Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

The Conflict Of Laws In Armed Conflicts And Wars, John C. Dehn Aug 2015

The Conflict Of Laws In Armed Conflicts And Wars, John C. Dehn

John C. Dehn

After over thirteen years of continuous armed conflict, neither courts nor scholars are closer to a common understanding of whether, or how, international and U.S. law interact to regulate acts of belligerency by the United States. This Article articulates the first normative theory regarding the relationship of customary international law to U.S. domestic law that fully harmonizes Supreme Court precedent. It then applies this theory to customary international laws of war to better articulate the legal framework regulating the armed conflicts of the United States. It demonstrates that the relationship of customary international law to U.S. law differs in cases …


Terrorism As An Intellectual Problem, Charles W. Collier Nov 2014

Terrorism As An Intellectual Problem, Charles W. Collier

Charles W. Collier

The past few years have been instructive for observers of religious terrorism. Events have conspired to reveal ever more of its grim visage, inner logic, and awful potential. Religious terrorism has been exhaustively analyzed as a security problem, a military problem, an economic problem, a political problem, and more. But it is also an intellectual problem, one with particular implications for the study of law, culture, and history. This Essay examines the intellectual assumptions of religious terrorism, and it does so from three distinct perspectives: the theory of religion and American constitutional law (Part I); the common law (Part II); …


Interpreting Force Authorization, Scott Sullivan Sep 2014

Interpreting Force Authorization, Scott Sullivan

Scott Sullivan

This Article presents a theory of authorizations for the use of military force (AUMFs) that reconcilesseparation of power failures in the current interpretive model. Existing doctrine applies the same text-driven models of statutory interpretation to AUMFs that are utilized with all other legal instruments. However, the conditions at birth, objectives and expected impacts underlying military force authorizations differ dramatically from typical legislation. AUMFs are focused but temporary corrective interventions intended to change the underlying facts that prompted their passage. This Article examines historical practice and utilizes institutionalist principles to develop a theory of AUMF decay that eschews text in favor …


The Road Most Travel: Is The Executive’S Growing Preeminence Making America More Like The Authoritarian Regimes It Fights So Hard Against?, Ryan T. Williams Aug 2014

The Road Most Travel: Is The Executive’S Growing Preeminence Making America More Like The Authoritarian Regimes It Fights So Hard Against?, Ryan T. Williams

Ryan T. Williams

Since September 11, 2001, the Executive branch of the Unites States government continues to accumulate power beyond which is granted to it under the U.S. Constitution. This Article examines how the Executive wields this additional power through a secret surveillance program, the indefinite detention of terror suspects, and the implementation of a kill list, where Americans and non-Americans alike are targeted and killed without any judicial determination of guilt or innocence. Moreover, Congress and the Judiciary have condoned the Executive’s unconstitutional power accumulation by not only remaining idle and refusing to challenge this taking, but by preventing other American citizens …


The Voice Of Reason—Why Recent Judicial Interpretations Of The Antiterrorism And Effective Death Penalty Act’S Restrictions On Habeas Corpus Are Wrong, Judith L. Ritter Nov 2013

The Voice Of Reason—Why Recent Judicial Interpretations Of The Antiterrorism And Effective Death Penalty Act’S Restrictions On Habeas Corpus Are Wrong, Judith L. Ritter

Judith L Ritter

By filing a petition for a federal writ of habeas corpus, a prisoner initiates a legal proceeding collateral to the direct appeals process. Federal statutes set forth the procedure and parameters of habeas corpus review. The Antiterrorism and Effective Death Penalty Act (AEDPA) first signed into law by President Clinton in 1996, included significant cut-backs in the availability of federal writs of habeas corpus. This was by congressional design. Yet, despite the dire predictions, for most of the first decade of AEDPA’s reign, the door to habeas relief remained open. More recently, however, the Supreme Court reinterpreted a key portion …


Terrorism And Associations, Ashutosh A. Bhagwat Feb 2013

Terrorism And Associations, Ashutosh A. Bhagwat

Ashutosh Bhagwat

The domestic manifestation of the War on Terror has produced the most difficult and sustained set of controversies regarding the limits on First Amendment protections for political speech and association since the anti-Communist crusades of the Red Scare and McCarthy eras. An examination of the types of domestic terrorism prosecutions that have become common since the September 11 attacks reveals continuing and unresolved conflicts between national security needs and traditional protections for speech and (especially) associational freedoms. Yet the courts have barely begun to acknowledge, much less address, these serious issues. In the Supreme Court’s only sustained engagement with these …


Disclosure's Effects: Wikileaks And Transparency, Mark Fenster Feb 2012

Disclosure's Effects: Wikileaks And Transparency, Mark Fenster

Mark Fenster

Constitutional, criminal, and administrative laws regulating government transparency, and the theories that support them, rest on the assumption that the disclosure of information has transformative effects: disclosure can inform, enlighten, and energize the public, or it can create great harm or stymie government operations. To resolve disputes over difficult cases, transparency laws and theories typically balance disclosure’s beneficial effects against its harmful ones. WikiLeaks and its vigilante approach to massive document leaks challenge the underlying assumption about disclosure’s effects in two ways. First, WikiLeaks’s ability to receive and distribute leaked information cheaply, quickly, and seemingly unstoppably enables it to bypass …