Category: Military Law

0

UCLA Law Review Vol. 62, Issue 3

Volume 62, Issue 3 (March 2015)
Articles

Fixing Public Sector Finances: The Accounting and Reporting Lever James Naughton & Holger Spamann 572
Less Enforcement, More Compliance: Rethinking Unauthorized Migration Emily Ryo 622
Decriminalization, Police Authority, and Routine Traffic Stops Jordan Blair Woods 672

 

Comments

Not Whether Machines Think, But Whether Men Do Jane Stack 760
Fighting for a Place Called Home: Litigation Strategies for Challenging Gentrification Hannah Weinstein 794
0

UCLA Law Review Vol. 62, Issue 2

Volume 62, Issue 2 (February 2015)
Articles

Judging Opportunity Lost: Assessing the Viability of Race-Based Affirmative Action After Fisher v. University of Texas Mario L. Barnes, Erwin Chemerinsky & Angela Onwuachi-Willig 272
Enforcing Rights Nancy Leong & Aaron Belzer 306
Milliken, Meredith, and Metropolitan Segregation Myron Orfield 364

 

Comments

David’s Sling: How to Give Copyright Owners a Practical Way to Pursue Small Claims Jeffrey Bils 464
Nonserious Marijuana Offenses and Noncitizens: Uncounseled Pleas and Disproportionate Consequences Jordan Cunnings 510
9

UCLA Law Review Vol. 62, Issue 1

Volume 62, Issue 1 (January 2015)
Articles

Intellectual Property Law Solutions to Tax Avoidance Andrew Blair-Stanek 2
Cooperative Federalism and Marijuana Regulation Erwin Chemerinsky, Jolene Forman, Allen Hopper & Sam Kamin 74
Offshoring the Army: Migrant Workers and the U.S. Military Darryl Li 124

 

Comments

Inmates’ Need for Federally Funded Lawyers: How the Prison Litigation Reform Act, Casey, and Iqbal Combine With Implicit Bias to Eviscerate Inmate Civil Rights Tasha Hill 176
Proportional Voting Through the Elections Clause: Protecting Voting Rights Post-Shelby County Conner Johnston 236

 

 

 

The Technocracy Prepares for War

MilitarismMany have blamed American militarism on George W. Bush. Whether cast as cowboy, crusader, or dupe of the Angler, the ex-president was a convenient scapegoat. By 2008, voters felt comforted that neither the technocrat Obama nor the veteran McCain would recapitulate the tragedy of Iraq. And yet here we are, five years later, with both men uniting behind another “intervention.”

With the Bush bogeyman gone, the new war drive raises deep questions about the US political system. The Syria proposal is so at odds with what the American people want, what the world appears to want, and what even many of its intended beneficiaries want, that the question arises: what does the Administration know that we don’t? What gives them confidence that the US can accomplish its “three missions” in Syria? Andrew Bacevich puts the question plainly:

If you think back to 1980, and just sort of tick off the number of military enterprises that we have been engaged in that part of the world, large and small, you know, Beirut, Afghanistan, Iraq, Yemen, Somalia — and on and on, and ask yourself, ‘What have we got done? What have we achieved? Is the region becoming more stable? Is it becoming more democratic? Are we enhancing America’s standing in the eyes of the people of the Islamic world?’ ‘The answers are, ‘No, no, and no.’ So why, Mr. President, do you think that initiating yet another war in this protracted enterprise is going to produce a different outcome?

The other “big story” of the summer helps explain the hubris. If you had access to an intelligence apparatus as pervasive and expert as NSA/DIA/CIA/NGA et al., would you think you were missing anything? The lesson of history is that conflict is unpredictable, and can quickly spin out of control. But the dream of mass surveillance is mastery and control. Precrime, prewar, all manner of incipient evils: with enough anticipatory knowledge all can eventually be modulated away and conquered.
Read More

Money Laundries

I was recently reading a Money Laundering Threat Assessment (from 2005), and the following lines came up on p. 49:

[T]he trust laws of some jurisdictions have aided money launderers in their use of trusts to conceal identity and to perpetrate fraud. In certain jurisdictions, such as the Cook Islands, Nevis, and Niue, the trust laws no longer require the names of the settlor and the beneficiaries to be placed in the trust deed, permit settlors to retain control over the trust, and allow trusts to be revocable and of unlimited duration.

