Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of South Florida (17)
- Georgetown University Law Center (11)
- Mitchell Hamline School of Law (11)
- US Army War College (11)
- University of Miami Law School (10)
-
- Pepperdine University (9)
- SelectedWorks (7)
- University of Michigan Law School (6)
- New York Law School (5)
- Selected Works (5)
- Maurer School of Law: Indiana University (4)
- Penn State Law (4)
- American University Washington College of Law (3)
- Barry University School of Law (3)
- Brigham Young University Law School (3)
- Claremont Colleges (3)
- Duke Law (3)
- Embry-Riddle Aeronautical University (3)
- Western New England University (3)
- Fordham Law School (2)
- Pace University (2)
- University of Florida Levin College of Law (2)
- Valparaiso University (2)
- Washington and Lee University School of Law (2)
- West Virginia University (2)
- Cleveland State University (1)
- Columbia Law School (1)
- Cornell University Law School (1)
- Eastern Michigan University (1)
- Edith Cowan University (1)
- Keyword
-
- National security (31)
- Terrorism (21)
- National Security (17)
- Counterterrorism (13)
- September 11 Terrorist Attacks 2001 (12)
-
- Terrorism--United States (11)
- 9/11 (9)
- International law (8)
- Intelligence service (7)
- Secret police (7)
- Security (7)
- Human rights (6)
- Afghanistan (5)
- Drones (5)
- Intelligence (5)
- Privacy (5)
- United States (5)
- War (5)
- European Union (4)
- Guantanamo (4)
- Humanitarian law (4)
- Jus ad bellum (4)
- Jus in bello (4)
- Military (4)
- September 11 (4)
- War on terror (4)
- Al-Qaeda (3)
- Boumediene (3)
- Constitutional rights (3)
- Department of Defense (3)
- Publication
-
- Journal of Strategic Security (17)
- Georgetown Law Faculty Publications and Other Works (11)
- The US Army War College Quarterly: Parameters (11)
- William Mitchell Law Review (11)
- Faculty Scholarship (10)
-
- University of Miami National Security & Armed Conflict Law Review (10)
- NYLS Law Review (5)
- Pepperdine Dispute Resolution Law Journal (4)
- Pepperdine Law Review (4)
- Barry Law Review (3)
- Claremont-UC Undergraduate Research Conference on the European Union (3)
- Penn State Journal of Law & International Affairs (3)
- Elisabeth Haub School of Law Faculty Publications (2)
- Federal Communications Law Journal (2)
- IP Theory (2)
- Jon Foster (2)
- Law Faculty Publications (2)
- McKay Smith (2)
- Michigan Law Review (2)
- Security Studies & International Affairs - Daytona Beach (2)
- UF Law Faculty Publications (2)
- Washington and Lee Law Review (2)
- West Virginia Law Review (2)
- Anthony J. King (1)
- Applied Aviation Sciences - Daytona Beach (1)
- Articles (1)
- Articles & Book Chapters (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Articles, Book Chapters, & Popular Press (1)
- BYU Law Review (1)
- Publication Type
Articles 1 - 30 of 155
Full-Text Articles in Law
Cyber Deterrence, Eric Talbot Jensen
Cyber Deterrence, Eric Talbot Jensen
Faculty Scholarship
Cyber operations by both state actors and non-state actors are increasing in frequency and severity. As nations struggle to defend their networks and infrastructure, their ability to apply the principles of deterrence to cyber activities correspondingly increases in importance. Cyber deterrence offers much more flexibility and increased options from traditional deterrence methodologies developed in the Cold War’s nuclear age. In addition to traditional retaliation, cyber deterrence includes options such as taking legal action; and making networks invisible, resilient, and interdependent. It also presents new ways to view and apply accepted methodologies such as invulnerability. As the U.S. continues to develop …
Cyberattacks And The Covert Action Statute: Toward A Domestic Legal Framework For Offensive Cyberoperations, Aaron P. Brecher
Cyberattacks And The Covert Action Statute: Toward A Domestic Legal Framework For Offensive Cyberoperations, Aaron P. Brecher
Michigan Law Review
Cyberattacks are capable of penetrating and disabling vital national infrastructure, causing catastrophic economic harms, and approximating the effects of war, all from remote locations and without the use of conventional weapons. They can be nearly impossible to attribute definitively to their sources and require relatively few resources to launch. The United States is vulnerable to cyberattacks but also uniquely capable of carrying out cyberattacks of its own. To do so effectively, the United States requires a legal regime that is well suited to cyberattacks' unique attributes and that preserves executive discretion while inducing the executive branch to coordinate with Congress. …
Boland In The Wind: The Iran-Contra Affair And The Invitation To Struggle , Bretton G. Sciaroni
Boland In The Wind: The Iran-Contra Affair And The Invitation To Struggle , Bretton G. Sciaroni
Pepperdine Law Review
No abstract provided.
