Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Entire DC Network

Bureaucratic Resistance And The National Security State, Rebecca Ingber Nov 2018

Bureaucratic Resistance And The National Security State, Rebecca Ingber

Faculty Scholarship

Modern accounts of the national security state tend toward one of two opposing views of bureaucratic tensions within it: At one extreme, the executive branch bureaucracy is a shadowy “deep state,” unaccountable to the public or even to the elected President. On this account, bureaucratic obstacles to the President’s agenda are inherently suspect, even dangerous. At the other end, bureaucratic resistance to the President represents a necessary benevolent constraint on an otherwise imperial executive, the modern incarnation of the separation of powers, as the traditional checks on the President of the courts and Congress have fallen down on the job. …


The Significance Of Mongolia's Foreign Policy And Security Apparatus On A Global And Regional Scale, Bolor Lkhaajav May 2018

The Significance Of Mongolia's Foreign Policy And Security Apparatus On A Global And Regional Scale, Bolor Lkhaajav

Master's Projects and Capstones

Mongolia, land-locked between two politically, economically, and militarily powerful nations — Russia and China — often must balance its foreign and security policies with its two neighbors and countries beyond. When discussing Mongolia’s foreign policy and security apparatus, historians and scholars look at the international relations of East Asia as a whole. This is the case not because Mongolia’s foreign policy is insignificant but because greater powers impose greater influence on smaller states. Mongolia’s partial involvement in World War II (WWII), and the Cold War introduced new challenges as well as opportunities for Mongolia to modernize its foreign policy principles …


Terrorism Risk Insurance: Is It Really Working?, Rebecca Demarest Apr 2018

Terrorism Risk Insurance: Is It Really Working?, Rebecca Demarest

Honors Projects in Mathematics

This paper investigates terrorism risk insurance in the United States as well as those programs offered in other countries throughout the world. In the United States, particular attention is devoted to the interaction of government with private insurers to maintain an effective insurance program. An analysis is performed comparing terrorism insurance before and after the attacks on the World Trade Center on September 11, 2001. The paper looks into actual terrorist events that have occurred focusing on 56 world-wide events that are associated with property losses greater than $10 million. This paper not only investigates the losses that were incurred …


The Fight Over Encryption: Reasons Why Congress Must Block The Government From Compelling Technology Companies To Create Backdoors Into Their Devices, Shannon Lear Apr 2018

The Fight Over Encryption: Reasons Why Congress Must Block The Government From Compelling Technology Companies To Create Backdoors Into Their Devices, Shannon Lear

Cleveland State Law Review

Advances in technology in the past decade have blurred the line between individuals’ privacy rights and the government’s ability to access information. How should this issue be handled in a manner that balances the privacy rights of individuals and the government’s access to information in the interest of national security?

This Note proposes a bright-line rule that would continue to allow the government to obtain specific information from a data service provider without forcing the company to circumvent its own security features. Under this rule, a company shall relinquish specific information in its control or possession only by court order …


R2h And The Prospects For Peace: An Essay On Sovereign Responsibilities, David Luban Jan 2018

R2h And The Prospects For Peace: An Essay On Sovereign Responsibilities, David Luban

Georgetown Law Faculty Publications and Other Works

This essay examines novel threats to peace – social and political threats as well as military and technological. It worries that familiar conceptions of state sovereignty cannot sustain a legal order capable of meeting those threats, not even if we understand sovereignty as responsibility to protect human rights. The essay tentatively proposes that recent efforts to reformulate state sovereignty as responsibility to humanity – ‘R2H’ for short – offer a better hope. Under this reformulation, states must take into account the interests of those outside their sovereign territory as well as those of the of their own people – in …


Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor Jan 2018

Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor

Articles in Law Reviews & Other Academic Journals

In Sorerejgntyin Cyberspace: Lex Lata Vel Non?, Michael Schmitt and Liis Vihul argue that territorial sovereignty is a primary rule of international law that limits cyber activities. They recognize, however, that not all cyber effects constitute violations of territorial sovereignty, and like Rule 4 in the Tallinn Manual 2.0 and its commentary, they acknowledge a distinct lack of consensus among the Tallinn participants on the critical question of applicable thresholds. Problematically, they do not identify the necessary state practice and opinio juris that would be required to establish either the primary rule that they proffer or the existence and contours …


An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson Jan 2018

An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Under The Radar: The Cost And Benefits Of Wind Energy Through The Lens Of National Security, David N. Cassuto Jan 2018

Under The Radar: The Cost And Benefits Of Wind Energy Through The Lens Of National Security, David N. Cassuto

Elisabeth Haub School of Law Faculty Publications

This Article examines wind energy through the lens of national security. The benefit resides with helping the United States become energy independent. National-security concerns also present a cost because wind energy interferes with military radar, posing a potential threat to the systems that monitor possible attacks. This Article attempts to analyze the overall impact of wind energy while noting the inherent difficulties when so much uncertainty is involved in the process.

Part I of this Article discusses the benefits of wind energy. Part II examines its costs, specifically its interference with radar, and what that means for national security. This …


Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt Jan 2018

Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt

All Faculty Scholarship

What best explains how “Everything Became War and the Military Became Everything?”— the provocative title of a recent book by Professor Rosa Brooks of Georgetown Law. In this Essay, I turn to the Department of Defense’s (DoD) unique agency design as the vehicle to address this question. Specifically, I first describe and analyze the role that the 1947 National Security Act and 1986 Goldwater-Nichols Act play in incentivizing organizational behavior within the DoD. These two Acts have broad implications for national security governance. Relatedly, I address the consequences of these two core national security laws, focusing on the …