Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

International Law

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 31

Full-Text Articles in National Security Law

American Law In The New Global Conflict, Mark Jia Jan 2024

American Law In The New Global Conflict, Mark Jia

Georgetown Law Faculty Publications and Other Works

This Article surveys how a growing rivalry between the United States and China is changing the American legal system. It argues that U.S.-China conflict is reproducing, in attenuated form, the same politics of threat that has driven wartime legal development for much of our history. The result is that American law is reprising familiar patterns and pathologies. There has been a diminishment in rights among groups with imputed ties to a geopolitical adversary. But there has also been a modest expansion in rights where advocates have linked desired reforms with geopolitical goals. Institutionally, the new global conflict has at times …


Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland Jan 2023

Stars, Stripes, And Surveillance: The United States' Failure To Regulate Data Privacy, Sam Begland

American University Law Review

In the wake of the United States Supreme Court’s devastating decision to strip Americans of their constitutional right to abortion in Dobbs v. Jackson Women’s Health Organization, data privacy is more salient than ever. Without adequate data regulations, state governments and anti-abortion activists alike can harass and prosecute pregnant people attempting to exercise their bodily autonomy. This comment argues that the United States has violated its obligations under the International Covenant on Civil and Political Rights (ICCPR) Article 17 by failing to protect against interference with the use and collection of reproductive health data. Further, this comment analyzes interpretations of …


Securing Patent Law, Charles Duan Jan 2023

Securing Patent Law, Charles Duan

Articles in Law Reviews & Other Academic Journals

A vigorous conversation about intellectual property rights and national security has largely focused on the defense role of those rights, as tools for responding to acts of foreign infringement. But intellectual property, and patents in particular, also play an arguably more important offense role. Foreign competitor nations can obtain and assert U.S. patents against U.S. firms and creators. Use of patents as an offense strategy can be strategically coordinated to stymie domestic innovation and technological progress. This Essay considers current and possible future practices of patent exploitation in this offense setting, with a particular focus on China given the nature …


Dark Law On The South China Sea, Stephen Cody Jan 2022

Dark Law On The South China Sea, Stephen Cody

Suffolk University Law School Faculty Works

In "Democracies and International Law," Tom Ginsburg warns of an emerging post-liberal order influenced by powerful authoritarian regimes and new illiberal laws that repurpose global rights, undermine international courts, and expand executive power. Autocrats and kleptocrats embedded in the global economy increasingly appear to use international law to preserve their power, protect norms of non-intervention, and enhance the global stability of autocratic rule. Legalistic autocrats, for example, exploit judicial deference and vague statutory language in national security laws to circumvent checks on their authority. This process, which I call “dark law,” aids in the consolidation of state power and the …


Securing The Precipitous Heights: U.S. Lawfare As A Means To Confront China At Sea, In Space, And Cyberspace, Garret S. Bowman Dec 2021

Securing The Precipitous Heights: U.S. Lawfare As A Means To Confront China At Sea, In Space, And Cyberspace, Garret S. Bowman

Pace International Law Review

No abstract provided.


Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman Dec 2021

Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman

University of Miami Inter-American Law Review

To thwart a seemingly neve rending bombardment of cyberattacks, the U.S. Department of Defense recently implemented a new strategy – defending forward. This approach demands persistently engaging the enemy on a daily basis to disrupt cyber activity. Rather than waiting to be attacked, the United States is bringing the fight to the enemy. However, this strategy poses fascinating and complex questions of international law. In particular, because most defend forward operations fall within the gray zone of warfare, it remains unclear whether these operations violate the sovereignty of American adversaries or even third party nation states in whose cyberspace U.S. …


Duress In Immigration Law, Elizabeth A. Keyes Jan 2021

Duress In Immigration Law, Elizabeth A. Keyes

Seattle University Law Review

The doctrine of duress is common to other bodies of law, but the application of the duress doctrine is both unclear and highly unstable in immigration law. Outside of immigration law, a person who commits a criminal act out of well-placed fear of terrible consequences is different than a person who willingly commits a crime, but American immigration law does not recognize this difference. The lack of clarity leads to certain absurd results and demands reimagining, redefinition, and an unequivocal statement of the significance of duress in ascertaining culpability. While there are inevitably some difficult lines to be drawn in …


Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin Jan 2020

Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin

Articles by Maurer Faculty

תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …


Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman Jan 2018

Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman

Faculty Scholarship

Global efforts by states to cooperate through international rules in combating cyber threats have generated mixed results, at best. In this paper, we examine the architecture of the Proliferation Security Initiative (PSI) as a possible model for future cybersecurity cooperation among interested states. We identify several features of PSI’s architecture (rather than its substantive focus on non-proliferation) for further analysis, including PSI’s low entry costs, tiered structure, and flexibility, as well as its leveraging of both territorial jurisdiction and state consent. We conclude that, despite several hurdles visible in the scope of its membership and its legal framework, PSI still …


Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn Dec 2017

Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn

William & Mary Bill of Rights Journal

No abstract provided.


General Counsel Of The Fbi, James Baker, In Conversation With Professor Mary Derosa On The Fbi And International Justice, Mary B. Derosa Apr 2017

General Counsel Of The Fbi, James Baker, In Conversation With Professor Mary Derosa On The Fbi And International Justice, Mary B. Derosa

Georgetown Law Faculty Publications and Other Works

Mary DeRosa, Georgetown Law Professor, former Deputy Counsel to President Obama for National Security Affairs, former Legal Advisor to the National Security Council under President Obama, and former Deputy Legal Adviser to the National Security Council in the Clinton Administration, interviewed current General Counsel of the Federal Bureau of Investigation (FBI), James Baker. The two discussed the FBI’s role in international law enforcement and the domestic tension between technological advancement and law enforcement duties.


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …


Corporate Complicity In Human Rights Violations Under International Criminal Law, Danielle Olson Aug 2015

Corporate Complicity In Human Rights Violations Under International Criminal Law, Danielle Olson

International Human Rights Law Journal

This paper examines the main legal elements of corporate criminal responsibility for involvement in serious human rights violations, focusing specifically on the mens rea, or mental element requirement of a crime. It analyzes in detail what it means for a business to be complicit, the degree of knowledge corporations and their officials must have to be implicated in accomplice liability, and a case study demonstrating the consequences of such liability on corporations.


Balancing Domestic Nuclear Industry Viability With International Security: Imminent Changes To Nuclear Export Control Regulations, Brendan Burke Dec 2014

Balancing Domestic Nuclear Industry Viability With International Security: Imminent Changes To Nuclear Export Control Regulations, Brendan Burke

Brendan Burke

In August 2013, the Department of Energy promulgated a supplemental notice of proposed rulemaking to revise the Code of Federal Regulations title 10, part 810 (part 810). Part 810 controls the export of technology pertaining to special nuclear material (SNM) and its production outside the United States by U.S. citizens or corporations. Its purpose is to protect national security interests relating to nuclear non- proliferation while facilitating civil nuclear trade. The most noteworthy changes in the proposed revision pertain to how potential trade partner host countries are classified. This classification directly affects the volume of regulatory requirements applicable to transac- …


Unintended Consequences: The Posse Comitatus Act In The Modern Era, Mark P. Nevitt Oct 2014

Unintended Consequences: The Posse Comitatus Act In The Modern Era, Mark P. Nevitt

Mark P Nevitt

America was born in revolution. Outraged at numerous abuses by the British crown—to include the conduct of British soldiers in the colonists’ daily lives— Americans declared their independence, creating a new republic with deep suspicions of a standing Army. These suspicions were intensely debated at the time of the nation’s formation and enshrined in the Constitution. But congressional limitations on the role of the military in day-to-day affairs would have to wait. They were not put in place until after the Civil War when southern congressmen successfully co- opted the framers’ earlier concerns of a standing Army and passed a …


Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer Jan 2014

Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer

David Barnhizer

None of us can claim the quality of original insight achieved by Alexis de Tocqueville in his early 19th Century classic Democracy in America in his observation that the “soft” repression of democracy was unlike that in any other political form. It is impossible to deny that we in the US, the United Kingdom and Western Europe are experiencing just such a “gentle” drift of the kind that Tocqueville describes, losing our democratic integrity amid an increasingly “pretend” democracy. He explained: “[T]he supreme power [of government] then extends its arm over the whole community. It covers the surface of society …


Victimhood In Our Neighborhood: Terrorist Crime, Taliban Guilt, And The Asymmetries Of The International Legal Order, Mark A. Drumbl Jan 2013

