Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 59

Full-Text Articles in Entire DC Network

The National Security Consequences Of The Major Questions Doctrine, Timothy Meyer, Ganesh Sitaraman Jan 2023

The National Security Consequences Of The Major Questions Doctrine, Timothy Meyer, Ganesh Sitaraman

Faculty Scholarship

The rise of the major questions doctrine—the rule that says that in order to delegate to the executive branch the power to resolve a “question of ‘deep economic and political significance’ that is central to [a] statutory scheme,” Congress must do so expressly—threatens to unmake the modern executive’s authority over foreign affairs, especially in matters of national security and interstate conflict. In the twenty-first century, global conflicts increasingly involve economic warfare, rather than (or in addition to) the force of arms.

In the United States, the executive power to levy economic sanctions and engage in other forms of economic warfare …


Red White And Blue – And Also Green: How Energy Policy Can Protect Both National Security And The Environment, David M. Schizer Jan 2023

Red White And Blue – And Also Green: How Energy Policy Can Protect Both National Security And The Environment, David M. Schizer

Faculty Scholarship

Too often, energy policy protects the environment while neglecting national security, or vice versa. Since each goal is critical, this Article shows how to advance both at the same time.

For national security, the key is to avoid depending on the wrong suppliers. If they are vulnerable to attack (like some Middle Eastern producers), they need to be defended. Or, if they are themselves geopolitical threats (like Russia and Iran), their energy exports fund harmful conduct. This Article breaks new ground in showing why suppliers tend to be insecure or menacing: authoritarian regimes — which are more likely to pose …


National Cybersecurity Innovation, Tabrez Y. Ebrahim Jan 2020

National Cybersecurity Innovation, Tabrez Y. Ebrahim

Faculty Scholarship

National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


Bureaucratic Resistance And The National Security State, Rebecca Ingber Nov 2018

Bureaucratic Resistance And The National Security State, Rebecca Ingber

Faculty Scholarship

Modern accounts of the national security state tend toward one of two opposing views of bureaucratic tensions within it: At one extreme, the executive branch bureaucracy is a shadowy “deep state,” unaccountable to the public or even to the elected President. On this account, bureaucratic obstacles to the President’s agenda are inherently suspect, even dangerous. At the other end, bureaucratic resistance to the President represents a necessary benevolent constraint on an otherwise imperial executive, the modern incarnation of the separation of powers, as the traditional checks on the President of the courts and Congress have fallen down on the job. …


Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman Jan 2018

Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman

Faculty Scholarship

Global efforts by states to cooperate through international rules in combating cyber threats have generated mixed results, at best. In this paper, we examine the architecture of the Proliferation Security Initiative (PSI) as a possible model for future cybersecurity cooperation among interested states. We identify several features of PSI’s architecture (rather than its substantive focus on non-proliferation) for further analysis, including PSI’s low entry costs, tiered structure, and flexibility, as well as its leveraging of both territorial jurisdiction and state consent. We conclude that, despite several hurdles visible in the scope of its membership and its legal framework, PSI still …


Security Clearance Conundrum: The Need For Reform And Judicial Review, Heidi Gilchrist May 2017

Security Clearance Conundrum: The Need For Reform And Judicial Review, Heidi Gilchrist

Faculty Scholarship

No abstract provided.


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …


Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer Jan 2017

Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer

Faculty Scholarship

The United States uses on targeted subsidies for both "green" energy and hydrocarbons. These subsidies pursue worthwhile goals. But unfortunately, many have design flaws that make them less effective or even counterproductive. The goal of this Article is to show how to do better.

Specifically, this Article focuses on three sets of issues. First, there often is tension between our environmental and national security goals. Unfortunately, the economics literature on energy largely ignores these trade-offs by omitting national security from the analysis. This Article takes issue with this approach and suggests ways to manage these trade-offs. Second, this Article argues …


Privacy-Privacy Tradeoffs, David E. Pozen Jan 2016

Privacy-Privacy Tradeoffs, David E. Pozen

Faculty Scholarship

Legal and policy debates about privacy revolve around conflicts between privacy and other goods. But privacy also conflicts with itself. Whenever securing privacy on one margin compromises privacy on another margin, a privacy-privacy tradeoff arises.

