Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 142

Full-Text Articles in Law

The Rise Of The Security State, Wang Yuhua, Carl F. Minzner Jan 2015

The Rise Of The Security State, Wang Yuhua, Carl F. Minzner

Faculty Scholarship

Over the past two decades, the Chinese domestic security apparatus has expanded dramatically. “Stability maintenance” operations have become a priority for local Chinese authorities. We argue that the birth of these trends dates to the early 1990s, when central Party authorities adopted new governance models that differed dramatically from those that of the 1980s. They increased the bureaucratic rank of public security chiefs within the Party apparatus, expanded the reach of the Party political-legal apparatus into a broader range of governance issues, and altered cadre evaluation standards to increase the sensitivity of local authorities to social protest. We show that …


Disappearing Legal Black Holes And Converging Domains: Changing Individual Rights Protection In National Security And Foreign Affairs, Andrew Kent Jan 2015

Disappearing Legal Black Holes And Converging Domains: Changing Individual Rights Protection In National Security And Foreign Affairs, Andrew Kent

Faculty Scholarship

This Essay attempts to describe what is distinctive about the way the protection of individual rights in the areas of national security and foreign affairs has been occurring in recent decades. Historically, the right to protection under the U.S. Constitution and courts has been sharply limited by categorical distinctions based on geography, war, and, to some extent, citizenship. These categorical rules carved out domains where the courts and Constitution provided protections and those where they did not. The institutional design and operating rules of the national security state tracked these formal, categorical rules about the boundaries of protection. There have …


Due Process And The Non-Citizen: A Revolution Reconsidered, Joseph Landau Jan 2015

Due Process And The Non-Citizen: A Revolution Reconsidered, Joseph Landau

Faculty Scholarship

Mathews v. Eldridge is typically understood to be a ruling limiting due process protections in benefits determinations, but this case of judicial restraint in ordinary domestic law has activist features where non-citizens are concerned. The transplantation of Mathews into the critical areas of immigration and national security has produced a body of law that is slowly ushering in rights-affirming outcomes and weakening conventional doctrines of exceptionalism in immigration and national security. There are two chief reasons for this. First, ever since Mathews required an explicit judicial determination of private interests, courts have used an increasingly particularistic, case-by-case analysis in immigration …


Tightrope Act, Charles J. Dunlap Jr. Jan 2015

Tightrope Act, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


When The Curtain Must Be Drawn: American Experience With Proceedings Involving Information That, For Reasons Of National Security, Cannot Be Disclosed, Peter L. Strauss Jan 2015

When The Curtain Must Be Drawn: American Experience With Proceedings Involving Information That, For Reasons Of National Security, Cannot Be Disclosed, Peter L. Strauss

Faculty Scholarship

In numerous contexts today, ranging from no-fly lists, to the designation of foreign terrorist organizations, to controls over foreign investments in the United States, federal authorities reach decisions having dramatic consequences for individuals’ liberty and property on the basis of information that those individuals cannot obtain, even in summary form. Recent and pending litigation has challenged these deprivations on due process grounds, with only moderate success. Perhaps unclassified information on which the government has acted must be revealed, with an opportunity given to challenge it and to submit contrary evidence; but in the words of the DC Circuit writing last …


Lawfare, Charles J. Dunlap Jr. Jan 2015

Lawfare, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Surveillance, Secrecy, And The Search For Meaningful Accountability, Sudha Setty Jan 2015

Surveillance, Secrecy, And The Search For Meaningful Accountability, Sudha Setty

Faculty Scholarship

One of the most intractable problems in the debate around maintaining the rule of law while combating the threat of terrorism is the question of secrecy and transparency. In peacetime, important tenets to the rule of law include transparency of the law, limits on government power, and consistency of the law as applied to individuals in the policy. Yet the post-9/11 decision-making by the Bush and Obama administrations is characterized with excessive secrecy that stymies most efforts to hold the government accountable for its abuses. Executive branch policy with regard to detention, interrogation, targeted killing and surveillance are kept secret, …


The United States, In Comparative Counter-Terrorism, Sudha Setty Jan 2015

The United States, In Comparative Counter-Terrorism, Sudha Setty

Faculty Scholarship

The United States, like all other democratic nations that have suffered terrorist attacks, continues to struggle with questions of how to keep its population safe while maintaining the principles of democracy and the rule of law. This Book Chapter discusses the United States' counterterrorism policies, particularly since the September 11 terrorist attacks, and the resulting changes in societal viewpoints, political agendas, and the legal authority to combat terrorism and threats of terrorism.

