Part of the National Security Law Commons

Works in National Security Law

2023

Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick McCarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling
Joint PIJIP/TLS Research Paper Series

PDF

Regulating the Use of Military Human Enhancements that Can Cause Side Effects Under the Law of Armed Conflict: Towards a Method-Based Approach, Yang Liu
American University National Security Law Brief

PDF

Revisiting Goldwater-Nichols: Why Making the Joint Staff A General Staff will Improve Civilian Control of the Military and Refine the Constitutional Balance of War Powers, Michael D. Minerva
American University National Security Law Brief

PDF

The Tallinn Manual 2.0 on Nation-State Cyber Operations Affecting Critical Infrastructure, Terence Check
American University National Security Law Brief

PDF

2022

Sunshine Laws Behind the Clouds: Limited Transparency in a Time of National Emergency, Ira P. Robbins
Ira P. Robbins

Sunshine Laws Behind the Clouds: Limited Transparency in a Time of National Emergency, Ira P. Robbins
Articles in Law Reviews & Other Academic Journals

PDF

Transnational Government Hacking, Jennifer C. Daskal
Jennifer Daskal

Chinese Technology Platforms Operating in the United States: Assessing the Threat (Originally Published as a Joint Report of the National Security, Technology, and Law Working Group at the Hoover Institution at Stanford University and the Tech, Law & Security Program at American University Washington College of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Jennifer Daskal

Good Health and Good Privacy Go Hand-in-Hand, Jennifer Daskal
Jennifer Daskal

Whose Law Governs in a Borderless World?: Law Enforcement Access to Data Across Borders, Jennifer C. Daskal
Jennifer Daskal

In Microsoft, Justices To Set Feds' Reach For Overseas Data, Allison Grande, Jennifer C. Daskal
Jennifer Daskal

White House Boosts Military Cyber Operations, Jennifer C. Daskal, Leign Cuen
Jennifer Daskal

Comedy Cut, but President's Words Undercut Him Apparent Linking of Reason to Russia Probe Problematic, David G. Savage, Jennifer C. Daskal
Jennifer Daskal

The Unraveling of Canada's Legal Justification for Force in Syria? The Trouble with "Unwilling and Unable", Jennifer C. Daskal, Craig Forcese
Jennifer Daskal

U.S. Drone-Strike Policy Threatens to Backfire as Nations Acquire Technology, Jennifer C. Daskal, Ben Wolfgang
Jennifer Daskal

President of the United States, Destroyer of Worlds: Considering Congress's Authority to Enact a Nuclear No-First-Use Law, John Ramming Chappell
American University National Security Law Brief

PDF

The American Security Drone Act: America's Paper Tiger vs. China's Trojan Horse, Susan E. Upward
American University National Security Law Brief

PDF

The New Great Wall Against China, Paul Rose
American University National Security Law Brief

PDF

Letter from the Editor, Ryan Nelson
American University National Security Law Brief

PDF

2021

Widening the Lens on Content Moderation, Jenna Ruddock, Justin Sherman
Joint PIJIP/TLS Research Paper Series

PDF

Chinese Technology Platforms Operating in the United States: Assessing the Threat (Originally Published as a Joint Report of the National Security, Technology, and Law Working Group at the Hoover Institution at Stanford University and the Tech, Law & Security Program at American University Washington College of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Joint PIJIP/TLS Research Paper Series

PDF

National Security Decision-Making in the Age of Technology: Delivering Outcomes on Time and on Target, Gary Corn
Articles in Law Reviews & Other Academic Journals

PDF

“Hey Siri, I’m Being Pulled Over.”, Charlene Collazo Goldfield, Gabriela Chambi, Amanda Torres
Joint PIJIP/TLS Research Paper Series

PDF

Equal Prosecution For All: Violent Extremism at the Intersection of Hate Crime and Terrorism, Gabrielle Leeman
American University National Security Law Brief

PDF

The Case for Presumptions of Evil: How the E.O. 13873 'Trump' Card Could Secure American Networks from Third-Party Code Threats, Caroline Elyse Burks
American University National Security Law Brief

