Readings
1. Responses to Targeted Killing
2. Drones
3. Targeted Killing in Current Law
4. Memoranda, Reports, and Cases on Targeted Killing
5. Relation between Domestic Law and Targeted Killing
6. Press Coverage on National Secrecy
7. Contemporary Issues on Secrecy and the Rule of Law
8. Philosophical Writings on Publicity Conditions
9. Classification and Executive Privilege
10. Secrecy and Military Operations
11. Secrecy and Civil Rights
12. The Ethics of Leaks: When to Release Information, When to Prosecute
13. Cyberwar
14. Treatment of Detainees
15. Sovereignty
16. Just War
17. Torture
18. National Security
19. The Nature of Combatancy
20. Procurement Ethics
1. Responses to Targeted Killing
• Joshua P. Andresen:
Due Process of War in the Age of Drones. Yale Journal of International Law 41 (2016): 155. (PDF)
• Antonio Cassese:
The Multifaceted Criminal Notion of Terrorism in International Law, 4 J. INT’L CRIM. JUST. 933 (2006) [DOC]
• Michael L. Gross:
Assassination and Targeted Killing: Law Enforcement, Execution or Self-Defence?, 23 J. APPLIED PHIL. 323 (2006) [PDF]
• David Kretzmer:
Targeted Killing of Suspected Terrorists: Extra-Judicial Executions or Legitimate Means of Defence?, 16 EUR. J. INT’L L. 171 (2005) [PDF]
• Jeff McMahan:
The Ethics of Killing in War, 114 ETHICS 693 (2004) [PDF]
• Jeff McMahan:
KILLING IN WAR (2009)
• Andrew Altman and Christopher Heath Wellman:
From Humanitarian Intervention to Assassination: Human Rights and Political Violence, 118 ETHICS 228 (2008) [PDF]
• Daniel Statman:
Targeted Killing, 5 THEORETICAL INQUIRIES L. 179 (2004) [PDF]
• David Rodin:
WAR AND SELF-DEFENSE (2005)
• Francis M. Kamm:
Failures of Just War Theory: Terror, Harm, and Justice, 114 ETHICS 650 (2004)
• Robert Chesney
Who May Be Killed? Anwar Al-Awlaki as a Case Study in the International Legal Regulation of Lethal Force, 13 Y.B. Int’l L. 3 (2010)
• John C. Dehn & Kevin Jon Heller
Debate: Targeted Killing: The Case of Anwar Al-Aulaqi
• Steven R. David
Israel’s Policy of Targeted Killing, 17 ETHICS & INT’L AFF. 111 (2003) [PDF]
• Tamar Meisels
Combatants - Lawful and Unlawful, 26 L. & PHIL. 31 (2007) [PDF]
• Kenneth Anderson
Targeted Killing and Drone Warfare: How We Came to Debate Whether There is a ‘Legal Geography of War’, (Washington College of Law, Research Paper No. 2011-16, 2011)
• Mary Ellen O’Connell
The Right to Life in War and Peace: A Legal and Moral Critique of Targeted Killing
• Lesa Jansen
Obama to release document on targeted killings to Congress, CNN, Feb. 7, 2013
• Jane Y. Chong
Targeting the Twenty-First-Century Outlaw, 122 YALE L.J. 724 (2012)
2. Drones
• Paul Waldman
Game of Drones, AM. PROSPECT, Feb. 14, 2013
• Dillon Zhou
China Drones Prompt Fears of a Drone Race with the US, POLICY.MIC, Dec 2, 2012
• Drone Wars UK
Mapping Drone Proliferation: UAVs in 76 Countries, GLOBAL RESEARCH, Sept. 18, 2012
• Chris Cole, Drone Wars UK
Drone Wars Briefing, DRONE WARS UK, Jan. 2012
• United States Government Accountability Office
NONPROLIFERATION: AGENCIES COULD IMPROVE INFORMATION SHARING AND END-USE MONITORING ON UNMANNED AERIAL VEHICLE EXPORTS (2012)
• Carla Anne Robbins
Drones: Transparency on Rules for Their Use is a Must, BLOOMBERG BUSINESSWEEK, Feb. 14, 2013
• Stephen Vladeck
