Further Reading

1. Responses to Targeted Killing
2. Drones
3. Targeted Killing in Current Law
4. Memoranda, Reports, and Cases on Targeted Killing
5. Relation between Domestic Law and Targeted Killing
6. Press Coverage on National Secrecy
7. Contemporary Issues on Secrecy and the Rule of Law
8. Philosophical Writings on Publicity Conditions
9. Classification and Executive Privilege
10. Secrecy and Military Operations
11. Secrecy and Civil Rights
12. The Ethics of Leaks: When to Release Information, When to Prosecute
13. Cyberwar
14. Treatment of Detainees
15. Sovereignty
16. Just War
17. Torture
18. National Security
19. The Nature of Combatancy

1. Responses to Targeted Killing

Antonio Cassese:
The Multifaceted Criminal Notion of Terrorism in International Law [DOC]

Michael L. Gross:
Assassination and Targeted Killing: Law Enforcement, Execution or Self-Defence?, 23 J. APPLIED PHIL. 323 (2006) [PDF]

David Kretzmer:
Targeted Killing of Suspected Terrorists: Extra-Judicial Executions or Legitimate Means of Defence?, 16 EUR. J. INT’L L. 171 (2005) [PDF]

Jeff McMahan:
The Ethics of Killing in War, 114 ETHICS 693 (2004) [PDF]

Jeff McMahan:
Killing in War (2009)

Andrew Altman and Christopher Heath Wellman:
From Humanitarian Intervention to Assassination: Human Rights and Political Violence, 118 ETHICS 228 (2008) [PDF]

Daniel Statman:
Targeted Killing, 5 THEORETICAL INQUIRIES L. 179 (2004) [PDF]

David Rodin:
War and Self-Defense (2005)

Francis M. Kamm:
Failures of Just War Theory: Terror, Harm, and Justice, 114 ETHICS 650 (2004)

Robert Chesney
Who May Be Killed? Anwar Al-Awlaki as a Case Study in the International Legal Regulation of Lethal Force

John C. Dehn & Kevin Jon Heller
Debate: Targeted Killing: The Case of Anwar Al-Aulaqi

Steven R. David
Israel’s Policy of Targeted Killing, 17 ETHICS & INT’L AFF. 111 (2003) [PDF]

Tamar Meisels
Combatants - Lawful and Unlawful, 26 LAW & PHIL. 31 (2007) [PDF]

Philip Alston
The CIA and Targeted Killings Beyond Borders [PDF]

Kenneth Anderson
Targeted Killing and Drone Warfare: How We Came to Debate Whether There is a ‘Legal Geography of War’

Mary Ellen O’Connell
The Right to Life in War and Peace: A Legal and Moral Critique of Targeted Killing

Lesa Jansen
Obama to release document on targeted killings to Congress

Jane Y. Chong
Targeting the Twenty-First-Century Outlaw


Back to Top

 

2. Drones

Paul Waldman
Game of Drones

• Dillon Zhou
China Drones Prompt Fears of a Drone Race with the US 

 • Drone Wars UK
Mapping Drone Proliferation: UAVs in 76 Countries 

Chris Cole, Drone Wars UK
Drone Wars Briefing

• United States Government Accountability Office
Report to the Ranking Member, Subcommittee on National Security, Homeland Defense, and Foreign Operations, Committee on Oversight and Government Reform, House of Representatives

• Carla Anne Robbins
Drones: Transparency on Rules for Their Use is a Must

• Stephen Vladeck
Why a “Drone Court” Won’t Work- But (Nominal) Damages Might…

• Deborah Pearlstein
These Aren’t the Courts We’re Looking For

• Scott Shane
Debating a Court to Vet Drone Strikes

• Kimberly Dozier
Brennan Open to Special Court for Drone Strikes

• Joe Wolverton
Congress Considers Special Drone Court; UN Investigates Deadly Drone Strikes

• James Robertson
Judges Shouldn’t Decide About Drone Strikes

• Ryan Goodman
The Lesser Evil: What the Obama Administration Isn’t Telling You About Drones: The Standard Rule is Capture, Not Kill

• Barbara Starr, Pam Benson and Tom Cohen
Brennan Defends Al-Awlaki Drone Strike as Part of War with Al Qaeda

Tabassum Zakaria
Lawmakes raise concerns about Obama’s drone policies

•  Patrick McGreevy
California lawmakers propose rules, tax breaks for drone aircraft

