Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty Publications

Discipline
Institution
Keyword
Publication Year

Articles 1 - 30 of 32

Full-Text Articles in National Security Law

National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer Jan 2024

National Security And Federalizing Data Privacy Infrastructure For Ai Governance, Margaret Hu, Eliott Behar, Davi Ottenheimer

Faculty Publications

This Essay contends that data infrastructure, when implemented on a national scale, can transform the way we conceptualize artificial intelligence (AI) governance. AI governance is often viewed as necessary for a wide range of strategic goals, including national security. It is widely understood that allowing AI and generative AI to remain self-regulated by the U.S. AI industry poses significant national security risks. Data infrastructure and AI oversight can assist in multiple goals, including: maintaining data privacy and data integrity; increasing cybersecurity; and guarding against information warfare threats. This Essay concludes that conceptualizing data infrastructure as a form of critical infrastructure …


Digital Internment, Margaret Hu Jan 2020

Digital Internment, Margaret Hu

Faculty Publications

In Korematsu, Hirabayashi, and the Second Monster, Eric L. Muller explores whether Korematsu v. United States is dead post-Trump v. Hawaii, and whether by failing to strike down Hirabayashi v. United States, the “mother” of Korematsu and a “second monster” lives on. This brief response Essay contends that answering these questions first demands grasping how Trump v. Hawaiifailed to fully address the program implemented by the Muslim Ban–Travel Ban: Extreme Vetting. Extreme Vetting can be characterized as a form of “digital internment” through a complex web of cybersurveillance, administrative-imposed restraints, and “identity-management” rationales that are …


Quieting The Court: Lessons From The Muslim-Ban Case, Avidan Cover Jan 2019

Quieting The Court: Lessons From The Muslim-Ban Case, Avidan Cover

Faculty Publications

The Supreme Court’s Muslim-ban decision in Trump v. Hawaii and the confirmation of Brett Kavanaugh to the Supreme Court call into question the civil rights litigation enterprise insofar as it challenges U.S. government’s national security and immigration policies. Litigants and advocacy organizations should employ an array of strategies and tactics to avoid the Court’s rulings that almost uniformly defer to, and thus validate, the government’s national security and immigration practices.


This article maintains that The Muslim-Ban Case was a predictable outgrowth of the Supreme Court’s national security-immigration jurisprudence that champions executive power at the expense of marginalized groups, in particular …


Cyber War And Deterrence: Applying A General Theoretical Framework, Isaac Nacita [*], Mark Reith Jul 2018

Cyber War And Deterrence: Applying A General Theoretical Framework, Isaac Nacita [*], Mark Reith

Faculty Publications

There is a saying that politicians and generals are always fighting the last war, which is emphasized when the weapons and characteristics of warfare are changing rapidly. However, if this is true, it is often not due to an inability to learn lessons from previous conflicts, but to “overlearn” or overcompensate for the failures and experiences of the past. In reality, this is not a learning problem but one of forming poor implications from historical events, which leads to poor applications of doctrine the next time around. The DOD now acknowledges that warfare has extended into cyberspace, and it is …


Bulk Biometric Metadata Collection, Margaret Hu Jun 2018

Bulk Biometric Metadata Collection, Margaret Hu

Faculty Publications

Smart police body cameras and smart glasses worn by law enforcement increasingly reflect state-of-the-art surveillance technology, such as the integration of live-streaming video with facial recognition and artificial intelligence tools, including automated analytics. This Article explores how these emerging cybersurveillance technologies risk the potential for bulk biometric metadata collection. Such collection is likely to fall outside the scope of the types of bulk metadata collection protections regulated by the USA FREEDOM Act of 2015. The USA FREEDOM Act was intended to bring the practice of bulk telephony metadata collection conducted by the National Security Agency (“NSA”) under tighter regulation. In …


Yes, There Is Such A Thing As Too Much Transparency, Sam F. Halabi Jan 2018

Yes, There Is Such A Thing As Too Much Transparency, Sam F. Halabi

Faculty Publications

In a world where secret meetings and resulting agreements seem particularly suspect, it might be tempting to think that the growing norm of transparency might keep the world a more harmonious place. Woodrow Wilson famously extolled the virtues of "open covenants of peace, openly arrived at...." Ashley Deeks, in her recent article, A (Qualified) Defense of Secret Agreements, asks us to think again of this norm and dictum. Her article is one I like a lot, and I hope others active in the study and shaping of international law and international relations do as well.


