Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 145

Full-Text Articles in Law

Subsidizing The Microchip Race: The Expanding Use Of National Security Arguments In International Trade, Victoria Walker Apr 2024

Subsidizing The Microchip Race: The Expanding Use Of National Security Arguments In International Trade, Victoria Walker

University of Michigan Journal of Law Reform

In 2018, China, India, the European Union, Canada, Mexico, Norway, Russia, Switzerland, and Turkey lodged complaints with the World Trade Organization’s (WTO) Dispute Settlement Body (DSB) in the case of Certain Measures on Steel and Aluminium Products. Each State alleged that the United States had violated international trade law by imposing a series of aggressive tariffs on steel and aluminum imports. President Donald Trump’s administration responded to these allegations by claiming that its actions were permissible under Article XXI of the General Agreement on Tariffs and Trade (GATT); a long-standing exception built into the international trade law framework that …


The National Security Consequences Of The Major Questions Doctrine, Timothy Meyer, Ganesh Sitaraman Oct 2023

The National Security Consequences Of The Major Questions Doctrine, Timothy Meyer, Ganesh Sitaraman

Michigan Law Review

The rise of the major questions doctrine—the rule that says that in order to delegate to the executive branch the power to resolve a “question of ‘deep economic and political significance’ that is central to [a] statutory scheme,” Congress must do so expressly—threatens to unmake the modern executive’s authority over foreign affairs, especially in matters of national security and interstate conflict. In the twenty-first century, global conflicts increasingly involve economic warfare, rather than (or in addition to) the force of arms.

In the United States, the executive power to levy economic sanctions and engage in other forms of economic warfare …


Measuring Corruption As A Threat To International Security: An Emerging Indicator For Enhancement Of Global Corruption Governance, Sungyong Kang Feb 2023

Measuring Corruption As A Threat To International Security: An Emerging Indicator For Enhancement Of Global Corruption Governance, Sungyong Kang

Michigan Journal of International Law

The conceptual changes to international security after the end of the Cold War, and particularly those following the al-Qaeda attacks of 2001, clarified the symbiotic relationship between corruption and international security: Corruption destroys the social political environment required to create human security and to ensure safety from terrorist attacks, and national borders increasingly fail to restrain its negative consequences.

To achieve human security though policy intervention in domestic affairs, global corruption governance relies on numerical indicators that measure corruption. By evaluating states through public comparison, indicators pressure states to improve their domestic institutions and structures to align them with the …


Pretext, Reality, And Verisimilitude: Truth-Seeking In The Supreme Court, Robert N. Weiner Jan 2023

Pretext, Reality, And Verisimilitude: Truth-Seeking In The Supreme Court, Robert N. Weiner

University of Michigan Journal of Law Reform

The assault on truth in recent public discourse makes it especially important that judicial decisions about Executive actions reflect the world as it is. Judges should not assume some idealized reality where good faith prevails, the motives of public officials are above reproach, and administrative processes are presumptively regular. Unfortunately, however, the Supreme Court has acted on naïve or counterfactual assumptions that limit judicial review of administrative or Presidential action. Such intentional judicial blindness or suspension of justified disbelief—such lack of verisimilitude—can sow doubt regarding the Court’s candor and impartiality.

In analyzing the Court’s fealty to objective reality in its …


Fighting Global Surveillance: Lessons From The American Muslim Community, Danna Z. Elmasry Jun 2022

Fighting Global Surveillance: Lessons From The American Muslim Community, Danna Z. Elmasry

University of Michigan Journal of Law Reform

The United States government has been spying on its citizens through a massive surveillance infrastructure that is unrestricted to a particular target or suspicion of wrongdoing. The statutory and regulatory authorities responsible for this infrastructure are sprawling and often secret. Built-in limitations and oversight mechanisms are riddled with loopholes or inaccessible due to exceedingly high thresholds. Litigation challenges to surveillance overreach often fail at standing. Under the current doctrine, plaintiffs must show that their own communications have been surveilled by a specific surveillance program. This Note contributes to surveillance reform by proposing a private right of action that sets the …


Un-Repeal: Reviving The Arms Control Impact Statements, David A. Koplow Jan 2022

Un-Repeal: Reviving The Arms Control Impact Statements, David A. Koplow

Michigan Journal of Environmental & Administrative Law

From the late 1970s into the early 1990s, U.S. federal law mandated the executive branch to prepare annual analytical documents known as Arms Control Impact Statements (ACIS). These instruments – obviously patterned after the Environmental Impact Statements (EIS), which had been inaugurated only a few years previously – were intended to prod the national security community to undertake more rigorous, multi-dimensional study of major weapons programs, and to provide Congress and the American public with enhanced, timely information about key arms procurement decisions.