Why a “Drone Court” Won’t Work- But (Nominal) Damages Might…, LAWFARE, Feb. 10, 2013
• Deborah Pearlstein
These Aren’t the Courts We’re Looking For, OPINIO JURIS, Feb. 15, 2013
• Scott Shane
Debating a Court to Vet Drone Strikes, N.Y. TIMES, Feb. 8, 2013
• Kimberly Dozier
Brennan Open to Special Court for Drone Strikes, U.S. NEWS & WORLD REP., Feb. 15, 2013
• Joe Wolverton
Congress Considers Special Drone Court; UN Investigates Deadly Drone Strikes, NEW AM., Feb. 14, 2013
• James Robertson
Judges Shouldn’t Decide About Drone Strikes, WASH. POST, Feb. 15, 2013
• Ryan Goodman
The Lesser Evil: What the Obama Administration Isn’t Telling You About Drones: The Standard Rule is Capture, Not Kill, SLATE, Feb. 19, 2013
• Barbara Starr, Pam Benson and Tom Cohen
Brennan Defends Al-Awlaki Drone Strike as Part of War with Al Qaeda, CNN, Feb. 8, 2013
• Tabassum Zakaria
Lawmakes raise concerns about Obama’s drone policies, REUTERS, Feb. 27, 2013
• Patrick McGreevy
California lawmakers propose rules, tax breaks for drone aircraft, L.A. TIMES, Feb. 28, 2013
• Jonathan S. Landay
Obama’s drone war kills ‘others,’ not just al Qaida leaders, MCCLATCHY, April 9, 2013
• Micah Zenko
An Inconvenient Truth, FOREIGN POL’Y, April 10, 2013
• Cora Currier
Everything We Know So Far About Drone Strikes, PROPUBLICA, Feb. 5, 2013
• Michael J. Boyle
The Costs and Consequences of Drone Warfare, 89 INT’L AFF. 1 (2013)
3. Targeted Killing in Current Law
• Orna Ben-Naftalit & Keren R. Michaeli:
‘We Must Not Make a Scarecrow of the Law’: A Legal Analysis of the Israeli Policy of Targeted Killings, 36 CORNELL INT’L L.J. 233 (2003) [PDF]
• William C. Banks and Peter Raven-Hansen:
Targeted Killing and Assassination: The U.S. Legal Framework, 37 U. RICH. L. REV. 667 (2003) [PDF]
• Richard Murphy & Afsheen John Radsan:
Due Process and the Targeted Killing of Terrorists, 31 CARDOZO L. REV. 405 (2009) [PDF]
• Mary Ellen O’Connell:
Unlawful Killing with Combat Drones: A Case Study of Pakistan, 2004-2009 (Notre Dame Law School Legal Studies Research Paper No. 09-43, 2010) (PDF)
• Gabriella Blum and Philip Heymann:
Law and Policy of Targeted Killing, 1 HARV. NAT’L SEC. J. 145 (2010) [PDF]
• Nils Melzer:
TARGETED KILLING IN INTERNATIONAL LAW (2008)
• Jordan J. Praust:
Self-Defense Targetings of Non-State Actors and Permissibility of U.S. Use of Drones in Pakistan, 19.2 J. TRANSNAT’L L. & POL’Y 237 (2010) [PDF]
• Kenneth Anderson:
Targeted Killing in U.S. Counterterrorism Strategy and Law (Brookings Inst., Working Paper, 2009) [PDF]
• J. Nicholas Kendall:
Israeli Counter-Terrorism: “Targeted Killings” Under International Law, 80 N.C. L. REV. 1069 (2002) [PDF]
• Michael L. Gross
MORAL DILEMMAS OF MODERN WAR: TORTURE, ASSASSINATION, AND BLACKMAIL IN AN AGE OF ASYMMETRIC CONFLICT (2009)
• Video:
Benjamin Wittes, Wittes v. O’Connell on Targeted Killing and Drones, LAWFARE (Oct. 25, 2010)
• Targeted Killing, OPINIO JURIS
• The Geneva Conventions of 1949 and their Additional Protocols, INTERNATIONAL COMMITTEE OF THE RED CROSS
• Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, Dec. 10, 1984, 1465 U.N.T.S. 85, 113; S. Treaty Doc. No. 100-20 (1988); 23 I.L.M. 1027 (1984)
• Federal Torture Statutes, 18 U.S.C § 2340 (A)-(B)
• Federal Torture Statutes, 10 U.S.C § 948r
• Clarifying the Notion of Direct Participation in Hostilities, INTERNATIONAL COMMITTEE OF THE RED CROSS (June 30, 2009)
