Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Terrorism (47)
- Treaties (28)
- Surveillance (14)
- United Nations (14)
- Intelligence gathering (12)
-
- Terrorists (12)
- Armed conflicts (11)
- Self-defense (11)
- Espionage (10)
- Security (10)
- Weapons (10)
- Detention (9)
- Armed forces (7)
- Book reviews (7)
- Communism (7)
- Crimes (7)
- Law reform (7)
- Privacy (7)
- Security Council (7)
- Use of force (7)
- Democracy (6)
- Due process (6)
- Israel (6)
- Sanctions (6)
- Weapons of mass destruction (6)
- 9/11 (5)
- Arms control (5)
- Authority (5)
- Constitution (5)
- Counterterrorism (5)
- Publication Year
Articles 1 - 30 of 145
Full-Text Articles in Law
Subsidizing The Microchip Race: The Expanding Use Of National Security Arguments In International Trade, Victoria Walker
Subsidizing The Microchip Race: The Expanding Use Of National Security Arguments In International Trade, Victoria Walker
University of Michigan Journal of Law Reform
In 2018, China, India, the European Union, Canada, Mexico, Norway, Russia, Switzerland, and Turkey lodged complaints with the World Trade Organization’s (WTO) Dispute Settlement Body (DSB) in the case of Certain Measures on Steel and Aluminium Products. Each State alleged that the United States had violated international trade law by imposing a series of aggressive tariffs on steel and aluminum imports. President Donald Trump’s administration responded to these allegations by claiming that its actions were permissible under Article XXI of the General Agreement on Tariffs and Trade (GATT); a long-standing exception built into the international trade law framework that …
The National Security Consequences Of The Major Questions Doctrine, Timothy Meyer, Ganesh Sitaraman
The National Security Consequences Of The Major Questions Doctrine, Timothy Meyer, Ganesh Sitaraman
Michigan Law Review
The rise of the major questions doctrine—the rule that says that in order to delegate to the executive branch the power to resolve a “question of ‘deep economic and political significance’ that is central to [a] statutory scheme,” Congress must do so expressly—threatens to unmake the modern executive’s authority over foreign affairs, especially in matters of national security and interstate conflict. In the twenty-first century, global conflicts increasingly involve economic warfare, rather than (or in addition to) the force of arms.
In the United States, the executive power to levy economic sanctions and engage in other forms of economic warfare …
Measuring Corruption As A Threat To International Security: An Emerging Indicator For Enhancement Of Global Corruption Governance, Sungyong Kang
Measuring Corruption As A Threat To International Security: An Emerging Indicator For Enhancement Of Global Corruption Governance, Sungyong Kang
Michigan Journal of International Law
The conceptual changes to international security after the end of the Cold War, and particularly those following the al-Qaeda attacks of 2001, clarified the symbiotic relationship between corruption and international security: Corruption destroys the social political environment required to create human security and to ensure safety from terrorist attacks, and national borders increasingly fail to restrain its negative consequences.
To achieve human security though policy intervention in domestic affairs, global corruption governance relies on numerical indicators that measure corruption. By evaluating states through public comparison, indicators pressure states to improve their domestic institutions and structures to align them with the …
Pretext, Reality, And Verisimilitude: Truth-Seeking In The Supreme Court, Robert N. Weiner
Pretext, Reality, And Verisimilitude: Truth-Seeking In The Supreme Court, Robert N. Weiner
University of Michigan Journal of Law Reform
The assault on truth in recent public discourse makes it especially important that judicial decisions about Executive actions reflect the world as it is. Judges should not assume some idealized reality where good faith prevails, the motives of public officials are above reproach, and administrative processes are presumptively regular. Unfortunately, however, the Supreme Court has acted on naïve or counterfactual assumptions that limit judicial review of administrative or Presidential action. Such intentional judicial blindness or suspension of justified disbelief—such lack of verisimilitude—can sow doubt regarding the Court’s candor and impartiality.
