Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 51

Full-Text Articles in National Security Law

The Common Law And First Amendment Qualified Right Of Public Access To Foreign Intelligence Law, Laura K. Donohue Dec 2023

The Common Law And First Amendment Qualified Right Of Public Access To Foreign Intelligence Law, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

For millennia, public access to the law has been the hallmark of rule of law. To be legally and morally binding, rules must be promulgated. Citizens’ knowledge of the law, in turn, serves as the lynchpin for democratic governance. In common law countries, it is more than just the statutory provisions and their execution that matters: how courts rule, and the reasoning behind their determination, proves central. Accordingly, in the United States, both common law and the right to petition incorporated in the First Amendment have long enshrined a presumed right of public right of access to Article III opinions …


Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue Feb 2023

Surveillance, State Secrets, And The Future Of Constitutional Rights, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The Supreme Court’s 2022 decision in Federal Bureau of Investigation v. Fazaga heralds a worrying trend. Over the past 15 years, as more information about how the government wields its foreign intelligence collection authorities on U.S. soil has become available, it has become clear that the government has repeatedly acted outside its constitutional and statutory limits, and at times, in flagrant disregard for judicial orders. As a result, dozens of cases challenging surveillance have been making their way through the courts. Unlike in prior eras, in certain cases it has become easier for litigants to establish an injury-in-fact in light …


The Evolution And Jurisprudence Of The Foreign Intelligence Surveillance Court And Foreign Intelligence Surveillance Court Of Review, Laura K. Donohue Jan 2021

The Evolution And Jurisprudence Of The Foreign Intelligence Surveillance Court And Foreign Intelligence Surveillance Court Of Review, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The past eight years have witnessed an explosion in the number of publicly-available opinions and orders issued by the Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review. From only six opinions in the public domain 1978–2012, by early 2021, eighty-eight opinions had been released. The sharp departure is even more pronounced in relation to orders: from only one order declassified during 1978–2012, since 2013, 288 have been formally released. These documents highlight how the courts’s roles have evolved since 2004 and reveal four key areas that dominate the courts’ jurisprudence: its position as a specialized, Article III …


New Media, Free Expression, And The Offences Against The State Acts, Laura K. Donohue Mar 2020

New Media, Free Expression, And The Offences Against The State Acts, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

New media facilitates communication and creates a common, lived experience. It also carries the potential for great harm on an individual and societal scale. Posting integrates information and emotion, with study after study finding that fear and anger transfer most readily online. Isolation follows, with insular groups forming. The result is an increasing bifurcation of society. Scholars also write about rising levels of depression and suicide that stem from online dependence and replacing analogical experience with digital interaction, as well as escalating levels of anxiety that are rooted in the validation expectation of the ‘like’ function. These changes generate instability …


The President And Nuclear Weapons: Authorities, Limits, And Process, Mary B. Derosa, Ashley Nicolas Dec 2019

The President And Nuclear Weapons: Authorities, Limits, And Process, Mary B. Derosa, Ashley Nicolas

Georgetown Law Faculty Publications and Other Works

There is no more consequential decision for a president than ordering a nuclear strike. In the Cold War, the threat of sudden nuclear annihilation necessitated procedures emphasizing speed and efficiency and placing sole decision-making authority in the president’s hands. In today’s changed threat environment, the legal authorities and process a U.S. president would confront when making this grave decision merit reexamination. This paper serves as a resource in the national discussion about a president’s legal authority and the procedures for ordering a nuclear strike, and whether to update them.


Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue Apr 2019

Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The warrantless search of travelers’ electronic devices as they enter and exit the United States is rapidly increasing. While the Supreme Court has long recognized a border-search exception to the Fourth Amendment’s warrant requirement, it applies to only two interests: promoting the duty regime and preventing contraband from entering the country; and ensuring that individuals are legally admitted. The government’s recent use of the exception goes substantially beyond these matters. U.S. Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) are using it to search electronic devices, and at times the cloud, for evidence of any criminal activity, …


Of Spies, Saboteurs, And Enemy Accomplices: History’S Lessons For The Constitutionality Of Wartime Military Tribunals, Martin S. Lederman Mar 2017

Of Spies, Saboteurs, And Enemy Accomplices: History’S Lessons For The Constitutionality Of Wartime Military Tribunals, Martin S. Lederman