• Office of Legal Counsel White Paper Summarizes 2010 Targeted Killing Memorandum:
Jameel Jeffer, The Justice Department’s White Paper on Targeted Killing, AM. C.L. UNION (Feb. 4, 2013)
• U.S. Drone Strike Kills Top al-Shabaab Bomb Maker, HOMELAND SECURITY NEWS WIRE (Nov. 4 2013)
4. Memoranda, Reports, and Cases on Targeted Killing
• HCJ 769/02 Public Committee Against Torture v. Israel [2005] (Israeli “Targeted Killings Case) [PDF]
• W. Hays Parks, Memorandum of Law on Executive Order 12333 and Assassination, DAJA-IA (27-1a), The Army Lawyer 4 (Dec. 1989) [PDF]
• Harold Koh, Legal Adviser to Dept. of State, International Law and the Obama Administration, Address at Annual Meeting of the American Society of International Law (March 25, 2010)
• Al-Aulaqi v. Obama, 727 F.Supp.2d 1 (2010)
• The Year of the Drone (Data on Aerial Drone Strikes)
• Al-Shimari v. CACI Int’l, 679 F.3d 205 (4th Cir. 2012) (opinion dismissing appeal) [PDF]
5. Relation between Domestic Law and Targeted Killing
• Lawrence Alexander:
The Doomsday Machine: Proportionality, Punishment and Prevention, 63 MIND 199 (1980) [PDF]
• Claire Finkelstein:
Threats and Preemptive Practices, 5 LEGAL THEORY 311 (1999) [PDF]
• Amos Guiora:
Targeted Killing as Active Self-Defense, 36 CASE W. RES. J. INT’L L. 319 (2004) [PDF]
• Tenn v. Garner, 471 U.S. 1 (1984) (fleeing suspect case) [PDF]
• Katko v. Briney, 183 N.W.2d 257 (Iowa 1971) (spring-gun case) [PDF]
6. Press Coverage on National Secrecy
• Inside the Killing Machine Newsweek
• Gary Solis
CIA drone attacks produce America’s own unlawful combatants
• Geoffrey Robertson
Is It Lawful to Kill Gaddafi?
• Ken Dilanian
CIA has slashed its terrorism interrogation role
• Charlie Savage
Secret U.S. Memo Made Legal Case to Kill a Citizen New York Times
• Scott Horton
Justifying the Killing of an American
• David Cole
Killing Citizens in Secret
• Ahmed Al-Haj
Yemen Says Air-Strike Kills Al-Qaeda Media Chief
• Eric Schmitt and Thom Shanker
U.S. Debated Cyberwarfare in Attack Plan on Libya
• Morris Davis
Combatant Immunity and the Death of Anwar al-Awlaqi
• Nicholas Schmidle
Getting Bin Ladin [PDF]
• David S. Cloud and David Zucchino
Multiple missteps led to drone killing U.S. troops in Afghanistan
• Spencer Ackerman
CIA Drones Kill Large Groups Without Knowing Who They Are
• Daphne Eviatar
CIA Drones Gone Wild? [PDF]
• Adam Entous
US Tightens Drone Rules
• Daniel Swift
Drone Knowns and Drone Unknowns [PDF]
• Iran’s downing of U.S. drone rattles Washington Tehran Times
• Scott Shane and David E. Sanger
Drone Crash in Iran Reveals Secret U.S. Surveillance Effort
• Peter W. Singer
Do Drones Undermine Democracy? [PDF] New York Times
• Eric Schmitt and Michael S. Schmidt
U.S. Drones Patrolling Its Skies Provoke Outrage in Iraq New York Times
• Karen DeYoung
ACLU sues to force release of drone attack records The Washington Post
The complaint [PDF] by the ACLU
• Editorial
America’s drone wars Los Angeles Times
• John Sifton
A Brief History of Drones The Nation
• Jackie Calmes, Charlie Savage, Jo Becker and Scott Shane
A Measure of Change (series)
• Daniel Klaidman
Drones: How Obama Learned to Kill Excerpt from Klaidman’s Kill or Capture: The War on Terror and the Soul of the Obama Presidency.
