Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Purdue University (22)
- Montclair State University (16)
- University of Pennsylvania Carey Law School (12)
- Embry-Riddle Aeronautical University (7)
- Emory University School of Law (5)
-
- Gettysburg College (5)
- SIT Graduate Institute/SIT Study Abroad (5)
- Georgetown University Law Center (4)
- Western Kentucky University (4)
- Duke Law (3)
- Pace University (3)
- Singapore Management University (3)
- University of Maryland Francis King Carey School of Law (2)
- University of Nevada, Las Vegas (2)
- Air Force Institute of Technology (1)
- Antioch University (1)
- Cedarville University (1)
- College of the Holy Cross (1)
- Connecticut College (1)
- Edith Cowan University (1)
- Georgia State University (1)
- Osgoode Hall Law School of York University (1)
- Otterbein University (1)
- Pepperdine University (1)
- Southern Methodist University (1)
- University of Massachusetts Boston (1)
- University of Nebraska - Lincoln (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of Southern Maine (1)
- Keyword
-
- Geopolitics (12)
- Congressional oversight (8)
- National security (8)
- China (7)
- International law (7)
-
- Terrorism (7)
- Climate change (6)
- Terrorists (5)
- United States (5)
- Homeland security (4)
- Western Kentucky University (4)
- Artificial intelligence (3)
- Criminal law (3)
- Cybersecurity (3)
- Intelligence analysis (3)
- International security (3)
- Law (3)
- Military law (3)
- South China Sea (3)
- War (3)
- 9/11 (2)
- Administrative law (2)
- Battle (2)
- Biological weapons (2)
- Cartography (2)
- Congress (2)
- Congressional science committees (2)
- Crime (2)
- Criminal (2)
- Cybersecurity education (2)
- Publication Year
- Publication
-
- Department of Justice Studies Faculty Scholarship and Creative Works (13)
- All Faculty Scholarship (12)
- Libraries Faculty and Staff Presentations (12)
- Libraries Faculty and Staff Scholarship and Research (8)
- Faculty Articles (5)
-
- Independent Study Project (ISP) Collection (5)
- Georgetown Law Faculty Publications and Other Works (4)
- Security Studies & International Affairs - Daytona Beach (4)
- Student Publications (4)
- WKU Archives Records (4)
- Applied Aviation Sciences - Daytona Beach (3)
- Elisabeth Haub School of Law Faculty Publications (3)
- Faculty Scholarship (3)
- Research Collection Yong Pung How School Of Law (3)
- Publications from President Jonathan G.S. Koppell (2)
- Antioch University Dissertations & Theses (1)
- Articles & Book Chapters (1)
- Baker Scholar Projects (1)
- Book Chapters (1)
- Brookings Scholar Lecture Series (1)
- CISLA Senior Integrative Projects (1)
- Center for Governance and Sustainability Publications (1)
- Congressional Testimony (1)
- Department of Political Science and Law Faculty Scholarship and Creative Works (1)
- EBCS Presentations (1)
- Education Division Scholarship (1)
- FORCES Initiative: Strategy, Security, and Social Systems (1)
- Faculty Publications (1)
- History Capstone Research Papers (1)
- Homeland Security Publications (1)
- File Type
Articles 31 - 60 of 111
Full-Text Articles in Law
Towards An Experimental Testbed To Study Cyber Worm Behaviors In Large Scale Networks, Harish Kunta, Bhavya Induri, Anu G. Bourgeois, David Maimon, Ashwin Ashok
Towards An Experimental Testbed To Study Cyber Worm Behaviors In Large Scale Networks, Harish Kunta, Bhavya Induri, Anu G. Bourgeois, David Maimon, Ashwin Ashok
EBCS Presentations
A worm is a malicious agent that propagates across networks of devices creating negative impacts on the devices it is able to reach and infect. Currently, there is very limited information in cybersecurity research regarding worm behavior across real networks of devices, particularly in large scale networks (e.g. campus networks, office networks, IoT etc.). This paper positions an experimental testbed that can be used for studying worm behaviors in large scale networks. In particular, this research aims to setup an infrastructure to empirically study worm generation, propagation, attacks, policies and antidote (intervention) mechanisms through a unified experimental testbed. As a …
From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia
From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
From The Legal Literature: Automating Police, Francesca Laguardia
From The Legal Literature: Automating Police, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
From The Legal Literature: Disentangling Prison And Punishment, Francesca Laguardia
From The Legal Literature: Disentangling Prison And Punishment, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia
From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
No abstract provided.
