Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

SSRN

Columbia Law School

National Security Law

Articles 1 - 7 of 7

Full-Text Articles in Law

War Powers: Congress, The President, And The Courts – A Model Casebook Section, Stephen M. Griffin, Matthew C. Waxman Jan 2020

War Powers: Congress, The President, And The Courts – A Model Casebook Section, Stephen M. Griffin, Matthew C. Waxman

Faculty Scholarship

This model casebook section is concerned with the constitutional law of war powers as developed by the executive and legislative branches, with a limited look at relevant statutes and federal court cases. It is intended for use in Constitutional Law I classes that cover separation of powers. It could also be used for courses in National Security Law or Foreign Relations Law, or for graduate courses in U.S. foreign policy. This is designed to be the reading for one to two classes, and it can supplement or replace standard casebook sections on war powers that are shorter and offer less …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …


When The Curtain Must Be Drawn: American Experience With Proceedings Involving Information That, For Reasons Of National Security, Cannot Be Disclosed, Peter L. Strauss Jan 2015

When The Curtain Must Be Drawn: American Experience With Proceedings Involving Information That, For Reasons Of National Security, Cannot Be Disclosed, Peter L. Strauss

Faculty Scholarship

In numerous contexts today, ranging from no-fly lists, to the designation of foreign terrorist organizations, to controls over foreign investments in the United States, federal authorities reach decisions having dramatic consequences for individuals’ liberty and property on the basis of information that those individuals cannot obtain, even in summary form. Recent and pending litigation has challenged these deprivations on due process grounds, with only moderate success. Perhaps unclassified information on which the government has acted must be revealed, with an opportunity given to challenge it and to submit contrary evidence; but in the words of the DC Circuit writing last …


Optimal Liability For Terrorism, Darius N. Lakdawalla, Eric L. Talley Jan 2006

Optimal Liability For Terrorism, Darius N. Lakdawalla, Eric L. Talley

Faculty Scholarship

This paper analyzes the normative role for civil liability in aligning terrorism precaution incentives, when the perpetrators of terrorism are unreachable by courts or regulators. We consider the strategic interaction among targets, subsidiary victims, and terrorists within a sequential, game-theoretic model. The model reveals that, while an "optimal" liability regime indeed exists, its features appear at odds with conventional legal templates. For example, it frequently prescribes damages payments from seemingly unlikely defendants, directing them to seemingly unlikely plaintiffs. The challenge of introducing such a regime using existing tort law doctrines, therefore, is likely to be prohibitive. Instead, we argue, efficient …


Muslim Profiles Post-9/11: Is Racial Profiling An Effective Counterterrorist Measure And Does It Violate The Right To Be Free From Discrimination?, Bernard E. Harcourt Jan 2006

Muslim Profiles Post-9/11: Is Racial Profiling An Effective Counterterrorist Measure And Does It Violate The Right To Be Free From Discrimination?, Bernard E. Harcourt

Faculty Scholarship

Racial profiling as a defensive counterterrorism measure necessarily implicates a rights trade-off: if effective, racial profiling limits the right of young Muslim men to be free from discrimination in order to promote the security and well-being of others. Proponents of racial profiling argue that it is based on simple statistical fact and represents just smart law enforcement. Opponents of racial profiling, like New York City police commissioner Raymond Kelly, say that it is dangerous and just nuts.

As a theoretical matter, both sides are partly right. Racial profiling in the context of counterterrorism measures may increase the detection of terrorist …


From Violent Crime To Terrorism: The Changing Basis Of The Federal, State And Local Law Enforcement Dynamic, Daniel C. Richman Jan 2003

From Violent Crime To Terrorism: The Changing Basis Of The Federal, State And Local Law Enforcement Dynamic, Daniel C. Richman

Faculty Scholarship

Two lines of questions dominate discussions about how the nation ought to respond at home to the new (or rather newly perceived) terrorist threat: How do we ensure that information about potential terrorist activities is effectively gathered, shared, and used? And how do we ensure that the Government neither abuses the investigative authority we give it, nor demands more authority than it needs? Each line can profitably be pursued in its own terms. Yet to keep the conversations separate is to miss seeing how the very process of creating an effective domestic intelligence network may introduce a salutary level of …