A Transformational Agenda for National Security
Past efforts to “reimagine” national security in legal scholarship have largely avoided systematic engagement with the foundational assumptions and presumptions of the field. Challenging and critiquing those assumptions is, however, necessary to producing scholarly work that reimagines, rather than reproduces, status quo approaches to U.S. national security. This Article presents an agenda for reimagining national security through legal scholarship, which is premised on the view that challenging the national security status quo should be part of those efforts. In doing so, this agenda explores seven premises central to how U.S. national security is currently conceived of, practiced, and implemented. Moving beyond the law, the agenda presented in this Article examines the structural power dynamics and political economy of national security, demonstrating why these issues are important to reimagining and transforming how we approach the discipline of national security as legal academics and advocates.
- I. Introduction
- II. Reimagining National Security Since 9/11 – State of the Field
- III. A Transformational National Security Agenda
- A. The Political, Social, and Economic Factors Shaping U.S. National Security, Including Colonialist, Imperialist, Capitalist, and Racist Forces
- B. Defining Threats, Generating Fear, Identifying “Enemies”
- C. The Private Persons Participating in and Enforcing U.S. National Security Policies
- D. The Rule of Law’s Shortcomings in Protecting Against Corrosive National Security Activities
- E. U.S. National Security’s Extensive Regulatory Reach Into the Daily Lives of Persons Both Abroad and at Home
- F. How the Relationship Between Government and National Security Academia Restricts the Horizon for Rethinking National Security
- G. The Critical Role of Social Movements in Radically Reimagining U.S. National Security
- IV. Conclusion
I. Introduction
TOPIn their announcement for this volume of The University of Chicago’s Legal Forum, the journal’s editors ask its invited contributors to “reimagine” national security.1
The University of Chicago Legal Forum Announces Its 2024 Volume: Reimaging National Security (on file with author).
See id. (“Unconventional threats call for reimagining conventional approaches to national security . . . We aim to explore how the law solves, regulates, and responds to [those] threats to the nation . . .”).
Past efforts to “reimagine” or “rethink” U.S. national security—though not always framed in those terms3
In discussing existing scholarship that “rethinks” or “reimagines” national security, this Article does not limit itself to efforts that are self-conscious in their “rethinking” or “reimagining” of the field. Instead, this Article considers attempts to challenge what national security means or how it is practiced as engaged in a “rethinking” or “reimagining” of the discipline.
See generally, e.g., Reimagining the National Security State: Liberalism on the Brink (Karen Greenberg ed. 2020) (compiling essays reimagining national security by exploring how national security practices that have undermined democratic institutions and the rule of law have impacted democratic liberalism, among other topics); see also Aziz Rana, Who Decides on Security?, 44 Conn. L. Rev. 1417, 1419 (2012) (arguing that efforts to reform national security law have largely focused on strengthening legal and institutional constraints on executive power).
See generally, e.g., Lisa A. Rich, Introduction to the Symposium Edition - New Technology and Old Law: Rethinking National Security, 2 Tex. A&M L. Rev. 581 (2015) (compiling essays examining how existing legal frameworks should adapt and, in some cases, expand to address new national security challenges). While there may be other trends in the literature on reimagining and rethinking national security, reform and expansionism represent the two most prevalent and enduring approaches, in my view. See infra Part II for a further discussion of these approaches.
While many of these projects have made important contributions to legal scholarship, they have often overlooked the fundamental premises and structural tendencies of U.S. national security. These foundational trends include the social, political, and economic forces that have historically shaped U.S. national security interests; the motivations behind defining certain events or actors as “threats” and “enemies”; issues surrounding who is involved in and excluded from participating in U.S. national security; and the pervasive reach of national security-related regulations, both at home and abroad, among other issues.
Given their less-than-obvious relationship to the doctrinal and governance questions that are a lawyer’s bread and butter, it makes sense perhaps that most legal scholars have avoided engaging with these and other extra-legal aspects of U.S. national security. Any effort to “reimagine” the discipline must, however, make room for these more radical inquiries. After all, to “reimagine” means to “form a new conception” or to “re-create.”6
Reimagine, Webster’s Dictionary, https://www.merriam-webster.com/dictionary/reimagine#:~:text=reimagined%3B%20reimagining%3B%20reimagines,new%20conception%20of%20%3A%20re%2Dcreate [https://perma.cc/2AU8-5XYC].
I use the word “radical” throughout this Article to describe the kind of transformation supported by the agenda presented in Part III.
As I argue in this Article, to fundamentally and radically reimagine national security we must look past the law to explore the norms and assumptions that undergird how the United States government approaches national security, as well as the interests and objects this understanding of national security is designed to protect and serve. In particular, we must do what is rare for many within national security legal academia and practice: question the structural power dynamics and political economy of the national security state.8
The phrase “national security state” was coined in the 1960s by former U.S. government official and public intellectual Marcus Raskin. See Marcus Raskin & Robert Spero, The Four Freedoms Under Siege: The Clear and Present Danger of Our National Security State xx–xxi (2008) (“The National Security State by its nature is expansionist for it deals with the continuous creation of activities in all aspects of public life and has become the single most important function of millions of federal workers, unions, police agencies, defense corporations, universities, and scientists.”).
This effort to radically reimagine national security9
Many works of national security legal scholarship begin by defining what “national security” is. This Article does not, since its aim is to dissect and critique the presumptions upon which most definitions of national security are implicitly based.
- The political, social, and economic factors that have generally shaped national security practices throughout U.S. history, including deeply ingrained colonialist, imperialist, capitalist, and racist forces;
- The political, social, and economic factors influencing how specific national security threats are identified and framed, including the pervasive role of fear and tendency for the U.S. national security establishment to create enemies;
- The private persons participating in and enforcing U.S. national security and the implications of that participation;
- The rule of law’s limits in protecting against corrosive forms of U.S. national security power;
- The U.S. national security state’s extensive regulatory reach into the daily lives of persons both abroad and at home;
- The ways in which the relationship between the U.S. government and national security academia restricts the horizon for rethinking national security; and
- The critical role of social movements in radically reimagining how U.S. national security is conceived of and practiced.
The seven issues explored in this Article draw inspiration from and rely on several scholarly approaches. First, they are rooted in the insights of various schools of critical legal thought, including critical legal theory, critical race theory, Third World Approaches to International Law (“TWAIL”), and law and political economy. Though their emphases and focuses differ, these approaches to legal scholarship collectively examine and interrogate the social, economic, and political factors that shape law, and that are, in turn, shaped by law.10
For example, critical legal studies views law as deeply political. Mark Tushnet, Critical Legal Studies: A Political History, 100 Yale L.J. 1515, 1517 (1991). For critical race theorists, law “shapes and is shaped by ‘race relations’ across the social plane.” Kimberlé Crenshaw et al., Introduction, in Critical Race Theory: the Key Writings that Formed the Movement, at xxv (eds. 1995). For its part, TWAIL disentangles and problematizes international law’s historic and on-going role in furthering the interests of Western imperialism and colonialism. James Thuo Gathii, TWAIL: A Brief History of its Origins, its Decentralized Network, and a Tentative Bibliography, 3 Trade Law & Dev. 26, 30–31 (2011). Finally, the emerging field of law and political economy emphasizes the importance of exploring how “law creates, reproduces, and protects political-economic power, for whom, and with what results.” Jedediah Britton-Purdy et al., Building a Law-and-Political Economy Framework: Beyond the Twentieth-Century Synthesis, 129 Yale L.J. 1784, 1820.
The approach to national security reflected in this Article also shares commonalities with a branch of security studies, known as the Copenhagen School of Security Studies. This school of thought “emphasizes the fundamental and irreducibly political character of claims to know something about security.” J. Benton Heath, Making Sense of Security, 116 Am. J. Int’l L. 289, 321 (2022). At the same time, this Article goes beyond the Copenhagen School of Security Studies’ political analysis of security, which mainly revolves around the consequences of securitizing an issue. Id. Instead, the agenda presented in this Article examines a broader set of issues, including the history of national security, the reach of national security, and the actors involved in U.S. national security, among other topics.
Second, in analyzing the seven cross-cutting issues laid out above, this Article adopts an inter-disciplinary approach—relying on scholarship from history, international relations, anthropology, and media studies, among other disciplines. Third and finally, the trends identified in this agenda are inspired by and draw from the work of a small group of critical national security scholars12
This group of critical national security scholars includes Sahar Aziz, Aslı Bâli, Nina Farnia, Aziz Rana, Shirin Sinnar, and Wadie Said, among others.
See, e.g., Nina Farnia, Imperialism in the Making of U.S. Law, 96 St. John’s L. Rev. 131,137–39 (2022) (arguing that we must “foreground an analysis of imperialism in the making of U.S. law,” including U.S. national security law); Rana, Who Decides on Security?, supra note 4, at 1422 (noting that, in order to bring meaningful change to the practice of national security, the “broader ideological context that shapes how the balance between liberty and security is struck” must be engaged).
This Article also has four important limitations. First and foremost, this intervention is primarily intended to inform progressive, left-visions of national security.14
While defining what “progressive, left” politics means is beyond the scope of this Article and also far from settled, my own understanding of it includes a principled commitment to opposing political, economic, and social systems that breed oppression and subordination of marginalized groups and communities, including imperialism, capitalism, and militarization. At the same time, I do not believe one must have a particular politics in order to find this agenda helpful. Indeed, I hope it will inform efforts to reimagine national security, regardless of partisan viewpoint. Nevertheless, I do believe this agenda will be most useful and helpful to those who want to create a progressive, left-vision of national security since, as discussed below, national security’s current orientation is largely politically conservative. See infra note 15 and accompanying text. For past and present visions of radical leftist foreign policy, which have inspired this Article’s agenda, see William Appleman Williams, The Tragedy of American Diplomacy 308–10 (2009); Aziz Rana, The Left’s Missing Foreign Policy, N+1 (Mar. 28, 2018), https://www.nplusonemag.com/online-only/online-only/the-lefts-missing-foreign-policy/[https://perma.cc/33CT-69FX].
See Peter Roady, The Contest over National Security: FDR, Conservatives, and the Struggle to Claim the Most Powerful Phrase in American Politics 5–6 (2024) (arguing that after World War II conservative visions of U.S. national security triumphed over liberal visions).
The seven issues discussed in Part III of this Article are informed, in part, by a left orientation, which is also shared with the schools of critical legal thought that have contributed to this agenda. See supra note 10 and accompanying text.
One topic this agenda touches on in some places but generally omits is the range of consequences that arise from securitizing an issue, which include military-focused responses and legally exceptionalist treatments that often erode civil rights protections. Maryam Jamshidi, Climate Change Is a Human Security, Not a National Security, Issue, 93 S. Calif. L. Rev. Postscript 36, 39–40 (2019). As mentioned earlier, the Copenhagen School of Security Studies focuses substantially on the consequences of securitization. See supra note 11 and accompanying text. This issue is also implicitly addressed by some reformist approaches to national security, which are examined in Part II. Though the topic cannot be discussed in detail here, any radical reimaging of national security must grapple with the consequences of securitization, as well.
In line with these limitations, the issues discussed in this agenda are not intended to limit what it means to take a “left” perspective on national security, though my hope is that this agenda can spur more conversations within the legal academy about what a “leftist” approach to national security through legal scholarship should entail.
Third, the agenda presented in this Article operates at the macro-level, focusing on foundational trends that broadly exist across U.S. national security. Particular national security issues—for example, the use of autonomous weapons systems or artificial intelligence (AI) in warfare—may raise more specific political economy concerns that are not explicitly reflected in this agenda.19
For example, the use of AI in war potentially encourages the dehumanization of those targeted and/or incidentally killed by those weapons systems. Elke Schwartz, The Ethical Implications of AI in Warfare, Queen Mary University London, https://www.qmul.ac.uk/research/featured-research/the-ethical-implications-of-ai-in-warfare/ [https://perma.cc/X25D-EGF5]. Whilethis concern is arguably part and parcel of national security’s tendency to create “enemies”—a topic discussed later in this Article—this agenda does not address this particular aspect of enemy creation.
Finally, this Article is not pitched to those who see no need to shift from the current U.S. national security status quo or to confront and assess its central assumptions, whatever their political orientation. Indeed, many in the legal academy and beyond who work on national security may be skeptical of or resistant to this project. This may reflect a demonstrated tendency among national security academics and practitioners to embrace the field’s basic premises.20
This commitment is particularly endemic to the national security bureaucracy, whose members are incentivized to maintain the policies on which their careers depend. Michael Glennon, National Security and Double Government, 5 Harv. Nat’l. Sec. J. 1, 34–38 (2014).
Aziz Rana, Constitutionalism and the Foundations of the Security State, 103 Calif. L. Rev. 335, 381–82 (2015).
What this agenda does try to do is provide a framework and language for those who already believe, are inclined to believe, or are open to believing that the foundations of U.S. national security should be critically examined and reassessed through legal scholarship. Indeed, part of the motivation for creating this agenda is to contribute to emergent conversations—amongst legal academics, advocates, and activists—about the need to radically reconceptualize national security as practiced in the United States.22
There are several notable examples of these burgeoning debates. For instance, a recent edited volume—composed primarily of legal scholarship—contains various perspectives on national security that challenge mainstream assumptions about the field. Race and National Security (Matiangai Sirleaf ed. 2023). Some legal advocacy organizations have also issued policy proposals underscoring the need for a radical overhaul of the U.S. national security apparatus. Center for Constitutional Rights, A Rights-Based Vision for the First 100 Days (2020), https://docs.google.com/document/d/1i5VCQfZoE80eTPWu5i4D-KMAk97Ll56TzRcOAlOkLQ0/[https://perma.cc/9QBX-BVT4].Finally, Part III.G of this paper discusses efforts by some social movements to radically reimagine national security.
Radically reimagining national security through legal scholarship—and beyond—is particularly urgent at this moment. Since October 7, 2023, the language and tools of national security have been used by U.S. university administrators, public figures, and politicians to smear and attack students, faculty, and staff peacefully protesting Israel’s on-going violent incursion into the occupied Gaza Strip, which the International Court of Justice has determined raises a plausible risk of genocide.23
See, e.g., Maryam Jamshidi, Genocide and Resistance in Palestine under Law’s Shadow, J. Genocide Stud., May 2024, at 20–28.
