Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Civil Military Relations Panel, Joshua E. Kastenberg Jun 2020

Civil Military Relations Panel, Joshua E. Kastenberg

Faculty Scholarship

In the first week of this month, the nation was surprised to learn that retired general officers (generals and admirals) including James Mattis, Colin Powell, Michael Glenn Mullen, and William McRaven (to name a few) spoke out against President Donald Trump’s response to demonstrations across the United States. President Trump threatened to unilaterally invoke the 1807 Insurrection Act and federalize the National Guard as well as use the active duty Armed Forces of the United States as a “super police force.”

The conduct of the retired generals is not without detractors. The Constitution was constructed with the idea that a …


National Security And Judicial Ethics: The Exception To The Rule Of Keeping Judicial Conduct Judicial And The Politicization Of The Judiciary, Joshua E. Kastenberg Jan 2020

National Security And Judicial Ethics: The Exception To The Rule Of Keeping Judicial Conduct Judicial And The Politicization Of The Judiciary, Joshua E. Kastenberg

Faculty Scholarship

This article is divided into three sections, and it incorporates original research from the personal correspondences of several judges and justices. This article includes unpublished correspondences from various judicial collections at the Library of Congress, the Bentley Historical Library at the University of Michigan, the Washington and Lee School of Law’s special collections, the Richard Nixon and Ronald Reagan Presidential Libraries, the National Library of Australia in Canberra, and Canada’s National Archives in Ottawa. The first section analyzes the current framework governing judicial disqualification based on the separation of powers doctrine as well as the right to an impartial judiciary, …


National Cybersecurity Innovation, Tabrez Y. Ebrahim Jan 2020

National Cybersecurity Innovation, Tabrez Y. Ebrahim

Faculty Scholarship

National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature …


War Powers: Congress, The President, And The Courts – A Model Casebook Section, Stephen M. Griffin, Matthew C. Waxman Jan 2020

War Powers: Congress, The President, And The Courts – A Model Casebook Section, Stephen M. Griffin, Matthew C. Waxman

Faculty Scholarship

This model casebook section is concerned with the constitutional law of war powers as developed by the executive and legislative branches, with a limited look at relevant statutes and federal court cases. It is intended for use in Constitutional Law I classes that cover separation of powers. It could also be used for courses in National Security Law or Foreign Relations Law, or for graduate courses in U.S. foreign policy. This is designed to be the reading for one to two classes, and it can supplement or replace standard casebook sections on war powers that are shorter and offer less …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.