National Security Law Dycus/7th ed. Outline: Difference between revisions

From wikilawschool.net. Wiki Law School does not provide legal advice. For educational purposes only.
No edit summary
m (Lost Bot moved page National Security Law Dycus 7th ed. to National Security Law Dycus/7th ed. Outline: Reorganizing all text-specific pages)
 
(No difference)

Latest revision as of 01:27, March 26, 2022

National Security Law
Authors Stephen Dycus
William C. Banks
Peter Raven Hansen
Stephen I. Vladeck
Text Image of National Security Law [Connected eBook] (Aspen Casebook)
National Security Law [Connected eBook] (Aspen Casebook)
Taught by
Taught at
Related course(s)
This outline is a stub, meaning no content has been added to it yet. You can be the first to contribute! To start, just click the "edit" tab at the top of the page, copy and paste your class notes, another outline, or even the course syllabus (note that you may not submit copyrighted materials without the author's permission), and delete this stub note from the page. Others will pick up where you leave off.

Also please try to fill in some of the blanks, such as the professor(s), school, books, related course(s), etc. in the Text-Specific Outline Infobox (click on the link for instructions). Thanks for participating!

INTRODUCTION[edit | edit source]

Purposes[edit | edit source]

Organization[edit | edit source]

PROVIDING FOR THE “COMMON DEFENCE”: THE ORIGINAL UNDERSTANDING[edit | edit source]

The Constitutional Text[edit | edit source]

Pre-Constitutional History and Political Theory in Europe[edit | edit source]

The American Experience Prior to 1787[edit | edit source]

The Framers’ View[edit | edit source]

The Convention[edit | edit source]

Ratification[edit | edit source]

THE PRESIDENT’S NATIONAL SECURITY POWERS[edit | edit source]

The Spectrum of Presidential Power[edit | edit source]

When the President Acts Pursuant to Delegated Authority in Foreign Relations[edit | edit source]

When the President Acts in the “Zone of Twilight” in Foreign Relations[edit | edit source]

When the President Takes Measures Incompatible with the Expressed or Implied Will of Congress in Foreign Relations[edit | edit source]

The Commander in Chief’s War Powers[edit | edit source]

Defensive War Power[edit | edit source]

Customary War Power[edit | edit source]

“Core” Presidential War Power and Statutory Limits[edit | edit source]

The President’s Emergency Powers[edit | edit source]

The National Emergencies Act and Standby Emergency Legislation[edit | edit source]

Independent Executive Emergency Authority?[edit | edit source]

CONGRESS’S NATIONAL SECURITY POWERS[edit | edit source]

Congressional Authorizations for War[edit | edit source]

Formal Declaration of War[edit | edit source]

Authorizing War by Statute[edit | edit source]

Limiting War Power? The War Powers Resolution[edit | edit source]

The Recital of Presidential War Powers[edit | edit source]
Consultation[edit | edit source]
Triggers and the Reporting Requirements[edit | edit source]
The 60-Day Clock[edit | edit source]
The Concurrent Resolution[edit | edit source]
The Rule of Construction[edit | edit source]

Delegations and Appropriations for National Security[edit | edit source]

Delegations of National Security Authority[edit | edit source]

Implied Authorization by Defense Appropriation[edit | edit source]

Wielding the Appropriations Power[edit | edit source]

Limitations on Congressional War Powers[edit | edit source]

The Nondelegation Principle[edit | edit source]

The Lovett Principle[edit | edit source]

The Chadha Principle[edit | edit source]

THE COURTS’ NATIONAL SECURITY POWERS[edit | edit source]

The Federal Judicial Power Generally[edit | edit source]

A Self-Defining Role for Courts: The Justiciability Doctrines[edit | edit source]

Standing to Sue[edit | edit source]

The Political Question Doctrine[edit | edit source]

Ripeness[edit | edit source]

Substantive Hurdles: Bivens and Qualified Immunity[edit | edit source]

A Cause of Action?[edit | edit source]

Qualified Immunity[edit | edit source]

Evidentiary Hurdles: The State Secrets Privilege[edit | edit source]

THE DOMESTIC EFFECT OF INTERNATIONAL LAW[edit | edit source]

The Making and Interpretation of Treaties[edit | edit source]

Executive and Other Agreements[edit | edit source]

The Domestic Legal Effect of Treaties and Executive Agreements[edit | edit source]

Statutory Incorporation of International Law[edit | edit source]

The Domestic Legal Effect of Customary International Law and Jus Cogens[edit | edit source]

THE EXTRATERRITORIAL REACH OF U.S. LAW”[edit | edit source]

Extraterritorial Reach of Constitutional Rights[edit | edit source]

Extraterritorial Effect of U.S. Statutes[edit | edit source]

