Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Georgetown Law Faculty Publications and Other Works

Discipline
Keyword
Publication Year

Articles 31 - 60 of 126

Full-Text Articles in National Security Law

After Snowden: Regulating Technology-Aided Surveillance In The Digital Age, David Cole Jan 2016

After Snowden: Regulating Technology-Aided Surveillance In The Digital Age, David Cole

Georgetown Law Faculty Publications and Other Works

Imagine a state that compels its citizens to inform it at all times of where they are, who they are with, what they are doing, who they are talking to, how they spend their time and money, and even what they are interested in. None of us would want to live there. Human rights groups would condemn the state for denying the most basic elements of human dignity and freedom. Student groups would call for boycotts to show solidarity. We would pity the offending state's citizens for their inability to enjoy the rights and privileges we know to be essential …


A Response To Professor Samuel Rascoff’S Presidential Intelligence, Carrie F. Cordero Jan 2016

A Response To Professor Samuel Rascoff’S Presidential Intelligence, Carrie F. Cordero

Georgetown Law Faculty Publications and Other Works

Should foreign intelligence collection be subject to more rigorous oversight, and therefore, improved accountability, through a policy process that involves deeper personal involvement by the President and National Security Council (NSC)? Would a greater number of political appointees across the intelligence community facilitate that oversight? These are the essential questions posed by Professor Samuel Rascoff in his article Presidential Intelligence.


Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue Feb 2015

Section 702 And The Collection Of International Telephone And Internet Content, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Section 702 of the Foreign Intelligence Surveillance Act (FISA) authorizes the NSA to collect the electronic communications of non-U.S. targets located overseas. Recent media reports and declassified documents reveal a more extensive program than publicly understood. The article begins by considering the origins of the current programs and the relevant authorities, particularly the transfer of part of the post-9/11 President’s Surveillance Program to FISA. It outlines the contours of the 2007 Protect America Act, before its replacement in 2008 by the FISA Amendments Act (FAA). The section ends with a brief discussion of the current state of foreign intelligence collection …


Terrorism Trials In Article Iii Courts, Laura K. Donohue Jan 2015

Terrorism Trials In Article Iii Courts, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Some individuals reject Article III courts as a forum for bringing terrorist suspects to justice on the grounds that the ordinary judicial system cannot handle such cases. As an empirical matter, this claim is simply false. Since 2001, myriad terrorism trials have progressed through the criminal system. The U.S. Department of Justice (DOJ) reports that between 2001 and 2010, there were 998 defendants indicted in terrorism prosecutions. Eighty-seven percent of the defendants were convicted on at least one charge. According to the Executive Office for the U.S. Attorneys, from FY 2004 to FY 2009, there were 3,010 terrorism prosecutions. It …


Human Rights Thinking And The Laws Of War, David Luban Jan 2015

Human Rights Thinking And The Laws Of War, David Luban

Georgetown Law Faculty Publications and Other Works

In a significant early case, the ICTY commented: “The essence of the whole corpus of international humanitarian law as well as human rights law lies in the protection of the human dignity of every person…. The general principle of respect for human dignity is . . . the very raison d'être of international humanitarian law and human rights law.”

Is it true that international humanitarian law and international human rights law share the same “essence,” and that essence is the general principle of respect for human dignity? Is it true that, in the words of Charles Beitz, humanitarian law is …


Why The Nsa Data Seizures Are Unconstitutional, Randy E. Barnett Jan 2015

Why The Nsa Data Seizures Are Unconstitutional, Randy E. Barnett

Georgetown Law Faculty Publications and Other Works

Due to the unauthorized leaks of classified information, we have come to learn that the National Security Agency (NSA), an executive branch arm of the U.S. military, has established several data collection programs. In this article, I am not going to get into the details of these programs. Instead, I will limit my focus to what I consider to be the serious constitutional problem with any such program, regardless of the details: the fact that the NSA is demanding that private companies, with which virtually all Americans contract to provide their voice communications, turn over the records of every phone …


High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue Jan 2015

High Technology, Consumer Privacy, And U.S. National Security, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Documents released over the past year detailing the National Security Agency’s (“NSA”) telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. corporations, the economy, and U.S. national security.

