The National Security Court System


Book Description

"Glenn Sulmasy proposes a 'third way' solution that avoids the extremes of an unaccountable military court system on the one hand and funneling war-on-terror detainees into the domestic criminal court system on the other. Instead, he advocates creating a separate standing judicial system, overseen by civilian judges, that allows for habeas corpus appeals and which focuses exclusively on existing war-on-terror cases as well as the inevitable cases to come"--Jacket.




The National Security Court System


Book Description




National Security Law


Book Description

For the last 30 years, National Security Law has helped create and shape an entire new field of law. It has been adopted for classroom use at most American law schools, all of the military academies, and many non-law graduate programs. The Seventh Edition of this leading casebook provides an up-to-date, user-friendly survey of this extremely dynamic field. Relying heavily on original materials and provocative notes and questions, this book encourages students to play the roles of national security professionals, politicians, judges, and ordinary citizens. And by showing the development of doctrine in historical context, it urges them to see their responsibility as lawyers to help keep us safe and free. Like earlier editions, the new book deals with basic separation-of-powers principles, the interaction of U.S. and international law, the use of military force, intelligence, detention, criminal prosecution, homeland security, and national security information — more than enough to provide teachers with a rich menu of readings for classes. New to the Seventh Edition: Latest developments on U.S. military involvement in Syria and Iran President Trump’s Border Wall and appropriations power Carpenter v. U.S. and recent FISA developments and FISC decisions Trump travel ban “Defending forward” in cyberspace New chapter on nuclear war Professors and students will benefit from: Carefully curated and edited original materials Extensive notes and questions to fill in the blanks Read-ins and chapter summaries to provide perspective Frequent references to historical and political context




Judicial Review of National Security


Book Description

In recent years, countries around the world introduced numerous national security programs and military campaigns. Despite the complex legal questions they raise, very few of these measures have been the subject of rigorous judicial review. Nevertheless, the absence of real-time review has had an enormous effect on human rights, rule of law, and on national security. The Supreme Court of Israel provides an excellent case study of a different approach, which allows judges to assess military action in real-time and to issue non-binding results of their evaluation. This raises the question: How was the Court actually able to uphold this challenge? In Judicial Review of National Security, David Scharia explains how the Supreme Court of Israel developed unconventional judicial review tools and practices that allowed it to provide judicial guidance to the Executive in real-time. In this book, he argues that courts could play a much more dominant role in reviewing national security, and demonstrates the importance of intensive real-time inter-branch dialogue with the Executive, as a tool used by the Israeli Court to provide such review. This book aims to show that if one Supreme Court was able to provide rigorous judicial review of national security in real-time, then we should reconsider the conventional wisdom regarding the limits of judicial review of national security.




In the Common Defense


Book Description

The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.




Aspen Treatise for National Security Law


Book Description

This unique new concise treatise provides a highly accessible but also comprehensive and timely supplement for students studying National Security Law. Written by a team of experts in the field, this treatise serves as a useful supplement for the substantively rich but often overwhelming National Security Law texts currently on the market. Key Features Comprehensive overview of both the general legal framework for national security decision-making and commonly explored specific national security topics.Narrative explanation of complex jurisprudential, statutory, treaty, and regulatory sources of national security law.Complements a range of the most commonly addressed national security topics.




