Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

National security

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 23 of 23

Full-Text Articles in Law

North Korean Illicit Activities And Sanctions: A National Security Dilemma, Bruce E. Bechtol Jr. Dec 2017

North Korean Illicit Activities And Sanctions: A National Security Dilemma, Bruce E. Bechtol Jr.

Cornell International Law Journal

North Korea is a nation-state that for many years (including the years following the Cold War) has been off of the main radar for American foreign policy. Whether it was because the United States was worried about other issues such as problems in the Balkans in the 1990s, or fighting wars in Iraq and Afghanistan in the new millennium, challenges from the DPRK never seemed to be at the top of the priorities list with American foreign policy makers. This has now changed. It has become obvious to the world that North Korea has an active nuclear weapons program, and …


Contrasting Perspectives And Preemptive Strike: The United States, France, And The War On Terror, Sophie Clavier Nov 2017

Contrasting Perspectives And Preemptive Strike: The United States, France, And The War On Terror, Sophie Clavier

Maine Law Review

A few years ago, Samuel P. Huntington's article in Foreign Affairs, "The Clash of Civilizations?" described a "West vs. the Rest" conflict leading to the assumption of an essentially unified Western civilization settling "[g]lobal political and security issues ... effectively ... by a directorate of the United States, Britain and France" and centered around common core values "using international institutions, military power and economic resources to run the world in ways that will . . . protect Western interests . . . .” Against the West, the specter of disorder and fundamentalism was looming and would precipitate conflicts. This widely …


Unilateral And Multilateral Preventive Self-Defense, Stéphanie Bellier Nov 2017

Unilateral And Multilateral Preventive Self-Defense, Stéphanie Bellier

Maine Law Review

The governing principle of the collective security system created by the United Nations Charter in 19451 is the rule prohibiting the use of force in Article 2(4), which provides that "All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purpose of the United Nations." This rule prohibiting the use of force was considered revolutionary at the time because it transformed into international law ideas which had for centuries, if not millennia, preoccupied the minds of people …


Thought Versus Action: The Influence Of Legal Tradition On French And American Approaches To International Law, Dana Zartner Falstrom Nov 2017

Thought Versus Action: The Influence Of Legal Tradition On French And American Approaches To International Law, Dana Zartner Falstrom

Maine Law Review

In the months leading up to the U.S. intervention in Iraq in March 2003, the dialogue between the United States and France on the appropriate course of action to take in response to Iraq's report on its weapons of mass destruction revealed differences between these traditional allies as to the options available under international law. These differences did not center on the goals of any proposed action-both sides in fact agreed upon the goals, which were to ensure there were no weapons of mass destruction; to prevent an increase in terrorist activity; and to address the continuing violations of international …


The Geopolitics Of Rare Earth Elements: Emerging Challenge For U.S. National Security And Economics, Bert Chapman Nov 2017

The Geopolitics Of Rare Earth Elements: Emerging Challenge For U.S. National Security And Economics, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Rare earth elements (REE) contain unique chemical and physical properties such as lanthanum, are found in small concentrations, need extensive precise processes to separate, and are critical components of modern technologies such as laser guidance systems, personal electronics such as IPhones, satellites, and military weapons systems as varied as Virginia-class fast attack submarines, DDG- 51 Aegis destroyers, the F-35 Joint Strike Fighter, and precision guided munitions. The U.S. has some rare earth resources, but is heavily dependent on access to them from countries as varied as Afghanistan, Bolivia, and China. Losing access to these resources would have significant adverse economic, …


Geopolitics Of Rare Earth Elements, Bert Chapman Oct 2017

Geopolitics Of Rare Earth Elements, Bert Chapman

Libraries Faculty and Staff Presentations

Rare earth elements (REE) contain unique chemical physical properties such as lanthamum, are found in small concentrations, need extensive precise properties to separate, and are critical components of modern technologies such as laser guidance systems, personal electronics such as IPhones, satellites, and military weapons systems as varied as Virginia-class fast attack submarines, DDG-51 Aegis destroyers, the F-35 Joint Strike Fighter, and precision guided munitions. The U.S. has some rare earth resources, but is heavily dependent on access to them from countries as varied as Afghanistan, Bolivia, and China. Losing access to these resources would have significant adverse economic, military, and …


