Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,233 Full-Text Articles 1,810 Authors 1,175,487 Downloads 131 Institutions

All Articles in National Security Law

Faceted Search

2,233 full-text articles. Page 7 of 74.

Civil Liberty And National Security: The Implications Of The Debate For The United States Intelligence Community, Peyton Hedrick 2018 Liberty University

Civil Liberty And National Security: The Implications Of The Debate For The United States Intelligence Community, Peyton Hedrick

Senior Honors Theses

For years, the US Intelligence Community has worked to maintain the thin and often wavering line between civil liberty and national security in its attempts to protect the American people while simultaneously preserving their constitutional rights. However, this line has often shifted with the course of American history, including events such as the Alien and Sedition Acts, the establishment of the Church Committee, and the publication of the NSA’s data collection program. One of the most significant of these factors was the passage and eventual amendment of the Foreign Intelligence Surveillance Act, which opened the door to later constitutional ...


"Thou Shalt Not Ration Justice": The Importance Of Autism Insurance Reform For Military Autism Families, And The Economic And National Security Implications Of Improving Access To Aba Therapy Under Tricare, Ariana Cernius 2018 Notre Dame Law School

"Thou Shalt Not Ration Justice": The Importance Of Autism Insurance Reform For Military Autism Families, And The Economic And National Security Implications Of Improving Access To Aba Therapy Under Tricare, Ariana Cernius

Journal of Legislation

No abstract provided.


Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo 2018 Department of Physics, University of Nairobi, Kenya

Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo

International Journal of Nuclear Security

Nuclear energy’s distinctive characteristics give rise to special educational requirements. These requirements are necessary to not only address the danger of nuclear proliferation, but also to build capacity for a secure nuclear fuel circle. In this paper, I assess the status of educational capacity in nuclear security both in response to, and in support of, Kenya’s nuclear power program. I highlight the nuclear security educational infrastructure’s key features in the context of nuclear power, noting the low capacity at Kenyan universities. I identify the steps required to ensure that the country’s dynamic nuclear regulatory infrastructural framework ...


Jurisdiction, The Internet, And The Good Faith Exception: Controversy Over The Government’S Use Of Network Investigative Techniques, Maureen Weidman 2018 Penn State Dickinson Law

Jurisdiction, The Internet, And The Good Faith Exception: Controversy Over The Government’S Use Of Network Investigative Techniques, Maureen Weidman

Dickinson Law Review

In February 2015, the FBI discovered a website dedicated to child pornography located on the Tor Network, a network designed to protect its users’ identities on the Internet. Due to the structure of the Tor Network, the FBI could not take down the website and identify users who previously accessed the website. Instead, the FBI kept the website operational for 30 days and applied for a search warrant in the Eastern District of Virginia to use a device called a Network Investigative Technique (“NIT”). This device operated similarly to malware and “attached” to computers accessing the website, allowing the government ...


The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim 2018 Indiana University

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim

Indiana Law Journal

On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept ...


Terrorism Risk Insurance: Is It Really Working?, Rebecca Demarest 2018 Bryant University

Terrorism Risk Insurance: Is It Really Working?, Rebecca Demarest

Honors Projects in Mathematics

This paper investigates terrorism risk insurance in the United States as well as those programs offered in other countries throughout the world. In the United States, particular attention is devoted to the interaction of government with private insurers to maintain an effective insurance program. An analysis is performed comparing terrorism insurance before and after the attacks on the World Trade Center on September 11, 2001. The paper looks into actual terrorist events that have occurred focusing on 56 world-wide events that are associated with property losses greater than $10 million. This paper not only investigates the losses that were incurred ...


National Security Lawyering: The Best View Of The Law As A Regulative Ideal, Mary B. DeRosa 2018 Georgetown University Law Center

National Security Lawyering: The Best View Of The Law As A Regulative Ideal, Mary B. Derosa

Georgetown Law Faculty Publications and Other Works

In The National Security Lawyer in Crisis: When the “Best View” of the Law May Not Be the Best View, Robert Bauer describes the challenges for executive branch lawyers providing advice during a national security crisis. Bauer focuses on two especially perilous episodes in United States history—the Cuban Missile Crisis and the run-up to U.S. involvement in World War II—and analyzes the legal advice Presidents Kennedy and Roosevelt, respectively, received. In both cases, widely respected lawyers gave legal advice that supported the President’s preferred outcome, but almost certainly did not represent what the lawyers considered the ...


Contemporary Practice Of The United States Relating To International Law (112:2 Am J Int'l L), Jean Galbraith 2018 University of Pennsylvania Law School

Contemporary Practice Of The United States Relating To International Law (112:2 Am J Int'l L), Jean Galbraith

Faculty Scholarship at Penn Law

This article is reproduced with permission from the April 2018 issue of the American Journal of International Law © 2018 American Society of International Law. All rights reserved.

Once the PDF is open, individual articles are accessible either by scrolling down or by clicking on the bookmark symbol.


The Fight Over Encryption: Reasons Why Congress Must Block The Government From Compelling Technology Companies To Create Backdoors Into Their Devices, Shannon Lear 2018 Cleveland-Marshall College of Law

The Fight Over Encryption: Reasons Why Congress Must Block The Government From Compelling Technology Companies To Create Backdoors Into Their Devices, Shannon Lear

Cleveland State Law Review

Advances in technology in the past decade have blurred the line between individuals’ privacy rights and the government’s ability to access information. How should this issue be handled in a manner that balances the privacy rights of individuals and the government’s access to information in the interest of national security?

