Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in National Security Law

Innovation Meets Regulation: Firrma’S Significance, The Treasury’S Dilemma, And The New Normal For Foreign Investment In The U.S. Venture Capital Ecosystem, Jonathan Aaron Horn Aug 2021

Innovation Meets Regulation: Firrma’S Significance, The Treasury’S Dilemma, And The New Normal For Foreign Investment In The U.S. Venture Capital Ecosystem, Jonathan Aaron Horn

Pepperdine Law Review

One of the most powerful entities in the federal government is the little-known Committee on Foreign Investment in the United States (CFIUS), which is responsible for reviewing foreign investment transactions with U.S. businesses for potential national security threats. Originally, CFIUS was only able to review foreign investments that resulted in control of the U.S. company at issue, but the Foreign Investment Risk Review Modernization Act (FIRRMA) has significantly enhanced CFIUS’s scope to include review of minority investments. This Comment explores FIRRMA’s impact on foreign investment into the U.S. venture capital (VC) ecosystem and evaluates the uncertainty created for startups and …


When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman Jan 2019

When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman

Pepperdine Law Review

In the electronic age, the internet—and—social media specifically, can be a tool for good but, abused and unchecked, can lead to great harm. Terrorist organizations utilize social media as a means of recruiting and training new members, urging them to action, and creating public terror. These platforms serve as the catalyst for equipping the growing number of “lone wolf” attackers taking action across the United States. Under civil liability provisions created under JASTA and the ATA, material supporters of terrorism can be held liable for their actions, and with the key role social media sites now play in supporting terrorism, …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Jul 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Aumf Panel Transcript, Rosa Brooks, Benjamin Wittes Jul 2015

Aumf Panel Transcript, Rosa Brooks, Benjamin Wittes

Pepperdine Law Review

No abstract provided.


The Future As A Concept In National Security Law, Mary L. Dudziak Jul 2015

The Future As A Concept In National Security Law, Mary L. Dudziak

Pepperdine Law Review

With their focus on the future of national security law, the essays in this issue share a common premise: that the future matters to legal policy, and that law must take the future into account. But what is this future? And what conception of the future do national security lawyers have in mind? The future is, in an absolute sense, unknowable. Absent a time machine, we cannot directly experience it. Yet human action is premised on ideas about the future, political scientist Harold Lasswell wrote in his classic work The Garrison State. The ideas about the future that guide social …


International Humanitarian Law Divergence, Lesley Wexler Jul 2015

International Humanitarian Law Divergence, Lesley Wexler

Pepperdine Law Review

How do states manage disagreements about the application and interpretation of International Humanitarian Law (IHL)? As countries find themselves embroiled in conflicts across the globe and in need of allies' political, economic, and military support, this question is important from a practical standpoint as well as a theoretical one. This essay provides one set of answers by looking at the United States’ approach to potential IHL disputes with its allies. It opens with an exploration of the issues most likely to create divergence: the existence, typology, and scope of armed conflicts; the interaction between IHL and International Human Rights Law, …


Standing And Covert Surveillance, Christopher Slobogin Jul 2015

Standing And Covert Surveillance, Christopher Slobogin

Pepperdine Law Review

This Article describes and analyzes standing doctrine as it applies to covert government surveillance, focusing on practices thought to be conducted by the National Security Agency. Primarily because of its desire to avoid judicial incursions into the political process, the Supreme Court has construed its standing doctrine in a way that makes challenges to covert surveillance very difficult. Properly understood, however, such challenges do not call for judicial trenching on the power of the legislative and executive branches. Instead, they ask the courts to ensure that the political branches function properly. This political process theory of standing can rejuvenate the …


The Admissibility Of Confessions Compelled By Foreign Coercion: A Compelling Question Of Values In An Era Of Increasing International Criminal Cooperation, Geoffrey S. Corn, Kevin Cieply Jul 2015

The Admissibility Of Confessions Compelled By Foreign Coercion: A Compelling Question Of Values In An Era Of Increasing International Criminal Cooperation, Geoffrey S. Corn, Kevin Cieply

Pepperdine Law Review

This Article proceeds on a simple and clear premise: a confession extracted by torture or cruel, inhuman, or degrading treatment should never be admitted into evidence in a U.S. criminal trial. Whether accomplished through extending the Due Process or Self-Incrimination based exclusionary rules to foreign official coercion, or by legislative action, such exclusion is necessary to align evidentiary practice regarding confessions procured by foreign agents with our nation's fundamental values as reflected in the Fifth Amendment and our ratification of the CAT. This outcome is not incompatible with Connelly. Rather, this Article explores the limits of the Court's language in …