Crimmigration-Counterterrorism, Margaret Hu Nov 2017

Crimmigration-Counterterrorism, Margaret Hu

Faculty Publications

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically-driven screening technologies can be better understood through the analytical prism of “crimmigrationcounterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” to …


The Myth Of Strategic And Tactical Airlift, Jacob D. Maywald, Adam D. Reiman, Alan A. Johnson, Robert E. Overstreet Apr 2017

The Myth Of Strategic And Tactical Airlift, Jacob D. Maywald, Adam D. Reiman, Alan A. Johnson, Robert E. Overstreet

Faculty Publications

In the 21st century, our ability to quickly and decisively deliver combat forces and equipment is of the utmost importance in achieving our national security objectives. The swiftness and flexibility of the US Air Force’s mobility airlift fleet is the key to executing a rapid global mobility strategy. The operational effectiveness and efficiency of military air transportation relies on the expertise and intuition of Air Mobility Command’s (AMC) mobility planners. Working in coordination with the United States Transportation Command (USTRANSCOM) and geographic combatant commands (GCC), AMC is responsible for the tasking and tracking of almost 900 daily mobility sorties worldwide. …


Brandishing Our Air, Space, And Cyber Swords: Recommendations For Deterrence And Beyond, Mark Reith Jan 2017

Brandishing Our Air, Space, And Cyber Swords: Recommendations For Deterrence And Beyond, Mark Reith

Faculty Publications

This article examines how the nation could better prepare to deter aggressive action in space and cyberspace, and if necessary, prevail should deterrence fail. The key themes throughout this article include a strong need for space and cyber situational awareness, the need for an international attribution and escalation framework, and a national investment in space and cyber education, along with an updated national strategy and military doctrine. Although related, this article focuses on deterrence and avoids the topic of cyber coercion.


Restoring The Balance Between Secrecy And Transparency: The Prosecution Of Nationai Security Leaks Under The Espionage Act, Christina E. Wells Jan 2017

Restoring The Balance Between Secrecy And Transparency: The Prosecution Of Nationai Security Leaks Under The Espionage Act, Christina E. Wells

Faculty Publications

This Issue Brief reviews the relationship between secrecy, transparency and accountability in the United States, including the role of anonymous leaks. It also examines the threat that increased Espionage Act prosecutions pose to government accountability and discusses why changes to the Espionage Act are necessary to preserve an appropriate balance between government secrecy and transparency.


Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu Jan 2017

Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu

Faculty Publications

This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.

This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …


Secret Jurisdiction, Cassandra Burke Robertson, Irina D. Manta Jan 2016

Secret Jurisdiction, Cassandra Burke Robertson, Irina D. Manta

Faculty Publications

So-called “confidentiality creep” after the events of 9/11 has given rise to travel restrictions that lack constitutionality and do nothing to improve airline security. The executive branch’s procedures for imposing such restrictions rely on several layers of secrecy: a secret standard for inclusion on the no-fly list, secret procedures for nominating individuals to the list, and secret evidence to support that decision. This combination results in an overall system we call “secret jurisdiction,” in which individuals wanting to challenge their inclusion on the list are unable to learn the specific evidence against them, the substantive standard for their inclusion on …


Guest View: In Defense Of Student Privacy, Richard J. Peltz-Steele Jan 2013

Guest View: In Defense Of Student Privacy, Richard J. Peltz-Steele

Faculty Publications

Privacy is another American value we rush to sacrifice on the altar of accountability. In Ohio, reporters swarm the yards of liberated kidnapping victims. And in Massachusetts, news trucks besiege the campus at UMass Dartmouth, where I work, and where marathon bombing suspect Dzhokhar Tsarnaev was a student. Media want to know everything about Tsarnaev and his college friends. The university, bound by federal privacy law, has refused access to student academic and financial aid records.


Shari'ah Law As National Security Threat?, Cyra Akila Choudhury Jan 2013

Shari'ah Law As National Security Threat?, Cyra Akila Choudhury

Faculty Publications

This Article examines the recently proposed anti-shari’ah laws of Tennessee, Oklahoma and Arizona. It begins by examining the laws and their justifications and analyzes the 10th Circuit decision in Awad v. Ziriax upholding the injunction against Oklahoma’s Save Our State amendment. It then carefully analyzes the cases that have been cited as examples of shari’ah-creep and reveals that they are actually routine examples of comity and conflicts of law rules applied properly by a properly functioning judiciary. If these laws are not national security measures, what is their true purpose? The Article posits that the new laws are the latest …


Interest-Balancing Vs. Fiduciary Duty: Two Models For National Security Law, Evan Fox-Decent, Evan J. Criddle May 2012

Interest-Balancing Vs. Fiduciary Duty: Two Models For National Security Law, Evan Fox-Decent, Evan J. Criddle

Faculty Publications

No abstract provided.