THE RIGHT TO WAGE WAR (JUS AD BELLUM)[edit | edit source]

Law Regarding Resort to the Use of Force: The Basic Elements[edit | edit source]

Content of Jus ad Bellum[edit | edit source]

INTERNATIONAL HUMANITARIAN LAW (JUS IN BELLO)[edit | edit source]

Authorities for Jus in Bello[edit | edit source]

Applying IHL — Conflict Classification and Combatant Immunity[edit | edit source]

HOW WE GO TO WAR: LESSONS FROM VIETNAM[edit | edit source]

Going to War in Vietnam[edit | edit source]

Limiting the Scope of the Vietnam War[edit | edit source]

Ending the Vietnam War[edit | edit source]

COLLECTIVE USE OF FORCE[edit | edit source]

The Korean “Police Action”[edit | edit source]

The 1991 Persian Gulf War[edit | edit source]

Afghanistan[edit | edit source]

UNILATERAL USE OF FORCE[edit | edit source]

Self-Defense and Reprisal[edit | edit source]

Preemptive Self-Defense[edit | edit source]

Addressing New Threats: Syria, the Islamic State, and Iran[edit | edit source]

Rescue[edit | edit source]

TARGETING TERRORISTS[edit | edit source]

Targeted Killing by the United States After 9/11[edit | edit source]

Targeted Killing and Human Rights Law (HRL)[edit | edit source]

Targeted Killing and International Humanitarian Law (IHL)[edit | edit source]

U.S. Law and the Targeting of U.S. Citizens[edit | edit source]

CYBER OPERATIONS[edit | edit source]

Assessing the Risk of Cyber Warfare[edit | edit source]

Applying International Law to Cyber Operations[edit | edit source]

Applying Domestic Law to Cyber Operations[edit | edit source]

Cyber War of Ideas[edit | edit source]

NUCLEAR WAR[edit | edit source]

The Nature and Effects of Nuclear Weapons[edit | edit source]

International Law of Nuclear Weapons[edit | edit source]

Domestic Law of Nuclear Weapons[edit | edit source]

HUMANITARIAN AND PEACE OPERATIONS[edit | edit source]

Authority for Peaceful Deployments[edit | edit source]

Crossing the Mogadishu Line: Good Intentions Gone Terribly Wrong[edit | edit source]

Humanitarian Intervention in Libya — 2011[edit | edit source]

INTRODUCING INTELLIGENCE[edit | edit source]

The Intelligence Cycle[edit | edit source]

How Is Intelligence Collected? — The “INTS”[edit | edit source]

Covert Actions[edit | edit source]

THE INTELLIGENCE COMMUNITY: ORGANIZATION AND AUTHORITY[edit | edit source]

Authority for Intelligence Activities[edit | edit source]

Funding and Managing the Intelligence Community[edit | edit source]

Coordination and Sharing of Intelligence[edit | edit source]

COVERT OPERATIONS[edit | edit source]

Curtailing Private Actions[edit | edit source]

Early CIA Covert Operations[edit | edit source]

CIA Operations and Congressional Oversight[edit | edit source]

The Iran-Contra Affair[edit | edit source]

Continuing Oversight Reforms[edit | edit source]

Special Military Operations[edit | edit source]

Outsourcing Secret War[edit | edit source]

THE FOURTH AMENDMENT AND NATIONAL SECURITY[edit | edit source]

The Fourth Amendment Framework[edit | edit source]

A National Security Exception?[edit | edit source]

A Foreign Intelligence Exception?[edit | edit source]

Surveillance Abroad[edit | edit source]

CONGRESSIONAL AUTHORITY FOR FOREIGN INTELLIGENCE SURVEILLANCE[edit | edit source]

The Foreign Intelligence Surveillance Act: Core Requirements[edit | edit source]

FISA, Law Enforcement, and the Fourth Amendment[edit | edit source]

FISA Trends[edit | edit source]

PROGRAMMATIC ELECTRONIC SURVEILLANCE FOR FOREIGN INTELLIGENCE[edit | edit source]

Case Study: The Terrorist Surveillance Program[edit | edit source]

The FISA Amendments Act and the Future of Programmatic Surveillance[edit | edit source]

THE THIRD-PARTY DOCTRINE: ORIGINS AND APPLICATIONS[edit | edit source]

Origins of the Third-Party Doctrine[edit | edit source]

Applications of the Third-Party Doctrine[edit | edit source]

THE COLLECTION AND USE OF THIRD-PARTY RECORDS[edit | edit source]

Targeted Collection of Third-Party Records[edit | edit source]

Bulk Collection of Third-Party Records[edit | edit source]

Data Mining[edit | edit source]

SCREENING FOR SECURITY[edit | edit source]

Checkpoint Searches[edit | edit source]

Watch Listing[edit | edit source]