In analyzing the Court’s fealty to objective reality in its …
Fighting Global Surveillance: Lessons From The American Muslim Community, Danna Z. Elmasry
Fighting Global Surveillance: Lessons From The American Muslim Community, Danna Z. Elmasry
University of Michigan Journal of Law Reform
The United States government has been spying on its citizens through a massive surveillance infrastructure that is unrestricted to a particular target or suspicion of wrongdoing. The statutory and regulatory authorities responsible for this infrastructure are sprawling and often secret. Built-in limitations and oversight mechanisms are riddled with loopholes or inaccessible due to exceedingly high thresholds. Litigation challenges to surveillance overreach often fail at standing. Under the current doctrine, plaintiffs must show that their own communications have been surveilled by a specific surveillance program. This Note contributes to surveillance reform by proposing a private right of action that sets the …
Un-Repeal: Reviving The Arms Control Impact Statements, David A. Koplow
Un-Repeal: Reviving The Arms Control Impact Statements, David A. Koplow
Michigan Journal of Environmental & Administrative Law
From the late 1970s into the early 1990s, U.S. federal law mandated the executive branch to prepare annual analytical documents known as Arms Control Impact Statements (ACIS). These instruments – obviously patterned after the Environmental Impact Statements (EIS), which had been inaugurated only a few years previously – were intended to prod the national security community to undertake more rigorous, multi-dimensional study of major weapons programs, and to provide Congress and the American public with enhanced, timely information about key arms procurement decisions.
However, unlike the EIS process – which rapidly became institutionalized, and which has proliferated to multiple tiers …
Adding Bite To The Zone Of Twilight: Applying Kisor To Revitalize The Youngstown Tripartite, Zachary W. Singer
Adding Bite To The Zone Of Twilight: Applying Kisor To Revitalize The Youngstown Tripartite, Zachary W. Singer
Michigan Journal of Environmental & Administrative Law
In the half century and more since Justice Jackson’s famous concurrence in Youngstown Sheet & Tube Co. v. Sawyer, the fog surrounding acceptable executive power in national security and foreign affairs has only thickened. Today, whether presidents are responding to the challenges of an amorphous global war on terrorism or a global pandemic, they act against a backdrop of ambiguous constitutional and statutory authorization and shifting precedent. While Justice Jackson outlined zones of presidential power by tying that power to congressional acts, the Court subsequently watered down the test by looking to other factors, like legislative intent. At other …
Trade Multilateralism And U.S. National Security: The Making Of The Gatt Security Exceptions, Mona Pinchis-Paulsen
Trade Multilateralism And U.S. National Security: The Making Of The Gatt Security Exceptions, Mona Pinchis-Paulsen
Michigan Journal of International Law
Today, there are an unprecedented number of disputes at the World Trade Organization (“WTO”) involving national security. The dramatic rise in trade disputes involving national security has resuscitated debate over the degree of discretion afforded to WTO Members as to when and how to invoke Article XXI, the Security Exception, of the General Agreement on Tariffs and Trade (“GATT”), with binding effect. The goal of this article is to shed light on contemporary questions and concerns involving national security and international trade, particularly questions involving the appropriate invocation of Article XXI GATT, through careful attention to the article’s historical context. …
Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii
Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii
University of Michigan Journal of Law Reform
On February 19, 2018, United Nations Secretary-General Antonio Guterres claimed that he was “absolutely convinced” that “the next war will begin with a massive cyber-attack to destroy military capacity . . . and paralyze basic infrastructure.” The Secretary-General’s greatest concern, however, is that he believes “there is no regulatory scheme for that type of warfare, it is not clear how the Geneva Convention or international humanitarian law applies to it.” Although Additional Protocol I to the Geneva Conventions (AP I) targeting laws generally identify who and what States may target in war, it expressly limits itself to attacks affecting people …
Separate And Unequal: The Law Of "Domestic" And "International" Terrorism, Shirin Sinnar
Separate And Unequal: The Law Of "Domestic" And "International" Terrorism, Shirin Sinnar
Michigan Law Review
U.S. law differentiates between two categories of terrorism. “International terrorism” covers threats with a putative international nexus, even when they stem from U.S. citizens or residents acting only within the United States. “Domestic terrorism” applies to political violence thought to be purely domestic in its origin and intended impact. The law permits broader surveillance, wider criminal charges, and more punitive treatment for crimes labeled international terrorism. Law enforcement agencies frequently consider U.S. Muslims “international” threats even when they have scant foreign ties. As a result, they police and punish them more intensely than white nationalists and other “domestic” threats. This …
Piracy And Due Process, Andrew Kent
Piracy And Due Process, Andrew Kent
Michigan Journal of International Law
This article explores in depth the law of nations, English domestic law, and English government practice from the late medieval period through the eighteenth century, and the U.S. constitutional law and government practice during the Founding and antebellum periods. I conclude that Chapman’s claims about due process and piracy suppression are incorrect. Both Parliament and the U.S. Congress; both the Crown and its counselors and U.S Presidents and their advisers; both the Royal Navy and the U.S. Navy; and commentators both English and American believed that (1) pirates on the high seas could lawfully be subject to extrajudicial killing, but …
How Safe Is Too Safe? Exemption 7(F) And The Withholding Of Critical Documents, Grant Snyder
How Safe Is Too Safe? Exemption 7(F) And The Withholding Of Critical Documents, Grant Snyder
Michigan Journal of Environmental & Administrative Law
The Freedom of Information Act (FOIA) is one of the main tools used by the American public to investigate the actions of its government. Congress created FOIA in an attempt to make most government documents available to the public. Today, the FOIA process favors government withholding. This bias comes from institutional issues in courts’ review of FOIA challenges.