Georgetown Law Faculty Publications and Other Works

Congress has recently authorized military commissions to try enemies not only for violations of the international law of war, but also for domestic-law offenses, such as providing material support to terrorism and conspiring to commit law-of-war offenses. Moreover, President Trump has indicated support for further military trials, including trials against U.S. citizens. Such military tribunals lack the civilian jury and independent judge that Article III of the Constitution prescribes. The constitutionality of such an abrogation of Article III’s criminal trial guarantees has been debated during many of the nation’s wars without clear resolution, and the constitutional question is now at …


Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue Feb 2015

Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …


Why The Nsa Data Seizures Are Unconstitutional, Randy E. Barnett Jan 2015

Why The Nsa Data Seizures Are Unconstitutional, Randy E. Barnett

Georgetown Law Faculty Publications and Other Works

Due to the unauthorized leaks of classified information, we have come to learn that the National Security Agency (NSA), an executive branch arm of the U.S. military, has established several data collection programs. In this article, I am not going to get into the details of these programs. Instead, I will limit my focus to what I consider to be the serious constitutional problem with any such program, regardless of the details: the fact that the NSA is demanding that private companies, with which virtually all Americans contract to provide their voice communications, turn over the records of every phone …


High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue Jan 2015

High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security.

The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had …


Terrorism Trials In Article Iii Courts, Laura K. Donohue Jan 2015

Terrorism Trials In Article Iii Courts, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Some individuals reject Article III courts as a forum for bringing terrorist suspects to justice on the grounds that the ordinary judicial system cannot handle such cases. As an empirical matter, this claim is simply false. Since 2001, myriad terrorism trials have progressed through the criminal system. The U.S. Department of Justice (DOJ) reports that between 2001 and 2010, there were 998 defendants indicted in terrorism prosecutions. Eighty-seven percent of the defendants were convicted on at least one charge. According to the Executive Office for the U.S. Attorneys, from FY 2004 to FY 2009, there were 3,010 terrorism prosecutions. It …


The Difference Prevention Makes: Regulating Preventive Justice, David Cole Mar 2014

The Difference Prevention Makes: Regulating Preventive Justice, David Cole

Georgetown Law Faculty Publications and Other Works

Since the terrorist attacks of September 11, 2001, the United States and many other countries have adopted a ‘‘paradigm of prevention,’’ employing a range of measures in an attempt to prevent future terrorist attacks. This includes the use of pre textual charges for preventive detention, the expansion of criminal liability to prohibit conduct that precedes terrorism, and expansion of surveillance at home and abroad. Politicians and government officials often speak of prevention as if it is an unqualified good. Everyone wants to prevent the next terrorist attack, after all. And many preventive initiatives, especially where they are not coercive and …


Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue Jan 2014

Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s intent in enacting the 1978 Foreign Intelligence Surveillance Act. The program also violates the statute in three ways: the requirement that records sought be “relevant to an authorized investigation;” the requirement that information could be obtained via subpoena duces tecum; and the steps required for use of pen registers and trap and trace devices. Additionally, the program gives rise to serious constitutional concerns. Efforts by the government to save the program on grounds of third party doctrine are unpersuasive in light of the unique circumstances of …


Process, Practice, And Principle: Teaching National Security Law And The Knowledge That Matters Most, James E. Baker Jan 2014

Process, Practice, And Principle: Teaching National Security Law And The Knowledge That Matters Most, James E. Baker

Georgetown Law Faculty Publications and Other Works

The meaningful application of national security law requires a commitment to substantive knowledge, good process, and a capacity to cope (and indeed thrive) under the prevailing conditions of practice. This paper describes how and why to teach these three essential elements of national security law from an academic and practitioner perspective.

The paper starts with substantive law, placing emphasis not just on the breadth of knowledge and interpretive skills required, but also on the importance of depth, perspective, theory, purpose, history, and legal values in teaching the law. Next, the paper describes the importance of timely, meaningful, and contextual process, …


Fisa Reform, Laura K. Donohue Jan 2014

Fisa Reform, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Congress and the Executive Branch are poised to take up the issue of FISA reform in 2014. What has been missing from the discussion is a comprehensive view of ways in which reform could be given effect—i.e., a taxonomy of potential options. This article seeks to fill the gap. The aim is to deepen the conversation about abeyant approaches to foreign intelligence gathering, to allow fuller discussion of what a comprehensive package could contain, and to place initiatives that are currently under consideration within a broader, over-arching framework. The article begins by considering the legal underpinnings and challenges to the …