• David Luban
What Would Augustine Do? The President, Drones, and Just War Theory
• Bruce Ackerman
Protect, Don’t Prosecute, Patriotic Leakers
• David Taintor
Poll: Americans Are The ‘Clear Outliers’ In Support For Drone Strikes
• Mark Mazzetti
The Drone Zone
• homelandsecuritynewswire.com
Do drones increase the likelihood of war by lowering its cost?
• Marc Ambinder
10 Things You Didn’t Know About The National Security Agency Suveillance Program
• Mattea Kramer and Chris Hellman
‘Homeland Security’: The Trillion-Dollar Concept That No One Can Define
7. Contemporary Issues on Secrecy and the Rule of Law
• Meir Dan-Cohen
Decision Rules and Conduct Rules: On Acoustic Separation in Criminal Law [PDF]
• Editorial
The Power to Kill New York Times
• Daniel Patrick Moynihan
Secrecy as Regulation [PDF]
• Daniel Patrick Moynihan
The Routinization of Secrecy [PDF]
• Seumas Miller and Michael J. Selgelid
Ethical and Philosophical Consideration of the Dual-use Dilemma in the Biological Sciences [PDF]
• Editorial
“Statement on scientific publication and security” fails to provide necessary guidelines [PDF] PNAS
• Journal Editors and Authors Group
Uncensored exchange of scientific results PNAS
• Statement of Anthony S. Fauci, M.D.
Dual Use Research of Concern: Balancing Benefits and Risks
• Glenn Greenwald
Three key lessons from the Obama administration’s drone lies
8. Philosophical Writings on Publicity Conditions
• Kevin R. Davis
Kantian “Publicity” and Political Justice [PDF]
• Samuel Freeman
The burdens of public justification: constructivism, contractualism, and publicity [PDF]
• Thomas Hobbes
On the Office of Sovereign Representative [PDF]
• Charles Larmore
Public Reason [PDF]
• Macchiavelli
The Prince [PDF]
• Plato
The Noble Lie [PDF]
• John Rawls
Formal Conditions of Right [PDF]
• John Rawls
Two Concepts of Rules [PDF]
• Andrew Williams
Incentives, Inequality, and Publicity [PDF]
9. Classification and Executive Privilege
• Mohamed v. Jeppensen Dataplan (9th District Court of Appeals) [PDF]
• David Carr
Blurred Line Between Espionage and Truth
• Andre Cohen
The Torture Memos: Ten Years Later
• Liza Goitein and J. William Leonard
America’s Unnecessary Secrets
• Gia Lee
The Presidents Secret [PDF] George Washington Law Review, 2007.