•  Jonathan S. Landay
Obama’s drone war kills ‘others,’ not just al Qaida leaders

•  Micah Zenko
An Inconvenient Truth

•  Cora Currier
Everything We Know So Far About Drone Strikes

• Michael J. Boyle
The Costs and Consequences of Drone Warfare       


Back to Top

 

3. Targeted Killing in Current Law

Orna Ben-Naftalit & Keren R. Michaeli:
‘We Must Not Make a Scarecrow of the Law’: A Legal Analysis of the Israeli Policy of Targeted Killings, 36 CORNELL INT’L L.J. 233 (2003) [PDF]

William C. Banks and Peter Raven-Hansen:
Targeted Killing and Assassination: The U.S. Legal Framework, 37 U. RICH. L. REV. 667 (2003) [PDF]

Richard Murphy & Afsheen John Radsan:
Due Process and the Targeted Killing of Terrorists, 31 CARDOZO L. REV. 405 (2009) [PDF]

Mary Ellen O’Connell:
Unlawful Killing with Combat Drones: A Case Study of Pakistan, 2004-2009 (Notre Dame Law School Legal Studies Research Paper No. 09-43, 2010) (PDF)

Gabriella Blum and Philip Heymann:
Law and Policy of Targeted Killing, 1 HARV. NAT’L SEC. J. 145 (2010) [PDF]

Nils Melzer:
Targeted Killing in International Law (2008)

Jordan J. Praust:
Self-Defense Targetings of Non-State Actors and Permissibility of U.S. Use of Drones in Pakistan, 19.2 J. TRANSNAT’L L. & POL’Y 237 (2010) [PDF]

Kenneth Anderson:
Targeted Killing in U.S. Counterterrorism Strategy and Law (Brookings Inst., Working Paper, 2009) [PDF]

J. Nicholas Kendall:
Israeli Counter-Terrorism: “Targeted Killings” Under International Law, 80 N.C. L. REV. 1069 (2002) [PDF]

Michael L. Gross
Moral Dilemmas of Modern War: Torture, Assassination, and Blackmail in an Age of Asymmetric Conflict (2009)

Video:
Wittes v. O’Connell on Targeted Killing and Drones (2010), available at http://www.lawfareblog.com/2010/10/wittes-v-oconnell-on-targeted-killing-and-drones

Opinio Juris on Targeted Killing

The Geneva Conventions of 1949 and their Additional Protocols

Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment

Federal Torture Statutes, 18 U.S.C § 2340 (A)-(B)

Federal Torture Statutes, 10 U.S.C § 948r

International Committee of the Red Cross, Clarifying the Notion of Direct Participation in Hostilities

• Office of Legal Counsel White Paper Summarizes 2010 Targeted Killing Memorandum:
The Justice Department’s White Paper on Targeted Killing by Jameel Jaffer
Department of Justice White Paper

U.S. drone strike kills top al-Shabaab bomb maker

 

4. Memoranda, Reports, and Cases on Targeted Killing

HCJ 769/02 Public Committee Against Torture v. Israel [2005] (Israeli “Targeted Killings Case) [PDF]

Memorandum of Law on Executive Order 12333 and Assassination, W. Hays Parks (1989) [PDF]

Drones II: Hearing before the H. Sub. Comm. on Nat’l Sec. & Foreign Aff., 111th Cong. (2010) (statement of Kenneth Anderson) [PDF]

Rise of the Drones: Unmanned Systems and the Future of War: Hearing before the H. Sub. Comm. on Nat’l Sec. & Foreign Aff., 111th Cong. (2010) (statement of Kenneth Anderson) [PDF]

• Harold Koh, Legal Adviser to Dept. of State, Address at American Society of International Law: International Law and the Obama Administration (March 25, 2010), available at www.state.gov/s/l/releases/remarks/139119.htm

Al-Aulaqi Decision

The Year of the Drone (Data on Aerial Drone Strikes)

Report of the Special Rapporteur on extrajudicial, summary or arbitrary executions, Philip Alston [PDF]

Al-Shimari Opinion Dismissing Appeal [PDF]


Back to Top

 

5. Relation between Domestic Law and Targeted Killing

Lawrence Alexander:
The Doomsday Machine: Proportionality, Punishment and Prevention, 63 MIND 199 (1980) [PDF]

