Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

2006

Institution
Keyword
Publication
Publication Type

Articles 31 - 53 of 53

Full-Text Articles in Law

Transnational Shipments Of Nuclear Materials By Sea: Do Current Safeguards Provide Coastal States A Right To Deny Innocent Passage?, David B. Dixon Jan 2006

Transnational Shipments Of Nuclear Materials By Sea: Do Current Safeguards Provide Coastal States A Right To Deny Innocent Passage?, David B. Dixon

Florida State University Journal of Transnational Law & Policy

No abstract provided.


Fighting Terrorism And Preserving Civil Liberties, James B. Comey Jan 2006

Fighting Terrorism And Preserving Civil Liberties, James B. Comey

University of Richmond Law Review

No abstract provided.


Cybertrespass And Trespass To Documents, Kevin Emerson Collins Jan 2006

Cybertrespass And Trespass To Documents, Kevin Emerson Collins

Articles by Maurer Faculty

No abstract provided.


Raising The Red Flag: The Continued Relevance Of The Japanese Internment In The Post-Hamdi World, Aya Gruber Jan 2006

Raising The Red Flag: The Continued Relevance Of The Japanese Internment In The Post-Hamdi World, Aya Gruber

Publications

In the years since the terrorist attacks of September 11th, the Japanese interment has re-emerged as a topic of serious discourse among legal scholars, politicians, civil libertarians, and society in general. Current national security policies have created concerns that the government has stepped dangerously close to the line crossed by the Roosevelt administration during World War II. Civil libertarians invoke the internment to caution policy-makers against two of the most serious dangers of repressive national security policies: racial decision-making and incarceration without process. Bush defenders advance several arguments in response to internment comparisons. The most conservative is an ardent defense …


Self-Regulation For Safety And Security: Final Minutes Or Finest Hour?, Douglas C. Michael Jan 2006

Self-Regulation For Safety And Security: Final Minutes Or Finest Hour?, Douglas C. Michael

Law Faculty Scholarly Articles

The terrorist attacks of September 11, 2001, and the accounting and auditing crisis later caused by the Enron and Worldcom scandals of that same year, created a great sense of insecurity in many Americans. In this Article, I analyze the federal government's response to crisis. I first define what a crisis is: a sudden, existential threat to which the entity has insufficient resources to respond. I then explain how regulation for safety and security is unique in two aspects: perceptions matter, and the assistance of the regulated entities is essential. I proceed by describing and analyzing the regulatory history and …


Constitutional Cash: Are Banks Guilty Of Racial Profiling In Implementing The United States Patriot Act?, Cheryl R. Lee Jan 2006

Constitutional Cash: Are Banks Guilty Of Racial Profiling In Implementing The United States Patriot Act?, Cheryl R. Lee

Michigan Journal of Race and Law

This Article begins by comparing the concerns of American racial profiling to current terrorism concerns. Part II is an overview of the Bank Secrecy Act and its role in privacy issues concerning bank customers (as the predecessor to the USA Patriot Act). Here, the value of traditional reporting devices, specifically CTRs and SARs used by banks to alert law enforcement to possible terrorist activities, are discussed and evaluated. The facts suggest these reports have been ineffective in identifying terrorists, and have not only greatly infringed upon First Amendment privacy rights, but also diminished the Fourth Amendment protection against warrant-less searches …


Aedpa: The "Hype" And The "Bite", John H. Blume Jan 2006

Aedpa: The "Hype" And The "Bite", John H. Blume

Cornell Law Faculty Publications

On April 24, 1996, President Clinton signed the Antiterrorism and Effective Death Penalty Act of 1996 (AEDPA). Thus, the AEDPA era began. While Clinton's presidential signing statement paid lip service to meaningful federal court review of state court convictions, AEDPA's supporters knew better. The fix was in, and happy habeas days were here again. But, as the old saying goes, "What if you gave a revolution and nobody came?" As I will argue, that is in many (but not all) respects what happened. In this Article, I have argued that AEDPA was, in many respects, more "hype" than "bite." For …


When Liberty And Security Collide: Foreign Policy Litigation And The Federal Judiciary, Kirk A. Randazzo Jan 2006

When Liberty And Security Collide: Foreign Policy Litigation And The Federal Judiciary, Kirk A. Randazzo

Kentucky Law Journal

No abstract provided.


Implications Of The Small V. United States Decision, Anwar K. Malik Jan 2006

Implications Of The Small V. United States Decision, Anwar K. Malik

Kentucky Law Journal

No abstract provided.