• Eric Posner and Adrian Vermeule
Terror in the Balance: Security, Liberty and the Courts; Introduction [PDF]
• Charlie Savage
Ex-C.I.A Officer Charged in Information Leak
• Max Weber
Economy and Society, Ch. 11: Bureaucracy” [PDF]
• US District Court- New York
Azmy v. DoD [PDF]
10. Secrecy and Military Operations
• US District Court: District of Columbia
Excerpt from “Al-Alaqi v. Obama” [PDF]
• John Brennan
The Ethics and Efficacy of the President’s Counterterrorism Strategy
• Editorial
America’s drone wars Los Angeles Times
• Justin Elliott
Obama Administration’s Drone Death Numbers Don’t Add up
• John Hart Ely
War and Responsibility, Ch 4-5 [PDF]
• Josh Gerstein
Judge losing patience with feds in targeted killing FOIA case
• Jack Goldsmith
Fire When Ready
• Kevin Govern
Warrant-Based Killings [PDF]
• Karen Greenberg
Doubling down on 9/11
• Scott Horton
Justifying the Killing of an American
• W. Michael Reisman and James E. Baker
Regulating Covert Action, Ch. 1-2 [PDF]
• Charlie Savage
Secret U.S. Memo Made Legal Case to Kill a Citizen
• Kim Lane Scheppelle
The Sociology of Secrecy [PDF] Legal Secrets, Chapter 1
• Scott Shane
U.S. Attacks, Online and From the Air, Fuel Secrecy Debate
• Daniel Swift
Drone Knowns and Drone Unknowns [PDF]
• Emptywheel
CIA’s Drone Lies and Congressional Oversight
11. Secrecy and Civil Rights
• Michael Dorf
Arlen Specter’s Swan Song: Mandating Cameras in the Supreme Court
• Editorial
Live, From the Supreme Court NY Times
• Editorial
Exceptional Court Coverage NY Times
• Amy Goodman
National Security Agency Whistleblower William Binney on Growing State Surveillance
• Senator Jeff Merkley
Senator Merkley on Secret Law and NSA Spying
• Adam D. Moore
Privacy, Security and Government Surveillance: Wikileaks and the New Accountability [PDF]
• Alan Rubel
Privacy and the USA Patriot Act: Rights, the Value of Right, and Autonomy [PDF]
• Matthew Taylor and Nick Hopkins
World’s leading authors: state surveillance of personal data is theft
• Edward Wyatt and Claire Cain Miller
Tech Giants Issue Call for Limits on Government Surveillance of Users
• Nicole Perlroth and Vindu Goel
Internet Firms Step Up Efforts to Stop Spying
• Barton Gellman and Ashkan Soltani
NSA tracking cellphone locations worldwide, Snowden documents show
• Anthony Faiola
Britain targets Guardian newspaper over intelligence leaks related to Edward Snowden
• Brian X. Chen
A Senator Plans Legislation to Narrow Authorities’ Cellphone Data Requests
• David E. Sanger
Obama Panel Said to Urge N.S.A. Curbs
• Peter Baker and Charlie Savage
Peter Baker and Charlie Savage
Obama Seeks Balance in Plan for Spy Programs
• Ellen Nakashima
NSA exploring alternatives to holding database of domestic phone records
• Greg Miller and Ellen Nakashima
Officials’ defenses of NSA phone program may be unraveling
• Ellen Nakashimaand Ashkan Soltani
Panel Urges new curbs on surveillance by U.S.
12. The Ethics of Leaks: When to Release Information, When to Prosecute
• E.E.B. and K.E.M.
Plugging the Leak: The Case for a Legislative Resolution of the Conflict between the Demands of Secrecy and the Need for an Open Government [pdf]
• Alan M Katz
Government Information Leaks and the First Amendment [PDF]
• Tara McKelvey
Leak About Al Qaeda Plot and Double Agent Helps CIA, Could Scare Terrorists
• Heidi Kitrosser
Classified Information Leaks and Free Speech [PDF] University of Illinois Law Review, 2008.
• Derigan A. Silver
National Security and the Press: The Government’s Ability to Prosecute Journalists for the Possession or Publication of National Security Information [PDF]
• Geoffrey R. Stone
Prosecuting the Press for Publishing Classified Information [PDF]
13. Cyberwar
• Bradley Cho
Spot the Hacker: Combating Cyberwarfare under the International Rule of Law
• Mark Clayton
Cyberwar timeline
• Roger Crisp
Cyberwarfare: No New Ethics Needed
• Adam Cummings, Todd Lewellen, David McIntire, Andrew P. Moore and Randall Trzeciak
Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector
• Randall R. Dipert
Ethical Issues of Cyberwarfare
• Cordula Droege
No legal vacuum in cyber space
• Editorial
When the government kills
• Beverley Head
World teeters on cyber-war brink
• Council of Europe
Convention on Cybercrime
• DHS.gov
Presidential Policy Directive / PPD-8: National Preparedness
• Oona A. Hathaway, Rebecca Crootof, Philip Levitz, Haley Nix, Aileen Nowlan, William Perdue and Julia Spiegel
The Law of Cyber-Attack
• Homelandsecuritynewswire.com
China’s cyber espionage campaign described as “the greatest transfer of wealth in history”
• J. Nicholas Hoover
Cyber Attacks Becoming Top Terror Threat, FBI Says
• Bryan Krekel, Patton Adams and George Bakos
Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage
• James A. Lewis
Cybersecurity Assessing the Immediate Threat to the United States
• Patrick Lin, Fritz Allhoff, and Neil Rowe
Is It Possible to Wage a Just Cyberwar?
