Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 138

Full-Text Articles in Law

The National Security Consequences Of The Major Questions Doctrine, Timothy Meyer, Ganesh Sitaraman Jan 2023

The National Security Consequences Of The Major Questions Doctrine, Timothy Meyer, Ganesh Sitaraman

Faculty Scholarship

The rise of the major questions doctrine—the rule that says that in order to delegate to the executive branch the power to resolve a “question of ‘deep economic and political significance’ that is central to [a] statutory scheme,” Congress must do so expressly—threatens to unmake the modern executive’s authority over foreign affairs, especially in matters of national security and interstate conflict. In the twenty-first century, global conflicts increasingly involve economic warfare, rather than (or in addition to) the force of arms.

In the United States, the executive power to levy economic sanctions and engage in other forms of economic warfare …


Reassessing The Ahistorical Judicial Use Of William Winthrop And Frederick Bernays Wiener, Joshua E. Kastenberg Oct 2021

Reassessing The Ahistorical Judicial Use Of William Winthrop And Frederick Bernays Wiener, Joshua E. Kastenberg

Faculty Scholarship

Government lawyers, like the courts continue to cite to Winthrop. Most recently, in the pending appeal titled Larabee v. Harker, the government ‘s counsel quoted Winthrop for the proposition that “retired officers are a part of the army and so triable by court-martial—a fact indeed never admitting of question.” It is unlikely that the government’s counsel considered the matters presented in this brief article, or that Winthrop rested his statement on dicta rather than any constitutional statement on jurisdiction. Likewise, whatever criticism may be given to Justice Alito’s Ortiz dissent, I am not suggesting that either he, or Justice Neil …


Panel One: Classification And Access To National Security Information, Mary-Rose Papandrea, Margaret Kwoka, David Pozen, Stephen I. Vladeck Jan 2021

Panel One: Classification And Access To National Security Information, Mary-Rose Papandrea, Margaret Kwoka, David Pozen, Stephen I. Vladeck

Faculty Scholarship

This article is a transcript of the first panel of First Amendment Law Review’s 2021 Symposium on National Security, Whistleblowers, and the First Amendment, discussing classification and access to national security information.


Civil Military Relations Panel, Joshua E. Kastenberg Jun 2020

Civil Military Relations Panel, Joshua E. Kastenberg

Faculty Scholarship

In the first week of this month, the nation was surprised to learn that retired general officers (generals and admirals) including James Mattis, Colin Powell, Michael Glenn Mullen, and William McRaven (to name a few) spoke out against President Donald Trump’s response to demonstrations across the United States. President Trump threatened to unilaterally invoke the 1807 Insurrection Act and federalize the National Guard as well as use the active duty Armed Forces of the United States as a “super police force.”

The conduct of the retired generals is not without detractors. The Constitution was constructed with the idea that a …


National Cybersecurity Innovation, Tabrez Y. Ebrahim Jan 2020

National Cybersecurity Innovation, Tabrez Y. Ebrahim

Faculty Scholarship

National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


National Security And Judicial Ethics: The Exception To The Rule Of Keeping Judicial Conduct Judicial And The Politicization Of The Judiciary, Joshua E. Kastenberg Jan 2020

National Security And Judicial Ethics: The Exception To The Rule Of Keeping Judicial Conduct Judicial And The Politicization Of The Judiciary, Joshua E. Kastenberg

Faculty Scholarship

This article is divided into three sections, and it incorporates original research from the personal correspondences of several judges and justices. This article includes unpublished correspondences from various judicial collections at the Library of Congress, the Bentley Historical Library at the University of Michigan, the Washington and Lee School of Law’s special collections, the Richard Nixon and Ronald Reagan Presidential Libraries, the National Library of Australia in Canberra, and Canada’s National Archives in Ottawa. The first section analyzes the current framework governing judicial disqualification based on the separation of powers doctrine as well as the right to an impartial judiciary, …


War Powers: Congress, The President, And The Courts – A Model Casebook Section, Stephen M. Griffin, Matthew C. Waxman Jan 2020

War Powers: Congress, The President, And The Courts – A Model Casebook Section, Stephen M. Griffin, Matthew C. Waxman

Faculty Scholarship

This model casebook section is concerned with the constitutional law of war powers as developed by the executive and legislative branches, with a limited look at relevant statutes and federal court cases. It is intended for use in Constitutional Law I classes that cover separation of powers. It could also be used for courses in National Security Law or Foreign Relations Law, or for graduate courses in U.S. foreign policy. This is designed to be the reading for one to two classes, and it can supplement or replace standard casebook sections on war powers that are shorter and offer less …


The Vast Gulf Between Attempted Mass Shootings And Attempted Material Support, Heidi Gilchrist Jan 2019

The Vast Gulf Between Attempted Mass Shootings And Attempted Material Support, Heidi Gilchrist

Faculty Scholarship

No abstract provided.