This Note proposes a bright-line rule that would continue to allow the government to obtain specific information from a data service provider without forcing the company to circumvent its own security features. Under this rule, a company shall relinquish specific information in its control or possession only by ...


Secret Law, Jonathan Manes 2018 University at Buffalo School of Law

Secret Law, Jonathan Manes

Journal Articles

The law cannot be a secret hidden from the public. This proposition strikes most of us as uncontroversial—a basic premise of any legal order committed to democratic accountability and the rule of law. Yet in this country secret law not only exists, but has become an entrenched feature of contemporary national security governance. From NSA surveillance to terrorist watch lists to targeted killings, the most controversial national security programs of our time have all been governed by secret rules, secret directives, and secret legal interpretations.

This Article sheds new light on this deeply unsettling state of affairs. It pushes ...


Clearing The Air: Does Choosing Agency Deference In Security Clearance Rulings Dilute Constitutional Challenges?, Frank Russo 2018 The Catholic University of America, Columbus School of Law

Clearing The Air: Does Choosing Agency Deference In Security Clearance Rulings Dilute Constitutional Challenges?, Frank Russo

Catholic University Law Review

The ability to obtain a security clearance has a wide-ranging impact from job placement to questions of fitness in a presidential election. Sustaining a functional career in intelligence, national security, and many other federal fields within the United States is nearly impossible without proper security clearance. In 2016, the importance of proper clearance evolved into a national debate as each presidential candidate staked claims that their opposition should be excluded from receiving sensitive material.

This Comment begins with a detailed history of modern security clearance procedures and MSPB reviews of clearance revocations. Part I focuses on those who need security ...


National Security Letters And Intelligence Oversight, Michael J. Greenlee 2018 Concordia University School of Law

National Security Letters And Intelligence Oversight, Michael J. Greenlee

Michael Greenlee

The history of NSL [national security letter] powers can serve as an illuminating example of the post­-Church Committee development of intelligence investigations. Many of the Church Committee findings and recommendations concerning the need for expanded oversight to prevent the executive branch from violating or ignoring the law, excessively using intrusive investigation techniques, and conducting overbroad investigations with inadequate controls on the retention and dissemi­nation of the information gathered are all reflected in the development of NSL powers and authorities from their creation in 1978 through passage of the PlRA [USA PATRIOT Improvement and Reauthorization Act] in 2006. At ...


The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska 2018 NEREC Research Fellow

The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska

International Journal of Nuclear Security

There is no doubt that the NPT regime is far from being equal for all states involved. As the predominant hegemonic power since WWII, the United States plays a major role in deciding the fates of non-great power proliferators. This article tries to find the logical explanation of the phenomenon whereby some nuclear proliferators are absolved regardless of their active accumulation of nuclear arsenals while others are labeled as “rogue states” and ordered to disarm. The article suggests that a particular proliferator’s political regime could affect the way in which its state is approached by the U.S., known ...


Pathologizing “Radicalization” And The Erosion Of Patient Privacy Rights, Kelly Morgan 2018 Boston College Law School

Pathologizing “Radicalization” And The Erosion Of Patient Privacy Rights, Kelly Morgan

Boston College Law Review

Countering Violent Extremism (“CVE”) is a counterterrorism strategy ostensibly aimed at preventing “radicalization” through risk assessment and intervention. CVE involves recruitment of helping professionals, including mental health care providers, to monitor their patients for signs of “vulnerability to radicalization,” make referrals to “de-radicalization” programs, and participate in multidisciplinary intervention teams. Broad national security and public safety exceptions within existing privacy laws allow mental health professionals participating in CVE to make potentially harmful disclosures of private patient information. This Note argues that professional associations representing mental health care providers should develop policies to limit and regulate members’ participation in CVE.


Protecting National Security Or Covering Up Malfeasance: The Modern State Secrets Privilege And Its Alternatives, Nicole Hallett 2018 University at Buffalo School of Law

Protecting National Security Or Covering Up Malfeasance: The Modern State Secrets Privilege And Its Alternatives, Nicole Hallett

Nicole Hallett

Available at https://www.yalelawjournal.org/forum/protecting-national-security-or-covering-up-malfeasance-the-modern-state-secrets-privilege-and-its-alternatives.


Back Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Contents, ADFSL 2018 Embry-Riddle Aeronautical University

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


United To Deter: Dealing With New Means Of Supporting Terror, Frank A. Florio 2018 University of Miami Law School

United To Deter: Dealing With New Means Of Supporting Terror, Frank A. Florio

University of Miami International and Comparative Law Review

No abstract provided.


The Theory And Practice At The Intersection Between Human Rights And Humanitarian Law, Monica Hakimi 2018 University of Michigan Law School

The Theory And Practice At The Intersection Between Human Rights And Humanitarian Law, Monica Hakimi

Reviews

The United States is more than fifteen years into a fight against terrorism that shows no sign of abating and, with the change in administration, appears to be intensifying. Other Western democracies that have historically been uneasy about U.S. counterterrorism policies have, in recent years, shifted toward those policies. And armed nonstate groups continue to commit large-scale acts of violence in multiple distinct theaters. The legal issues that these situations present are not entirely new, but neither are they going away. Recent publications, like the three works under review, thus provide useful opportunities to reflect on and refine our ...


Digital Commons powered by bepress