National Security Law Dycus/7th ed. Outline: Difference between revisions

From wikilawschool.net. Wiki Law School does not provide legal advice. For educational purposes only.
No edit summary
Line 7: Line 7:
|related=
|related=
}}
}}
{{Outline stub}}
{{Text-Specific Outline stub}}
==INTRODUCTION==
==INTRODUCTION==



Revision as of 15:33, August 25, 2020

National Security Law
Authors Stephen Dycus
William C. Banks
Peter Raven Hansen
Stephen I. Vladeck
Text Image of National Security Law [Connected eBook] (Aspen Casebook)
National Security Law [Connected eBook] (Aspen Casebook)
Taught by
Taught at
Related course(s)
This outline is a stub, meaning no content has been added to it yet. You can be the first to contribute! To start, just click the "edit" tab at the top of the page, copy and paste your class notes, another outline, or even the course syllabus (note that you may not submit copyrighted materials without the author's permission), and delete this stub note from the page. Others will pick up where you leave off.

Also please try to fill in some of the blanks, such as the professor(s), school, books, related course(s), etc. in the Text-Specific Outline Infobox (click on the link for instructions). Thanks for participating!

INTRODUCTION

Purposes

Organization

PROVIDING FOR THE “COMMON DEFENCE”: THE ORIGINAL UNDERSTANDING

The Constitutional Text

Pre-Constitutional History and Political Theory in Europe

The American Experience Prior to 1787

The Framers’ View

The Convention

Ratification

THE PRESIDENT’S NATIONAL SECURITY POWERS

The Spectrum of Presidential Power

When the President Acts Pursuant to Delegated Authority in Foreign Relations

When the President Acts in the “Zone of Twilight” in Foreign Relations

When the President Takes Measures Incompatible with the Expressed or Implied Will of Congress in Foreign Relations

The Commander in Chief’s War Powers

Defensive War Power

Customary War Power

“Core” Presidential War Power and Statutory Limits

The President’s Emergency Powers

The National Emergencies Act and Standby Emergency Legislation

Independent Executive Emergency Authority?

CONGRESS’S NATIONAL SECURITY POWERS

Congressional Authorizations for War

Formal Declaration of War

Authorizing War by Statute

Limiting War Power? The War Powers Resolution

The Recital of Presidential War Powers
Consultation
Triggers and the Reporting Requirements
The 60-Day Clock
The Concurrent Resolution
The Rule of Construction

Delegations and Appropriations for National Security

Delegations of National Security Authority

Implied Authorization by Defense Appropriation

Wielding the Appropriations Power

Limitations on Congressional War Powers

The Nondelegation Principle

The Lovett Principle

The Chadha Principle

THE COURTS’ NATIONAL SECURITY POWERS

The Federal Judicial Power Generally

A Self-Defining Role for Courts: The Justiciability Doctrines

Standing to Sue

The Political Question Doctrine

Ripeness

Substantive Hurdles: Bivens and Qualified Immunity

A Cause of Action?

Qualified Immunity

Evidentiary Hurdles: The State Secrets Privilege

THE DOMESTIC EFFECT OF INTERNATIONAL LAW

The Making and Interpretation of Treaties

Executive and Other Agreements

The Domestic Legal Effect of Treaties and Executive Agreements

Statutory Incorporation of International Law

The Domestic Legal Effect of Customary International Law and Jus Cogens

THE EXTRATERRITORIAL REACH OF U.S. LAW”

Extraterritorial Reach of Constitutional Rights

Extraterritorial Effect of U.S. Statutes

THE RIGHT TO WAGE WAR (JUS AD BELLUM)

Law Regarding Resort to the Use of Force: The Basic Elements

Content of Jus ad Bellum

INTERNATIONAL HUMANITARIAN LAW (JUS IN BELLO)

Authorities for Jus in Bello

Applying IHL — Conflict Classification and Combatant Immunity

HOW WE GO TO WAR: LESSONS FROM VIETNAM

Going to War in Vietnam

Limiting the Scope of the Vietnam War

Ending the Vietnam War

COLLECTIVE USE OF FORCE

The Korean “Police Action”

The 1991 Persian Gulf War

Afghanistan

UNILATERAL USE OF FORCE

Self-Defense and Reprisal

Preemptive Self-Defense

Addressing New Threats: Syria, the Islamic State, and Iran

Rescue

TARGETING TERRORISTS

Targeted Killing by the United States After 9/11

Targeted Killing and Human Rights Law (HRL)

Targeted Killing and International Humanitarian Law (IHL)

U.S. Law and the Targeting of U.S. Citizens

CYBER OPERATIONS

Assessing the Risk of Cyber Warfare

Applying International Law to Cyber Operations

Applying Domestic Law to Cyber Operations

Cyber War of Ideas

NUCLEAR WAR

The Nature and Effects of Nuclear Weapons

International Law of Nuclear Weapons

Domestic Law of Nuclear Weapons

HUMANITARIAN AND PEACE OPERATIONS

Authority for Peaceful Deployments

Crossing the Mogadishu Line: Good Intentions Gone Terribly Wrong

Humanitarian Intervention in Libya — 2011

INTRODUCING INTELLIGENCE

The Intelligence Cycle

How Is Intelligence Collected? — The “INTS”

