Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,236 Full-Text Articles 1,813 Authors 1,175,487 Downloads 131 Institutions

All Articles in National Security Law

Faceted Search

2,236 full-text articles. Page 8 of 74.

“Frankly Unthinkable”: The Constitutional Failings Of President Trump’S Proposed Muslim Registry, A. Reid Monroe-Sheridan 2018 University of Maine School of Law

“Frankly Unthinkable”: The Constitutional Failings Of President Trump’S Proposed Muslim Registry, A. Reid Monroe-Sheridan

Maine Law Review

On several occasions during the 2016 presidential campaign, Donald Trump endorsed the creation of a mandatory government registry for Muslims in the United States— not just visitors from abroad, but American citizens as well. This astonishing proposal has received little attention in legal scholarship to date, even though Trump has refused to renounce the idea following his election to the presidency. In this Article, I attempt to address President Trump’ s proposal in several ways. First, I aim to provide a thorough analysis demonstrating unequivocally that such a “ Muslim registry,” with the characteristics President Trump has endorsed, would violate the ...


Newsroom: Interrogation Expert Warns Against Use Of Torture 2-2-2018, Roger Williams University School of Law 2018 Roger Williams University

Newsroom: Interrogation Expert Warns Against Use Of Torture 2-2-2018, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Venezuela Public Health Issue, Luke Vargas 2018 Augustana College, Rock Island Illinois

Venezuela Public Health Issue, Luke Vargas

Global Public Health

While every country around the world faces a form of public health issues, the issues that the country of Venezuela faces are different. Their public health problem is not a disease that can be solved by science, or a cure. It’s a problem that can only be solved by the people within the county itself. The country of Venezuela now lacks the proper medical supplies needed to help cure diseases and normal vaccinations, and the only ones to blame is their government. Because their government has now refused to pay their debts to the surrounding countries they have now ...


Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt 2018 University of Pennsylvania Law School

Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt

Faculty Scholarship at Penn Law

What best explains how “Everything Became War and the Military Became Everything?”— the provocative title of a recent book by Professor Rosa Brooks of Georgetown Law. In this Essay, I turn to the Department of Defense’s (DoD) unique agency design as the vehicle to address this question. Specifically, I first describe and analyze the role that the 1947 National Security Act and 1986 Goldwater-Nichols Act play in incentivizing organizational behavior within the DoD. These two Acts have broad implications for national security governance. Relatedly, I address the consequences of these two core national security laws, focusing on the rise ...


The Posse Comitatus Act And The Fourth Amendment's Exclusionary Rule, Patrick Walsh, Paul Sullivan 2018 University of Virginia

The Posse Comitatus Act And The Fourth Amendment's Exclusionary Rule, Patrick Walsh, Paul Sullivan

American University National Security Law Brief

No abstract provided.


How Cybersecurity Regulation For The Smart Grid Could Upset The Current Balance Of Federal And State Jurisdiction In Electricity Regulation, Cynthia Anderson 2018 American University Washington College of Law

How Cybersecurity Regulation For The Smart Grid Could Upset The Current Balance Of Federal And State Jurisdiction In Electricity Regulation, Cynthia Anderson

American University National Security Law Brief

No abstract provided.


The Security And Human Rights Dilemma: An Inquiry Into U.S.-Ethiopia Diplomatic Relations 1991-2012, Seife Ayalew 2018 Northwestern Pritzker School of Law

The Security And Human Rights Dilemma: An Inquiry Into U.S.-Ethiopia Diplomatic Relations 1991-2012, Seife Ayalew

Northwestern Journal of Human Rights

In the post-1991 U.S.-Ethiopian diplomacy, the use of foreign policy as a framework to advance the cause of human rights has faced several challenges rooted in the way human rights is defined and the intricate interests vested in the U.S. foreign policy establishment. This article elucidates the limitations and challenges of diplomatic machinery as a framework for advancing the cause of human rights. First, human rights in the U.S. foreign policy machine have been given a marginal or subordinate place in diplomatic priorities. Second, the Government of Ethiopia’s (GOE) resistance and tough diplomatic measures and ...