On Environmental Law, Climate Change, And National Security Law, Mark P. Nevitt
On Environmental Law, Climate Change, And National Security Law, Mark P. Nevitt
Faculty Articles
This Article offers a new way to think about climate change. Two new climate change assessments—the 2018 Fourth National Climate Assessment (“NCA”) and the United Nations Intergovernmental Panel on Climate Change’s Special Report on Climate Change— prominently highlight climate change’s multifaceted national security risks. Indeed, not only is climate change an environmental problem, it also accelerates existing national security threats, acting as both a “threat accelerant” and “catalyst for conflict.” Further, climate change increases the intensity and frequency of extreme weather events while threatening nations’ territorial integrity and sovereignty through rising sea levels. It causes both internal displacement within nations …
How U.S. Government Policy Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman
How U.S. Government Policy Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman
Libraries Faculty and Staff Presentations
Artificial intelligence is affecting many areas of our lives and governmental policy. National security is one arena in which artificial intelligence is playing an increasingly important and controversial role. U.S. Government and military agencies are producing a steadily expanding corpus of publicly available literature on this topic. This literature documents how these agencies have this topic's national security implications historically and currently while also addressing potentially emerging national security issues where artificial intelligence will intersect with national security. This presentation demonstrates examples of the growing variety of publicly available national security artificial intelligence literature while also addressing the implications of …
Deconstructing Perceptions Of The Border Patrol At The U.S.-Mexico Border, Claire H. Woodward
Deconstructing Perceptions Of The Border Patrol At The U.S.-Mexico Border, Claire H. Woodward
Student Publications
The U.S.-Mexico border is a space for public debate on the legal and political aspects of immigration. Politicization of the southern border has resulted in polarized public opinion regarding immigration, leading to discrepancies between public perceptions of the Border Patrol and agents’ perceptions of their job. Agents’ work requires emotional labor, and lack of training for difficult encounters, pressure within the agency to detach from emotions, and public outcry lead to dissonance in agent perceptions of their own role in immigration enforcement. In addition, economic, ethnic, and gender-based factors contribute to agent identities, which intersect with perceptions of their roles …
Safety & Risk Management News - May 2019, Otterbein University
Safety & Risk Management News - May 2019, Otterbein University
Otterbein Police Department
No abstract provided.
British Government Information Resources, Bert Chapman
British Government Information Resources, Bert Chapman
Libraries Faculty and Staff Creative Materials
Provides an overview of British Government information resources. Contents include basic British economic and political background and information from British Government websites including the Department of Environment, Food, and Rural Affairs (DEFRA), Brexit related material produced by British government agencies such as the Department for Exiting the European Union,, the Ministry of Defence, the National Museum of the Royal Navy, the Home Office Visas and Immigration Section, the Office of National Statistics, Her Majesty's Treasury, the British Parliament including parliamentary committees and research agencies, the website of Member of Parliament (MP) Jacob Rees-Mogg (Conservative-North East Somerset), a webcast of House …
The Operational And Administrative Militaries, Mark P. Nevitt
The Operational And Administrative Militaries, Mark P. Nevitt
All Faculty Scholarship
This Article offers a new way of thinking about the military. The U.S. military’s existing legal architecture arose from tragedy: in response to operational military failures in Vietnam, the 1980 failed Iranian hostage rescue attempt and other military misadventures, Congress revamped the Department of Defense (DoD)’s organization. The resulting law, the Goldwater-Nichols Act, formed two militaries within the DoD that endure to this day. These two militaries – the operational military and the administrative military – were once opaque to the outside observer but have emerged from the shadows in light of recent conflicts. The operational military remains the focus …
Enhancing Your Intelligence Agency Information Resource Iq: Pt. 4: National Geospatial Intelligence Agency (Ngia), National Intelligence University (Niu), And National Reconnaissance Office (Nro), Bert Chapman
Libraries Faculty and Staff Presentations
Webinar presentation on publicly accessible information resources produced by the U.S. National Geospatial Intelligence Agency (NGIA), National Intelligence University (NIU), and National Reconnaissance Office. Places significant emphasis on missions of these agencies, their historical accomplishments, coverage of their educational activity, and information on the technologies they have used and are currently using to fulfill their institutional objectives.