PDF

The Conservative Court and Torture Attenuation, Ari B. Rubin
American University National Security Law Brief

PDF

The Artemis Accords: Employing Space Diplomacy to De-Escalate a National Security Threat and Promote Space Commercialization, Elya A. Taichman
American University National Security Law Brief

PDF

Private Military Contractors: The Armed Forces Absent from the War Powers Resolution, McKinney Voss Wheeler
American University National Security Law Brief

PDF

Letter from the Editor,
American University National Security Law Brief

PDF

The Right of Return: The ISIS Bride, Casey Hare-Osifchin
American University National Security Law Brief

PDF

An Analysis of Domestic and Foreign Legal Mechanisms to Counter the Rise of White Nationalism, John C. Jankosky II
American University National Security Law Brief

PDF

Rethinking Responsibility as Cooperation and Control: The Case of Intelligence Agents, Raphael Bitton
American University National Security Law Brief

PDF

The Capitol Riot, Racism and the Future of American Democracy, Ryan T. Williams
American University National Security Law Brief

PDF

2020

Covert Deception, Strategic Fraud, and the Rule of Prohibited Intervention (Originally published as part of the Hoover Institution’s Aegis Series), Gary Corn
Joint PIJIP/TLS Research Paper Series

PDF

Extraterritorial Issues: Investigation and Prosecution of National Security Cases, Jennifer C. Daskal
Jennifer Daskal

The Terrorist Crenemy, Jennifer C. Daskal
Jennifer Daskal

Efficiency in Bello and Ad Bellum: Making the Use of Force Too Easy?, Kenneth Anderson
Kenneth Anderson

The Cost of Confusion: Resolving Ambiguities in Detainee Treatment, Kenneth Anderson
Kenneth Anderson

9/11 and the Transformation of U.S. Immigration Law and Policy, Jayesh Rathod
Jayesh Rathod

Pre-Crime Restraints: The Explosion of Targeted, Non-Custodial Prevention, Jennifer Daskal
Jennifer Daskal

After the AUMF, Jennifer Daskal
Jennifer Daskal

United Nations Collective Security and the United States Security Guarantee in an Age of Rising Multipolarity: The Security Council as the Talking Shop of the Nations, Kenneth Anderson
Kenneth Anderson

U.S. Counterterrorism Policy and Superpower Compliance with International Human Rights Norms, Kenneth Anderson
Kenneth Anderson

On the Hijacking of Agencies (and Airplanes): The Federal Aviation Administration, Agency Capture, and Airline Security, Mark Niles
Mark Niles

Preempting Justice: Precrime in Fiction and in Fact, Mark Niles
Mark Niles

Maritime Piracy: A Sustainable Global Solution, Paul Williams, Lowry Pressly
Paul Williams

The State Secrets Privilege and Separation of Powers, Amanda Frost
Amanda Frost

Of Monopolies and Monocultures: The Intersection of Patents and National Security, Charles Duan
Articles in Law Reviews & Other Academic Journals

PDF

Speaking the Law: The Obama Administration's Addresses on National Security Law, Kenneth Anderson
Kenneth Anderson

Transnational Government Hacking, Jennifer C. Daskal
Joint PIJIP/TLS Research Paper Series

PDF

Good Health and Good Privacy Go Hand-in-Hand, Jennifer Daskal
Contributions to Books

Solving the Emerging Technology and National Security Conundrum, Shabbir Hamid
Upper Level Writing Requirement Research Papers

PDF

Chapter 6: Good Health and Good Privacy Go Hand-in-Hand, Jennifer Daskal
Jennifer Daskal

2019

Congress-In-Chief: Congressional Options to Compel Presidential War-Making, Clark H. Campbell
American University National Security Law Brief

PDF

Legalizing Intelligence Sharing: A Consensus Approach, Brian Mund
American University National Security Law Brief

PDF

Treason in the Age of Terrorism: Do Americans Who Join ISIS 'Levy War' Against the United States?, Stephen Jackson
American University National Security Law Brief

