)
- 2020 Award Winners (1)
- American University Law Review (1)
- Andrea Matwyshyn (1)
- Annual ADFSL Conference on Digital Forensics, Security and Law (1)
- Arkansas Law Review (1)
- Brooklyn Journal of International Law (1)
- CMC Senior Theses (1)
- Economic Crime Forensics Capstones (1)
- FIMS Publications (1)
- Faculty Articles (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Graduate Theses, Dissertations, and Problem Reports (1)
- Immigration and Human Rights Law Review (1)
- Indiana Journal of Global Legal Studies (1)
- International Law Studies (1)
- Journal Articles (1)
- Law Faculty Articles and Essays (1)
- Loyola of Los Angeles International and Comparative Law Review (1)
- Pace Law Review (1)
- Student Publications (1)
- The International Lawyer (1)
- UF Law Faculty Publications (1)
- Vanderbilt Journal of Transnational Law (1)
- Publication Type
Articles 1 - 30 of 59
Full-Text Articles in Entire DC Network
From The Editor, Antulio J. Echevarria Ii
From The Editor, Antulio J. Echevarria Ii
The US Army War College Quarterly: Parameters
No abstract provided.
Taking The War Colleges From Good To Great, Richard D. Hooker Jr.
Taking The War Colleges From Good To Great, Richard D. Hooker Jr.
The US Army War College Quarterly: Parameters
No abstract provided.
Parameters Winter 2019 – 2020, Usawc Press
Parameters Winter 2019 – 2020, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Australia's Lessons, Rhys Crawley
Australia's Lessons, Rhys Crawley
The US Army War College Quarterly: Parameters
This article analyzes Australia’s contribution to the Afghanistan War from 2001 to 2014. It recommends policymakers and practitioners consider applying a whole-of-government approach, embedding personnel in coalition headquarters, and limiting reliance on Special Forces soldiers in future interventions.
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Denmark's Lessons, Sten Rynning
Denmark's Lessons, Sten Rynning
The US Army War College Quarterly: Parameters
This article argues despite opportunities to learn valuable strategic lessons from Denmark’s effort in the Afghanistan War (2001–14), Danish civil authorities implemented a comprehensive approach policy that failed to establish a bridge to lessons learned by the military. Denmark’s experience in the Afghanistan War demonstrates promises and perils of lessons learned processes.
Norway's Lessons, Harald Hoiback
Norway's Lessons, Harald Hoiback
The US Army War College Quarterly: Parameters
This article argues Norway’s minor role in the Afghanistan War (2001–14) included opportunities to learn about the evolution of military deployments over the course of a prolonged counterinsurgency-focused conflict, the civilian and military dynamics, and the political challenges of contributing to such a conflict.
Educating Strategic Lieutenants At West Point, Scott A. Silverstone
Educating Strategic Lieutenants At West Point, Scott A. Silverstone
The US Army War College Quarterly: Parameters
This article argues West Point responded to the changing strategic environment from the end of the Cold War through the post-9/11 period by innovating its curriculum. Over the past several decades, however, the academy’s educational model has remained remarkably stable, rooted in an enduring commitment to a rigorous liberal education as the best preparation for officers confronting the inherent uncertainties of future wars.
Article Index, Usawc Press
Article Index, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Making The War Colleges Better, Richard A. Lacquement Jr
Making The War Colleges Better, Richard A. Lacquement Jr
The US Army War College Quarterly: Parameters
No abstract provided.
Deconstructing Perceptions Of The Border Patrol At The U.S.-Mexico Border, Claire H. Woodward
Deconstructing Perceptions Of The Border Patrol At The U.S.-Mexico Border, Claire H. Woodward
Student Publications
The U.S.-Mexico border is a space for public debate on the legal and political aspects of immigration. Politicization of the southern border has resulted in polarized public opinion regarding immigration, leading to discrepancies between public perceptions of the Border Patrol and agents’ perceptions of their job. Agents’ work requires emotional labor, and lack of training for difficult encounters, pressure within the agency to detach from emotions, and public outcry lead to dissonance in agent perceptions of their own role in immigration enforcement. In addition, economic, ethnic, and gender-based factors contribute to agent identities, which intersect with perceptions of their roles …
Terrorism And Its Legal Aftermath: The Limits On Freedom Of Expression In Canada’S Anti-Terrorism Act & National Security Act, Percy Sherwood
Terrorism And Its Legal Aftermath: The Limits On Freedom Of Expression In Canada’S Anti-Terrorism Act & National Security Act, Percy Sherwood
FIMS Publications
This analysis aims to demonstrate how s. 83.221 in Bill C-51 is likely to violate freedom of expression guaranteed under the Charter. The first section employs the two-step Irwin Toy analysis to show that the speech offense infringes upon s. 2(b) of the Charter. The second section uses the Oakes test to determine whether the breach of freedom of expression is a reasonable limit. On whether the speech offense can be justified under s. 1 of the Charter as a reasonable limit, the legislation fails at the third and fourth step of the Oakes test. Section three of this paper …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
No abstract provided.
