793 resultados para national security law


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This dissertation examined how United States illicit drug control policy, often commonly referred to as the "war on drugs," contributes to the reproduction of gendered and racialized social relations. Specifically, it analyzed the identity producing practices of United States illicit drug control policy as it relates to the construction of U.S. identities. ^ Drawing on the theoretical contributions of feminist postpositivists, three cases of illicit drug policy practice were discussed. In the first case, discourse analysis was employed to examine recent debates (1986-2005) in U.S. Congressional Hearings about the proper understanding of the illicit drug "threat." The analysis showed how competing policy positions are tied to differing understandings of proper masculinity and the role of policymakers as protectors of the national interest. Utilizing critical visual methodologies, the second case examined a public service media campaign circulated by the Office of National Drug Control Policy that tied the "war on drugs" with another security concern in the U.S., the "war on terror." This case demonstrated how the media campaign uses messages about race, masculinity, and femininity to produce privileged notions of state identity and proper citizenship. The third case examined the gendered politics of drug interdiction at the U.S. border. Using qualitative research methodologies including semi-structured interviews and participant observation, it examined how gender is produced through drug interdiction at border sites like Miami International Airport. By paying attention to the discourse that circulates about women drug couriers, it showed how gender is normalized in a national security setting. ^ What this dissertation found is that illicit drug control policy takes the form it does because of the politics of gender and racial identity and that, as a result, illicit drug policy is implicated in the reproduction of gender and racial inequities. It concluded that a more socially conscious and successful illicit drug policy requires an awareness of the gendered and racialized assumptions that inform and shape policy practices.^

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: (1) hyper militarization, (2) intimidation,(3) coercion, (4) criminalization, (5) panoptic surveillance, (6) plenary security measures, and (7) unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: (1) official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; (2) militarization rationales, budgets, and expenditures; and (3) case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-à-vis the relationship between US security and global security.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Numerous statements and declarations have been made over recent decades in support of open access to research data. The growing recognition of the importance of open access to research data has been accompanied by calls on public research funding agencies and universities to facilitate better access to publicly funded research data so that it can be re-used and redistributed as public goods. International and inter-governmental bodies such as the ICSU/CODATA, the OECD and the European Union are strong supporters of open access to and re-use of publicly funded research data. This thesis focuses on the research data created by university researchers in Malaysian public universities whose research activities are funded by the Federal Government of Malaysia. Malaysia, like many countries, has not yet formulated a policy on open access to and re-use of publicly funded research data. Therefore, the aim of this thesis is to develop a policy to support the objective of enabling open access to and re-use of publicly funded research data in Malaysian public universities. Policy development is very important if the objective of enabling open access to and re-use of publicly funded research data is to be successfully achieved. In developing the policy, this thesis identifies a myriad of legal impediments arising from intellectual property rights, confidentiality, privacy and national security laws, novelty requirements in patent law and lack of a legal duty to ensure data quality. Legal impediments such as these have the effect of restricting, obstructing, hindering or slowing down the objective of enabling open access to and re-use of publicly funded research data. A key focus in the formulation of the policy was the need to resolve the various legal impediments that have been identified. This thesis analyses the existing policies and guidelines of Malaysian public universities to ascertain to what extent the legal impediments have been resolved. An international perspective is adopted by making a comparative analysis of the policies of public research funding agencies and universities in the United Kingdom, the United States and Australia to understand how they have dealt with the identified legal impediments. These countries have led the way in introducing policies which support open access to and re-use of publicly funded research data. As well as proposing a policy supporting open access to and re-use of publicly funded research data in Malaysian public universities, this thesis provides procedures for the implementation of the policy and guidelines for addressing the legal impediments to open access and re-use.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This book analyses the structure, form and language of a selected number of international and national legal instruments and reviews how an illustrative range of international and national judicial institutions have responded to the issues before them and the processes of legal reasoning engaged by them in reaching their decisions. This involves a very detailed discussion of these primary sources of international and national environmental law with a view to determining their jurisprudential architecture and the processes of reasoning expected of those responsible for implementing these architectural arrangements. This book is concerned not with the effectiveness or the quality of an environmental legal system but only with its jurisprudential characteristics and their associated processes of legal reasoning.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This thesis is an explorative study of four national level law enforcement agencies' applications of strategic intelligence against transnational organised crime. The thesis develops a hybrid conceptual model for strategic intelligence in law enforcement, which explains how strategic intelligence influences police management. Dr Coyne explored case studies of strategic intelligence in the Criminal Intelligence Service Canada, Serious and Organised Crime Agency United Kingdom, Australian Crime Commission and the Australian Federal Police. The research provides an understanding of the impact of strategic intelligence across strategic responses to transnational organised crime and the implications this has for police management and intelligence theory.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Over the past decade there has been an increased awareness in the field of international relations of the potential impact of an infectious disease epidemic on national security. While states’ attempts to combat infectious disease have a long history, what is new in this area is the adoption at the international level of securitized responses regarding the containment of infectious disease. This article argues that the securitization of infectious disease by states and the World Health Organization (WHO) has led to two key developments. First, the WHO has had to assert itself as the primary actor that all states, particularly western states, can rely upon to contain the threat of infectious diseases. The WHO's apparent success in this is evidenced by the development of the Global Outbreak Alert Response Network (GOARN), which has led to arguments that the WHO has emerged as the key authority in global health governance. The second outcome that this article seeks to explore is the development of the WHO's authority in the area of infectious disease surveillance. In particular, is GOARN a representation of the WHO's consummate authority in the area of coordinating infectious disease response or is GOARN the product of the WHO's capitulation to western states’ concerns with preventing infectious disease outbreaks from reaching their borders and as a result, are arguments expressing the authority of the WHO in infectious disease response premature?

