Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,204 Full-Text Articles 2,646 Authors 3,320,217 Downloads 145 Institutions

All Articles in National Security Law

Faceted Search

3,204 full-text articles. Page 5 of 117.

A Call To Action: Lessons From Ukraine For The Future Force, Katie Crombe, John A. Nagl 2023 US Army War College

A Call To Action: Lessons From Ukraine For The Future Force, Katie Crombe, John A. Nagl

The US Army War College Quarterly: Parameters

Fifty years ago, the US Army faced a strategic inflection point after a failed counterinsurgency effort in Vietnam. In response to lessons learned from the Yom Kippur War, the United States Army Training and Doctrine Command was created to reorient thinking and doctrine around the conventional Soviet threat. Today’s Army must embrace the Russo-Ukrainian conflict as an opportunity to reorient the force into one as forward-thinking and formidable as the Army that won Operation Desert Storm. This article suggests changes the Army should make to enable success in multidomain large-scale combat operations at today’s strategic inflection point.


From The Acting Editor In Chief, Conrad C. Crane 2023 US Army War College

From The Acting Editor In Chief, Conrad C. Crane

The US Army War College Quarterly: Parameters

Welcome to the Autumn 2023 issue of Parameters. This issue includes two In Focus special commentaries, a Strategic Challenges forum, a Historical Studies forum, and the SRAD Director’s Corner.


Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin 2023 Maurer School of Law - Indiana University

Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin

Articles by Maurer Faculty

The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …


Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton 2023 American University, Washington College of Law

Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Advances in information technology have irrevocably changed the nature of war crimes investigations. The pursuit of accountability for the most serious crimes of concern to the international community now invariably requires access to digital evidence. The global reach of platforms like Facebook, YouTube, and Twitter means that much of that digital evidence is held by U.S. social media companies, and access to it is subject to the U.S. Stored Communications Act.

This is the first Article to look at the legal landscape facing international investigators seeking access to digital evidence regarding genocide, war crimes, crimes against humanity, and aggression. It …


On The Fence About Immigration And Overpopulation: "Environmentalists" Challenge Dhs Policies On Nepa Basis In Whitewater Draw Natural Resource Conservation District V. Mayorkas, Maya J. Williams 2023 Villanova University Charles Widger School of Law

On The Fence About Immigration And Overpopulation: "Environmentalists" Challenge Dhs Policies On Nepa Basis In Whitewater Draw Natural Resource Conservation District V. Mayorkas, Maya J. Williams

Villanova Environmental Law Journal

No abstract provided.


The House Doesn't Always Win, Jennifer OWEN 2023 University of Nevada, Las Vegas

The House Doesn't Always Win, Jennifer Owen

International Conference on Gambling & Risk Taking

In June 2015, fourteen South Korean casino executives were arrested on charges of soliciting Chinese players to gamble in their casinos. This single event foreshadowed a seismic change in the Australian casino market that few would have anticipated. The events which unfolded led to the two largest casino operators in Australia being found unsuitable to operate their casinos, and unable to hold their licenses. Collectively, these two casino groups reported revenues of $5.0bn in 2019, accounting for 92% of the total Australian casino market.

Both are now operating under various forms of special supervision until it can be demonstrated that …


Geniuses Dare To Ride Their Luck: Clausewitz’S Card Game Analogies, Nicholas A. A. Murray 2023 US Army War College

Geniuses Dare To Ride Their Luck: Clausewitz’S Card Game Analogies, Nicholas A. A. Murray

The US Army War College Quarterly: Parameters

Scholars have been using the wrong card games to analyze Carl von Clausewitz’s analogies in On War, which has led to errors in understanding his ideas. This article identifies the games Clausewitz discusses, allowing for a more accurate interpretation of his original meaning for the study of war. Since Clausewitz’s ideas underpin strategy development within service education systems, it is critical his ideas are fully understood in context.


Responding To Future Pandemics: Biosecurity Implications And Defense Considerations, Diane DiEuliis, James Giordano 2023 US Army War College

Responding To Future Pandemics: Biosecurity Implications And Defense Considerations, Diane Dieuliis, James Giordano

The US Army War College Quarterly: Parameters

In an evolving and expanding biothreat landscape caused by emerging biotechnologies, increases in global infectious disease outbreaks, and geopolitical instability, the Department of Defense now faces challenges that alter its traditional approach to biothreats and prompt the need for modernized, improved preparedness for—and response to—potential biothreat scenarios. These challenges further complicate specific weaknesses revealed by the COVID-19 pandemic, including the Department’s inability to sustain the military mission while meeting intragovernmental expectations to assist with civilian public health resources and services.