Maritime Autonomous Vehicles Within The International Law Framework To Enhance Maritime Security, Natalie Klein
Maritime Autonomous Vehicles Within The International Law Framework To Enhance Maritime Security, Natalie Klein
International Law Studies
Technological developments necessitate a review of long-standing and diverse international legal principles. The law of the sea is no exception in this regard where the introduction of different Maritime Autonomous Vehicles (MAVs) has prompted consideration of how the laws of naval warfare and rules governing the safety of international shipping accommodate these craft. This paper shifts the focus to the international laws relating to maritime security. It assesses how well the existing international legal framework for maritime security can account for the use of MAVs by law enforcement agencies and by non-state actors who are turning to MAVs for criminal …
Defining Critical Infrastructure For A Global Application, Colleen M. Newbill
Defining Critical Infrastructure For A Global Application, Colleen M. Newbill
Indiana Journal of Global Legal Studies
A Google search for the phrase "critical infrastructure" turns up 189 million results in little more than a half second: ''global critical infrastructure" has 151 million results; and "definition of critical infrastructure" yields 71.5 million results. The list of what industries and sectors fall under the critical infrastructure designation expands as time progresses and technology develops. As the threat of cyberattacks increases and this frontier of terrorism continues to emerge, attacks on critical infrastructure are high on the list of concerns and the need for protective measures imperative. The focus on protecting critical infrastructure does not stop at the borders …
Cyber!, Andrea M. Matwyshyn
Cyber!, Andrea M. Matwyshyn
Andrea Matwyshyn
This Article challenges the basic assumptions of the emerging legal area of “cyber” or “cybersecurity.” It argues that the two dominant “cybersecurity” paradigms—information sharing and deterrence—fail to recognize that corporate information security and national “cybersecurity” concerns are inextricable. This problem of “reciprocal security vulnerability” means that in practice our current legal paradigms channel us in suboptimal directions. Drawing insights from the work of philosopher of science Michael Polanyi, this Article identifies three flaws that pervade the academic and policy analysis of security, exacerbating the problem of reciprocal security vulnerability—privacy conflation, incommensurability, and internet exceptionalism. It then offers a new paradigm—reciprocal …
The Need For A Shared Responsibility Regime Between State And Non-State Actors To Prevent Human Rights Violations Caused By Cyber-Surveillance Spyware, Anna W. Chan
Brooklyn Journal of International Law
Technology has undoubtedly contributed to the field of human rights. Internet connection and a smartphone has enabled activists to call out political leaders, shine light on human atrocities and organize mass protests through social media platforms. This has resulted in many authoritarian governments spending large amounts of their resources to purchase cyber-surveillance spyware systems from multi-national corporations to closely monitor and track their citizens for any signs of dissidence. Such technology has enabled authoritarian regimes to commit human right violations ranging from invasion of privacy, arbitrary arrest, arbitrary detention, torture and even murder. Despite the uncovering of such questionable transactions …
“Going Dark” – The Challenge Facing Law Enforcement In The 21st Century, James Christie
“Going Dark” – The Challenge Facing Law Enforcement In The 21st Century, James Christie
Economic Crime Forensics Capstones
The role of law enforcement on all levels is to prevent, detect, and investigate criminal activity. A fundamental function of law enforcement is to collect intelligence and evidence to combat criminal and terrorist activity. In numerous instances, intelligence and evidence of criminal activity appear in the form of communications and electronic data. To be effective, law enforcement requires the ability to intercept and access these communications and the electronic data pursuant to legal authority.
Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik
Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …
Comrades Or Foes: Did The Russians Break The Law Or New Ground For The First Amendment?, Artem M. Joukov, Samantha M. Caspar
Comrades Or Foes: Did The Russians Break The Law Or New Ground For The First Amendment?, Artem M. Joukov, Samantha M. Caspar
Pace Law Review
This Article discusses the recent decision by the United States Federal Government to indict more than a dozen Russian nationals for conspiracy to defraud the United States of America. The Government accused the Russians of staging protests, distributing false propaganda, and spreading political messages and ideologies online in an effort to affect the outcome of the 2016 Presidential Election. We argue that while the Defendants violated several other laws, the majority of the acts the Government classifies as a conspiracy to defraud the United States should not be considered criminal. Rather, these acts are protected political speech under the First …
Preserving Reef-Building Coral Genetic Resources With Assisted Migration: Balancing Precaution And Risk, Richard J. Bartz, Annie Brett
Preserving Reef-Building Coral Genetic Resources With Assisted Migration: Balancing Precaution And Risk, Richard J. Bartz, Annie Brett
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Political Extremism And Domestic Terrorism In America, Mark Potok
Political Extremism And Domestic Terrorism In America, Mark Potok
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Does "Meaningful Human Control" Have Potential For The Regulation Of Autonomous Weapon Systems?, Kevin Neslage
Does "Meaningful Human Control" Have Potential For The Regulation Of Autonomous Weapon Systems?, Kevin Neslage
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Exoatmospheric Plowshares: Using A Nuclear Explosive Device For Planetary Defense Against An Incoming Asteroid, David A. Koplow
Exoatmospheric Plowshares: Using A Nuclear Explosive Device For Planetary Defense Against An Incoming Asteroid, David A. Koplow
Georgetown Law Faculty Publications and Other Works
What should be done if we suddenly discover a large asteroid on a collision course with Earth? The consequences of an impact could be enormous—scientists believe that such a strike 60 million years ago led to the extinction of the dinosaurs, and something of similar magnitude could happen again. Although no such extraterrestrial threat now looms on the horizon, astronomers concede that they cannot detect all the potentially hazardous “near-Earth objects,” and even more striking, they acknowledge that if such a danger were discerned, there is currently no proven capability for diverting or destroying it.
One possible response to this …
Dogs Of War Get A New Lease On Life: Why The Military Extraterritorial Jurisdiction Act Violates The Eighth Amendment In Light Of United States V. Slatten, Michael D. Stinnett-Kassoff
Dogs Of War Get A New Lease On Life: Why The Military Extraterritorial Jurisdiction Act Violates The Eighth Amendment In Light Of United States V. Slatten, Michael D. Stinnett-Kassoff
Washington and Lee Journal of Civil Rights and Social Justice
The United States has relied on Private Military Firms (PMFs) extensively to carry out its numerous overseas military missions since the end of the Cold War. Civilians and contractors have always had a place in American wars, even during the American Revolution and beyond. But the recent American incursions into Afghanistan and Iraq brought an unprecedented number of private contractors into the forefront of these conflict zones, the discussions surrounding them, and the legal questions arising from their ashes. Particularly, private contractors in Iraq seemed to be operating in a legal grey area—they clearly were not soldiers, and they clearly …
Anti-Access Strategies In The Pacific: The United States And China, Sam J. Tangredi
Anti-Access Strategies In The Pacific: The United States And China, Sam J. Tangredi
The US Army War College Quarterly: Parameters
No abstract provided.
Russia's A2/Ad Capabilities: Real And Imagined, Keir Giles, Mathieu Boulegue
Russia's A2/Ad Capabilities: Real And Imagined, Keir Giles, Mathieu Boulegue
The US Army War College Quarterly: Parameters
No abstract provided.
Human Security In The Arctic: Implications For The United States Army, C. Anthony Pfaff
Human Security In The Arctic: Implications For The United States Army, C. Anthony Pfaff
The US Army War College Quarterly: Parameters
No abstract provided.
Projecting Stability: A Deployable Nato Police Command, Massimo Pani, Karen J. Finkenbinder
Projecting Stability: A Deployable Nato Police Command, Massimo Pani, Karen J. Finkenbinder
The US Army War College Quarterly: Parameters
No abstract provided.
Analogical Thinking: The Sine Qua Non For Using History Well, Richard A. Lacquement Jr.
Analogical Thinking: The Sine Qua Non For Using History Well, Richard A. Lacquement Jr.
The US Army War College Quarterly: Parameters
No abstract provided.