Relevância:

90.00% 90.00%

Publicador:

Resumo:

At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the security of digital signature algorithms based on these constructions. They showed that the security of signature schemes based on the two randomized hash function modes relies on properties similar to the second preimage resistance rather than on the collision resistance property of the hash functions. One of the randomized hash function modes was named the RMX hash function mode and was recommended for practical purposes. The National Institute of Standards and Technology (NIST), USA standardized a variant of the RMX hash function mode and published this standard in the Special Publication (SP) 800-106. In this article, we first discuss a generic online birthday existential forgery attack of Dang and Perlner on the RMX-hash-then-sign schemes. We show that a variant of this attack can be applied to forge the other randomize-hash-then-sign schemes. We point out practical limitations of the generic forgery attack on the RMX-hash-then-sign schemes. We then show that these limitations can be overcome for the RMX-hash-then-sign schemes if it is easy to find fixed points for the underlying compression functions, such as for the Davies-Meyer construction used in the popular hash functions such as MD5 designed by Rivest and the SHA family of hash functions designed by the National Security Agency (NSA), USA and published by NIST in the Federal Information Processing Standards (FIPS). We show an online birthday forgery attack on this class of signatures by using a variant of Dean’s method of finding fixed point expandable messages for hash functions based on the Davies-Meyer construction. This forgery attack is also applicable to signature schemes based on the variant of RMX standardized by NIST in SP 800-106. We discuss some important applications of our attacks and discuss their applicability on signature schemes based on hash functions with ‘built-in’ randomization. Finally, we compare our attacks on randomize-hash-then-sign schemes with the generic forgery attacks on the standard hash-based message authentication code (HMAC).

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In late 2010, the online nonprofit media organization WikiLeaks published classified documents detailing correspondence between the U.S. State Department and its diplomatic missions around the world, numbering around 250,000 cables. These diplomatic cables contained classified information with comments on world leaders, foreign states, and various international and domestic issues. Negative reactions to the publication of these cables came from both the U.S. political class (which was generally condemnatory of WikiLeaks, invoking national security concerns and the jeopardizing of U.S. interests abroad) and the corporate world, with various companies ceasing to continue to provide services to WikiLeaks despite no legal measure (e.g., a court injunction) forcing them to do so. This article focuses on the legal remedies available to WikiLeaks against this corporate suppression of its speech in the U.S. and Europe since these are the two principle arenas in which the actors concerned are operating. The transatlantic legal protection of free expression will be considered, yet, as will be explained in greater detail, the legal conception of this constitutional and fundamental right comes from a time when the state posed the greater threat to freedom. As a result, it is not generally enforceable against private, non-state entities interfering with speech and expression which is the case here. Other areas of law, namely antitrust/competition, contract and tort will then be examined to determine whether WikiLeaks and its partners can attempt to enforce their right indirectly through these other means. Finally, there will be some concluding thoughts about the implications of the corporate response to the WikiLeaks embassy cables leak for freedom of expression online.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

