Part of the National Security Law Commons

Works in National Security Law

2022

Why the President Should Remain Commander in Chief of the D.C. National Guard, Christopher F. Melling
BYU Law Review

PDF

2021

Death Star Drones: How Missile Defense Drone Technology Marks the Advent of Contingent Sovereignty, Ben Forsgren
BYU Law Review

PDF

2017

CYBER!, Andrea M. Matwyshyn
BYU Law Review

PDF

A Muslim Registry: The Precursor to Internment?, Sahar F. Aziz
BYU Law Review

PDF

2016

Quasi-Constitutional Protections and Government Surveillance, Emily Berman
BYU Law Review

PDF

2015

Emerging Technologies and LOAC Signaling, Eric Talbot Jensen
Faculty Scholarship

Balancing Domestic Nuclear Industry Viability with International Security: Imminent changes to nuclear export control regulations, H. Brendan Burke
Brigham Young University International Law & Management Review

PDF

2014

State Obligations in Cyber Operations, Eric Talbot Jensen
Faculty Scholarship

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen
Faculty Scholarship

PDF

Requiring a Nexus to National Security: Immigration, “Terrorist Activities,” and Statutory Reform, Jared Hatch
BYU Law Review

PDF

2013

Disaggregating Disasters, Lisa Grow Sun, RonNell Andersen Jones
Faculty Scholarship

PDF

2012

Sovereignty and Neutrality in Cyber Conflict, Eric Talbot Jensen
Faculty Scholarship

Cyber Deterrence, Eric Talbot Jensen
Faculty Scholarship

PDF

Cyber Attacks: Proportionality and Precautions in Attack, Eric Talbot Jensen
Faculty Scholarship

Mohamed v. Jeppesen Dataplan, Inc.: The Ninth Circuit Sends the Totten Bar Flying Away on the Jeppesen Airplane, Michael Q. Cannon
BYU Law Review

PDF

Mill, Holmes, Brandeis and a True Threat to Brandenburg, Mark Strasser
Brigham Young University Journal of Public Law

PDF

2011

Humanitarian Law Project and the Supreme Court's Construction of Terrorism, Wadie E. Said
BYU Law Review

PDF

President Obama and the Changing Cyber Paradigm, Eric Talbot Jensen
Faculty Scholarship

PDF

Unfounded Allegations That John Yoo Violated His Ethical Obligations as a Lawyer: A Critical Analysis of the Torture Memo, Carrie L. Flores
Brigham Young University Journal of Public Law

PDF

2010

Why Aren't We Using that Intel Stuff? Using Reconnaissance Satellite Imagery in Domestic Disaster Prevention and Response, Carla Crandall
BYU Law Review

PDF

Comparative Institutional Analysis and Detainee Legal Policies: Democracy as a Friction, Not a Fiction, Carla Crandall
BYU Law Review

PDF

The Architecture of Accountability: A Case Study of the Warrantless Surveillance Program, Kathleen Clark
BYU Law Review

PDF

Torture and Public Policy: Mohamed v. Jeppesen Dataplan, Inc., Allows “Extraordinary Rendition” Victims to Litigate Around State Secrets Doctrine , Michael P. Jensen
BYU Law Review

PDF

2009

Boumediene v. Bush: Habeas Corpus, Exhaustion, and the Special Circumstances Exception, Brandon C. Pond
BYU Law Review

PDF

Cyber Warfare and Precautions against the Effects of Attacks, Eric Talbot Jensen
Faculty Scholarship

PDF

2007

The World Trade Center Disaster: How Terrorist Airline Attacks Can Affect the Legal, Economic, and Financial Conditions of Airlines Under the Montreal Liability Agreement, Larry Moore, Rose M. Rubin, Justin N. Joy
Brigham Young University International Law & Management Review

PDF

Risky Business: Corruption, Fraud, Terrorism, & Other Threats to Global Business, Stuart Poole-Robb, Alan Bailey
Brigham Young University International Law & Management Review

PDF

The State Secrets Privilege and the Abdication of Oversight, Jared Perkins
Brigham Young University Journal of Public Law

PDF

2006

Implementing the USA Patriot Act: A Case Study of the Student and Exchange Visitor Information System (SEVIS), Kam C. Wong
Brigham Young University Education and Law Journal

PDF

2005

The Case for Closing the School of the Americas, Bill Quigley
Brigham Young University Journal of Public Law

PDF

Habeas Corpus in the War Against Terrorism: Hamdi v. Rumsfeld and Citizen Enemy Combatabts , Jared Perkin
Brigham Young University Journal of Public Law

PDF

2004

Individual Religious Freedom and National Security in Europe After September 11, Silvio Ferrari
BYU Law Review

PDF

2002

Computer Attacks on Critical National Infrastructure: A Use of Force Invoking the Right of Self-Defense, Eric Talbot Jensen
Faculty Scholarship

PDF

Designation of Foreign Terrorist Organizations Under the AEDPA: The National Council Court Erred in Requiring Pre-Designation Process, Joshua A. Ellis
BYU Law Review

PDF

The CIA and Covert Operations: To Disclose or Not to Disclose - That is the Question, Marcus Eyth
Brigham Young University Journal of Public Law

PDF

Religious Freedom and the Challenge of Terrorism, Gordon H. Smith
BYU Law Review

PDF

Rational Profiling in America's Airports, R. Spencer Macdonald
Brigham Young University Journal of Public Law

PDF

1990

The Critical technologies Approach: Controlling Scientific Communication for the National Security, Valerie M. Fogleman, James Etienne Viator
Brigham Young University Journal of Public Law

PDF