Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Washington and Lee University School of Law

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 27 of 27

Full-Text Articles in National Security Law

Biological Threats Are National Security Risks: Why Covid-19 Should Be A Wake Up Call For Policy Makers, Rep. Eric M. Swalwell, R. Kyle Alagood Jan 2021

Biological Threats Are National Security Risks: Why Covid-19 Should Be A Wake Up Call For Policy Makers, Rep. Eric M. Swalwell, R. Kyle Alagood

Washington and Lee Law Review Online

A national security strategy is the “nation’s plan for the coordinated use of all the instruments of state power—nonmilitary as well as military—to pursue objectives that defend and advance its national interest.” Perhaps the most straightforward national security objective is to protect the country from foreign invasion, but national security involves other objectives that aim to protect people in the United States as well as their values. For example, protecting U.S. elections from foreign interference is a security objective that advances the nation’s interest in democratic governance. The outbreak of a highly contagious disease like COVID‑19 strikes at the core …


Defending Democracy: Taking Stock Of The Global Fight Against Digital Repression, Disinformation, And Election Insecurity, Scott J. Shackelford, Angie Raymond, Abbey Stemler, Cyanne Loyle Oct 2020

Defending Democracy: Taking Stock Of The Global Fight Against Digital Repression, Disinformation, And Election Insecurity, Scott J. Shackelford, Angie Raymond, Abbey Stemler, Cyanne Loyle

Washington and Lee Law Review

Amidst the regular drumbeat of reports about Russian attempts to undermine U.S. democratic institutions from Twitter bots to cyber-attacks on Congressional candidates, it is easy to forget that the problem of election security is not isolated to the United States and extends far beyond safeguarding insecure voting machines. Consider Australia, which has long been grappling with repeated Chinese attempts to interfere with its political system. Yet Australia has taken a distinct approach in how it has sought to protect its democratic institutions, including reclassifying its political parties as “critical infrastructure,” a step that the U.S. government has yet to take …


Dogs Of War Get A New Lease On Life: Why The Military Extraterritorial Jurisdiction Act Violates The Eighth Amendment In Light Of United States V. Slatten, Michael D. Stinnett-Kassoff Mar 2019

Dogs Of War Get A New Lease On Life: Why The Military Extraterritorial Jurisdiction Act Violates The Eighth Amendment In Light Of United States V. Slatten, Michael D. Stinnett-Kassoff

Washington and Lee Journal of Civil Rights and Social Justice

The United States has relied on Private Military Firms (PMFs) extensively to carry out its numerous overseas military missions since the end of the Cold War. Civilians and contractors have always had a place in American wars, even during the American Revolution and beyond. But the recent American incursions into Afghanistan and Iraq brought an unprecedented number of private contractors into the forefront of these conflict zones, the discussions surrounding them, and the legal questions arising from their ashes. Particularly, private contractors in Iraq seemed to be operating in a legal grey area—they clearly were not soldiers, and they clearly …


The Ironic Privacy Act, Margaret Hu Jan 2019

The Ironic Privacy Act, Margaret Hu

Scholarly Articles

This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …


National Security, Immigration And The Muslim Bans, Shoba Sivaprasad Wadhia Nov 2018

National Security, Immigration And The Muslim Bans, Shoba Sivaprasad Wadhia

Washington and Lee Law Review

No abstract provided.


The Authoritarianization Of U.S. Counterterrorism, Sahar F. Aziz Nov 2018

The Authoritarianization Of U.S. Counterterrorism, Sahar F. Aziz

Washington and Lee Law Review

No abstract provided.


Bulk Biometric Metadata Collection, Margaret Hu Jan 2018

Bulk Biometric Metadata Collection, Margaret Hu

Scholarly Articles

Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …


Warfare As Regulation, Robert Knowles Sep 2017

Warfare As Regulation, Robert Knowles

Washington and Lee Law Review

The United States government’s national security activities, including the use of force, consume more than half of all federal discretionary spending and are carried out by the world’s largest bureaucracy. Yet existing scholarship treats these activities as conduct to be regulated, rather than as forms of regulatory action.

