جستجو
   
    Delicious RSS ارسال به دوستان خروجی متنی
    کد خبر : 186823
    تاریخ انتشار : 26 تیر 1395 15:10
    تعداد بازدید : 3845

    Journal of National Security Law and Policy

    Journal of National Security Law and Policy


    2005, Vol.1

    2006-2008, Vol.2

    2009, Vol.3

    2010, Vol.4

    2011-2012, Vol.5

    2012-2013, Vol.6

    2014, Vol.7

     

    Journal of National Security Law and Policy, 2005, Vol.1

    Author

    Title

    number

    Page to Page

    Elizabeth Rindskopf Parker

    Why a Journal of National Security Law and Policy?

    No.1

    pp. 1-3

    Norman Abrams

    The Material Support Terrorism Offenses: Perspectives Derived from the (Early) Model Penal Code

    No.1

    pp. 5-35

    Michael J. Woods

    Counterintelligence and Access to Transactional Records: A Practical History of USA PATRIOT Act Section 215

    No.1

    pp. 37-71

    Erwin Chemerinsky

    Enemy Combatants and Separation of Powers

    No.1

    pp. 73-87

    Malvina Halberstam

    Alvarez- Machain H: The Supreme Court's Reliance on the Non- Self- Executing Declaration in the Senate Resolution Giving Advice and Consent to the International Covenant on Civil and Political Rights

    No.1

    pp. 89-111

    Leslie Gielow Jacobs

    A Troubling Equation in Contracts for Government Funded Scientific Research: "Sensitive But Unclassified"= Secret But Unconstitutional

    No.1

    pp. 113-159

    Scott L. Silliman

    Teaching National Security Law

    No.1

    pp. 161-168

    Seth F. Kreimer

    Torture Lite, Full Bodies Torture, and the Insulation of Legal Conscience Symposium: Fighting Terrorism with Torture: Where to Draw the Line

    No.2

    pp. 187-229

    Sanford Levinson

    In Quest of a "Common Conscience": Reflections on the Current Debate About Torture

    No.2

    pp. 231-252

    John T. Parry

    "Just for Fun": Understanding Torture and Understanding Abu Ghraib

    No.2

    pp. 253-284

    Kim Lane Scheppele

    Hypothetical Torture in the "War on Terrorism"

    No.2

    pp. 285-340

    Kenneth J. Levit

    The CIA and the Torture Controversy: Interrogation Authorities and Practices in the War on Terror

    No.2

    pp. 341-356

    Peter Margulies

    Foreword Risk, Deliberation, and Professional Responsibility Symposium: Lawyers' Roles and the War on Terror

    No.2

    pp. 357-374

    Mary Cheh

    Should Lawyers Participate in Rigged Systems? The Case of the Military Commissions

    No.2

    pp. 375-408

    George C. Harris

    The Rule of Law and the War on Terror: The Professional Responsibilities of Executive Branch Lawyers in the Wake of 9/11

    No.2

    pp. 409-453

    Kathleen Clark

    Ethical Issues Raised by the OLC Torture Memorandum

    No.2

    pp. 455-472

    Diane H. Mazur

    A Blueprint for Law School Engagement with the Military

    No.2

    pp. 473-525

    Sheldon I. Cohen

    Security Clearance Changes and Confusion in the Intelligence Reform Act of 2004 Recent Developments

    No.2

    pp. 527-535

    Journal of National Security Law and Policy,  2006-2008, Vol.2

    Author

    Title

    number

    Page to Page

    Louis Fisher

    Detention and Military Trial of Suspected Terrorists: Stretching Presidential Power

    No.1

    pp. 1-51

    Stephen I. Vladeck

    Ludecke's Lengthening Shadow: The Disturbing Prospect of War Without End

    No.1

    pp. 53-110

    Mark S. Ellis

    Combating Impunity and Enforcing Accountability as a Way To Promote Peace and Stability- The Role of International War Crimes Tribunals

    No.1

    pp. 111-164

    David C. Vladeck

    Litigating National Security Cases in the Aftermath of 9/ 11

    No.1

    pp. 165-193

    A. John Radsan

    Sed Quis Custodiet Ipsos Custodes: The CIA's Office of General Counsel?