Claire Finkelstein:
Threats and Preemptive Practices, 5 LEGAL THEORY 311 (1999) [PDF]

Amos Guiora:
Targeted Killing as Active Self-Defense, 36 CASE W. RES. J. INT’L L. 319 (2004) [PDF]

Tenn v. Garner, 471 U.S. 1 (1984) (fleeing suspect case) [PDF]

Katko v. Briney, 183 N.W.2d 257 (Iowa 1971) (spring-gun case) [PDF]


Back to Top

 

6. Press Coverage on National Secrecy

Inside the Killing Machine Newsweek

Gary Solis
CIA drone attacks produce America’s own unlawful combatants

Geoffrey Robertson
Is It Lawful to Kill Gaddafi?

Ken Dilanian
CIA has slashed its terrorism interrogation role

Charlie Savage
Secret U.S. Memo Made Legal Case to Kill a Citizen New York Times

Scott Horton
Justifying the Killing of an American

David Cole
Killing Citizens in Secret

Ahmed Al-Haj
Yemen Says Air-Strike Kills Al-Qaeda Media Chief

Eric Schmitt and Thom Shanker
U.S. Debated Cyberwarfare in Attack Plan on Libya

Morris Davis
Combatant Immunity and the Death of Anwar al-Awlaqi

Nicholas Schmidle
Getting Bin Ladin [PDF]

David S. Cloud and David Zucchino
Multiple missteps led to drone killing U.S. troops in Afghanistan

Spencer Ackerman
CIA Drones Kill Large Groups Without Knowing Who They Are

Daphne Eviatar
CIA Drones Gone Wild? [PDF]

Adam Entous
US Tightens Drone Rules

Daniel Swift
Drone Knowns and Drone Unknowns [PDF]

Iran’s downing of U.S. drone rattles Washington Tehran Times

Scott Shane and David E. Sanger
Drone Crash in Iran Reveals Secret U.S. Surveillance Effort

Peter W. Singer
Do Drones Undermine Democracy? [PDF] New York Times

Eric Schmitt and Michael S. Schmidt
U.S. Drones Patrolling Its Skies Provoke Outrage in Iraq New York Times

Karen DeYoung
ACLU sues to force release of drone attack records The Washington Post
The complaint [PDF] by the ACLU

Editorial
America’s drone wars Los Angeles Times

John Sifton
A Brief History of Drones The Nation

Jackie Calmes, Charlie Savage, Jo Becker and Scott Shane
A Measure of Change (series)

Daniel Klaidman
Drones: How Obama Learned to Kill Excerpt from Klaidman’s Kill or Capture: The War on Terror and the Soul of the Obama Presidency.

David Luban
What Would Augustine Do? The President, Drones, and Just War Theory

Bruce Ackerman
Protect, Don’t Prosecute, Patriotic Leakers

David Taintor
Poll: Americans Are The ‘Clear Outliers’ In Support For Drone Strikes

Mark Mazzetti
The Drone Zone

homelandsecuritynewswire.com
Do drones increase the likelihood of war by lowering its cost?

Marc Ambinder
10 Things You Didn’t Know About The National Security Agency Suveillance Program

Mattea Kramer and Chris Hellman 
‘Homeland Security’: The Trillion-Dollar Concept That No One Can Define       

      


Back to Top

 

7. Contemporary Issues on Secrecy and the Rule of Law

Meir Dan-Cohen
Decision Rules and Conduct Rules: On Acoustic Separation in Criminal Law [PDF]

Editorial
The Power to Kill New York Times

Daniel Patrick Moynihan
Secrecy as Regulation [PDF]

Daniel Patrick Moynihan
The Routinization of Secrecy [PDF]

Seumas Miller and Michael J. Selgelid
Ethical and Philosophical Consideration of the Dual-use Dilemma in the Biological Sciences [PDF]

Editorial
“Statement on scientific publication and security” fails to provide necessary guidelines [PDF] PNAS

Journal Editors and Authors Group
Uncensored exchange of scientific results PNAS

Statement of Anthony S. Fauci, M.D.
Dual Use Research of Concern: Balancing Benefits and Risks

Glenn Greenwald
Three key lessons from the Obama administration’s drone lies


Back to Top

 

8. Philosophical Writings on Publicity Conditions

Kevin R. Davis
Kantian “Publicity” and Political Justice [PDF]

Samuel Freeman
The burdens of public justification: constructivism, contractualism, and publicity [PDF]