However, unlike the EIS process – which rapidly became institutionalized, and which has proliferated to multiple tiers …


Adding Bite To The Zone Of Twilight: Applying Kisor To Revitalize The Youngstown Tripartite, Zachary W. Singer Dec 2021

Adding Bite To The Zone Of Twilight: Applying Kisor To Revitalize The Youngstown Tripartite, Zachary W. Singer

Michigan Journal of Environmental & Administrative Law

In the half century and more since Justice Jackson’s famous concurrence in Youngstown Sheet & Tube Co. v. Sawyer, the fog surrounding acceptable executive power in national security and foreign affairs has only thickened. Today, whether presidents are responding to the challenges of an amorphous global war on terrorism or a global pandemic, they act against a backdrop of ambiguous constitutional and statutory authorization and shifting precedent. While Justice Jackson outlined zones of presidential power by tying that power to congressional acts, the Court subsequently watered down the test by looking to other factors, like legislative intent. At other …


Trade Multilateralism And U.S. National Security: The Making Of The Gatt Security Exceptions, Mona Pinchis-Paulsen Jan 2020

Trade Multilateralism And U.S. National Security: The Making Of The Gatt Security Exceptions, Mona Pinchis-Paulsen

Michigan Journal of International Law

Today, there are an unprecedented number of disputes at the World Trade Organization (“WTO”) involving national security. The dramatic rise in trade disputes involving national security has resuscitated debate over the degree of discretion afforded to WTO Members as to when and how to invoke Article XXI, the Security Exception, of the General Agreement on Tariffs and Trade (“GATT”), with binding effect. The goal of this article is to shed light on contemporary questions and concerns involving national security and international trade, particularly questions involving the appropriate invocation of Article XXI GATT, through careful attention to the article’s historical context. …


Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii Jun 2019

Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii

University of Michigan Journal of Law Reform

On February 19, 2018, United Nations Secretary-General Antonio Guterres claimed that he was “absolutely convinced” that “the next war will begin with a massive cyber-attack to destroy military capacity . . . and paralyze basic infrastructure.” The Secretary-General’s greatest concern, however, is that he believes “there is no regulatory scheme for that type of warfare, it is not clear how the Geneva Convention or international humanitarian law applies to it.” Although Additional Protocol I to the Geneva Conventions (AP I) targeting laws generally identify who and what States may target in war, it expressly limits itself to attacks affecting people …


Separate And Unequal: The Law Of "Domestic" And "International" Terrorism, Shirin Sinnar Jan 2019

Separate And Unequal: The Law Of "Domestic" And "International" Terrorism, Shirin Sinnar

Michigan Law Review

U.S. law differentiates between two categories of terrorism. “International terrorism” covers threats with a putative international nexus, even when they stem from U.S. citizens or residents acting only within the United States. “Domestic terrorism” applies to political violence thought to be purely domestic in its origin and intended impact. The law permits broader surveillance, wider criminal charges, and more punitive treatment for crimes labeled international terrorism. Law enforcement agencies frequently consider U.S. Muslims “international” threats even when they have scant foreign ties. As a result, they police and punish them more intensely than white nationalists and other “domestic” threats. This …


Piracy And Due Process, Andrew Kent Oct 2018

Piracy And Due Process, Andrew Kent

Michigan Journal of International Law

This article explores in depth the law of nations, English domestic law, and English government practice from the late medieval period through the eighteenth century, and the U.S. constitutional law and government practice during the Founding and antebellum periods. I conclude that Chapman’s claims about due process and piracy suppression are incorrect. Both Parliament and the U.S. Congress; both the Crown and its counselors and U.S Presidents and their advisers; both the Royal Navy and the U.S. Navy; and commentators both English and American believed that (1) pirates on the high seas could lawfully be subject to extrajudicial killing, but …


How Safe Is Too Safe? Exemption 7(F) And The Withholding Of Critical Documents, Grant Snyder Oct 2018

How Safe Is Too Safe? Exemption 7(F) And The Withholding Of Critical Documents, Grant Snyder

Michigan Journal of Environmental & Administrative Law

The Freedom of Information Act (FOIA) is one of the main tools used by the American public to investigate the actions of its government. Congress created FOIA in an attempt to make most government documents available to the public. Today, the FOIA process favors government withholding. This bias comes from institutional issues in courts’ review of FOIA challenges.

