Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,085 Full-Text Articles 2,544 Authors 2,772,516 Downloads 145 Institutions

All Articles in National Security Law

Faceted Search

3,085 full-text articles. Page 1 of 111.

The House Doesn't Always Win, Jennifer OWEN 2023 University of Nevada, Las Vegas

The House Doesn't Always Win, Jennifer Owen

International Conference on Gambling & Risk Taking

In June 2015, fourteen South Korean casino executives were arrested on charges of soliciting Chinese players to gamble in their casinos. This single event foreshadowed a seismic change in the Australian casino market that few would have anticipated. The events which unfolded led to the two largest casino operators in Australia being found unsuitable to operate their casinos, and unable to hold their licenses. Collectively, these two casino groups reported revenues of $5.0bn in 2019, accounting for 92% of the total Australian casino market.

Both are now operating under various forms of special supervision until it can be demonstrated that …


Waking Sleeping Beauty? Exploring The Challenges Of Cyber-Deterrence By Punishment, Thibault Moulin 2023 Catholic University of Lyon

Waking Sleeping Beauty? Exploring The Challenges Of Cyber-Deterrence By Punishment, Thibault Moulin

Loyola of Los Angeles International and Comparative Law Review

No abstract provided.


Climate Security Insights From The Covid-19 Response, Mark Nevitt 2023 Emory University School of Law

Climate Security Insights From The Covid-19 Response, Mark Nevitt

Indiana Law Journal

The climate change crisis and COVID-19 crisis are both complex collective action problems. Neither the coronavirus nor greenhouse gas (GHG) emissions respect political borders. Both impose an opportunity cost that penalizes inaction. They are also increasingly understood as nontraditional, novel security threats. Indeed, COVID-19’s human cost is staggering, with American lives lost vastly exceeding those lost in recent armed conflicts. And climate change is both a threat accelerant and a catalyst for conflict—a characterization reinforced in several climate-security reports. To counter COVID-19, the President embraced martial language, stating that he will employ a “wartime footing” to “defeat the virus.” Perhaps …


U.S. Government Information Resources For Accountability On U.S. Assistance To Ukraine, Bert Chapman 2023 Purdue University

U.S. Government Information Resources For Accountability On U.S. Assistance To Ukraine, Bert Chapman

Libraries Faculty and Staff Presentations

Provides detailed coverage of U.S. Government information resources documenting accountability for U.S. civilian and military assistance to Ukraine. Includes U.S. laws, agencies involved in U.S. arms export policy, Defense Department resources and data, Defense Dept. Inspector General reports, Government Accountability Office reports, congressional committee hearings, a letter from a congressional committee to the Secretaries of Defense and State and U.S. Agency for International Development administrator, congressional debate, and congressional recorded votes.


Was The Colonial Cyberattack The First Act Of Cyberwar Against The U.S.? Finding The Threshold Of War For Ransomware Attacks, Liam P. Bradley 2023 St. John's University School of Law

Was The Colonial Cyberattack The First Act Of Cyberwar Against The U.S.? Finding The Threshold Of War For Ransomware Attacks, Liam P. Bradley

St. John's Law Review

(Excerpt)

On May 7, 2021, “DarkSide,” a foreign hacker group, conducted a ransomware attack against the Colonial Pipeline (“Colonial”). That morning, Colonial discovered a “ransom note demanding cryptocurrency.” The attack forced the shutdown of the Colonial Pipeline, stopping the daily delivery of 2.5 million barrels (MMBbls) of “gasoline, jet fuel and diesel” to the East Coast. The shutdown created fuel shortages, impacted financial markets, and panicked the public. The resulting fuel shortages and economic impacts “triggered a comprehensive federal response” on May 11, 2021. On May 12, CEO Joseph Blount paid a ransom of nearly $5 million in bitcoin to …


The Common Law And First Amendment Qualified Right Of Public Access To Foreign Intelligence Law, Laura K. Donohue 2023 Georgetown University Law Center

The Common Law And First Amendment Qualified Right Of Public Access To Foreign Intelligence Law, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

