National Security Law

Print
Article
Reimagining National Security
Cultural Heritage and Security Policy
Morag M. Kersel
Associate Professor, Department of Anthropology, DePaul University.
Patty Gerstenblith
Professor, DePaul University College of Law.

I want to thank Cat Mossing (DePaul Law ‘25) and Makayla Reynolds (DePaul Law ‘25) for their research assistance.

National security and cultural heritage protection are connected in several ways. This Article explores how the real or perceived relationship between threatened cultural heritage and national security developed, how this relationship has changed U.S. foreign and cultural policy, and whether these changes are for the better or the worse from a broader policy perspective, particularly with respect to the goal of cultural heritage preservation.

Print
Article
Reimagining National Security
Climatizing National Security
Mark Nevitt
Mark Nevitt is an Associate Professor, Emory University School of Law. Prior to academia, he served for twenty years in the U.S. Navy in the rank of commander.

He thanks Travis Schneider for outstanding research support as well as Professor Hajin Kim, Caleb Jeffreys, Peer Oppenheimer, and Eliza Martin of The University of Chicago Law School for their thoughtful insights and edits.

This Article addresses the growing nexus between climate change and various conceptions of security with a particular emphasis on climate change’s national security impacts. This Article ultimately argues that it is far better to proactively acknowledge and address climate change’s national security impacts today rather than waiting for catastrophe to strike. Indeed, upon closer examination, climate change is not just a complex collective action environmental problem—it also is a challenging national security issue with far-reaching impacts.

Print
Article
Reimagining National Security
Terrorism, Not Treason: The Rise and Fall of Criminal Charges
Shirin Sinnar
William W. and Gertrude H. Saunders Professor of Law, Stanford Law School.

I owe sincere thanks to Elena Chachko, Kristen Eichensehr, Carlton Larson, Darryl Li, Katerina Linos, Wadie Said, and participants at the University of Chicago Legal Forum workshop and Berkeley Law School Colloquium on Law and Geopolitics for helpful feedback on earlier drafts; Meaghan Corcoran, Olivia Morello, and Shafeen Pittal for indispensable research assistance; the Stanford Law Librarians for extraordinary reference support; Justin Fu for excellent administrative support; and the student editors at The University of Chicago Legal Forum for thorough and careful editing.

This Article advances both legal and sociocultural explanations for the near absence of treason charges in the “war on terror” and the implications for addressing political violence. On the legal side, terrorism charges have replaced treason because they enable the government to do almost everything that it once sought to accomplish with treason charges: they impose extraordinary stigma, they reach speech and advocacy, and they trigger severe penalties. At the same time, terrorism charges face fewer limits than treason charges: they criminalize conduct far removed from actual plots, they require a lesser showing of intent, and they dispense with treason’s constitutionally imposed evidentiary restriction. This Article argues that reimagining national security requires vigilance regarding the shape-shifting nature of responses to political violence.

Print
Article
Reimagining National Security
Big Data as a National Security Issue
Paul B. Stephan
John C. Jeffries, Jr., Distinguished Professor of Law and Senior Fellow, Miller Center of Public Affairs, University of Virginia.

I am grateful to Stewart A. Baker, Ashley S. Deeks, and Kristen Eichensehr for comments and criticism, and to the editors of The University of Chicago Legal Forum for their thoughtful and helpful suggestions. Responsibility for errors, blunders, and misjudgments remains mine alone. My work as Special Counsel to the General Counsel of the U.S. Department of Defense encompassed some of the issues I discuss here, but I do not rely on or otherwise make use of any privileged or classified information that came my way. The views found here are entirely my own and should not be attributed to the U.S. government or the Department of Defense.

This Article considers the national security implications of the legal vacuum concerning modern enhancements of data mining. Its key insight is to distinguish big data as an emergent entity from the countless events that constitute collectable information. The distinction allows us to think separately about the property entitlements and regulatory constraints attributable to the elements and the systems. This analytical step in turn clarifies which legal approaches may advance national security interests consistent with other values and commitments.

Print
Comment
Reimagining National Security
“Sportswashing” as a National Security Concern: The Role of the Committee on Foreign Investment in the United States (CFIUS)
Luke Bianco
B.S., Cornell University, 2018; J.D. Candidate, The University of Chicago Law School, 2025.

