Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Constitutional Law (6)
- Human Rights Law (4)
- International Law (4)
- Social and Behavioral Sciences (4)
- Rule of Law (3)
-
- Criminal Law (2)
- Military, War, and Peace (2)
- Public Affairs, Public Policy and Public Administration (2)
- Public Policy (2)
- Comparative and Foreign Law (1)
- Courts (1)
- Criminal Procedure (1)
- Economics (1)
- Fourth Amendment (1)
- Law Enforcement and Corrections (1)
- Law and Economics (1)
- Legal Education (1)
- Legal History (1)
- Legal Profession (1)
- Legal Studies (1)
- Legal Theory (1)
- President/Executive Department (1)
- Privacy Law (1)
- Public Economics (1)
- Torts (1)
- Keyword
-
- Counter-terrorism (2)
- Drones (2)
- Individual rights (2)
- Surveillance (2)
- Terrorists (2)
-
- 9/11 (1)
- And SWIFT (1)
- Bivens (1)
- Clearing House Interbank Payments System (CHIPS) (1)
- Clinical education (1)
- Coase Theorem (1)
- Congress (1)
- Constitutional remedies (1)
- Constitutional torts (1)
- Democracy (1)
- Digital age (1)
- Drug traffic (1)
- Economic sanctions (1)
- Executive (1)
- Fedwire (1)
- Financial sanctions (1)
- Financial transactions (1)
- Foreign relations (1)
- Homeland Security (1)
- Human rights (1)
- International humanitarian law (1)
- International jurisdiction (1)
- International rule of law (1)
- Iran (1)
- Legal pedagogy (1)
Articles 1 - 11 of 11
Full-Text Articles in National Security Law
Legal Affairs: Dreyfus, Guantánamo, And The Foundation Of The Rule Of Law, David Cole
Legal Affairs: Dreyfus, Guantánamo, And The Foundation Of The Rule Of Law, David Cole
Georgetown Law Faculty Publications and Other Works
The Dreyfus affair reminds us that the rule of law and basic human rights are not self-executing. In a democracy, individual rights and the rule of law are designed to check popular power and protect the individual from the majority. Yet paradoxically, they cannot do so without substantial popular support. Alfred Dreyfus received two trials—or at least the trappings thereof—and was twice wrongly convicted. The rule of law was initially unable to stand between an innocent man and the powerful men who sought to frame him. But the issue of Dreyfus's guilt or innocence was not …
Overview And Operation Of U.S. Financial Sanctions, Including The Example Of Iran, Barry E. Carter, Ryan Farha
Overview And Operation Of U.S. Financial Sanctions, Including The Example Of Iran, Barry E. Carter, Ryan Farha
Georgetown Law Faculty Publications and Other Works
Financial sanctions are increasingly being used in the mix of international economic sanctions being employed by the United Nations, regional entities, and individual countries, including the United States. These financial sanctions have become more focused and effective as the tools and techniques have improved significantly for tracing and identifying the financial transactions of terrorists, weapons proliferators, human rights violators, drug cartels, and others. These sanctions can not only freeze financial assets and prohibit or limit financial transactions, but they also impede trade by making it difficult to pay for the export or import of goods and services.
In spite of …
National Security Pedagogy: The Role Of Simulations, Laura K. Donohue
National Security Pedagogy: The Role Of Simulations, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
This article challenges the dominant pedagogical assumptions in the legal academy. It begins by briefly considering the state of the field of national security, noting the rapid expansion in employment and the breadth of related positions that have been created post-9/11. It considers, in the process, how the legal academy has, as an institutional matter, responded to the demand.
Part III examines traditional legal pedagogy, grounding the discussion in studies initiated by the American Bar Association, the Carnegie Foundation, and others. It suggests that using the law-writ-large as a starting point for those interested in national security law is a …
Breaking The Mexican Cartels: A Key Homeland Security Challenge For The Next Four Years, Carrie F. Cordero
Breaking The Mexican Cartels: A Key Homeland Security Challenge For The Next Four Years, Carrie F. Cordero
Georgetown Law Faculty Publications and Other Works
Although accurate statistics are hard to come by, it is quite possible that 60,000 people have died in the last six-plus years as a result of armed conflict between the Mexican cartels and the Mexican government, amongst cartels fighting each other, and as a result of cartels targeting citizens. And this figure does not even include the nearly 40,000 Americans who die each year from using illegal drugs, much of which is trafficked through the U.S.-Mexican border. The death toll is only part of the story. The rest includes the terrorist tactics used by cartels to intimidate the Mexican people …
Stochastic Constraint, Neal K. Katyal
Stochastic Constraint, Neal K. Katyal
Georgetown Law Faculty Publications and Other Works
This essay reviews Power and Constraint: The Accountable Presidency After 9/11 by Jack Goldsmith (2012).