War, Law, And The Oft Overlooked Value Of Process As A Precautionary Measure, Geoffrey S. Corn Jul 2015

War, Law, And The Oft Overlooked Value Of Process As A Precautionary Measure, Geoffrey S. Corn

Pepperdine Law Review

Never in recent memory has the relationship between law and war been so central to strategic legitimacy. This has resulted in both positive evolutions of the law of armed conflict (LOAC) and a remarkable increase in interest, understanding, and analysis of this law. No state, or even non-state group, is immune from the increasingly informed critique of its planning and execution of military operations and the quite proper demand that its military personnel comply with LOAC obligations. Central to the regulation of hostilities are the core LOAC principles of distinction and discrimination. Distinction mandates restricting deliberate attack to only those …


Lost In Translation? The Relevancy Of Kobe Bryant And Aristotle To The Legality Of Modern Warfare, Rachel E. Vanlandingham Jul 2015

Lost In Translation? The Relevancy Of Kobe Bryant And Aristotle To The Legality Of Modern Warfare, Rachel E. Vanlandingham

Pepperdine Law Review

What do Kobe Bryant, Aristotle, and the continuing U.S. response to the terrorist attacks on September 11, 2001, have in common? President Barack Obama told the New Yorker in early 2014, in response to a question regarding the seeming resurgence of al Qaeda in Syria and Iraq, that “[t]he analogy we use around here sometimes, and I think is accurate, is if a jayvee team puts on Lakers uniforms that doesn’t make them Kobe Bryant.” As this example demonstrates, the Obama Administration and others, in reference to the legality of the use of armed force against al Qaeda and similar …


The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa Jan 2014

The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa

Pepperdine Law Review

No abstract provided.


Resurrection Of Reynolds: 1974 Amendment To National Defense And Foreign Policy Exemption, Rex J. Zedalis May 2013

Resurrection Of Reynolds: 1974 Amendment To National Defense And Foreign Policy Exemption, Rex J. Zedalis

Pepperdine Law Review

No abstract provided.


Espionage: Anything Goes?, Karen Jennings Jan 2013

Espionage: Anything Goes?, Karen Jennings

Pepperdine Law Review

No abstract provided.


Boland In The Wind: The Iran-Contra Affair And The Invitation To Struggle , Bretton G. Sciaroni Nov 2012

Boland In The Wind: The Iran-Contra Affair And The Invitation To Struggle , Bretton G. Sciaroni

Pepperdine Law Review

No abstract provided.


United States V. Mead Corp.: Will Administrative Transparency Survive The Increasing Demand For National Security?, Giacomo Gallai Apr 2012

United States V. Mead Corp.: Will Administrative Transparency Survive The Increasing Demand For National Security?, Giacomo Gallai

Pepperdine Law Review

No abstract provided.


The Regulation Of Extremist Speech In The Era Of Mass Digital Communications: Is Brandenburg Tolerance Obsolete In The Terrorist Era?, Nadine Strossen Feb 2012

The Regulation Of Extremist Speech In The Era Of Mass Digital Communications: Is Brandenburg Tolerance Obsolete In The Terrorist Era?, Nadine Strossen

Pepperdine Law Review

No abstract provided.


The Muted Rise Of The Silent Witness Rule In National Security Litigation: The Eastern District Of Virginia's Answer To The Fight Over Classified Information At Trial, Jonathan M. Lamb Feb 2012

The Muted Rise Of The Silent Witness Rule In National Security Litigation: The Eastern District Of Virginia's Answer To The Fight Over Classified Information At Trial, Jonathan M. Lamb

Pepperdine Law Review

The state secrets problem is emblematic of a judicial issue which is not confined to the civil cases in which the privilege is asserted - the tension between the government's interest in protecting classified information and society's interest in justice by resolution on the merits. The United States must be allowed to prosecute terrorists, conspirators, and enemies by using classified information as evidence; but how may the government act as a civil defendant without invoking the state secrets privilege to dismiss actions before trial (or pre-discovery)? The answer might be a little known evidentiary doctrine called the silent witness rule. …