U.S. Business: Tort Liability For The Transnational Republisher Of Leaked Corporate Secrets, Richard J. Peltz-Steele Jan 2011

U.S. Business: Tort Liability For The Transnational Republisher Of Leaked Corporate Secrets, Richard J. Peltz-Steele

Faculty Publications

Wikileaks, the web enterprise responsible for the unprecedented publication of hundreds of thousands of classified government records, is reshaping fundamental notions of the freedom of information. Meanwhile more than half of records held by Wikileaks are from the private sector, and the organization has promised blockbuster revelations about major commercial players such as big banks and oil companies. This paper examines the potential liability under U.S. business-tort law for Wikileaks as a transnational republisher of leaked corporate secrets. The paper examines the paradigm for criminal liability under the Espionage Act to imagine a construct of civil liability for tortious interference …


Searching For Remedial Paradigms: Human Rights In The Age Of Terrorism, Frances Howell Rudko Jan 2010

Searching For Remedial Paradigms: Human Rights In The Age Of Terrorism, Frances Howell Rudko

Faculty Publications

Nine years after the unprecedented terrorist attacks on September 11, judicial response to various governmental and individual methods of combating terrorism remains deferential and restrained. The courts have heard at least three types of cases brought by advocates for three distinct groups: the alleged perpetrators of terrorism; the victims of terrorist attacks; and third party humanitarian groups. Implicit in the practical question of how to deal effectively with terrorism is the broader consideration which Congress, the President and others must also address: how to respond to the terrorists' extreme human rights violations without violating international humanitarian law.


Legalism And Decisionism In Crisis, Noa Ben-Asher Jan 2010

Legalism And Decisionism In Crisis, Noa Ben-Asher

Faculty Publications

In the years since September 11, 2001, scholars have advocated two main positions on the role of law and the proper balance of powers among the branches of government in emergencies. This Article critiques these two approaches-which could be called Legalism and Decisionism-and offers a third way. Debates between Legalism and Decisionism turn on (1) whether emergencies can be governed by prescribed legal norms; and (2) what the balance of powers among the three branches of government should be in emergencies. Under the Legalist approach, legal norms can and should guide governmental response to emergencies, and the executive branch is …


Torture, With Apologies, Thomas P. Crocker Feb 2008

Torture, With Apologies, Thomas P. Crocker

Faculty Publications

No abstract provided.


A Tale Of Two Networks: Terrorism, Transnational Law, And Network Theory, Christopher J. Borgen Jan 2008

A Tale Of Two Networks: Terrorism, Transnational Law, And Network Theory, Christopher J. Borgen

Faculty Publications

Talk of networks and "network theory" has become almost ubiquitous in the field of counterterrorism. Terrorist organizations are networks. Terrorists have been empowered by the Internet, ethnic diasporas, and cell phones—networks all. Many of the putative targets of terrorists—electrical grids, oil pipelines, and transportation systems, to name a few—are themselves networks. And, perhaps less often mentioned, terrorists are increasingly hampered by national and international laws that foster cooperation and coordination among states—a network of laws.

From "smart mobs" to "net wars," from narco-trafficking to the Internet, network theory has provided insights into decentralized social organizations and their coordinated action. Both …


Cia V. Sims: Mosaic Theory And Government Attitude, Christina E. Wells Jan 2006

Cia V. Sims: Mosaic Theory And Government Attitude, Christina E. Wells

Faculty Publications

In CIA v. Sims, the United States Supreme Court held that the CIA could withhold information about controversial government-sponsored psychological experiments in response to Freedom of Information Act (FOIA) requests. The Court reasoned that the requested information would reveal intelligence sources related to national defense, which were specifically protected from disclosure under the National Security Act of 1947. Accordingly, the Court concluded that the CIA could refuse to disclose the information under FOIA Exemption 3, which allows withholding of information “specifically exempted from disclosure by statute.” Numerous scholars assailed Sims, arguing that the Court's broad reading of the National Security …