ADL and Brandeis Center Letter to Presidents of Colleges and Universities (Oct. 26, 2023), https://www.adl.org/resources/letter/adl-and-brandeis-center-letter-presidents-colleges-and-universities[https://perma.cc/2NPC-EYL8];Press Release, Rubio, Colleagues Urge Removal of Hamas and Terrorist Supporters (Oct. 20, 2023), https://www.rubio.senate.gov/rubio-colleagues-urge-removal-of-hamas-and-terrorist-supporters/[https://perma.cc/5W6V-KZGJ].
Justin Baragona, CAIR Calls on MSNBC to Ban ADL Boss Over ‘Iranian Proxies’ Remark, Daily Beast (Apr. 25, 2024), https://www.thedailybeast.com/cair-calls-on-msnbc-to-ban-adl-boss-over-iranian-proxies-remark[https://perma.cc/JJ4C-T3YC].
No Flights for Terrorists Act, S. 4274, 118th Cong. (2023). For more on the ‘No Fly List’ see DHS Traveler Redress Inquiry Program, U.S. Dep’t of Homeland Sec., https://www.tsa.gov/travel/security-screening/travel-redress-program [perma.cc/B5UZ-GVJK].
The campus-specific surveillance tools are typically framed as addressing antisemitism, which is a long-standing strategy for quashing pro-Palestine speech. See Austin Jefferson, Hochul Announces Attempt to Address Hate Online Amid Rise in Antisemitism and Islamophobia, City & State N.Y (Nov. 21, 2023), https://www.cityandstateny.com/politics/2023/11/hochul-announces-attempt-address-hate-online-amid-rise-antisemitism-and-islamophobia/392207/[perma.cc/FYQ6-2SBU];Monica Alba & Peter Alexander, Biden Administration Unveils New Actions to Combat Antisemitism on College Campuses, NBC News (Oct. 30, 2023), https://www.nbcnews.com/politics/white-house/biden-administration-actions-combat-antisemitism-college-campuses-rcna122712[https://perma.cc/7AA5-TB7J]; see also Presumptively Antisemitic: Islamophobic Tropes in the Palestine-Israel Discourse, Rutgers Univ. L. Sch. Ctr. for Sec., Race & Rts. (Nov. 2023), https://csrr.rutgers.edu/wp-content/uploads/2023/11/csrr-presumptively-antisemitic-report.pdf[https://perma.cc/XTX4-LZPQ](describing how accusations of antisemitism are used to quash pro-Palestine speech and activism). In addition to campus specific surveillance measures, in April 2024, a notorious federal mass surveillance law, Section 702, was reauthorized and expanded by Congress over outcry from many civil liberties experts and advocates. See Luke Goldstein, Pro-Israel Groups Pushed for Warrantless Spying on Protestors, American Prospect (Apr. 26, 2024), https://prospect.org/blogs-and-newsletters/tap/2024-04-26-pro-israel-groups-warrantless-spying-protesters/[perma.cc/4E45-RMPS].The final push to reauthorize the law received support from pro-Israel groups that highlighted Section 702’s importance to addressing events occurring in the wake of October 7—raising concerns the law would or could be used against students and others protesting Israel’s actions in Gaza. Id.
Jake Offenhartz, Joseph B. Frederick, & Stefanie Dazio, Police Clear Pro-Palestinian Protesters from Columbia University’s Hamilton Hall, AP (Apr. 30, 2024), https://apnews.com/article/israel-palestinian-campus-student-protests-war-8b0d3a0cedb17f5e892c6ca43bbdf628[perma.cc/T3RC-3GMM];Police Make Arrests at Columbia Amid Wave of University Protests, The Wash. Post (Apr. 30, 2024), https://www.washingtonpost.com/education/2024/04/30/columbia-university-protests-palestine-news/[perma.cc/QEN5-788L].
Natasha Lennard, I’ve Covered Violent Crackdowns on Protests for 15 Years. This Police Overreaction Was Unhinged, Intercept, May 1, 2024, https://theintercept.com/2024/05/01/nyc-gaza-college-protests-police-outside-agitators/ [perma.cc/QB5L-YM6V];Baragona, supra note 25.
Without understanding the political economy of national security one might think, for example, that national security-inflected reactions to student-led, pro-Palestine protests are distortions of U.S. national security when, instead, they are aligned with its foundational premises. While it is beyond the scope of this Article to unpack this in detail, at minimum, these responses are in accord with the capitalist, imperialist, and racist forces that have long shaped U.S. national security, discussed in Part III.A; the ginning up of fear and the racially-framed construction of “enemies,” discussed in Part III.B; and the pervasive reach of national security into domestic civilian life, discussed in Part III.D. I explore some of these issues in a current work-in-progress examining the securitization of U.S. universities.
Part II of this Article provides a general overview of past efforts to reimagine national security within legal scholarship—with a focus on the post-9/11 period31
While efforts to reimagine or rethink national security certainly are not limited to the post-9/11 period, Part II focuses only on this recent period in national security legal scholarship.
II. Reimagining National Security Since 9/11 – State of the Field
TOPThe post-9/11 period has generated substantial legal scholarship32
Since national security legal scholarship is produced both by practitioners and academics and appears in a variety of venues—from law reviews to blogs—the sources cited in this section reflect that reality.
Starting with reform-minded scholarship—the first of these two strands of imaginative knowledge production33
This Article uses the labels “reformist” and “expansionist” to describe certain kinds of national security scholarship. Those terms are not mean to define or categorize the scholars and practitioners presenting those views. Nor do those terms suggest anything about the quality of the scholarship or its normative worth. Indeed, many of the pieces canvassed in this section have made important contributions to the field.
E.g., Thomas Anthony Durkin, The Zealotry of Terrorism, in Reimagining the National Security State: Liberalism on the Brink 104 (Karen Greenberg ed. 2020); Oona A. Hathaway, National Security Lawyering in the Post-War Era: Can Law Constrain Power?, 68 UCLA L. Rev. 2, 11 (2021); Sudha Setty, Obama’s National Security Exceptionalism, 19 Chi.-Kent L. Rev. 91, 92–93 (2015); Harold Hongju Koh, Setting the World Right, 115 Yale L.J. 2350, 2355 (2006).
E.g., Michael Glennon, Who’s Checking Whom, in Reimagining the National Security State: Liberalism on the Brink 4–5 (Karen Greenberg ed. 2020).
E.g., Bruce Ackerman, The Decline and Fall of the American Republic 181–88 (2010); Frederick Schwarz & Aziz Huq, Unchecked and Unbalanced: Presidential Power in a Time of Terror 1–3 (2008); Neal Katyal, Internal Separation of Powers: Checking Today’s Most Dangerous Branch from Within, 115 Yale L.J. 2314, 2319–22 (2006).
E.g., Susan Herman, Taking Liberties: The War on Terror and the Erosion of American Democracy 15 (2011); David Cole & James Dempsey, Terrorism and the Constitution 240 (2006); Erwin Chemerinsky, Civil Liberties and the War on Terrorism, 45 Washburn L.J. 1, 2 (2005).
E.g., Wadie Said, Crimes of Terror: The Legal and Political Implications of Federal Terrorism Prosecutions 72 (2015); David Cole, The New McCarthyism: Repeating History in the War on Terrorism, 38 Harv. C.R-C.L. L. Rev. 1, 8–11 (2003).
E.g., Jennifer Stisa Granick, American Spies: Modern Surveillance, Why You Should Care, and What to Do About It 217 (2017); Laura Donohue, The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age 159 (2016).
E.g., Laura Donohue, Constitutional and Legal Challenges to the Anti-Terrorist Finance Regime, 43 Wake Forest L. Rev. 643, 661 (2008); Sahar Aziz, Note, The Law on Providing Material Support to Terrorist Organizations: The Erosion of Constitutional Rights or a Legitimate Tool for Preventing Terrorism?, 9 Tex. J. on C.L. & C.R. 45, 60–61, 78–79 (2003).
E.g., David Cole, Enemy Alien: Double Standards and Constitutional Freedoms in the War on Terrorism 5 (2005); Sahar F. Aziz, Reflections on Security, Race, and Rights Twenty-Years After 9/11, 12 J. Nat’l Sec. L. & Pol’y 135, 136 (2021); Leti Volpp, The Citizen and the Terrorist, 49 UCLA L. Rev. 1575, 1576–80 (2002).
The second major trend in scholarly efforts to rethink or reimagine national security—expansionist scholarship—focuses on the increasingly broad scope of national security. While some of these efforts have questioned whether certain issues should be considered national security concerns,42
See generally, e.g., Joshua L. Dratel, Reimagining the National Security State: Illusions and Constraints, in Reimagining the National Security State: Liberalism on the Brink (Karen Greenberg ed. 2020) (arguing that while climate change, income inequality, racism, and other matters should be treated as U.S. national security issues since they pose an existential threat to the United States, terrorism poses no such threat).
E.g., Mary B. McCord, Criminal Law Should Treat Domestic Terrorism as the Moral Equivalent of International Terrorism, Lawfare (Aug. 21, 2017), https://www.lawfaremedia.org/article/criminal-law-should-treat-domestic-terrorism-moral-equivalent-international-terrorism[perma.cc/5NQE-S3TK].
Other expansionist efforts have highlighted new national security threats created by technological developments, like the risks to cybersecurity resulting from Big Data.44
E.g., McKay Smith & Garrett Mulrain, Equi-Failure: The National Security Implications of the Equifax Hack and a Critical Proposal for Reform, 9 J. Nat’l Sec. L. & Pol’y 549, 572–77 (2018); Abraham R. Wagner & Paul Finkelman, Security, Privacy, and Technology Development: The Impact on National Security, 2 Tex. A&M L. Rev. 597, 611, 628–33 (2015).
See, e.g., Steven Joseph Arango, Data Brokers: A Benefit or Peril to U.S. National Security, 20 Ohio St. Tech. L.J. 107, 133–35 (2023) (arguing that data brokers threaten national security by selling the personal data of Americans to foreign adversaries and should be subject to congressional regulation); Tom Lin, Business Warfare, 63 B.C. L. Rev. 1, 4 (2022) (highlighting “the contemporary war on business, its growing importance to corporate and national affairs, and the pressing need for better, pragmatic approaches to understanding and addressing these rising threats to our economic stability, national security, and social welfare”).
E.g., Bryan Frederick & Caitlin McCulloch, Under the Weather – The National Security Risks from Climate Change Could Go Well Beyond What the U.S. Government Thinks, Just Sec. (Mar. 7, 2024), https://www.justsecurity.org/93111/under-the-weather-the-national-security-risks-from-climate-change-could-go-well-beyond-what-the-u-s-government-thinks/[perma.cc/XQ7B-KDCW];Jacob Hacker & Oona Hathaway, Universal Health Care Is a National Security Issue, Just Sec. (Mar. 12, 2020), https://www.justsecurity.org/69130/universal-health-care-is-a-national-security-issue/[perma.cc/GRG2-P6LD].
E.g., Oona Hathaway, COVID-19 Shows How the U.S. Got National Security Wrong, Just Sec. (Apr. 7, 2020), https://www.justsecurity.org/69563/covid-19-shows-how-the-u-s-got-national-security-wrong/[perma.cc/XQ66-CYR8].The U.S. government already broadly considers infectious disease and climate change to be national security problems, as discussed below. White House, National Security Strategy 27–29 (2022) [hereinafter Biden National Security Strategy]; see infra note 141 and accompanying text. Some expansionist proposals have, nevertheless, suggested specific national security strategies to deal with those issues. See, e.g., Mark Nevitt, Is Climate Change a National Emergency?, 55 U.C. Davis L. Rev. 591, 593–95 (2021) (arguing that climate change should be declared a “national emergency” under the National Emergencies Act in order to address the climate crisis); Alan Rozenshtein, Digital Disease Surveillance, 70 Am. U. L. Rev. 1511, 1517 (2021) (arguing that “there is a strong prima facie case for” government-mandated disease surveillance for pandemics like COVID-19).
While it is hard to measure the success of individual scholarly proposals, reformist and expansionist arguments have borne some fruit and altered certain government practices, whether directly or indirectly. For example, reformist efforts oriented around bolstering civil rights have been vindicated by rights-based restrictions—albeit limited ones—that have subsequently been placed on some national security policies.48
See, e.g., Maryam Jamshidi, The Discriminatory Executive and the Rule of Law, 92 U. Colo. L. Rev. 77, 156–67 (2021) (describing various changes made to federal mass surveillance laws in response to civil liberties concerns); Jenny Martinez, Process and Substance in the War on Terror, 108 Colum. L. Rev. 1013, 1028–29 (2008) (describing various post-9/11 Supreme Court decisions which recognized that War on Terror detainees at Guantanamo Bay enjoy certain procedural rights, despite the U.S. government’s views and practices to the contrary). The Obama administration’s approach to the national security sector underscores the limited inroads civil liberties reforms have made in the field. Despite its avowed commitment to incorporating rights protections into U.S. national security practices, the Obama administration often fell very short of the mark and, instead, reproduced and even exacerbated the previous administration’s civil liberties failures. E.g., Herman, supra note 37, at 6–9; Setty, supra note 34, at 95–108.
See, e.g., Kristen Eichensehr & Cathy Hwang, National Security Creep in Corporate Transactions, 123 Colum. L. Rev. 549, 551 (2023) (noting that the U.S. government has recently expanded its “national security-related review and regulation of cross-border investments to allow government intervention in more transactions than ever before”). In some sense, this is not an expansion of national security. As noted below, U.S. national security has been substantially guided by economic interests from the very beginning of the U.S. republic. See, infra, Part III.A. That being said, U.S. national security policies are increasingly targeting discrete economic and technological areas that were not previously subject to national security treatment and are, as such, in spiritual accord with expansionist proposals.
See Dep’t of Commerce, Biden-Harris Administration Announces Final National Security Guardrails for CHIPS for America Incentives Program (Sept. 12, 2023), https://www.commerce.gov/news/press-releases/2023/09/biden-harris-administration-announces-final-national-security[perma.cc/77QT-DKQC](classifying certain semiconductors as critical to U.S. national security).