PDF

Armored Plating and Aluminum Foil Are Not Like Products: Consequences of the United States' Overbroad Interpretation of Article XXI of the GATT, Anthony Nardi
American University Law Review

PDF

2018

U.S. Drone-Strike Policy Threatens to Backfire as Nations Acquire Technology, Jennifer C. Daskal, Ben Wolfgang
Popular Media

New Bill Would Moot Microsoft Ireland Case - And Much More!, Jennifer Daskal
Jennifer Daskal

Sovereignty in the Age of Cyber, Gary Corn
Articles in Law Reviews & Other Academic Journals

PDF

Concluding Observations on Sovereignty in Cyberspace, Gary Corn, Robert Taylor
Articles in Law Reviews & Other Academic Journals

PDF

Preparing to Commit Domestic Terrorist Activity: Does the United States Have Adequate Tools to Stop This?, Diane Webber
American University International Law Review

PDF

The Terrorist Crenemy, Jennifer C. Daskal
Contributions to Books

How Cybersecurity Regulation for the Smart Grid Could Upset the Current Balance of Federal and State Jurisdiction in Electricity Regulation, Cynthia Anderson
American University National Security Law Brief

PDF

The Posse Comitatus Act and the Fourth Amendment's Exclusionary Rule, Patrick Walsh, Paul Sullivan
American University National Security Law Brief

PDF

U.S. drone-strike policy threatens to backfire as other nations acquire technology,
Jennifer Daskal

Technology as a Sword and a Shield: Law at the Intersection of Civil Rights and Surveillance, Jennifer Daskal
Jennifer Daskal

2017

Testimony @ House Energy and Commerce Subcommittee on Digital Commerce and Consumer Protection Hearing; "21st Century Trade Barriers: Protectionist Cross Border Data Flow Policies Impact on U.S. Jobs.", Jennifer Daskal
Jennifer Daskal

PDF

In Microsoft, Justices To Set Feds' Reach For Overseas Data, Allison Grande, Jennifer C. Daskal
Popular Media

White House Boosts Military Cyber Operations, Jennifer C. Daskal, Leign Cuen
Popular Media

Trump Demanded 'Loyalty' and Asked for an End to the Flynn Investigation, Comey will Testify, David S. Cloud, Joseph Tanfani, Jennifer C. Daskal
Popular Media

Constitutional Scholars Offer New 'Framework' for Agreement on Protecting Data, Rick Weber, Jennifer C. Daskal
Popular Media

Introduction: A Twenty-First Century Framework for Digital Privacy, Jeffrey Rosen, Jennifer C. Daskal
Popular Media

Whose Law Governs in a Borderless World?: Law Enforcement Access to Data Across Borders, Jennifer C. Daskal
Newsletters & Other Publications

Comedy Cut, but President's Words Undercut Him Apparent Linking of Reason to Russia Probe Problematic, David G. Savage, Jennifer C. Daskal
Popular Media

The Unraveling of Canada's Legal Justification for Force in Syria? The Trouble with "Unwilling and Unable", Jennifer C. Daskal, Craig Forcese
Popular Media

Senate Hears Microsoft's Take On Overseas Data Warrants, Steve Trader, Jennifer C. Daskal
Popular Media

North Carolina Citizens’ Group Launches Investigation of CIA’s Bush-Era Rendition and Torture Program – OpEd, Jennifer C. Daskal, Andy Worthington
Popular Media

Why Google is Losing the Battle Over Foreign-Stored Data, Jennifer C. Daskal, Ben Hancock
Popular Media

Strengthen Section 702: A Critical Intelligence Tool Vital to the Protection of Our Country, Deborah Samuel Sills
American University National Security Law Brief

PDF

Cybersecurity, Identity Theft, and Standing Law: A Framework for Data Breaches Using Substantial Risk in a Post-Clapper World, James C. Chou
American University National Security Law Brief

PDF

The Mental Health of our National Security: Protecting the Minds That Protect the Homeland, Alan Wehbé
American University National Security Law Brief

