Events

Upcoming EVENTS

April 11-12, 2014

The Weighing of Lives in War: Combatants and Civilians in the Jus in Bello

imageThe weight assigned to combatants’ lives has further implications beyond the battlefield.  For example, the more risk on the battlefield soldiers are expected to bear, arguably the greater the national obligation to compensate and care for wounded warriors.  An argument for minimizing combatant exposure, on the other hand, would have implications for the technologies we should be willing to use in order to minimize combatant casualties, even if some such technologies pose an increased risk of collateral damage. CERL’s roundtable discussion will foster an interdisciplinary discussion on these and related topics, drawing together academics and practitioners to discuss the concept of combatancy and the policy its implications.

View Details

 

Past Events

NOVEMBER 22-23, 2013

On the Very Idea of Secret Laws:  Transparency and Publicity in Deliberative Democracy

imageIn Philosophical Investigations, the philosopher Ludwig Wittgentein famously suggested that language is a public, shared phenomenon, and accordingly, that there is no such thing as a “private language.”  A similar doubt might be raised about the possibility of a “private law”:  Is a law that is not publicly shared a conceptual contradiction, in the way a private language might be?  What are the publicity conditions on the concept of law? How much transparency does the notion of deliberative democracy itself require?         

The conference will consider the topic of private laws in light of the recent controversy over secrecy, surveillance, and national security.  Of particular recent interest are the debates surrounding the conduct of Edward Snowden and the policies of the National Security Agency (NSA).  We will also consider the secret orders of the Foreign Intelligence Surveillance Court, as well as the secret memos authored by lawyers in the Office of Legal Counsel during the Bush and Obama Administrations, and will compare different methods of maintaining secrecy and their impact on individual privacy rights and on rule of law values more generally.

View Details

october 4, 2013

Professional Ethics in National Security Law and Policy

image

Conflicts between the norms by which professionals are governed and more general national security norms are currently widespread in professional life. Journalists may feel obligated to divulge information they regard as vital for a fully informed public, yet the norms of national security bar disclosure. Lawyers, doctors and psychologists have been asked to help implement policies that conflict with standards of conduct in their processions. Medical researchers seeking to publish research findings are often pressured to withhold information that could have a dual military use. This conference will explore conflicts between professional and national security norms as they arise in six different professions: journalism, law, medicine, mental health, sciences, and business.

View Details

May 16, 2013

Drone Wars: The Future of Targeted Killings & Presidential Power

Join Dean Fitts and Claire Finkelstein for “Drone Wars: The Future of Targeted Killings & Presidential Power” as part of Penn Law’s Washington Seminar Series.

View Details

April 19-20, 2013

Conference on Sovereignty and the Rule of Law

imageThe primary question of this conference is how we ought to treat national sovereignty in the face of international terrorism. Typically, we think that the national sovereignty of a country ought to be respected until war is explicitly declared. Yet, some of the most significant threats around the globe are not countries, but groups that reside in countries that they have no formal ties to. If the state that has control of such countries in unable or unwilling to deal with such threats on their own, what options are available to those states that have legitimate grievances against aggressors? Under what conditions (if any) can a state override the national sovereignty of particular countries to pursue those that they have declared war on? Is the use of drones in a territory any less of a violation of sovereignty that if soldiers are sent in? If a particular state gives secret clearance for a foreign power to enter their country, can the foreign power rightfully enter without the popular support or knowledge of that country’s citizens? In this conference we will discuss the requirements of respect for national sovereignty and what limitations ought be put on security forces in their actions against international terrorism.
View conference website 

November 16-17, 2012

Conference on The Logic of Deterrence and the Changing Face of Warfare

imageDiscussions of the logic of deterrence, both theoretical and practical, dominated the literature on just war theory during the Cold War. Despite diminished attention, the topic remains of vital importance to the current national security concerns, playing a central role in debates over Cyberwarfare and the use of non-conventional weapons or strategies. This Roundtable seeks to revive traditional discussions about the logic of deterrence, but to place this topic in a contemporary setting. Many of the former questions at the intersection of rational choice theory and ethics apply with renewed force in a post-Cold War world: Is it permissible to threaten to do something it would not otherwise be permissible to do? Does precommitment to an otherwise impermissible course of action render it permissible, given that it is accompanied by advance warning? Does deterrence require public notice to constitute a legitimate public policy? These older theoretical questions prove particularly challenging in an age of highly advanced technologies of war. How does deterrence work if the threatened attack cannot be traced back to the state that launched it? How should deterrence theory handle enemies whose actions are highly unpredictable and decentralized, and where the primary actors might not be interested in sparing civilian lives or even avoiding their own death? Is it legitimate to issue threats of kinetic action to deter a Cyber attack? Given the complexities of modern warfare and counter terrorism operations, the challenges of deterrent theory are now ripe for reexamination.
View conference website

October 15, 2012

Roundtable on Cyberwar and the Rule of Law

imageCyberweapons have become the most dangerous innovation of this century. Cyberwarfare is now considered by the FBI to be the number one threat, ahead of other forms of terrorism. Cyberweapons have the potential to wreak havoc with economic, political, and military systems on the basis of a single electronic act, creating a dreadful new total war potentiality in every dimension. Preventing cyberattacks, however, puts immense pressure on notions of sovereignty and the moral and legal doctrines that were developed to regulate them. As compared with other forms of warfare circumscribed by centuries of just war tradition and the law of armed conflict, cyberwarfare is particularly ambiguous from the standpoint of the rule of law: its prevention may require violating the sovereignty of other nations, violating traditional domestic privacy rights, expanding the concept of combatancy, and lowering the threshold for what counts as an act of war. The legal and moral complexities inherent in this new form of warfare make understanding the demands of the rule of law in national security an essential undertaking.
View conference website

September 11, 2012

Inaugural Panel on Foundational Questions in National Security
4:00pm

imageSince 9/11, increasing pressures on national security, together with global changes in the nature of war, have posed serious threats to the preservation of rule of law values in American society. The U.S. has struggled continuously with the ethical and legal posture of detention and interrogation, the permissibility of kill or capture raids on suspected terrorists, the legitimate scope of secrecy in the exercise of executive privilege, the acceptable extent of state investigation into the lives of private citizens, the authority of international law relative to U.S. sovereign authority, and now the expansion of the tools of war to include novel methods such as Cyber attacks. The Center for Ethics and the Rule of Law is a new institute at Penn Law devoted to the preservation of rule of law values in the face of the foregoing types of challenges.
View panel website.