For millennia, public access to the law has been the hallmark of rule of law. To be legally and morally binding, rules must be promulgated. Citizens’ knowledge of the law, in turn, serves as the lynchpin for democratic governance. In common law countries, it is more than just the statutory provisions and their execution that matters: how courts rule, and the reasoning behind their determination, proves central. Accordingly, in the United States, both common law and the right to petition incorporated in the First Amendment have long enshrined a presumed right of public right of access to Article III opinions …


From The Acting Editor In Chief, Conrad C. Crane 2023 US Army War College

From The Acting Editor In Chief, Conrad C. Crane

The US Army War College Quarterly: Parameters

Welcome to the Spring 2023 issue of Parameters. This issue consists of an In Focus special commentary and the SRAD Director’s Corner focused on Afghanistan, three forums, and two Reviews and Replies.


One Treaty To Apply Them All? Defining Maritime Terrorism By Cross-References And Reservations: The Asean Region Example, Arron N. Honniball 2023 U.S. Naval War College

One Treaty To Apply Them All? Defining Maritime Terrorism By Cross-References And Reservations: The Asean Region Example, Arron N. Honniball

International Law Studies

Defining terms will shape a State’s treaty obligations, the domestic legislation necessary, the availability of cooperative mechanisms, and norm diffusion. Maritime terrorism is an umbrella term referring to the piecemeal approach of treaties creating offenses for identified acts at sea. Further treaties cross-reference the offenses in a selection of global instruments to create related offenses. This includes financing of terrorism (Convention for the Suppression of the Financing of Terrorism (ICSFT)) and regional maritime terrorism (ASEAN Convention on Counter Terrorism (ACCT)). All cross-referenced instruments shall apply to define ICFST or ACCT offenses unless a State excludes, by reservation, a cross-referenced instrument …


Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue 2023 Georgetown University Law Center

Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The Supreme Court’s 2022 decision in Federal Bureau of Investigation v. Fazaga heralds a worrying trend. Over the past 15 years, as more information about how the government wields its foreign intelligence collection authorities on U.S. soil has become available, it has become clear that the government has repeatedly acted outside its constitutional and statutory limits, and at times, in flagrant disregard for judicial orders. As a result, dozens of cases challenging surveillance have been making their way through the courts. Unlike in prior eras, in certain cases it has become easier for litigants to establish an injury-in-fact in light …


Measuring Corruption As A Threat To International Security: An Emerging Indicator For Enhancement Of Global Corruption Governance, Sungyong Kang 2023 Korea National Police University

Measuring Corruption As A Threat To International Security: An Emerging Indicator For Enhancement Of Global Corruption Governance, Sungyong Kang

Michigan Journal of International Law

The conceptual changes to international security after the end of the Cold War, and particularly those following the al-Qaeda attacks of 2001, clarified the symbiotic relationship between corruption and international security: Corruption destroys the social political environment required to create human security and to ensure safety from terrorist attacks, and national borders increasingly fail to restrain its negative consequences.

To achieve human security though policy intervention in domestic affairs, global corruption governance relies on numerical indicators that measure corruption. By evaluating states through public comparison, indicators pressure states to improve their domestic institutions and structures to align them with the …


From Well-Side Meetings To Pelican Strategy: A Context-Based Approach To Combat Corruption, Lili Yan 2023 Saint Mary's College of California

From Well-Side Meetings To Pelican Strategy: A Context-Based Approach To Combat Corruption, Lili Yan

Pace International Law Review

This article takes up the question of what strategy is to be used among different communities to eradicate corruption across borders. The debate between two legal scholars, Steven Salbu and Philip Nichols, over the viability of extraterritorial application of anti-bribery laws remains thought-provoking when we look at the effectiveness of the OECD Anti-bribery Convention or FCPA in curbing corruption. Empirical research shows that firms from countries with extraterritorial legal restrictions do not necessarily refrain themselves from paying bribes in foreign transactions. This article ties the Salbu-Nichols’ debate, ISCT, mediating institutions theory, and Pelican Gambits strategy together to structure a context …


The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check 2023 American University Washington College of Law

The Tallinn Manual 2.0 On Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check