Through a new office in the U.S. Department of Defense, known as the Office of Strategic Capital, the government is reportedly developing strategies to attract private investment to so-called critical national security technologies. Office of Strategic Capital, Dep’t Defense, https://www.cto.mil/osc/[perma.cc/E22Z-J2X8];Ken Klippenstein & Daniel Boguslaw, Pentagon Tries to Cast Bank Run as National Security Threat, Intercept (Apr. 3, 2023), https://theintercept.com/2023/04/03/silicon-valley-bank-bailout-pentagon/#:~:text=So%20when%20Silicon%20Valley%20Bank,reporting%20by%20Defense%20One%20revealed [perma.cc/7UBL-AU82].
Recently, the Biden administration issued an executive order that seeks to create a regulatory framework that would restrict or otherwise prohibit U.S. persons from selling bulk sensitive personal data to “countries of concern,” among other things. White House, Executive Order on Preventing Access to Americans’ Bulk Sensitive Personal Data and United States-Government Data by Countries of Concern (Feb. 28, 2024), https://www.whitehouse.gov/briefing-room/presidential-actions/2024/02/28/executive-order-on-preventing-access-to-americans-bulk-sensitive-personal-data-and-united-states-government-related-data-by-countries-of-concern/[perma.cc/LYZ9-F78K].
Notwithstanding these successes, reformist and expansionist legal scholarship has largely left the foundational myths and premises of U.S. national security undisturbed. While both agendas start from a particular baseline—namely, the state of national security as it currently exists—they seldom question the fundamental assumptions or orientation of U.S. national security or explore the broader historical, political, social, and economic trends embedded within the field.53
This is not to say that reformist and expansionist approaches always focus on the law exclusively and do not ever consider the non-legal factors informing U.S. national security. Indeed, some of these approaches critique and question the field’s basic orientation in ways that raise political economy considerations. See, e.g., Dratel, supra note 42, at 113–14 (arguing that U.S. national security prioritizes the wrong threats, like terrorism, partly because of the influence of private government contractors). That being said, these arguments often focus on very discrete slices of national security—typically, terrorism and war—and do not explore the national security state’s broader political economy.
Certainly, reformist and expansionist proposals are under no obligation to explore these issues. In failing to do so, however, their suggestions, prescriptions, and diagnoses for reimagining or rethinking national security risk being limited in scope and effect. Without addressing the political economy of national security, those who seek to “reform” or “fix” perceived problems with U.S. national security—including, for example, by ameliorating unchecked Executive power in the field54
See supra note 36 and accompanying text for a brief discussion of the issue of unchecked and expansive Executive authority in U.S. national security.
See Rana, Who Decides on Security?, supra note 4, at 1421 (arguing that, despite the efforts of national security reformists, “presidential and military prerogatives continue to expand even when the courts or Congress intervene” and that “the ultimate result [of these reformist efforts] . . . has been to entrench further the system of discretion and centralization”). See also Aziz Rana, National Security Law and the Originalist Myth, in Race and National Security 57 (Matiangai Sirleaf ed. 2023) (noting that reformist efforts that fail to grapple with the racial and imperialist origins of national security “offer a limited account of the reforms necessary for genuine anti-imperial change in the present”).
See Jamshidi, Climate Change Is a Human Security, Not a National Security, Issue, supra note 17 at 36–37 (arguing that treating climate change as a national security issue may privilege military-oriented responses that fail to tackle the underlying causes of climate change).
In addition to informing reformist and expansionist reimaginings of national security, engagement with the political economy of national security is both necessary and vital to radically transforming the field. These radical efforts stand on their own merits. While reformist and expansionist approaches have dominated legal scholarship reimagining national security, radical approaches challenging the political, economic, and social forces shaping U.S. national security are just as important to rethinking legal scholarship on the field as they have been to reimagining other areas of law.57
For example, engaging with the political economy of police violence has mid-wived transformative and radial approaches to legal scholarship on policing, including abolitionist scholarship. See, e.g., Amna Akbar, An Abolitionist Horizon for (Police) Reform, 108 Calif. L. Rev. 1781 (2020) (focusing on structuralist accounts of police violence—as being “routine . . . legal, tak[ing] many shapes . . . target[ing] people based on their race and class . . . [and] reflect[ing] and reproduc[ing] our political, economic, and social order”—in order to develop an abolitionist approach to legal scholarship on policing). There is no legitimate or sensible reason why national security should be inoculated from similar approaches.
III. A Transformational National Security Agenda
TOPThis section explores seven presumptions and trends at the heart of the U.S. national security state that ought to inform radical (left) efforts to transform the field through legal scholarship: (1) the political, social, and economic factors that have shaped U.S. national security practices throughout history, including deeply ingrained colonialist, imperialist, capitalist, and racist forces; (2) the political, social, and economic factors influencing how specific national security threats are identified and framed, including the pervasive role of fear and tendency to create enemies within U.S. national security practice; (3) the private persons participating in and enforcing U.S. national security and the implications of that participation; (4) the rule of law’s limits in protecting against corrosive forms of national security power; (5) the U.S. national security state’s extensive regulatory reach into the daily lives of persons both abroad and at home; (6) the ways in which the relationship between the U.S. government and national security academia restricts the horizon for rethinking national security; and (7) the critical role of social movements in radically reimagining national security as a field.
In exploring these issues, this section takes a broad approach that does not fully capture all the nuances involved in the various issues it addresses. Indeed, many of the topics discussed here have been examined in book-length form by multiple scholars. This agenda cannot provide the same level of treatment, which is impossible to do in the space of one short, word-limited article. Nevertheless, the goal of this section is to outline the general arguments and core ideas behind each of the seven presumptions and trends it identifies, and to highlight how engaging with these issues can contribute to radically reimagining national security through legal scholarship.
A. The Political, Social, and Economic Factors Shaping U.S. National Security, Including Colonialist, Imperialist, Capitalist, and Racist Forces
TOPThe interests driving national security are central not only to its content but also to its credibility. It is no surprise, then, that establishment discourses regarding the nature of and motives behind U.S. national security are fundamentally aimed at shoring up that legitimacy.58
Andrew Bacevich, American Empire: the Realities and Consequences of U.S. Diplomacy 9 (2002).
See id. at 8 (noting that “in practice, the myth of the ‘reluctant superpower’—Americans asserting themselves only under duress and then always for the noblest purposes—reigns today as the master narrative explaining (and justifying) the nation’s exercise of global power”).
Id. at 7–8. The notion of reacting to or defending against continuous, never-ending threats is at the heart of prevailing conceptions of U.S. national security, as reflected in numerous presidential national security statements. E.g., Biden National Security Strategy, supra note 47; White House, Trump Administration, U.S. National Security Strategy (2017), https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf[perma.cc/QQY2-LN8N];White House, Obama Administration, U.S. National Security Strategy (2015), https://obamawhitehouse.archives.gov/sites/default/files/docs/2015_national_security_strategy_2.pdf [perma.cc/NC5V-F77N].
See, e.g., Stephen Walt, The Hell of Good Intentions: America’s Foreign Policy Elite and the Decline of U.S. Primacy 14 (2018) (describing and critiquing the tendency of most post-Cold War, U.S. presidential administrations to use America’s global power to “defend and spread the traditional liberal principles of individual freedom, democratic governance, and a market-based economy”); White House, U.S. National Security Strategy (2002), https://georgewbush-whitehouse.archives.gov/nsc/nssall.html[perma.cc/Q2P5-SXS7][hereinafter “Bush 2002 National Security Strategy”] (“We will defend the peace by fighting terrorists and tyrants. We will preserve the peace by building good relations among the great powers. We will extend the peace by encouraging free and open societies on every continent.”).
E.g., Samuel Huntington, Why International Primacy Matters, 17 Int’l Sec. 68, 83 (1993); John M. Owen, IV, Transnational Liberalism and U.S. Primacy, 26 Int’l Sec. 117, 150 (2001–2002).
Aziz Rana, Left Internationalism in the Heart of Empire, Dissent (May 23, 2022), https://www.dissentmagazine.org/online_articles/left-internationalism-in-the-heart-of-empire/[https://perma.cc/32UA-2368];Rana, The Left’s Missing Foreign Policy, supra note 14.
Walt, supra note 61, at 14; Williams, supra note 14 at 20. See generally Aziz Rana, The Two Faces of American Freedom (2010) (describing three hundred years of U.S. foreign policy as guided by a belief in America’s unique ability to bring freedom and democracy to the world). As historian William Appleman Williams argued, this notion of U.S. exceptionalism is deeply rooted in an American-version of liberalism that emerged in the nineteenth century, but took on greater force in the early twentieth century, and that understood U.S. expansion as good not only for the United States but also for the entire world. Williams, supra note 14, at 92–94.
There is an alternative understanding of U.S. national security that challenges these mainstream narratives and undermines their legitimating effects on the field. While the traditional view largely rejects any role for imperialist imperatives,65
Williams, supra note 14, at 20. See Owen, Transnational Liberalism and U.S. Primacy, supra note 62, at 151 (arguing that the United States uses its global power “not to subjugate” but rather “to establish and uphold order via institutions that yield increasing benefits over time” and that, “[i]f the United States is an imperial power, the world may never have known such a benevolent empire”).
These imperialist ambitions have been justified, in part, by the same ideology of American exceptionalism found in establishment discourses around U.S. national security and foreign policy. Williams, supra note 14, at 60–61.
See, e.g., Bacevich, supra note 58, at 30 (observing that the American empire was not an unintended accident but rather “emerged out of particular worldview and reflected a coherent strategy . . . ”). While the term “national security” emerged in the mid-twentieth century, U.S. domestic and foreign policies have long been guided by notions of security. Laura Donohue, The Limits of National Security, 48 Am. Crim. L. Rev. 1573, 1577–79 (2011).
As this alternative history demonstrates, territorial conquest was an important part of the U.S. imperial project until the western frontier closed in the 1890s.68
Bacevich, supra note 58, at 25; Williams, supra note 14, at 21–23.
See Ellen Meiksins Wood, Empire of Capital 129–30 (2005) (arguing that since World War II the United States has administered an economic empire “sustained by political and military hegemony” over other states); Williams, supra note 14, at 55–59 (describing U.S. foreign policy at the turn of the twentieth century as aimed at creating an “informal empire,” which uses U.S. economic and political power to dominate weaker countries, and arguing that this brand of empire became the “central feature of American foreign policy in the twentieth century”). While the United States has also engaged in territorial conquest since the closing of the U.S. continental frontier—as described below—this territorial imperialism has been the exception rather than the norm, partly because of racist fears about incorporating large non-white populations into the United States. See infra notes 94, 102, and accompanying text.
Rana, supra note 64, at 13–14; see also Nikil Pal Singh, Race and America’s Long War xii (2017) (“The frontier wars, the wars of the early U.S. empire, and the twentieth century’s world wars all illuminated affinities between war making and race making. . .”); Matiangai Sirleaf, Confronting the Color Line in National Security, in Race and National Security 9 (Matiangai Sirleaf ed. 2023) (“[O]ne of the persistent ways that race manifests in national security law is in the determination of who or what counts as a ‘threat.’”).
Whether implemented in territorial or non-territorial ways, the United States has pursued its imperial, expansionist aims, in part, to address various domestic political, economic, and social issues. In the early days of the republic, expansionism was a way of securing economic independence and self-rule for Anglo-European Protestant settlers71
Rana, National Security Law and the Originalist Myth, supra note 55, at 60–61.
Greg Grandin, The End of the Myth: from the Frontier to the Border Wall in the Mind of America 45 (2019).
Id. at 29.
Id. at 4–5.
Admittedly, this alternative history does not explain every aspect of U.S. national security nor account for all the factors that have shaped its evolution and trajectory. The United States has, for example, arguably been the innocent or passive victim of internal and external threats at certain historical moments,75
For some, World War II is probably one of the clearest examples of this. Bacevich, supra note 58, at 87. Others, however, disagree and describe U.S. entry into that war as primarily driven by the perennial American interest in imperial expansionism. Williams, supra note 14, at 185–200.
Williams, supra note 14, at 21. While beyond the scope of this Article, there are other contradictions and tensions in how the United States has pursued its foreign and national security policies. These include a so-called “humanitarian” impulse that has “prompted [the United States] to improve the lot of less fortunate peoples.” Id. at 88. The United States has often pursued that goal by trying to “mak[e] . . . [those people] more like Americans” and has ultimately undermined their well-being by privileging the “expansion . . . of markets for American exports, and control of raw materials for American industry” over their self-determination. Id.
See, e.g., Bacevich, supra note 58, at 88 (noting that “no single factor can account for every detail of U.S. policy abroad . . . [b]ut in the long view, and to a greater extent than any other factor, the pursuit of [economic] openness [and imperial expansionism] defines the essential azimuth of U.S. policy, a course set more than a century ago and followed ever since”).
Grappling with this alternative history—which few legal scholars have done78
See, e.g., James Thuo Gathii, Beyond Color-Blind National Security Law, in Race and National Security 29 (Matiangai Sirleaf ed. 2023) (“There are very few examples of policy-related work or scholarship in the national security area that are explicitly grounded in exploring its colonial underpinnings”).
Mary Ann Heiss, Bernath Lecture: The Evolution of the Imperial Idea and U.S. National Identity, 26 Diplomatic Hist. 511, 511–12 (2002). This is not to say that government insiders have not viewed the United States as an imperial power. After the end of the Cold War, scholarly experts with significant government cache, like Arthur Schlesinger, Jr., began to describe the United States as an empire, a view that became more prevalent after 9/11. Bacevich, supra note 58, at 30; Niall Ferguson, ‘We’re an Empire Now’: The United States Between Imperial Denial and Premature Decolonization, 16 Macalester Int’l 3 (2005). These views have, however, been met with much resistance and remain excluded from official government policy and discourse. Bacevich, supra note 58, at 30; Greg Grandin, Empire’s Workshop: Latin America, the United States, and the Making of an Imperial Republic 4–5 (2021); Ferguson, supra note 79, at 4.