Border Enforcement And Civil Rights Along The Texas-Mexico Border, Esther Reyes
Border Enforcement And Civil Rights Along The Texas-Mexico Border, Esther Reyes
Latino Public Policy
Over the past two decades, spending on enforcement along the southwestern border of the United States has expanded dramatically. The annual budget of the U.S. Border Patrol, increased from $400 million in fiscal year 1994 to $3.8 billion in fiscal year 2017. During this period, the number of Border Patrol agents stationed along the U.S.Mexico border grew by nearly 450 percent, from 3,747 to over 16,605 agents. Meanwhile, apprehensions of unauthorized migrants along the U.S.-Mexico border declined from 979,101 in 1994 to 303,916 in 2017.
These expansions and the accompanying declines in immigrant populations and apprehensions have raised concerns about …
Eyes In The Sky, Concerns On The Ground, Siyuan Chen, Zi En Chow
Eyes In The Sky, Concerns On The Ground, Siyuan Chen, Zi En Chow
Research Collection Yong Pung How School Of Law
In the last few years, drones have literally taken flight in our skies, over our parks, our beaches –and even over our homes. Aerial imaging enthusiasts are thrilled about their impact, while thosewho have privacy concerns may have some reservations.But while consumer-level drones do not make the best spies – they’re noisy, conspicuous, have ashort battery-life, are vulnerable to jamming and have limited telephoto capability – this maychange over time. With that in mind, we need to consider whether the existing causes of actionprovide any relief in law and, if they do not, how governments can regulate drones in a …
The Geopolitics Of Rare Earth Elements: Emerging Challenge For U.S. National Security And Economics, Bert Chapman
The Geopolitics Of Rare Earth Elements: Emerging Challenge For U.S. National Security And Economics, Bert Chapman
Libraries Faculty and Staff Scholarship and Research
Rare earth elements (REE) contain unique chemical and physical properties such as lanthanum, are found in small concentrations, need extensive precise processes to separate, and are critical components of modern technologies such as laser guidance systems, personal electronics such as IPhones, satellites, and military weapons systems as varied as Virginia-class fast attack submarines, DDG- 51 Aegis destroyers, the F-35 Joint Strike Fighter, and precision guided munitions. The U.S. has some rare earth resources, but is heavily dependent on access to them from countries as varied as Afghanistan, Bolivia, and China. Losing access to these resources would have significant adverse economic, …
Geopolitics Of Rare Earth Elements, Bert Chapman
Geopolitics Of Rare Earth Elements, Bert Chapman
Libraries Faculty and Staff Presentations
Rare earth elements (REE) contain unique chemical physical properties such as lanthamum, are found in small concentrations, need extensive precise properties to separate, and are critical components of modern technologies such as laser guidance systems, personal electronics such as IPhones, satellites, and military weapons systems as varied as Virginia-class fast attack submarines, DDG-51 Aegis destroyers, the F-35 Joint Strike Fighter, and precision guided munitions. The U.S. has some rare earth resources, but is heavily dependent on access to them from countries as varied as Afghanistan, Bolivia, and China. Losing access to these resources would have significant adverse economic, military, and …
50 Years On, S’Pore’S National Service Is Now A Shared Legacy, Tan K. B. Eugene
50 Years On, S’Pore’S National Service Is Now A Shared Legacy, Tan K. B. Eugene
Research Collection Yong Pung How School Of Law
SMU Associate Professor of Law Eugene Tan contributed an opinion piece which argued that National Service (NS) provides Singapore with a security umbrella under which economic and commercial ambitions and aspirations can be purposefully pursued. Beyond its primary role as a defence force, NS has immense potential to shape society by nurturing national and civic consciousness, critical for Singapore’s multiracial society. “Given the extensive commitment, efforts continue to be made to strengthen the tripartite relationship between the Ministry of Defence and SAF [Singapore Armed Forces], employers and NSmen [men engaged in National Service]. They include recognising supportive employers and businesses, …
Unconventional Lawfare: Operational Law In The War On Terror, L. P. Miller
Unconventional Lawfare: Operational Law In The War On Terror, L. P. Miller
Political Science Student Scholarship
This thesis examines the legal work required to establish a sufficient lawfare defense by focusing on the Department of Defense Judge Advocate Generals’ Corps (JAG Corps). The work will describe the JAG Corps as a well-trenched bureaucracy with a moral mission to uphold the military’s honor through laws, and how this was interpreted by the Bush and Obama administrations.