PROFILING AND TRAVEL BANS[edit | edit source]

Profiling[edit | edit source]

The Trump Administration Travel Bans[edit | edit source]

HABEAS CORPUS: THE STRUCTURE OF THE SUSPENSION CLAUSE[edit | edit source]

The Origins of the Suspension Clause[edit | edit source]

The Habeas Corpus Statute(s)[edit | edit source]

Suspending the Writ[edit | edit source]

The Effects of a Valid Suspension[edit | edit source]

HABEAS CORPUS: THE SCOPE OF THE SUSPENSION CLAUSE[edit | edit source]

Geographic Scope of the Suspension Clause[edit | edit source]

Review Required by the Suspension Clause[edit | edit source]

MILITARY DETENTION OF U.S. PERSONS[edit | edit source]

The Internment Camps and the Non-Detention Act[edit | edit source]

Military Detention of U.S. Persons Captured Overseas[edit | edit source]

Military Detention of U.S. Persons Captured in the United States[edit | edit source]

Codification of Military Detention[edit | edit source]

MILITARY DETENTION OF NON-U.S. PERSONS[edit | edit source]

Substantive Authority to Detain Non-U.S. Persons[edit | edit source]

The Process for Proving Detainability[edit | edit source]

The Next Generation of Guantánamo Litigation[edit | edit source]

“Closing” Guantánamo[edit | edit source]

PREVENTIVE DETENTION[edit | edit source]

Constitutional Limits on Preventive Detention[edit | edit source]

“Spitting on the Sidewalk”: Pretextual(?) Criminal Detention[edit | edit source]

The Post-9/11 Roundup of “High Interest” Detainees[edit | edit source]

Material Witness Detentions[edit | edit source]

INTERROGATING TERRORIST SUSPECTS[edit | edit source]

When Is Interrogation Torture?[edit | edit source]

The Legal Standards and their Application[edit | edit source]

CASE STUDY OF COERCIVE INTERROGATION OF DETAINEES IN U.S. CUSTODY AFTER 9/11[edit | edit source]

===The Evolving History of U.S. Interrogation of Suspected 997 Terrorists===

Applying the Interrogation Laws[edit | edit source]

CRIMINALIZING TERRORISM AND ITS PRECURSORS[edit | edit source]

“Boom” Terrorist Crimes[edit | edit source]

“Left of Boom” (Precursor) Crimes[edit | edit source]

Treason[edit | edit source]

The Long Arm of the Law: Extraterritorial Criminal Jurisdiction[edit | edit source]

TERRORISM TRIALS: PROCEDURE AND EVIDENCE[edit | edit source]

National Security Criminal Procedure: Miranda, Presentment, and Speedy Trial[edit | edit source]

Coerced Evidence[edit | edit source]

Secret Evidence[edit | edit source]

Access to Secret Exculpatory Testimony[edit | edit source]

Do We Need a National Security Court?[edit | edit source]

TRIAL BY MILITARY COMMISSION[edit | edit source]

Trial by Military Commission Before 9/11[edit | edit source]

Trial by Military Commission After 9/11: The First Phase[edit | edit source]

Military Commissions After Hamdan[edit | edit source]

HOMELAND SECURITY[edit | edit source]

Worst-Case Scenario: A Plague on Your City[edit | edit source]

The Federal Response Role[edit | edit source]

First Responders: State and Local Responses[edit | edit source]

Responding to Biological Threats 1175 Case Study: The 2014 Ebola Virus Epidemic[edit | edit source]

THE MILITARY’S DOMESTIC ROLE[edit | edit source]

The Traditional Role of the Military in American Society[edit | edit source]

Domestic Military Intelligence Collection[edit | edit source]

The Military’s Role in Responding to Domestic Emergencies[edit | edit source]

Martial Law: When Planning Fails[edit | edit source]

SAFEGUARDING NATIONAL SECURITY INFORMATION[edit | edit source]

Balancing Secrecy, Security, and Self-Determination[edit | edit source]

Classification of National Security Information[edit | edit source]

Restricting Access to Sensitive Information: Security Clearances[edit | edit source]

Criminal Prosecution of Leakers: The Espionage Act[edit | edit source]

“Authorized” Leaks[edit | edit source]

ACCESS TO NATIONAL SECURITY INFORMATION[edit | edit source]

The Freedom of Information Act[edit | edit source]

Other Open Government Laws[edit | edit source]

Non-Statutory Rights of Access[edit | edit source]

Congress’s Right of Access[edit | edit source]

CENSORSHIP[edit | edit source]

Fundamentals of Censorship: The Pentagon Papers Case[edit | edit source]

Wikileaks: The New New York Times?[edit | edit source]

Publication as a Crime?[edit | edit source]

Shooting the Messenger’s Messenger?[edit | edit source]