The first Snowden documents, printed on June 5, 2013, revealed that the government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had …


Nuclear Arms Control By A Pen And A Phone: Effectuating The Comprehensive Test Ban Treaty Without Ratification, David A. Koplow Jan 2015

Nuclear Arms Control By A Pen And A Phone: Effectuating The Comprehensive Test Ban Treaty Without Ratification, David A. Koplow

Georgetown Law Faculty Publications and Other Works

This Article examines three crucial national security problems concerning the testing and proliferation of nuclear weapons, and offers three novel solutions. The three urgent problems are: (1) the fact that the Comprehensive Nuclear Test Ban Treaty (CTBT), the most important multilateral nuclear arms control agreement of the past forty years, may never enter into force; (2) the fact that without CTBT, the global non-Proliferation regime is in trouble, too, as the fragile consensus underpinning the world's efforts to restrict the spread of nuclear weapons threatens to unravel; and (3) the fact that the United States is peculiarly disabled, due to …


The President’S National Security Agenda Curtailing Ebola, Safeguarding The Future, Lawrence O. Gostin, Henry A. Waxman, William Foege Nov 2014

The President’S National Security Agenda Curtailing Ebola, Safeguarding The Future, Lawrence O. Gostin, Henry A. Waxman, William Foege

Georgetown Law Faculty Publications and Other Works

A clear lesson of the Ebola epidemic in West Africa is the need for strong public health systems globally, including in the United States. Ebola has highlighted the dangers of weak public health systems, from the immense shortage of health workers in West Africa to the budget cuts at the U.S. Centers for Disease Control and Prevention. In response to Ebola and the broader threat of infectious disease, President Obama has proposed a $6.2 billion supplemental funding request to Congress. The supplemental would surge resources for containing and treating Ebola in West Africa -- including a reserve of funds to …


The Difference Prevention Makes: Regulating Preventive Justice, David Cole Mar 2014

The Difference Prevention Makes: Regulating Preventive Justice, David Cole

Georgetown Law Faculty Publications and Other Works

Since the terrorist attacks of September 11, 2001, the United States and many other countries have adopted a ‘‘paradigm of prevention,’’ employing a range of measures in an attempt to prevent future terrorist attacks. This includes the use of pre textual charges for preventive detention, the expansion of criminal liability to prohibit conduct that precedes terrorism, and expansion of surveillance at home and abroad. Politicians and government officials often speak of prevention as if it is an unqualified good. Everyone wants to prevent the next terrorist attack, after all. And many preventive initiatives, especially where they are not coercive and …


What Would Zero Look Like? A Treaty For The Abolition Of Nuclear Weapons, David A. Koplow Jan 2014

What Would Zero Look Like? A Treaty For The Abolition Of Nuclear Weapons, David A. Koplow

Georgetown Law Faculty Publications and Other Works

Nuclear disarmament-the comprehensive, universal, and permanent abolition of all nuclear weapons, pursuant to a verifiable, legally binding international agreement-has long been one of the most ambitious, controversial, and urgent items on the agenda for arms control. To date, however, most of the discussion of "getting to zero" has highlighted the political, military, technical and diplomatic dimensions of this complex problem, and there has been relatively little attention to the legal requirements for drafting such a novel treaty.

This Article fills that gap by offering two proposed agreements. The first, a non-legally-bindingfr amework accord, would be designedf or signature relatively soon …


Pandemic Disease, Biological Weapons, And War, Laura K. Donohue Jan 2014

Pandemic Disease, Biological Weapons, And War, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Over the past two decades, concern about the threat posed by biological weapons has grown. Biowarfare is not new. But prior to the recent trend, the threat largely centered on state use of such weapons. What changed with the end of the Cold War was the growing apprehension that materials and knowledge would proliferate beyond industrialized states’ control, and that “rogue states” or nonstate actors would acquire and use biological weapons. Accordingly, in 1993 senators Samuel Nunn, Richard Lugar, and Pete Dominici expanded the Cooperative Threat Reduction Program to assist the former Soviet republics in securing biological agents and weapons …


