Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Law

The Evolution And Jurisprudence Of The Foreign Intelligence Surveillance Court And Foreign Intelligence Surveillance Court Of Review, Laura K. Donohue Jan 2021

The Evolution And Jurisprudence Of The Foreign Intelligence Surveillance Court And Foreign Intelligence Surveillance Court Of Review, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The past eight years have witnessed an explosion in the number of publicly-available opinions and orders issued by the Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review. From only six opinions in the public domain 1978–2012, by early 2021, eighty-eight opinions had been released. The sharp departure is even more pronounced in relation to orders: from only one order declassified during 1978–2012, since 2013, 288 have been formally released. These documents highlight how the courts’s roles have evolved since 2004 and reveal four key areas that dominate the courts’ jurisprudence: its position as a specialized, Article III …


The Law Against Family Separation, Carrie F. Cordero, Heidi Li Feldman, Chimène Keitner Jan 2020

The Law Against Family Separation, Carrie F. Cordero, Heidi Li Feldman, Chimène Keitner

Georgetown Law Faculty Publications and Other Works

This Article offers the first comprehensive assessment of how domestic and international law limits the U.S. government’s ability to separate foreign children from the adults accompanying them when they seek to enter the United States. As early as March 6, 2017, then-Secretary of Homeland Security John Kelly told CNN’s Wolf Blitzer that he was considering separating families at the border as a deterrent to illegal immigration as part of a “zero tolerance” policy whereby the Trump administration intended the strictest enforcement of immigration law against those migrants coming to the U.S. southern border . Kelly did not say upon what …


Personality Disruption As Mental Torture: The Cia, Interrogational Abuse, And The U.S. Torture Act, David Luban, Katherine S. Newell Dec 2019

Personality Disruption As Mental Torture: The Cia, Interrogational Abuse, And The U.S. Torture Act, David Luban, Katherine S. Newell

Georgetown Law Faculty Publications and Other Works

This Article is a contribution to the torture debate. It argues that the abusive interrogation tactics used by the United States in what was then called the “global war on terrorism” are, unequivocally, torture under U.S. law. To some readers, this might sound like déjà vu all over again. Hasn’t this issue been picked over for nearly fifteen years? It has, but we think the legal analysis we offer has been mostly overlooked. We argue that the basic character of the CIA’s interrogation of so-called “high-value detainees” has been misunderstood: both lawyers and commentators have placed far too much emphasis …


The President And Nuclear Weapons: Authorities, Limits, And Process, Mary B. Derosa, Ashley Nicolas Dec 2019

The President And Nuclear Weapons: Authorities, Limits, And Process, Mary B. Derosa, Ashley Nicolas

Georgetown Law Faculty Publications and Other Works

There is no more consequential decision for a president than ordering a nuclear strike. In the Cold War, the threat of sudden nuclear annihilation necessitated procedures emphasizing speed and efficiency and placing sole decision-making authority in the president’s hands. In today’s changed threat environment, the legal authorities and process a U.S. president would confront when making this grave decision merit reexamination. This paper serves as a resource in the national discussion about a president’s legal authority and the procedures for ordering a nuclear strike, and whether to update them.


Functional Secrecy, Laura K. Donohue Aug 2019

Functional Secrecy, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Many theorists consider secrecy inimical to liberal democracy. Precise examination of the role that it plays in contemporary government, however, including its strengths and weaknesses, has been limited. This chapter, accordingly, lays out a functional theory of secrecy, considering its role in the three branches of government in four contexts: deliberation, information security, law, and adjudicatory processes. Whether and to what extent cloaking information advances the interests of the state and society varies according to how it operates in each category. First, deliberative secrecy carries significant advantages: it can facilitate informed debate and honest exchange, allowing individuals to alter their …


Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue Apr 2019

Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The warrantless search of travelers’ electronic devices as they enter and exit the United States is rapidly increasing. While the Supreme Court has long recognized a border-search exception to the Fourth Amendment’s warrant requirement, it applies to only two interests: promoting the duty regime and preventing contraband from entering the country; and ensuring that individuals are legally admitted. The government’s recent use of the exception goes substantially beyond these matters. U.S. Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) are using it to search electronic devices, and at times the cloud, for evidence of any criminal activity, …


National Security Lawyering: The Best View Of The Law As A Regulative Ideal, Mary B. Derosa Apr 2018

National Security Lawyering: The Best View Of The Law As A Regulative Ideal, Mary B. Derosa