• A. Edward Major
Law and Ethics in Command Decision Making [PDF]
• Anna Mulrine
Cyberdefense: Should Americans be concerned about their privacy?
• RT.com
FBI: Cyber attacks – America’s top terror threat
• David E. Sanger and Eric Schmitt
Rise Is Seen in Cyberattacks Targeting U.S. Infrastructure
Video
• Michael S. Schmidt
Cybersecurity Bill Is Blocked in Senate by G.O.P. Filibuster
• Michael S. Schmidt
Senators Force Weaker Safeguards Against Cyberattacks
• Whitehouse.gov
International Strategy for Cyberspace [PDF]
•Susan W. Brenner with Leo L. Clarke
Civilians in Cyberwarfare: Conscripts [PDF]
Civilians in Cyberwarfare: Casualties [PDF]
• K. Saalbach
Methods and Practice [PDF]
• Nicole Perlroth
Virus Seeking Bank Data Is Tied to Attack on Iran
• Mary Ellen O’Connell
Cyber Security without Cyber War
• Homeland Security News Wire
US Always Ends up Regulating New Technologies for Public Safety
• Nicole Perlroth
Software Meant to Fight Crime Is Used to Spy on Dissidents
• Department of Defense
Strategy for Operating in Cyberspace
• United States Government Accountability Office
Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities
• Eric Fischer
Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions
• Kenneth Geers
Strategic Cyber Security
• Stewart Baker
Draft Cybersecurity Executive Order Leaks
• Editorial
A New Kind of Warfare
• Brendan Sasso
White House Confirms Cybersecurity Order in the Works The Hill
• The White House
Cybersecurity Progress after President Obama’s Address
• Homeland Security News Wire
Civilian Cyberwarriors Not Motivated by Patriotism
• Cyberspace Policy review [PDF]
• John O. Brennan
John Brennan Response to Sen. Rockefeller on Cybersecurity Legislation [PDF]
• Sean Kanuck
Sovereign Discourse on Cyber Conflict Under International Law [PDF] Texas Law Review
• Thom Shanker and David E. Sanger
U.S. Suspects Iran Was Behind a Wave of Cyberattacks
• Michael N. Schmitt, General Editor
Tallinn Manual on the International Law Applicable to Cyber Warfare
• Candace Yu
We Have an Antiquated Framework
14. Treatment of Detainees
• Inspector General (Pentagon)
Investigation of Allegations of the use of Mind-altering Drugs to Facilitate Interrogation of Detainees
• Thelma Gutierrez
Investigation of Lawsuit: ICE drugging detainees set for deportation
• Jeffrey Kaye
A Guantanamo Connection? Documents Show CIA Stockpiled Antimalaria Drugs as “Incapacitating Agents”
• Christian M. Halliburton
Letting Katz out of the Bag: Cognitive Freedom and Fourth Amendment Fidelity [PDF]
• Talkingpointsmemo.com
Eric Holder’s Full Statement On Closing Investigation Of CIA Detainee Deaths
15. Sovereignty
• Greg Miller
In interview, Yemeni president acknowledges approving U.S. drone strikes
• Steven G. Calabresi, Mark E. Berghausen & Skylar Albertson
“The Rise and Fall of the Separation of Powers,” Northwestern University Law Review, 2012
• Vicki Divoll
“The ‘Full Access Doctrine’: Congress’s Constitutional Entitlement to National Security Information from the Executive,” Harvard Journal of Law & Public Policy, 2011
• Keith E. Whittington and Daniel P. Carpenter
“Executive Power in American Institutional Development,” Perspective on Politics, 2003.