The Trickle-Down War, Rosa Brooks Jan 2014

The Trickle-Down War, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …


Legal Affairs: Dreyfus, Guantánamo, And The Foundation Of The Rule Of Law, David Cole May 2013

Legal Affairs: Dreyfus, Guantánamo, And The Foundation Of The Rule Of Law, David Cole

Georgetown Law Faculty Publications and Other Works

The Dreyfus affair reminds us that the rule of law and basic human rights are not self-executing. In a democracy, individual rights and the rule of law are designed to check popular power and protect the individual from the majority. Yet paradoxically, they cannot do so without substantial popular support. Alfred Dreyfus received two trialsor at least the trappings thereofand was twice wrongly convicted. The rule of law was initially unable to stand between an innocent man and the powerful men who sought to frame him. But the issue of Dreyfus's guilt or innocence was not …


Stochastic Constraint, Neal K. Katyal Jan 2013

Stochastic Constraint, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

This essay reviews Power and Constraint: The Accountable Presidency After 9/11 by Jack Goldsmith (2012).

With The Terror Presidency, Professor Jack Goldsmith wrote, hands down, the very best analysis of the national security issues surrounding President George W. Bush's tenure. In Power and Constraint: The Accountable Presidency After 9/11, Goldsmith returns to the same set of problems, but adopts a different tack. He argues that the modern wartime Executive is constrained in new ways beyond the traditional system of checks and balances, and that these new constraints combine to create an effective system that checks executive power. Though …


State Law, The Westfall Act, And The Nature Of The Bivens Question, Carlos Manuel Vázquez, Stephen I. Vladeck Jan 2013

State Law, The Westfall Act, And The Nature Of The Bivens Question, Carlos Manuel Vázquez, Stephen I. Vladeck

Georgetown Law Faculty Publications and Other Works

In a number of recent cases touching to varying degrees on national security, different courts of appeals have applied a strong presumption against recognition of a Bivens cause of action. In each of these cases, the courts’ approach was based on the belief that the creation of a cause of action is a legislative function and that the courts would be usurping Congress’s role if they recognized a Bivens action without legislative authorization. Thus, faced with a scenario where they believed that the remedial possibilities were either "Bivens or nothing," these courts of appeals chose nothing.

The concerns that …


Neo-Democracy, National Security, And Liberty, David Cole Jan 2013

Neo-Democracy, National Security, And Liberty, David Cole

Georgetown Law Faculty Publications and Other Works

In his new book, Liberty and Security, Conor Gearty, professor of law at the London School of Economics and one of the United Kingdom’s leading authorities on civil liberties and national security, argues that many Western nations are in effect “neo-democracies” that fail systematically to live up to the fundamental egalitarian premises of true democracy, and that this development is seen in particular in the context of counter-terrorism policy. This review assesses that claim, and maintains that while Gearty is correct that many counter-terrorism measures are predicated on double standards, that critique is insufficient to answer the many difficult questions …


Military Commissions And The Paradigm Of Prevention, David Cole Jan 2013

Military Commissions And The Paradigm Of Prevention, David Cole

Georgetown Law Faculty Publications and Other Works

Why military commissions? Given the United States’s track record of success in trying terrorists in civilian criminal courts, and the availability of courts-martial to try war crimes, why has the United States government, under both the George W. Bush and Barack Obama administrations alike, insisted on proceeding through untested military commissions instead? In May 2009, President Obama defended military commissions with the following claims:

Military commissions have a history in the United States dating back to George Washington and the Revolutionary War. They are an appropriate venue for trying detainees for violations of the laws of war. They allow for …


Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole Jan 2013

Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole

Georgetown Law Faculty Publications and Other Works

In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …


Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole Jul 2012

Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole

Georgetown Law Faculty Publications and Other Works

Aziz Rana’s account of the takeover of American national security by experts, and of the public’s acceptance of that state of affairs, offers an important and novel perspective on what ails us in national security today. In this Comment, I suggest that while Rana is correct to identify our deference to experts as a central aspect of the problem, the problem is more complicated. First, the phenomenon of elite control over foreign and security policy questions is not new, but likely dates back to the founding—when elites ruled not based on expertise but on the basis of status, class, and …