In the environmental and administrative law context, federal agencies use many exemptions to withhold government records from citizen and non-profit groups. Agencies that are tasked with permitting and regulating energy pipelines and other environmentally-sensitive infrastructure now regularly cite Exemption 7(F). These agencies …
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
University of Michigan Journal of Law Reform
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.
Ms-13 As A Terrorist Organization: Risks For Central American Asylum Seekers, Jillian Blake
Ms-13 As A Terrorist Organization: Risks For Central American Asylum Seekers, Jillian Blake
Michigan Law Review Online
In its first year, the Trump Administration has used aggressive rhetoric in a crusade against the transnational gang MS‑13. In April, Attorney General Jeff Sessions called MS‑13 “one of the most violent gangs in the history of our country” and said that the gang “could qualify” as a terrorist organization. Since then, the administration has put its fight against MS‑13 at the front and center of its agenda. In a speech this summer, President Donald Trump called MS‑13 gang members “animals” and vowed to “dismantle, decimate and eradicate” their operations. The president has also used the threat posed by MS‑13 …
Extraterritorial Criminal Jurisdiction, Michael Farbiarz
Extraterritorial Criminal Jurisdiction, Michael Farbiarz
Michigan Law Review
Over and over again during the past few decades, the federal government has launched ambitious international prosecutions in the service of U.S. national security goals. These extraterritorial prosecutions of terrorists, arms traffickers, and drug lords have forced courts to grapple with a question that has long been latent in the law: What outer boundaries does the Constitution place on criminal jurisdiction? Answering this question, the federal courts have crafted a new due process jurisprudence. This Article argues that this jurisprudence is fundamentally wrong. By implicitly constitutionalizing concerns for international comity, the new due process jurisprudence usurps the popular branches’ traditional …
Rescuing Policy And Terror Victims: A Concerted Approach To The Ransom Dilemma, C. Elizabeth Bundy
Rescuing Policy And Terror Victims: A Concerted Approach To The Ransom Dilemma, C. Elizabeth Bundy
Michigan Journal of International Law
Part I of this Note will analyze the current framework governing hostage situations to determine the permissibility of ransom payments under international law. Part II will examine the two dominant positions that have developed among states and identify the justifications and shortcomings of each. Part III will conclude, firstly, that for states to develop a multilateral approach to hostage situations, they must take the lead within their respective domestic spheres and, secondly, that the option to negotiate for ransomed release should be preserved as an essential tool for confronting terrorist organizations.