In the environmental and administrative law context, federal agencies use many exemptions to withhold government records from citizen and non-profit groups. Agencies that are tasked with permitting and regulating energy pipelines and other environmentally-sensitive infrastructure now regularly cite Exemption 7(F). These agencies …


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Ms-13 As A Terrorist Organization: Risks For Central American Asylum Seekers, Jillian Blake Jan 2017

Ms-13 As A Terrorist Organization: Risks For Central American Asylum Seekers, Jillian Blake

Michigan Law Review Online

In its first year, the Trump Administration has used aggressive rhetoric in a crusade against the transnational gang MS‑13. In April, Attorney General Jeff Sessions called MS‑13 “one of the most violent gangs in the history of our country” and said that the gang “could qualify” as a terrorist organization. Since then, the administration has put its fight against MS‑13 at the front and center of its agenda. In a speech this summer, President Donald Trump called MS‑13 gang members “animals” and vowed to “dismantle, decimate and eradicate” their operations. The president has also used the threat posed by MS‑13 …


Extraterritorial Criminal Jurisdiction, Michael Farbiarz Feb 2016

Extraterritorial Criminal Jurisdiction, Michael Farbiarz

Michigan Law Review

Over and over again during the past few decades, the federal government has launched ambitious international prosecutions in the service of U.S. national security goals. These extraterritorial prosecutions of terrorists, arms traffickers, and drug lords have forced courts to grapple with a question that has long been latent in the law: What outer boundaries does the Constitution place on criminal jurisdiction? Answering this question, the federal courts have crafted a new due process jurisprudence. This Article argues that this jurisprudence is fundamentally wrong. By implicitly constitutionalizing concerns for international comity, the new due process jurisprudence usurps the popular branches’ traditional …


Rescuing Policy And Terror Victims: A Concerted Approach To The Ransom Dilemma, C. Elizabeth Bundy Jan 2016

Rescuing Policy And Terror Victims: A Concerted Approach To The Ransom Dilemma, C. Elizabeth Bundy

Michigan Journal of International Law

Part I of this Note will analyze the current framework governing hostage situations to determine the permissibility of ransom payments under international law. Part II will examine the two dominant positions that have developed among states and identify the justifications and shortcomings of each. Part III will conclude, firstly, that for states to develop a multilateral approach to hostage situations, they must take the lead within their respective domestic spheres and, secondly, that the option to negotiate for ransomed release should be preserved as an essential tool for confronting terrorist organizations.


Identifying The Start Of Conflict: Conflict Recognition, Operational Realities And Accountability In The Post-9/11 World, Laurie R. Blank, Benjamin R. Farley Oct 2015

Identifying The Start Of Conflict: Conflict Recognition, Operational Realities And Accountability In The Post-9/11 World, Laurie R. Blank, Benjamin R. Farley

Michigan Journal of International Law

On December 19, 2008, the Convening Authority for the United States Military Commissions at Guantanamo Bay referred charges against Abd al-Rahim Hussein Muhammed Abdu Al-Nashiri for his role in the October 2000 bombing of the U.S.S. Cole. The charge sheet alleged that al-Nashiri committed several acts—including murder in violation of the law of war, perfidy, destruction of property—”in the context of and associated with armed conflict” on or about October 12, 2000 in connection with the bombing. At the time of the attack, the statement that the United States was engaged in an armed conflict would have been a surprise …


A Demographic Threat? Proposed Reclassification Of Arab Americans On The 2020 Census, Khaled A. Beydoun Aug 2015

A Demographic Threat? Proposed Reclassification Of Arab Americans On The 2020 Census, Khaled A. Beydoun

Michigan Law Review First Impressions

“Arab Americans are white?” This question—commonly posed as a demonstration of shock or surprise—highlights the dissonance between how “Arab” and “white” are discursively imagined and understood in the United States today. These four words also encapsulate the dilemma that currently riddles Arab Americans. The population finds itself interlocked between formal classification as white, and de facto recognition as nonwhite. The Office of Management and Budget (OMB), the government agency that oversees the definition, categorization, and construction of racial categories, currently counts people from the Middle East and North Africa (MENA) as white. The United States Census Bureau (Census Bureau), the …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