The First Amendment’S Borders: The Place Of Holder V. Humanitarian Law Project In First Amendment Doctrine, David Cole Jan 2012

The First Amendment’S Borders: The Place Of Holder V. Humanitarian Law Project In First Amendment Doctrine, David Cole

Georgetown Law Faculty Publications and Other Works

In Holder v. Humanitarian Law Project, the Supreme Court’s first decision pitting First Amendment rights against national security interests since the terrorist attacks of September 11, 2001, the Court appears to have radically departed from some of the First Amendment’s most basic principles, including the maxims that speech may not be penalized because of its viewpoint, that even speech advocating crime deserves protection until it constitutes incitement, and that political association is constitutionally protected absent specific intent to further a group’s illegal ends. These principles lie at the core of our political and democratic freedoms, yet Humanitarian Law Project …


Assessing The Impeachment Of President Bill Clinton From A Post 9/11 Perspective, Susan Low Bloch Jan 2012

Assessing The Impeachment Of President Bill Clinton From A Post 9/11 Perspective, Susan Low Bloch

Georgetown Law Faculty Publications and Other Works

The impeachment of President Clinton was more a circus than a serious effort to remove the President of the United States. The reason is simple: Few people--in the Congress or the country--wanted to remove him or believed the impeachment effort would actually result in his removal. Instead, it was a partisan political effort to embarrass Clinton and "send a message" of disapproval. Congress was attaching a "scarlet letter." But this was an indulgence that posed considerable danger that few in Congress considered. In particular, few tried to assess the potential impact this use of the process would have on the …


Where Liberty Lies: Civil Society And Individual Rights After 9/11, David Cole Jan 2012

Where Liberty Lies: Civil Society And Individual Rights After 9/11, David Cole

Georgetown Law Faculty Publications and Other Works

Had someone told you, on September 11, 2001, that the United States would not be able to do whatever it wanted in response to the terrorist attacks of that day, you might well have questioned their sanity. The United States was the most powerful country in the world, and had the world’s sympathy in the immediate aftermath of the attacks. Who would stop it? Al Qaeda had few friends beyond the Taliban. As a historical matter, Congress and the courts had virtually always deferred to the executive in such times of crisis. And the American polity was unlikely to object …


Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …


Legal Obligations: The Proper Role Of White House Lawyers, William Michael Treanor Aug 2009

Legal Obligations: The Proper Role Of White House Lawyers, William Michael Treanor

Georgetown Law Faculty Publications and Other Works

An opinion issued on Aug. 1, 2002, by Assistant Attorney General Jay S. Bybee of the Department of Justice’s Office of Legal Counsel held that the federal statute that makes it a crime to commit torture outside the United States should not be read to “apply to the President’s detention and interrogation of enemy combatants pursuant to his Commander-in-Chief authority.” The opinion further concluded that if the statute did criminalize interrogations ordered by the president, it was unconstitutional.

The memorandum, which has become known as the “torture memo,” figures prominently in the ongoing public debate about whether there should be …


The Perilous Dialogue, Laura K. Donohue Apr 2009

The Perilous Dialogue, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The master metaphor in the national security dialogue is, indeed, “security or freedom”. It dominates the counterterrorist discourse both in the United States and abroad. Transcripts from debates in Ireland’s Dáil Éireann, Turkey’s Büyük Millet Meclisi, and Australia’s Parliament are filled with reference to the need to weigh the value of liberty against the threat posed by terrorism. Perhaps nowhere is this more pronounced than in the United Kingdom, where, for decades, counterterrorist debates have turned on this framing. Owing in part, though, to different constitutional structures, what “security or freedom” means in America differs from what it means in …


The Twenty Year Test: Principles For An Enduring Counterterrorism Legal Architecture, James E. Baker Jan 2008

The Twenty Year Test: Principles For An Enduring Counterterrorism Legal Architecture, James E. Baker

Georgetown Law Faculty Publications and Other Works

The United States faces three enduring terrorism-related threats. First, there is the realistic prospect of additional attacks in the United States including attacks using weapons of mass destruction (“WMD”). Second, in responding to this threat, we may undermine the freedoms that enrich our lives, the tolerance that marks our society, and the democratic values that define our government. Third, if we are too focused on terrorism, we risk losing sight of this century’s other certain threats as well as the capacity to respond to them, including the state proliferation of nuclear weapons, nation-state rivalry, pandemic disease, oil dependency, and environmental …