The rest of this sub-section situates this alternative history of U.S. national security within four historical periods,80
As one historian has observed, translating broad swathes of history into shorter periods is valuable since it allows for patterns and trends to be identified across time, even if it also risks oversimplifications and omissions. Heiss, supra note 79, at 514.
The historical periodization of national security described here is based on Laura Donohue’s work in The Limits of National Security, supra note 67. This presentation deviates from hers, however, in emphasizing the enduring role war, imperialist expansion, and subjugation of outsiders have played throughout all four periods of national security. In particular, my retelling of national security’s historical evolution incorporates crucial insights from scholarly work steeped in the long arc of U.S. imperialism, including Aziz Rana’s Two Faces of American Freedom, supra note 64, Greg Grandin’s The End of the Myth, supra note 72, William Appleman Williams’ The Tragedy of American Diplomacy, supra note 14, and Ellen Meiksins Wood’s Empire of Capital, supra note 69.
1. The first period of U.S. national security
The first period of U.S. national security, which ran from 1776 to 1898, focused on protecting and shoring up the union of states that constituted the American republic.82
Donohue, The Limits of National Security, supra note 67, at 1587–88.
Id.
Grandin, The End of the Myth, supra note 72, at 40–41; Rana, supra note 64, at 12; Williams, supra note 14, at 22–23.
Through treaties with other imperial powers and native tribes, as well as military aggression, the U.S. government took title to millions of acres of indigenous land within the North American continent during this period.85
Donohue, The Limits of National Security, supra note 67, at 1595–96.
Williams, supra note 14, at 60.
Deepa Kumar, Islamophobia and the Politics of Empire: 20 Years After 9/11 48 (2020).
Rana, supra note 64, at 96.
During this first period of national security, the government made some attempts to extend its expansionist interests beyond the North American continent, as famously articulated in the Monroe Doctrine. Established by President James Monroe in 1823, the eponymous government policy was a warning to Europe that the United States would consider its involvement in the Western hemisphere as a direct threat to U.S. interests.89
Donohue, The Limits of National Security, supra note 67, at 1600.
Grandin, Empire’s Workshop, supra note 79, at 4. In line with the Monroe Doctrine, U.S. war-making outside the continental United States was aimed primarily at Latin America and the Caribbean during the first period of national security. Id. at 2–3.
2. The second period of U.S. national security
The second period of U.S. national security began in 1898, with the Spanish American War, and continued until 1930, with the start of the Great Depression.91
Donohue, The Limits of National Security, supra note 67, at 1630.
Id. at 1648–49. See Williams, supra note 14, at 110–12 (rejecting the view that the inter-war period, between World Wars I and II, was dominated by isolationist U.S. policies and describing it, instead, as involving continued U.S. overseas political and economic expansionism).
This global engagement included seizing foreign territory. Building on ambitions originating in the first period,93
Donohue, The Limits of National Security, supra note 67, at 1618–19.
Daniel Immerwahr, How to Hide an Empire: A History of the Greater United States 61–72 (2019).
Ultimately, America’s experiment with holding substantial territory outside the North American continent proved too complicated to pursue long-term.95
The decision not to continue accumulating foreign territorial holdings had to do, at least partly, with fears regarding how that territorial expansion would impact the United States’ racial makeup. Rana, supra note 64, at 281–84; see infra note 102 and accompanying text. That being said, the United States ultimately held onto many of the extra-continental holdings it accumulated in the nineteenth and early twentieth centuries, incorporating a few of those territories—specifically Hawaii and Alaska—as states, while maintaining others as non-incorporated territories. Immerwahr supra note 94, at 11.
Rana, supra note 64, at 283–84; see Leo Panitch & Sam Gindin, Global Capitalism and American Empire, Socialist Reg. 11–12 (2004) (describing policies of informal non-territorial empire pursued by the U.S. government in the late nineteenth and early twentieth centuries).
Rana, supra note 64, at 218; Williams, supra note 14, 27–57. As part of these efforts, the United States sought to “cast the economy and politics of the poorer, weaker, underdeveloped countries in a pro-American mold.” Id.
Donohue, The Limits of National Security, supra note 67, at 1643–44.
As with the first period, America’s expansionist ambitions were aimed, in part, at protecting American democracy and economic welfare, particularly from the threat of domestic economic depression.99
Williams, supra note 14, at 38, 86–87, 121.
See Grandin, The End of the Myth, supra note 72, at 138–47 (describing how America’s expansionist wars during the second period of national security turned U.S. racism onto the foreign peoples conquered by the American military, facilitated the resurgence of the KKK, and provided Black Americans with a means for social mobilization as long as they were “willing to fight for the nation”).
U.S. national security’s focus on racial “outsiders” continued during the second period of national security. Immigrants drew particular attention in this regard. While rooted in trends that started in the first period (like so many other practices from this period), immigrants—particularly those from Asia—were systematically cast as economic and racialized national security threats with greater frequency during the second period.101
See Rana, supra note 64, at 189–91 (describing popular and government backlash during the first period of national security—in the mid- to late-nineteenth century—against Asian, and especially Chinese, immigrants, who were depicted as threats to white economic power and incapable of assimilating into white American identity). The Supreme Court’s decision in the Chinese Exclusion Case (130 U.S. 581 (1889))—which also came towards the end of the first period of national security and upheld a federal law excluding certain Chinese nationals from the United States on racial and economic grounds—was the first judicial decision to ground federal authority to regulate immigration in national security, where it has remained since. Matthew Lindsay, Immigration as Invasion: Sovereignty, Security, and the Origins of the Federal Immigration Power, 45 Harv. C.R.-C.L. L. Rev. 1, 40–43, 46–47 (2010). During the late nineteenth century and much of the twentieth century, federal immigration laws, which were authorized by a now pervasive national security rationale, continuously and explicitly discriminated against non-Anglo, especially Asian, immigrants for economic and racial reasons. Rana, National Security Law and the Originalist Myth, supra note 55, at 237–39; Kevin R. Johnson, Systemic Racism in U.S. Immigration Law, 97 Ind. L.J. 1455, 1460–62, 1471 (2022).
Immerwahr supra note 94, at 77–87.
The second period of U.S. national security is particularly noteworthy for marking the beginning of U.S. efforts to frame internal national security threats in ways that go beyond the United States’ long-standing fixation with racialized “outsiders.” This new orientation was particularly directed at those who threatened the prevailing capitalist economic order, like labor organizers,103
Rana, supra note 64, at 220–26; see Donohue, The Limits of National Security, supra note 67, at 1650 (noting that during the second period of national security the U.S. government responded to labor resistance by calling on the U.S. military to respond to strikes).
Grandin, The End of the Myth, supra note 72, at 129–30; Donohue, The Limits of National Security, supra note 67, at 1656–57.
3. The third period of U.S. national security
The third period of national security began in 1930 and ended in 1989 with the termination of the Cold War.105
Donohue, The Limits of National Security, supra note 67, at 1657.
Id.
Id. at 1650–55, 1658–60, 1666–69.
Id. at 1666–67.
David Jablonsky, The State of the National Security State, 32 Parameters 4 (2002).
Rana, Who Decides on Security?, supra note 4, at 1458, 1468.
With Europe in tatters and Germany and Japan roundly defeated, the United States assumed an unparalleled position as a global superpower after World War II, counterbalanced only by the Soviet Union. Building on the second period, the United States used its new position to decisively cement its ambitions abroad in ways that continued to rely on political, military, and economic forms of imperialism rather than the acquisition of territory.111
Wood, supra note 69, at 128–30.
Bacevich, supra note 58, at 4 (emphasis added).
Grandin, The End of the Myth, supra note 72, at 187.
Id. at 195–96.
Id. at 196.
Id. at 209, 228–29. The U.S. government attempted to suppress racial and class conflicts primarily through war and the expansion of the U.S. military, which came “to serve as the country’s most effective venue for class and race mobility and distributor of social services, such as education and welfare.” Id. As historian Greg Grandin argues, the military’s ability to keep these domestic tensions in check was substantially eroded by the Vietnam War, though the U.S. government continued to use war—albeit largely unsuccessfully—as a safety valve for enduring racial and ideological conflicts inside the United States even after Vietnam. Id. at 211–12, 228–29.
To achieve these goals, the U.S. national security state formally adopted the size and complexity that it is currently known for. In particular, the Executive Branch took on an enormous set of national security authorities, responsibilities, and prerogatives—institutionalized through new or reorganized national security institutions and other congressional delegations of power.117
Donohue, The Limits of National Security, supra note 67, at 1672–80, 1703.
Id. at 1687.
Benjamin Schwarz, The Arcana of Empire and Dilemma of American National Security, 101 Salmagundi 182, 190 (1994). As noted by political scientist Leo Panitch and economist Sam Gindin, after World War II, the United States created an integrated political and economic system with other capitalist powers that it primarily controlled and directed. Panitch & Gindin, supra note 96, at 13. This was achieved, in part, through military alliances, like NATO, as well as through the creation of multilateral financial institutions, like the International Monetary Fund and World Trade Organization, all of which were dominated by the United States. Id. at 15, 22.
See Mahmood Mamdani, Good Muslim, Bad Muslim: America, the Cold War, and the Roots of Terror 179 (2003) (noting that, since the Vietnam War, the U.S. government has increasingly relied on proxies to wage its wars).
Panitch & Gindin, supra note 96, at 16–17.
While projecting power abroad, the United States simultaneously institutionalized and routinized its domestic security architecture, with race and ideology continuing to play an important threat-identifying role. During World War II, the U.S. government used its domestic national security powers not only to root out saboteurs and spies,122
Donohue, The Limits of National Security, supra note 67, at 1660.
Huong Vo, Note, Us Against Them: The Path to National Security Is Paved by Racism, 50 Drake L. Rev. 661, 665, 672–73 (2002).
Donohue, The Limits of National Security, supra note 67, 1664. These “disparate political views” included ideologies like communism. Id.
Id. at 1689–91.
E.g., Deepa Kumar, Terrorcraft: Empire and the Making of the Racialised Terrorist Threat, 62 Race & Class 34, 39–40, 44 (2020); Donohue, The Limits of National Security, supra note 67, at 1691.
4. The fourth period of U.S. national security
The fourth epoch of U.S. national security began in 1989 and continues through to the current period. As Aziz Rana argues, the moment we are now in is one in which there is “an entrenched commitment to expanding American global authority . . .” and where “[t]he extension of American power and the increased economic and political hierarchies of domestic practices have emerged in tandem . . .”127
Rana, supra note 64, at 326–27.
As during earlier periods, America’s security has been closely connected to economic expansionism abroad, which remains focused on ensuring that the international arena, including the global community of states, is aligned with American norms, values, and interests.128
Bacevich, supra note 58, at 77, 87; Panitch & Gindin, supra note 96, at 23–25.
Wood, supra note 69, at 133. This strategy—of connecting U.S. global economic expansion with coercively-induced economic and political reforms in other countries—is not new and has been pursued by the United States since, at least, the second period of national security. Williams, supra note 14, at 62–66.
Wood, supra note 69, at 134–37.
Military power has remained central to the U.S. imperialist economic project during the fourth period. Historian Ellen Meiksins Wood described this contemporary relationship as the “boundless domination of a global economy” that “requires [U.S.] military action without end, in purpose or time.”131
Id. at 144.
Id. at 165.
Id. at 159, 161; Schwarz, supra note 119, at 193. U.S. military supremacy during the fourth period of national security has also bolstered the “military-industrial-complex”—a conglomerate of government bureaucrats and private defense companies that promotes militarism within U.S. policymaking and that has been central to the strength of the U.S. economy during both the third and fourth periods. Wood, supra note 69, at 166; Richard J. Barnet, The Ideology of the National Security State, 26 The Massachusetts Rev. 483, 487 (1985); Robert Knowles, Delegating National Security, 98 Wash U. L. Rev. 1117, 1123 (2021).
As reflected in Part III.E., the internal facing character of national security has become particularly pronounced during the current period, blurring the line between the state’s war powers and police powers.134
See infra notes 271–274 and accompanying text.
Kumar, supra note 87, at 148–77.
Michael German, The FBI Targets a New Generation of Black Activists, Brennan Ctr. (June 26, 2020), https://www.brennancenter.org/our-work/analysis-opinion/fbi-targets-new-generation-black-activists[perma.cc/B4FU-EHD8].As part of its work, the Black Lives Matter movement has dedicated itself to challenging “U.S. imperialism, capitalism and white supremacy.” Arun Kundnani, As College Campuses Erupt in Protest, Some See a Political Transformation, New Lines Mag. (May 1, 2024), https://newlinesmag.com/argument/as-college-campuses-erupt-in-protest-some-see-a-political-transformation/[https://perma.cc/3FS6-LB9H].
Animal Rights Extremism and Ecoterrorism: Hearing Before the S. Jud’y Comm., 108th Cong. (May 18, 2004) (statement of John E. Lewis, FBI Deputy Assistant Director) https://archives.fbi.gov/archives/news/testimony/animal-rights-extremism-and-ecoterrorism[https://perma.cc/WML6-SMF7].See, e.g., Natasha Lennard, How the Prosecution of Animal Rights Activists as Terrorists Foretold Today’s Criminalization of Dissent, Intercept (Dec. 12, 2019), https://theintercept.com/2019/12/12/animal-people-documentary-shac-protest-terrorism/[https://perma.cc/WA2L-UUFM](drawing links between terrorism prosecutions against animal rights activists and their threats to corporate, anti-capitalist interests protected by the U.S. government); Alleen Brown, The Green Scare: How a Movement that Never Killed Anyone Became the FBI’s No. 1 Domestic Terrorism Threat, Intercept (Mar. 23, 2019), https://theintercept.com/2019/03/23/ecoterrorism-fbi-animal-rights/[https://perma.cc/2WHE-TP6N](connecting the government’s decision to label some eco-activists as terrorists to their challenges to U.S. corporate, capitalist interests).
