Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

Series

2014

Institution
Keyword
Publication

Articles 1 - 30 of 64

Full-Text Articles in Law

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen Dec 2014

Cyber Sovereignty: The Way Ahead, Eric Talbot Jensen

Faculty Scholarship

The last few years are full of reports of cyber incidents, some of which have caused significant damage. Each of these cyber events raise important questions about the role and responsibility of States with respect to cyber incidents. The answer to these questions revolves in large part around the international law doctrine of sovereignty. The extent to which nations exercise sovereignty over cyberspace and cyber infrastructure will provide key answers to how much control States must exercise and how much responsibility States must accept for harmful cyber activities when they fail to adequately do so. This article argues that States …


The Ssci Report And Its Critics: Torturing Efficacy, Peter Margulies Dec 2014

The Ssci Report And Its Critics: Torturing Efficacy, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Dynamic Surveillance: Evolving Procedures In Metadata And Foreign Content Collection After Snowden, Peter Margulies Dec 2014

Dynamic Surveillance: Evolving Procedures In Metadata And Foreign Content Collection After Snowden, Peter Margulies

Law Faculty Scholarship

No abstract provided.


The President’S National Security Agenda Curtailing Ebola, Safeguarding The Future, Lawrence O. Gostin, Henry A. Waxman, William Foege Nov 2014

The President’S National Security Agenda Curtailing Ebola, Safeguarding The Future, Lawrence O. Gostin, Henry A. Waxman, William Foege

Georgetown Law Faculty Publications and Other Works

A clear lesson of the Ebola epidemic in West Africa is the need for strong public health systems globally, including in the United States. Ebola has highlighted the dangers of weak public health systems, from the immense shortage of health workers in West Africa to the budget cuts at the U.S. Centers for Disease Control and Prevention. In response to Ebola and the broader threat of infectious disease, President Obama has proposed a $6.2 billion supplemental funding request to Congress. The supplemental would surge resources for containing and treating Ebola in West Africa -- including a reserve of funds to …


China's Nine-Dashed Map: Maritime Source Of Geopolitical Tension, Bert Chapman Oct 2014

China's Nine-Dashed Map: Maritime Source Of Geopolitical Tension, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

The South China Sea (SCS) is becoming an increasingly contentious source of geopolitical tension due to its significance as an international trade route, possessor of potentially significant oil and natural gas resources, China’s increasing diplomatic and military assertiveness, and the U.S.’ recent and ongoing Pacific Pivot strategy. Countries as varied as China, Taiwan, the Philippines, Indonesia and other adjacent countries have claims on this region’s islands and natural resources. China has been particularly assertive in asserting its SCS claims by creating a nine-dash line map claiming to give it de facto maritime control over this entire region without regard to …


The Al Bahlul Argument: Article Iii, Conspiracy, And Precepts Of International Law, Peter Margulies Oct 2014

The Al Bahlul Argument: Article Iii, Conspiracy, And Precepts Of International Law, Peter Margulies

Law Faculty Scholarship

No abstract provided.


A Training Partnership That Began With A Grant, Vernon Herron, Laura Hoch, Alexandra Podolny Oct 2014

A Training Partnership That Began With A Grant, Vernon Herron, Laura Hoch, Alexandra Podolny

Homeland Security Publications

No abstract provided.


Reply To Steve On Al Bahlul, The “Law Of War,” And Article Iii, Peter Margulies Oct 2014

Reply To Steve On Al Bahlul, The “Law Of War,” And Article Iii, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Newsletter Fall 2014 Oct 2014

Newsletter Fall 2014

Newsletter

No abstract provided.


Chinese Hackers And Their New Targets—Federal Employees, Ellen Cornelius Oct 2014

Chinese Hackers And Their New Targets—Federal Employees, Ellen Cornelius

Homeland Security Publications

No abstract provided.


Article Iii, The Framers, And Al Bahlul: A Reply To Steve, Peter Margulies Sep 2014

Article Iii, The Framers, And Al Bahlul: A Reply To Steve, Peter Margulies

Law Faculty Scholarship

No abstract provided.