This Article introduces a new paradigm for depicting what agencies involved in national security do. It posits that, like other agencies, the national security bureaucracy is best understood to be engaging in regulatory activity—by targeting, detaining, interrogating, and prosecuting enemies; patrolling the border; and conducting surveillance and covert actions. Also, like other …


Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu Jan 2017

Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu

Scholarly Articles

This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.

This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …


From The National Surveillance State To The Cybersurveillance State, Margaret Hu Jan 2017

From The National Surveillance State To The Cybersurveillance State, Margaret Hu

Scholarly Articles

This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …


The Role Of The Courts In Time Of War, William C. Banks Dec 2014

The Role Of The Courts In Time Of War, William C. Banks

Washington and Lee Law Review Online

The role of the courts in judging the actions of government in wartime has ranged from extreme deference to careful probing of alleged government excesses over more than two centuries. The courts’ record has reflected the nature of the armed conflicts the United States has engaged in and the legal bases for the actions at issue. In the aggregate, the courts have served as a necessary counterweight to government overreaching in times of national security crisis. It is easy to underestimate the institutional problems confronting judges who are asked to make momentous decisions in times of national crisis—difficulties of fact-finding …


U.S. Judicial Independence: Victim In The “War On Terror” , Wayne Mccormack Jan 2014

U.S. Judicial Independence: Victim In The “War On Terror” , Wayne Mccormack

Washington and Lee Law Review

No abstract provided.


From Plyler V. Doe To Trayvon Martin: Toward Closing The Open Society, Lyle Dennison Sep 2012

From Plyler V. Doe To Trayvon Martin: Toward Closing The Open Society, Lyle Dennison

Washington and Lee Law Review

Lyle Denniston, the longest serving and most experienced journalist covering the United States Supreme Court, takes his theme of an inclusive and open society from the constitutional and cultural vision of the late Justice Lewis F. Powell, Jr. and then offers a detailed argument that America is forfeiting—or at least compromising—that vision in favor of a safer, more secure and more cramped society, at home and abroad. The Article, taken from a memorial lecture in Justice Powell’s honor at Washington and Lee University in April 2012, draws upon a variety of very different societal and legal developments that are found …


Beyond War: Bin Laden, Escobar, And The Justification Of Targeted Killing, Luis E. Chiesa, Alexander K. A. Greenawalt Jun 2012

Beyond War: Bin Laden, Escobar, And The Justification Of Targeted Killing, Luis E. Chiesa, Alexander K. A. Greenawalt

Washington and Lee Law Review

Using the May 2011 killing of Osama bin Laden as a case study, this Article contributes to the debate on targeted killing in two distinct ways, each of which has the result of downplaying the centrality of international humanitarian law (IHL) as the decisive source of justification for targeted killings. First, we argue that the IHL rules governing the killing of combatants in wartime should be understood to apply more strictly in cases involving the targeting of single individuals, particularly when the targeting occurs against nonparadigmatic combatants outside the traditional battlefield. As applied to the bin Laden killing, we argue …


Rhetoric To Reality: Citizenship Delays And U.S. International Obligations In The Post-9/11 Landscape, Clifford Ashcroft-Smith Mar 2010

Rhetoric To Reality: Citizenship Delays And U.S. International Obligations In The Post-9/11 Landscape, Clifford Ashcroft-Smith

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


Asset Freezing Of Islamic Charities Under The International Economic Emergency Powers Act: A Fourth Amendment Analysis, David Klass Sep 2007

Asset Freezing Of Islamic Charities Under The International Economic Emergency Powers Act: A Fourth Amendment Analysis, David Klass

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


Are You A Terrorist Or An American?:An Analysis Of Immigration Lawpost 9/11: Introduction, Mark A. Drumbl Sep 2006

Are You A Terrorist Or An American?:An Analysis Of Immigration Lawpost 9/11: Introduction, Mark A. Drumbl

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


A Practitioner's Observations On U.S. Immigration Policy Changes In Response To 9/11 And The War On Terror, Mary E. Pivec Sep 2006

A Practitioner's Observations On U.S. Immigration Policy Changes In Response To 9/11 And The War On Terror, Mary E. Pivec

