Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,180 Full-Text Articles 1,782 Authors 1,175,487 Downloads 130 Institutions

All Articles in National Security Law

Faceted Search

2,180 full-text articles. Page 7 of 72.

The Security And Human Rights Dilemma: An Inquiry Into U.S.-Ethiopia Diplomatic Relations 1991-2012, Seife Ayalew 2018 Northwestern Pritzker School of Law

The Security And Human Rights Dilemma: An Inquiry Into U.S.-Ethiopia Diplomatic Relations 1991-2012, Seife Ayalew

Northwestern Journal of Human Rights

In the post-1991 U.S.-Ethiopian diplomacy, the use of foreign policy as a framework to advance the cause of human rights has faced several challenges rooted in the way human rights is defined and the intricate interests vested in the U.S. foreign policy establishment. This article elucidates the limitations and challenges of diplomatic machinery as a framework for advancing the cause of human rights. First, human rights in the U.S. foreign policy machine have been given a marginal or subordinate place in diplomatic priorities. Second, the Government of Ethiopia’s (GOE) resistance and tough diplomatic measures and ...


Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich 2018 Brooklyn Law School

Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich

Brooklyn Law Review

In recent years, “home grown” terrorists—individuals inspired to violence after watching terrorist videos online—have been responsible for devastating attacks in the United States and across Europe. Such terrorist propaganda falls outside the realm of the First Amendment’s protection because it has been proven to indoctrinate attackers, thus inciting imminent lawless action. Seizing on this, victims’ families have brought suits alleging that social media platforms, including Twitter, Facebook, and Google, provided material support to terrorists in violation of the Anti-Terrorism Act (ATA). The Communications Decency Act (CDA), however, has served as an impenetrable shield against these claims, protecting ...


Disciplining Deference: Strengthening The Role Of The Federal Courts In The National Security Realm, Dominic X. Barceleau 2018 Notre Dame Law School

Disciplining Deference: Strengthening The Role Of The Federal Courts In The National Security Realm, Dominic X. Barceleau

Notre Dame Law Review

This Note will argue that federal courts need to be more “disciplined” in their deference determinations in order to effectively check the Executive’s power. Part I will look at the Constitution and its allocation of foreign relations powers for evidence of the appropriate amount of deference that ought to be shown by the judiciary. While the text of the Constitution is largely silent on this question, Part I will show that this silence does not exclude a role for the judiciary in foreign affairs. Part II will proceed to discuss several important Supreme Court decisions that have helped to ...


Contemporary Practice Of The United States Relating To International Law (112:1 Am J Int'l L), Jean Galbraith 2018 University of Pennsylvania Law School

Contemporary Practice Of The United States Relating To International Law (112:1 Am J Int'l L), Jean Galbraith

Faculty Scholarship at Penn Law

This article is reproduced with permission from the January 2018 issue of the American Journal of International Law © 2018 American Society of International Law. All rights reserved.

Once the PDF is open, individual articles are accessible either by scrolling down or by clicking on the bookmark symbol.


How The War On Terror Is Transforming Private U.S. Law, Maryam Jamshidi 2018 New York University School of Law

How The War On Terror Is Transforming Private U.S. Law, Maryam Jamshidi

Washington University Law Review

In thinking about the War on Terror’s impact on U.S. law, what most likely comes to mind are its corrosive effects on public law, including criminal law, immigration, and constitutional law. What is less appreciated is whether and how the fight against terrorism has also impacted private law. As this Article demonstrates, the War on Terror has had a negative influence on private law, specifically on torts, where it has upended long-standing norms, much as it has done in the public law context.

Case law construing the private right of action under the Antiterrorism Act of 1992, 18 ...


Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall 2018 Arkansas State University - Main Campus

Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall

Catholic University Journal of Law and Technology

Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes ...


The Corporate Governance Of National Security, Andrew Verstein 2018 Wake Forest University School of Law

The Corporate Governance Of National Security, Andrew Verstein

Washington University Law Review

At hundreds of companies, the government installs former spies and military officers to run the business without shareholder oversight, putting security before profits in order to protect vital projects from potentially treasonous influences. Through procedures I call “National Security Corporate Governance,” corporate boardrooms have quietly become instruments of national defense, marrying the efficiency norms of corporate law and the protective ambitions of national security. How is this achieved, and how successfully? Using a variety of research approaches – including Freedom of Information Act (FOIA) requests, archival searches, telephone interviews, and in-person conversations with industry insiders – this Article illuminates a secretive government ...


Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia 2018 Monash University

Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia

Indiana Law Journal

Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal delivery device for malware, as users routinely launch unverified programs and forego virus detection. The illicit nature of the transaction forces users to rely almost entirely on the reputation of websites, uploaders, and other users to determine if a file is safe to download ...


Cybersecurity And The New Era Of Space Activities, David P. Fidler 2018 Indiana University Maurer School of Law

Cybersecurity And The New Era Of Space Activities, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Curbing Remedies For Official Wrongs: The Need For Bivens Suits In National Security Cases, Peter Margulies 2018 Roger Williams University School of Law

Curbing Remedies For Official Wrongs: The Need For Bivens Suits In National Security Cases, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Smart Machines And Smarter Policy: Foreign Investment Regulation, National Security, And Technology Transfer In The Age Of Artificial Intelligence, 51 J. Marshall L. Rev. 279 (2018), Justin Shields 2018 John Marshall Law School

Smart Machines And Smarter Policy: Foreign Investment Regulation, National Security, And Technology Transfer In The Age Of Artificial Intelligence, 51 J. Marshall L. Rev. 279 (2018), Justin Shields

The John Marshall Law Review

No abstract provided.


