Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Law

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron Jan 2013

A Shattered Looking Glass: The Pitfalls And Potential Of The Mosaic Theory Of Fourth Amendment Privacy, David C. Gray, Danielle Keats Citron

Faculty Scholarship

On January 23, 2012, the Supreme Court issued a landmark non-decision in United States v. Jones. In that case, officers used a GPS-enabled device to track a suspect’s public movements for four weeks, amassing a considerable amount of data in the process. Although ultimately resolved on narrow grounds, five Justices joined concurring opinions in Jones expressing sympathy for some version of the “mosaic theory” of Fourth Amendment privacy. This theory holds that we maintain reasonable expectations of privacy in certain quantities of information even if we do not have such expectations in the constituent parts. This Article examines and …


Judicial Review For Enemy Fighters: The Court’S Fateful Turn In Ex Parte Quirin, The Nazi Saboteur Case, Andrew Kent Jan 2013

Judicial Review For Enemy Fighters: The Court’S Fateful Turn In Ex Parte Quirin, The Nazi Saboteur Case, Andrew Kent

Faculty Scholarship

The emerging conventional wisdom in the legal academy is that individual rights under the U.S. Constitution should be extended to noncitizens outside the United States. This claim - called globalism in my article - has been advanced with increasing vigor in recent years, most notably in response to legal positions taken by the Bush administration during the war on terror. Against a Global Constitution challenges the textual and historical grounds advanced to support the globalist conventional wisdom and demonstrates that they have remarkably little support. At the same time, the article adduces textual and historical evidence that noncitizens were among …


The Compromised Cargo Container: Terror In A Box, Taylor Simpson-Wood Jan 2013

The Compromised Cargo Container: Terror In A Box, Taylor Simpson-Wood

Faculty Scholarship

No abstract provided.


The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen Jan 2013

The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen

Faculty Scholarship

The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, roughly a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice.

This Article challenges the standard account of that disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an …


Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman Jan 2013

Self-Defensive Force Against Cyber Attacks: Legal, Strategic And Political Dimensions, Matthew C. Waxman

Faculty Scholarship

When does a cyber attack (or threat of cyber attack) give rise to a right of self-defense – including armed self-defense – and when should it? By "cyber attack" I mean the use of malicious computer code or electronic signals to alter, disrupt, degrade or destroy computer systems or networks or the information or programs on them. It is widely believed that sophisticated cyber attacks could cause massive harm – whether to military capabilities, economic and financial systems, or social functioning – because of modern reliance on system interconnectivity, though it is highly contested how vulnerable the United States and …


Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba Jan 2013

Global Governance In The Information Age: The Terrorist Finance Tracking Program, Hannah Bloch-Wehba

Faculty Scholarship

Europe has long been deemed "more protective" of privacy than the United States. In the context of transatlantic cooperation in the war on terrorism, divergences in privacy law and policy have become ever more apparent. As has always been the case, the same technologies that pose new and vital privacy issues with regard to personal information and private data are those that are important sources for government actors, including law enforcement and intelligence agencies. Despite the increasing reliance by national agencies on information flowing from other nations, regulation of information transfer, processing and sharing has been achieved largely outside of …


Disaggregating Disasters, Lisa Grow Sun, Ronnell Andersen Jones Jan 2013

Disaggregating Disasters, Lisa Grow Sun, Ronnell Andersen Jones

Faculty Scholarship

In the years since the September 11 attacks, scholars and commentators have criticized the emergence of both legal developments and policy rhetoric that blur the lines between war and terrorism. Unrecognized, but equally as damaging to democratic ideals—and potentially more devastating in practical effect—is the expansion of this trend beyond the context of terrorism to a much wider field of nonwar emergencies. Indeed, in recent years, war and national security rhetoric has come to permeate the legal and policy conversations on a wide variety of natural and technological disasters. This melding of disaster and war for purposes of justifying exceptions …