Deterring Torture: The Preventive Power Of Criminal Law And Its Promise For Inhibiting State Abuses, Francesca Laguardia
Deterring Torture: The Preventive Power Of Criminal Law And Its Promise For Inhibiting State Abuses, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
The use of torture in the War on Terror reinvigorated a longstanding debate about how to prevent such human rights violations, and whether they should be criminalized. Using US history as a case study, this article argues that the criminal sanction is likely to be more successful in preventing such abuses than many other often suggested methods. Analyzing thousands of pages of released government documents as an archive leads to the counterintuitive finding that torturers were often deterred, at least momentarily, by fear of criminal liability, and would have been successfully deterred if not for the lack of prior prosecutions.
The Complex Combatant: Constructions Of Victimhood And Perpetrator-Hood In Gulu District, Northern Uganda, Kyra Fox
Independent Study Project (ISP) Collection
In the wake of the Lord’s Resistance Army (LRA) conflict in Northern Uganda, both the local and international community struggle to define the “victims” and “perpetrators” of a conflict that transformed ordinary civilians into combatants. Made up primarily of child soldiers, the LRA forcefully abducted and conscripted children across Northern Uganda to fight in a guerilla war against the Ugandan government. LRA members were forced to murder their own families and terrorize their home villages in an attempt to disorient and desensitize them to lives of violence. Some became willing, even eager fighters; others struggled daily to live with their …
Geopolitical Implications Of The Sino-Japanese East China Sea Dispute For The U.S., Bert Chapman
Geopolitical Implications Of The Sino-Japanese East China Sea Dispute For The U.S., Bert Chapman
Libraries Faculty and Staff Scholarship and Research
Much analysis on Asian strategic challenges facing the U.S. has justifiably emphasized the South China Sea (SCS). This has also been reflected in 2016 presidential campaign debate on the SCS as an emerging area of U.S. foreign and national security policy concern. The East China Sea (ECS) is at least as important for the strategic interests of the U.S. and its allies given the tension between China and Japan over the Senkaku/Diaoyu islands, potential energy resources in this body of water, increasing defense spending by adjacent geographic powers, the area’s importance as a maritime international trade route, and the possibility …
Ua12/8 Annual Campus Safety & Security Report, Wku Police
Ua12/8 Annual Campus Safety & Security Report, Wku Police
WKU Archives Records
A statement of current campus policies regarding procedures for students and others to report criminal actions or other emergencies occurring on campus and policies concerning the institution's response to such reports.
Presidential War Powers As A Two-Level Dynamic: International Law, Domestic Law, And Practice-Based Legal Change, Curtis A. Bradley, Jean Galbraith
Presidential War Powers As A Two-Level Dynamic: International Law, Domestic Law, And Practice-Based Legal Change, Curtis A. Bradley, Jean Galbraith
Faculty Scholarship
There is a rich literature on the circumstances under which the United Nations Charter or specific Security Council resolutions authorize nations to use force abroad, and there is a rich literature on the circumstances under which the U.S. Constitution and statutory law allows the President to use force abroad. These are largely separate areas of scholarship, addressing what are generally perceived to be two distinct levels of legal doctrine. This Article, by contrast, considers these two levels of doctrine together as they relate to the United States. In doing so, it makes three main contributions. First, it demonstrates striking parallels …
Presidential War Powers As An Interactive Dynamic: International Law, Domestic Law, And Practice-Based Legal Change, Curtis A. Bradley, Jean Galbraith
Presidential War Powers As An Interactive Dynamic: International Law, Domestic Law, And Practice-Based Legal Change, Curtis A. Bradley, Jean Galbraith
All Faculty Scholarship
There is a rich literature on the circumstances under which the United Nations Charter or specific Security Council resolutions authorize nations to use force abroad, and there is a rich literature on the circumstances under which the U.S. Constitution and statutory law allows the President to use force abroad. These are largely separate areas of scholarship, addressing what are generally perceived to be two distinct levels of legal doctrine. This Article, by contrast, considers these two levels of doctrine together as they relate to the United States. In doing so, it makes three main contributions. First, it demonstrates striking parallels …
Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle
Laird V. Tatum And Article Iii Standing In Surveillance Cases, Jeffrey L. Vagle
All Faculty Scholarship
Plaintiffs seeking to challenge government surveillance programs have faced long odds in federal courts, due mainly to a line of Supreme Court cases that have set a very high bar to Article III standing in these cases. The origins of this jurisprudence can be directly traced to Laird v. Tatum, a 1972 case where the Supreme Court considered the question of who could sue the government over a surveillance program, holding in a 5-4 decision that chilling effects arising “merely from the individual’s knowledge” of likely government surveillance did not constitute adequate injury to meet Article III standing requirements.