No presente trabalho foram analisadas a natureza jurídica das contribuições especiais, suas hipóteses de validação constitucional como seu critério de distinção perante as demais espécies tributárias, bem como a correta determinação do prazo decadencial a elas estabelecido pelo art 146 do Código Tributário Nacional (CTN), especialmente em face da inconstitucionalidade do art 45 da Lei n 8.212/91 declarada através da Súmula Vinculante n 08/2008. Também foram abordadas as correntes doutrinárias favoráveis e contrárias à possibilidade da restrição dos efeitos das decisões de inconstitucionalidade das normas tributárias, bem como realizada a crítica à modulação dos efeitos da SV n 08/2008, que culminou por limitar a repetição do indébito das contribuições irregularmente constituídas apenas àqueles contribuintes que haviam se insurgido contra seu pagamento, administrativa ou judicialmente, até a data de 11/06/2008.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

O direito internacional dos refugiados constitui um dos mais importantes mecanismos de proteção internacional do indivíduo, sendo objeto de Convenção com alto número de ratificações e de legislação nacional ainda mais protetiva. Não obstante o amplo acervo normativo disponível, desenvolvido para lidar com os desafios impostos pelos frequentes fluxos migracionais que marcaram a primeira metade do século XX, fenômenos recentes tornaram evidente a necessidade de revisão, ainda que parcial, de sua estrutura. Políticas de controle de fronteiras adotadas na Europa levaram ao incremento do fluxo de refugiados entre Estados do Sul. Paralelamente, a transferência de parte do controle para fora das águas territoriais europeias fenômeno observado também no sudeste asiático põe o direito internacional dos refugiados em confronto com a regulamentação do direito do mar. Enquanto isto, o Brasil, por não possuir histórico recente relevante de recebimento de migrantes, enfrenta grande dificuldade para garantir até mesmo o reconhecimento da condição de refugiado. Neste contexto, é imprescindível o enfrentamento de tais problemas, compatibilizando o instituto do refúgio com as necessidades das primeiras décadas do século XXI.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

McInnes, C., Lee, K. (2006). Health, security and foreign policy. Review of International Studies, 32 (1), 5-23. RAE2008

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Among the many issues that were raised in the White Book on National Security of the Republic of Poland (WBNSRP), there were also those related to the functioning of a Common Security and Defence Policy (CSDP). Its importance for the security of Poland was indicated, as well as the need on the part of EU Member States to broaden collaboration in the sphere of security and defence. The key problems occurring in the context of CSDP were also emphasised and their causes indicated. The aim of the article is to present the factors responsible for the weakening of CSDP effectiveness, ones taken into account in the White Book, and subsequently to present a Framework for their analysis in the light of further scholarship.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This textbook on European Labour law adds to the existing literature in two aspects. First, it is written in such a way that readers who are versed in EU law and labour law, as well as those who only know national labour law can profit. Secondly, it analyses the EU's contribution to labour law from comparative and EU integration perspectives, taking a critical approach to the EU's so-called economic constitution as shaped by its Court of Justice.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In, RDeS - Revista de Direito e Segurança, nº1 (Janeiro/Junho de 2013), 63-85 pp. que consiste numa versão actualizada do texto publicado na obra colectiva AAVV, Estudos de Direito e Segurança (coordenação de Jorge Bacelar Gouveia e Rui Carlos Pereira), Almedina, Coimbra, 2007, pp. 171 e ss.