This Essay introduces the phenomenon of privacy-privacy tradeoffs, with particular attention to their role in NSA surveillance. After explaining why these tradeoffs are pervasive in modern society and developing a typology, the Essay shows that many of the arguments made by the NSA's defenders appeal not only to a national-security need but also to a privacy-privacy tradeoff. An appreciation of these tradeoffs, the Essay contends, …


The Dod Law Of War Manual And Its Critics: Some Observations, Charles J. Dunlap Jr. Jan 2016

The Dod Law Of War Manual And Its Critics: Some Observations, Charles J. Dunlap Jr.

Faculty Scholarship

The U.S. Department of Defense’s (DoD) new Law of War Manual has generated serious debate about its treatment of a variety of issues including human shields, the status of journalists, cyber operations, the precautions to be taken prior to attacks and even the role of honor in war. Although this article does not purport to be a comprehensive response to every critique of the Manual and, indeed, cites opportunities for its improvement, it nevertheless concludes that on balance the Manual provides an excellent, comprehensive and much-needed statement of DoD’s view of the lex lata of the law of war.


Presidential War Powers As A Two-Level Dynamic: International Law, Domestic Law, And Practice-Based Legal Change, Curtis A. Bradley, Jean Galbraith Jan 2016

Presidential War Powers As A Two-Level Dynamic: International Law, Domestic Law, And Practice-Based Legal Change, Curtis A. Bradley, Jean Galbraith

Faculty Scholarship

There is a rich literature on the circumstances under which the United Nations Charter or specific Security Council resolutions authorize nations to use force abroad, and there is a rich literature on the circumstances under which the U.S. Constitution and statutory law allows the President to use force abroad. These are largely separate areas of scholarship, addressing what are generally perceived to be two distinct levels of legal doctrine. This Article, by contrast, considers these two levels of doctrine together as they relate to the United States. In doing so, it makes three main contributions. First, it demonstrates striking parallels …


Lawfare, Charles J. Dunlap Jr. Jan 2015

Lawfare, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Due Process And The Non-Citizen: A Revolution Reconsidered, Joseph Landau Jan 2015

Due Process And The Non-Citizen: A Revolution Reconsidered, Joseph Landau

Faculty Scholarship

Mathews v. Eldridge is typically understood to be a ruling limiting due process protections in benefits determinations, but this case of judicial restraint in ordinary domestic law has activist features where non-citizens are concerned. The transplantation of Mathews into the critical areas of immigration and national security has produced a body of law that is slowly ushering in rights-affirming outcomes and weakening conventional doctrines of exceptionalism in immigration and national security. There are two chief reasons for this. First, ever since Mathews required an explicit judicial determination of private interests, courts have used an increasingly particularistic, case-by-case analysis in immigration …


The Rise Of The Security State, Wang Yuhua, Carl F. Minzner Jan 2015

The Rise Of The Security State, Wang Yuhua, Carl F. Minzner

Faculty Scholarship

Over the past two decades, the Chinese domestic security apparatus has expanded dramatically. “Stability maintenance” operations have become a priority for local Chinese authorities. We argue that the birth of these trends dates to the early 1990s, when central Party authorities adopted new governance models that differed dramatically from those that of the 1980s. They increased the bureaucratic rank of public security chiefs within the Party apparatus, expanded the reach of the Party political-legal apparatus into a broader range of governance issues, and altered cadre evaluation standards to increase the sensitivity of local authorities to social protest. We show that …


Still Shortchanged: Some Observations About The New Army/Marine Corps Coin Doctrine, Charles J. Dunlap Jr. Jan 2014

Still Shortchanged: Some Observations About The New Army/Marine Corps Coin Doctrine, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Book Reviews: War & Technology, Charles J. Dunlap Jr. Jan 2014

Book Reviews: War & Technology, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Are Damages Different? Bivens And National Security, Andrew Kent Jan 2014

Are Damages Different? Bivens And National Security, Andrew Kent

Faculty Scholarship

Litigation challenging the national security actions of the federal government has taken a seemingly paradoxical form in recent years. Prospective coercive remedies like injunctions and habeas corpus (a kind of injunction) are traditionally understood to involve much greater intrusions by the judiciary into government functioning than retrospective money damages awards. Yet federal courts have developed and strictly applied doctrines barring Bivens damages actions against federal officials because of an asserted need to preserve the prerogatives of the political branches in national security and foreign affairs. At the same time, the courts have been increasingly assertive in cases involving coercive remedies, …


Adapting The Law Of Armed Conflict To Autonomous Weapon Systems, Kenneth Anderson, Daniel Reisner, Matthew C. Waxman Jan 2014

Adapting The Law Of Armed Conflict To Autonomous Weapon Systems, Kenneth Anderson, Daniel Reisner, Matthew C. Waxman

Faculty Scholarship

Weapon systems are becoming increasingly automated and arguably some autonomous military systems have been deployed for years. Recent advances in automated systems and the possibilities they portend have generated interest and anxiety within some militaries and defense ministries, and a movement of non-governmental activists seeking to ban fully autonomous weapons. In May 2014, the High Contracting Parties of the UN Convention on Certain Conventional Weapons (CCW) convened an extensive discussion of the legal and ethical issues that autonomous weapons raise, while recognizing that many of these problems lie at an uncertain point in the future.