Bureaucratic Resistance And The National Security State, Rebecca Ingber Nov 2018

Bureaucratic Resistance And The National Security State, Rebecca Ingber

Faculty Scholarship

Modern accounts of the national security state tend toward one of two opposing views of bureaucratic tensions within it: At one extreme, the executive branch bureaucracy is a shadowy “deep state,” unaccountable to the public or even to the elected President. On this account, bureaucratic obstacles to the President’s agenda are inherently suspect, even dangerous. At the other end, bureaucratic resistance to the President represents a necessary benevolent constraint on an otherwise imperial executive, the modern incarnation of the separation of powers, as the traditional checks on the President of the courts and Congress have fallen down on the job. …


Is The President A Traitor? A Legal Analysis, Noah Kupferberg Jan 2018

Is The President A Traitor? A Legal Analysis, Noah Kupferberg

Faculty Scholarship

No abstract provided.


Presidents And War Powers, Matthew C. Waxman Jan 2018

Presidents And War Powers, Matthew C. Waxman

Faculty Scholarship

The U.S. Constitution vests the president with “executive power” and provides that “The President shall be Commander in Chief of the Army and Navy,” while it endows Congress with the power “To declare War.” These provisions have given rise to two major questions about presidential war powers: first, what should be the president’s role in taking the country to war, and, second, what are the president’s powers to direct its conduct. Historian Michael Beschloss’s new book, “Presidents of War,” examines how presidents have responded to each of these questions across two hundred years of U.S. history.

The major argument of …


Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman Jan 2018

Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman

Faculty Scholarship

Global efforts by states to cooperate through international rules in combating cyber threats have generated mixed results, at best. In this paper, we examine the architecture of the Proliferation Security Initiative (PSI) as a possible model for future cybersecurity cooperation among interested states. We identify several features of PSI’s architecture (rather than its substantive focus on non-proliferation) for further analysis, including PSI’s low entry costs, tiered structure, and flexibility, as well as its leveraging of both territorial jurisdiction and state consent. We conclude that, despite several hurdles visible in the scope of its membership and its legal framework, PSI still …


What's So Great About The Declare War Clause?, Matthew C. Waxman Jan 2018

What's So Great About The Declare War Clause?, Matthew C. Waxman

Faculty Scholarship

I have long believed two things about constitutional war powers, which my reading of Noah Feldman’s “The Three Lives of James Madison” largely confirmed. First, James Madison was brilliant and prescient about many things, but the strategy and politics of war were not among them. Second, modern constitutional critics of an imperial presidency place too much weight on the declare war clause – and especially Madison’s statements about it. Madison, indeed, worried deeply about unchecked presidential war powers. But Feldman’s book shows that Madison did not emphasize the same risks and checks so often ascribed to him today, especially by …


Security Clearance Conundrum: The Need For Reform And Judicial Review, Heidi Gilchrist May 2017

Security Clearance Conundrum: The Need For Reform And Judicial Review, Heidi Gilchrist

Faculty Scholarship

No abstract provided.


"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr. Jan 2017

"Cybervandalism" Or "Digital Act Of War?" America's Muddled Approach To Cyber Incidents Will Not Deter More Crises, Charles J. Dunlap Jr.

Faculty Scholarship

If experts say a "malicious [cyber] code"' has "similar effects" to a "physical bomb,"' and that code actually causes "a stunning breach of global internet stability," is it really accurate to call that event merely an instance of a "cyber attack"?

Moreover, can you really expect to deter state and non-state actors from employing such code and similarly hostile cyber methodologies if all they think that they are risking is being labeled as a cyber-vandal subject only to law enforcement measures? Or might they act differently if it were made clear to them that such activity is considered an "armed …


Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr. Jan 2017

Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Lawfare 101: A Primer, Charles J. Dunlap Jr. Jan 2017

Lawfare 101: A Primer, Charles J. Dunlap Jr.

Faculty Scholarship

Dunlap discusses the concept of lawfare—using law as a form of asymmetrical warfare—and provides some considerations for how to combat this phenomenon. The article establishes the intellectual framework and thematic direction for this Issue of Military Review.


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …


Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer Jan 2017

Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer

Faculty Scholarship

The United States uses on targeted subsidies for both "green" energy and hydrocarbons. These subsidies pursue worthwhile goals. But unfortunately, many have design flaws that make them less effective or even counterproductive. The goal of this Article is to show how to do better.

Specifically, this Article focuses on three sets of issues. First, there often is tension between our environmental and national security goals. Unfortunately, the economics literature on energy largely ignores these trade-offs by omitting national security from the analysis. This Article takes issue with this approach and suggests ways to manage these trade-offs. Second, this Article argues …


Feminism And International Law In The Post 9/11 Era, Jayne C. Huckerby Jan 2016

Feminism And International Law In The Post 9/11 Era, Jayne C. Huckerby

Faculty Scholarship

No abstract provided.