Sam Levin, Revealed: FBI Terrorism Taskforce Investigating Standing Rock Activists, Guardian (Feb. 10, 2017), https://www.theguardian.com/us-news/2017/feb/10/standing-rock-fbi-investigation-dakota-access[perma.cc/H8WW-EC9J].See Nick Estes, Our History Is the Future: Standing Rock v. the Dakota Access Pipeline, and the Long Tradition of Indigenous Resistance 14–15, 20–21 (2016) (situating the Standing Rock protest movement within a long history of indigenous resistance against U.S. capitalism and settler-colonialism).
See supra notes 24–28 and accompanying text; see also Columbia Law Students for Palestine et al., From the Encampments: Student Reflections on Protests for Palestine, LPE Proj. (May 2, 2024), https://lpeproject.org/blog/from-the-encampments-student-reflections-on-protests-for-palestine/[https://perma.cc/LY7A-6U8R](describing the challenges pro-Palestine student protestors have made to U.S. imperialism and financial capitalism).
Despite the many enduring similarities between current and past periods of national security, the fourth period has one relatively new and notable aspect. In contrast to earlier periods, the U.S. government’s formal definition of national security has become quite expansive. While this expansion remains at least partially guided by the same capitalist-imperialist interests that have always been central to U.S. national security,140
See supra note 97 and accompanying text.
Donohue, The Limits of National Security, supra note 67, at 1718–23. Many of these areas had also received national security-like treatment during the third period of national security, but were not formally included in the national security architecture until the fourth period. Id. at 1738.
The expansion of national security has resulted in an even more swollen national security state, as new areas of concern have given rise to novel government initiatives and agencies.142
Id. at 1723.
Id. at 1723, 1736.
E.g., id. at 1723–25, 1736, 1741–43. See Jamshidi, Climate Change Is a Human Security, Not a National Security, Issue, supra note 17, at 17 (“Most solutions to national security problems prominently feature a militarized or military-focused approach.”).
B. Defining Threats, Generating Fear, Identifying “Enemies”
TOPWhile some legal scholarship reimagining national security—specifically, reformist scholarship—focuses on the consequences of treating something as a national security threat,145
See supra note 15.
National security legal scholarship has discussed some of the issues addressed in this sub-section. See, e.g., Lisa Grow Sun & RonNell Andersen Jones, Disaggregating Disasters, 60 UCLA L. Rev. 884, 924 (2013) (examining the central role played by “enemies” in U.S. national security discourse); Donohue, The Limits of National Security, supra note 67, at 1701–02 (describing how the U.S. government has manipulated public fear to justify the size and primacy of the U.S. national security state). In particular, legal scholarship—especially in the reformist vein—has paid much attention to the role of race in identifying threats. E.g., Volpp, supra note 41, at 1592–94. This Article adds to that literature by presenting a more comprehensive picture of the political, social, and economic factors that inform threat identification and connecting those factors to a larger narrative about the foundational premises of national security.
For example, as suggested by the discussion below, U.S. economic interests, fear, as well as a tendency to construct enemies can all help explain why certain states are identified as threats to U.S. national security, while others are not.
Because threat identification and framing is central to contemporary national security practice,148
See Donohue, The Limits of National Security, supra note 67, at 1752 (“[T]he most important question now driving U.S. national security is what potential threats does the United States face?”).
1. U.S. economic interests
To understand the role that U.S. economic interests play in national security threat identification, it is important to understand some of the most prominent theories, which have been developed by international relations scholars, about how states perceive and identify threats. According to one dominant view—embraced by the realist school of international relations—states are guided by a will to survive and are primarily threatened by other states.149
James Wood Forsyth, Jr., The Past as Prologue: Realist Thought and the Future of American Security Policy, 5 Strategic Stud. Q. 102, 103–05 (2011).
Id. at 103.
Id. at 108–09.
Owen, Transnational Liberalism and U.S. Primacy, supra note 62, at 120.
John M. Owen, IV, Liberalism and Security, Int’l Stud. (2017).
Jack Snyder, One World, Rival Theories, Foreign Pol’y (Oct. 26, 2009), https://foreignpolicy.com/2009/10/26/one-world-rival-theories/[perma.cc/5PPU-U54X].
Realist and liberal theories of international relations certainly help explain some contemporary U.S. approaches to identifying national security threats.155
Id.
See generally Christian Huggel et. al, The Existential Risk Space of Climate Change, 174 Climatic Change 8 (2022) (proposing a framework for understanding the existential threats posed by climate change from a scientific perspective).
An explanation for these threat identification conundrums, which also aligns with the alternative history presented in Part III.A., can be found in the Marxist theory of international relations. According to the Marxist view, each state’s international relations is primarily determined by the capitalist classes—meaning, a state’s foreign and national security policies, as well as threats to it, are shaped by the capitalist interests controlling and influencing the state.157
Spyros Sakellaropoulos & Panagiotis Sotiris, American Foreign Policy as Modern Imperialism: From Armed Humanitarianism to Preemptive War, 72 Sci. & Soc’y 208, 210 (2008).
Id. at 211.
Id. at 211–12.
Id. at 219–20.
Id. at 215.
Id. at 213.
This theory of international relations helps makes sense of the threat identification conundrums laid out above. Together with the alternative history presented in Part III.A, the Marxist theory suggests that U.S. national security depends upon U.S. hegemony over an “imperialist chain” of states willing and able to maintain the stability and policies necessary for global capital to flourish.163
Wood, supra note 69, at 154.
Id. at 155-6; Kumar, supra note 87, at 109; Williams, supra note 14, at 173.
To clarify, the point here is that the Marxist theory explains why some non-liberal, non-democratic states are treated as friends while other non-liberal, non-democratic states are treated as enemies. Those states treated as enemies—i.e., Cuba, Venezuela, and Syria—would arguably also be defined as such by other international relations theories, like the liberal theory. By contrast, those non-liberal, non-democratic states—like Saudi Arabia and the Gulf States—would not be treated as friends under that theory, but would be treated as friends under the realist theory of international relations. E.g., Bradley Bowman, Realism and Idealism: US Policy toward Saudi Arabia, from the Cold War to Today, 35 Parameters 91, 93–94 (2005). Neither theory, however, meaningfully explains both why the first group of states is treated as an enemy and why the second group is treated as a friend. The Marxist theory does that explanatory work.
“[A]lternative forms of coercive power, which operate outside legal and political structures”166
Donohue, The Limits of National Security, supra note 67, at 1748.
It is important to note that the U.S. government defines terrorism as a categorical national security threat. In other words, it is not just terrorism on U.S. soil or terrorism backed by other states that threatens U.S. national security but rather terrorism by any state or non-state actor more broadly. E.g., Biden National Security Strategy, supra note 47, at 30. While certain individual acts of terrorism—for example, terrorist violence against the United States backed by other states—might be better explained by other theories of international relations, the classification of terrorism as a national security threat, writ large, is, I believe, best explained by the Marxist theory of international relations.
Under the Marxist account of international relations, other U.S. national security threats can be understood as opportunities to protect and bolster U.S. hegemony over the imperialist chain, while at the same time being shaped and limited by the interests of the capitalist classes. The influence of these interests extends to the policy responses these national security threats receive. For example, climate change is expected to have a substantial impact on the global economy,168
Daniel Heffron, What Do Realists Think About Climate Change?, Ctr. For Geopolitics & Realism Stud., Nov. 13, 2015, at 10.
When it comes to existential actor-less threats, realism potentially provides another explanation for identifying those phenomena as national security concerns. One can argue, for example, that climate change may lead to wars and other armed conflicts between states; poses the kind of existential threat to states that invasion or military attack by other states presents; and/or that climate change-related threats undermine a state’s position and strength in relation to other states. On any of these views, and notwithstanding realism’s traditional focus on threats from other states, climate change should arguably be treated as a national security concern under the realist paradigm. E.g., Heffron, What Do Realists Think About Climate Change?, supra note 168. At the same time, the realist theory of international relations has a harder time explaining why climate change is treated as a national security issue but addressed in inadequate ways. See infra note 176 and accompanying text.
Donohue, The Limits of National Security, supra note 67, at 1752–53.
See, e.g., Watson Institute Costs of War Project, Corporate Power, Profiteering, and the “Camo Economy,” Brown Univ., https://watson.brown.edu/costsofwar/costs/social/corporate[https://perma.cc/SE8C-U24T](“Large defense contractors have played a central role in fighting the post-9/11 wars.”).
See supra note 116.
At the same time, the interests of the capitalist classes, like the U.S. fossil fuel industry, impact how far the United States can go in addressing climate change as a national security threat173
This is not to say that the United States is simply the “military arm” of the capitalist classes, but rather that, in upholding the objectives of U.S. capital, the United States takes into consideration the “collective interests” of those classes. Sakellaropoulos & Sotiris, supra note 157, at 227.
Jeffrey Pierre & Scott Neuman, How Decades of Disinformation About Fossil Fuel Halted U.S. Climate Policy, NPR (Oct. 27, 2021), https://www.npr.org/2021/10/27/1047583610/once-again-the-u-s-has-failed-to-take-sweeping-climate-action-heres-why[https://perma.cc/R2KE-EFSC].
For example, climate change affects different communities even within the same country or region differently. Huggel et al., supra note 156, at 13. It can also be challenging to predict when and how a climate change risk will produce catastrophic effects that necessitate “transformative change.” Id. at 14; see also Pedro Mariani, Climate Change and International Cooperation, Harv. Advanced Leadership, Soc. Impact Rev. (Feb. 2, 2024), https://www.sir.advancedleadership.harvard.edu/articles/climate-change-and-international-cooperation[https://perma.cc/8JKN-PBEX](observing that the existential threat from climate change “although certain, is not as immediate, condensed or recognizable as threats that have historically aligned nations behind a common purpose”). These circumstances may lead politicians and government policymakers to address climate change will less urgency.
Certain off-shoots of realist thought underscore other explanations for why states might not take steps to address climate change—suggesting, for example, that in order to gain advantages over other countries states will want to consume more fossil fuel not less. Heffron, What Do Realists Think About Climate Change?, supra note 168, at 13. Yet another realist school of thought, which takes the internal structure of states into account, posits that democratic states will necessarily do less to mitigate climate change. Id. at 16. These realist theories have a harder time, however, explaining why a state might classify climate change as a national security threat in the first place. After all, if a state sees climate change as an opportunity to gain advantages over other states, it is unlikely to view climate change as a threat. By contrast, the Marxist theory can more coherently explain why climate change is both considered a national security threat and addressed in inadequate ways.
2. Generating fear
The second crucial aspect of U.S. threat identification, which is also an important framing device, has to do with fear. Despite the United States’ relative safety and security, fear pervades U.S. national security culture.177
Raskin & Spero, supra note 8, at 229; Christopher J. Fettweis, Nothing to Fear but Fear Itself: The National Security Policy of the United States 98–99, 108 in The Palgrave Handbook of National Security (Michael Clarke et al. eds. 2022); Barnet, supra note 133, at 490.
Fettweis, supra note 177, at 98–99, 106–07.
Id. at 96. While a sense of crisis and fear may be genuinely held by some members of the U.S. government, others—including high-ranking members of the U.S. military—have strongly suggested that the government also systematically stokes fear in order to manipulate the American public. Williams, supra note 14, at 273 (quoting U.S. General Douglas MacArthur—one of the most prominent American military figures of the 20th century—as observing that “[o]ur government has kept us in a perpetual state of fear—kept us in a continuous stampede of patriotic fervor—with the cry of a grave national emergency. . . . Yet, in retrospect, these disasters seem never to have happened, seem never to have been quite real”).
Ironically, as some have argued, the prevalence of fear within the U.S. national security sector is partly a result of the America’s exceptional strength.180
See generally Fettweis, supra note 177.
Id. at 108.
Id.
Id.
Id. at 109–10.
An emphasis on fear also has various practical benefits for the U.S. national security state. Since at least the third period of national security, the U.S. government has been invested in promoting a sense of threat and crisis within U.S. society.185
Donohue, The Limits of National Security, supra note 67, at 1701; see also Barnet, supra note 133, at 489 (“The national security state structures [after World War II] could not accomplish their task unless the American people were socialized to accept the idea that the only peace possible is a form of permanent war.”).
Barnet, supra note 133, at 495.
See generally Erik Luna, The Bin Laden Exception, 106 Nw. U. L. Rev. 1489 (2012) (arguing that false claims the United States is existentially threatened by terrorism, which have been made by government actors and others, have helped legitimize and justify violations of the Fourth Amendment by the Transportation Security Administration’s search-and-seizure regime at U.S. airports).
See, e.g., Mark Neocleous, War Power, Police Power 192–93, 198, 209–10 (2014) (arguing that fear and anxiety are used by states, including the United States, to justify a permanent war footing in the service of capitalist accumulation); Williams, supra note 14, at 239–40 (arguing that after 1945 “a good many men” within the U.S. political leadership thought it was “necessary to ‘scare the hell out of the American people’ in order to win their active approval and support for the kind of vigorous anti-Soviet policy . . . [they] wanted,” a policy which focused on the expansion of U.S. economic and political influence around the globe); Schwarz, supra note 119, at 191 (arguing that, during the Cold War, the United States used the image of the Soviet Union to frighten Americans into accepting expansionist economic policies on the international plane).
3. Constructing enemies
The third element of national security threat identification and framing revolves around the “friend” vs. “enemy” binary. As one commentator describes it, “[t]he heavy economic sacrifice and the inevitable infringement on traditional liberties demanded by the national security state are legitimized by the enemy.”189
Barnet, supra note 133, at 491.
David Rousseau, Identifying Threats and Threatening Identities: The Social Construction of Realism and Liberalism 4 (2006).
Id. at 12.
Ayse Zarakol, What Makes Terrorism Modern? Terrorism, Legitimacy, and the International System, 31 Rev. Int’l Stud. 2311, 2314 (2011).
Kumar, supra note 87, at 100; Williams, supra note 14, at 173.
According to William Appleman Williams, the United States is particularly prone to defining its enemies as “unnatural men . . . beyond the pale and almost, if not wholly, beyond redemption.” Williams, supra note 14, at 94. As Williams explained it, this tendency is rooted in the exceptionalist view of the United States as a moral force that improves and makes the entire world better. Id. at 93–94.