The Sweeping Domestic War Powers Of Congress, Saikrishna Bangalore Prakash Jun 2015

The Sweeping Domestic War Powers Of Congress, Saikrishna Bangalore Prakash

Michigan Law Review

With the Habeas Clause standing as a curious exception, the Constitution seems mysteriously mute regarding federal authority during invasions and rebellions. In truth, the Constitution speaks volumes about these domestic wars. The inability to perceive the contours of the domestic wartime Constitution stems, in part, from unfamiliarity with the multifarious emergency legislation enacted during the Revolutionary War. During that war, state and national legislatures authorized the seizure of property, military trial of civilians, and temporary dictatorships. Ratified against the backdrop of these fairly recent wartime measures, the Constitution, via the Necessary and Proper Clause and other provisions, rather clearly augmented …


What Will It Take? Terrorism, Mass Murder, Gang Violence, And Suicides: The American Way, Or Do We Strive For A Better Way?, Katherine L. Record, Lawrence O. Gostin Apr 2014

What Will It Take? Terrorism, Mass Murder, Gang Violence, And Suicides: The American Way, Or Do We Strive For A Better Way?, Katherine L. Record, Lawrence O. Gostin

University of Michigan Journal of Law Reform

The assertion that access to firearms makes us safe, rather than increases the likelihood that oneself or a family member will die, is contradicted by a large body of evidence. Gunshots kill more than 30,000 Americans each year. Homicide accounts for approximately one-third of these deaths, with the remainder involving suicides and accidental gun discharges. In fact, firearms put us at greater risk of death than participating in war; in four months, as many Americans were shot dead in the United States as have died fighting in Iraq for an entire decade. Given these grim statistics, it would be reasonable …


Lost In Translation: The Accidental Origins Of Bond V. United States, Kevin L. Cope Apr 2014

Lost In Translation: The Accidental Origins Of Bond V. United States, Kevin L. Cope

Michigan Law Review First Impressions

One of the unusual features of cases about the constitutionality of federal statutes is that they are nearly always foreseeable. Even before the bill’s introduction in Congress, lawmakers are often aware that they are inviting a federal lawsuit. Anticipating a legal challenge, legislators and their staffs attempt to predict the courts’ views of the statute and adapt the bill accordingly. Generally speaking, the bigger the bill’s potential constitutional impact, the more foreseeable the resulting case. By this logic, jurists should have seen the constitutional issues in Bond v. United States from a mile away. In reality, they were foreseen by …


Special Administrative Measures And The War On Terror: When Do Extreme Pretrial Detention Measures Offend The Constitution?, Andrew Dalack Jan 2014

Special Administrative Measures And The War On Terror: When Do Extreme Pretrial Detention Measures Offend The Constitution?, Andrew Dalack

Michigan Journal of Race and Law

Our criminal justice system is founded upon a belief that one is innocent until proven guilty. This belief is what foists the burden of proving a person’s guilt upon the government and belies a statutory presumption in favor of allowing a defendant to remain free pending trial at the federal level. Though there are certainly circumstances in which a federal magistrate judge may—and sometimes must—remand a defendant to jail pending trial, it is well-settled that pretrial detention itself inherently prejudices the quality of a person’s defense. In some cases, a defendant’s pretrial conditions become so onerous that they become punitive …


The Legality Of Deliberate Miranda Violations: How Two-Step National Security Interrogations Undermine Miranda And Destabilize Fifth Amendment Protections, Lee Ross Crain Dec 2013

The Legality Of Deliberate Miranda Violations: How Two-Step National Security Interrogations Undermine Miranda And Destabilize Fifth Amendment Protections, Lee Ross Crain

Michigan Law Review

As part of the global “War on Terror,” federal agents intentionally delay issuing Miranda warnings to terrorism suspects during custodial interrogations. They delay the warnings presuming that unwarned suspects will more freely offer vital national security intelligence. After a suspect offers the information he has, agents administer Miranda warnings and attempt to elicit confessions that prosecutors can use at the suspect’s trial. No court has ruled on the constitutionality of this two-step national security interrogation process to determine whether admitting the second, warned confession is allowed under Miranda v. Arizona and its progeny. A fragmented Supreme Court examined two-step interrogations …


Beyond The Battlefield, Beyond Al Qaeda: The Destabilizing Legal Architecture Of Counterterrorism, Robert M. Chesney Nov 2013