Georgetown Law Faculty Publications and Other Works

In The National Security Lawyer in Crisis: When the “Best View” of the Law May Not Be the Best View, Robert Bauer describes the challenges for executive branch lawyers providing advice during a national security crisis. Bauer focuses on two especially perilous episodes in United States history—the Cuban Missile Crisis and the run-up to U.S. involvement in World War II—and analyzes the legal advice Presidents Kennedy and Roosevelt, respectively, received. In both cases, widely respected lawyers gave legal advice that supported the President’s preferred outcome, but almost certainly did not represent what the lawyers considered the best view of …


R2h And The Prospects For Peace: An Essay On Sovereign Responsibilities, David Luban Jan 2018

R2h And The Prospects For Peace: An Essay On Sovereign Responsibilities, David Luban

Georgetown Law Faculty Publications and Other Works

This essay examines novel threats to peace – social and political threats as well as military and technological. It worries that familiar conceptions of state sovereignty cannot sustain a legal order capable of meeting those threats, not even if we understand sovereignty as responsibility to protect human rights. The essay tentatively proposes that recent efforts to reformulate state sovereignty as responsibility to humanity – ‘R2H’ for short – offer a better hope. Under this reformulation, states must take into account the interests of those outside their sovereign territory as well as those of the of their own people – in …


Deliberative Constitutionalism In The National Security Setting, Mary B. Derosa, Milton C. Regan Jan 2018

Deliberative Constitutionalism In The National Security Setting, Mary B. Derosa, Milton C. Regan

Georgetown Law Faculty Publications and Other Works

Deliberative democracy theory maintains that authentic deliberation about matters of public concern is an essential condition for the legitimacy of political decisions. Such deliberation has two features. The first is deliberative rigor. This is deliberation guided by public-regarding reasons in a process in which persons are genuinely open to the force of the better argument. The second is transparency. This requires that requires that officials publicly explain the reasons for their decisions in terms that citizens can endorse as acceptable grounds for acting in the name of the political community.

Such requirements would seem to be especially important in the …


A Response To Professor Samuel Rascoff’S Presidential Intelligence, Carrie F. Cordero Jan 2016

A Response To Professor Samuel Rascoff’S Presidential Intelligence, Carrie F. Cordero

Georgetown Law Faculty Publications and Other Works

Should foreign intelligence collection be subject to more rigorous oversight, and therefore, improved accountability, through a policy process that involves deeper personal involvement by the President and National Security Council (NSC)? Would a greater number of political appointees across the intelligence community facilitate that oversight? These are the essential questions posed by Professor Samuel Rascoff in his article Presidential Intelligence.


State Law, The Westfall Act, And The Nature Of The Bivens Question, Carlos Manuel Vázquez, Stephen I. Vladeck Jan 2013

State Law, The Westfall Act, And The Nature Of The Bivens Question, Carlos Manuel Vázquez, Stephen I. Vladeck

Georgetown Law Faculty Publications and Other Works

In a number of recent cases touching to varying degrees on national security, different courts of appeals have applied a strong presumption against recognition of a Bivens cause of action. In each of these cases, the courts’ approach was based on the belief that the creation of a cause of action is a legislative function and that the courts would be usurping Congress’s role if they recognized a Bivens action without legislative authorization. Thus, faced with a scenario where they believed that the remedial possibilities were either "Bivens or nothing," these courts of appeals chose nothing.

The concerns that …


The Torture Memos: The Case Against The Lawyers, David Cole Oct 2009

The Torture Memos: The Case Against The Lawyers, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


Asat-Isfaction: Customary International Law And The Regulation Of Anti-Satellite Weapons, David A. Koplow Jan 2009

Asat-Isfaction: Customary International Law And The Regulation Of Anti-Satellite Weapons, David A. Koplow

Georgetown Law Faculty Publications and Other Works

This article asserts the thesis that customary international law (CIL), even in the absence of any new treaty, already provides a legal regime constraining the testing and use in combat of anti-satellite (ASAT) weapons. This argument, if validated, is important for both legal and public policy considerations: the world (especially, but not only, the United States) has grown increasingly dependent upon satellites for the performance of a wide array of commercial and military functions. At the same time, because of this growing reliance (and hence vulnerability), interest has surged in developing novel systems for attacking a potential enemy’s satellites – …


Is Law? Constitutional Crisis And Existential Anxiety, Alice G. Ristroph Jan 2009