The government’s aggressive counterterrorism stance has influenced actions and policies outside the United States. The Author’s exploration of counterterrorism policies in the United States include: criminal law and …


Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen Dec 2014

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen

Faculty Scholarship

The last few years are full of reports of cyber incidents, some of which have caused significant damage. Each of these cyber events raise important questions about the role and responsibility of States with respect to cyber incidents. The answer to these questions revolves in large part around the international law doctrine of sovereignty. The extent to which nations exercise sovereignty over cyberspace and cyber infrastructure will provide key answers to how much control States must exercise and how much responsibility States must accept for harmful cyber activities when they fail to adequately do so. This article argues that States …


Adapting The Law Of Armed Conflict To Autonomous Weapon Systems, Kenneth Anderson, Daniel Reisner, Matthew C. Waxman Jan 2014

Adapting The Law Of Armed Conflict To Autonomous Weapon Systems, Kenneth Anderson, Daniel Reisner, Matthew C. Waxman

Faculty Scholarship

Weapon systems are becoming increasingly automated and arguably some autonomous military systems have been deployed for years. Recent advances in automated systems and the possibilities they portend have generated interest and anxiety within some militaries and defense ministries, and a movement of non-governmental activists seeking to ban fully autonomous weapons. In May 2014, the High Contracting Parties of the UN Convention on Certain Conventional Weapons (CCW) convened an extensive discussion of the legal and ethical issues that autonomous weapons raise, while recognizing that many of these problems lie at an uncertain point in the future.

It is important that normative …


The Power To Threaten War, Matthew C. Waxman Jan 2014

The Power To Threaten War, Matthew C. Waxman

Faculty Scholarship

Existing war powers scholarship focuses overwhelmingly on the President's power to initiate military operations abroad and the extent to which that power is constrained by Congress. It ignores the allocation of legal power to threaten military force or war, even though threats – to coerce or deter enemies and to reassure allies – are one of the most important ways in which the United States government wields its military might. This paper fills that scholarly void, and draws on recent political science and historical scholarship to construct a richer and more accurate account of the modern presidency's powers to shape …


Are Damages Different? Bivens And National Security, Andrew Kent Jan 2014

Are Damages Different? Bivens And National Security, Andrew Kent

Faculty Scholarship

Litigation challenging the national security actions of the federal government has taken a seemingly paradoxical form in recent years. Prospective coercive remedies like injunctions and habeas corpus (a kind of injunction) are traditionally understood to involve much greater intrusions by the judiciary into government functioning than retrospective money damages awards. Yet federal courts have developed and strictly applied doctrines barring Bivens damages actions against federal officials because of an asserted need to preserve the prerogatives of the political branches in national security and foreign affairs. At the same time, the courts have been increasingly assertive in cases involving coercive remedies, …


Book Reviews: War & Technology, Charles J. Dunlap Jr. Jan 2014

Book Reviews: War & Technology, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Still Shortchanged: Some Observations About The New Army/Marine Corps Coin Doctrine, Charles J. Dunlap Jr. Jan 2014

Still Shortchanged: Some Observations About The New Army/Marine Corps Coin Doctrine, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


The National Security State: The End Of Separation Of Powers, Michael E. Tigar Jan 2014

The National Security State: The End Of Separation Of Powers, Michael E. Tigar

Faculty Scholarship

No abstract provided.


Country Report On Counterterrorism: United States Of America, Sudha Setty Jan 2014

Country Report On Counterterrorism: United States Of America, Sudha Setty

Faculty Scholarship

The terrorist attacks of September 11, 2001, led to profound changes in societal viewpoints, political agendas, and the legal authorization to combat terrorism. The United States continues to struggle with keeping its population safe while maintaining the principles of democracy and the rule of law essential to the nation’s character. The U.S. response to terrorism has been multifaceted and expansive, reflective of the U.S. role in global security; debate over these matters will continue for the foreseeable future.

This report, prepared for the American Society of Comparative Law, offers summary, analysis and critique of many aspects of counterterrorism law, including …


Targeted Killings And The Interest Convergence Dilemma, Sudha Setty Jan 2014

Targeted Killings And The Interest Convergence Dilemma, Sudha Setty

Faculty Scholarship

In the 1980s, Professor Derrick Bell posited a theory of interest convergence as part of his critical race theory work, arguing that the major strides forward in civil rights law and policy that benefited African Americans in the 1950s and 1960s only occurred because of the perceived benefits of those changes to white elites during that time. In Bell’s view, it was only at the point at which the interests of powerful whites converged with those of marginalized racial minorities that significant changes in civil rights law could occur.