Civilians And Armed Conflict, Rosa Brooks Jan 2014

Civilians And Armed Conflict, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

We tend to view concern with the protection of civilians as a relatively recent development within the Security Council: a product of the late 20th century genocides and ethnic cleansing campaigns in Rwanda and the Balkans. But while it is indeed true that the Council’s first thematic resolution directly addressing “protection of civilians” was not passed until 1999—and also true, unfortunately, that Security Council civilian protection efforts have yet to move beyond the sporadic and inconsistent—the Council has always concerned itself with civilian protection. Indeed, the history of the Security Council itself (as well as the history of the United …


Duck-Rabbits And Drones: Legal Indeterminacy In The War On Terror, Rosa Brooks Jan 2014

Duck-Rabbits And Drones: Legal Indeterminacy In The War On Terror, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

In the days and weeks immediately following the 9/11 attacks, “the law” offered little to lawyers or policy-makers looking for guidance. Indeed, for many the events of 9/11 became the legal equivalent of a Rorschach test: depending on the observer, the 9/11 attacks were variously construed as criminal acts, acts of war, or something in between, thus fitting into (or triggering) any of several radically different legal regimes.

Divergent interpretations of the law are common, of course. Legal rules often contain an element of ambiguity, and the “facts” to which law must be applied can frequently be construed in multiple …


Humanitarian Intervention: Evolving Norms, Fragmenting Consensus (Remarks), Rosa Brooks Jan 2014

Humanitarian Intervention: Evolving Norms, Fragmenting Consensus (Remarks), Rosa Brooks

Georgetown Law Faculty Publications and Other Works

Traditionally, the evolution of customary international law was understood as a gradual process: in some idealized model, we might see first a few states, and then a few more, implicitly agreeing to follow a practice, and then we would gradually begin to see additional states doing the same thing. We would also gradually accumulate evidence that these various states are acting in such a way because they consider themselves legally bound to do so. Then, over time, we’ll see more and more states following suit both in word and deed, until at some point we can say with a great …


Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue Jan 2014

Bulk Metadata Collection: Statutory And Constitutional Considerations, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The National Security Agency’s bulk collection of telephony metadata runs contrary to Congress’s intent in enacting the 1978 Foreign Intelligence Surveillance Act. The program also violates the statute in three ways: the requirement that records sought be “relevant to an authorized investigation;” the requirement that information could be obtained via subpoena duces tecum; and the steps required for use of pen registers and trap and trace devices. Additionally, the program gives rise to serious constitutional concerns. Efforts by the government to save the program on grounds of third party doctrine are unpersuasive in light of the unique circumstances of …


Unsatisfying Wars: Degrees Of Risk And The Jus Ex Bello, Gabriella Blum, David Luban Jan 2014

Unsatisfying Wars: Degrees Of Risk And The Jus Ex Bello, Gabriella Blum, David Luban

Georgetown Law Faculty Publications and Other Works

Self-defensive war uses violence to transfer risks from one’s own people to others. We argue that central questions in just war theory may fruitfully be analyzed as issues about the morality of risk transfer. That includes the jus ex bello question of when states are required to accept a ceasefire in an otherwise-just war. In particular, a “war on terror” that ups the risks to outsiders cannot continue until the risk of terrorism has been reduced to zero or near zero. Some degree of security risk is inevitable when coexisting with others in the international community, just as citizens within …


Process, Practice, And Principle: Teaching National Security Law And The Knowledge That Matters Most, James E. Baker Jan 2014

Process, Practice, And Principle: Teaching National Security Law And The Knowledge That Matters Most, James E. Baker

Georgetown Law Faculty Publications and Other Works

The meaningful application of national security law requires a commitment to substantive knowledge, good process, and a capacity to cope (and indeed thrive) under the prevailing conditions of practice. This paper describes how and why to teach these three essential elements of national security law from an academic and practitioner perspective.

