Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 46

Full-Text Articles in Law

Panel One: Classification And Access To National Security Information, Mary-Rose Papandrea, Margaret Kwoka, David Pozen, Stephen I. Vladeck Jan 2021

Panel One: Classification And Access To National Security Information, Mary-Rose Papandrea, Margaret Kwoka, David Pozen, Stephen I. Vladeck

Faculty Scholarship

This article is a transcript of the first panel of First Amendment Law Review’s 2021 Symposium on National Security, Whistleblowers, and the First Amendment, discussing classification and access to national security information.


War Powers: Congress, The President, And The Courts – A Model Casebook Section, Stephen M. Griffin, Matthew C. Waxman Jan 2020

War Powers: Congress, The President, And The Courts – A Model Casebook Section, Stephen M. Griffin, Matthew C. Waxman

Faculty Scholarship

This model casebook section is concerned with the constitutional law of war powers as developed by the executive and legislative branches, with a limited look at relevant statutes and federal court cases. It is intended for use in Constitutional Law I classes that cover separation of powers. It could also be used for courses in National Security Law or Foreign Relations Law, or for graduate courses in U.S. foreign policy. This is designed to be the reading for one to two classes, and it can supplement or replace standard casebook sections on war powers that are shorter and offer less …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman Jan 2018

Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman

Faculty Scholarship

Global efforts by states to cooperate through international rules in combating cyber threats have generated mixed results, at best. In this paper, we examine the architecture of the Proliferation Security Initiative (PSI) as a possible model for future cybersecurity cooperation among interested states. We identify several features of PSI’s architecture (rather than its substantive focus on non-proliferation) for further analysis, including PSI’s low entry costs, tiered structure, and flexibility, as well as its leveraging of both territorial jurisdiction and state consent. We conclude that, despite several hurdles visible in the scope of its membership and its legal framework, PSI still …


Presidents And War Powers, Matthew C. Waxman Jan 2018

Presidents And War Powers, Matthew C. Waxman

Faculty Scholarship

The U.S. Constitution vests the president with “executive power” and provides that “The President shall be Commander in Chief of the Army and Navy,” while it endows Congress with the power “To declare War.” These provisions have given rise to two major questions about presidential war powers: first, what should be the president’s role in taking the country to war, and, second, what are the president’s powers to direct its conduct. Historian Michael Beschloss’s new book, “Presidents of War,” examines how presidents have responded to each of these questions across two hundred years of U.S. history.

The major argument of …


What's So Great About The Declare War Clause?, Matthew C. Waxman Jan 2018

What's So Great About The Declare War Clause?, Matthew C. Waxman

Faculty Scholarship

I have long believed two things about constitutional war powers, which my reading of Noah Feldman’s “The Three Lives of James Madison” largely confirmed. First, James Madison was brilliant and prescient about many things, but the strategy and politics of war were not among them. Second, modern constitutional critics of an imperial presidency place too much weight on the declare war clause – and especially Madison’s statements about it. Madison, indeed, worried deeply about unchecked presidential war powers. But Feldman’s book shows that Madison did not emphasize the same risks and checks so often ascribed to him today, especially by …


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …


Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer Jan 2017

Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer

Faculty Scholarship

The United States uses on targeted subsidies for both "green" energy and hydrocarbons. These subsidies pursue worthwhile goals. But unfortunately, many have design flaws that make them less effective or even counterproductive. The goal of this Article is to show how to do better.

Specifically, this Article focuses on three sets of issues. First, there often is tension between our environmental and national security goals. Unfortunately, the economics literature on energy largely ignores these trade-offs by omitting national security from the analysis. This Article takes issue with this approach and suggests ways to manage these trade-offs. Second, this Article argues …


Privacy-Privacy Tradeoffs, David E. Pozen Jan 2016

Privacy-Privacy Tradeoffs, David E. Pozen

Faculty Scholarship

Legal and policy debates about privacy revolve around conflicts between privacy and other goods. But privacy also conflicts with itself. Whenever securing privacy on one margin compromises privacy on another margin, a privacy-privacy tradeoff arises.