Beyond The Battlefield, Beyond Al Qaeda: The Destabilizing Legal Architecture Of Counterterrorism, Robert M. Chesney

Michigan Law Review

By the end of the first post-9/11 decade, the legal architecture associated with the U.S. government’s use of military detention and lethal force in the counterterrorism setting had come to seem relatively stable, supported by a remarkable degree of cross-branch and cross-party consensus (manifested by legislation, judicial decisions, and consistency of policy across two very different presidential administrations). That stability is certain to collapse during the second post-9/11 decade, however, thanks to the rapid erosion of two factors that have played a critical role in generating the recent appearance of consensus: the existence of an undisputed armed conflict in Afghanistan, …


Humanity And National Security: The Law Of Mass Atrocity Response Operations, Keith A. Petty Jun 2013

Humanity And National Security: The Law Of Mass Atrocity Response Operations, Keith A. Petty

Michigan Journal of International Law

Among the greatest threats to global security is the slaughter of civilians. This is due to the inconsistent reaction of the international community to genocide and other atrocity crimes. Whether it was the slaughter of hundreds of thousands of Armenians in Turkey in 1915 or Rwandan Tutsis in 1994, mass murderers act with impunity when there is not a forceful response. Contrast these situations to Vietnam’s intervention in Cambodia in 1978 that put an end to the Khmer Rouge’s nightmarish killing fields, or the North Atlantic Treaty Organization’s (NATO) intervention in Kosovo in 1999 that protected ethnic Albanians from Serb …


The Fight To Frame Privacy, Woodrow Hartzog Apr 2013

The Fight To Frame Privacy, Woodrow Hartzog

Michigan Law Review

In his important new book, Nothing to Hide: The False Tradeoff Between Privacy and Security, Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that the predetermined abandonment of privacy in security-related disputes means that the structure of the privacy-security debate is inherently flawed. Solove understands that privacy is far too vital to our freedom and democracy to accept its inevitable demise. The central thesis of this Review is that Solove's polemic is a strong and desperately needed collection of frames that counterbalances the "nothing …


Toward Comprehensive Reform Of America's Emergency Law Regime, Patrick A. Thronson Jan 2013

Toward Comprehensive Reform Of America's Emergency Law Regime, Patrick A. Thronson

University of Michigan Journal of Law Reform

Unbenownst to most Americans, the United States is presently under thirty presidentially declared states of emergency. They confer vast powers on the Executive Branch, including the ability to financially incapacitate any person or organization in the United States, seize control of the nation's communications infrastructure, mobilize military forces, expand the permissible size of the military without congressional authorization, and extend tours of duty without consent from service personnel. Declared states of emergency may also activate Presidential Emergency Action Documents and other continuity-of-government procedures, which confer powers on the President-such as the unilateral suspension of habeas corpus-that appear fundamentally opposed to …


Trying Terrorism: Joint Criminal Enterprise, Material Support, And The Paradox Of International Criminal Law, Alexandra Link Jan 2013

Trying Terrorism: Joint Criminal Enterprise, Material Support, And The Paradox Of International Criminal Law, Alexandra Link

Michigan Journal of International Law

This Note will examine theoretical problems in ICL and public international law by evaluating the practical implications of applying ICL sources to find criminal liability outside the narrow confines of the international tribunals. It will examine the problems posed by the conflicting standards of the Rome Statute and ICTY jurisprudence as a matter of customary international law, the failure of U.S. courts to effectively confront the contextual and doctrinal analysis necessary to determine the limitations of these sources, and the proper application of these sources to the issues raised in Hamdan II and Al Bahlul. Viewing ICL through the lens …


Reconceptualizing States Of Emergency Under International Human Rights Law: Theory, Legal Doctrine, And Politics, Scott P. Sheeran Jan 2013

Reconceptualizing States Of Emergency Under International Human Rights Law: Theory, Legal Doctrine, And Politics, Scott P. Sheeran

Michigan Journal of International Law

States of emergency are today one of the most serious challenges to the implementation of international human rights law (IHRL). They have become common practice and are associated with severe human rights violations as evidenced by the Arab Spring. The international jurisprudence on states of emergency is inconsistent and divergent, and what now constitutes a public emergency is ubiquitous. This trend is underpinned by excessive judicial deference and abdication of the legal review of states' often dubious claims of a state of emergency. The legal regime, as positively expressed in international human rights treaties, does not adequately reflect the underlying …