Identifying The Start Of Conflict: Conflict Recognition, Operational Realities And Accountability In The Post-9/11 World, Laurie R. Blank, Benjamin R. Farley
Identifying The Start Of Conflict: Conflict Recognition, Operational Realities And Accountability In The Post-9/11 World, Laurie R. Blank, Benjamin R. Farley
Michigan Journal of International Law
On December 19, 2008, the Convening Authority for the United States Military Commissions at Guantanamo Bay referred charges against Abd al-Rahim Hussein Muhammed Abdu Al-Nashiri for his role in the October 2000 bombing of the U.S.S. Cole. The charge sheet alleged that al-Nashiri committed several acts—including murder in violation of the law of war, perfidy, destruction of property—”in the context of and associated with armed conflict” on or about October 12, 2000 in connection with the bombing. At the time of the attack, the statement that the United States was engaged in an armed conflict would have been a surprise …
A Demographic Threat? Proposed Reclassification Of Arab Americans On The 2020 Census, Khaled A. Beydoun
A Demographic Threat? Proposed Reclassification Of Arab Americans On The 2020 Census, Khaled A. Beydoun
Michigan Law Review First Impressions
“Arab Americans are white?” This question—commonly posed as a demonstration of shock or surprise—highlights the dissonance between how “Arab” and “white” are discursively imagined and understood in the United States today. These four words also encapsulate the dilemma that currently riddles Arab Americans. The population finds itself interlocked between formal classification as white, and de facto recognition as nonwhite. The Office of Management and Budget (OMB), the government agency that oversees the definition, categorization, and construction of racial categories, currently counts people from the Middle East and North Africa (MENA) as white. The United States Census Bureau (Census Bureau), the …
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
The Sweeping Domestic War Powers Of Congress, Saikrishna Bangalore Prakash
The Sweeping Domestic War Powers Of Congress, Saikrishna Bangalore Prakash
Michigan Law Review
With the Habeas Clause standing as a curious exception, the Constitution seems mysteriously mute regarding federal authority during invasions and rebellions. In truth, the Constitution speaks volumes about these domestic wars. The inability to perceive the contours of the domestic wartime Constitution stems, in part, from unfamiliarity with the multifarious emergency legislation enacted during the Revolutionary War. During that war, state and national legislatures authorized the seizure of property, military trial of civilians, and temporary dictatorships. Ratified against the backdrop of these fairly recent wartime measures, the Constitution, via the Necessary and Proper Clause and other provisions, rather clearly augmented …
What Will It Take? Terrorism, Mass Murder, Gang Violence, And Suicides: The American Way, Or Do We Strive For A Better Way?, Katherine L. Record, Lawrence O. Gostin
What Will It Take? Terrorism, Mass Murder, Gang Violence, And Suicides: The American Way, Or Do We Strive For A Better Way?, Katherine L. Record, Lawrence O. Gostin
University of Michigan Journal of Law Reform
The assertion that access to firearms makes us safe, rather than increases the likelihood that oneself or a family member will die, is contradicted by a large body of evidence. Gunshots kill more than 30,000 Americans each year. Homicide accounts for approximately one-third of these deaths, with the remainder involving suicides and accidental gun discharges. In fact, firearms put us at greater risk of death than participating in war; in four months, as many Americans were shot dead in the United States as have died fighting in Iraq for an entire decade. Given these grim statistics, it would be reasonable …
Lost In Translation: The Accidental Origins Of Bond V. United States, Kevin L. Cope
Lost In Translation: The Accidental Origins Of Bond V. United States, Kevin L. Cope
Michigan Law Review First Impressions
One of the unusual features of cases about the constitutionality of federal statutes is that they are nearly always foreseeable. Even before the bill’s introduction in Congress, lawmakers are often aware that they are inviting a federal lawsuit. Anticipating a legal challenge, legislators and their staffs attempt to predict the courts’ views of the statute and adapt the bill accordingly. Generally speaking, the bigger the bill’s potential constitutional impact, the more foreseeable the resulting case. By this logic, jurists should have seen the constitutional issues in Bond v. United States from a mile away. In reality, they were foreseen by …
Special Administrative Measures And The War On Terror: When Do Extreme Pretrial Detention Measures Offend The Constitution?, Andrew Dalack
Special Administrative Measures And The War On Terror: When Do Extreme Pretrial Detention Measures Offend The Constitution?, Andrew Dalack
Michigan Journal of Race and Law
Our criminal justice system is founded upon a belief that one is innocent until proven guilty. This belief is what foists the burden of proving a person’s guilt upon the government and belies a statutory presumption in favor of allowing a defendant to remain free pending trial at the federal level. Though there are certainly circumstances in which a federal magistrate judge may—and sometimes must—remand a defendant to jail pending trial, it is well-settled that pretrial detention itself inherently prejudices the quality of a person’s defense. In some cases, a defendant’s pretrial conditions become so onerous that they become punitive …
The Legality Of Deliberate Miranda Violations: How Two-Step National Security Interrogations Undermine Miranda And Destabilize Fifth Amendment Protections, Lee Ross Crain
Michigan Law Review