Thomas Hobbes
On the Office of Sovereign Representative [PDF]

Charles Larmore
Public Reason [PDF]

Macchiavelli
The Prince [PDF]

Plato
The Noble Lie [PDF]

John Rawls
Formal Conditions of Right [PDF]

John Rawls
Two Concepts of Rules [PDF]

Andrew Williams
Incentives, Inequality, and Publicity [PDF]


Back to Top

 

9. Classification and Executive Privilege

Mohamed v. Jeppensen Dataplan (9th District Court of Appeals) [PDF]

David Carr
Blurred Line Between Espionage and Truth

Andre Cohen
The Torture Memos: Ten Years Later

Liza Goitein and J. William Leonard
America’s Unnecessary Secrets

Gia Lee
The Presidents Secret [PDF] George Washington Law Review, 2007.

Eric Posner and Adrian Vermeule
Terror in the Balance: Security, Liberty and the Courts; Introduction [PDF]

Charlie Savage
Ex-C.I.A Officer Charged in Information Leak

Max Weber
Economy and Society, Ch. 11: Bureaucracy” [PDF]

US District Court- New York
Azmy v. DoD [PDF]


Back to Top

 

10. Secrecy and Military Operations

US District Court: District of Columbia
Excerpt from “Al-Alaqi v. Obama” [PDF]

John Brennan
The Ethics and Efficacy of the President’s Counterterrorism Strategy

Editorial
America’s drone wars Los Angeles Times

Justin Elliott
Obama Administration’s Drone Death Numbers Don’t Add up

John Hart Ely
War and Responsibility, Ch 4-5 [PDF]

Josh Gerstein
Judge losing patience with feds in targeted killing FOIA case

Jack Goldsmith
Fire When Ready

Kevin Govern
Warrant-Based Killings [PDF]

Karen Greenberg
Doubling down on 9/11

Scott Horton
Justifying the Killing of an American

W. Michael Reisman and James E. Baker
Regulating Covert Action, Ch. 1-2 [PDF]

Charlie Savage
Secret U.S. Memo Made Legal Case to Kill a Citizen

Kim Lane Scheppelle
The Sociology of Secrecy [PDF] Legal Secrets, Chapter 1

Scott Shane
U.S. Attacks, Online and From the Air, Fuel Secrecy Debate

Daniel Swift
Drone Knowns and Drone Unknowns [PDF]

Emptywheel
CIA’s Drone Lies and Congressional Oversight


Back to Top

 

11. Secrecy and Civil Rights

Michael Dorf
Arlen Specter’s Swan Song: Mandating Cameras in the Supreme Court

Editorial
Live, From the Supreme Court NY Times

Editorial
Exceptional Court Coverage NY Times

Amy Goodman
National Security Agency Whistleblower William Binney on Growing State Surveillance

• Senator Jeff Merkley
Senator Merkley on Secret Law and NSA Spying

Adam D. Moore
Privacy, Security and Government Surveillance: Wikileaks and the New Accountability [PDF]

Alan Rubel
Privacy and the USA Patriot Act: Rights, the Value of Right, and Autonomy [PDF]

• Matthew Taylor and Nick Hopkins
World’s leading authors: state surveillance of personal data is theft

• Edward Wyatt and Claire Cain Miller
Tech Giants Issue Call for Limits on Government Surveillance of Users

• Nicole Perlroth and Vindu Goel
Internet Firms Step Up Efforts to Stop Spying

• 
Barton Gellman and Ashkan Soltani
NSA tracking cellphone locations worldwide, Snowden documents show

• Anthony Faiola
Britain targets Guardian newspaper over intelligence leaks related to Edward Snowden

• Brian X. Chen
A Senator Plans Legislation to Narrow Authorities’ Cellphone Data Requests

• David E. Sanger
Obama Panel Said to Urge N.S.A. Curbs

• Peter Baker and Charlie Savage
Obama Seeks Balance in Plan for Spy Programs

• Ellen Nakashima
NSA exploring alternatives to holding database of domestic phone records

• Greg Miller and Ellen Nakashima
Officials’ defenses of NSA phone program may be unraveling

• Ellen Nakashimaand Ashkan Soltani
Panel Urges new curbs on surveillance by U.S.