Twelve years after the terrorist attacks of September 11, 2001, numerous …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


Judicial Review For Enemy Fighters: The Court’S Fateful Turn In Ex Parte Quirin, The Nazi Saboteur Case, Andrew Kent Jan 2013

Judicial Review For Enemy Fighters: The Court’S Fateful Turn In Ex Parte Quirin, The Nazi Saboteur Case, Andrew Kent

Faculty Scholarship

The emerging conventional wisdom in the legal academy is that individual rights under the U.S. Constitution should be extended to noncitizens outside the United States. This claim - called globalism in my article - has been advanced with increasing vigor in recent years, most notably in response to legal positions taken by the Bush administration during the war on terror. Against a Global Constitution challenges the textual and historical grounds advanced to support the globalist conventional wisdom and demonstrates that they have remarkably little support. At the same time, the article adduces textual and historical evidence that noncitizens were among …


The Compromised Cargo Container: Terror In A Box, Taylor Simpson-Wood Jan 2013

The Compromised Cargo Container: Terror In A Box, Taylor Simpson-Wood

Faculty Scholarship

No abstract provided.


The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen Jan 2013

The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen

Faculty Scholarship

The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, roughly a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice.

This Article challenges the standard account of that disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an …


Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman Jan 2013

Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman

Faculty Scholarship

When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …


Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba Jan 2013

Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba

Faculty Scholarship

Europe has long been deemed "more protective" of privacy than the United States. In the context of transatlantic cooperation in the war on terrorism, divergences in privacy law and policy have become ever more apparent. As has always been the case, the same technologies that pose new and vital privacy issues with regard to personal information and private data are those that are important sources for government actors, including law enforcement and intelligence agencies. Despite the increasing reliance by national agencies on information flowing from other nations, regulation of information transfer, processing and sharing has been achieved largely outside of …


Disaggregating Disasters, Lisa Grow Sun, Ronnell Andersen Jones Jan 2013

Disaggregating Disasters, Lisa Grow Sun, Ronnell Andersen Jones

Faculty Scholarship

In the years since the September 11 attacks, scholars and commentators have criticized the emergence of both legal developments and policy rhetoric that blur the lines between war and terrorism. Unrecognized, but equally as damaging to democratic ideals—and potentially more devastating in practical effect—is the expansion of this trend beyond the context of terrorism to a much wider field of nonwar emergencies. Indeed, in recent years, war and national security rhetoric has come to permeate the legal and policy conversations on a wide variety of natural and technological disasters. This melding of disaster and war for purposes of justifying exceptions …


Chevron Meets Youngstown: National Security And The Administrative State, Joseph Landau Jan 2013

Chevron Meets Youngstown: National Security And The Administrative State, Joseph Landau

Faculty Scholarship

The past several years have witnessed a burst of scholarship at the intersection of national security and administrative law. Many supporters of this approach endorse a heightened, “super-strong” brand of Chevron deference to presidential decisionmaking during times of emergency. Believing that the Executive’s comparative advantage in expertise, access to information, and accountability warrant minimal judicial scrutiny, these Chevron-backers advance an Executive-centric view of national security powers. Other scholars, by contrast, dispute Chevron’s relevance to national security. These Chevron-detractors argue for an interventionist judiciary in national security matters. Both camps criticize the Supreme Court’s scaling of deference to the Executive after …


The Moral Responsibility Of Volunteer Soldiers, Charles J. Dunlap Jr. Jan 2013

The Moral Responsibility Of Volunteer Soldiers, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Notice And An Opportunity To Be Heard Before The President Kills You, Richard Murphy, Afsheen John Radsan Jan 2013

Notice And An Opportunity To Be Heard Before The President Kills You, Richard Murphy, Afsheen John Radsan

Faculty Scholarship

The United States identifies particular people as especially dangerous members of al Qaeda, the Taliban, or associated forces, and then kills them. Critics insist that this targeted killing is illegal; some go so far as to call it assassination. The drone strike that killed Anwar al-Awlaki, an American citizen, generated furious criticism for purportedly violating his due process rights.

In spring 2013, President Obama responded in a wide-ranging speech on national security policy. On the topic of drones, he stated that terrorists are targeted only if they constitute “a continuing and imminent threat to the American people.” He announced that …


Regulating Resort To Force: Form And Substance Of The Un Charter Regime, Matthew C. Waxman Jan 2013

Regulating Resort To Force: Form And Substance Of The Un Charter Regime, Matthew C. Waxman

Faculty Scholarship

Much of the international legal debate about regulating force and self-defence takes place on a substantive axis, focusing on the scope of force prohibitions and exceptions. This article instead focuses on their doctrinal form, or modes of argumentation and analysis through which facts are assessed in relation to legal directives, to illuminate how many of the assumptions about substantive policy goals and risks tend to be coupled with other assumptions about the way international law operates in this field. It shows that the flexible, adaptable standards favoured by some states, scholars, and other international actors and the fixed rules and …


Military Justice, Charles J. Dunlap Jr. Jan 2013

Military Justice, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Biometric Id Cybersurveillance, Margaret Hu Jan 2013

Biometric Id Cybersurveillance, Margaret Hu

Faculty Scholarship

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …