Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Georgetown University Law Center (136)
- Roger Williams University (81)
- Columbia Law School (47)
- Duke Law (44)
- University of Pennsylvania Carey Law School (38)
-
- University of Colorado Law School (34)
- University of Nebraska - Lincoln (33)
- American University Washington College of Law (31)
- Maurer School of Law: Indiana University (29)
- University of Maryland Francis King Carey School of Law (24)
- University of Baltimore Law (20)
- University of Michigan Law School (20)
- University of Florida Levin College of Law (18)
- University of Pittsburgh School of Law (18)
- Notre Dame Law School (16)
- Embry-Riddle Aeronautical University (12)
- New York Law School (12)
- The Peter A. Allard School of Law (12)
- Emory University School of Law (11)
- Pace University (11)
- William & Mary Law School (11)
- Fordham Law School (10)
- Washington and Lee University School of Law (10)
- Western New England University School of Law (10)
- Southern Methodist University (9)
- Cornell University Law School (8)
- Purdue University (8)
- University of Missouri School of Law (8)
- Valparaiso University (8)
- Mitchell Hamline School of Law (7)
- Keyword
-
- Terrorism (125)
- National security (118)
- Immigration (29)
- Surveillance (29)
- Privacy (27)
-
- International law (26)
- National Security (26)
- United States (26)
- Cybersecurity (24)
- Espionage (22)
- September 11 (22)
- Israel (21)
- Counterterrorism (20)
- Security (20)
- Executive power (19)
- Intelligence (19)
- War (19)
- War on terror (19)
- Detention (17)
- Jonathan Pollard (17)
- 9/11 (16)
- Due process (16)
- Constitutional law (15)
- FISA (15)
- Homeland security (15)
- Human rights (15)
- Torture (15)
- Military (14)
- Civil liberties (13)
- Climate change (13)
- Publication Year
- Publication
-
- Faculty Scholarship (139)
- Georgetown Law Faculty Publications and Other Works (127)
- All Faculty Scholarship (58)
- Law Faculty Scholarship (58)
- Articles (43)
-
- Publications (34)
- Faculty Publications (32)
- Articles by Maurer Faculty (29)
- Journal Articles (27)
- Space, Cyber, and Telecommunications Law Program: Faculty Publications (27)
- Articles in Law Reviews & Other Academic Journals (20)
- UF Law Faculty Publications (18)
- Life of the Law School (1993- ) (15)
- Faculty Articles (14)
- Scholarly Articles (13)
- All Faculty Publications (12)
- Articles & Chapters (10)
- Elisabeth Haub School of Law Faculty Publications (10)
- Faculty Journal Articles and Book Chapters (9)
- Newsletter (9)
- Cornell Law Faculty Publications (8)
- Law Faculty Publications (8)
- Testimony Before Congress (8)
- McGeorge School of Law Scholarly Articles (7)
- Scholarly Works (7)
- Security Studies & International Affairs - Daytona Beach (7)
- Homeland Security Publications (6)
- Joint PIJIP/TLS Research Paper Series (6)
- Journal Publications (6)
- Libraries Faculty and Staff Scholarship and Research (6)
Articles 1 - 30 of 900
Full-Text Articles in Law
Authoritarian Privacy, Mark Jia
Authoritarian Privacy, Mark Jia
Georgetown Law Faculty Publications and Other Works
Privacy laws are traditionally associated with democracy. Yet autocracies increasingly have them. Why do governments that repress their citizens also protect their privacy? This Article answers this question through a study of China. China is a leading autocracy and the architect of a massive surveillance state. But China is also a major player in data protection, having enacted and enforced a number of laws on information privacy. To explain how this came to be, the Article first turns to several top-down objectives often said to motivate China’s privacy laws: advancing its digital economy, expanding its global influence, and protecting its …
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer
Faculty Publications
This Essay contends that data infrastructure, when implemented on a national scale, can transform the way we conceptualize artificial intelligence (AI) governance. AI governance is often viewed as necessary for a wide range of strategic goals, including national security. It is widely understood that allowing AI and generative AI to remain self-regulated by the U.S. AI industry poses significant national security risks. Data infrastructure and AI oversight can assist in multiple goals, including: maintaining data privacy and data integrity; increasing cybersecurity; and guarding against information warfare threats. This Essay concludes that conceptualizing data infrastructure as a form of critical infrastructure …
Environmental War, Climate Security, And The Russia-Ukraine Crisis, Mark P. Nevitt
Environmental War, Climate Security, And The Russia-Ukraine Crisis, Mark P. Nevitt
Faculty Articles
This Article addresses the Russia-Ukraine conflict’s broad implications for energy security, climate security, and environment protections during wartime. I assert that in the short-term the Russian-Ukraine war is poised to hinder much-needed international climate progress. It will stymie international decarbonization efforts and cause greater uncertainty in other climate-destabilized parts of the world, such as the Arctic. While Russia has become a pariah in the eyes of the United States and other Western nations, it has forged new partnerships and capitalized on new, lucrative energy markets outside the West and Global South. But in the long term, the global renewable energy …
Updating Senator Borah: A Nuclear Kellogg-Briand Pact, David A. Koplow
Updating Senator Borah: A Nuclear Kellogg-Briand Pact, David A. Koplow
Georgetown Law Faculty Publications and Other Works
In recognizing the legacy of Senator William E. Borah, the author shares his remarks from the Borah Symposium at the University of Idaho, about the Senator's personality and character, his contribution and later characterization to international law and national security, specifically the 1928 Kellogg-Briand Pact, and finally, a proposal to a modern reincarnation to the Kellogg-Briand Pact and the newer threats of this era.
