Free text: Paste the outline here
{{Text-Specific Outline stub}} ==INTRODUCTION== ===Purposes=== ===Organization=== ==PROVIDING FOR THE “COMMON DEFENCE”: THE ORIGINAL UNDERSTANDING== ===The Constitutional Text=== ===Pre-Constitutional History and Political Theory in Europe=== ===The American Experience Prior to 1787=== ===The Framers’ View=== ====The Convention==== ====Ratification==== ==THE PRESIDENT’S NATIONAL SECURITY POWERS== ===The Spectrum of Presidential Power=== ====When the President Acts Pursuant to Delegated Authority in Foreign Relations==== ====When the President Acts in the “Zone of Twilight” in Foreign Relations==== ====When the President Takes Measures Incompatible with the Expressed or Implied Will of Congress in Foreign Relations==== ===The Commander in Chief’s War Powers=== ====Defensive War Power==== ====Customary War Power==== ====“Core” Presidential War Power and Statutory Limits==== ===The President’s Emergency Powers=== ====The National Emergencies Act and Standby Emergency Legislation==== ====Independent Executive Emergency Authority?==== ==CONGRESS’S NATIONAL SECURITY POWERS== ===Congressional Authorizations for War=== ====Formal Declaration of War==== ====Authorizing War by Statute==== ====Limiting War Power? The War Powers Resolution==== =====The Recital of Presidential War Powers===== =====Consultation===== =====Triggers and the Reporting Requirements===== =====The 60-Day Clock===== =====The Concurrent Resolution===== =====The Rule of Construction===== ===Delegations and Appropriations for National Security=== ====Delegations of National Security Authority==== ====Implied Authorization by Defense Appropriation==== ====Wielding the Appropriations Power==== ===Limitations on Congressional War Powers=== ====The Nondelegation Principle==== ====The Lovett Principle==== ====The Chadha Principle==== ==THE COURTS’ NATIONAL SECURITY POWERS== ===The Federal Judicial Power Generally=== ===A Self-Defining Role for Courts: The Justiciability Doctrines=== ====Standing to Sue==== ====The Political Question Doctrine==== ====Ripeness==== ===Substantive Hurdles: Bivens and Qualified Immunity=== ====A Cause of Action?==== ====Qualified Immunity==== ===Evidentiary Hurdles: The State Secrets Privilege=== ==THE DOMESTIC EFFECT OF INTERNATIONAL LAW== ===The Making and Interpretation of Treaties=== ===Executive and Other Agreements=== ===The Domestic Legal Effect of Treaties and Executive Agreements=== ===Statutory Incorporation of International Law=== ===The Domestic Legal Effect of Customary International Law and ''Jus Cogens''=== ==THE EXTRATERRITORIAL REACH OF U.S. LAW”== ===Extraterritorial Reach of Constitutional Rights=== ===Extraterritorial Effect of U.S. Statutes=== ==THE RIGHT TO WAGE WAR (''JUS AD BELLUM'')== ===Law Regarding Resort to the Use of Force: The Basic Elements=== ===Content of ''Jus ad Bellum''=== ==INTERNATIONAL HUMANITARIAN LAW (''JUS IN BELLO'')== ===Authorities for ''Jus in Bello''=== ===Applying IHL — Conflict Classification and Combatant Immunity=== ==HOW WE GO TO WAR: LESSONS FROM VIETNAM== ===Going to War in Vietnam=== ===Limiting the Scope of the Vietnam War=== ===Ending the Vietnam War=== ==COLLECTIVE USE OF FORCE== ===The Korean “Police Action”=== ===The 1991 Persian Gulf War=== ===Afghanistan=== ==UNILATERAL USE OF FORCE== ===Self-Defense and Reprisal=== ===Preemptive Self-Defense=== ===Addressing New Threats: Syria, the Islamic State, and Iran=== ===Rescue=== ==TARGETING TERRORISTS== ===Targeted Killing by the United States After 9/11=== ===Targeted Killing and Human Rights Law (HRL)=== ===Targeted Killing and International Humanitarian Law (IHL)=== ===U.S. Law and the Targeting of U.S. Citizens=== ==CYBER OPERATIONS== ===Assessing the Risk of Cyber Warfare=== ===Applying International Law to Cyber Operations=== ===Applying Domestic Law to Cyber Operations=== ===Cyber War of Ideas=== ==NUCLEAR WAR== ===The Nature and Effects of Nuclear Weapons=== ===International Law of Nuclear Weapons=== ===Domestic Law of Nuclear Weapons=== ==HUMANITARIAN AND PEACE OPERATIONS== ===Authority for Peaceful Deployments=== ===Crossing the Mogadishu Line: Good Intentions Gone Terribly Wrong=== ===Humanitarian Intervention in Libya — 2011=== ==INTRODUCING INTELLIGENCE== ===The Intelligence Cycle=== ===How Is Intelligence Collected? — The “INTS”=== ===Covert Actions=== ==THE INTELLIGENCE COMMUNITY: ORGANIZATION AND AUTHORITY== ===Authority for Intelligence Activities=== ===Funding and Managing the Intelligence Community=== ===Coordination and Sharing of Intelligence=== ==COVERT OPERATIONS== ===Curtailing Private Actions=== ===Early CIA Covert Operations=== ===CIA Operations and Congressional Oversight=== ===The Iran-Contra Affair=== ===Continuing Oversight Reforms=== ===Special Military Operations=== ===Outsourcing Secret War=== ==THE FOURTH AMENDMENT AND NATIONAL SECURITY== ===The Fourth Amendment Framework=== ===A National Security Exception?