As part of the global “War on Terror,” federal agents intentionally delay issuing Miranda warnings to terrorism suspects during custodial interrogations. They delay the warnings presuming that unwarned suspects will more freely offer vital national security intelligence. After a suspect offers the information he has, agents administer Miranda warnings and attempt to elicit confessions that prosecutors can use at the suspect’s trial. No court has ruled on the constitutionality of this two-step national security interrogation process to determine whether admitting the second, warned confession is allowed under Miranda v. Arizona and its progeny. A fragmented Supreme Court examined two-step interrogations …
Beyond The Battlefield, Beyond Al Qaeda: The Destabilizing Legal Architecture Of Counterterrorism, Robert M. Chesney
Beyond The Battlefield, Beyond Al Qaeda: The Destabilizing Legal Architecture Of Counterterrorism, Robert M. Chesney
Michigan Law Review
By the end of the first post-9/11 decade, the legal architecture associated with the U.S. government’s use of military detention and lethal force in the counterterrorism setting had come to seem relatively stable, supported by a remarkable degree of cross-branch and cross-party consensus (manifested by legislation, judicial decisions, and consistency of policy across two very different presidential administrations). That stability is certain to collapse during the second post-9/11 decade, however, thanks to the rapid erosion of two factors that have played a critical role in generating the recent appearance of consensus: the existence of an undisputed armed conflict in Afghanistan, …
Humanity And National Security: The Law Of Mass Atrocity Response Operations, Keith A. Petty
Humanity And National Security: The Law Of Mass Atrocity Response Operations, Keith A. Petty
Michigan Journal of International Law
Among the greatest threats to global security is the slaughter of civilians. This is due to the inconsistent reaction of the international community to genocide and other atrocity crimes. Whether it was the slaughter of hundreds of thousands of Armenians in Turkey in 1915 or Rwandan Tutsis in 1994, mass murderers act with impunity when there is not a forceful response. Contrast these situations to Vietnam’s intervention in Cambodia in 1978 that put an end to the Khmer Rouge’s nightmarish killing fields, or the North Atlantic Treaty Organization’s (NATO) intervention in Kosovo in 1999 that protected ethnic Albanians from Serb …
The Fight To Frame Privacy, Woodrow Hartzog
The Fight To Frame Privacy, Woodrow Hartzog
Michigan Law Review
In his important new book, Nothing to Hide: The False Tradeoff Between Privacy and Security, Daniel Solove argues that if we continue to view privacy and security as diametrically opposed to each other, privacy will always lose. Solove argues that the predetermined abandonment of privacy in security-related disputes means that the structure of the privacy-security debate is inherently flawed. Solove understands that privacy is far too vital to our freedom and democracy to accept its inevitable demise. The central thesis of this Review is that Solove's polemic is a strong and desperately needed collection of frames that counterbalances the "nothing …
Toward Comprehensive Reform Of America's Emergency Law Regime, Patrick A. Thronson
Toward Comprehensive Reform Of America's Emergency Law Regime, Patrick A. Thronson
University of Michigan Journal of Law Reform
Unbenownst to most Americans, the United States is presently under thirty presidentially declared states of emergency. They confer vast powers on the Executive Branch, including the ability to financially incapacitate any person or organization in the United States, seize control of the nation's communications infrastructure, mobilize military forces, expand the permissible size of the military without congressional authorization, and extend tours of duty without consent from service personnel. Declared states of emergency may also activate Presidential Emergency Action Documents and other continuity-of-government procedures, which confer powers on the President-such as the unilateral suspension of habeas corpus-that appear fundamentally opposed to …
Trying Terrorism: Joint Criminal Enterprise, Material Support, And The Paradox Of International Criminal Law, Alexandra Link
Trying Terrorism: Joint Criminal Enterprise, Material Support, And The Paradox Of International Criminal Law, Alexandra Link
Michigan Journal of International Law
This Note will examine theoretical problems in ICL and public international law by evaluating the practical implications of applying ICL sources to find criminal liability outside the narrow confines of the international tribunals. It will examine the problems posed by the conflicting standards of the Rome Statute and ICTY jurisprudence as a matter of customary international law, the failure of U.S. courts to effectively confront the contextual and doctrinal analysis necessary to determine the limitations of these sources, and the proper application of these sources to the issues raised in Hamdan II and Al Bahlul. Viewing ICL through the lens …
Reconceptualizing States Of Emergency Under International Human Rights Law: Theory, Legal Doctrine, And Politics, Scott P. Sheeran
Reconceptualizing States Of Emergency Under International Human Rights Law: Theory, Legal Doctrine, And Politics, Scott P. Sheeran
Michigan Journal of International Law
States of emergency are today one of the most serious challenges to the implementation of international human rights law (IHRL). They have become common practice and are associated with severe human rights violations as evidenced by the Arab Spring. The international jurisprudence on states of emergency is inconsistent and divergent, and what now constitutes a public emergency is ubiquitous. This trend is underpinned by excessive judicial deference and abdication of the legal review of states' often dubious claims of a state of emergency. The legal regime, as positively expressed in international human rights treaties, does not adequately reflect the underlying …