Large Constellations Of Small Satellites: The Good, The Bad, The Ugly, And The Illegal, David A. Koplow
Large Constellations Of Small Satellites: The Good, The Bad, The Ugly, And The Illegal, David A. Koplow
Georgetown Law Faculty Publications and Other Works
The most exciting and far-reaching contemporary developments regarding human activities in outer space arise from the recent drastic reductions in the costs of building, launching, and operating satellites, and from the concomitant sudden emergence of large constellations of small, inexpensive, privately-owned spacecraft. These satellites--devoted to highly remunerative functions such as communications (bringing high-speed, affordable internet to underserved constituencies), remote sensing (facilitating land use planning, weather forecasting, and emergency search and rescue), and support for military operations (in Ukraine and elsewhere)--already number in the thousands and will soon reach the tens of thousands.
But in addition to generating billions of …
Blinded By The Light: Resolving The Conflict Between Satellite Megaconstellations And Astronomy, David A. Koplow
Blinded By The Light: Resolving The Conflict Between Satellite Megaconstellations And Astronomy, David A. Koplow
Georgetown Law Faculty Publications and Other Works
The sudden emergence of large constellations of small satellites in low altitude orbits represents one of the most dramatic contemporary innovations in outer space. Promising low-cost, low-latency global communications and spectacular capacities for remote sensing of the Earth, these satellites will soon number in the tens of thousands, sponsored by diverse corporations and countries around the world. But this proliferation of spacecraft comes at a steep cost in unavoidable interference with ground-based astronomy: as the satellites overfly the observatories, they block the views of remote objects and phenomena, leaving obliterating white streaks on the collected imagery, and obscuring access to …
The Common Law And First Amendment Qualified Right Of Public Access To Foreign Intelligence Law, Laura K. Donohue
The Common Law And First Amendment Qualified Right Of Public Access To Foreign Intelligence Law, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
For millennia, public access to the law has been the hallmark of rule of law. To be legally and morally binding, rules must be promulgated. Citizens’ knowledge of the law, in turn, serves as the lynchpin for democratic governance. In common law countries, it is more than just the statutory provisions and their execution that matters: how courts rule, and the reasoning behind their determination, proves central. Accordingly, in the United States, both common law and the right to petition incorporated in the First Amendment have long enshrined a presumed right of public right of access to Article III opinions …
The National Security Consequences Of The Major Questions Doctrine, Ganesh Sitaraman, Timothy Meyer
The National Security Consequences Of The Major Questions Doctrine, Ganesh Sitaraman, Timothy Meyer
Vanderbilt Law School Faculty Publications
The rise of the major questions doctrine—the rule that says that in order to delegate to the executive branch the power to resolve a “question of ‘deep economic and political significance’ that is central to [a] statutory scheme,” Congress must do so expressly—threatens to unmake the modern executive’s authority over foreign affairs, especially in matters of national security and interstate conflict. In the twenty-first century, global conflicts increasingly involve economic warfare, rather than (or in addition to) the force of arms.
In the United States, the executive power to levy economic sanctions and engage in other forms of economic warfare …
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Articles by Maurer Faculty
The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …
Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton
Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton
Articles in Law Reviews & Other Academic Journals
Advances in information technology have irrevocably changed the nature of war crimes investigations. The pursuit of accountability for the most serious crimes of concern to the international community now invariably requires access to digital evidence. The global reach of platforms like Facebook, YouTube, and Twitter means that much of that digital evidence is held by U.S. social media companies, and access to it is subject to the U.S. Stored Communications Act.
This is the first Article to look at the legal landscape facing international investigators seeking access to digital evidence regarding genocide, war crimes, crimes against humanity, and aggression. It …
Center For Health & Homeland Security Newsletter, Spring 2023
Center For Health & Homeland Security Newsletter, Spring 2023
Newsletter
No abstract provided.
Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang
Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang
Articles
In the early 2000s, shortly before the September 11 attacks, Daniel J. Solove noted that computer databases in the United States were controlled by public as well as private bureaucracies. In that sense, Solove argued, the "Big Brother" metaphor "fails to capture the most important dimension of the database problem." In his 2008 Lockhart lecture, constitutional law scholar Jack M. Balkin argued that the United States has gradually transformed from a welfare and national security state to a National Surveillance State: "a new form of governance that features the collection, collation, and analysis of information about populations both in the …
Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue
Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The Supreme Court’s 2022 decision in Federal Bureau of Investigation v. Fazaga heralds a worrying trend. Over the past 15 years, as more information about how the government wields its foreign intelligence collection authorities on U.S. soil has become available, it has become clear that the government has repeatedly acted outside its constitutional and statutory limits, and at times, in flagrant disregard for judicial orders. As a result, dozens of cases challenging surveillance have been making their way through the courts. Unlike in prior eras, in certain cases it has become easier for litigants to establish an injury-in-fact in light …
Brief For Respondents, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Robert J. Tolchin
Brief For Respondents, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Robert J. Tolchin
Court Briefs
No abstract provided.
Climate Change And The Law Of National Security Adaptation, Mark P. Nevitt
Climate Change And The Law Of National Security Adaptation, Mark P. Nevitt
Faculty Articles
The Department of Defense (DoD) is the largest employer in the world, owns and operates an enormous global real estate portfolio, and emits more Greenhouse Gases (GHGs) than many nations. Entrusted with the national security, the DoD is now threatened by a new enemy—climate change. Climate change imperils national security infrastructure while undermining the military’s capacity to respond to climate-driven disasters at home and abroad. However, legal scholarship has yet to address what I call “the law of national security adaptation” and related questions. For example, how do environmental and climate change laws apply to the U.S. military? What laws …
Climate Security Insights From The Covid-19 Response, Mark P. Nevitt
Climate Security Insights From The Covid-19 Response, Mark P. Nevitt
Faculty Articles
The climate change crisis and COVID-19 crisis are both complex collective action problems. Neither the coronavirus nor greenhouse gas (GHG) emissions respect political borders. Both impose an opportunity cost that penalizes inaction. They are also increasingly understood as nontraditional, novel security threats. Indeed, COVID-19’s human cost is staggering, with American lives lost vastly exceeding those lost in recent armed conflicts. And climate change is both a threat accelerant and a catalyst for conflict—a characterization reinforced in several climate-security reports. To counter COVID-19, the President embraced martial language, stating that he will employ a “wartime footing” to “defeat the virus.” Perhaps …
Back To Basics: The Benefits Of Paradigmatic International Organizations, Kristina Daugirdas, Katerina Linos
Back To Basics: The Benefits Of Paradigmatic International Organizations, Kristina Daugirdas, Katerina Linos
Articles
In the early 2000s, small “coalitions of the willing,” flexible networks, and nimble private-public partnerships were promoted as alternatives to bureaucratic, consensus-seeking, and slow-moving international organizations. The Global Fund to Fight AIDS, Tuberculosis and Malaria was established as an efficient alternative to the lumbering World Health Organization. The Basel Committee, the Financial Stability Forum, and the Financial Action Task Force were lauded as global market regulators. The Pompidou Group, the Dublin Group, and Interpol were touted as effective police networks in the battle against transnational crime.
We systematically reviewed the evolution of these celebrated networks in the ensuing decades by …
The National Security Consequences Of The Major Questions Doctrine, Timothy Meyer, Ganesh Sitaraman
The National Security Consequences Of The Major Questions Doctrine, Timothy Meyer, Ganesh Sitaraman
Faculty Scholarship
The rise of the major questions doctrine—the rule that says that in order to delegate to the executive branch the power to resolve a “question of ‘deep economic and political significance’ that is central to [a] statutory scheme,” Congress must do so expressly—threatens to unmake the modern executive’s authority over foreign affairs, especially in matters of national security and interstate conflict. In the twenty-first century, global conflicts increasingly involve economic warfare, rather than (or in addition to) the force of arms.
In the United States, the executive power to levy economic sanctions and engage in other forms of economic warfare …
Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling
Combating Ransomware: One Year On, V. Gerard Comizio, Gary Corn, William Deckelman, Karl Hopkins, Mark Hughes, Patrick Mccarty, Sujit Raman, Kurt Sanger, Ari Schwartz, Melanie Teplinsky, Jackson Colling
Joint PIJIP/TLS Research Paper Series
No abstract provided.
The Private Enforcement Of National Security, Maryam Jamshidi
The Private Enforcement Of National Security, Maryam Jamshidi
Publications
The private enforcement of public law is a central feature of the American administrative state. As various scholars have argued, the federal government depends upon private parties to enforce public laws through litigation in order to achieve the government’s regulatory objectives. This scholarship has, however, largely overlooked the phenomenon of private enforcement in the national security arena. This Article seeks to describe and analyze national security’s private enforcement for the first time. In doing so, it explores what national security’s private enforcement reveals about the costs of private enforcement more broadly. In particular, this Article identifies an important downside to …
The War On Terror & Vigilante Federalism, Maryam Jamshidi
The War On Terror & Vigilante Federalism, Maryam Jamshidi
Publications
No abstract provided.