Chevron Meets Youngstown: National Security And The Administrative State, Joseph Landau Jan 2013

Chevron Meets Youngstown: National Security And The Administrative State, Joseph Landau

Faculty Scholarship

The past several years have witnessed a burst of scholarship at the intersection of national security and administrative law. Many supporters of this approach endorse a heightened, “super-strong” brand of Chevron deference to presidential decisionmaking during times of emergency. Believing that the Executive’s comparative advantage in expertise, access to information, and accountability warrant minimal judicial scrutiny, these Chevron-backers advance an Executive-centric view of national security powers. Other scholars, by contrast, dispute Chevron’s relevance to national security. These Chevron-detractors argue for an interventionist judiciary in national security matters. Both camps criticize the Supreme Court’s scaling of deference to the Executive after …


The Moral Responsibility Of Volunteer Soldiers, Charles J. Dunlap Jr. Jan 2013

The Moral Responsibility Of Volunteer Soldiers, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Regulating Resort To Force: Form And Substance Of The Un Charter Regime, Matthew C. Waxman Jan 2013

Regulating Resort To Force: Form And Substance Of The Un Charter Regime, Matthew C. Waxman

Faculty Scholarship

Much of the international legal debate about regulating force and self-defence takes place on a substantive axis, focusing on the scope of force prohibitions and exceptions. This article instead focuses on their doctrinal form, or modes of argumentation and analysis through which facts are assessed in relation to legal directives, to illuminate how many of the assumptions about substantive policy goals and risks tend to be coupled with other assumptions about the way international law operates in this field. It shows that the flexible, adaptable standards favoured by some states, scholars, and other international actors and the fixed rules and …


Military Justice, Charles J. Dunlap Jr. Jan 2013

Military Justice, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Biometric Id Cybersurveillance, Margaret Hu Jan 2013

Biometric Id Cybersurveillance, Margaret Hu

Faculty Scholarship

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Anticipatory Self-Defense And The Israeli-Iranian Crisis: Some Remarks, Charles J. Dunlap Jr. Jan 2013

Anticipatory Self-Defense And The Israeli-Iranian Crisis: Some Remarks, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


On “The Lure Of Strike”, Charles J. Dunlap Jr. Jan 2013

On “The Lure Of Strike”, Charles J. Dunlap Jr.

Faculty Scholarship

This commentary is in response to the special commentary, “The Lure of Strike” by Conrad Crane published in the Summer 2013 issue of Parameters (vol. 43, no. 2).


Formalism And State Secrets, Sudha Setty Jan 2013

Formalism And State Secrets, Sudha Setty

Faculty Scholarship

The state secrets privilege has received a tremendous amount of scholarly attention in the U.S. in the last decade. In September 2009, the Obama administration created a new policy that mandated a more rigorous internal administrative review prior to invoking the state secrets privilege. It appears as though this internal review process has resulted in little difference with regard to the invocation of the privilege at the pleadings stage in cases that allege torture and other human rights abuses. This chapter of the forthcoming comparative law volume Secrecy, National Security and the Vindication of Constitutional Law (David Cole, Federico Fabbrini …


Notice And An Opportunity To Be Heard Before The President Kills You, Richard Murphy, Afsheen John Radsan Jan 2013

Notice And An Opportunity To Be Heard Before The President Kills You, Richard Murphy, Afsheen John Radsan

Faculty Scholarship

The United States identifies particular people as especially dangerous members of al Qaeda, the Taliban, or associated forces, and then kills them. Critics insist that this targeted killing is illegal; some go so far as to call it assassination. The drone strike that killed Anwar al-Awlaki, an American citizen, generated furious criticism for purportedly violating his due process rights.

In spring 2013, President Obama responded in a wide-ranging speech on national security policy. On the topic of drones, he stated that terrorists are targeted only if they constitute “a continuing and imminent threat to the American people.” He announced that …