• Sharon Anderson-Gold
“Terrorism and the Politics of Human Rights,” Social Philosophy Today, 2004.
• Omar Dahbour
“Advocating Sovereignty in an Age of Globalization,” Journal of Social Philosophy, 2006.
• Jovana Davidovic
“Are Humanitarian Military Interventions Obligatory?” Journal of Applied Philosophy, 2008.
• Renée De Nevers
“Sovereignty and Ethical Argument in the Struggle against State Sponsors of Terrorism,” Journal of Military Ethics, 2007.
• Gerald Doppelt
“Walzer’s Theory of Morality in International Relations,” Philosophy and Public Affairs, 1978.
• Michael Dusche
“Human Rights, Autonomy and National Sovereignty,” Ethical Perspectives: Journal of the European Ethics Network, 2000.
• David Held
“Law of States, Law of Peoples: Three Models of Sovereignty,” Legal Theory, 2002.
• Bernd Krehoff
“Legitimate Political Authority and Sovereignty: Why States Cannot Be the Whole Story,” Res Publica: A Journal of Legal and Social Philosophy, 2008.
• Christopher Morris
“The Very Idea of Popular Sovereignty: “We the People” Reconsidered,” Social Philosophy and Policy, 2000.
• James Nickel
“Is Today’s International Human Rights System a Global Governance Regime,” Journal of Ethics: An International Philosophical Review, 2002.
• Mathias Risse
“What to Say about the State,” Social Theory and Practice: An International and Interdisciplinary Journal of Social Philosophy, 2006.
• Michael Walzer
Philosophy and Public Affairs, 9 (September 1980): 209-229.
• Christopher Wellman
“Taking Human Rights Seriously,” Journal of Political Philosophy, 2012.
• Marlene, Wind
“Challenging Sovereignty? The USA and the Establishment of the International Criminal Courtr,” Ethics and Global Politics, 2009.
• Anthony J. Colangelo
“Constitutional Limits on Extraterritorial Jurisdiction: Terrorism and the Intersection of National and
International Law,” 48 Harv. Int’l L. J. 121 (2007)
• Robert J. Delahunty & John Choon Yoo
“Executive Power v. International Law,” 30 Harv. J. L. & Pub. Pol’y 73 (2007)
• Laura Donohue
“Federalism and the Battle over Counterterrorist Law: State Sovereignty, Criminal Law Enforcement, and National Security,” 25 Stud. Conflict & Terrorism 1 (2002)
• Sharon Anderson-Gold
“Terrorism and the Politics of Human Rights in Social Philosophy Today,” War and Terrorism, Volume 20, Rowan, John R (ed), 155-164
• John Yoo
“George Washington and the Executive Power,” University of St. Thomas Journal of Law & Public Policy, 2010
• John Yoo
“Unitary, Executive or Both?” University of Chicago Law Review, 2009
• John Yoo
“Andrew Jackson and Presidential Power,” Charleston Law Review, 2008
• Robert J. Delahunty and John Yoo
“Executive Power v. International Law,” Harvard Journal of Law & Public Policy, 2006
• Jide Nzelibe and John Yoo
“Rational War and Constitutional Design,” Yale Law Journal Symposium, 2006
• John C. Yoo and Robert J. Delahunty
“The President’s Constitutional Authority to Conduct Military Operations Against Terrorist Organizations and the Nations that Harbor or Support Them,” Harvard Journal of Law & Public Policy, 2002
• John Yoo
“UN Wars, US War Powers,” Chicago Journal of International Law, 2000
• John Yoo
“Sounds of Sovereignty: Defining Federalism in the 1990s,” Indiana Law Review, 1998
16. Just War
• Greg Miller
In interview, Yemeni president acknowledges approving U.S. drone strikes
17. Torture
• David Luban
America’s Illicit Affair with Torture (Keynote address to the National Consortium of Torture Treatment Programs)
• Various Authors
Letter from 28 Retired Generals and Admirals to President Obama Calling on Him to Support Efforts to Declassify the SSCI study on CIA Interrogation
18. National Security
• China has no cyber-war troops: spokesman Shanghai Daily
• Mark Mazzetti and Justin Elliott
Spies Infiltrate a Fantasy Realm of Online Games
• Greg Weston, Glenn Greenwald, Ryan Gallagher
Snowden document shows Canada set up spy posts for NSA
• Steven Rich and Barton Gellman
NSA seeks to build quantum computer that could crack most types of encryption
• Michael Morell
Correcting the record on the NSA review
• Sari Horwitz
NSA collection of phone data is lawful, federal judge rules
• Eugene Robinson
The right call on the NSA
19. The nature of combatancy
• Mark K. Pesando, J.D.