This Essay introduces the phenomenon of privacy-privacy tradeoffs, with particular attention to their role in NSA surveillance. After explaining why these tradeoffs are pervasive in modern society and developing a typology, the Essay shows that many of the arguments made by the NSA's defenders appeal not only to a national-security need but also to a privacy-privacy tradeoff. An appreciation of these tradeoffs, the Essay contends, …


When The Curtain Must Be Drawn: American Experience With Proceedings Involving Information That, For Reasons Of National Security, Cannot Be Disclosed, Peter L. Strauss Jan 2015

When The Curtain Must Be Drawn: American Experience With Proceedings Involving Information That, For Reasons Of National Security, Cannot Be Disclosed, Peter L. Strauss

Faculty Scholarship

In numerous contexts today, ranging from no-fly lists, to the designation of foreign terrorist organizations, to controls over foreign investments in the United States, federal authorities reach decisions having dramatic consequences for individuals’ liberty and property on the basis of information that those individuals cannot obtain, even in summary form. Recent and pending litigation has challenged these deprivations on due process grounds, with only moderate success. Perhaps unclassified information on which the government has acted must be revealed, with an opportunity given to challenge it and to submit contrary evidence; but in the words of the DC Circuit writing last …


Cipa Creep: The Classified Information Procedures Act And Its Drift Into Civil National Security Litigation, Ian Macdougall Jan 2014

Cipa Creep: The Classified Information Procedures Act And Its Drift Into Civil National Security Litigation, Ian Macdougall

National Security Law Program

This Note documents an incipient trend in the courts and Congress, which I call "CIPA creep," and investigates its implications for civil national security litigation. CIPA – the Classified Information Procedures Act – governs the use of classified information in federal criminal cases. No comparable statute exists in the civil context, where the judge-made state secrets privilege determines whether litigants may use sensitive government information. The prevailing scholarly and popular accounts hold that this privilege, in the tense post-9/11 security environment, transformed from a narrow evidentiary rule into a non-justiciability doctrine that cedes to executive branch officials the power to …


Square Pegs And Round Holes: Moving Beyond Bivens In National Security Cases, Alexander Steven Zbrozek Jan 2014

Square Pegs And Round Holes: Moving Beyond Bivens In National Security Cases, Alexander Steven Zbrozek

National Security Law Program

Since its inception, the Supreme Court has largely orphaned the Bivens doctrine, a child of its own jurisprudence. In doing so, the Court has repeatedly invoked dicta from the Bivens case warning that unspecified “special factors counseling hesitation” could preclude judicial recognition of future constitutional remedies. Picking up on this thread, lower courts have notably limited the justiciability of Bivens claims in cases challenging counterterrorism-related government conduct. This so-called “national security exception” to the Bivens doctrine has created a substantial hurdle to individual justice and government transparency.

This Note therefore proposes the creation of an Article I administrative court with …


The Power To Threaten War, Matthew C. Waxman Jan 2014

The Power To Threaten War, Matthew C. Waxman

Faculty Scholarship

Existing war powers scholarship focuses overwhelmingly on the President's power to initiate military operations abroad and the extent to which that power is constrained by Congress. It ignores the allocation of legal power to threaten military force or war, even though threats – to coerce or deter enemies and to reassure allies – are one of the most important ways in which the United States government wields its military might. This paper fills that scholarly void, and draws on recent political science and historical scholarship to construct a richer and more accurate account of the modern presidency's powers to shape …


Adapting The Law Of Armed Conflict To Autonomous Weapon Systems, Kenneth Anderson, Daniel Reisner, Matthew C. Waxman Jan 2014

Adapting The Law Of Armed Conflict To Autonomous Weapon Systems, Kenneth Anderson, Daniel Reisner, Matthew C. Waxman

Faculty Scholarship

Weapon systems are becoming increasingly automated and arguably some autonomous military systems have been deployed for years. Recent advances in automated systems and the possibilities they portend have generated interest and anxiety within some militaries and defense ministries, and a movement of non-governmental activists seeking to ban fully autonomous weapons. In May 2014, the High Contracting Parties of the UN Convention on Certain Conventional Weapons (CCW) convened an extensive discussion of the legal and ethical issues that autonomous weapons raise, while recognizing that many of these problems lie at an uncertain point in the future.

It is important that normative …


Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman Jan 2013

Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman

Faculty Scholarship

When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …


The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen Jan 2013

The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen

Faculty Scholarship

The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, roughly a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice.