Victimhood In Our Neighborhood: Terrorist Crime, Taliban Guilt, And The Asymmetries Of The International Legal Order, Mark A. Drumbl

Mark A. Drumbl

This Article posits that the September 11 attacks constitute nonisolated warlike attacks undertaken against a sovereign state by individuals from other states operating through a non-state actor with some command and political structure. This means that the attacks contain elements common to both armed attacks and criminal attacks. The international community largely has characterized the attacks as armed attacks. This characterization evokes a legal basis for the use of force initiated by the United States and United Kingdom against Afghanistan on October 7, 2001. Notwithstanding the successes of the military campaign and the need for containment of terrorist activity, this …


Are You A Terrorist Or An American?:An Analysis Of Immigration Lawpost 9/11: Introduction, Mark A. Drumbl Jan 2013

Are You A Terrorist Or An American?:An Analysis Of Immigration Lawpost 9/11: Introduction, Mark A. Drumbl

Mark A. Drumbl

No abstract provided.


Guantanamo, Rasul, And The Twilight Of Law, Mark A. Drumbl Jan 2013

Guantanamo, Rasul, And The Twilight Of Law, Mark A. Drumbl

Mark A. Drumbl

In Rasul v. Bush, the Supreme Court held that U.S. district courts have jurisdiction to consider challenges to the legality of the detention of foreign nationals captured abroad in connection with hostilities and incarcerated at Guantanamo Bay. In this paper, I explore what has happened since the Rasul decision: most notably, the introduction of combatant status review tribunals as a response to Rasul and the challenges that have been filed thereto and adjudicated in the federal courts (Khalid, In re Guantanamo Detainee Cases); the charges brought against certain detainees by military commissions and challenges to these commissions filed in the …


Is Torture Justified In Terrorism Cases?: Comparing U.S. And European Views, Stephen P. Hoffman Jan 2013

Is Torture Justified In Terrorism Cases?: Comparing U.S. And European Views, Stephen P. Hoffman

Stephen P. Hoffman

This essay discusses issues of torture and some of the philosophical underpinnings. First, I define torture as it is used in international and human rights law. Then, I discuss three primary theories of torture: deontology, consequentialism, and threshold deontology. After setting this groundwork, I introduce particular issues in terrorism cases such as the “ticking bomb” scenario, which is often used to argue that torture may be appropriate and possibly required when done to save many lives. This invariably must include a discussion of the necessity doctrine, the legal doctrine allowing an individual to take extraordinary — even illegal — measures …


Defending Weak States Against The "Unwilling Or Unable" Doctrine Of Self-Defense, Dawood I. Ahmed Jan 2013

Defending Weak States Against The "Unwilling Or Unable" Doctrine Of Self-Defense, Dawood I. Ahmed

Dawood Ahmed

Victim states occasionally use force to target non-state actors that have allegedly attacked the victim state, on the pretext that the host state is “unwilling or unable” (“ineffective”) to act. The international law permissibility of such force is unclear: state responsibility principles do not hold ineffective states liable, the universe of state practice is small and the International Court of Justice and some scholars deny the legality of such force while others disagree. This article is the first dedicated to a critical analysis of the “unwilling or unable” doctrine from both, a law and policy perspective. It argues that, although …


Negotiating With ‘Bulimic Man’: The (F)Utility Of Engaging Iran, Amit Chhabra Dec 2012

Negotiating With ‘Bulimic Man’: The (F)Utility Of Engaging Iran, Amit Chhabra

Amit Chhabra

In the aftermath of the World Trade Center bombings of September 11, 2001 (“9/11”), the American psyche has been inordinately consumed with the notion of terror and global jihad against Western culture. Even before these dramatic events, though, our unique sense of humor has traditionally emboldened us to enjoy a good scare. When terror strikes in the real world, then, we are readily at attention. Increasingly since the advent of the television, this aspect of our collective psychology has been commoditized by Hollywood and politicized at election time. The fact that Halloween traditionally falls less than a week before Election …


Maritime Piracy: Changes In U.S. Law Needed To Combat This Critical National Security Concern, Daniel Pines Oct 2012

Maritime Piracy: Changes In U.S. Law Needed To Combat This Critical National Security Concern, Daniel Pines