Race plays an important role in the friend vs. enemy binary, as also reflected in the alternative history of U.S. national security presented in this agenda. The image of perpetual instability fomented by racialized others in the Global South has been used, for example, to justify the use of U.S. force both at home and abroad.195
Rana, National Security Law and the Originalist Myth, supra note 55, at 68.
See Singh, supra note 70, at 31 (“American war craft remains perennially bound to American racecraft as the politics of fear and lineaments of enemies without and within morph together . . .”).
See Kumar, Terrorcraft: Empire and the Making of the Racialised Terrorist Threat, supra note 126, at 163–64 (noting that the FBI engages in entrapment policies primarily targeting Muslim and other marginalized communities and that it uses this work of “creating terrorists as a way to justify the billions of dollars spent on counterterrorism activity”).
U.S. capitalist interests are particularly well-served by threats framed in terms of racialized enemies. Focusing on anti-Muslim racism in the post 9/11 era, Arun Kundnani provides a succinct description of how racism is used to code the “enemy” in ways that serve the interests of U.S. capitalist empire. As he writes:
[T]he racist and imperialist violence upon which US-led [sic] capitalism depends cannot be acknowledged in liberal society so it is transferred onto the personality of the Muslim and seen as emanating from ‘outside’ the social order. Imperial violence is then only ever a proportionate response to the inherently aggressive and threatening nature of the fanatical Muslim enemy. In these ways, a Western self-image of innocence and beneficence can be maintained by screening out resistance to the US-led system of global capitalism.198
Arun Kundnani, Islamophobia: Lay Ideology of U.S Empire, https://www.kundnani.org/wp-content/uploads/Kundnani-Islamophobia-as-lay-ideology-of-US-empire.pdf[https://perma.cc/Z3RK-SPM6].
C. The Private Persons Participating in and Enforcing U.S. National Security Policies
TOPWhile national security is generally understood as a quintessential public function, it relies, in no small part, on private participation. That private participation primarily occurs in the form of paid government contractors and private volunteers.199
Though beyond the scope of this Article, private parties participate in national security in other ways as well. For example, certain national security programs obligate private persons to participate in national security work, without pay and potentially against their will. See, e.g., Huyen Pham, The Private Enforcement of Immigration Laws, 96 Geo. L.J. 777, 782 (2008) (“Private enforcement [of immigration laws] occurs when private parties, acting under a requirement of law, check for legal immigration status before granting applicants access to a restricted benefit.”). In other cases, private companies sell access to information or other technologies to the government, which is vital to its national security work. Jon D. Michaels, All the President’s Spies: Private-Public Intelligence Partnerships in the War on Terror, 96 Calif. L. Rev. 901, 917–19 (2008).
E.g., Laura Dickinson, Outsourcing War and Peace: Preserving Public Values in a World of Privatized Foreign Affairs (2011); infra notes 205–211 and accompanying text.
As reflected in the sources cited in this sub-section, my own work has largely focused on examining the role of private volunteers in U.S. national security.
Grappling with the role of private parties is central to radically transforming national security through legal scholarship, since these entities are indispensable to the functioning of the national security state. It is because of the involvement of the private sector that the U.S. government has amassed a vast trove of intelligence since 9/11, to mention just one example.202
See, e.g., Michaels, All the President’s Spies: Private-Public Intelligence Partnerships in the War on Terror, supra note 199, at 910–18 (listing examples of various public-private partnerships that have been critical to the U.S. government’s intelligence gathering since 9/11).
1. Private contractors
While hardly limited to the post 9/11 landscape,203
E.g., Jon D. Michaels, Constitutional Coup: Privatization’s Threat to the American Republic 114 (2017).
Jody Freeman & Martha Minow, Reframing the Outsourcing Debate, in Government by Contract: Outsourcing and American Democracy 1, 2 (Jody Freeman & Martha Minow eds., 2009).
Homeland Security Act of 2002, Pub. L. 107-296, 116 Stat. 2135 (Nov. 25, 2002).
For example, the Intelligence Reform and Terrorism Prevention Act of 2004 created a new Director of National Intelligence to coordinate the government’s various intelligence agencies, as well as the National Counterterrorism Center, which is responsible for national and international counterterrorism efforts, among other things. Pub. L. 108-458, 118 Stat. 3638 (Dec. 17, 2004).
Michaels, Constitutional Coup, supra note 203, at 114.
See Dana Priest & William Arkin, National Security Inc., Wash. Post (July 20, 2010), https://www.washingtonpost.com/investigations/top-secret-america/2010/07/20/national-security-inc/[https://perma.cc/H92U-UANM](describing the U.S. government’s use of private contractors for intelligence, counterterrorism, and military-related activities).
Michaels, Constitutional Coup, supra note 203, at 124.
There are upsides and downsides to this arrangement. The upsides primarily flow to the private contractors and the federal government. While private contractors receive monetary remuneration for their services, the government is able to expand the scale and scope of its national security work. As for the downsides of this relationship, those flow to U.S. society at large. In particular, private contractors threaten core governance norms, including undermining democratic and legal accountability for the government’s national security activities while also exacerbating woefully low levels of transparency in the sector.210
Paul R. Verkuil, Outsourcing Sovereignty: Why Privatization of Government Functions Threatens Democracy and What We Can Do About It 2 (2007); Martha Minow, Outsourcing Power: How Privatizing Military Efforts Challenges Accountability, Professionalism, and Democracy, 46 B.C. L. Rev. 989, 994–96, 999–1000 (2005).
2. Private volunteers
Private volunteers—consisting of individuals and organizations that are not paid for their work—shape and enforce the government’s national security policies and goals. The U.S. government has expressly cultivated voluntary private participation in at least some areas of national security211
Jon D. Michaels, Deputizing Homeland Security, 88 Tex. L. Rev. 1435, 1441 (2010).
Maryam Jamshidi, The Private Enforcement of National Security, 108 Cornell L. Rev. 739, 788–89 (2023).
See generally Michaels, Deputizing Homeland Security, supra note 211 (describing various government programs that broadly encourage private parties to voluntarily engage in surveillance and intelligence gathering on the U.S. government’s behalf); Amna Akbar, National Security’s Broken Windows, 62 UCLA L. Rev. 834 (2015) (discussing efforts to recruit Muslims in the United States to surveil and report on “radicalized” members of their communities).
Michaels, All the President’s Spies: Private-Public Intelligence Partnerships in the War on Terror, supra note 199, at 910–18.
See generally Jamshidi, The Private Enforcement of National Security, supra note 212 (discussing how private parties use federal civil terrorism statutes to voluntarily enforce some of the government’s terrorism and sanctions-related national security policies); see also Maryam Jamshidi, How Private Actors Are Impacting U.S. Economic Sanctions, 15 Harv. Nat’l Sec. J. 119 (exploring the different ways private parties shape, influence, and enforce U.S. economic sanctions).
Jamshidi, The Private Enforcement of National Security, supra note 212, at 792; Michaels, Deputizing Homeland Security, supra note 211, at 1438.
While private volunteers benefit from these arrangements, their participation in national security, as well as the benefits they accrue, potentially create various societal harms, both locally and globally. First, private parties can use their participation in and enforcement of U.S. national security to further their parochial monetary interests217
Jamshidi, The Private Enforcement of National Security, supra note 212, at 801.
Jamshidi, How Private Actors Are Impacting U.S. Economic Sanctions, supra note 215, at 136–40.
Id. at 192–96.
E.g., id. at 154–79.
Jamshidi, The Private Enforcement of National Security, supra note 212, at 742–43. Private contractors, which directly assume the government’s role in enforcing national security policies and practices that target marginalized communities, self-evidently further corrosive forms of state power.
See Maryam Jamshidi, Instruments of Dehumanization, Bos. Rev. (Dec. 9, 2023), https://www.bostonreview.net/articles/instruments-of-dehumanization/[https://perma.cc/GS42-K3V2](describing how federal civil terrorism statutes—which are part of national security’s private enforcement—have been consciously and intentionally used by private litigants to subordinate Palestinians); Darryl Li, Terrorism Torts and the Right to Colonize, LPE Proj. (Mar. 13, 2023), https://lpeproject.org/blog/terrorism-torts-and-the-right-to-colonize/ [https://perma.cc/9SFM-B3V8] (same).
Alongside these problematic effects, private volunteering in national security has an exclusionary aspect. Only those who are “friends” of the United States—which, as discussed in Part III.B, requires supporting rather than challenging the interests embedded within U.S. national security—can participate.223
See supra notes 190–192 and accompanying text. Working for the government as a private national security contractor also usually necessitates that the contractor be a “friend” to the United States. Indeed, most of those positions require obtaining and maintaining a federal security clearance that is aimed, in part, at determining whether the person is “reliable, trustworthy, of good conduct and character, and loyal to the U.S.” Maj. Andrew Woodbury, Continuous Evaluation and Credit Reports: Ensuring Fairness in Current Security Clearance, 82 A.F. L. Rev. 224, 227, 229 (2022).
See, e.g., Akbar, National Security’s Broken Windows, supra note 213, at 883–85 (noting that American Muslims who participate in the U.S. government’s efforts to identify “radical” Muslims in their communities must effectively acquiesce and be loyal to U.S. interests). See also Mamdani, supra note 120, at 15 (coining the phrase “good muslim, bad muslim” to denote those Muslims who are considered friends of U.S. empire and those who are considered enemies).
Akbar, National Security’s Broken Windows, supra note 213, at 885, 890, 895–96.
D. The Rule of Law’s Shortcomings in Protecting Against Corrosive National Security Activities
TOPWhile this agenda primarily focuses on the political, social, and economic aspects of national security, any effort to radically reimagine the field through legal scholarship must also grapple with the role of law and the rule of law. As discussed in Part II, reformist scholarship places special emphasis on law’s relationship to U.S. national security practice and policy. In particular, some of this literature insists that national security’s primary problem is its rule of law deficits.226
See, e.g., supra note 19 and accompanying text.
As legal scholars like Bernard Harcourt have argued, national security is law-full.227
Bernard Harcourt, The Counterrevolution: How Our Government Went to War Against Its Own Citizens 213 (2018).
Id. at 214–15.
Id. at 222.
While the argument is not iron clad,230
See infra note 239.
Harcourt, supra note 227, at 227.
Neocleous, supra note 188, at 46.
Jamshidi, The Discriminatory Executive and the Rule of Law, supra note 48, at 79–84.
This malleability derives from the rule of law’s largely formalist orientation,234
David Dyzenhaus, Hobbes and the Legitimacy of Law, 20 Law & Phil. 461, 461–62 (2001).
Jamshidi, The Discriminatory Executive and the Rule of Law, supra note 48, at 92–95.
Id. at 94.
Id. at 94–95.
See id. at 92–93 (describing the requirements of the formalist rule of law). One might argue that the secrecy surrounding many national security projects—including secret laws—violates some of these formalist requirements. While this Article cannot consider this issue in any depth, it is worth noting that secrecy, in and of itself, does not necessarily violate formalist conceptions of law. Id. at 164 n. 510.
While law is a tool of politics and power that can further corrode forms of state authority, it can also be used to dismantle that power. In order to realize that goal, the rule of law must be paired with the appropriate political, social, and/or economic project. As legal scholar Noura Erakat has argued, “[t]he language of law should not displace, direct, or supplant politics because it does [not] possess a determinate meaning nor guarantee a particular outcome. Politics aimed at shifting the structure of an oppressive status quo should provide a strategic compass.”239
Noura Erakat, Justice for Some: Law and the Question of Palestine 19 (2019).
This is another reason why legal scholars who wish to radically reimagine the field of national security should develop relationships and work with the social movements focused on developing these kinds of political visions. See infra Part III.G.
E. U.S. National Security’s Extensive Regulatory Reach Into the Daily Lives of Persons Both Abroad and at Home
TOPTo radically reimagine national security through legal scholarship, it is necessary to understand where and how national security operates: is it at play at home, abroad, in both places?; does it operate exclusively as a tool of foreign or military affairs or does it have a broader regulatory role over individual persons, as well?241
As used here, “regulation” is defined as “government intervention in the private domain.” Robert Knowles, Warfare as Regulation, 74 Wash. & Lee L. Rev. 1953, 1963 (2017).
Id. at 1982–83; Council on Foreign Rels., What Is the Relationship Between Domestic and Foreign Policy? (June 29, 2023), https://education.cfr.org/learn/reading/what-relationship-between-domestic-and-foreign-policy[https://perma.cc/3T6J-PXU3].
While some legal scholarship has drawn connections between counterterrorism practices abroad and certain policies and laws at home,243
E.g., Aslı Bâli, Extending the Logic of Defund to America’s Endless Wars, in Race and National Security 145–69 (Matiangai Sirleaf ed. 2023); Wadie Said, Law Enforcement in the American Security State, 2019 Wis. L. Rev. 819, 823–24 (2019).
See generally Mary L. Dudziak, War Time: An Idea, Its History, Its Consequences (2012) (challenging assumptions about the temporariness of wartime and demonstrating that wartime is an enduring condition in the United States).
The term “police” is not used here to mean the police, but instead references the state’s general powers to regulate and control actors and activities inside its borders.
This connection between domestic policing and war also comports with the history described in Part III.A., in particular, with the tendency for U.S. national security and foreign policy to be driven by domestic problems and concerns.
Understanding these facets of U.S. national security is important to radically reimagining the field through legal scholarship since it draws attention to the ways certain domestic national security regulations are connected to U.S. military objectives abroad; the general regulatory nature of U.S. warfare;247
Some legal scholars have started to explore the regulatory aspects of U.S. warfare—that is, warfare as something that not only needs to be regulated, but also as a form of regulation. E.g., Knowles, Warfare as Regulation, supra note 242.
Cf., Rana, Left Internationalism in the Heart of Empire, supra note 63 (insisting that U.S. foreign policies and U.S. domestic policies, including economic and social policies, are deeply connected and that reimagining U.S. foreign policy, from a left perspective, requires making that linkage).