Please RSVP for the event here. If you have questions please contact Jen Evans.

This program has been approved for 1 hour of substantive law credit and 1 hour of ethics credit for Pennsylvania lawyers. Credit may be available in other jurisdictions. Attendees seeking credit should bring payment ($40 – cash or check payable to the Trustees of the University of Pennsylvania). There is no charge for the event itself.

MAY 18 - 19, 2012

The Ethics of Secrecy and the Rule of Law Conference

imageRecent events have put governmental secrecy in the news and enhanced the scrutiny of classification practices. During the Bush Administration, for example, a series of secret legal memoranda authorized the use of enhanced interrogation techniques against terror suspects. These formed a key component of the Bush administration’s counterterrorism strategy. With the Obama Administration, clandestine legal memoranda have sought to justify the use of targeted killing, and one particularly controversial memo authorized the killing of an American citizen, Anwar al-Alawki. The contents of the latter have not been made public, though pressure is mounting for its release. Even the criteria by which a target is placed on the targeted killing list (the “Joint Prioritized Effects List” (JPEL)) remain confidential.

With the pressures of the ongoing War on Terror, major policies and legal questions of national importance have become less and less open to public view. The increase in secrecy is not without costs, as there appears to be a tradeoff between the need for effective security and the value of transparency. On the one hand, as Immanuel Kant wrote, “every claim to right must have this capacity for publicity.” John Rawls has echoed this same sentiment in requiring publicity as a condition of the social contract. On the other hand, effective national security crucially depends on the State’s ability to control the flow of information. This Roundtable will consider whether the expanding use of secrecy in governmental practices is desirable, and, most crucially, whether it is consistent with rule of law values.
View Conference Website

APRIL 30, 2012

Targeted Killing: Law and Morality in an Asymmetric World Book Celebration

image5:30 p.m. | Silverman 245A/Levy Conference Center

“Targeted Killings: Law and Morality in an Asymmetric World” is an interdisciplinary compilation of essays that brings together articles each dealing with the difficult moral and legal issues surrounding the use of targeted killing. The publication, which has been released on the British market, and soon to be released in the United States, has already garnered significant attention and acclaim. With endorsements from Professors Philip Alston and David Luban, and journalist Scott Horton, the volume is the most wide-ranging and thorough treatment of the debate surrounding targeted killing to date. Admiral John Hutson, JAGC, USN (Ret), Dean Emeritus University of New Hampshire School of Law will give a keynote address as part of the celebration event. 

November 30, 2011

Ethical and Legal Dimensions of Targeted Killing

4:30 p.m. | Silverman 245A

imageThe use of targeted killing has become a favored tool in the War on Terror. The killing of Osama Bin Laden further solidified support for the practice, given its efficiency and swift success. Since Bin Laden, several high profile targeted killings have further increased public attention to such operations. With the increased public scrutiny has come a growing sentiment that the moral and legal justifications for targeted killing have not been sufficiently explored. To what extent, for example, do we have an obligation to attempt to capture before killing terror suspects? Are some individuals on the target list civilians rather than combatants or “unlawful combatants”? Are there special problems associated with targeting American citizens, such as al-Awlaki? If killing al-Awlaki was legitimate, would the same sort of operation be permissible on U.S. soil? This panel will seek to explore the ethical and legal issues surrounding recent uses of targeted killing.

Moderator: Claire Finkelstein Algernon Biddle Professor of Law and Professor of Philosophy, University of Pennsylvania School of Law
Jens Ohlin Associate Professor of Law, Cornell University
Kevin Govern Associate Professor of Law, Ave Maria School of Law
Daphne Eviatar Senior Associate, Law and Security Program, Human Rights First
Ambassador Thomas Graham Special Representative of the President for Arms Control, Non-Proliferation, and Disarmament, 1994-1997

Listen to the panel:

(Moderated by Claire Finkelstein)

Read more about the panel

APRIL 15 - 16, 2011

Co-sponsored by: Jean beer Blumenfeld Center for Ethics of Georgia State

Using Targeted Killing to Fight the War on Terror: Philosophical, Moral and Legal Challenges

imageThe Obama administration has authorized the CIA to target and kill Anwar al-Aulaqi, a radical Muslim cleric believed to have ties to al-Qaeda, on the ground that he helped to orchestrate attacks against the United States. The authorization raises the interesting question of who is a legitimate target of such military actions. In particular, it is arguably difficult to think of al-Aulaqi as a belligerent against the U.S., as he is himself an American citizen. Al-Aulaqi, however, is not the only person whose identification as a legitimate target raises moral and legal complications. The U.S. and other governments have been targeting and killing many others as part of both the fight against Islamic terrorists and the wars in Iraq and Afghanistan, and the widespread use of this technique raises important questions in just war theory. Notable as well is the fact that the U.S. has been targeting suspected militants with unmanned aerial drones, sophisticated military planes controlled remotely from distant lands.

View Conference Website
View Conference photo gallery