    No.2

    pp. 201-255

    Geoffrey S. Corn

    Unarmed but How Dangerous? Civilian Augmentees, the Law of Armed Conflict, and the Search for a More Effective Test for Permissible Civilian Battlefield Functions

    No.2

    pp. 257-295

    Andrew Peterson

    Addressing Tomorrow's Terrorists

    No.2

    pp. 297-354

    Fausto Pocar

    Persecution as a Crime Under International Criminal Law

    No.2

    pp. 355-365

    Journal of National Security Law and Policy,  2009, Vol.3

    Author

    Title

    number

    Page to Page

    Matthew C. Waxman

    Administrative Detention of Terrorists: Why Detain, and Detain Whom?

    No.1

    pp. 1-37

    William C. Banks

    Providing "Supplemental Security"- The Insurrection Act and the Military Role in Responding to Domestic Crises

    No.1

    pp. 39-94

    William H. Freivogel

    Publishing National Security Secrets: The Case for "Benign Indeterminacy"

    No.1

    pp. 95-119

    Clive Walker

    Neighbor Terrorism and the All- Risks Policing of Terrorism

    No.1

    pp. 121-168

    Michael J. Woods, William King

    An Assessment of the Evolution and Oversight of Defense Counterintelligence Activities

    No.1

    pp. 169-219

    William C. Banks

    National Security Law Advice to the New Administration

    No.2

    pp. 221-226

    Elizabeth Rindskopf Parker

    National Security Advice for a New Administration: Initial Thoughts

    No.2

    pp. 227-238

    Michael J. Kelly

    Charting America's Return to Public International Law Under the Obama Administration

    No.2

    pp. 239-262

    Mark R. Shulman

    The "War on Terror" Is Over- Now What? Restoring the Four Freedoms as a Foundation for Peace and Security

    No.2

    pp. 263-300

    J. Scott Carpenter, Matthew Levitt, Michael Jacobson

    Confronting the Ideology of Radical Extremism

    No.2

    pp. 301-327

    George R. Lucas

    "This Is Not Your Father's War"- Confronting the Moral Challenges of "Unconventional" War

    No.2

    pp. 329-340

    Jules Lobel

    Preventive Detention and Preventive Warfare: U.S. National Security Policies Obama Should Abandon

    No.2

    pp. 341-361

    Gordon Lederman

    National Security Reform for the Twenty- first Century: A New National Security Act and Reflections on Legislation's Role in Organizational Change

    No.2

    pp. 363-376

    Matthew C. Waxman

    Police and National Security: American Local Law Enforcement and Counterterrorism After 9/ 11

    No.2

    pp. 377-407

    Paul Rosenzweig

    The Two Realities

    No.2

    pp. 409-413

    Journal of National Security Law and Policy,  2010, Vol.4

    Author

    Title

    number

    Page to Page

    Walter Gary Sharp

    The Past, Present, and Future of Cybersecurity

    No.1

    pp. 13-26

    Steven R. Chabinsky

    Cybersecurity Strategy: A Primer for Policy Makers and Those on the Front Line

    No.1

    pp. 27-39

    Eric A. Greenwald

    History Repeats Itself: The 60- Day Cyberspace Policy Review in Context

    No.1

    pp. 41-61

    Herbert S. Lin

    Offensive Cyber Operations and the Use of Force

    No.1

    pp. 63-86

    David E. Graham

    Cyber Threats and the Law of War

    No.1

    pp. 87-102

    John Grant

    Will There Be Cybersecurity Legislation?

    No.1

    pp. 103-117

    Gregory T. Nojeim

    Cybersecurity and Freedom on the Internet

    No.1

    pp. 119-137

    John N. Greer

    Square Legal Pegs in Round Cyber Holes: The NSA, Lawfulness, and the Protection of Privacy Rights and Civil Liberties in Cyberspace

    No.1

    pp. 139-154

    Stephen Dycus

    Congress's Role in Cyber Warfare

    No.1

    pp. 155-171

    Mark D. Young

    National Cyber Doctrine: The Missing Link in the Application of American Cyber Power

    No.1

    pp. 173-196

    Jeffrey Hunker

    U.S. International Policy for Cybersecurity: Five Issues That Won't Go Away

    No.1

    pp. 197-216

    Yasuhide Yamada, Atsuhiro Yamagishi, Ben T. Katsumiii

    A Comparative Study of the Information Security Policies of Japan and the United States