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


Redefining Torture In The Age Of Terrorism: An Argument Against The Dilution Of Human Rights, Miri Lim Sep 2006

Redefining Torture In The Age Of Terrorism: An Argument Against The Dilution Of Human Rights, Miri Lim

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


Guantanamo, Rasul, And The Twilight Of Law, Mark A. Drumbl Jan 2005

Guantanamo, Rasul, And The Twilight Of Law, Mark A. Drumbl

Scholarly Articles

In Rasul v. Bush, the Supreme Court held that U.S. district courts have jurisdiction to consider challenges to the legality of the detention of foreign nationals captured abroad in connection with hostilities and incarcerated at Guantanamo Bay. In this paper, I explore what has happened since the Rasul decision: most notably, the introduction of combatant status review tribunals as a response to Rasul and the challenges that have been filed thereto and adjudicated in the federal courts (Khalid, In re Guantanamo Detainee Cases); the charges brought against certain detainees by military commissions and challenges to these commissions filed in the …


The Executive's Scapegoat, The Court's Blind Eye? Immigrants' Rights After September 11, Hollis V. Pfitsch Jan 2005

The Executive's Scapegoat, The Court's Blind Eye? Immigrants' Rights After September 11, Hollis V. Pfitsch

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


"Can I See Your Papers?" Local Police Enforcement Of Federal Immigration Law Post 9/11 And Asian American Permanent Foreignness, Mohar Ray Jan 2005

"Can I See Your Papers?" Local Police Enforcement Of Federal Immigration Law Post 9/11 And Asian American Permanent Foreignness, Mohar Ray

Washington and Lee Journal of Civil Rights and Social Justice

No abstract provided.


Victimhood In Our Neighborhood: Terrorist Crime, Taliban Guilt, And The Asymmetries Of The International Legal Order, Mark A. Drumbl Jan 2002

Victimhood In Our Neighborhood: Terrorist Crime, Taliban Guilt, And The Asymmetries Of The International Legal Order, Mark A. Drumbl

Scholarly Articles

This Article posits that the September 11 attacks constitute nonisolated warlike attacks undertaken against a sovereign state by individuals from other states operating through a non-state actor with some command and political structure. This means that the attacks contain elements common to both armed attacks and criminal attacks. The international community largely has characterized the attacks as armed attacks. This characterization evokes a legal basis for the use of force initiated by the United States and United Kingdom against Afghanistan on October 7, 2001. Notwithstanding the successes of the military campaign and the need for containment of terrorist activity, this …


Military Commissions And Courts-Martial: A Brief Discussion Of The Constitutional And Jurisdictional Distinctions Between The Two Courts, Timothy C. Macdonnell Jan 2002

Military Commissions And Courts-Martial: A Brief Discussion Of The Constitutional And Jurisdictional Distinctions Between The Two Courts, Timothy C. Macdonnell

Scholarly Articles

On 13 November 2001, President George W. Bush signed Military Order 222, authorizing the trial of non-U.S. citizens for war crimes by military commission.' Since the signing of that order, a contentious debate has raged over the possible use of military commissions to try suspected terrorists. As part of that debate, the media has used various terms to describe the proposed military commissions. They have called them "Secret Military Trials,"' "Military Tribunals,"' and "U.S. Military Court[s]." A Cable News Network internet story described military commissions as "essentially a courts-martial, or a military trial, during a time of war." This quotation …


Department Of The Navy V. Egan, Lewis F. Powell, Jr. Oct 1987

Department Of The Navy V. Egan, Lewis F. Powell, Jr.

Supreme Court Case Files

No abstract provided.


Selective Service System V. Minnesota Public Interest Research Group, Lewis F. Powell Jr. Oct 1983

Selective Service System V. Minnesota Public Interest Research Group, Lewis F. Powell Jr.

Supreme Court Case Files

No abstract provided.


Instruction On Communism And Its Contrast With Liberty Under Law, Lewis F. Powell, Jr. Jan 1962

Instruction On Communism And Its Contrast With Liberty Under Law, Lewis F. Powell, Jr.

Powell Speeches

No abstract provided.