Foreword - Interdisciplinary Perspectives On Fear And Risk Perception In Times Of Democratic Crisis (Symposium), Christina E. Wells, Jennifer K. Robbennolt Oct 2004

Foreword - Interdisciplinary Perspectives On Fear And Risk Perception In Times Of Democratic Crisis (Symposium), Christina E. Wells, Jennifer K. Robbennolt

Faculty Publications

The articles and essays included or referenced in this volume discuss both the factors that affect decision making in times of crisis and their implications for law and democratic theory. Professor Cass Sunstein's keynote address, Fear and Liberty, noted that psychological biases such as the availability heuristic and probability neglect can skew risk perception, leading to excessive public fear of national security risks and unreasonable curtailment of civil liberties. According to Sunstein, courts, which are typically responsible for protecting civil liberties, often lack sufficient information to assess whether national security concerns justify incursions on civil liberties. Nevertheless, he concluded that …


Questioning Deference, Christina E. Wells Oct 2004

Questioning Deference, Christina E. Wells

Faculty Publications

This article examines the accepted axiom that courts should defer to the government's actions during national security crises even when such actions potentially violate citizens' constitutional rights. The paper questions two assumptions underlying that axiom - first, that executive officials are best equipped to determine when security needs justify liberty infringements and, second, that judges are particularly unqualified to meddle in security issues, even when civil liberties are involved. Relying on psychological theories regarding the role that fear plays in skewing risk assessment and historical analyses of past crises, the paper argues that times of crisis lend themselves to unnecessary …


Fear And Risk In 'Times Of Crisis': The Media's Challenge, Richard C. Reuben Oct 2004

Fear And Risk In 'Times Of Crisis': The Media's Challenge, Richard C. Reuben

Faculty Publications

As we have heard time and again during this conference, perspective is a crucial safeguard against the distorting effect of fear. While space and consumer patience may be thin, it is during times of crisis that the media's capacity to provide context becomes most important. This is part of the challenge of risk communication. Editors need to insist on this perspective rather than trying to cut it out if the story still reads, and reporters need to learn how to write about it effectively as well as compellingly. None of these challenges is easy. Institutional reform never is. But I …


"National Security" Information And The Freedom Of Information Act, Christina E. Wells Oct 2004

"National Security" Information And The Freedom Of Information Act, Christina E. Wells

Faculty Publications

Secrecy regarding national security information is a widely accepted phenomenon. Throughout history, however, such secrecy has proved problematic. Although officials often have credible and legitimate reasons to keep national security information secret, government secrecy initiatives have invariably expanded to encompass information beyond their initial rationale. Over time, we have come to realize the very real problems associated with excessive government secrecy.


Information Control In Times Of Crisis: The Tools Of Repression (Symposium, Privacy And Surveillance), Christina E. Wells Jan 2004

Information Control In Times Of Crisis: The Tools Of Repression (Symposium, Privacy And Surveillance), Christina E. Wells

Faculty Publications

This article identifies several tools of information control that occur consistently throughout history. The government does not use all of these tools in every national security crisis. Nor does it always abuse them. However, the patterns that emerge suggest a certain predictability to (1) the government's actions during national security crises, and (2) the potentially negative consequences flowing from them that warrants our attention. Understanding this historical pattern of government action allows one to identify and potentially prevent future problems. This is especially important in the post-9/11 world in which the government has asked for and received controversial powers with …


Security And Freedom: Are The Government's Efforts To Deal With Terrorism Volatile Of Our Freedoms?, Michael P. Scharf Jan 2003

Security And Freedom: Are The Government's Efforts To Deal With Terrorism Volatile Of Our Freedoms?, Michael P. Scharf

Faculty Publications

Introducation to the Proceedings of the Canada-United States Law Institute Conference on Canada-U.S. Security and the Economy in the North American Context, Cleveland, Ohio, 2003.


The Trouble With Shadow Government, Howard M. Wasserman Jan 2003

The Trouble With Shadow Government, Howard M. Wasserman

Faculty Publications

No abstract provided.


Crisis And Constitutionalism, Michael J. Gerhardt Jul 2002

Crisis And Constitutionalism, Michael J. Gerhardt

Faculty Publications

No abstract provided.


At War With Civil Rights And Civil Liberties, Thomas E. Baker Jan 2002

At War With Civil Rights And Civil Liberties, Thomas E. Baker

Faculty Publications

This essay looks at the Supreme Court and acquiescence to measures by the Executive Branch that limit or suspend civil liberties during times of war or threats to national security.