    No.1

    pp. 217-232

    Gus P. Coldebella, Brian M. White

    Foundational Questions Regarding the Federal Role in Cybersecurity

    No.1

    pp. 233-245

    Ryan M. Check, Afsheen John Radsan

    One Lantern in the Darkest Night: The CIA's Inspector General

    No.2

    pp. 247-294

    Stephen I. Vladeck

    The Laws of War as a Constitutional Limit on Military Jurisdiction

    No.2

    pp. 295-342

    Mary Ellen O'Connell

    The Choice of Law Against Terrorism

    No.2

    pp. 343-368

    Russell A. Miller

    Balancing Security and Liberty in Germany

    No.2

    pp. 369-396

    Jacques deLisle

    Security First? Patterns and Lessons from China's Use of Law To Address National Security Threats

    No.2

    pp. 397-436

    Kim Lane Scheppele

    The International Standardization of National Security Law

    No.2

    pp. 437-453

    David D. Cole

    The Sacrificial Yoo: Accounting for Torture in the OPR Report

    No.2

    pp. 455-464

    Journal of National Security Law and Policy,  2011-2012, Vol.5

    Author

    Title

    number

    Page to Page

    David S. Kris

    Law Enforcement as a Counterterrorism Tool

    No.1

    pp. 1-104

    Geoffrey R. Stone

    WikiLeaks, the Proposed SHIELD Act, and the First Amendment

    No.1

    pp. 105-118

    Mary-Rose Papandrea

    The Publication of National Security Information in the Digital Age

    No.1

    pp. 119-130

    Douglas Cox

    Burn After Viewing: The CIA's Destruction of the Abu Zubaydah Tapes and the Law of Federal Records

    No.1

    pp. 131-177

    Craig Forcese

    Spies Without Borders: International Law and Intelligence Collection

    No.1

    pp. 179-210

    Howard M. Wasserman

    Constitutional Pathology, the War on Terror, and United States v. Klein

    No.1

    pp. 211-235

    Louis Fisher

    United States v. Klein: Judging Its Clarity and Application

    No.1

    pp. 237-249

    Stephen I. Vladeck

    Why Klein (Still) Matters: Congressional Deception and the War on Terrorism

    No.1

    pp. 251-262

    Jeffrey Kahn

    The Case of Colonel Abel

    No.1

    pp. 263-301

    Eugene R. Fidell

    The Next Judge

    No.1

    pp. 303-314

    William C. Banks

    Shadow Wars

    No.2

    pp. 315-318

    Louis Fisher

    Basic Principles of the War Power

    No.2

    pp. 319-337

    Herbert Lawrence Fenster

    The Great War Powers Misconstruction

    No.2

    pp. 339-358

    John Prados

    The Continuing Quandary of Covert Operations

    No.2

    pp. 359-372

    Jennifer D. Kibbe

    Conducting Shadow Wars

    No.2

    pp. 373-392

    Jules Lobel

    Covert War and the Constitution

    No.2

    pp. 393-407

    Robert F. Turner

    Covert War and the Constitution: A Response

    No.2

    pp. 409-428

    Jules Lobel, Robert F. Turner

    The Constitutionality of Covert War: Rebuttals

    No.2

    pp. 429-437

    Afsheen John Radsan, Richard Murphy

    The Evolution of Law and Policy for CIA Targeted Killing

    No.2

    pp. 439-463

    Richard M. Pious

    White House Decisionmaking Involving Paramilitary Forces

    No.2

    pp. 465-480

    Loch K. Johnson

    Intelligence Analysis and Planning for Paramilitary Operations

    No.2

    pp. 481-505

    Peter M. Shane

    Executive Branch Self- Policing in Times of Crisis: The Challenges for Conscientious Legal Analysis

    No.2

    pp. 507-520

    Laura A. Dickinson

    Outsourcing Covert Activities

    No.2

    pp. 521-537

    Robert Chesney

    Military- Intelligence Convergence and the Law of the Title 10/ Title 50 Debate

    No.2

    pp. 539-629

    Journal of National Security Law and Policy,  2012-2013, Vol.6

    Author

    Title

    number

    Page to Page

    Stephen W. Preston

    CIA and the Rule of Law

    No.1

    pp. 1-9

    Steven L. Schooner, Collin D. Swan

    Dead Contractors: The Un- Examined Effect of Surrogates on the Public's Casualty Sensitivity