Is Law? Constitutional Crisis And Existential Anxiety, Alice G. Ristroph

Georgetown Law Faculty Publications and Other Works

In the recurring discussions of constitutional crises, one may find three forms of existential anxiety. The first, and most fleeting, is an anxiety about the continued existence of the nation. A second form of anxiety—to my mind, the most interesting form—is an anxiety about the possibility of the rule of law itself. Third, and most solipsistically, references to crisis in constitutional law scholarship could be the product of a kind of professional anxiety in the legal academy. We may be asking ourselves, “Constitutional theory: what is it good for?” and worrying that the answer is, “Absolutely nothing.” And yet, I …


A Larger War On Terror?, David Cole Dec 2008

A Larger War On Terror?, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


Torture And The Professions, David Luban Jan 2008

Torture And The Professions, David Luban

Georgetown Law Faculty Publications and Other Works

This paper examines the roles played by the learned professions in torture and cruel, inhuman, or degrading treatment carried out by the United States in the war on terrorism. It takes lawyers, physicians, psychologists, and anthropologists as its case studies. It originated as the keynote speech at the Association of Practical and Professional Ethics annual meeting in 2007.


Lawfare And Legal Ethics In Guantánamo, David Luban Jan 2008

Lawfare And Legal Ethics In Guantánamo, David Luban

Georgetown Law Faculty Publications and Other Works

This paper, part of a symposium on the legal profession, focuses on the lawyers – some civilian and some military – who represent detainees at Guantánamo Bay. These include civilian counsel representing Guantánamo prisoners in habeas proceedings, as well as civilian and military defense counsel for those facing trial before military commissions. Using published sources as well as interviews with some of the lawyers, the paper examines the tactics by which the U.S. government has tried to disrupt the effective representation of Guantánamo detainees. In the case of habeas lawyers, whose very presence at Guantánamo is unwelcome by the government, …


The Man Behind The Torture, David Cole Dec 2007

The Man Behind The Torture, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


The Grand Inquisitors, David Cole Jul 2007

The Grand Inquisitors, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


How To Skip The Constitution, David Cole Nov 2006

How To Skip The Constitution, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


In Case Of Emergency, David Cole Jul 2006

In Case Of Emergency, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


Controlling Executive Power In The War On Terrorism, Mark V. Tushnet Jan 2005

Controlling Executive Power In The War On Terrorism, Mark V. Tushnet

Georgetown Law Faculty Publications and Other Works

How does - or should - the U.S. Constitution regulate the exercise of power in response to threats to national security, to ensure that power is used wisely? s Broadly speaking, two mechanisms of control are available: a separation-of-powers mechanism and a judicial-review mechanism. Both mechanisms aim to ensure that the national government exercises its power responsibly - with sufficient vigor to meet the nation's challenges, but without intruding on protected liberties. Under the separation-of-powers mechanism, nearly all of the work of regulating power is done by the principle that the President can do only what Congress authorizes. Its primary …


Uncle Sam Is Watching You, David Cole Nov 2004

Uncle Sam Is Watching You, David Cole

Georgetown Law Faculty Publications and Other Works

No abstract provided.


Sunsetting Judicial Opinions, Neal K. Katyal Jan 2004

Sunsetting Judicial Opinions, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

Contemporary constitutional law, in its quest for judicial restraint, has primarily focused on "the how" of judging - what interpretive methods will constrain the decisionmaker? This Article, by contrast, focuses on the "when"- if there are reasons to think that today's judicial decisions might later prove to be problematic, then are there methods that alter the timing of those decisions' impact to produce better outcomes? This Article outlines one new method for judicial decisionmaking in the post-9/11 world. Informed by pervasive legislative practices, I contend that the Supreme Court should prospectively declare that some of its national security opinions will …


State-Supported Terrorism And The U.S. Courts: Some Foreign Policy Problems, Barry E. Carter Jan 2002

State-Supported Terrorism And The U.S. Courts: Some Foreign Policy Problems, Barry E. Carter

Georgetown Law Faculty Publications and Other Works

Terrorism is an evil that the United States and other civilized countries should combat aggressively. Fortunately, these countries have many tools they can use in their fight against terrorism, among them military force (as we have just demonstrated in Afghanistan), covert actions, and a variety of economic sanctions against a country or group that supports terrorists. These sanctions - which would preferably be applied in union with other countries, though unilaterally if necessary - can include freezing assets, as well as ending or limiting U.S. government programs (ranging from landing rights to foreign aid), cutting off exports to or imports …