Back to Top

 

12. The Ethics of Leaks: When to Release Information, When to Prosecute

E.E.B. and K.E.M.
Plugging the Leak: The Case for a Legislative Resolution of the Conflict between the Demands of Secrecy and the Need for an Open Government [pdf]

Alan M Katz
Government Information Leaks and the First Amendment [PDF]

Tara McKelvey
Leak About Al Qaeda Plot and Double Agent Helps CIA, Could Scare Terrorists

Heidi Kitrosser
Classified Information Leaks and Free Speech [PDF] University of Illinois Law Review, 2008.

Derigan A. Silver
National Security and the Press: The Government’s Ability to Prosecute Journalists for the Possession or Publication of National Security Information [PDF]

Geoffrey R. Stone
Prosecuting the Press for Publishing Classified Information [PDF]


Back to Top

 

13. Cyberwar

Bradley Cho
Spot the Hacker: Combating Cyberwarfare under the International Rule of Law

Mark Clayton
Cyberwar timeline

Roger Crisp
Cyberwarfare: No New Ethics Needed

Adam Cummings, Todd Lewellen, David McIntire, Andrew P. Moore and Randall Trzeciak
Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector

Randall R. Dipert
Ethical Issues of Cyberwarfare

Cordula Droege
No legal vacuum in cyber space

Editorial
When the government kills

Beverley Head
World teeters on cyber-war brink

Council of Europe
Convention on Cybercrime

DHS.gov
Presidential Policy Directive / PPD-8: National Preparedness

Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue and Julia Spiegel
The Law of Cyber-Attack

Homelandsecuritynewswire.com
China’s cyber espionage campaign described as “the greatest transfer of wealth in history”

J. Nicholas Hoover
Cyber Attacks Becoming Top Terror Threat, FBI Says

Bryan Krekel, Patton Adams and George Bakos
Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage

James A. Lewis
Cybersecurity Assessing the Immediate Threat to the United States

Patrick Lin, Fritz Allhoff, and Neil Rowe
Is It Possible to Wage a Just Cyberwar?

A. Edward Major
Law and Ethics in Command Decision Making [PDF]

Anna Mulrine
Cyberdefense: Should Americans be concerned about their privacy?

RT.com
FBI: Cyber attacks – America’s top terror threat

David E. Sanger and Eric Schmitt
Rise Is Seen in Cyberattacks Targeting U.S. Infrastructure
Video

Michael S. Schmidt
Cybersecurity Bill Is Blocked in Senate by G.O.P. Filibuster

Michael S. Schmidt
Senators Force Weaker Safeguards Against Cyberattacks

Whitehouse.gov
International Strategy for Cyberspace [PDF]

Susan W. Brenner with Leo L. Clarke
Civilians in Cyberwarfare: Conscripts [PDF]
Civilians in Cyberwarfare: Casualties [PDF]

K. Saalbach
Methods and Practice [PDF]

Nicole Perlroth
Virus Seeking Bank Data Is Tied to Attack on Iran

Mary Ellen O’Connell
Cyber Security without Cyber War

Homeland Security News Wire
US Always Ends up Regulating New Technologies for Public Safety

Nicole Perlroth
Software Meant to Fight Crime Is Used to Spy on Dissidents

Department of Defense
Strategy for Operating in Cyberspace

United States Government Accountability Office
Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities

Eric Fischer
Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions

Kenneth Geers
Strategic Cyber Security

Stewart Baker
Draft Cybersecurity Executive Order Leaks

Editorial
A New Kind of Warfare

Brendan Sasso
White House Confirms Cybersecurity Order in the Works The Hill

The White House
Cybersecurity Progress after President Obama’s Address

• Homeland Security News Wire
Civilian Cyberwarriors Not Motivated by Patriotism

• Cyberspace Policy review [PDF]

• John O. Brennan
John Brennan Response to Sen. Rockefeller on Cybersecurity Legislation [PDF]

• Sean Kanuck
Sovereign Discourse on Cyber Conflict Under International Law [PDF] Texas Law Review

Thom Shanker and David E. Sanger
U.S. Suspects Iran Was Behind a Wave of Cyberattacks

• Michael N. Schmitt, General Editor
Tallinn Manual on the International Law Applicable to Cyber Warfare

Candace Yu
We Have an Antiquated Framework


Back to Top

 

14. Treatment of Detainees

Inspector General (Pentagon)
Investigation of Allegations of the use of Mind-altering Drugs to Facilitate Interrogation of Detainees

Thelma Gutierrez
Investigation of Lawsuit: ICE drugging detainees set for deportation

