Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Personality Disruption As Mental Torture: The Cia, Interrogational Abuse, And The U.S. Torture Act, David Luban, Katherine S. Newell Dec 2019

Personality Disruption As Mental Torture: The Cia, Interrogational Abuse, And The U.S. Torture Act, David Luban, Katherine S. Newell

Georgetown Law Faculty Publications and Other Works

This Article is a contribution to the torture debate. It argues that the abusive interrogation tactics used by the United States in what was then called the “global war on terrorism” are, unequivocally, torture under U.S. law. To some readers, this might sound like déjà vu all over again. Hasn’t this issue been picked over for nearly fifteen years? It has, but we think the legal analysis we offer has been mostly overlooked. We argue that the basic character of the CIA’s interrogation of so-called “high-value detainees” has been misunderstood: both lawyers and commentators have placed far too much emphasis …


The President And Nuclear Weapons: Authorities, Limits, And Process, Mary B. Derosa, Ashley Nicolas Dec 2019

The President And Nuclear Weapons: Authorities, Limits, And Process, Mary B. Derosa, Ashley Nicolas

Georgetown Law Faculty Publications and Other Works

There is no more consequential decision for a president than ordering a nuclear strike. In the Cold War, the threat of sudden nuclear annihilation necessitated procedures emphasizing speed and efficiency and placing sole decision-making authority in the president’s hands. In today’s changed threat environment, the legal authorities and process a U.S. president would confront when making this grave decision merit reexamination. This paper serves as a resource in the national discussion about a president’s legal authority and the procedures for ordering a nuclear strike, and whether to update them.


Functional Secrecy, Laura K. Donohue Aug 2019

Functional Secrecy, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Many theorists consider secrecy inimical to liberal democracy. Precise examination of the role that it plays in contemporary government, however, including its strengths and weaknesses, has been limited. This chapter, accordingly, lays out a functional theory of secrecy, considering its role in the three branches of government in four contexts: deliberation, information security, law, and adjudicatory processes. Whether and to what extent cloaking information advances the interests of the state and society varies according to how it operates in each category. First, deliberative secrecy carries significant advantages: it can facilitate informed debate and honest exchange, allowing individuals to alter their …


Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue Apr 2019

Customs, Immigration, And Rights: Constitutional Limits On Electronic Border Searches, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The warrantless search of travelers’ electronic devices as they enter and exit the United States is rapidly increasing. While the Supreme Court has long recognized a border-search exception to the Fourth Amendment’s warrant requirement, it applies to only two interests: promoting the duty regime and preventing contraband from entering the country; and ensuring that individuals are legally admitted. The government’s recent use of the exception goes substantially beyond these matters. U.S. Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE) are using it to search electronic devices, and at times the cloud, for evidence of any criminal activity, …


Exoatmospheric Plowshares: Using A Nuclear Explosive Device For Planetary Defense Against An Incoming Asteroid, David A. Koplow Apr 2019

Exoatmospheric Plowshares: Using A Nuclear Explosive Device For Planetary Defense Against An Incoming Asteroid, David A. Koplow

Georgetown Law Faculty Publications and Other Works

What should be done if we suddenly discover a large asteroid on a collision course with Earth? The consequences of an impact could be enormous—scientists believe that such a strike 60 million years ago led to the extinction of the dinosaurs, and something of similar magnitude could happen again. Although no such extraterrestrial threat now looms on the horizon, astronomers concede that they cannot detect all the potentially hazardous “near-Earth objects,” and even more striking, they acknowledge that if such a danger were discerned, there is currently no proven capability for diverting or destroying it.

One possible response to this …


From Protecting Lives To Protecting States: Use Of Force Across The Threat Continuum, Milton C. Regan Jan 2019

From Protecting Lives To Protecting States: Use Of Force Across The Threat Continuum, Milton C. Regan

Georgetown Law Faculty Publications and Other Works

The increasing prominence in recent years of non-international armed conflicts that extend across state borders has strained the traditional legal categories that we use to regulate state use of force. Simultaneous with this phenomenon has been growing acceptance that human rights law and international humanitarian law should co-exist, with the former informing interpretations of the latter to varying degrees. Scholars continue to debate vigorously the implications of these developments and how these bodies of law should interact. As Kenneth Watkin’s book Fighting at the Legal Boundaries: Controlling the Use of Force in Contemporary Conflict observes, however, commanders have no choice …