Plata O Plomo: Effect Of Mexican Transnational Criminal Organizations On The American Criminal Justice System, Mark M. McPherson 2018 St. Mary's University School of Law

Plata O Plomo: Effect Of Mexican Transnational Criminal Organizations On The American Criminal Justice System, Mark M. Mcpherson

St. Mary's Law Journal

Abstract forthcoming


Sanctuary Networks And Integrative Enforcement, Ming Hsu Chen 2018 University of Colorado Law School

Sanctuary Networks And Integrative Enforcement, Ming Hsu Chen

Articles

My intended focus is on the widespread response--in cities, churches, campuses, and corporations that together comprise "sanctuary networks"--to the Trump Administration's Executive Order 13768 Enhancing Public Safety in the Interior of the United States as an instance of the changing relationship between federal, local, and private organizations in the regulation of immigration. After briefly covering the legal background of the Trump Interior E.O., the focus of the Article shifts to the institutional dynamics arising in communities. These institutional dynamics exemplify the beginnings of a reimagined immigration enforcement policy with a more integrative flavor.


Congressional Authorization Of The Campaign Against Isil, Tyler Salway 2018 Indiana University, Maurer School of Law

Congressional Authorization Of The Campaign Against Isil, Tyler Salway

Indiana Law Journal

I. THE BIRTH OF ISIL

II. CONGRESSIONAL AUTHORIZATION

A. EXPRESS AUTHORIZATION

1. METHODS OF INCLUSION

2. ISIL’S INCLUSION UNDER THE 9/11 AUMF

B. IMPLICIT AUTHORIZATION

III. ISIL AND THE TRUMP PRESIDENCY

CONCLUSION


Evading Constitutional Challenge: Dapa's Implications For Future Exercises Of Executive Enforcement Discretion, Lucy Chauvin 2018 Indiana University, Maurer School of Law

Evading Constitutional Challenge: Dapa's Implications For Future Exercises Of Executive Enforcement Discretion, Lucy Chauvin

Indiana Law Journal

I. UNITED STATES V. TEXAS: DEFINING THE BOUNDARIES OF ENFORCEMENT DISCRETION

A. DAPA AND THE CONSTITUTIONAL CHALLENGE

B. SCHOLARLY DEBATE: APPLICATION OF YOUNGSTOWN FRAMEWORK TO DAPA

II. TAKE CARE: CONFLICTING INTERPRETATIONS OF THE DUTY TO FAITHFULLY EXECUTE THE LAW

III. ENFORCEMENT DISCRETION: INTERACTION BETWEEN CONGRESS AND THE EXECUTIVE

A. HECKLER V. CHANEY: EARLY RECOGNITION OF EXECUTIVE ENFORCEMENT DISCRETION

B. ENFORCEMENT DISCRETION’S SPECIFIC APPLICATION TO IMMIGRATION LAW

C. THE MEANING OF “DEFERRED ACTION”

IV. THE HISTORICALLY LIMITED ROLE OF THE JUDICIARY

A. PRESUMPTIVE UNREVIEWABILITY

B. ADDITIONAL PROCEDURAL HURDLES

V. MOVING FORWARD: LESSONS TO BE LEARNED FROM THE OBAMA ADMINISTRATION

A ...


Excavating The Forgotten Suspension Clause, Helen Norton 2018 University of Colorado Law School

Excavating The Forgotten Suspension Clause, Helen Norton

Articles

No abstract provided.


An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson 2018 Indiana University Maurer School of Law

An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


National Security, Immigration And The Muslim Bans, Shoba Wadhia 2018 Penn State Law

National Security, Immigration And The Muslim Bans, Shoba Wadhia

Journal Articles

National security language has continued to guide the creation and defense of Executive Orders and related immigration policies issued in the Donald J. Trump administration. This Article builds on earlier scholarship examining the relationship between national security and immigration in the wake of September 11, 2001, under the Obama administration, and during the campaign leading to the 2016 Election. While the Article is largely descriptive, it ultimately questions the longevity of using national security to create and defend immigration law. This Article is limited in scope -- it does not provide a deep dive into the constitutionality of the Muslim bans ...


Finality Of A Conviction: A Noncitizen's Right To Procedural Due Process, Daniela Mondragon 2018 St. Mary's University

Finality Of A Conviction: A Noncitizen's Right To Procedural Due Process, Daniela Mondragon

St. Mary's Law Journal

Abstract forthcoming


Deliberative Constitutionalism In The National Security Setting, Mary B. DeRosa, Milton C. Regan 2018 Georgetown University Law Center

Deliberative Constitutionalism In The National Security Setting, Mary B. Derosa, Milton C. Regan

Georgetown Law Faculty Publications and Other Works

Deliberative democracy theory maintains that authentic deliberation about matters of public concern is an essential condition for the legitimacy of political decisions. Such deliberation has two features. The first is deliberative rigor. This is deliberation guided by public-regarding reasons in a process in which persons are genuinely open to the force of the better argument. The second is transparency. This requires that requires that officials publicly explain the reasons for their decisions in terms that citizens can endorse as acceptable grounds for acting in the name of the political community.

Such requirements would seem to be especially important in the ...


Digital Commons powered by bepress