Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Entire DC Network

Red White And Blue – And Also Green: How Energy Policy Can Protect Both National Security And The Environment, David M. Schizer Jan 2023

Red White And Blue – And Also Green: How Energy Policy Can Protect Both National Security And The Environment, David M. Schizer

Faculty Scholarship

Too often, energy policy protects the environment while neglecting national security, or vice versa. Since each goal is critical, this Article shows how to advance both at the same time.

For national security, the key is to avoid depending on the wrong suppliers. If they are vulnerable to attack (like some Middle Eastern producers), they need to be defended. Or, if they are themselves geopolitical threats (like Russia and Iran), their energy exports fund harmful conduct. This Article breaks new ground in showing why suppliers tend to be insecure or menacing: authoritarian regimes — which are more likely to pose …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman Jan 2018

Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman

Faculty Scholarship

Global efforts by states to cooperate through international rules in combating cyber threats have generated mixed results, at best. In this paper, we examine the architecture of the Proliferation Security Initiative (PSI) as a possible model for future cybersecurity cooperation among interested states. We identify several features of PSI’s architecture (rather than its substantive focus on non-proliferation) for further analysis, including PSI’s low entry costs, tiered structure, and flexibility, as well as its leveraging of both territorial jurisdiction and state consent. We conclude that, despite several hurdles visible in the scope of its membership and its legal framework, PSI still …


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …


Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer Jan 2017

Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer

Faculty Scholarship

The United States uses on targeted subsidies for both "green" energy and hydrocarbons. These subsidies pursue worthwhile goals. But unfortunately, many have design flaws that make them less effective or even counterproductive. The goal of this Article is to show how to do better.

Specifically, this Article focuses on three sets of issues. First, there often is tension between our environmental and national security goals. Unfortunately, the economics literature on energy largely ignores these trade-offs by omitting national security from the analysis. This Article takes issue with this approach and suggests ways to manage these trade-offs. Second, this Article argues …


Privacy-Privacy Tradeoffs, David E. Pozen Jan 2016

Privacy-Privacy Tradeoffs, David E. Pozen

Faculty Scholarship

Legal and policy debates about privacy revolve around conflicts between privacy and other goods. But privacy also conflicts with itself. Whenever securing privacy on one margin compromises privacy on another margin, a privacy-privacy tradeoff arises.

This Essay introduces the phenomenon of privacy-privacy tradeoffs, with particular attention to their role in NSA surveillance. After explaining why these tradeoffs are pervasive in modern society and developing a typology, the Essay shows that many of the arguments made by the NSA's defenders appeal not only to a national-security need but also to a privacy-privacy tradeoff. An appreciation of these tradeoffs, the Essay contends, …


Adapting The Law Of Armed Conflict To Autonomous Weapon Systems, Kenneth Anderson, Daniel Reisner, Matthew C. Waxman Jan 2014

Adapting The Law Of Armed Conflict To Autonomous Weapon Systems, Kenneth Anderson, Daniel Reisner, Matthew C. Waxman

Faculty Scholarship

Weapon systems are becoming increasingly automated and arguably some autonomous military systems have been deployed for years. Recent advances in automated systems and the possibilities they portend have generated interest and anxiety within some militaries and defense ministries, and a movement of non-governmental activists seeking to ban fully autonomous weapons. In May 2014, the High Contracting Parties of the UN Convention on Certain Conventional Weapons (CCW) convened an extensive discussion of the legal and ethical issues that autonomous weapons raise, while recognizing that many of these problems lie at an uncertain point in the future.

It is important that normative …


The Power To Threaten War, Matthew C. Waxman Jan 2014

The Power To Threaten War, Matthew C. Waxman

Faculty Scholarship

Existing war powers scholarship focuses overwhelmingly on the President's power to initiate military operations abroad and the extent to which that power is constrained by Congress. It ignores the allocation of legal power to threaten military force or war, even though threats – to coerce or deter enemies and to reassure allies – are one of the most important ways in which the United States government wields its military might. This paper fills that scholarly void, and draws on recent political science and historical scholarship to construct a richer and more accurate account of the modern presidency's powers to shape …


Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman Jan 2013

Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman

Faculty Scholarship

When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …


Open Service And Our Allies: A Report On The Inclusion Of Openly Gay And Lesbian Servicemembers In U. S. Allies' Armed Forces, Suzanne B. Goldberg Jan 2011

Open Service And Our Allies: A Report On The Inclusion Of Openly Gay And Lesbian Servicemembers In U. S. Allies' Armed Forces, Suzanne B. Goldberg

Faculty Scholarship

In the wake of the Obama Administration's pledge to repeal "Don't Ask, Don't Tell" in the United States, the Columbia Law School Sexuality & Gender Law Clinic undertook a review of how allies of the United States moved from a policy of banning gay and lesbian servicemembers from serving in the armed forces to a policy of allowing these servicemembers to serve openly ("open service"). In documenting this review, this report aims to provide information about the decision to implement open service and the mechanics of the transition to open service in Australia, Canada, Israel, and the United Kingdom. In …


The Structure Of Terrorism Threats And The Laws Of War, Matthew C. Waxman Jan 2010