This Article challenges the standard account of that disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an …


Regulating Resort To Force: Form And Substance Of The Un Charter Regime, Matthew C. Waxman Jan 2013

Regulating Resort To Force: Form And Substance Of The Un Charter Regime, Matthew C. Waxman

Faculty Scholarship

Much of the international legal debate about regulating force and self-defence takes place on a substantive axis, focusing on the scope of force prohibitions and exceptions. This article instead focuses on their doctrinal form, or modes of argumentation and analysis through which facts are assessed in relation to legal directives, to illuminate how many of the assumptions about substantive policy goals and risks tend to be coupled with other assumptions about the way international law operates in this field. It shows that the flexible, adaptable standards favoured by some states, scholars, and other international actors and the fixed rules and …


National Security Federalism In The Age Of Terror, Matthew C. Waxman Jan 2012

National Security Federalism In The Age Of Terror, Matthew C. Waxman

Faculty Scholarship

National security law scholarship tends to focus on the balancing of security and liberty, and the overwhelming bulk of that scholarship is about such balancing on the horizontal axis among branches at the federal level. This Article challenges that standard focus by supplementing it with an account of the vertical axis and the emergent, post-9/11 role of state and local government in American national security law and policy. It argues for a federalism frame that emphasizes vertical intergovernmental arrangements for promoting and mediating a dense array of policy values over the long term. This federalism frame helps in understanding the …


Open Service And Our Allies: A Report On The Inclusion Of Openly Gay And Lesbian Servicemembers In U. S. Allies' Armed Forces, Suzanne B. Goldberg Jan 2011

Open Service And Our Allies: A Report On The Inclusion Of Openly Gay And Lesbian Servicemembers In U. S. Allies' Armed Forces, Suzanne B. Goldberg

Faculty Scholarship

In the wake of the Obama Administration's pledge to repeal "Don't Ask, Don't Tell" in the United States, the Columbia Law School Sexuality & Gender Law Clinic undertook a review of how allies of the United States moved from a policy of banning gay and lesbian servicemembers from serving in the armed forces to a policy of allowing these servicemembers to serve openly ("open service"). In documenting this review, this report aims to provide information about the decision to implement open service and the mechanics of the transition to open service in Australia, Canada, Israel, and the United Kingdom. In …


Cyber-Attacks And The Use Of Force: Back To The Future Of Article 2(4), Matthew C. Waxman Jan 2011

Cyber-Attacks And The Use Of Force: Back To The Future Of Article 2(4), Matthew C. Waxman

Faculty Scholarship

This Article makes two overarching arguments. First, strategy is a major driver of legal evolution. Most scholarship and commentary on cyber-attacks capture only one dimension of this point, focusing on how international law might be interpreted or amended to take account of new technologies and threats. The focus here, however, is on the dynamic interplay of law and strategy – strategy generates reappraisal and revision of law, while law itself shapes strategy – and the moves and countermoves among actors with varying interests, capabilities, and vulnerabilities. The purpose is not to come down in favor of one legal interpretation or …


Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman Jan 2011

Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman

Faculty Scholarship

In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."

To what extent is …


The Structure Of Terrorism Threats And The Laws Of War, Matthew C. Waxman Jan 2010

The Structure Of Terrorism Threats And The Laws Of War, Matthew C. Waxman

Faculty Scholarship

This article considers a major debate in the American and European counterterrorism analytic community – whether the primary terrorist threat to the West is posed by hierarchical, centralized terrorist organizations operating from geographic safe havens, or by radicalized individuals conducting a loosely organized, ideologically common but operationally independent fight against western societies – and this debate’s implications for both jus ad bellum and jus in bello. Analysis of how the law of armed conflict might be evolving to deal with terrorism should engage in more nuanced and sophisticated examination of how terrorism threats are themselves evolving. Moreover, the merits of …


The Use Of Force Against States That Might Have Weapons Of Mass Destruction, Matthew C. Waxman Jan 2009

The Use Of Force Against States That Might Have Weapons Of Mass Destruction, Matthew C. Waxman

Faculty Scholarship

The Iraq war rekindled debate – debate now further inflamed in discussions of Iran and North Korea-about the legal use of force to disarm an adversary state believed to pose a threat of catastrophic attack, including with weapons of mass destruction (WMD). Coinciding with this debate is the stark fact that intelligence about allegedly hostile states' WMD capabilities is and will remain limited.

This Article aims to develop more fully how an objective reasonableness approach to WMD capability assessments would work, and more generally how the law governing use of force should guide capability assessments. It begins in Part I …


Police And National Security: American Local Law Enforcement And Counter-Terrorism After 9/11, Matthew C. Waxman Jan 2009

Police And National Security: American Local Law Enforcement And Counter-Terrorism After 9/11, Matthew C. Waxman

Faculty Scholarship

This article examines three national security law challenges resulting from greater involvement of state and local police agencies in protecting national security, especially in combating terrorism: organizational challenges, accountability challenges, and institutional tensions with traditional local police functions. Each threatens the balance of security and civil liberties.