Appendix O. Terrorism, Homeland Security Act Summary Appendix O (2013 ed.)
• Karl S. Chang
“Enemy Status and Military Detention in the War Against Al-Qaeda,” 47 Tex. Int’l L.J. 1, 2011
• Knut Dormann
“The Legal Situation of ‘Unlawful/Unprivileged Combatants,’” RICR Mars IRRC March 2003 Vol. 85 No 849
• John R. Crook, Ed.
“Contemporary Practice of the United States Relating to International Law,” 104 Am. J. Int’l L. 117, 2010
• Laurie R. Blank
“Targeted Strikes: The Consequences of Blurring the Armed Conflict and Self-Defense Justifications,” 38 Wm. Mitchell L. Rev. 1655, 2012
• Derek Jinks
“The Declining Significance of POW Status,” 45 Harv. Int’l L.J. 367, 2004
• Geoffrey S. Corn
“The Role of the Courts in the War on Terror: The Intersection of Hyperbole, Military Necessity, and Judicial Review,” 43 New Eng. L. Rev. 17, 2008
• Joanna Woolman
Enemy Combatants: The Legal Origins of the Term “Enemy Combatant” Do Not Support its Present Day Use, 7 J.L. & Soc. Challenges 145, 2005
• Nathaniel Berman
Privileging Combat? Contemporary Conflict and the Legal Construction of War,” Columbia Journal of Transnational Law, 2004
• Lieutenant Colonel (s) Joseph P. “Dutch” Bialke
Al-Qaeda & Taliban Unlawful Combatant Detainees, Unlawful Belligerency, and the International Laws of Armed Conflict, 55 A.F. L. Rev. 1, 2004
• William Bradford
Barbarians at the Gates: A Post-September 11th Proposal to Rationalize the Laws of War, 73 Miss. L.J. 639, 2004
• Eric Talbot Jensen
Combatant Status: It is Time for Intermediate Levels of Recognition for Partial Compliance, 46 Va. J. Int’l L. 209, 2005
• Geoffrey S. Corn
Thinking the Unthinkable: Has the Time Come to Offer Combatant Immunity to Non-State Actors?” 22 STAN. L.&POL’Y REV.253, 2011
• Jens Ohlin
“The Duty to Capture,” Minnesota Law Review, Vol. 97, 2013
• Ryan Goodman
“The Power to Kill or Capture Enemy Combatants,” European Journal of International Law, Vol. 24, 2013
• Kenneth Anderson
“Readings: Jens Ohlin, ‘The Duty to Capture,’ Lawfare Blog, 2013
• Robert Chesney
“The Capture-or-Kill Debate #11: Goodman Responds to Ohlin,” Lawfare Blog, 2013
• Jens Ohlin
“The Capture-Kill Debate Continues,” LieberCode Blog, 2013
Procurement Ethics
• Dean C. Ludwig, Clinton O. Longenecker
The Bathsheba Syndrome: The Ethical Failure of Successful Leaders
• Edmund F. Byrne
Assessing Arms Makers’ Corporate Social Responsibility
• Margot Cleveland, Christopher M. Favo, Thomas J. Frecka, Charles L. Owens
Trends in the International Fight Against Bribery
• Barton H. Halpern, Keith F. Snider
Products that Kill and Corporate Social Responsibility: The Case of U.S. Defense Firms
• Gavin Maitland
The Ethics of the International Arms Trade