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
San Diego International Law Journal
The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …
Maritime Piracy: Changes In U.S. Law Needed To Combat This Critical National Security Concern, Daniel Pines
Maritime Piracy: Changes In U.S. Law Needed To Combat This Critical National Security Concern, Daniel Pines
Seattle University Law Review
Piracy threatens, and has taken, the lives of American crews and civilians. It poses an enormous economic threat, both in terms of ransom payments and impact on global commerce. It enhances political instability in significant regions of the world, such as the Horn of Africa and the Straits of Malacca. Most critically, though, maritime piracy offers an easy and tempting conduit for terrorism. Terrorists have already used maritime options to advance their cause in several dramatic attacks, including the hijacking of a cruise ship (and murder of a Jewish passenger), the ramming of a boat into a U.S. destroyer (killing …
The United States' Use Of Drones In The War On Terror: The (Il)Legality Of Targeted Killings Under International Law, Milena Sterio
The United States' Use Of Drones In The War On Terror: The (Il)Legality Of Targeted Killings Under International Law, Milena Sterio
Law Faculty Articles and Essays
After the terrorist attacks of September 11, 2001, the United States government began to use drones against al-Qaeda targets. According to several media reports, the United States developed two parallel drone programs: one operated by the military, and one operated in secrecy by the CIA. Under the Obama Administration, the latter program developed and- the number of drone attacks in countries such as Pakistan and Yemen has steadily increased. Because the drone program is operated covertly by the CIA, it has been impossible to determine the precise contours of the program, its legal and normative framework, and whether its operators …
The 2011 Mena Revolutions: A Study In U.S. Energy (In)Security, Jessie Rumsey
The 2011 Mena Revolutions: A Study In U.S. Energy (In)Security, Jessie Rumsey
Journal of Strategic Security
The recent upheavals in the Middle East and North Africa (MENA) have brought into stark relief the conflict between democratic values and strategic interests in U.S. foreign policy. Americans are known for commitment to life, liberty, and the pursuit of happiness, yet the U.S. Government is frequently unwilling to step forward and openly express even rhetorical support for reform movements in foreign countries. In fact, initial American reluctance to support the recent "Arab Spring" uprisings serves as another example of what scholars argue is a general exception in the MENA to broader post-Cold War rising costs of maintaining autocracy. This …
The Strategic Implications Of China's Rare Earths Policy, Shane Bilsborough
The Strategic Implications Of China's Rare Earths Policy, Shane Bilsborough
Journal of Strategic Security
Drawing on literature in China studies, strategic theory, and expert interviews, this article analyzes the possibility of "rare earths" being leveraged by the People's Republic of China (PRC) in a crisis. The evidence suggests China's position in the rare earths market could constitute a significant security liability for the United States. It also seems that even if coercion fails to materialize, China's rare earths policies have the potential to intensify security dilemmas in Sino-American relations.
Arctic Energy Resources: Security And Environmental Implications, Peter Johnston
Arctic Energy Resources: Security And Environmental Implications, Peter Johnston
Journal of Strategic Security
In recent years, there has been considerable interest in the Arctic as a source for resources, as a potential zone for commercial shipping, and as a region that might experience conflict due to its strategic importance. With regards to energy resources, some studies suggest that the region contains upwards of 13 percent of global undiscovered oil, 30 percent of undiscovered gas, and multiples more of gas hydrates. The decreasing amount and duration of Arctic ice cover suggests that extraction of these resources will be increasingly commercially viable. Arctic and non-arctic states wish to benefit from the region's resources and the …
European Strategies For Energy Security In The Natural Gas Market, Boyka M. Stefanova
European Strategies For Energy Security In The Natural Gas Market, Boyka M. Stefanova
Journal of Strategic Security
This article examines the European Union's (EU) approach to energy security on the example of its natural gas imports from Russia, the largest supplier of gas to European markets. Two major projects, Nord Stream in the Northern and Western part of the EU, and Nabucco in South-Central Europe, demonstrate opposing energy security strategies, seemingly at odds with the EU objective of achieving energy independence from Russia. The question arises: Are these strategies sustainable? How can they be reconciled and pursued under a common policy? The main argument is that such conflicting sub-regional policy initiatives are amenable to progressive realignment and …
Assessing Whether Oil Dependency In Venezuela Contributes To National Instability, Adam Kott
Assessing Whether Oil Dependency In Venezuela Contributes To National Instability, Adam Kott
Journal of Strategic Security
The focus of this article is on what role, if any, oil has on Venezuela's instability. When trying to explain why a resource-rich country experiences slow or negative growth, experts often point to the resource curse. The following pages explore the traditional theory behind the resource curse as well as alternative perspectives to this theory such as ownership structure and the correlation between oil prices and democracy. This article also explores the various forms of instability within Venezuela and their causes. Finally, the article looks at President Hugo Chavez's political and economic policies as well as the stagnation of the …
From Plyler V. Doe To Trayvon Martin: Toward Closing The Open Society, Lyle Dennison
From Plyler V. Doe To Trayvon Martin: Toward Closing The Open Society, Lyle Dennison
Washington and Lee Law Review
Lyle Denniston, the longest serving and most experienced journalist covering the United States Supreme Court, takes his theme of an inclusive and open society from the constitutional and cultural vision of the late Justice Lewis F. Powell, Jr. and then offers a detailed argument that America is forfeiting—or at least compromising—that vision in favor of a safer, more secure and more cramped society, at home and abroad. The Article, taken from a memorial lecture in Justice Powell’s honor at Washington and Lee University in April 2012, draws upon a variety of very different societal and legal developments that are found …
From The Editor, Robert H. Taylor
From The Editor, Robert H. Taylor
The US Army War College Quarterly: Parameters
No abstract provided.