Administrative Detention Of Terrorists: Why Detain, And Detain Whom?, Matthew C. Waxman Jan 2009

Administrative Detention Of Terrorists: Why Detain, And Detain Whom?, Matthew C. Waxman

Faculty Scholarship

This article aims to reframe the administrative detention debate, not to resolve it. In doing so, however, it aspires to advance the discussion by highlighting the critical substantive choices embedded in calls for legal procedural reform and by pointing the way toward appropriately tailored legislative options. It argues that the current debate’s focus on procedural and institutional questions of how to detain suspected terrorists has been allowed to overshadow the questions of why administratively detain, and whom to detain. Not only are the answers to these questions at least as important as the procedural rules in safeguarding and balancing liberty …


Deep Secrecy, David E. Pozen Jan 2009

Deep Secrecy, David E. Pozen

Faculty Scholarship

This Article offers a new way of thinking and talking about government secrecy. In the vast literature on the topic, little attention has been paid to the structure of government secrets, as distinct from their substance or function. Yet these secrets differ systematically depending on how many people know of their existence, what sorts of people know, how much they know, and how soon they know. When a small group of similarly situated officials conceals from outsiders the fact that it is concealing something, the result is a deep secret. When members of the general public understand they are being …


Secret Evidence And The Due Process Of Terrorist Detentions, Daphne Barak-Erez, Matthew C. Waxman Jan 2009

Secret Evidence And The Due Process Of Terrorist Detentions, Daphne Barak-Erez, Matthew C. Waxman

Faculty Scholarship

Courts across many common law democracies have been wrestling with a shared predicament: proving cases against suspected terrorists in detention hearings requires governments to protect sensitive classified information about intelligence sources and methods, but withholding evidence from suspects threatens fairness and contradicts a basic tenet of adversarial process. This Article examines several models for resolving this problem, including the "special advocate" model employed by Britain and Canada, and the 'Judicial management" model employed in Israel. This analysis shows how the very different approaches adopted even among democracies sharing common legal foundations reflect varying understandings of 'fundamental fairness" or "due process," …


The Law Of Armed Conflict And Detention Operations In Afghanistan, Matthew C. Waxman Jan 2009

The Law Of Armed Conflict And Detention Operations In Afghanistan, Matthew C. Waxman

Faculty Scholarship

In reflecting on the arc of US and coalition detention operations in Afghanistan, three key issues related to the law of armed conflict stand out: one substantive, one procedural and one policy. The substantive matter – what are the minimum baseline treatment standards required as a matter of international law? – has clarified significantly during the course of operations there, largely as a result of the US Supreme Court's holding in Hamdan v. Rumsfeld. The procedural matter – what adjudicative processes does international law require for determining who may be detained? – eludes consensus and has become more controversial …


The Law Of War And Its Pathologies, George P. Fletcher Jan 2007

The Law Of War And Its Pathologies, George P. Fletcher

Faculty Scholarship

War is with us more than ever. This is true despite the efforts of the United Nations Charter to ban the concept of war from the vocabulary of its member states. The preferred term is armed conflict. True, the Charter does refer to the Second World War, but apart from this concession to historically entrenched labels, the W word appears only once-when the Charter refers to ridding the world of the scourge of war. The Geneva Conventions, adopted a few years later, follow the same pattern. George Orwell could not be more amused. We change the vocabulary and think we …


The Legacy Of Louis Henkin: Human Rights In The "Age Of Terror" – An Interview With Sarah H. Cleveland, Sarah H. Cleveland Jan 2007

The Legacy Of Louis Henkin: Human Rights In The "Age Of Terror" – An Interview With Sarah H. Cleveland, Sarah H. Cleveland

Faculty Scholarship

What effect has Professor Henkin's work had upon your own thoughts or scholarship in the human rights field?

My scholarly work spans the fields of international human rights and U.S. foreign relations law. I am particularly interested in the process by which human rights norms are implemented into domestic legal systems, the role the United States plays in promoting the internalization of human rights norms by other states, and the mechanisms by which the values of the international human rights regime are incorporated into the United States domestic legal system.

To say that Professor Henkin's work has contributed to my …