Starting at the international level, the U.S. government has exercised regulatory control over the daily life of persons abroad through military occupations that have exposed individuals to arbitrary arrest, detention, and/or death in places like Iraq249
See, e.g., Chris Hedges & Laila Al-Arian, Collateral Damage: America’s War Against Iraqi Civilians (2009) (detailing the control U.S. troops exercised, through security checkpoints and other mechanisms, over the daily lives of Iraqi civilians). Most disturbingly, this control included the ability to kill Iraqi civilians at will. Emma Slater, Hundreds of Civilians Gunned Down at Checkpoints, Bureau of Investigative Journalism (May 23, 2011), https://www.thebureauinvestigates.com/stories/2011-05-23/hundreds-of-civilians-gunned-down-at-checkpoints/#:~:text=The%20US%20war%20logs%20show,than%20not%2C%20that%20got%20killed.[https://perma.cc/V369-WZP7].
See, e.g., Margaret Hu, Militarized Biometric Data Colonialism, in Race and National Security 140–43 (Matiangai Sirleaf ed. 2023) (discussing U.S. government practices of biometric surveillance on “almost the entire Afghan population” during the U.S. occupation of Afghanistan); Enduring Freedom: Abuses by U.S. Forces in Afghanistan, Hum. Rts. Watch (Mar. 8, 2004), https://www.hrw.org/report/2004/03/08/enduring-freedom/abuses-us-forces-afghanistan[https://perma.cc/U3EZ-2K43](detailing the U.S. military’s system of arrest and detention—used against both combatants and civilians—as part of its occupation of Afghanistan); Lynzy Billing, The Night Raids, ProPublica (Dec. 15, 2022), https://www.propublica.org/article/afghanistan-night-raids-zero-units-lynzy-billing[https://perma.cc/L2G9-ACRC](detailing CIA-backed night raids in Afghanistan during the U.S. occupation that resulted in the killing of hundreds of Afghan civilians).
See Patrick Keenan, Drones and Civilians: Emerging Evidence of the Terrorizing Effects of the U.S. Drone Programs, 20 Santa Clara J. Int’l L. 1, 3–7 (2021) (arguing that U.S. drone programs terrorize civilians because of their persistent monitoring and surveillance, as well as the fear they generate among the surveilled that “their innocent movements . . . will lead to them being targeted by a missile”).
See Jamshidi, How Private Actors Are Impacting U.S. Economic Sanctions, supra note 215, at 123–24, 192–94 (demonstrating how economic sanctions regulate and control the ability of persons to engage in commercial and financial transactions and otherwise deprive people in sanctioned countries of basic resources and employment opportunities). For more on the regulatory function of U.S. national security practices like administrative detention, drone strikes, and economic sanctions see Elena Chachko, Administrative National Security, 108 Geo. L. J. 1063 (2020).
On the domestic front, the U.S. government has invoked national security at the federal level253
While this section mostly focuses on federal domestic national security activities, states have also increasingly invoked national security to regulate activities within their borders. E.g., Annie Erling Gofus, Florida’s New Real Estate Laws: Restrictions on Property Ownership by Foreign Nationals, Werc (Oct. 31, 2023), https://web.archive.org/web/20240302073747/https://www.worldwideerc.org/news/public-policy/florida-s-new-real-estate-laws-restrictions-on-property-ownership-by-foreign-nationals[https://perma.cc/8ZNM-8WAS].
Said, Crimes of Terror, supra note 38, at 73–105.
Norman Abrams, The Material Support Terrorism Offenses: Perspectives Derived from the (Early) Model Penal Code, 1 J. Nat’l Sec. L. & Pol’y 5, 5–7 (2005).
Dru Stevenson, Effect of the National Security Paradigm on Criminal Law, 22 Stan. L. & Pol’y Rev. 129, 131 (2011).
While long considered a national security issue,257
See supra note 101 and accompanying text.
Shoba Sivaprasad Wadhia, National Security, Immigration and the Muslims Bans, 75 Wash. & Lee L. Rev. 1475, 1478–82 (2018).
See generally Shoba Sivaprasad Wadhia, Is Immigration Law National Security Law?, 66 Emory L. J. 669 (2017) (examining how U.S. national security concerns shaped immigration policies during the 2010s).
Granick, supra note 39, at 192–216.
See Luna, supra note 187 (demonstrating how counter-terrorism priorities have impacted U.S. airport security).
Under the Health Insurance Portability and Privacy Act of 1996 (HIPAA)—which creates a national standard to protect people’s sensitive medical information—a “covered entity may disclose protected health information to authorized federal officials for the conduct of lawful intelligence, counter-intelligence, and other national security activities” under the National Security Act and implementing authority. 45 C.F.R. § 164.512(k)(2).
National security concerns have even shaped economic and financial transactions engaged in by or involving U.S. persons or occurring within the United States, through economic sanctions regulations263
Arthur Culvahouse, Jr., A Practical Guide to International Sanctions Law and Lore: Mamas, Don’t Let Your Children Grow Up to Be Sanctions Lawyers, 32 Hous. J. Int’l L. 587, 592–93 (2010).
See Eichensehr & Hwang, supra note 49, at 560–82 (describing the U.S. government’s practice of conducting national security reviews of certain inbound investments into the United States by foreign individuals and entities and outbound investments by U.S. persons abroad); Kevin Tang, The Patriot Act and Foreign Banking: Section III’s Role in Foreign Policy, 39 Rev. Banking & Fin. L. 135, 136–38 (2021) (describing how concerns about terrorism financing after 9/11 led to new federal laws requiring U.S. financial institutions to take certain measures with respect to any foreign jurisdiction, financial institution, or international transaction designated by the U.S. Treasury Secretary as a “primary money laundering concern”); Vilas Ramachandran, A Regulatory Back Door: General Prohibition Ten and America’s National Security, 20 Santa Clara J. Int’l L. 31, 36–46 (2022) (providing an overview of U.S. export control laws and noting that “[w]hen Congress deliberated the United States’ export control regime, its main goal was to secure America’s national security and further the nation’s interests around the world”).
See Saptarishi Bandopadhyay & Joshua Coene, Disaster Risk in the Carceral State, 42 Stan. Envt’l L.J. 171, 208–10 (2023) (describing the Federal Emergency Management Agency, which is responsible for federal disaster management, as assuming a national security footing from its inception); Grow Sun & Andersen Jones, supra note 146, at 910–21 (describing various state and federal actions, rhetoric, and policies applying a war-framing to non-war natural disasters in the United States).
See Mark Nevitt, Climate Security Insights from the COVID-19 Response, 98 Ind. L.J. 815, 819 (2023) (“[T]here is a growing understanding that the military will be called upon to respond to . . . climate-exacerbated natural disasters”).
See id. at 819–20, 836–38 (describing various national security-based authorities used by the government to respond to COVID-19 and noting that the U.S. military played an “outsized role” in leading the government’s response).
National security’s pervasive reach at home and abroad supports the view put forth by some scholars that the “distinction between war and peace” is questionable, at best.268
Neocleous, supra note 188, at 5.
Id. at 13.
Id. at 31–32, 175.
has little to do with defeating ‘terror’ whatever that might mean, and rather a lot to do with shaping civil society and the social order: with making and remaking citizens and/as subjects, with re-forming populations into new modes of security and technologies of governing and, more than anything, with establishing new grounds of accumulation . . . [it] is the contemporary instantiation of the combination of war power and police power.271
Id. at 14.
F. How the Relationship Between Government and National Security Academia Restricts the Horizon for Rethinking National Security
TOPThere is a revolving door between national security academia, the U.S. government, and the think tanks shaping U.S. national security policy. While this reality is not one every national security scholar experiences or strives for,272
Of course, there are also individual national security scholars who are outliers and/or are actively challenging the national security status quo in radical ways.
Many of this country’s leading national security scholars have worked in the U.S. government, whether prior to entering academia or during their academic careers, and/or have been affiliated with think tanks closely tied to the national security establishment.273
See Kumar, Terrorcraft: Empire and the Making of the Racialised Terrorist Threat, supra note 126, at 65 (noting the important contributions think tanks make to U.S. national security policy).
Bacevich, supra note 58, at 8.
This is not to suggest that these national security academics are unique in their tendency to serve state power. To the contrary, intellectuals and scholars have long bolstered the interests of empire. For centuries, scholars were central to European colonialism and imperialism—both legitimizing that imperialism through their scholarship275
See Antony Anghie, Imperialism, Sovereignty, and the Making of International Law 28–31 (2007) (discussing the work of a seminal Western scholar of international law and the ways it legitimized Spain’s conquest of the Americas); Kumar, supra note 87, at 35–36 (2020) (describing how scholarly production was used to further the interests of European colonialism in the nineteenth century).
Kumar, supra note 87, at 34.
Barnet, supra note 133, at 497.
Kumar, supra note 87, at 61 (quoting international relations scholar Inderjeet Parmar).
However usual it might be, this imbrication between government and national security academia suggests that any effort to radically transform the fundamentals of U.S. national security will be hamstrung if based exclusively or even primarily within the scholarly community. Legal scholars who seek to radically reimagine national security should, as such, be mindful of the reception their work is likely to receive from other national security scholars; determine how to respond to and engage with that reception; and consider connecting with other actors outside legal academia, the government, and the government-aligned think-tank world who may be more amenable to radically re-conceptualizing and theorizing what national security means and how it operates.
G. The Critical Role of Social Movements in Radically Reimagining U.S. National Security
TOPThis brings us to the final issue in this transformative agenda for national security. While academics and other national security “experts” 279
Within the U.S. national security sector, the default assumption is that experts within the Executive Branch—often with specialized military or security-related skills—are the ones best positioned to define U.S. national security and decide what constitutes a national security threat. Rana, Who Decides on Security?, supra note 4, at 1423–24. Much like many of the members of national security academia, however, these national security experts are substantially invested in maintaining the status quo. Glennon, National Security and Double Government, supra note 20.
Amna Akbar, Sameer Ashar & Jocelyn Simonson, Movement Law, 73 Stan. L. Rev. 821, 824, 827 (2021).
Id. at 824–25.
The national security space is no exception. In the last few years, left social movements radically challenging the foundations of national security and presenting alternative political visions for the field have emerged. These movements are largely led by members of those communities most targeted and disadvantaged by U.S. national security policies—namely Middle Easterners, South Asians, Africans, and Muslims. In 2021, some of these movement groups published a policy agenda, Abolishing the War on Terror & Building Communities of Care: A Grassroots Policy Agenda for the Biden-Harris Administration and 117th Congress (“Abolishing the War on Terror”), that fundamentally questions and rejects many of the premises of U.S. national security and presents new conceptions of security in its place.282
Abolishing the War on Terror & Building Communities of Care: A Grassroots Policy Agenda for the Biden-Harris Administration and 117th Congress (2021) [hereinafter Abolishing the War on Terror]. I discuss the agenda at length in Whose Security Matters?, 116 AJIL Unbound 236 (2022).
Drawing inspiration from abolitionist approaches to U.S. criminal justice and immigration practices,283
See, e.g. Akbar, An Abolitionist Horizon for (Police) Reform, supra note 57, for a description of abolitionist approaches to policing.
The authors of Abolishing the War on Terror include the following organizations: Justice for Muslims Collective (since renamed Muslims for Just Futures), HEART Women & Girls, Vigilante Love, the Partnership to End Gendered Islamophobia, Project South, the Partnership for the Advancement of New Americans, and the U.S. Campaign for Palestinian Rights. Abolishing the War on Terror, supra note 282, at 1.
Id.
Id. at 2.
Id. at 10, 11, 15.
The Abolishing the War on Terror agenda is not just about ending problematic state structures; it is also dedicated to redefining and building new forms of collective security.288
Jamshidi, Whose Security Matters?, supra note 282, at 240.
Abolishing the War on Terror, supra note 282, at 33–50.
Id. at 15.
Whatever one thinks of these proposals, there is little doubt that they constitute a radical reimagining of the U.S. national security apparatus. Together with the groups that have developed them, they provide a political vision and potentially receptive community for those exploring similar radical approaches through legal scholarship.291
Some legal scholars have also started embracing abolitionist approaches to U.S. national security. See, e.g., Bâli, supra note 243 (calling for the defunding of the “military-industrial-policing complex” that sustains the U.S. national security state); Matiangai Sirleaf, Reforming, Transforming, and Radically Imagining National Security, in Race and National Security 251–63 (Matiangai Sirleaf ed. 2023) (advocating an abolitionist vision of national security). I am among these scholars. Maryam Jamshidi, Bringing Abolition to National Security, Just Sec. (Aug. 27, 2020), https://www.justsecurity.org/72160/bringing-abolition-to-national-security/[https://perma.cc/43XC-X625].
IV. Conclusion
TOPWhat it means to reimagine national security is limited only by our willingness to question so-called truths and think in unconventional ways. This agenda has attempted to model such openness. It has certainly failed to address every assumption and presumption of U.S. national security and has been cursory in places where more exposition and argument would have been desirable. With any luck, though, it has provided readers with a set of topics that can help them reflect on what it means to radically rethink national security through legal scholarship and the impetus to disrupt a field in desperate need of a true reimagining.
- 1The University of Chicago Legal Forum Announces Its 2024 Volume: Reimaging National Security (on file with author).
- 2See id. (“Unconventional threats call for reimagining conventional approaches to national security . . . We aim to explore how the law solves, regulates, and responds to [those] threats to the nation . . .”).
- 3In discussing existing scholarship that “rethinks” or “reimagines” national security, this Article does not limit itself to efforts that are self-conscious in their “rethinking” or “reimagining” of the field. Instead, this Article considers attempts to challenge what national security means or how it is practiced as engaged in a “rethinking” or “reimagining” of the discipline.
- 4See generally, e.g., Reimagining the National Security State: Liberalism on the Brink (Karen Greenberg ed. 2020) (compiling essays reimagining national security by exploring how national security practices that have undermined democratic institutions and the rule of law have impacted democratic liberalism, among other topics); see also Aziz Rana, Who Decides on Security?, 44 Conn. L. Rev. 1417, 1419 (2012) (arguing that efforts to reform national security law have largely focused on strengthening legal and institutional constraints on executive power).