Jeffrey Kaye
A Guantanamo Connection? Documents Show CIA Stockpiled Antimalaria Drugs as “Incapacitating Agents”

Christian M. Halliburton
Letting Katz out of the Bag: Cognitive Freedom and Fourth Amendment Fidelity [PDF]

Talkingpointsmemo.com
Eric Holder’s Full Statement On Closing Investigation Of CIA Detainee Deaths


Back to Top

 

15. Sovereignty

Greg Miller
In interview, Yemeni president acknowledges approving U.S. drone strikes

• Steven G. Calabresi, Mark E. Berghausen & Skylar Albertson
The Rise and Fall of the Separation of Powers,” Northwestern University Law Review, 2012

• Vicki Divoll
The ‘Full Access Doctrine’: Congress’s Constitutional Entitlement to National Security Information from the Executive,” Harvard Journal of Law & Public Policy, 2011

• Keith E. Whittington and Daniel P. Carpenter
Executive Power in American Institutional Development,” Perspective on Politics, 2003.

• Sharon Anderson-Gold
“Terrorism and the Politics of Human Rights,” Social Philosophy Today, 2004.

• Omar Dahbour
Advocating Sovereignty in an Age of Globalization,” Journal of Social Philosophy, 2006.

• Jovana Davidovic
Are Humanitarian Military Interventions Obligatory?” Journal of Applied Philosophy, 2008.

• Renée De Nevers
Sovereignty and Ethical Argument in the Struggle against State Sponsors of Terrorism,” Journal of Military Ethics, 2007.

• Gerald Doppelt
Walzer’s Theory of Morality in International Relations,” Philosophy and Public Affairs, 1978.

• Michael Dusche
Human Rights, Autonomy and National Sovereignty,” Ethical Perspectives: Journal of the European Ethics Network, 2000.

• David Held
Law of States, Law of Peoples: Three Models of Sovereignty,” Legal Theory, 2002.

• Bernd Krehoff
Legitimate Political Authority and Sovereignty: Why States Cannot Be the Whole Story,” Res Publica: A Journal of Legal and Social Philosophy, 2008.

• Christopher Morris
The Very Idea of Popular Sovereignty: “We the People” Reconsidered,” Social Philosophy and Policy, 2000.

• James Nickel
Is Today’s International Human Rights System a Global Governance Regime,” Journal of Ethics: An International Philosophical Review, 2002.

• Mathias Risse
What to Say about the State,” Social Theory and Practice: An International and Interdisciplinary Journal of Social Philosophy, 2006.

• Michael Walzer
Philosophy and Public Affairs, 9 (September 1980): 209-229.

• Christopher Wellman
Taking Human Rights Seriously,” Journal of Political Philosophy,  2012.

• Marlene, Wind
Challenging Sovereignty? The USA and the Establishment of the International Criminal Courtr,” Ethics and Global Politics, 2009.

• Anthony J. Colangelo
Constitutional Limits on Extraterritorial Jurisdiction: Terrorism and the Intersection of National and
International Law
,” 48 Harv. Int’l L. J. 121 (2007)

• Robert J. Delahunty & John Choon Yoo
Executive Power v. International Law,” 30 Harv. J. L. & Pub. Pol’y 73 (2007)

• Laura Donohue
Federalism and the Battle over Counterterrorist Law: State Sovereignty, Criminal Law Enforcement, and National Security,” 25 Stud. Conflict & Terrorism 1 (2002)

• Sharon Anderson-Gold
Terrorism and the Politics of Human Rights in Social Philosophy Today,” War and Terrorism, Volume 20, Rowan, John R (ed), 155-164  

• John Yoo
George Washington and the Executive Power,” University of St. Thomas Journal of Law & Public Policy, 2010

• John Yoo
Unitary, Executive or Both?” University of Chicago Law Review, 2009 

• John Yoo
Andrew Jackson and Presidential Power,” Charleston Law Review, 2008

• Robert J. Delahunty and John Yoo
Executive Power v. International Law,” Harvard Journal of Law & Public Policy, 2006

• Jide Nzelibe and John Yoo
Rational War and Constitutional Design,” Yale Law Journal Symposium, 2006

• John C. Yoo and Robert J. Delahunty
The President’s Constitutional Authority to Conduct Military Operations Against Terrorist Organizations and the Nations that Harbor or Support Them,” Harvard Journal of Law & Public Policy, 2002