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum 2023 University of South Florida

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Cuban Embargo: An Insufficient Measure To Encourage Us Foreign Policy Interests, Esme JM Prowse 2023 University of Windsor

Cuban Embargo: An Insufficient Measure To Encourage Us Foreign Policy Interests, Esme Jm Prowse

Major Papers

This major paper examines the Cuban embargo as an ineffective hard power policy and explores the potential of soft, hard, and smart power as alternative approaches to resolve the failures of the 60-year-old blockade. The paper analyzes the historical context and rationale behind the embargo and assesses its impact on Cuban-American relations, regional stability, and U.S. national interests. The study argues that the embargo has failed to achieve its intended goals and has instead perpetuated a cycle of hostility, isolation, and human rights abuses. By drawing on the theoretical frameworks of soft, hard, and smart power, the paper presents policy …


Drug Ideologies Of The United States, Macy Montgomery 2023 Liberty University

Drug Ideologies Of The United States, Macy Montgomery

Helm's School of Government Conference - American Revival: Citizenship & Virtue

The United States has been increasingly creating lenient drug policies. Seventeen states and Washington, the District of Columbia, legalized marijuana, and Oregon decriminalized certain drugs, including methamphetamine, heroin, and cocaine. The medical community has proven that drugs, including marijuana, have myriad adverse health side effects. This leads to two questions: Why does the United States government continue to create lenient drug policies, and what reasons do citizens give for legalizing drugs when the medical community has proven them harmful? The paper hypothesizes that the disadvantages of drug legalization outweigh its benefits because of the numerous harms it causes, such as …


Taking National Security Seriously: Navigating Japan’S Expanded Restrictions On Global Trade And Investment, C.D.A. Evans, Aviel Menter 2023 Pepperdine University

Taking National Security Seriously: Navigating Japan’S Expanded Restrictions On Global Trade And Investment, C.D.A. Evans, Aviel Menter

The Journal of Business, Entrepreneurship & the Law

This paper explores recent changes to Japan’s national security restrictions on the foreign acquisition of Japanese companies and other financial assets. Commentators have often incorrectly characterized these developments as driven by economic or diplomatic considerations. In fact, a different set of concerns has motivated Japan’s policy shift: national security. Due to the critical security relationship between Japan and the United States, Japanese macroeconomic policy often changes in response to American politics. Recently, changes in the Trump Administration’s approach to the Committee on Foreign Investment in the United States (CFIUS) have caused corresponding changes in how Japan regulates international business transactions. …


Indo-Pacific Conflicts Will Be Reimagined In Outer Space Exploration, Michael Incorvaia 2023 Seattle University School of Law

Indo-Pacific Conflicts Will Be Reimagined In Outer Space Exploration, Michael Incorvaia

Seattle Journal of Technology, Environmental & Innovation Law

This article will focus on the effects of international treaties and how they can be utilized to govern the future of outer space exploration. The discussion will include evaluating how modern changes in technology have created a need for updated outer space-specific treaties to ensure that outer space does not become a contentious zone between countries. This article will begin by exploring the developments in outer space that have created a new space race. Then, it will discuss the Indo-Pacific conflict and why the current multilateral treaty strategy that is used in the region will not be effective in outer …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman 2023 University of South Florida

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer 2023 National Defense University, College of Information and Cyberspace

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane 2023 University of South Florida

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


An Unreasonable Presumption: The National Security/Foreign Affairs Nexus In Immigration Law, Anthony J. DeMattee, Matthew J. Lindsay, Hallie Ludsin 2023 Brooklyn Law School

An Unreasonable Presumption: The National Security/Foreign Affairs Nexus In Immigration Law, Anthony J. Demattee, Matthew J. Lindsay, Hallie Ludsin

Brooklyn Law Review

For well over a century, immigration has occupied a constitutionally unique niche within US public law. Noncitizens in immigration proceedings are routinely denied constitutional guarantees, including due process and equal protection, that apply in virtually every other legal setting. Courts justify their extraordinary deference to the government by invoking a presumptive nexus between immigration, on the one hand, and national security and foreign affairs, on the other. Critically, courts cite the national security/foreign affairs nexus regardless of whether the specific regulation or enforcement action under review has any plausible bearing on those interests. This article is the first to demonstrate …


A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen 2023 Pepperdine University

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen

Global Tides

This paper attempts to explain the threat that foreign disinformation poses for the United States Intelligence Community and its allies. The paper examines Russian disinformation from both a historical and contemporary context and how its effect on Western democracies may only be exacerbated in light of Chinese involvement and evolving technologies. Fortunately, the paper also studies practices and strategies that the United States Intelligence Community and its allied foreign counterparts may use to respond. It is hoped that this study will help shed further light on Russian and Chinese disinformation campaigns and explain how the Intelligence Community can efficiently react.


The State Secrets Privilege: An Institutional Process Approach, Alexandra B. Dakich 2023 Northwestern Pritzker School of Law

The State Secrets Privilege: An Institutional Process Approach, Alexandra B. Dakich

Northwestern University Law Review

It is no secret that since September 11, 2001, the Executive Branch has acted at variance with laws otherwise restraining its conduct under the guise of national security. Among other doctrines that make up the new national security canon, state secrets privilege assertions have narrowed the scope of redressability for parties alleging official misconduct in national security cases. For parties such as the Muslim American community surveilled by the FBI in Orange County, California, or Abu Zubaydah, who was subjected to confirmed torture tactics by the U.S. government, success in the courts hinges on the government’s unbridled ability to assert …


Waking Sleeping Beauty? Exploring The Challenges Of Cyber-Deterrence By Punishment, Thibault Moulin 2023 Catholic University of Lyon

Waking Sleeping Beauty? Exploring The Challenges Of Cyber-Deterrence By Punishment, Thibault Moulin

Loyola of Los Angeles International and Comparative Law Review

No abstract provided.


Digital Commons powered by bepress