How The War On Terror Is Transforming Private U.S. Law, Maryam Jamshidi 2018 New York University School of Law

How The War On Terror Is Transforming Private U.S. Law, Maryam Jamshidi

Washington University Law Review

In thinking about the War on Terror’s impact on U.S. law, what most likely comes to mind are its corrosive effects on public law, including criminal law, immigration, and constitutional law. What is less appreciated is whether and how the fight against terrorism has also impacted private law. As this Article demonstrates, the War on Terror has had a negative influence on private law, specifically on torts, where it has upended long-standing norms, much as it has done in the public law context.

Case law construing the private right of action under the Antiterrorism Act of 1992, 18 ...


The Corporate Governance Of National Security, Andrew Verstein 2018 Wake Forest University School of Law

The Corporate Governance Of National Security, Andrew Verstein

Washington University Law Review

At hundreds of companies, the government installs former spies and military officers to run the business without shareholder oversight, putting security before profits in order to protect vital projects from potentially treasonous influences. Through procedures I call “National Security Corporate Governance,” corporate boardrooms have quietly become instruments of national defense, marrying the efficiency norms of corporate law and the protective ambitions of national security. How is this achieved, and how successfully? Using a variety of research approaches – including Freedom of Information Act (FOIA) requests, archival searches, telephone interviews, and in-person conversations with industry insiders – this Article illuminates a secretive government ...


Sanctuary Networks And Integrative Enforcement, Ming Hsu Chen 2018 University of Colorado Law School

Sanctuary Networks And Integrative Enforcement, Ming Hsu Chen

Articles

My intended focus is on the widespread response--in cities, churches, campuses, and corporations that together comprise "sanctuary networks"--to the Trump Administration's Executive Order 13768 Enhancing Public Safety in the Interior of the United States as an instance of the changing relationship between federal, local, and private organizations in the regulation of immigration. After briefly covering the legal background of the Trump Interior E.O., the focus of the Article shifts to the institutional dynamics arising in communities. These institutional dynamics exemplify the beginnings of a reimagined immigration enforcement policy with a more integrative flavor.


Congressional Authorization Of The Campaign Against Isil, Tyler Salway 2018 Indiana University, Maurer School of Law

Congressional Authorization Of The Campaign Against Isil, Tyler Salway

Indiana Law Journal

I. THE BIRTH OF ISIL

II. CONGRESSIONAL AUTHORIZATION

A. EXPRESS AUTHORIZATION

1. METHODS OF INCLUSION

2. ISIL’S INCLUSION UNDER THE 9/11 AUMF

B. IMPLICIT AUTHORIZATION

III. ISIL AND THE TRUMP PRESIDENCY

CONCLUSION


Evading Constitutional Challenge: Dapa's Implications For Future Exercises Of Executive Enforcement Discretion, Lucy Chauvin 2018 Indiana University, Maurer School of Law

Evading Constitutional Challenge: Dapa's Implications For Future Exercises Of Executive Enforcement Discretion, Lucy Chauvin

Indiana Law Journal

I. UNITED STATES V. TEXAS: DEFINING THE BOUNDARIES OF ENFORCEMENT DISCRETION

A. DAPA AND THE CONSTITUTIONAL CHALLENGE

B. SCHOLARLY DEBATE: APPLICATION OF YOUNGSTOWN FRAMEWORK TO DAPA

II. TAKE CARE: CONFLICTING INTERPRETATIONS OF THE DUTY TO FAITHFULLY EXECUTE THE LAW

III. ENFORCEMENT DISCRETION: INTERACTION BETWEEN CONGRESS AND THE EXECUTIVE

A. HECKLER V. CHANEY: EARLY RECOGNITION OF EXECUTIVE ENFORCEMENT DISCRETION

B. ENFORCEMENT DISCRETION’S SPECIFIC APPLICATION TO IMMIGRATION LAW

C. THE MEANING OF “DEFERRED ACTION”

IV. THE HISTORICALLY LIMITED ROLE OF THE JUDICIARY

A. PRESUMPTIVE UNREVIEWABILITY

B. ADDITIONAL PROCEDURAL HURDLES

V. MOVING FORWARD: LESSONS TO BE LEARNED FROM THE OBAMA ADMINISTRATION

A ...