The paper starts with substantive law, placing emphasis not just on the breadth of knowledge and interpretive skills required, but also on the importance of depth, perspective, theory, purpose, history, and legal values in teaching the law. Next, the paper describes the importance of timely, meaningful, and contextual process, …


Nuclear Kellogg-Briand Pact: Proposing A Treaty For The Renunciation Of Nuclear Wars As An Instrument Of National Policy, David A. Koplow Jan 2014

Nuclear Kellogg-Briand Pact: Proposing A Treaty For The Renunciation Of Nuclear Wars As An Instrument Of National Policy, David A. Koplow

Georgetown Law Faculty Publications and Other Works

This article performs three functions. First, it offers a revisionist interpretation of the 1928 Kellogg-Briand Pact, the much-maligned treaty through which the key powers of the era, led by the United States, undertook to “outlaw” war, renouncing it as a tool of national policy and committing themselves to resort exclusively to pacific means for the resolution of their international disputes. Because of Kellogg-Briand’s inability to prevent the outbreak of World War II, the treaty has been derided for decades as a futile, utopian illusion, but this article argues that it was, in fact, a tremendous success in altering states’ attitudes …


Fisa Reform, Laura K. Donohue Jan 2014

Fisa Reform, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Congress and the Executive Branch are poised to take up the issue of FISA reform in 2014. What has been missing from the discussion is a comprehensive view of ways in which reform could be given effect—i.e., a taxonomy of potential options. This article seeks to fill the gap. The aim is to deepen the conversation about abeyant approaches to foreign intelligence gathering, to allow fuller discussion of what a comprehensive package could contain, and to place initiatives that are currently under consideration within a broader, over-arching framework. The article begins by considering the legal underpinnings and challenges to the …


Cross-Border Targeted Killings: "Lawful But Awful"?, Rosa Brooks Jan 2014

Cross-Border Targeted Killings: "Lawful But Awful"?, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

Since September 11, the United States has waged two very open wars in Afghanistan and Iraq. These two wars have killed nearly 7,000 U.S. military personnel and left some 50,000 American troops wounded; they have also left an unknown number of Iraqi and Afghan soldiers and civilians dead or wounded. But alongside these two costly and visible wars, the United States has also been waging what amounts to a third war.

This third war is a secret war, waged mostly by drone strikes, though it has also involved a smaller number of special operations raids. The author calls this third …


The Trickle-Down War, Rosa Brooks Jan 2014

The Trickle-Down War, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …


Legal Affairs: Dreyfus, Guantánamo, And The Foundation Of The Rule Of Law, David Cole May 2013

Legal Affairs: Dreyfus, Guantánamo, And The Foundation Of The Rule Of Law, David Cole

Georgetown Law Faculty Publications and Other Works

The Dreyfus affair reminds us that the rule of law and basic human rights are not self-executing. In a democracy, individual rights and the rule of law are designed to check popular power and protect the individual from the majority. Yet paradoxically, they cannot do so without substantial popular support. Alfred Dreyfus received two trialsor at least the trappings thereofand was twice wrongly convicted. The rule of law was initially unable to stand between an innocent man and the powerful men who sought to frame him. But the issue of Dreyfus's guilt or innocence was not …


Overview And Operation Of U.S. Financial Sanctions, Including The Example Of Iran, Barry E. Carter, Ryan Farha Jan 2013

Overview And Operation Of U.S. Financial Sanctions, Including The Example Of Iran, Barry E. Carter, Ryan Farha

Georgetown Law Faculty Publications and Other Works

Financial sanctions are increasingly being used in the mix of international economic sanctions being employed by the United Nations, regional entities, and individual countries, including the United States. These financial sanctions have become more focused and effective as the tools and techniques have improved significantly for tracing and identifying the financial transactions of terrorists, weapons proliferators, human rights violators, drug cartels, and others. These sanctions can not only freeze financial assets and prohibit or limit financial transactions, but they also impede trade by making it difficult to pay for the export or import of goods and services.

