The legal and constitutional framework for military operations, intelligence collection and other national security activities is explored in depth in the new edition of “National Security Law,” the preeminent casebook on <the subject for law students. It presents concise treatments of dozens of topics — from secrecy to rendition and interrogation — with case studies and questions for discussion.
See “National Security Law” by Stephen Dycus, Arthur L. Berney, William C. Banks, and Peter Raven-Hansen, Fifth Edition, Aspen Publishers, August 2011.
In a year when management issues like human capital, IT modernization, and improper payments have received greater attention from the public, examining this PMA tells us a lot about where the Administration’s policy is going to be focused through its last three years.
Congress must enact a Digital Public Infrastructure Act, a recognition that the government’s most fundamental responsibility in the digital era is to provide a solid, trustworthy foundation upon which people, businesses, and communities can build.
To increase the real and perceived benefit of research funding, funding agencies should develop challenge goals for their extramural research programs focused on the impact portion of their mission.
Without trusted mechanisms to ensure privacy while enabling secure data access, essential R&D stalls, educational innovation stalls, and U.S. global competitiveness suffers.