• John Yoo
UN Wars, US War Powers,” Chicago Journal of International Law, 2000

• John Yoo
Sounds of Sovereignty: Defining Federalism in the 1990s,” Indiana Law Review, 1998


Back to Top

 

16. Just War

Greg Miller
In interview, Yemeni president acknowledges approving U.S. drone strikes


Back to Top

 

17. Torture

David Luban
America’s Illicit Affair with Torture (Keynote address to the National Consortium of Torture Treatment Programs)

• Various Authors
Letter from 28 Retired Generals and Admirals to President Obama Calling on Him to Support Efforts to Declassify the SSCI study on CIA Interrogation


Back to Top

 

18. National Security

China has no cyber-war troops: spokesman Shanghai Daily

• Mark Mazzetti and Justin Elliott
Spies Infiltrate a Fantasy Realm of Online Games

• Greg Weston, Glenn Greenwald, Ryan Gallagher
Snowden document shows Canada set up spy posts for NSA

• Steven Rich and Barton Gellman
NSA seeks to build quantum computer that could crack most types of encryption

• Michael Morell
Correcting the record on the NSA review

• Sari Horwitz
NSA collection of phone data is lawful, federal judge rules

• Eugene Robinson
The right call on the NSA

19. The nature of combatancy

 Mark K. Pesando, J.D.
Appendix O. Terrorism, Homeland Security Act Summary Appendix O (2013 ed.)

 Karl S. Chang
“Enemy Status and Military Detention in the War Against Al-Qaeda,” 47 Tex. Int’l L.J. 1, 2011

 Knut Dormann
“The Legal Situation of ‘Unlawful/Unprivileged Combatants,’” RICR Mars IRRC March 2003 Vol. 85 No 849

• John R. Crook, Ed.
“Contemporary Practice of the United States Relating to International Law,” 104 Am. J. Int’l L. 117, 2010

 Laurie R. Blank
“Targeted Strikes: The Consequences of Blurring the Armed Conflict and Self-Defense Justifications,” 38 Wm. Mitchell L. Rev. 1655, 2012

 Derek Jinks
“The Declining Significance of POW Status,” 45 Harv. Int’l L.J. 367, 2004

 Geoffrey S. Corn
“The Role of the Courts in the War on Terror: The Intersection of Hyperbole, Military Necessity, and Judicial Review,” 43 New Eng. L. Rev. 17, 2008

 Noman Goheer
“The Unilateral Creation of International Law During the ‘War on Terror’ : Murder by an Unprivileged Belligerent is Not a War Crime,” 10 N.Y. City L. Rev. 533, 2007

• Joanna Woolman
Enemy Combatants: The Legal Origins of the Term “Enemy Combatant” Do Not Support its Present Day Use, 7 J.L. & Soc. Challenges 145, 2005

• Nathaniel Berman
Privileging Combat? Contemporary Conflict and the Legal Construction of War,” Columbia Journal of Transnational Law, 2004

• Lieutenant Colonel (s) Joseph P. “Dutch” Bialke
Al-Qaeda & Taliban Unlawful Combatant Detainees, Unlawful Belligerency, and the International Laws of Armed Conflict, 55 A.F. L. Rev. 1, 2004

• William Bradford
Barbarians at the Gates: A Post-September 11th Proposal to Rationalize the Laws of War, 73 Miss. L.J. 639, 2004

• Eric Talbot Jensen
Combatant Status: It is Time for Intermediate Levels of Recognition for Partial Compliance, 46 Va. J. Int’l L. 209, 2005

• Geoffrey S. Corn
Thinking the Unthinkable: Has the Time Come to Offer Combatant Immunity to Non-State Actors?” 22 STAN. L.&POL’Y REV.253, 2011

• Jens Ohlin
“The Duty to Capture,” Minnesota Law Review, Vol. 97, 2013

• Ryan Goodman
“The Power to Kill or Capture Enemy Combatants,” European Journal of International Law, Vol. 24, 2013 

 Kenneth Anderson
“Readings: Jens Ohlin, ‘The Duty to Capture,’ Lawfare Blog, 2013

 Robert Chesney
“The Capture-or-Kill Debate #11: Goodman Responds to Ohlin,” Lawfare Blog, 2013

 Jens Ohlin
“The Capture-Kill Debate Continues,” LieberCode Blog, 2013


Back to Top