American Landpower And The Middle East Of 2030, Michael R. Eastman
American Landpower And The Middle East Of 2030, Michael R. Eastman
The US Army War College Quarterly: Parameters
No abstract provided.
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Off The Press, Usawc Press
Off The Press, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Afghanistan: Strategy And War Termination, Christopher Tuck
Afghanistan: Strategy And War Termination, Christopher Tuck
The US Army War College Quarterly: Parameters
No abstract provided.
From The Archives, Usawc Press
From The Archives, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
The Afghanistan Experience: Democratization By Force, Cora Sol Goldstein
The Afghanistan Experience: Democratization By Force, Cora Sol Goldstein
The US Army War College Quarterly: Parameters
No abstract provided.
Editor's Shelf, Usawc Press
Editor's Shelf, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
The Futility Of Force And The Preservation Of Power: British Strategic Failure In America, 1780-83, Daniel T. Canfield
The Futility Of Force And The Preservation Of Power: British Strategic Failure In America, 1780-83, Daniel T. Canfield
The US Army War College Quarterly: Parameters
No abstract provided.
Coin Is Dead—Long Live Transformation, Cora Ford, Patrick Rose, Howard Body
Coin Is Dead—Long Live Transformation, Cora Ford, Patrick Rose, Howard Body
The US Army War College Quarterly: Parameters
No abstract provided.
The Internet, New Media, And The Evolution Of Insurgency, Steven Metz
The Internet, New Media, And The Evolution Of Insurgency, Steven Metz
The US Army War College Quarterly: Parameters
No abstract provided.
Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay
Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay
Security Studies & International Affairs - Daytona Beach
This article analyzes the phenomenon of homeland security through the development of four conceptual lenses that were created out of the existing literatures in criminal justice, public administration, organization behavior, risk management, international relations, and the overlap between them. Using terrorism as a proxy for the homeland security enterprise, these conceptual lenses include: (1) homeland security as a criminal justice problem which views terrorism as a crime; (2) homeland security as a international relations problem which views terrorism as a war; (3) homeland security as an organization design problem which views terrorism as a network of sub-state transnational actors; and …
“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez
“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez
IP Theory
No abstract provided.
National Security Policy Constraints On Technological Innovation: A Case Study Of The Invention Secrecy Act Of 1951, Dorothy K. Mcallen
National Security Policy Constraints On Technological Innovation: A Case Study Of The Invention Secrecy Act Of 1951, Dorothy K. Mcallen
Master's Theses and Doctoral Dissertations
Recent studies indicate that the United States is trailing other countries in technological innovation and competitiveness. This case study examined national security policy constraints on technological innovation, specifically the Invention Secrecy Act. It focused on the social constructs of collaboration and interdisciplinary knowledge in the aerospace industry. The methodology included historical research, data collection, and semi-structured interviews with experts from academia, general industry, government and public policy, aerospace/defense industry, and federal government. The results of the study suggested that since World War II, national security policies have not been clearly and consistently defined, interpreted, or implemented. This lack of clarity …
Pnr In 2011: Recalling Ten Years Of Transatlantic Cooperation In Pnr Information, Valentin M. Pfisterer
Pnr In 2011: Recalling Ten Years Of Transatlantic Cooperation In Pnr Information, Valentin M. Pfisterer
University of Miami National Security & Armed Conflict Law Review
In Fall 2011, U.S. and EU negotiators agreed on new parameters for the collection, processing, use, storage and crossborder transfer of Passenger Name Record (PNR) data. 2011 also marks the tenth anniversary of the September 11, 2001 terrorist attacks on the World Trade Center in New York City and the Pentagon in Washington D.C., which provides the historic reason for the cooperation in this area. These two events thus provide a timely basis and background against which to review the ten year history of the cooperation between the U.S. and the EU in PNR information management.
This article maps the …
Masthead
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
Front Matter And Table Of Contents
Front Matter And Table Of Contents
University of Miami National Security & Armed Conflict Law Review
No abstract provided.