My question is: why is this even called a trust? Shouldn’t it bear some other name? At least Liechtenstein has the decency to call its creepy money-hiding methods “Anstalts.”

The larger consequences here are terrifying. The wealth defense industry has created an environment where all manner of swindlers, thieves, and terrorists can hide ill-gotten gains. As a forthcoming University of Pennsylvania piece by Shima Baradaran, Michael Findley, Daniel Nelson, and J.C. Sharman puts it:

On the whole, forming an anonymous shell company is as easy as ever, despite increased regulations following 9/11. The results are disconcerting and demonstrate that we are much too far from a world that is safe from terror.

I nevertheless expect that most of the centomillionaire and billionaire class will continue to fight efforts to crack down on shell companies and trusts, and will find ample “help” to argue their case. Perhaps someone will even pen an ode to financial privacy. Meanwhile, we have no idea what taxes may be due from trillions of dollars in offshore wealth, or to what purposes it is directed.

Expect to hear many more stories on this issue. The stakes could not be higher. As Liu Xiaobo has stated, corruption is the “officialization of the criminal and the criminalization of the official.” Persisting even in a world of brutal want and austerity-induced suffering, tax havenry epitomizes that sinister merger.

Do Corporations Enjoy a 2nd Amendment Right to Drones?

An emerging, “solutionist” narrative about drones goes something like this:

Yes, we should be very worried about government misuse of drones at home and abroad. But the answer is not to ban, or even blame, the technology itself. Rather, we need to spread the technology among more people. Worried that the government will spy on you? Get your own drones to watch the watchers. Fearful of malevolent drones? Develop your own protective force. The answer is more technology, not regulation of particular technologies.

I’d like to believe that’s true, if only because technology develops so quickly, and government seems paralyzed by comparison. But I think it’s a naive position. It manages to understate both the threats posed by drones, and the governance challenges they precipitate.
Read More

6

Schneier Calls Out Papers on How Terroristist Groups End

Bruce Schneier noted some research by Rand about How Terrorist Groups End. The abstract

Abstract: How do terrorist groups end? The evidence since 1968 indicates that terrorist groups rarely cease to exist as a result of winning or losing a military campaign. Rather, most groups end because of operations carried out by local police or intelligence agencies or because they join the political process. This suggests that the United States should pursue a counterterrorism strategy against al Qa’ida that emphasizes policing and intelligence gathering rather than a “war on terrorism” approach that relies heavily on military force.

likely rings true to many who question the use of drones etc. (The comments on Bruce’s page get into some of this point).

To me the fact that RAND put the paper out is interesting. I can never tell whether RAND or what RAND is about. It would seem that claims that RAND is only going to support the government’s goals might be challenged here. Also Bruce calls out the work of Max Abrahms who in 2008 and 2011 addressed these ideas as well. I urge you read the 2008 post and here is the 2011 abstract

The basic narrative of bargaining theory predicts that, all else equal, anarchy favors concessions to challengers who demonstrate the will and ability to escalate against defenders. For this reason, post-9/11 political science research explained terrorism as rational strategic behavior for non-state challengers to induce government compliance given their constraints. Over the past decade, however, empirical research has consistently found that neither escalating to terrorism nor with terrorism helps non-state actors to achieve their demands. In fact, escalating to terrorism or with terrorism increases the odds that target countries will dig in their political heels, depriving the nonstate challengers of their given preferences. These empirical findings across disciplines, methodologies, as well as salient global events raise important research questions, with implications for counterterrorism strategy.

Bruce was cool enough to include a link to the paper.