The National Security Enterprise


Book Description

Recent breakdowns in American national security have exposed the weaknesses of the nation's vast overlapping security and foreign policy bureaucracy and the often dysfunctional interagency process. In the literature of national security studies, however, surprisingly little attention is given to the specific dynamics or underlying organizational cultures that often drive the bureaucratic politics of U.S. security policy. The National Security Enterprise offers a broad overview and analysis of the many government agencies involved in national security issues, the interagency process, Congressional checks and balances, and the influence of private sector organizations. The chapters cover the National Security Council, the Departments of Defense and State, the Office of the Director of National Intelligence, the Central Intelligence Agency, the Federal Bureau of Investigation, the Department of Homeland Security, and the Office of Management and Budget. The book also focuses on the roles of Congress, the Supreme Court, and outside players in the national security process like the media, think tanks, and lobbyists. Each chapter details the organizational culture and personality of these institutions so that readers can better understand the mindsets that drive these organizations and their roles in the policy process. Many of the contributors to this volume are long-time practitioners who have spent most of their careers working for these organizations. As such, they offer unique insights into how diplomats, military officers, civilian analysts, spies, and law enforcement officials are distinct breeds of policymakers and political actors. To illustrate how different agencies can behave in the face of a common challenge, contributors reflect in detail on their respective agency's behavior during the Iraq War. This impressive volume is suitable for academic studies at both the undergraduate and graduate level; ideal for U.S. government, military, and national security training programs; and useful for practitioners and specialists in national security studies.




Engaging Privacy and Information Technology in a Digital Age


Book Description

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.




Security V. Liberty


Book Description

In the weeks following 9/11, the Bush administration launched the Patriot Act, rejected key provisions of the Geneva Convention, and inaugurated a sweeping electronic surveillance program for intelligence purposes—all in the name of protecting national security. But the current administration is hardly unique in pursuing such measures. In Security v. Liberty, Daniel Farber leads a group of prominent historians and legal experts in exploring the varied ways in which threats to national security have affected civil liberties throughout American history. Has the government's response to such threats led to a gradual loss of freedoms once taken for granted, or has the nation learned how to restore civil liberties after threats subside and how to put protections in place for the future? Security v. Liberty focuses on periods of national emergency in the twentieth century—from World War I through the Vietnam War—to explore how past episodes might bear upon today's dilemma. Distinguished historian Alan Brinkley shows that during World War I the government targeted vulnerable groups—including socialists, anarchists, and labor leaders—not because of a real threat to the nation, but because it was politically expedient to scapegoat unpopular groups. Nonetheless, within ten years the Supreme Court had rolled back the most egregious of the World War I restrictions on civil liberties. Legal scholar John Yoo argues for the legitimacy of the Bush administration's War on Terror policies—such as the detainment and trials of suspected al Qaeda members—by citing historical precedent in the Roosevelt administration's prosecution of World War II. Yoo contends that, compared to Roosevelt's sweeping use of executive orders, Bush has exercised relative restraint in curtailing civil liberties. Law professor Geoffrey Stone describes how J. Edgar Hoover used domestic surveillance to harass anti-war protestors and civil rights groups throughout the 1960s and early 1970s. Congress later enacted legislation to prevent a recurrence of the Hoover era excesses, but Stone notes that the Bush administration has argued for the right to circumvent some of these restrictions in its campaign against terrorism. Historian Jan Ellen Lewis looks at early U.S. history to show how an individual's civil liberties often depended on the extent to which he or she fit the definition of "American" as the country's borders expanded. Legal experts Paul Schwartz and Ronald Lee examine the national security implications of rapid advances in information technology, which is increasingly driven by a highly globalized private sector, rather than by the U.S. government. Security v. Liberty shows that civil liberties are a not an immutable right, but the historically shifting result of a continuous struggle that has extended over two centuries. This important new volume provides a penetrating historical and legal analysis of the trade-offs between security and liberty that have shaped our national history—trade-offs that we confront with renewed urgency in a post-9/11 world.




U.S. National Security Law


Book Description

The rise of international terrorism in today’s globalized world has focused attention on the degree to which international law should shape U.S. national security law and policy. This unique textbook of readings explores how international law relates to U.S. constitutional and statutory law in terms of the right to wage war, the law of armed conflict, combatant status, interrogation of detainees, military commissions, covert action, targeted killing, electronic surveillance, and cyber war. Each chapter is composed of a chronological set of core readings followed by a set of provocative questions, with commentary linking one reading to the next. Written in a lively and engaging manner, U.S. National Security Law makes challenging subject matter accessible for undergraduate students outside of a law school classroom.