High Technology, Consumer Privacy, And U.S. National Security : Hearing Before The Subcomm. On Commerce, Manufacturing, And Trade Of The H. Comm. On Energy And Commerce, 113th Cong., September 17, 2014 (Remarks By Professor Laura K. Donohue, Geo. U. L. Center), Laura K. Donohue Sep 2014

High Technology, Consumer Privacy, And U.S. National Security : Hearing Before The Subcomm. On Commerce, Manufacturing, And Trade Of The H. Comm. On Energy And Commerce, 113th Cong., September 17, 2014 (Remarks By Professor Laura K. Donohue, Geo. U. L. Center), Laura K. Donohue

Testimony Before Congress

Documents released over the past year detailing the National Security Agency’s telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) directly implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. firms, the economy, and U.S. national security.

The first Snowden documents, printed June 5, 2013, revealed that the U.S. government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had …


Cross Border Data Flows: Could Foreign Protectionism Hurt U.S. Jobs?: Hearing Before The Subcomm. On Commerce, Mfg. & Trade Of The H. Comm. On Energy & Commerce, 113th Cong., Sept. 17, 2014 (Statement Of Laura K. Donohue), Laura K. Donohue Sep 2014

Cross Border Data Flows: Could Foreign Protectionism Hurt U.S. Jobs?: Hearing Before The Subcomm. On Commerce, Mfg. & Trade Of The H. Comm. On Energy & Commerce, 113th Cong., Sept. 17, 2014 (Statement Of Laura K. Donohue), Laura K. Donohue

Testimony Before Congress

Documents released over the past year detailing the National Security Agency’s telephony metadata collection program and interception of international content under the Foreign Intelligence Surveillance Act (FISA) directly implicated U.S. high technology companies in government surveillance. The result was an immediate, and detrimental, impact on U.S. firms, the economy, and U.S. national security.

The first Snowden documents, printed June 5, 2013, revealed that the U.S. government had served orders on Verizon, directing the company to turn over telephony metadata under Section 215 of the USA PATRIOT Act. The following day, The Guardian published classified slides detailing how the NSA had …


Al Bahlul And Article Iii: A Reply To Marty And Steve, Peter Margulies, Peter Margulies Jul 2014

Al Bahlul And Article Iii: A Reply To Marty And Steve, Peter Margulies, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Bahlul And The Power Of Congress To Define International Law, Peter Margulies Jul 2014

Bahlul And The Power Of Congress To Define International Law, Peter Margulies

Law Faculty Scholarship

No abstract provided.


The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies Jul 2014

The Pclob On Human Rights & 702: Punt Or Long Game?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Thinking Ahead - Implementing The Nist Cybersecurity Framework To Protect From Potential Legal Liability, Markus Rauschecker Jul 2014

Thinking Ahead - Implementing The Nist Cybersecurity Framework To Protect From Potential Legal Liability, Markus Rauschecker

Homeland Security Publications

No abstract provided.


Abstention, Balancing The Equities, And Armed Conflict In Al-Nashiri: A Reply To Steve Vladeck And Kevin Jon Heller, Peter Margulies May 2014

Abstention, Balancing The Equities, And Armed Conflict In Al-Nashiri: A Reply To Steve Vladeck And Kevin Jon Heller, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Al-Nashiri, The Cole Bombing, And The Start Of The Conflict With Al-Qaeda, Peter Margulies May 2014

Al-Nashiri, The Cole Bombing, And The Start Of The Conflict With Al-Qaeda, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Obama Doesn’T Deserve Deference On Drone Deaths, Lauren Carasik May 2014

Obama Doesn’T Deserve Deference On Drone Deaths, Lauren Carasik

Media Presence

No abstract provided.


Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies Apr 2014

Yale Symposium: Unpacking Nsa's Global Problem, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Targeted Killing: United States Policy, Constitional Law, And Due Process, Mark Febrizio Apr 2014

Targeted Killing: United States Policy, Constitional Law, And Due Process, Mark Febrizio

Senior Honors Theses

The increased incorporation of targeted killing, primarily through the use of unmanned aerial vehicles, into United States policy raises salient questions regarding its consistency with the U.S. Constitution. This paper contrasts interpretations of constitutional due process with the current legal framework for conducting targeted killing operations. The Fifth Amendment to the Constitution establishes the due process owed to U.S. citizens. This paper determines that the killing of Anwar al-Awlaki, an American citizen, was accomplished in a manner inconsistent with constitutional due process and demonstrates an over-extension of executive branch power. This paper examines one scholarly recommendation that seeks to increase …


The Difference Prevention Makes: Regulating Preventive Justice, David Cole Mar 2014

The Difference Prevention Makes: Regulating Preventive Justice, David Cole

Georgetown Law Faculty Publications and Other Works

Since the terrorist attacks of September 11, 2001, the United States and many other countries have adopted a ‘‘paradigm of prevention,’’ employing a range of measures in an attempt to prevent future terrorist attacks. This includes the use of pre textual charges for preventive detention, the expansion of criminal liability to prohibit conduct that precedes terrorism, and expansion of surveillance at home and abroad. Politicians and government officials often speak of prevention as if it is an unqualified good. Everyone wants to prevent the next terrorist attack, after all. And many preventive initiatives, especially where they are not coercive and …


Extraterritoriality And Human Rights: Time For A Change In The U.S. View?, Peter Margulies Mar 2014

Extraterritoriality And Human Rights: Time For A Change In The U.S. View?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Of Relevance And Reform Under Section 215, Peter Margulies Feb 2014

Of Relevance And Reform Under Section 215, Peter Margulies

Law Faculty Scholarship

No abstract provided.


The Implausibility Of Secrecy, Mark Fenster Feb 2014

The Implausibility Of Secrecy, Mark Fenster

UF Law Faculty Publications

Government secrecy frequently fails. Despite the executive branch’s obsessive hoarding of certain kinds of documents and its constitutional authority to do so, recent high-profile events — among them the WikiLeaks episode, the Obama administration’s infamous leak prosecutions, and the widespread disclosure by high-level officials of flattering confidential information to sympathetic reporters — undercut the image of a state that can classify and control its information. The effort to control government information requires human, bureaucratic, technological, and textual mechanisms that regularly founder or collapse in an administrative state, sometimes immediately and sometimes after an interval. Leaks, mistakes, and open sources all …


Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies Jan 2014

Fisc Query Preapproval: Intelligence Burden Or Bump In The Road?, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Special Administrative Measures: An Example Of Counterterror Excesses And Their Roots In U.S. Criminal Justice, Francesca Laguardia Jan 2014

Special Administrative Measures: An Example Of Counterterror Excesses And Their Roots In U.S. Criminal Justice, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

This article examines the creation and implementation of pretrial Special Administrative Measures [SAMs], a version of pretrial solitary confinement now used most often to confine terror suspects in the federal criminal justice system. Through an in-depth archival study, this article brings attention to the importance of 20th-century criminal justice trends to the 21st-century response to the threat of terrorism, including an increasingly preventive focus and decreasing judicial checks on executive action. The findings suggest that practices believed to be excessive responses to the threat of terrorism are in fact a natural outgrowth of late modern criminal justice.


Country Report On Counterterrorism: United States Of America, Sudha Setty Jan 2014

Country Report On Counterterrorism: United States Of America, Sudha Setty

Faculty Scholarship

The terrorist attacks of September 11, 2001, led to profound changes in societal viewpoints, political agendas, and the legal authorization to combat terrorism. The United States continues to struggle with keeping its population safe while maintaining the principles of democracy and the rule of law essential to the nation’s character. The U.S. response to terrorism has been multifaceted and expansive, reflective of the U.S. role in global security; debate over these matters will continue for the foreseeable future.

This report, prepared for the American Society of Comparative Law, offers summary, analysis and critique of many aspects of counterterrorism law, including …


Targeted Killings And The Interest Convergence Dilemma, Sudha Setty Jan 2014

Targeted Killings And The Interest Convergence Dilemma, Sudha Setty

Faculty Scholarship

In the 1980s, Professor Derrick Bell posited a theory of interest convergence as part of his critical race theory work, arguing that the major strides forward in civil rights law and policy that benefited African Americans in the 1950s and 1960s only occurred because of the perceived benefits of those changes to white elites during that time. In Bell’s view, it was only at the point at which the interests of powerful whites converged with those of marginalized racial minorities that significant changes in civil rights law could occur.

Twelve years after the terrorist attacks of September 11, 2001, numerous …