Bush, Obama And Beyond: Observations On The Prospect For Fact Checking Executive Department Threat Claims Before The Use Of Force, Leslie Gielow Jacobs Oct 2017

Bush, Obama And Beyond: Observations On The Prospect For Fact Checking Executive Department Threat Claims Before The Use Of Force, Leslie Gielow Jacobs

Leslie Gielow Jacobs

This piece looks at the recurring problem of inflated threat claims offered by executive branch actors to persuade the Nation to consent to the use of force. It sets out the experience of the Bush Administration’s use of incorrect threat claims to persuade the country to consent to the use of force in Iraq as a backdrop to evaluating the President Obama’s use of threat claims to support the continuing use of force in Afghanistan. Although comparison of threat advocacy by the Bush and Obama administrations must be imperfect, it allows for some observations about the extent to which the …


Warfare As Regulation, Robert Knowles Sep 2017

Warfare As Regulation, Robert Knowles

Washington and Lee Law Review

The United States government’s national security activities, including the use of force, consume more than half of all federal discretionary spending and are carried out by the world’s largest bureaucracy. Yet existing scholarship treats these activities as conduct to be regulated, rather than as forms of regulatory action.

This Article introduces a new paradigm for depicting what agencies involved in national security do. It posits that, like other agencies, the national security bureaucracy is best understood to be engaging in regulatory activity—by targeting, detaining, interrogating, and prosecuting enemies; patrolling the border; and conducting surveillance and covert actions. Also, like other …


A Never Ending State Of Emergency: The Danger Of National Security In Emboldening The Color Line In America, Celeste Mccaw Jul 2017

A Never Ending State Of Emergency: The Danger Of National Security In Emboldening The Color Line In America, Celeste Mccaw

University of Miami Race & Social Justice Law Review

No abstract provided.


Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan Apr 2017

Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan

Penn State Journal of Law & International Affairs

No abstract provided.


A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott Apr 2017

A Research Agenda To Improve Decision Making In Cyber Security Policy, Benjamin Dean, Rose Mcdermott

Penn State Journal of Law & International Affairs

No abstract provided.


The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown Apr 2017

The Cyber Longbow & Other Information Strategies: U.S. National Security And Cyberspace, Gary D. Brown

Penn State Journal of Law & International Affairs

No abstract provided.


Written Testimony Of Gerald S. Dickinson For The U.S. Senate Hearing On Fencing Along The Southwest Border (Senate Committee On Homeland Security And Governmental Affairs), Gerald S. Dickinson Apr 2017

Written Testimony Of Gerald S. Dickinson For The U.S. Senate Hearing On Fencing Along The Southwest Border (Senate Committee On Homeland Security And Governmental Affairs), Gerald S. Dickinson

Testimony

It is with great pleasure that I submit this written testimony at the request of the Office of the Ranking Member, Senator McCaskill. I am pleased that the Homeland Security and Governmental Affairs Committee is devoting its April 4, 2017 hearing to an examination of efforts to secure the southwest border through the construction of a wall. Further, as a law professor who writes and teaches in the areas of constitutional property and land use, I take great interest in the committee's focus on the legal authorities related to the wall construction along the U.S.-Mexico border.


Government Speech And The War On Terror, Helen Norton Jan 2017

Government Speech And The War On Terror, Helen Norton

Publications

The government is unique among speakers because of its coercive power, its substantial resources, its privileged access to national security and intelligence information, and its wide variety of expressive roles as commander-in-chief, policymaker, educator, employer, property owner, and more. Precisely because of this power, variety, and ubiquity, the government's speech can both provide great value and inflict great harm to the public. In wartime, more specifically, the government can affirmatively choose to use its voice to inform, inspire, heal, and unite -- or instead to deceive, divide, bully, and silence.