American University National Security Law Brief

Protecting critical infrastructure from cyber threats is difficult and complex. News headlines abound with reports that show how critical infrastructure—ranging from voting machines to steel mills—have become increasingly vulnerable to cyber operations from state and sophisticated nonstate actors. As critical infrastructure becomes increasingly entangled with the Internet and as new tactics, techniques, and procedures rapidly proliferate and evolve, governments and businesses alike must contend with a mutating threat environment that may put sensitive and highly important critical infrastructure assets in serious jeopardy. The vulnerabilities of critical infrastructure, which provide vital services and functions to societies, may pose a particularly tempting …


Revisiting Goldwater-Nichols: Why Making The Joint Staff A General Staff Will Improve Civilian Control Of The Military And Refine The Constitutional Balance Of War Powers, Michael D. Minerva 2023 American University Washington College of Law

Revisiting Goldwater-Nichols: Why Making The Joint Staff A General Staff Will Improve Civilian Control Of The Military And Refine The Constitutional Balance Of War Powers, Michael D. Minerva

American University National Security Law Brief

As the United States has progressively become more involved globally since World War II, the U.S. military is being stretched beyond the professional military competency straining civilian control of the military. To remedy this, it is again time to revisit our national security structure, and adopt a General Staff in place of the Joint Staff. Following World War II and the destruction of the German General Staff by the Nazi Party, the General Staff as an institution has been emotionally rejected in the United States without a careful historical and legal examination of how that institution operates under varying forms …


Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu 2023 American University Washington College of Law

Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu

American University National Security Law Brief

The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.


Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick McCarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling 2023 American University Washington College of Law

Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Assessing The Legal Framework For Potential U.S. Conflict With China Over Taiwan, Shawn W. Brennan 2022 U.S. Naval War College

Assessing The Legal Framework For Potential U.S. Conflict With China Over Taiwan, Shawn W. Brennan

International Law Studies

The People’s Republic of China has clearly stated the importance of resolving the Taiwan question and realizing China’s complete “reunification” to end their century of humiliation. As China grows as the most significant strategic competitor to the United States and develops the military capability to force the issue, understanding what legal authorities the President may exercise in ordering a response is increasingly urgent. This article reviews the legal authorities for the use of force by the United States and examines the contours of the President’s authorities and where they intersect with Congress’s authorities. Through various hypothetical scenarios involving attempts by …


From The Acting Editor In Chief, Conrad C. Crane 2022 US Army War College

From The Acting Editor In Chief, Conrad C. Crane

The US Army War College Quarterly: Parameters

No abstract provided.


Parameters Winter Issue 2022-23, USAWC Press 2022 US Army War College

Parameters Winter Issue 2022-23, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Why Do Senior Officers Sometimes Fail In Character? The Leaky Character Reservoir, Everett S.P. Spain, Katie E. Matthew, Andrew L. Hagemaster 2022 US Army War College

Why Do Senior Officers Sometimes Fail In Character? The Leaky Character Reservoir, Everett S.P. Spain, Katie E. Matthew, Andrew L. Hagemaster

The US Army War College Quarterly: Parameters

This article argues senior officers may fail in character because their rate of character development throughout their careers typically decreases as environmental stressors rise. It conceptualizes character as an open system with both gains and leaks over time and integrates existing scholarship on personality and ethical development to create the Leaky Character Reservoir framework, which it then applies to Army officers’ careers. Military leaders will gain a new understanding of character and find specific actions officers, units, and the US Army can undertake to strengthen the character of its senior officers.


Imperialism In The Making Of U.S. Law, Nina Farnia 2022 St. John's University School of Law

Imperialism In The Making Of U.S. Law, Nina Farnia

St. John's Law Review

(Excerpt)

This Article proceeds in two parts. In Part I, “U.S. Foreign Policy as Racial Policy,” I identify the four key policy pillars of U.S. imperialism: militarism, unilateral coercive measures, foreign aid, and the deployment of the dollar. I then pivot to a brief history of U.S. imperialism in the Middle East, highlighting the geographic and racial specificities that influence the ideological and legal contours of U.S. imperialism. I end this section with an analysis of The Public Report of the Vice President’s Task Force on Combatting Terrorism (1985), which was a defining document in the making of anti-terrorism law …


Digital Commons powered by bepress