It is important that normative …


The Power To Threaten War, Matthew C. Waxman Jan 2014

The Power To Threaten War, Matthew C. Waxman

Faculty Scholarship

Existing war powers scholarship focuses overwhelmingly on the President's power to initiate military operations abroad and the extent to which that power is constrained by Congress. It ignores the allocation of legal power to threaten military force or war, even though threats – to coerce or deter enemies and to reassure allies – are one of the most important ways in which the United States government wields its military might. This paper fills that scholarly void, and draws on recent political science and historical scholarship to construct a richer and more accurate account of the modern presidency's powers to shape …


A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


Anticipatory Self-Defense And The Israeli-Iranian Crisis: Some Remarks, Charles J. Dunlap Jr. Jan 2013

Anticipatory Self-Defense And The Israeli-Iranian Crisis: Some Remarks, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Disaggregating Disasters, Lisa Grow Sun, Ronnell Andersen Jones Jan 2013

Disaggregating Disasters, Lisa Grow Sun, Ronnell Andersen Jones

Faculty Scholarship

In the years since the September 11 attacks, scholars and commentators have criticized the emergence of both legal developments and policy rhetoric that blur the lines between war and terrorism. Unrecognized, but equally as damaging to democratic ideals—and potentially more devastating in practical effect—is the expansion of this trend beyond the context of terrorism to a much wider field of nonwar emergencies. Indeed, in recent years, war and national security rhetoric has come to permeate the legal and policy conversations on a wide variety of natural and technological disasters. This melding of disaster and war for purposes of justifying exceptions …


The Compromised Cargo Container: Terror In A Box, Taylor Simpson-Wood Jan 2013

The Compromised Cargo Container: Terror In A Box, Taylor Simpson-Wood

Faculty Scholarship

No abstract provided.


Judicial Review For Enemy Fighters: The Court’S Fateful Turn In Ex Parte Quirin, The Nazi Saboteur Case, Andrew Kent Jan 2013

Judicial Review For Enemy Fighters: The Court’S Fateful Turn In Ex Parte Quirin, The Nazi Saboteur Case, Andrew Kent

Faculty Scholarship

The emerging conventional wisdom in the legal academy is that individual rights under the U.S. Constitution should be extended to noncitizens outside the United States. This claim - called globalism in my article - has been advanced with increasing vigor in recent years, most notably in response to legal positions taken by the Bush administration during the war on terror. Against a Global Constitution challenges the textual and historical grounds advanced to support the globalist conventional wisdom and demonstrates that they have remarkably little support. At the same time, the article adduces textual and historical evidence that noncitizens were among …


Military Justice, Charles J. Dunlap Jr. Jan 2013

Military Justice, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


On “The Lure Of Strike”, Charles J. Dunlap Jr. Jan 2013

On “The Lure Of Strike”, Charles J. Dunlap Jr.

Faculty Scholarship

This commentary is in response to the special commentary, “The Lure of Strike” by Conrad Crane published in the Summer 2013 issue of Parameters (vol. 43, no. 2).


Biometric Id Cybersurveillance, Margaret Hu Jan 2013

Biometric Id Cybersurveillance, Margaret Hu

Faculty Scholarship

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman Jan 2013

Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman

Faculty Scholarship

When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …


Cyber Deterrence, Eric Talbot Jensen Dec 2012

Cyber Deterrence, Eric Talbot Jensen

Faculty Scholarship

Cyber operations by both state actors and non-state actors are increasing in frequency and severity. As nations struggle to defend their networks and infrastructure, their ability to apply the principles of deterrence to cyber activities correspondingly increases in importance. Cyber deterrence offers much more flexibility and increased options from traditional deterrence methodologies developed in the Cold War’s nuclear age. In addition to traditional retaliation, cyber deterrence includes options such as taking legal action; and making networks invisible, resilient, and interdependent. It also presents new ways to view and apply accepted methodologies such as invulnerability. As the U.S. continues to develop …