Why Declarations Of War Matter, Charles J. Dunlap Jr. Jan 2016

Why Declarations Of War Matter, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Obama's Aumf Legacy, Curtis A. Bradley, Jack Landman Goldsmith Jan 2016

Obama's Aumf Legacy, Curtis A. Bradley, Jack Landman Goldsmith

Faculty Scholarship

No abstract provided.


Presidential War Powers As A Two-Level Dynamic: International Law, Domestic Law, And Practice-Based Legal Change, Curtis A. Bradley, Jean Galbraith Jan 2016

Presidential War Powers As A Two-Level Dynamic: International Law, Domestic Law, And Practice-Based Legal Change, Curtis A. Bradley, Jean Galbraith

Faculty Scholarship

There is a rich literature on the circumstances under which the United Nations Charter or specific Security Council resolutions authorize nations to use force abroad, and there is a rich literature on the circumstances under which the U.S. Constitution and statutory law allows the President to use force abroad. These are largely separate areas of scholarship, addressing what are generally perceived to be two distinct levels of legal doctrine. This Article, by contrast, considers these two levels of doctrine together as they relate to the United States. In doing so, it makes three main contributions. First, it demonstrates striking parallels …


The Dod Law Of War Manual And Its Critics: Some Observations, Charles J. Dunlap Jr. Jan 2016

The Dod Law Of War Manual And Its Critics: Some Observations, Charles J. Dunlap Jr.

Faculty Scholarship

The U.S. Department of Defense’s (DoD) new Law of War Manual has generated serious debate about its treatment of a variety of issues including human shields, the status of journalists, cyber operations, the precautions to be taken prior to attacks and even the role of honor in war. Although this article does not purport to be a comprehensive response to every critique of the Manual and, indeed, cites opportunities for its improvement, it nevertheless concludes that on balance the Manual provides an excellent, comprehensive and much-needed statement of DoD’s view of the lex lata of the law of war.


American Military Culture And Civil-Military Relations Today, Charles J. Dunlap Jr. Jan 2016

American Military Culture And Civil-Military Relations Today, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Privacy-Privacy Tradeoffs, David E. Pozen Jan 2016

Privacy-Privacy Tradeoffs, David E. Pozen

Faculty Scholarship

Legal and policy debates about privacy revolve around conflicts between privacy and other goods. But privacy also conflicts with itself. Whenever securing privacy on one margin compromises privacy on another margin, a privacy-privacy tradeoff arises.

This Essay introduces the phenomenon of privacy-privacy tradeoffs, with particular attention to their role in NSA surveillance. After explaining why these tradeoffs are pervasive in modern society and developing a typology, the Essay shows that many of the arguments made by the NSA's defenders appeal not only to a national-security need but also to a privacy-privacy tradeoff. An appreciation of these tradeoffs, the Essay contends, …


Surveillance, Secrecy, And The Search For Meaningful Accountability, Sudha Setty Jan 2015

Surveillance, Secrecy, And The Search For Meaningful Accountability, Sudha Setty

Faculty Scholarship

One of the most intractable problems in the debate around maintaining the rule of law while combating the threat of terrorism is the question of secrecy and transparency. In peacetime, important tenets to the rule of law include transparency of the law, limits on government power, and consistency of the law as applied to individuals in the policy. Yet the post-9/11 decision-making by the Bush and Obama administrations is characterized with excessive secrecy that stymies most efforts to hold the government accountable for its abuses. Executive branch policy with regard to detention, interrogation, targeted killing and surveillance are kept secret, …


The United States, In Comparative Counter-Terrorism, Sudha Setty Jan 2015

The United States, In Comparative Counter-Terrorism, Sudha Setty

Faculty Scholarship

The United States, like all other democratic nations that have suffered terrorist attacks, continues to struggle with questions of how to keep its population safe while maintaining the principles of democracy and the rule of law. This Book Chapter discusses the United States' counterterrorism policies, particularly since the September 11 terrorist attacks, and the resulting changes in societal viewpoints, political agendas, and the legal authority to combat terrorism and threats of terrorism.

The government’s aggressive counterterrorism stance has influenced actions and policies outside the United States. The Author’s exploration of counterterrorism policies in the United States include: criminal law and …


The Rise Of The Security State, Wang Yuhua, Carl F. Minzner Jan 2015

The Rise Of The Security State, Wang Yuhua, Carl F. Minzner

Faculty Scholarship

Over the past two decades, the Chinese domestic security apparatus has expanded dramatically. “Stability maintenance” operations have become a priority for local Chinese authorities. We argue that the birth of these trends dates to the early 1990s, when central Party authorities adopted new governance models that differed dramatically from those that of the 1980s. They increased the bureaucratic rank of public security chiefs within the Party apparatus, expanded the reach of the Party political-legal apparatus into a broader range of governance issues, and altered cadre evaluation standards to increase the sensitivity of local authorities to social protest. We show that …