PDF

JASTA Straw Man? How the Justice Against Sponsors of Terrorism Act Undermines Our Security and Its Stated Purpose, Katherine Holcombe
American University Journal of Gender, Social Policy & the Law

PDF

The New FISA Court Amicus Should Be Able to Ignore its Congressionally Imposed Duty, Ben Cook
American University Law Review

PDF

2016

Panel VI: The International Criminal Court, Madeline Morris, Paul Heinbecker, David J. Scheffer, Diane Orentlicher, Alfred P. Rubin
Diane Orentlicher

Don’t Expand the War on Terror, Jennifer Daskal, Stephen I. Vladeck
Jennifer Daskal

Keynote: Hybrid Threats, Hybrid Law: Framing the Issues, Kenneth Anderson
Kenneth Anderson

Autonomous Weapons in the Era of Hybrid Threats, Kenneth Anderson, Missy Cummings, Michael Newton, Michael Schmitt, Rob Ramey
Kenneth Anderson

Transnational Seizures: The Constitution and Criminal Procedure Abroad, Jennifer Daskal
Jennifer Daskal

Should the Best Offenses Ever Be a Good Defense: THe Public Authority to Use Force in Millitary Operations: Recalibrating the Use of Force Rules in the Standing Rules of Engagement, Gary Corn
Articles in Law Reviews & Other Academic Journals

PDF

Beyond the Paris Attacks: Unveiling the War Within French Counterterror Policy, Khaled A. Beydoun
American University Law Review

PDF

Known Unknowns: State Cyber Operations, Cyber Warfare, and the Jus Ad Bellum, Peter Z. Stockburger
American University International Law Review

PDF

The Implications of Creating an iPhone Backdoor, Gregory Coutros
American University National Security Law Brief

PDF

"Black" Hawala: Confronting ISIL on the Financial Front, Kelsey Mowatt-Larssen
American University National Security Law Brief

PDF

The Law of Armed Conflict, Unconventional Warfare, and Cyber Attacks, Thomas P. Jordan
American University National Security Law Brief

PDF

The Intersection of "Internet Terrorism" and "Individual Privacy" in the Context of the First Amendment, Amanda Leonard
American University National Security Law Brief

PDF

Applying the Law of Neutrality While Transitioning the Seas of Cyberspace, Danielle Higson
American University National Security Law Brief

PDF

Ex Parte Quirin: The Nazi Saboteur Case and the Tribunal Precedent, Andrew Buttaro
American University National Security Law Brief

PDF

Applying the UCMJ to Contractors in Contingency Operations, Adam R. Pearlman
American University National Security Law Brief

PDF

Until We Achieve Universal Peace: Implications of the International Law Commission’s Draft Articles on the “Effects of Armed Conflict on Treaties”, Lauren Dudley
American University National Security Law Brief

PDF

Terrorists on Appeal: An Exploratory Analysis of Terrorism Appeals Since 1988, Wesley McCann
Criminal Law Practitioner

PDF

2015

The Anfal Campaign in Iraqi Kurdistan: The Destruction of Koreme, Kenneth Anderson
Books

GOP Measure Would Make It Harder For Obama To Empty Guantanamo, Jennifer Daskal
Jennifer Daskal

2014

Pre-Crime Restraints: The Explosion of Targeted, Non-Custodial Prevention, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals

PDF

After the AUMF, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals

PDF

High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue
American University Business Law Review

PDF

Data Retention Requirements And Outsourced Analysis: Should Private Entities Become Government Surrogates In The Collection Of Intelligence?, Michael J. Woods
American University Business Law Review

PDF

United States Assistant Attorney General For National Security John P. Carlin Delivers Remarks At The American University Business Law Review 2014 Symposium, John P. Carlin
American University Business Law Review

PDF

2013

Hamdan v. United States: A Death Knell for Military Commissions?, Jennifer Daskal
Jennifer Daskal