In spite of …


National Security Pedagogy: The Role Of Simulations, Laura K. Donohue Jan 2013

National Security Pedagogy: The Role Of Simulations, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

This article challenges the dominant pedagogical assumptions in the legal academy. It begins by briefly considering the state of the field of national security, noting the rapid expansion in employment and the breadth of related positions that have been created post-9/11. It considers, in the process, how the legal academy has, as an institutional matter, responded to the demand.

Part III examines traditional legal pedagogy, grounding the discussion in studies initiated by the American Bar Association, the Carnegie Foundation, and others. It suggests that using the law-writ-large as a starting point for those interested in national security law is a …


Breaking The Mexican Cartels: A Key Homeland Security Challenge For The Next Four Years, Carrie F. Cordero Jan 2013

Breaking The Mexican Cartels: A Key Homeland Security Challenge For The Next Four Years, Carrie F. Cordero

Georgetown Law Faculty Publications and Other Works

Although accurate statistics are hard to come by, it is quite possible that 60,000 people have died in the last six-plus years as a result of armed conflict between the Mexican cartels and the Mexican government, amongst cartels fighting each other, and as a result of cartels targeting citizens. And this figure does not even include the nearly 40,000 Americans who die each year from using illegal drugs, much of which is trafficked through the U.S.-Mexican border. The death toll is only part of the story. The rest includes the terrorist tactics used by cartels to intimidate the Mexican people …


Stochastic Constraint, Neal K. Katyal Jan 2013

Stochastic Constraint, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

This essay reviews Power and Constraint: The Accountable Presidency After 9/11 by Jack Goldsmith (2012).

With The Terror Presidency, Professor Jack Goldsmith wrote, hands down, the very best analysis of the national security issues surrounding President George W. Bush's tenure. In Power and Constraint: The Accountable Presidency After 9/11, Goldsmith returns to the same set of problems, but adopts a different tack. He argues that the modern wartime Executive is constrained in new ways beyond the traditional system of checks and balances, and that these new constraints combine to create an effective system that checks executive power. Though …


Drones And Cognitive Dissonance, Rosa Brooks Jan 2013

Drones And Cognitive Dissonance, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

There’s something about drones that makes sane people crazy. Is it those lean, futurist profiles? The activities drone technologies enable? Or perhaps it’s just the word itself–drone–a mindless, unpleasant, dissonant thrum. Whatever the cause, drones seem to produce an unusual kind of cognitive dissonance in many people.

Some demonize drones, denouncing them for causing civilian deaths or enabling long-distance killing, even as they ignore the fact that the same (or worse) could be said of many other weapons delivery systems. Others glorify them as a low-cost way to “take out terrorists,” despite the strategic vacuum in which most …


Neo-Democracy, National Security, And Liberty, David Cole Jan 2013

Neo-Democracy, National Security, And Liberty, David Cole

Georgetown Law Faculty Publications and Other Works

In his new book, Liberty and Security, Conor Gearty, professor of law at the London School of Economics and one of the United Kingdom’s leading authorities on civil liberties and national security, argues that many Western nations are in effect “neo-democracies” that fail systematically to live up to the fundamental egalitarian premises of true democracy, and that this development is seen in particular in the context of counter-terrorism policy. This review assesses that claim, and maintains that while Gearty is correct that many counter-terrorism measures are predicated on double standards, that critique is insufficient to answer the many difficult questions …


State Law, The Westfall Act, And The Nature Of The Bivens Question, Carlos Manuel Vázquez, Stephen I. Vladeck Jan 2013

State Law, The Westfall Act, And The Nature Of The Bivens Question, Carlos Manuel Vázquez, Stephen I. Vladeck

Georgetown Law Faculty Publications and Other Works

In a number of recent cases touching to varying degrees on national security, different courts of appeals have applied a strong presumption against recognition of a Bivens cause of action. In each of these cases, the courts’ approach was based on the belief that the creation of a cause of action is a legislative function and that the courts would be usurping Congress’s role if they recognized a Bivens action without legislative authorization. Thus, faced with a scenario where they believed that the remedial possibilities were either "Bivens or nothing," these courts of appeals chose nothing.

The concerns that …