=== === A Foreign Intelligence Exception?=== ===Surveillance Abroad=== ==CONGRESSIONAL AUTHORITY FOR FOREIGN INTELLIGENCE SURVEILLANCE== ===The Foreign Intelligence Surveillance Act: Core Requirements=== ===FISA, Law Enforcement, and the Fourth Amendment=== ===FISA Trends=== ==PROGRAMMATIC ELECTRONIC SURVEILLANCE FOR FOREIGN INTELLIGENCE== ===Case Study: The Terrorist Surveillance Program=== ===The FISA Amendments Act and the Future of Programmatic Surveillance=== ==THE THIRD-PARTY DOCTRINE: ORIGINS AND APPLICATIONS== ===Origins of the Third-Party Doctrine=== ===Applications of the Third-Party Doctrine=== ==THE COLLECTION AND USE OF THIRD-PARTY RECORDS== ===Targeted Collection of Third-Party Records=== ===Bulk Collection of Third-Party Records=== ===Data Mining=== ==SCREENING FOR SECURITY== ===Checkpoint Searches=== ===Watch Listing=== ==PROFILING AND TRAVEL BANS== ===Profiling=== ===The Trump Administration Travel Bans=== ==HABEAS CORPUS: THE STRUCTURE OF THE SUSPENSION CLAUSE== ===The Origins of the Suspension Clause=== ===The Habeas Corpus Statute(s)=== ===Suspending the Writ=== ===The Effects of a Valid Suspension=== ==HABEAS CORPUS: THE SCOPE OF THE SUSPENSION CLAUSE== ===Geographic Scope of the Suspension Clause=== ===Review Required by the Suspension Clause=== ==MILITARY DETENTION OF U.S. PERSONS== ===The Internment Camps and the Non-Detention Act=== ===Military Detention of U.S. Persons Captured Overseas=== ===Military Detention of U.S. Persons Captured in the United States=== ===Codification of Military Detention=== ==MILITARY DETENTION OF NON-U.S. PERSONS== ===Substantive Authority to Detain Non-U.S. Persons=== ===The Process for Proving Detainability=== ===The Next Generation of Guantánamo Litigation=== ===“Closing” Guantánamo=== ==PREVENTIVE DETENTION== ===Constitutional Limits on Preventive Detention=== ===“Spitting on the Sidewalk”: Pretextual(?) Criminal Detention=== ===The Post-9/11 Roundup of “High Interest” Detainees=== ===Material Witness Detentions=== ==INTERROGATING TERRORIST SUSPECTS== ===When Is Interrogation Torture?=== ===The Legal Standards and their Application=== ==CASE STUDY OF COERCIVE INTERROGATION OF DETAINEES IN U.S. CUSTODY AFTER 9/11== ===The Evolving History of U.S. Interrogation of Suspected 997 Terrorists=== ===Applying the Interrogation Laws=== == CRIMINALIZING TERRORISM AND ITS PRECURSORS== ===“Boom” Terrorist Crimes=== ===“Left of Boom” (Precursor) Crimes=== ===Treason=== ===The Long Arm of the Law: Extraterritorial Criminal Jurisdiction=== ==TERRORISM TRIALS: PROCEDURE AND EVIDENCE== ===National Security Criminal Procedure: Miranda, Presentment, and Speedy Trial=== ===Coerced Evidence=== ===Secret Evidence=== ===Access to Secret Exculpatory Testimony=== ===Do We Need a National Security Court?=== ==TRIAL BY MILITARY COMMISSION== ===Trial by Military Commission Before 9/11=== ===Trial by Military Commission After 9/11: The First Phase=== ===Military Commissions After Hamdan=== ==HOMELAND SECURITY== ===Worst-Case Scenario: A Plague on Your City=== ===The Federal Response Role=== ===First Responders: State and Local Responses=== ===Responding to Biological Threats 1175 Case Study: The 2014 Ebola Virus Epidemic=== ==THE MILITARY’S DOMESTIC ROLE== ===The Traditional Role of the Military in American Society=== ===Domestic Military Intelligence Collection=== ===The Military’s Role in Responding to Domestic Emergencies=== ===Martial Law: When Planning Fails=== ==SAFEGUARDING NATIONAL SECURITY INFORMATION== ===Balancing Secrecy, Security, and Self-Determination=== ===Classification of National Security Information=== ===Restricting Access to Sensitive Information: Security Clearances=== ===Criminal Prosecution of Leakers: The Espionage Act=== ===“Authorized” Leaks=== ==ACCESS TO NATIONAL SECURITY INFORMATION== ===The Freedom of Information Act=== ===Other Open Government Laws=== ===Non-Statutory Rights of Access=== ===Congress’s Right of Access=== ==CENSORSHIP== ===Fundamentals of Censorship: The Pentagon Papers Case=== ===Wikileaks: The New New York Times?=== ===Publication as a Crime?=== ===Shooting the Messenger’s Messenger?===