PDF

Don’t Expand the War on Terror, Jennifer Daskal, Stephen Vladeck
Jennifer Daskal

Don’t Expand the War on Terror, Jennifer Daskal, Stephen I. Vladeck
Editorial Contributions

Shearson v. United States Department of Homeland Security: The Sixth Circuit Exempts National Security from the Privacy Act, Douglas A. Behrens
Legislation and Policy Brief

PDF

Hamdan v. United States: A Death Knell for Military Commissions?, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals

PDF

Maritime Piracy: A Sustainable Global Solution, Paul Williams, Lowry Pressly
Articles in Law Reviews & Other Academic Journals

PDF

The Geography Of The Battlefield: A Framework For Detention And Targeting Outside The "Hot" Conflict Zone, Jennifer Daskal
Jennifer Daskal

2012

The Law of Operational Targeting: Viewing the LOAC through an Operational Lens, Gary Corn
Articles in Law Reviews & Other Academic Journals

PDF

Extraterritorial Issues: Investigation and Prosecution of National Security Cases, Jennifer C. Daskal
Contributions to Books

Efficiency in Bello and Ad Bellum: Making the Use of Force Too Easy?, Kenneth Anderson
Contributions to Books

PDF

Ten Years after 9/11: The Changing Terrorist Threat, Kenneth Anderson, Michael LEITER, John Carlin, Ivan Fong, Daniel Marcus, Stephen Vladeck
Presentations

PDF

Ten Years after 9/11: The Changing Terrorist Threat, Kenneth Anderson, Michael LEITER, John Carlin, Ivan Fong, Daniel Marcus, Stephen I. Vladeck
Kenneth Anderson

2011

9/11 and the Transformation of U.S. Immigration Law and Policy, Jayesh Rathod
Articles in Law Reviews & Other Academic Journals

PDF

2010

Preempting Justice: Precrime in Fiction and in Fact, Mark Niles
Articles in Law Reviews & Other Academic Journals

PDF

2009

United Nations Collective Security and the United States Security Guarantee in an Age of Rising Multipolarity: The Security Council as the Talking Shop of the Nations, Kenneth Anderson
Articles in Law Reviews & Other Academic Journals

PDF

2007

U.S. Counterterrorism Policy and Superpower Compliance with International Human Rights Norms, Kenneth Anderson
Articles in Law Reviews & Other Academic Journals

PDF

The Cost of Confusion: Resolving Ambiguities in Detainee Treatment, Kenneth Anderson
Reports

PDF

The State Secrets Privilege and Separation of Powers, Amanda Frost
Articles in Law Reviews & Other Academic Journals

PDF

2006

After Action Review (AAR) of Attendance at the Brazilian Army Command and General Staff College, Gary Corn
Articles in Law Reviews & Other Academic Journals

PDF

Zacarias Moussaoui Trial, Herman Schwartz
Herman Schwartz

The Suffocation of Free Speech Due to the "Gravity of Danger" of Terrorism, Tim Davis
The Modern American

PDF

2005

Ramsey Clark and Saddam Hussein Trial, Herman Schwartz
Herman Schwartz

An American Gulag? Human rights groups test the limits of moral equivalency, Kenneth Anderson
Kenneth Anderson

PDF

An American Gulag? Human rights groups test the limits of moral equivalency, Kenneth Anderson
Popular Media

PDF

Security and Liberty in an Age of Terrorism, Herman Schwartz
Popular Media

Security and Liberty in an Age of Terrorism, Herman Schwartz
Herman Schwartz

2002

On the Hijacking of Agencies (and Airplanes): The Federal Aviation Administration, Agency Capture, and Airline Security, Mark Niles
Articles in Law Reviews & Other Academic Journals

PDF

Where Do We Go From Here? New and Emerging Issues in the Prosecution of War Crimes and Acts of Terrorism: A Panel Discussion, Kenneth Anderson
Presentations

PDF

Where Do We Go From Here? New and Emerging Issues in the Prosecution of War Crimes and Acts of Terrorism, Kenneth Anderson
Kenneth Anderson