Covert Actions

THE INTELLIGENCE COMMUNITY: ORGANIZATION AND AUTHORITY

Authority for Intelligence Activities

Funding and Managing the Intelligence Community

Coordination and Sharing of Intelligence

COVERT OPERATIONS

Curtailing Private Actions

Early CIA Covert Operations

CIA Operations and Congressional Oversight

The Iran-Contra Affair

Continuing Oversight Reforms

Special Military Operations

Outsourcing Secret War

THE FOURTH AMENDMENT AND NATIONAL SECURITY

The Fourth Amendment Framework

A National Security Exception?

A Foreign Intelligence Exception?

Surveillance Abroad

CONGRESSIONAL AUTHORITY FOR FOREIGN INTELLIGENCE SURVEILLANCE

The Foreign Intelligence Surveillance Act: Core Requirements

FISA, Law Enforcement, and the Fourth Amendment

FISA Trends

PROGRAMMATIC ELECTRONIC SURVEILLANCE FOR FOREIGN INTELLIGENCE

Case Study: The Terrorist Surveillance Program

The FISA Amendments Act and the Future of Programmatic Surveillance

THE THIRD-PARTY DOCTRINE: ORIGINS AND APPLICATIONS

Origins of the Third-Party Doctrine

Applications of the Third-Party Doctrine

THE COLLECTION AND USE OF THIRD-PARTY RECORDS

Targeted Collection of Third-Party Records

Bulk Collection of Third-Party Records

Data Mining

SCREENING FOR SECURITY

Checkpoint Searches

Watch Listing

PROFILING AND TRAVEL BANS

Profiling

The Trump Administration Travel Bans

HABEAS CORPUS: THE STRUCTURE OF THE SUSPENSION CLAUSE

The Origins of the Suspension Clause

The Habeas Corpus Statute(s)

Suspending the Writ

The Effects of a Valid Suspension

HABEAS CORPUS: THE SCOPE OF THE SUSPENSION CLAUSE

Geographic Scope of the Suspension Clause

Review Required by the Suspension Clause

MILITARY DETENTION OF U.S. PERSONS

The Internment Camps and the Non-Detention Act

Military Detention of U.S. Persons Captured Overseas

Military Detention of U.S. Persons Captured in the United States

Codification of Military Detention

MILITARY DETENTION OF NON-U.S. PERSONS

Substantive Authority to Detain Non-U.S. Persons

The Process for Proving Detainability

The Next Generation of Guantánamo Litigation

“Closing” Guantánamo

PREVENTIVE DETENTION

Constitutional Limits on Preventive Detention

“Spitting on the Sidewalk”: Pretextual(?) Criminal Detention

The Post-9/11 Roundup of “High Interest” Detainees

Material Witness Detentions

INTERROGATING TERRORIST SUSPECTS

When Is Interrogation Torture?

The Legal Standards and their Application

CASE STUDY OF COERCIVE INTERROGATION OF DETAINEES IN U.S. CUSTODY AFTER 9/11

===The Evolving History of U.S. Interrogation of Suspected 997 Terrorists===

Applying the Interrogation Laws

CRIMINALIZING TERRORISM AND ITS PRECURSORS

“Boom” Terrorist Crimes

“Left of Boom” (Precursor) Crimes

Treason

The Long Arm of the Law: Extraterritorial Criminal Jurisdiction

TERRORISM TRIALS: PROCEDURE AND EVIDENCE

National Security Criminal Procedure: Miranda, Presentment, and Speedy Trial

Coerced Evidence

Secret Evidence

Access to Secret Exculpatory Testimony

Do We Need a National Security Court?

TRIAL BY MILITARY COMMISSION

Trial by Military Commission Before 9/11

Trial by Military Commission After 9/11: The First Phase

Military Commissions After Hamdan

HOMELAND SECURITY

Worst-Case Scenario: A Plague on Your City

The Federal Response Role

First Responders: State and Local Responses

Responding to Biological Threats 1175 Case Study: The 2014 Ebola Virus Epidemic

THE MILITARY’S DOMESTIC ROLE

The Traditional Role of the Military in American Society

Domestic Military Intelligence Collection

The Military’s Role in Responding to Domestic Emergencies

Martial Law: When Planning Fails

SAFEGUARDING NATIONAL SECURITY INFORMATION

Balancing Secrecy, Security, and Self-Determination

Classification of National Security Information

Restricting Access to Sensitive Information: Security Clearances

Criminal Prosecution of Leakers: The Espionage Act

“Authorized” Leaks

ACCESS TO NATIONAL SECURITY INFORMATION

The Freedom of Information Act

Other Open Government Laws

Non-Statutory Rights of Access

Congress’s Right of Access

CENSORSHIP

Fundamentals of Censorship: The Pentagon Papers Case

Wikileaks: The New New York Times?

Publication as a Crime?

Shooting the Messenger’s Messenger?