Excavating The Forgotten Suspension Clause, Helen Norton 2018 University of Colorado Law School

Excavating The Forgotten Suspension Clause, Helen Norton

Articles

No abstract provided.


Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich 2018 Brooklyn Law School

Section 230’S Liability Shield In The Age Of Online Terrorist, Jaime M. Freilich

Brooklyn Law Review

In recent years, “home grown” terrorists—individuals inspired to violence after watching terrorist videos online—have been responsible for devastating attacks in the United States and across Europe. Such terrorist propaganda falls outside the realm of the First Amendment’s protection because it has been proven to indoctrinate attackers, thus inciting imminent lawless action. Seizing on this, victims’ families have brought suits alleging that social media platforms, including Twitter, Facebook, and Google, provided material support to terrorists in violation of the Anti-Terrorism Act (ATA). The Communications Decency Act (CDA), however, has served as an impenetrable shield against these claims, protecting ...


Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia 2018 Monash University

Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia

Indiana Law Journal

Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal delivery device for malware, as users routinely launch unverified programs and forego virus detection. The illicit nature of the transaction forces users to rely almost entirely on the reputation of websites, uploaders, and other users to determine if a file is safe to download ...


Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin 2018 Maurer School of Law: Indiana University

Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin

Indiana Law Journal

The Article explains why addressing Too-Big-To-Fail 2.0 has not yet become a political and societal priority. First, digital service providers are technology companies, which, many believe, are shaped by market forces such that they fail and succeed in equal measure without producing negative ripple effects on the economy or society. Second, technology giants are not as carefully regulated as banks becauseunlike banks, they do not take insured deposits backed by the government. Third, even heavily regulated financial institutions have not been required until recently to focus on cybersecurity. Finally, some believe that there is no point in worrying about ...


Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall 2018 Arkansas State University - Main Campus

Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall

Catholic University Journal of Law and Technology

Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes ...


Carteles Mexicanos: Impacto En La Doctrina De Seguridad Nacional En El Periodo De Felipe Calderón, Stephanie Bohada Polanía, Lizeth Carolina Velásquez Hueso 2018 Universidad de La Salle, Bogotá

Carteles Mexicanos: Impacto En La Doctrina De Seguridad Nacional En El Periodo De Felipe Calderón, Stephanie Bohada Polanía, Lizeth Carolina Velásquez Hueso

Negocios y Relaciones Internacionales

No abstract provided.


National Security, Immigration And The Muslim Bans, Shoba Wadhia 2018 Penn State Law

National Security, Immigration And The Muslim Bans, Shoba Wadhia

Journal Articles

National security language has continued to guide the creation and defense of Executive Orders and related immigration policies issued in the Donald J. Trump administration. This Article builds on earlier scholarship examining the relationship between national security and immigration in the wake of September 11, 2001, under the Obama administration, and during the campaign leading to the 2016 Election. While the Article is largely descriptive, it ultimately questions the longevity of using national security to create and defend immigration law. This Article is limited in scope -- it does not provide a deep dive into the constitutionality of the Muslim bans ...


Contemporary Practice Of The United States Relating To International Law (112:1 Am J Int'l L), Jean Galbraith 2018 University of Pennsylvania Law School

Contemporary Practice Of The United States Relating To International Law (112:1 Am J Int'l L), Jean Galbraith

Faculty Scholarship at Penn Law

This article is reproduced with permission from the January 2018 issue of the American Journal of International Law © 2018 American Society of International Law. All rights reserved.

Once the PDF is open, individual articles are accessible either by scrolling down or by clicking on the bookmark symbol.


Digital Commons powered by bepress