How Private Actors Are Impacting U.S. Economic Sanctions, Maryam Jamshidi
How Private Actors Are Impacting U.S. Economic Sanctions, Maryam Jamshidi
Publications
Economic and trade sanctions are typically understood as the exclusive province of governments and intergovernmental organizations. Private parties have, however, long played a role in sanctions regimes. For example, private plaintiffs holding unsatisfied, terrorism-related civil judgments have used various U.S. federal statutes to enforce those judgments against assets blocked by U.S. sanctions. Most recently, plaintiffs with judgments against the Taliban have used some of those federal laws to execute against the financial assets of Afghanistan’s central bank. These and other efforts to enforce terrorism-related civil judgments are more than just attempts to collect on outstanding damages awards. Rather, they allow …
Securing Patent Law, Charles Duan
Securing Patent Law, Charles Duan
Articles in Law Reviews & Other Academic Journals
A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …
Climate Change And The Specter Of Statelessness, Mark P. Nevitt
Climate Change And The Specter Of Statelessness, Mark P. Nevitt
Faculty Articles
What happens when climate change extinguishes entire nations? Neither international nor environmental law has provided a satisfactory answer to this weighty question. Climate change-induced flooding, storm surge, and sea level rise threaten the territorial integrity and habitability of several small island developing states, raising the specter of statelessness. We know that climate catastrophe is coming, but we have failed to take the necessary steps to safeguard several developing nations. This Article argues that innovative legal and policy solutions are needed today to prevent nation extinction tomorrow. I focus on two potential international governance solutions: the U.N. Framework Convention on Climate …
Red White And Blue – And Also Green: How Energy Policy Can Protect Both National Security And The Environment, David M. Schizer
Red White And Blue – And Also Green: How Energy Policy Can Protect Both National Security And The Environment, David M. Schizer
Faculty Scholarship
Too often, energy policy protects the environment while neglecting national security, or vice versa. Since each goal is critical, this Article shows how to advance both at the same time.
For national security, the key is to avoid depending on the wrong suppliers. If they are vulnerable to attack (like some Middle Eastern producers), they need to be defended. Or, if they are themselves geopolitical threats (like Russia and Iran), their energy exports fund harmful conduct. This Article breaks new ground in showing why suppliers tend to be insecure or menacing: authoritarian regimes — which are more likely to pose …
Us Trade Policy, China And The Wto (Foreword), Paolo Davide Farah
Us Trade Policy, China And The Wto (Foreword), Paolo Davide Farah
Book Chapters
In ‘U.S. Trade Policy, China and the WTO’, Nerina Boschiero addresses a key topic in contemporary international economic law and global governance. By focusing on a turning point in global politics and the shaping/framing of trade policy in the U.S.– the election of President Donald Trump sheds light on the tumultuous process of reshaping of global governance. The crisis of multilateralism has been discussed at length in academia and mainstream media. However, little attention has been paid to how the U.S. is reacting to the rise of China in the global order, in practical terms. In particular, focus …
Sunshine Laws Behind The Clouds: Limited Transparency In A Time Of National Emergency, Ira P. Robbins
Sunshine Laws Behind The Clouds: Limited Transparency In A Time Of National Emergency, Ira P. Robbins
Articles in Law Reviews & Other Academic Journals
The COVID-19 pandemic dramatically changed the way citizens lived their lives, businesses operated, and governments functioned. With most people forced to stay home, the pandemic also disrupted how people received their news and other essential information. Public records and public meetings had to adapt to face the growing challenges in a locked-down world. While some governmental bodies were able to keep up with the threat that COVID-19 posed against transparency, others either failed to acclimate to the new normal or actively took advantage of the circumstances to limit how much the public knew not only about the crisis, but about …
Border Orientation In A Globalizing World, Beth A. Simmons, Michael R. Kenwick
Border Orientation In A Globalizing World, Beth A. Simmons, Michael R. Kenwick
All Faculty Scholarship
Border politics are a salient component of high international politics. States are increasingly building infrastructure to ‘secure’ their borders. We introduce the concept of border orientation to describe the extent to which the State is committed to the spatial display of capacities to control the terms of penetration of its national borders. Border orientation provides a lens through which to analyze resistance to globalization, growing populism, and the consequences of intensified border politics. We measure border orientation using novel, geo-spatial data on the built environment along the world’s borders and theorize that real and perceived pressures of globalization have resulted …
Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius
Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius
Homeland Security Publications
No abstract provided.