The Limits Of Courage And Principle, Jedediah Purdy Jan 2006

The Limits Of Courage And Principle, Jedediah Purdy

Michigan Law Review

Michael Ignatieff, the director of the Carr Center for Human Rights at Harvard's Kennedy School of Government, is not a lawyer. His work, however, treats issues of core concern to lawyers: nation-building, human rights, the ethics of warfare, and now, in his latest book, the proper relationship between liberty and security. The Lesser Evil is, in part, a book a legal scholar might have written: a normative framework for lawmaking in the face of the terror threat. It is also something more unusual: an exercise in an older type of jurisprudence. Ignatieff discusses law in the light of moral psychology …


Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart Jan 2006

Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart

Publications

Ms. Mart examines the legal bases of the public's right to access government information, reviews the types of information that have recently been removed from the Internet, and analyzes the rationales given for the removals. She suggests that the concerted use of the Freedom of Information Act by public interest groups and their constituents is a possible method of returning the information to the Internet.


The National Security Agency's Domestic Spying Program: Framing The Debate, David Cole, Martin S. Lederman Jan 2006

The National Security Agency's Domestic Spying Program: Framing The Debate, David Cole, Martin S. Lederman

Georgetown Law Faculty Publications and Other Works

On Friday, December 16, 2005, the New York Times reported that President George W. Bush had secretly authorized the National Security Agency (NSA) to conduct warrantless surveillance of Americans' telephone and e-mail communications as part of an effort to obtain intelligence about future terrorist activity.' The Times report was based on leaks of classified information, presumably by NSA officials concerned about the legality of the program. The Times reported that at the President's request it had delayed publication of the story for more than a year.

The Indiana Law Journal reprinted four documents that, taken together, set forth the basic …


Defending Human Rights In The "War" Against Terror, Douglass Cassel Jan 2006

Defending Human Rights In The "War" Against Terror, Douglass Cassel

Journal Articles

Safeguarding human rights in our "war" against terrorism is both the right and the smart thing to do. It is right because human rights embody our fundamental values as Americans and as Christians. Our Constitution stands for freedom; our Creator teaches us to respect the God-given dignity of each human soul. Christians are called to cherish human dignity, not only of innocents, and not only of captives in war whose status as combatant or civilian may be uncertain, but also of cardinal sinners, the terrorists themselves. Christ Jesus teaches us to hate the sin, but somehow to bring ourselves to …


Down To The Wire: Assessing The Constitutionality Of The National Security Agency's Warrantless Wiretapping Program: Exit The Rule Of Law, Fletcher N. Baldwin Jr., Robert B. Shaw Jan 2006

Down To The Wire: Assessing The Constitutionality Of The National Security Agency's Warrantless Wiretapping Program: Exit The Rule Of Law, Fletcher N. Baldwin Jr., Robert B. Shaw

UF Law Faculty Publications

The article discusses the constitutionality of warrantless wiretapping surveillance by the National Security Agency (NSA) on U.S. citizens. The wiretapping program existed weeks after the September 11, 2001 attacks, on the justification that Congress authorized the president to wiretap U.S. citizens without a warrant, and that the president had inherent authority as commander-in-chief. But it is argued that Congress did not expressly authorize the president to conduct warrantless wiretapping and that he does not have such inherent authority.

We intend this Article to be a commentary on the constitutionality of the NSA wiretapping program solely as it relates to the …


Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue Jan 2006

Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

This article adopts a two-tiered approach: it provides a detailed, historical account of anti-terrorist finance initiatives in the United Kingdom and United States—two states driving global norms in this area. It then proceeds to a critique of these laws. The analysis assumes—and accepts—the goals of the two states in adopting these provisions. It questions how well the measures achieve their aim. Specifically, it highlights how the transfer of money laundering tools undermines the effectiveness of the states' counterterrorist efforts—flooding the systems with suspicious activity reports, driving money out of the regulated sector, and using inappropriate metrics to gauge success. This …


Anglo-American Privacy And Surveillance, Laura K. Donohue Jan 2006

Anglo-American Privacy And Surveillance, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The United States’ Terrorism Surveillance Program represents just one of many expansions in surveillance since 9/11, as legal controls previously introduced to protect citizens’ privacy and to prevent the misuse of surveillance powers have been relaxed. What makes the situation qualitatively different now is not just the lowering of the bar: digitization and the rapid advancement of technology mean that the type and volume of information currently available eclipse that of previous generations. The issue is not confined to the United States. Despite the incorporation of the European Convention of Human Rights into British law, the United Kingdom also appears …


