Search for: "NATIONAL SECURITY ARCHIVE" Results 761 - 780 of 3,517
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
10 Jan 2011, 6:34 am
On November 15, 2004, acting under Chapter VII of the Charter of the United Nations, the United Nations Security Council adopted Resolution 1572 imposing sanctions against Côte d'Ivoire in response to the resumption of hostilities in Cote d'Ivoire and the repeated violations of the ceasefire agreement of May 3, 2003. [read post]
13 Dec 2016, 8:38 am by Conor Ward
Guidance previously issued by the CPNI, and that is still relevant, is being archived on the NCSC website. [read post]
19 May 2009, 11:34 am
(Hat tip: Secrecy News) See also: Senators Ask FBI to Explain Flawed ‘National Security Letter’ to Internet Archive FBI to Fix NSL Problems with Software [read post]
26 Jan 2009, 7:19 am
Revealing the source code incurs only a low-level risk: unlike a warring nation that learns much from discovering an enemy's military plans, computer attackers learn little from the disclosure of a system's source code because computer security measures, such as firewalls, have a low level of uniqueness. [read post]
1 Mar 2011, 12:11 pm by Sarah Waldeck
  Jonathan has litigated leading national security habeas corpus cases, including Al-Marri v. [read post]
25 Jan 2010, 9:53 am by Jeffrey Kahn
" Stopping this threat was national security priority number one. [read post]
22 Feb 2011, 1:49 am by Ted Frank
Meanwhile, in 2007, Democrat Charles Schumer and Iconoclast Michael Bloomberg called for reform, noting that our legal system was choking New York's competitiveness in the financial industry, and Congress responded with Dodd-Frank and the Obama administration pushed for a rollback of Supreme Court decisions reducing the scope of the abusiveness of the securities laws—even as the New York Stock Exchange finds it needs German help to survive. [read post]
3 Dec 2007, 6:42 am
Linda is an expert on international law, national security law, and the legal issues surrounding global warming. [read post]
16 Feb 2020, 12:30 pm by Sabrina I. Pacifici
But now budding Python developers can read up on the National Security Agency’s own Python training materials. [read post]
4 Oct 2022, 4:14 am by Emma Snell
A curated weekday guide to major national security news and developments over the past 24 hours. [read post]
25 Apr 2010, 6:34 pm
That security will be classified as a trading security and any changes to the value of that security must be reflected on the balance sheet and income statement. [7] Next, assume a month passes and the securities are now worth $90. [read post]
17 Jan 2008, 9:59 am
"  In addition, FERC directed NERC to examine "a new framework of accountability surrounding exceptions based on technical feasibility" and to monitor the development and implementation of cyber security standards by the National Institute of Standards and Technology. [read post]
27 Sep 2009, 10:15 pm
Charlie Savage, New York Times: "The Justice Department is preparing to impose new limits on the government assertion of the state secrets privilege used to block lawsuits for national security reasons. ...The bills [currently pending in Congress] would encourage courts... [read post]
26 Jul 2010, 8:52 am by J. Michael Goodson Law Library
To read more about national security law in general, try a subject search for national security law and legislation. [read post]
26 Jan 2012, 11:29 am by Bill Raftery
The National Center for State Courts has an archive of 2011, 2010, and previous years State of the Judiciary addresses located here. [read post]
13 Jan 2011, 8:07 am by Bill Raftery
The National Center for State Courts has an archive of 2011, 2010, and previous years State of the Judiciary addresses located here. [read post]
12 Sep 2013, 10:21 am by artatlawadmin
International sanctions are generally imposed by the United Nations or the […] The post Trading with the Enemy appeared first on Art@Law. [read post]
9 Jun 2013, 7:10 am
Also at the Politico link: The NSA has been a central player in U.S. cyber strategy since at least 1997, according to a separate declassified memo obtained by [George Washington University’s] National Security Archive. [read post]