Ending Security Council Resolutions, Jean Galbraith
Ending Security Council Resolutions, Jean Galbraith
All Faculty Scholarship
The Security Council resolution implementing the Iran deal spells out the terms of its own destruction. It contains a provision that allows any one of seven countries to terminate its key components. This provision – which this Comment terms a trigger termination – is both unusual and important. It is unusual because, up to now, the Security Council has almost always either not specified the conditions under which resolutions terminate or used time-based sunset clauses. It is important not only for the Iran deal, but also as a precedent and a model for the use of trigger terminations in the …
China's Nine-Dashed Map: Continuing Maritime Source Of Geopolitical Tension, Bert Chapman
China's Nine-Dashed Map: Continuing Maritime Source Of Geopolitical Tension, Bert Chapman
Libraries Faculty and Staff Scholarship and Research
The South China Sea (SCS) is becoming an increasingly contentious source of geopolitical tension due to its significance as an international trade route, possessor of potentially significant oil and natural gas resources, China’s increasing diplomatic and military assertiveness, and the U.S.’ recent and ongoing Pacific Pivot strategy. Countries as varied as China, Taiwan, the Philippines, Indonesia and other adjacent countries have claims on this region’s islands and natural resources. China has been particularly assertive in asserting its SCS claims by creating a nine-dash line map claiming to give it de facto maritime control over this entire region without regard to …
New Start From Old Beginnings?, Michaela Ruhlmann
New Start From Old Beginnings?, Michaela Ruhlmann
History Capstone Research Papers
This paper examines the extent of which START I and New START achieved effective balance of power between the United States and Russia. It addresses the purpose, agreements and the impact of START I and New Start on the effectiveness in accomplishing global balance of power. This paper argues that while the original START I accomplished a global balance of power by equalizing reduction of nuclear arsenals in both countries, but that New START did not accomplish a long-term global balance of power. To best demonstrate this, “New START from Old Beginnings?” covers START I’s historical context, examine its actual …
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
The 4th Amendment To The U.S. Constitution, Article 3 Of The Ala Code Of Ethics, And Section 215 Of The Usa Patriot Act: Squaring The Triangle, Sue Ann Gardner
University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches
Librarians in the United States have many professional guideposts to inform their work. A patron's right to privacy is one tenet that tends to be upheld tenaciously, and is informed first by the 4th Amendment to the U.S. Constitution, among other Amendments, as well as Article III of the American Library Association Code of Ethics. Section 215 of the USA PATRIOT Act, the so-called "library provision," contradicts both the 4th Amendment and Article III of the ALA Code of Ethics, making it a weak third leg of a triangle of guideposts. The speaker explains how Section 215 allows for confiscation …
The Commander In Chief's Authority To Combat Climate Change, Mark P. Nevitt
The Commander In Chief's Authority To Combat Climate Change, Mark P. Nevitt
Faculty Articles
This Article first outlines the myriad national security threats posed by a changing climate, addressing the President’s and Congress’s powers to plan, study, and invest in climate-resilient infrastructure at military installations that are vulnerable to a rise in sea levels. Second, this Article asserts that climate change will stress and test persistent separation of powers concerns at home and abroad. Specifically, the President has less authority to protect military infrastructure domestically in the face of congressional intransigence, but has comparably greater authority as Commander in Chief to respond to climate-induced events abroad. Third, this Article argues that the threat of …