I would like to thank Professor Adam Davidson for his guidance and feedback, the previous and current staff of The University of Chicago Legal Forum for their generous commitments of time to this piece. All views and mistakes contained within are my own.

This Comment argues that foreign investment in domestic sporting institutions presents a novel, legitimate threat justifying executive attention. This Comment posits that sports are not simply a form of entertainment and instead cultivate a uniquely salient form of identity for the individuals and communities that comprise their fandoms. And when the sports investor is a foreign government or their proxy, such ownership may present a particularly potent threat to national security. Incorporating these theoretical considerations, this Comment seeks to present an actionable analytical framework for CFIUS, reviewing courts, and policy makers to consider and evaluate the potential threats to national security posed by “sportswashing”: foreign direct investment in domestic sporting institutions, through which foreign state or near-state actors leverage the popularity of sports and communities of sports fans to cultivate political and economic capital.

Print
Comment
Reimagining National Security
Scrutinizing National Security: A Call for Clear and Convincing Evidence in § 1226(a) Prolonged Detention Cases
Rosie Gruen
B.A., University of Wisconsin–Madison, 2021; J.D. Candidate, The University of Chicago Law School, 2025.

I would like to give my deepest thanks to Professor Judith Miller for her excellent feedback throughout the Comment-writing process; Farooq Chaudhry, Caroline Kelly, and the rest of The University of Chicago Legal Forum staff for their diligent work; and my family for their continued support throughout my law school career.

A noncitizen detained under 8 U.S.C. § 1226(a) may be detained indefinitely until her removal order is finalized. Detainees have challenged prolonged detention following a detainee’s bond hearing on Fourteenth Amendment Due Process grounds, leading to a circuit split. Courts generally apply the Mathews test when hearing these challenges, which requires balancing the individual’s liberty at stake against the government’s interest in limiting that liberty. This Comment argues that a more complete evaluation of national security implications under the clear and convincing evidence standard will more accurately capture the full scope of proffered government interests and reduce the extreme deference given to the executive branch in its national security determinations.

Print
Comment
Reimagining National Security
TakeTok: Does a TikTok Ban Violate the Takings Clause?
Kevin Marien
B.A., The College of William & Mary, 2021; J.D. Candidate, The University of Chicago Law School, 2025.

I would like to extend my sincere gratitude to Professor Lior Jacob Strahilevitz for his insightful feedback throughout the process, without which this piece would be incomplete. Many thanks as well to Professor Hajin Kim, who challenged me to approach the piece from new angles. Finally, thank you to the many Legal Forum editors who helped improve this piece with their suggestions.

In 2024, President Biden signed the Protecting Americans from Foreign Adversary Controlled Applications Act (PAFACA), which required TikTok’s parent company ByteDance to sell TikTok to a company in a “non-adversarial” country or be banned from the United States. TikTok challenged the regulation, in part, as a violation of the Fifth Amendment’s Takings Clause, which would permit the government to ban TikTok so long as it compensates ByteDance. Because PAFACA applies to applications beyond TikTok, it raises a broader question: does the Takings Clause require government compensation for bans on foreign web services? This Comment argues the answer is no.

Print
Comment
Reimagining National Security
How Civil Aiding and Abetting Liability for Terrorist Activities Applies to Social Media Companies—And How it Does Not
Nathaniel Parr
B.S., Georgia Institute of Technology, 2018; M.S., Georgia Institute of Technology, 2019; J.D. Candidate, The University of Chicago Law School, 2025.

I am deeply grateful for the guidance and wisdom imparted by Professor Genevieve Lakier which made this Comment possible. I also thank Caroline Kelly, whose mentorship has been instrumental during my time studying law.

The 2023 Supreme Court case Twitter v. Taamneh found that defendant social media companies were not liable for aiding and abetting a terrorist attack overseas. The Court alluded to the existence of an alternative set of facts that might alter their analysis or produce a different outcome. This Comment explores those “other contexts” and seeks to identify what factors could produce a successful Justice Against Sponsors of Terrorism Act (JASTA) aiding and abetting claim against a social media company for an act of terrorism overseas. Ultimately, this Comment concludes that it would take an extraordinary set of facts to find social media companies secondarily liable for an act of terrorism. This Comment then suggests other avenues to encourage social media companies to heighten their detection of Foreign Terrorist Organization (FTO) activity and prevent future attacks.