0

Stanford Law Review Online: Pulling the Plug on the Virtual Jury

Stanford Law Review

The Stanford Law Review Online has just published a Note by Nicolas L. Martinez entitled Pulling the Plug on the Virtual Jury. Martinez takes issue with Judge William Young’s proposal that Khalid Sheikh Mohammed be tried via videoconference from Guantanamo Bay by a jury sitting in New York:

Most people probably figured that the debate over where to try alleged 9/11 mastermind Khalid Sheikh Mohammed (“KSM”) had ended. Indeed, it has been well over a year since Congress forced Attorney General Eric Holder to reluctantly announce that KSM’s prosecution would be referred to the Department of Defense for trial before a Guantanamo military commission. But a provocative proposal put forth recently by Judge William G. Young of the District of Massachusetts has revitalized one of the most contentious legal debates of the post-9/11 era. In a nutshell, Judge Young proposes that an Article III court try KSM at Guantanamo, but with one major twist: the jury would remain in New York City.

He concludes:

Perhaps unwilling to refight the battles of two years ago, Congress has shown no inclination to retreat from its apparent view that KSM may only be tried by a military commission at Guantanamo. As a result, following through on Judge Young’s plan, which could be viewed as an attempt to circumvent the will of Congress, might lead some legislators to harden their stance on civilian trials for alleged terrorists and propose even more disagreeable legislation to that end. This is not to say that creative solutions aimed at fortifying the rule of law in a post-9/11 world should be held hostage to the proclivities of intransigent voting blocs in Congress. Quite the opposite, in fact. But the likely political ramifications of Judge Young’s proposal cannot be ignored, especially in an election year when few members of Congress may be willing to spend their political capital defending the need to hold KSM’s trial in federal court.

Even though Judge Young’s provocative suggestion should not be adopted in its current form, he has moved the conversation in the right direction. Continuing to think imaginatively about ways to preserve our rule of law tradition from external threats is immensely important, particularly in the context of national security crises. For it is when the rule of law can be so easily discarded that it must be most doggedly defended.

Read the full article, Pulling the Plug on the Virtual Jury at the Stanford Law Review Online.

0

Stanford Law Review Online: The Privacy Paradox 2012 Symposium Issue

Stanford Law Review

Our 2012 Symposium Issue, The Privacy Paradox: Privacy and Its Conflicting Values, is now available online:

Essays

The text of Chief Judge Alex Kozinski’s keynote is forthcoming.

0

Cybersecurity Puzzles

Cybersecurity is in the news: a network intrusion allegedly interfered with railroad signals in the Northwest in December; the Obama administration refused to support the Stop Online Piracy Act due to worries about interfering with DNSSEC; and the GAO concluded that the Department of Homeland Security is making things worse by oversharing. So, I’m fortunate that the Minnesota Law Review has just published the final version of Conundrum (available on SSRN), in which I argue that we should take an information-based approach to cybersecurity:

Cybersecurity is a conundrum. Despite a decade of sustained attention from scholars, legislators, military officials, popular media, and successive presidential administrations, little if any progress has been made in augmenting Internet security. Current scholarship on cybersecurity is bound to ill-fitting doctrinal models. It addresses cybersecurity based upon identification of actors and intent, arguing that inherent defects in the Internet’s architecture must be remedied to enable attribution. These proposals, if adopted, would badly damage the Internet’s generative capacity for innovation. Drawing upon scholarship in economics, animal behavior, and mathematics, this Article takes a radical new path, offering a theoretical model oriented around information, in distinction to the near-obsession with technical infrastructure demonstrated by other models. It posits a regulatory focus on access and alteration of data, and on guaranteeing its integrity. Counterintuitively, it suggests that creating inefficient storage and connectivity best protects user capabilities to access and alter information, but this necessitates difficult tradeoffs with preventing unauthorized interaction with data. The Article outlines how to implement inefficient information storage and connectivity through legislation. Lastly, it describes the stakes in cybersecurity debates: adopting current scholarly approaches jeopardizes not only the Internet’s generative architecture, but also key normative commitments to free expression on-line.

Conundrum, 96 Minn. L. Rev. 584 (2011).

Cross-posted at Info/Law.