Optimal Liability For Terrorism, Darius N. Lakdawalla, Eric L. Talley Jan 2006

Optimal Liability For Terrorism, Darius N. Lakdawalla, Eric L. Talley

Faculty Scholarship

This paper analyzes the normative role for civil liability in aligning terrorism precaution incentives, when the perpetrators of terrorism are unreachable by courts or regulators. We consider the strategic interaction among targets, subsidiary victims, and terrorists within a sequential, game-theoretic model. The model reveals that, while an "optimal" liability regime indeed exists, its features appear at odds with conventional legal templates. For example, it frequently prescribes damages payments from seemingly unlikely defendants, directing them to seemingly unlikely plaintiffs. The challenge of introducing such a regime using existing tort law doctrines, therefore, is likely to be prohibitive. Instead, we argue, efficient …


Muslim Profiles Post-9/11: Is Racial Profiling An Effective Counterterrorist Measure And Does It Violate The Right To Be Free From Discrimination?, Bernard E. Harcourt Jan 2006

Muslim Profiles Post-9/11: Is Racial Profiling An Effective Counterterrorist Measure And Does It Violate The Right To Be Free From Discrimination?, Bernard E. Harcourt

Faculty Scholarship

Racial profiling as a defensive counterterrorism measure necessarily implicates a rights trade-off: if effective, racial profiling limits the right of young Muslim men to be free from discrimination in order to promote the security and well-being of others. Proponents of racial profiling argue that it is based on simple statistical fact and represents just smart law enforcement. Opponents of racial profiling, like New York City police commissioner Raymond Kelly, say that it is dangerous and just nuts.

As a theoretical matter, both sides are partly right. Racial profiling in the context of counterterrorism measures may increase the detection of terrorist …


Issues In Article Iii Courts, Debra A. Livingston Jan 2006

Issues In Article Iii Courts, Debra A. Livingston

Faculty Scholarship

Cases implicating classified information can pose difficult legal issues for Article III courts, and these issues may well grow more complicated and arise more frequently as the global war on terror continues. The manner in which these issues are resolved has profound implications for the national security, for the procedural rights of litigants, and for the public's ability to scrutinize legal proceedings. Indeed, the expanded use of secret evidence in Article III courts may raise questions about the very character of the courts themselves. Is there a point at which the demands placed upon these courts, pushing them in the …


Waging War Against Terror: An Essay For Sandy Levinson, Philip Chase Bobbitt Jan 2006

Waging War Against Terror: An Essay For Sandy Levinson, Philip Chase Bobbitt

Faculty Scholarship

Wars are acts of State, and therefore there has never been a "war on terror." Of course states have fought terrorism, in many guises, for centuries. But a war on terror had to await the development of states – including virtual states like al Qaeda's global ummah – whose constitutional order was not confined to a particular territory or national group and for whom terror could therefore be a permanent state of international affairs, either sought in order to prevent persons within a state's control from resisting oppression by accessing global, empowering resources and networks, or suffered because other states …


The War On Terror, Local Police, And Immigration Enforcement: A Curious Tale Of Police Power In Post-9/11 America, David A. Harris Jan 2006

The War On Terror, Local Police, And Immigration Enforcement: A Curious Tale Of Police Power In Post-9/11 America, David A. Harris

Articles

In post-9/11 America, preventing the next terrorist attack ranks as law enforcement's top priority. This is as true for local police departments as it is for the FBI. This has led many advocates of stronger enforcement of U.S. immigration law to recast their efforts as anti-terrorism campaigns. As part of this endeavor, these advocates have called for local police to become involved in enforcing immigration law, and their allies in both the executive and legislative branches of the federal government have taken a number of actions designed to force local police to do this. Surprisingly, local law enforcement has for …


Tracing, Peter B. Oh Jan 2006

Tracing, Peter B. Oh

Articles

Tracing is a method that appears within multiple fields of law. Distinct conceptions of tracing, however, have arisen independently within securities and remedial law. In the securities context plaintiffs must trace their securities to a specific offering to pursue certain relief under the Securities Act of 1933. In the remedial context victims who trace their misappropriated value into a wrongdoer's hands can claim any derivative value, even if it has appreciated.

This article is the first to compare and then cross-apply tracing within these two contexts. Specifically, this article argues that securities law should adopt a version of the rules-based …


The Detainee Cases Of 2004 And 2006 And Their Aftermath, Ronald D. Rotunda Dec 2005

The Detainee Cases Of 2004 And 2006 And Their Aftermath, Ronald D. Rotunda

Ronald D. Rotunda

The War on Terror, more than any other war, involves lawyers. For example, they track down terrorist funding, freeze bank funds, and engage in electronic surveillance. Even more significantly, those whom the military has captured are using the U.S. court system to seek release from their detention. While there are a few cases on this issue going back to the Civil War and World War II, the U.S. Supreme Court has issued major rulings on this question in the last few years. The media and those suing the Government claim that these cases have rejected and dealt severe blows to …