In this essay, I examine the U.S. government's role as …


From The National Surveillance State To The Cybersurveillance State, Margaret Hu Jan 2017

From The National Surveillance State To The Cybersurveillance State, Margaret Hu

Scholarly Articles

This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …


Ready, Print, Fire! Regulating The 3d-Printing Revolution, Joseph J. Pantella Iv Jan 2017

Ready, Print, Fire! Regulating The 3d-Printing Revolution, Joseph J. Pantella Iv

Journal of Law, Technology, & the Internet

"This Article argues that governments ought to proactively consider preemptive legislative or regulatory actions regarding 3D printing. To accomplish this objective this Article looks at the concepts of “permissionless innovation” and the “precautionary principle.” These concepts represent opposing ends of the regulatory spectrum; the former promoting a “wait-and-see” approach while the latter promotes a preemptive or preventative approach to government regulation. After defining these terms the Article will describe the characteristics of technologies that lend themselves either to permissionless innovation or to the precautionary principle. It will provide a few specific areas where policies of each type have been employed, …


Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr. Jan 2017

Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


A Politics-Reinforcing Political Question Doctrine, Harlan G. Cohen Jan 2017

A Politics-Reinforcing Political Question Doctrine, Harlan G. Cohen

Scholarly Works

The modern political question doctrine has long been criticized for shielding the political branches from proper judicial scrutiny and allowing the courts to abdicate their responsibilities. Critics of the doctrine thus cheered when the Supreme Court, in Zivotofsky I, announced a narrowing of the doctrine. Their joy though may have been short-lived. Almost immediately, Zivotofsky II demonstrated the dark side of judicial review of the separation of powers between Congress and the President: deciding separations of powers cases may permanently cut one of the political branches out of certain debates. Judicial scrutiny in a particular case could eliminate political scrutiny …


The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn Jan 2017

The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn

Faculty Journal Articles and Book Chapters

Terry v. Ohio's “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …


Restoring The Balance Between Secrecy And Transparency: The Prosecution Of Nationai Security Leaks Under The Espionage Act, Christina E. Wells Jan 2017

Restoring The Balance Between Secrecy And Transparency: The Prosecution Of Nationai Security Leaks Under The Espionage Act, Christina E. Wells

Faculty Publications

This Issue Brief reviews the relationship between secrecy, transparency and accountability in the United States, including the role of anonymous leaks. It also examines the threat that increased Espionage Act prosecutions pose to government accountability and discusses why changes to the Espionage Act are necessary to preserve an appropriate balance between government secrecy and transparency.


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


Weapons Of Mass Hysteria, Faulty Biothreat Predictions, And Their Impact On National (In)Security: A Case-Study Of Smallpox, Barbara Pfeffer Billauer Jan 2017

Weapons Of Mass Hysteria, Faulty Biothreat Predictions, And Their Impact On National (In)Security: A Case-Study Of Smallpox, Barbara Pfeffer Billauer

Health Matrix: The Journal of Law-Medicine

Biothreat projections for pandemic and bioterrorist planning are generated by a straight-forward computational system, rather than scientific evidence.


Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer Jan 2017

Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer

Faculty Scholarship

The United States uses on targeted subsidies for both "green" energy and hydrocarbons. These subsidies pursue worthwhile goals. But unfortunately, many have design flaws that make them less effective or even counterproductive. The goal of this Article is to show how to do better.

Specifically, this Article focuses on three sets of issues. First, there often is tension between our environmental and national security goals. Unfortunately, the economics literature on energy largely ignores these trade-offs by omitting national security from the analysis. This Article takes issue with this approach and suggests ways to manage these trade-offs. Second, this Article argues …