Seattle University Law Review

Piracy threatens, and has taken, the lives of American crews and civilians. It poses an enormous economic threat, both in terms of ransom payments and impact on global commerce. It enhances political instability in significant regions of the world, such as the Horn of Africa and the Straits of Malacca. Most critically, though, maritime piracy offers an easy and tempting conduit for terrorism. Terrorists have already used maritime options to advance their cause in several dramatic attacks, including the hijacking of a cruise ship (and murder of a Jewish passenger), the ramming of a boat into a U.S. destroyer (killing …


Going Medieval: Targeted Killing, Self-Defense, And The Jus Ad Bellum Regime, Craig Martin Jun 2012

Going Medieval: Targeted Killing, Self-Defense, And The Jus Ad Bellum Regime, Craig Martin

Craig Martin

The U.S. targeted killing policy employs drone-launched missiles to kill suspected terrorists and insurgents in countries in which the U.S. is not clearly involved in an armed conflict. It has justified the program on two bases: that the U.S. is in an armed conflict with Al Qaeda and associated organizations; and that the U.S. can engage in the strikes as an exercise of self-defence. These strikes constitute a use of force against the states in which the targets are located, in jus ad bellum terms, and the claim to the right of self-defence is similarly reliance upon a jus ad …


Cash Or Credit: The Importance Of Financial Sector Stability In Rule Of Law Operations, Katherine E. Peterson Jan 2012

Cash Or Credit: The Importance Of Financial Sector Stability In Rule Of Law Operations, Katherine E. Peterson

Katherine Peterson

“Rule of Law” missions occur in a variety of circumstances, each mission differing from the last by location, context, extent of operations, participants, or a combination of all of these things and more. These operations can occur during, or immediately after, an armed conflict, intra- or interstate, a natural disaster, or other destabilizing or destructive event. The United States, international organizations, and other developed countries play a significant role in rebuilding these states so that they may one day achieve “Rule of Law.” The U.S. Military defines Rule of Law as “a principle of governance in which all persons, institutions …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


A Dark Descent Into Reality: The Case For An Objective Definition Of Torture, Michael W. Lewis Jan 2010

A Dark Descent Into Reality: The Case For An Objective Definition Of Torture, Michael W. Lewis

Michael W. Lewis

Abstract The definition of torture is broken. The malleability of the term “severe pain or suffering” at the heart of the definition has created a situation in which the world agrees on the words but cannot agree on their meaning. The “I know it when I see it” nature of the discussion of torture makes it clear that the definition is largely left to the eye of the beholder. This is particularly problematic when international law’s reliance on self-enforcement is considered. After discussing current common misconceptions about intelligence gathering and coercion that are common to all sides of the torture …


A Dark Descent Into Reality: Making The Case For An Objective Definition Of Torture, Michael W. Lewis Dec 2009

A Dark Descent Into Reality: Making The Case For An Objective Definition Of Torture, Michael W. Lewis

Michael W. Lewis

The definition of torture is broken. The malleability of the term “severe pain or suffering” at the heart of the definition has created a situation in which the world agrees on the words but cannot agree on their meaning. The “I know it when I see it” nature of the discussion of torture makes it clear that the definition is largely left to the eye of the beholder. This is particularly problematic when international law’s reliance on self-enforcement is considered. After discussing current common misconceptions about intelligence gathering and coercion that are common to all sides of the torture debate, …


The Relevance Of International Law To The Domestic Decision On Prosecutions For Past Torture, Bartram Brown Dec 2009

The Relevance Of International Law To The Domestic Decision On Prosecutions For Past Torture, Bartram Brown

Bartram Brown

The US, as a champion of human rights abroad, has often been skeptical and even critical when other states have granted de facto amnesty allowing impunity for gross violations of human rights. Nonetheless, some now argue that the US should turn a blind eye to the evidence indicating that under the Bush Administration US government officials formulated and implemented a policy of torture. Naturally, arguments about US national security have been central to the debate. The CIA’s own reports insist that enhanced interrogation techniques have been effective in yielding valuable information vital to the national security of the United States, …


Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington May 2009

Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington

Matthew Hoisington

Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via cyberspace strains traditional definitions of the use of force. In order to clearly delineate the rights of the parties involved, including the right to self-defense, the international community must come to some consensus on the meaning of cyberwarfare within the existing jus ad bellum paradigm. After examining the shortcomings inherent in classifying cyberattacks according to classical notions of kinetic warfare, …