    No.1

    pp. 11-58

    Jonathan W. Gannon

    From Executive Order to Judicial Approval: Tracing the History of Surveillance of U.S. Persons Abroad in Light of Recent Terrorism Investigations

    No.1

    pp. 59-96

    Scott J. Glick

    Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation's Critical Infrastructure and Key Resources

    No.1

    pp. 97-129

    Charles Tiefer

    Can the President and Congress Establish a Legislative Veto Mechanism for Jointly Drawing Down a Long and Controversial War?

    No.1

    pp. 131-166

    Diane Webber

    Preventive Detention in the Law of Armed Conflict: Throwing Away the Key?

    No.1

    pp. 167-205

    Pete Pedrozo

    The U.S.- China Incidents at Sea Agreement: A Recipe for Disaster

    No.1

    pp. 207-226

    Nathan Alexander Sales

    Self- Restraint and National Security

    No.1

    pp. 227-289

    Linda Carter

    Torture and the War on Terror: The Need for Consistent Definitions and Legal Remedies

    No.1

    pp. 291-317

    David A. Koplow

    Train Wreck: The U.S. Violation of the Chemical Weapons Convention

    No.2

    pp. 319-408

    Heidi Kitrosser

    Free Speech Aboard the Leaky Ship of State: Calibrating First Amendment Protections for Leakers of Classified Information

    No.2

    pp. 409-446

    Geoffrey S. Corn, Victor M. Hansen

    Even If It Ain't Broke, Why Not Fix It? Three Proposed Improvements to the Uniform Code of Military Justice

    No.2

    pp. 447-482

    William C. Banks, Harvey Rishikof

    Educating National Security Lawyers for the Twenty- first Century: The Intersection of National Security Law and International Affairs

    No.2

    pp. 483-487

    Laura K. Donohue

    National Security Law Pedagogy and the Role of Simulations

    No.2

    pp. 489-547

    Derek E. Bambauer

    Chutzpah

    No.2

    pp. 549-562

    Michael J. Glennon

    The Dark Future of International Cybersecurity Regulation

    No.2

    pp. 563-570

    Journal of National Security Law and Policy,  2014, Vol.7

    Author

    Title

    number

    Page to Page

    Lisa L. Turner

    Developing Client- Ready Practitioners: Learning How to Practice National Security Law at Military Law Schools

    No.1

    pp. 1-80

    S. Elisa Poteat

    Discovering the Artichoke: How Mistakes and Omissions Have Blurred the Enabling Intent of the Classified Information Procedures Act

    No.1

    pp. 81-113

    Gary D. Brown, Andrew 0. Metcalf

    Easier Said Than Done: Legal Reviews of Cyber Weapons

    No.1

    pp. 115-138

    Michael N. Schmitt

    Legitimacy versus Legality Redux: Arming the Syrian Rebels

    No.1

    pp. 139-159

    James B. Steinberg, Miriam R. Estrin

    Harmonizing Policy and Principle: A Hybrid Model for Counterterrorism

    No.1

    pp. 161-207

    David S. Kris

    On the Bulk Collection of Tangible Things

    No.2

    pp. 209-295

    Denise C. Bell

    Symposium Introduction: Swimming in the Ocean of Big Data

    No.2

    pp. 297-299

    Rajesh De

    The NSA and Accountability in an Era of Big Data

    No.2

    pp. 301-310

    Matthew Gordon

    Big Data: It's Not the Size That Matters

    No.2

    pp. 311-323

    Sean Fahey

    The Democratization of Big Data

    No.2

    pp. 325-331

    Stephen I. Vladeck

    Big Data Before and After Snowden

    No.2

    pp. 333-339

    Callahan, Mary Ellen

    Charting the Future: What to Expect from Big Data

    No.2

    pp. 341-377

     


    نظر شما



    نمایش غیر عمومی
    تصویر امنیتی :
تعداد بازدید کنندگان کل :
تا کنون :
26843349
اکنون :
32