With The Terror Presidency, Professor Jack Goldsmith wrote, hands down, the very best analysis of the national security issues surrounding President George W. Bush's tenure. In Power and Constraint: The Accountable Presidency After 9/11, Goldsmith returns to the same set of problems, but adopts a different tack. He argues that the modern wartime Executive is constrained in new ways beyond the traditional system of checks and balances, and that these new constraints combine to create an effective system that checks executive power. Though …
Drones And Cognitive Dissonance, Rosa Brooks
Drones And Cognitive Dissonance, Rosa Brooks
Georgetown Law Faculty Publications and Other Works
There’s something about drones that makes sane people crazy. Is it those lean, futurist profiles? The activities drone technologies enable? Or perhaps it’s just the word itself–drone–a mindless, unpleasant, dissonant thrum. Whatever the cause, drones seem to produce an unusual kind of cognitive dissonance in many people.
Some demonize drones, denouncing them for causing civilian deaths or enabling long-distance killing, even as they ignore the fact that the same (or worse) could be said of many other weapons delivery systems. Others glorify them as a low-cost way to “take out terrorists,” despite the strategic vacuum in which most …
Neo-Democracy, National Security, And Liberty, David Cole
Neo-Democracy, National Security, And Liberty, David Cole
Georgetown Law Faculty Publications and Other Works
In his new book, Liberty and Security, Conor Gearty, professor of law at the London School of Economics and one of the United Kingdom’s leading authorities on civil liberties and national security, argues that many Western nations are in effect “neo-democracies” that fail systematically to live up to the fundamental egalitarian premises of true democracy, and that this development is seen in particular in the context of counter-terrorism policy. This review assesses that claim, and maintains that while Gearty is correct that many counter-terrorism measures are predicated on double standards, that critique is insufficient to answer the many difficult questions …
State Law, The Westfall Act, And The Nature Of The Bivens Question, Carlos Manuel Vázquez, Stephen I. Vladeck
State Law, The Westfall Act, And The Nature Of The Bivens Question, Carlos Manuel Vázquez, Stephen I. Vladeck
Georgetown Law Faculty Publications and Other Works
In a number of recent cases touching to varying degrees on national security, different courts of appeals have applied a strong presumption against recognition of a Bivens cause of action. In each of these cases, the courts’ approach was based on the belief that the creation of a cause of action is a legislative function and that the courts would be usurping Congress’s role if they recognized a Bivens action without legislative authorization. Thus, faced with a scenario where they believed that the remedial possibilities were either "Bivens or nothing," these courts of appeals chose nothing.
The concerns that …
Military Commissions And The Paradigm Of Prevention, David Cole
Military Commissions And The Paradigm Of Prevention, David Cole
Georgetown Law Faculty Publications and Other Works
Why military commissions? Given the United States’s track record of success in trying terrorists in civilian criminal courts, and the availability of courts-martial to try war crimes, why has the United States government, under both the George W. Bush and Barack Obama administrations alike, insisted on proceeding through untested military commissions instead? In May 2009, President Obama defended military commissions with the following claims:
Military commissions have a history in the United States dating back to George Washington and the Revolutionary War. They are an appropriate venue for trying detainees for violations of the laws of war. They allow for …
Drones And The International Rule Of Law, Rosa Brooks
Drones And The International Rule Of Law, Rosa Brooks
Georgetown Law Faculty Publications and Other Works
This essay will proceed in four parts. First, it will briefly discuss the concept of the international rule of law. Second, it will offer a short factual background on US drone strikes (to the extent that it is possible to provide factual background on a practice so shrouded in secrecy). Third, it will highlight some of the key ways in which post 9/11 US legal theories relating to the use of force challenge previously accepted concepts and seek to redefine previously well-understood terms. Fourth, it will offer brief concluding thoughts on the future of the international rule of law in …
Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole
Preserving Privacy In A Digital Age: Lessons Of Comparative Constitutionalism, David Cole
Georgetown Law Faculty Publications and Other Works
In the modern age, we increasingly live our lives through, and accompanied by, digital media. Virtually every transaction or communication that uses such media, as well as every move of mobile phone owners, is recorded. Computers are able to store, transmit, and analyze the data as never before, drawing on multiple sources to construct an intimate picture of our interests, contacts, travels and desires. Private data-mining services, most often used for commercial advertising purposes, can determine: what we read, listen to, and look at; where we travel to, shop, and dine; and with whom we speak or associate. Meanwhile, social …