Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Law
Contrasting Perspectives And Preemptive Strike: The United States, France, And The War On Terror, Sophie Clavier
Contrasting Perspectives And Preemptive Strike: The United States, France, And The War On Terror, Sophie Clavier
Maine Law Review
A few years ago, Samuel P. Huntington's article in Foreign Affairs, "The Clash of Civilizations?" described a "West vs. the Rest" conflict leading to the assumption of an essentially unified Western civilization settling "[g]lobal political and security issues ... effectively ... by a directorate of the United States, Britain and France" and centered around common core values "using international institutions, military power and economic resources to run the world in ways that will . . . protect Western interests . . . .” Against the West, the specter of disorder and fundamentalism was looming and would precipitate conflicts. This widely …
Unilateral And Multilateral Preventive Self-Defense, Stéphanie Bellier
Unilateral And Multilateral Preventive Self-Defense, Stéphanie Bellier
Maine Law Review
The governing principle of the collective security system created by the United Nations Charter in 19451 is the rule prohibiting the use of force in Article 2(4), which provides that "All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purpose of the United Nations." This rule prohibiting the use of force was considered revolutionary at the time because it transformed into international law ideas which had for centuries, if not millennia, preoccupied the minds of people …
Warfare As Regulation, Robert Knowles
Warfare As Regulation, Robert Knowles
Washington and Lee Law Review
The United States government’s national security activities, including the use of force, consume more than half of all federal discretionary spending and are carried out by the world’s largest bureaucracy. Yet existing scholarship treats these activities as conduct to be regulated, rather than as forms of regulatory action.
This Article introduces a new paradigm for depicting what agencies involved in national security do. It posits that, like other agencies, the national security bureaucracy is best understood to be engaging in regulatory activity—by targeting, detaining, interrogating, and prosecuting enemies; patrolling the border; and conducting surveillance and covert actions. Also, like other …
A Never Ending State Of Emergency: The Danger Of National Security In Emboldening The Color Line In America, Celeste Mccaw
A Never Ending State Of Emergency: The Danger Of National Security In Emboldening The Color Line In America, Celeste Mccaw
University of Miami Race & Social Justice Law Review
No abstract provided.
Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan
Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan
Penn State Journal of Law & International Affairs
No abstract provided.
A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott
A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott
Penn State Journal of Law & International Affairs
No abstract provided.
The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown
The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown
Penn State Journal of Law & International Affairs
No abstract provided.
Written Testimony Of Gerald S. Dickinson For The U.S. Senate Hearing On Fencing Along The Southwest Border (Senate Committee On Homeland Security And Governmental Affairs), Gerald S. Dickinson
Written Testimony Of Gerald S. Dickinson For The U.S. Senate Hearing On Fencing Along The Southwest Border (Senate Committee On Homeland Security And Governmental Affairs), Gerald S. Dickinson
Testimony
It is with great pleasure that I submit this written testimony at the request of the Office of the Ranking Member, Senator McCaskill. I am pleased that the Homeland Security and Governmental Affairs Committee is devoting its April 4, 2017 hearing to an examination of efforts to secure the southwest border through the construction of a wall. Further, as a law professor who writes and teaches in the areas of constitutional property and land use, I take great interest in the committee's focus on the legal authorities related to the wall construction along the U.S.-Mexico border.
Government Speech And The War On Terror, Helen Norton
Government Speech And The War On Terror, Helen Norton
Publications
The government is unique among speakers because of its coercive power, its substantial resources, its privileged access to national security and intelligence information, and its wide variety of expressive roles as commander-in-chief, policymaker, educator, employer, property owner, and more. Precisely because of this power, variety, and ubiquity, the government's speech can both provide great value and inflict great harm to the public. In wartime, more specifically, the government can affirmatively choose to use its voice to inform, inspire, heal, and unite -- or instead to deceive, divide, bully, and silence.
In this essay, I examine the U.S. government's role as …
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
Scholarly Articles
This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …
Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer
Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer
Faculty Scholarship
The United States uses on targeted subsidies for both "green" energy and hydrocarbons. These subsidies pursue worthwhile goals. But unfortunately, many have design flaws that make them less effective or even counterproductive. The goal of this Article is to show how to do better.
Specifically, this Article focuses on three sets of issues. First, there often is tension between our environmental and national security goals. Unfortunately, the economics literature on energy largely ignores these trade-offs by omitting national security from the analysis. This Article takes issue with this approach and suggests ways to manage these trade-offs. Second, this Article argues …
Restoring The Balance Between Secrecy And Transparency: The Prosecution Of Nationai Security Leaks Under The Espionage Act, Christina E. Wells
Restoring The Balance Between Secrecy And Transparency: The Prosecution Of Nationai Security Leaks Under The Espionage Act, Christina E. Wells
Faculty Publications
This Issue Brief reviews the relationship between secrecy, transparency and accountability in the United States, including the role of anonymous leaks. It also examines the threat that increased Espionage Act prosecutions pose to government accountability and discusses why changes to the Espionage Act are necessary to preserve an appropriate balance between government secrecy and transparency.
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Publications
Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …
The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn
The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn
Faculty Journal Articles and Book Chapters
Terry v. Ohio's “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …
Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr.
Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr.
Faculty Scholarship
No abstract provided.