Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in National Security Law

The Bounds Of Necessity, Jens David Ohlin Dec 2014

The Bounds Of Necessity, Jens David Ohlin

Jens David Ohlin

The current controversy surrounding the legality of torture can only be understood through an analysis of the distinction between justified necessity and excused necessity. Although there may be strong prudential reasons for international criminal courts to declare torture unlawful under any circumstance, this would not necessarily prevent a court from recognizing that an excuse may apply. However, the hallmark of the necessity excuse should not be understood, as it is in German law, as an exception that only applies when a defendant breaks the law to save someone close to him. Rather, the basic principle of the excuse ought to …


Immigration Surveillance, Anil Kalhan Nov 2014

Immigration Surveillance, Anil Kalhan

Anil Kalhan

In recent years, immigration enforcement levels have soared, yielding a widely noted increase in the number of noncitizens removed from the United States. Less visible, however, has been an attendant sea change in the underlying nature of immigration governance itself, hastened by new surveillance and dataveillance technologies. Like many other areas of contemporary governance, immigration control has rapidly become an information-centered and technology-driven enterprise. At virtually every stage of the process of migrating or traveling to, from, and within the United States, both noncitizens and U.S. citizens are now subject to collection and analysis of extensive quantities of personal information …


Targeted Killing: United States Policy, Constitional Law, And Due Process, Mark Febrizio Apr 2014

Targeted Killing: United States Policy, Constitional Law, And Due Process, Mark Febrizio

Senior Honors Theses

The increased incorporation of targeted killing, primarily through the use of unmanned aerial vehicles, into United States policy raises salient questions regarding its consistency with the U.S. Constitution. This paper contrasts interpretations of constitutional due process with the current legal framework for conducting targeted killing operations. The Fifth Amendment to the Constitution establishes the due process owed to U.S. citizens. This paper determines that the killing of Anwar al-Awlaki, an American citizen, was accomplished in a manner inconsistent with constitutional due process and demonstrates an over-extension of executive branch power. This paper examines one scholarly recommendation that seeks to increase …


Special Administrative Measures: An Example Of Counterterror Excesses And Their Roots In U.S. Criminal Justice, Francesca Laguardia Jan 2014

Special Administrative Measures: An Example Of Counterterror Excesses And Their Roots In U.S. Criminal Justice, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

This article examines the creation and implementation of pretrial Special Administrative Measures [SAMs], a version of pretrial solitary confinement now used most often to confine terror suspects in the federal criminal justice system. Through an in-depth archival study, this article brings attention to the importance of 20th-century criminal justice trends to the 21st-century response to the threat of terrorism, including an increasingly preventive focus and decreasing judicial checks on executive action. The findings suggest that practices believed to be excessive responses to the threat of terrorism are in fact a natural outgrowth of late modern criminal justice.


Special Administrative Measures And The War On Terror: When Do Extreme Pretrial Detention Measures Offend The Constitution?, Andrew Dalack Jan 2014

Special Administrative Measures And The War On Terror: When Do Extreme Pretrial Detention Measures Offend The Constitution?, Andrew Dalack

Michigan Journal of Race and Law

Our criminal justice system is founded upon a belief that one is innocent until proven guilty. This belief is what foists the burden of proving a person’s guilt upon the government and belies a statutory presumption in favor of allowing a defendant to remain free pending trial at the federal level. Though there are certainly circumstances in which a federal magistrate judge may—and sometimes must—remand a defendant to jail pending trial, it is well-settled that pretrial detention itself inherently prejudices the quality of a person’s defense. In some cases, a defendant’s pretrial conditions become so onerous that they become punitive …


Whose Metadata Is It Anyways? Why Riley V. California Illustrates That The National Security Administration's Bulk Data Collection Is A Fourth Amendment Problem, Jesse S. Weinstein Jan 2014

Whose Metadata Is It Anyways? Why Riley V. California Illustrates That The National Security Administration's Bulk Data Collection Is A Fourth Amendment Problem, Jesse S. Weinstein

Jesse S Weinstein

No abstract provided.