The Structure Of Terrorism Threats And The Laws Of War, Matthew C. Waxman

Faculty Scholarship

This article considers a major debate in the American and European counterterrorism analytic community – whether the primary terrorist threat to the West is posed by hierarchical, centralized terrorist organizations operating from geographic safe havens, or by radicalized individuals conducting a loosely organized, ideologically common but operationally independent fight against western societies – and this debate’s implications for both jus ad bellum and jus in bello. Analysis of how the law of armed conflict might be evolving to deal with terrorism should engage in more nuanced and sophisticated examination of how terrorism threats are themselves evolving. Moreover, the merits of …


The Legacy Of Louis Henkin: Human Rights In The "Age Of Terror" – An Interview With Sarah H. Cleveland, Sarah H. Cleveland Jan 2007

The Legacy Of Louis Henkin: Human Rights In The "Age Of Terror" – An Interview With Sarah H. Cleveland, Sarah H. Cleveland

Faculty Scholarship

What effect has Professor Henkin's work had upon your own thoughts or scholarship in the human rights field?

My scholarly work spans the fields of international human rights and U.S. foreign relations law. I am particularly interested in the process by which human rights norms are implemented into domestic legal systems, the role the United States plays in promoting the internalization of human rights norms by other states, and the mechanisms by which the values of the international human rights regime are incorporated into the United States domestic legal system.

To say that Professor Henkin's work has contributed to my …


Muslim Profiles Post-9/11: Is Racial Profiling An Effective Counterterrorist Measure And Does It Violate The Right To Be Free From Discrimination?, Bernard E. Harcourt Jan 2006

Muslim Profiles Post-9/11: Is Racial Profiling An Effective Counterterrorist Measure And Does It Violate The Right To Be Free From Discrimination?, Bernard E. Harcourt

Faculty Scholarship

Racial profiling as a defensive counterterrorism measure necessarily implicates a rights trade-off: if effective, racial profiling limits the right of young Muslim men to be free from discrimination in order to promote the security and well-being of others. Proponents of racial profiling argue that it is based on simple statistical fact and represents just smart law enforcement. Opponents of racial profiling, like New York City police commissioner Raymond Kelly, say that it is dangerous and just nuts.

As a theoretical matter, both sides are partly right. Racial profiling in the context of counterterrorism measures may increase the detection of terrorist …


From Violent Crime To Terrorism: The Changing Basis Of The Federal, State And Local Law Enforcement Dynamic, Daniel C. Richman Jan 2003

From Violent Crime To Terrorism: The Changing Basis Of The Federal, State And Local Law Enforcement Dynamic, Daniel C. Richman

Faculty Scholarship

Two lines of questions dominate discussions about how the nation ought to respond at home to the new (or rather newly perceived) terrorist threat: How do we ensure that information about potential terrorist activities is effectively gathered, shared, and used? And how do we ensure that the Government neither abuses the investigative authority we give it, nor demands more authority than it needs? Each line can profitably be pursued in its own terms. Yet to keep the conversations separate is to miss seeing how the very process of creating an effective domestic intelligence network may introduce a salutary level of …


Constitutional Control Over War Powers: A Common Core Of Accountability In Democratic Societies?, Lori Fisler Damrosch Jan 1995

Constitutional Control Over War Powers: A Common Core Of Accountability In Democratic Societies?, Lori Fisler Damrosch

Faculty Scholarship

My first opportunity to read John Hart Ely's ideas on war powers came in 1988, when he published the antecedent of one chapter of War and Responsibility as an article in the Columbia Law Review titled Suppose Congress Wanted a War Powers Act that Worked. The punctuation – without a question mark – makes an important point: The verb "suppose" invites us not to speculate about a counterfactual hypothetical, but rather to assume that Congress must want its own creation to work. Professor Ely's project was to show Congress how to fix it.

But it was already evident in 1988, …


Curtiss-Wright Comes Home: Executive Power And National Security Secrecy, Harold Edgar, Benno C. Schmidt Jr. Jan 1986

Curtiss-Wright Comes Home: Executive Power And National Security Secrecy, Harold Edgar, Benno C. Schmidt Jr.

Faculty Scholarship

Collectively we face no greater challenge than maintaining sensible perspectives on national security issues. Central to this task is the need to achieve a tolerable balance between secrecy and openness in public debate on such issues. There are real threats to our nation, and we would be foolish to ignore them; history teaches that no culture is guaranteed survival. Yet, how to respond to such threats must be profoundly controversial. The virtue of liberal society is that it values highly the realization of private preferences; the sacrifice of those desires to attain another's vision of collective security will never be …


Constitutional Fate, Philip Chase Bobbitt Jan 1980

Constitutional Fate, Philip Chase Bobbitt

Faculty Scholarship

The Mary Ireland Graves Dougherty Lectures in Constitutional Law were established in 1979 at the University of Texas School of Law in the memory of Mrs. Dougherty by her family. Professor Bobbitt delivered the inaugural series of these lectures on three evenings in April 1979. Of those in attendance, only Professor Bobbitt's students, who had witnessed the evolution of his ideas during that year, and a few colleagues with whom he must have shared his thoughts, could have expected what followed on those spring evenings in Austin. His subject was "the question of judicial review." So stated, the subject hardly …