- 5See generally, e.g., Lisa A. Rich, Introduction to the Symposium Edition - New Technology and Old Law: Rethinking National Security, 2 Tex. A&M L. Rev. 581 (2015) (compiling essays examining how existing legal frameworks should adapt and, in some cases, expand to address new national security challenges). While there may be other trends in the literature on reimagining and rethinking national security, reform and expansionism represent the two most prevalent and enduring approaches, in my view. See infra Part II for a further discussion of these approaches.
- 6Reimagine, Webster’s Dictionary, https://www.merriam-webster.com/dictionary/reimagine#:~:text=reimagined%3B%20reimagining%3B%20reimagines,new%20conception%20of%20%3A%20re%2Dcreate [https://perma.cc/2AU8-5XYC].
- 7I use the word “radical” throughout this Article to describe the kind of transformation supported by the agenda presented in Part III.
- 8The phrase “national security state” was coined in the 1960s by former U.S. government official and public intellectual Marcus Raskin. See Marcus Raskin & Robert Spero, The Four Freedoms Under Siege: The Clear and Present Danger of Our National Security State xx–xxi (2008) (“The National Security State by its nature is expansionist for it deals with the continuous creation of activities in all aspects of public life and has become the single most important function of millions of federal workers, unions, police agencies, defense corporations, universities, and scientists.”).
- 9Many works of national security legal scholarship begin by defining what “national security” is. This Article does not, since its aim is to dissect and critique the presumptions upon which most definitions of national security are implicitly based.
- 10For example, critical legal studies views law as deeply political. Mark Tushnet, Critical Legal Studies: A Political History, 100 Yale L.J. 1515, 1517 (1991). For critical race theorists, law “shapes and is shaped by ‘race relations’ across the social plane.” Kimberlé Crenshaw et al., Introduction, in Critical Race Theory: the Key Writings that Formed the Movement, at xxv (eds. 1995). For its part, TWAIL disentangles and problematizes international law’s historic and on-going role in furthering the interests of Western imperialism and colonialism. James Thuo Gathii, TWAIL: A Brief History of its Origins, its Decentralized Network, and a Tentative Bibliography, 3 Trade Law & Dev. 26, 30–31 (2011). Finally, the emerging field of law and political economy emphasizes the importance of exploring how “law creates, reproduces, and protects political-economic power, for whom, and with what results.” Jedediah Britton-Purdy et al., Building a Law-and-Political Economy Framework: Beyond the Twentieth-Century Synthesis, 129 Yale L.J. 1784, 1820.
- 11The approach to national security reflected in this Article also shares commonalities with a branch of security studies, known as the Copenhagen School of Security Studies. This school of thought “emphasizes the fundamental and irreducibly political character of claims to know something about security.” J. Benton Heath, Making Sense of Security, 116 Am. J. Int’l L. 289, 321 (2022). At the same time, this Article goes beyond the Copenhagen School of Security Studies’ political analysis of security, which mainly revolves around the consequences of securitizing an issue. Id. Instead, the agenda presented in this Article examines a broader set of issues, including the history of national security, the reach of national security, and the actors involved in U.S. national security, among other topics.
- 12This group of critical national security scholars includes Sahar Aziz, Aslı Bâli, Nina Farnia, Aziz Rana, Shirin Sinnar, and Wadie Said, among others.
- 13See, e.g., Nina Farnia, Imperialism in the Making of U.S. Law, 96 St. John’s L. Rev. 131,137–39 (2022) (arguing that we must “foreground an analysis of imperialism in the making of U.S. law,” including U.S. national security law); Rana, Who Decides on Security?, supra note 4, at 1422 (noting that, in order to bring meaningful change to the practice of national security, the “broader ideological context that shapes how the balance between liberty and security is struck” must be engaged).
- 14While defining what “progressive, left” politics means is beyond the scope of this Article and also far from settled, my own understanding of it includes a principled commitment to opposing political, economic, and social systems that breed oppression and subordination of marginalized groups and communities, including imperialism, capitalism, and militarization. At the same time, I do not believe one must have a particular politics in order to find this agenda helpful. Indeed, I hope it will inform efforts to reimagine national security, regardless of partisan viewpoint. Nevertheless, I do believe this agenda will be most useful and helpful to those who want to create a progressive, left-vision of national security since, as discussed below, national security’s current orientation is largely politically conservative. See infra note 15 and accompanying text. For past and present visions of radical leftist foreign policy, which have inspired this Article’s agenda, see William Appleman Williams, The Tragedy of American Diplomacy 308–10 (2009); Aziz Rana, The Left’s Missing Foreign Policy, N+1 (Mar. 28, 2018), https://www.nplusonemag.com/online-only/online-only/the-lefts-missing-foreign-policy/[https://perma.cc/33CT-69FX].
- 15See Peter Roady, The Contest over National Security: FDR, Conservatives, and the Struggle to Claim the Most Powerful Phrase in American Politics 5–6 (2024) (arguing that after World War II conservative visions of U.S. national security triumphed over liberal visions).
- 16The seven issues discussed in Part III of this Article are informed, in part, by a left orientation, which is also shared with the schools of critical legal thought that have contributed to this agenda. See supra note 10 and accompanying text.
- 17One topic this agenda touches on in some places but generally omits is the range of consequences that arise from securitizing an issue, which include military-focused responses and legally exceptionalist treatments that often erode civil rights protections. Maryam Jamshidi, Climate Change Is a Human Security, Not a National Security, Issue, 93 S. Calif. L. Rev. Postscript 36, 39–40 (2019). As mentioned earlier, the Copenhagen School of Security Studies focuses substantially on the consequences of securitization. See supra note 11 and accompanying text. This issue is also implicitly addressed by some reformist approaches to national security, which are examined in Part II. Though the topic cannot be discussed in detail here, any radical reimaging of national security must grapple with the consequences of securitization, as well.
- 18In line with these limitations, the issues discussed in this agenda are not intended to limit what it means to take a “left” perspective on national security, though my hope is that this agenda can spur more conversations within the legal academy about what a “leftist” approach to national security through legal scholarship should entail.
- 19For example, the use of AI in war potentially encourages the dehumanization of those targeted and/or incidentally killed by those weapons systems. Elke Schwartz, The Ethical Implications of AI in Warfare, Queen Mary University London, https://www.qmul.ac.uk/research/featured-research/the-ethical-implications-of-ai-in-warfare/ [https://perma.cc/X25D-EGF5]. Whilethis concern is arguably part and parcel of national security’s tendency to create “enemies”—a topic discussed later in this Article—this agenda does not address this particular aspect of enemy creation.
- 20This commitment is particularly endemic to the national security bureaucracy, whose members are incentivized to maintain the policies on which their careers depend. Michael Glennon, National Security and Double Government, 5 Harv. Nat’l. Sec. J. 1, 34–38 (2014).
- 21Aziz Rana, Constitutionalism and the Foundations of the Security State, 103 Calif. L. Rev. 335, 381–82 (2015).
- 22There are several notable examples of these burgeoning debates. For instance, a recent edited volume—composed primarily of legal scholarship—contains various perspectives on national security that challenge mainstream assumptions about the field. Race and National Security (Matiangai Sirleaf ed. 2023). Some legal advocacy organizations have also issued policy proposals underscoring the need for a radical overhaul of the U.S. national security apparatus. Center for Constitutional Rights, A Rights-Based Vision for the First 100 Days (2020), https://docs.google.com/document/d/1i5VCQfZoE80eTPWu5i4D-KMAk97Ll56TzRcOAlOkLQ0/[https://perma.cc/9QBX-BVT4].Finally, Part III.G of this paper discusses efforts by some social movements to radically reimagine national security.
- 23See, e.g., Maryam Jamshidi, Genocide and Resistance in Palestine under Law’s Shadow, J. Genocide Stud., May 2024, at 20–28.
- 24ADL and Brandeis Center Letter to Presidents of Colleges and Universities (Oct. 26, 2023), https://www.adl.org/resources/letter/adl-and-brandeis-center-letter-presidents-colleges-and-universities[https://perma.cc/2NPC-EYL8];Press Release, Rubio, Colleagues Urge Removal of Hamas and Terrorist Supporters (Oct. 20, 2023), https://www.rubio.senate.gov/rubio-colleagues-urge-removal-of-hamas-and-terrorist-supporters/[https://perma.cc/5W6V-KZGJ].
- 25Justin Baragona, CAIR Calls on MSNBC to Ban ADL Boss Over ‘Iranian Proxies’ Remark, Daily Beast (Apr. 25, 2024), https://www.thedailybeast.com/cair-calls-on-msnbc-to-ban-adl-boss-over-iranian-proxies-remark[https://perma.cc/JJ4C-T3YC].
- 26No Flights for Terrorists Act, S. 4274, 118th Cong. (2023). For more on the ‘No Fly List’ see DHS Traveler Redress Inquiry Program, U.S. Dep’t of Homeland Sec., https://www.tsa.gov/travel/security-screening/travel-redress-program [perma.cc/B5UZ-GVJK].
- 27The campus-specific surveillance tools are typically framed as addressing antisemitism, which is a long-standing strategy for quashing pro-Palestine speech. See Austin Jefferson, Hochul Announces Attempt to Address Hate Online Amid Rise in Antisemitism and Islamophobia, City & State N.Y (Nov. 21, 2023), https://www.cityandstateny.com/politics/2023/11/hochul-announces-attempt-address-hate-online-amid-rise-antisemitism-and-islamophobia/392207/[perma.cc/FYQ6-2SBU];Monica Alba & Peter Alexander, Biden Administration Unveils New Actions to Combat Antisemitism on College Campuses, NBC News (Oct. 30, 2023), https://www.nbcnews.com/politics/white-house/biden-administration-actions-combat-antisemitism-college-campuses-rcna122712[https://perma.cc/7AA5-TB7J]; see also Presumptively Antisemitic: Islamophobic Tropes in the Palestine-Israel Discourse, Rutgers Univ. L. Sch. Ctr. for Sec., Race & Rts. (Nov. 2023), https://csrr.rutgers.edu/wp-content/uploads/2023/11/csrr-presumptively-antisemitic-report.pdf[https://perma.cc/XTX4-LZPQ](describing how accusations of antisemitism are used to quash pro-Palestine speech and activism). In addition to campus specific surveillance measures, in April 2024, a notorious federal mass surveillance law, Section 702, was reauthorized and expanded by Congress over outcry from many civil liberties experts and advocates. See Luke Goldstein, Pro-Israel Groups Pushed for Warrantless Spying on Protestors, American Prospect (Apr. 26, 2024), https://prospect.org/blogs-and-newsletters/tap/2024-04-26-pro-israel-groups-warrantless-spying-protesters/[perma.cc/4E45-RMPS].The final push to reauthorize the law received support from pro-Israel groups that highlighted Section 702’s importance to addressing events occurring in the wake of October 7—raising concerns the law would or could be used against students and others protesting Israel’s actions in Gaza. Id.
- 28Jake Offenhartz, Joseph B. Frederick, & Stefanie Dazio, Police Clear Pro-Palestinian Protesters from Columbia University’s Hamilton Hall, AP (Apr. 30, 2024), https://apnews.com/article/israel-palestinian-campus-student-protests-war-8b0d3a0cedb17f5e892c6ca43bbdf628[perma.cc/T3RC-3GMM];Police Make Arrests at Columbia Amid Wave of University Protests, The Wash. Post (Apr. 30, 2024), https://www.washingtonpost.com/education/2024/04/30/columbia-university-protests-palestine-news/[perma.cc/QEN5-788L].
- 29Natasha Lennard, I’ve Covered Violent Crackdowns on Protests for 15 Years. This Police Overreaction Was Unhinged, Intercept, May 1, 2024, https://theintercept.com/2024/05/01/nyc-gaza-college-protests-police-outside-agitators/ [perma.cc/QB5L-YM6V];Baragona, supra note 25.
- 30Without understanding the political economy of national security one might think, for example, that national security-inflected reactions to student-led, pro-Palestine protests are distortions of U.S. national security when, instead, they are aligned with its foundational premises. While it is beyond the scope of this Article to unpack this in detail, at minimum, these responses are in accord with the capitalist, imperialist, and racist forces that have long shaped U.S. national security, discussed in Part III.A; the ginning up of fear and the racially-framed construction of “enemies,” discussed in Part III.B; and the pervasive reach of national security into domestic civilian life, discussed in Part III.D. I explore some of these issues in a current work-in-progress examining the securitization of U.S. universities.
- 31While efforts to reimagine or rethink national security certainly are not limited to the post-9/11 period, Part II focuses only on this recent period in national security legal scholarship.
- 32Since national security legal scholarship is produced both by practitioners and academics and appears in a variety of venues—from law reviews to blogs—the sources cited in this section reflect that reality.
- 33This Article uses the labels “reformist” and “expansionist” to describe certain kinds of national security scholarship. Those terms are not mean to define or categorize the scholars and practitioners presenting those views. Nor do those terms suggest anything about the quality of the scholarship or its normative worth. Indeed, many of the pieces canvassed in this section have made important contributions to the field.
- 34E.g., Thomas Anthony Durkin, The Zealotry of Terrorism, in Reimagining the National Security State: Liberalism on the Brink 104 (Karen Greenberg ed. 2020); Oona A. Hathaway, National Security Lawyering in the Post-War Era: Can Law Constrain Power?, 68 UCLA L. Rev. 2, 11 (2021); Sudha Setty, Obama’s National Security Exceptionalism, 19 Chi.-Kent L. Rev. 91, 92–93 (2015); Harold Hongju Koh, Setting the World Right, 115 Yale L.J. 2350, 2355 (2006).
- 35E.g., Michael Glennon, Who’s Checking Whom, in Reimagining the National Security State: Liberalism on the Brink 4–5 (Karen Greenberg ed. 2020).
- 36E.g., Bruce Ackerman, The Decline and Fall of the American Republic 181–88 (2010); Frederick Schwarz & Aziz Huq, Unchecked and Unbalanced: Presidential Power in a Time of Terror 1–3 (2008); Neal Katyal, Internal Separation of Powers: Checking Today’s Most Dangerous Branch from Within, 115 Yale L.J. 2314, 2319–22 (2006).
- 37E.g., Susan Herman, Taking Liberties: The War on Terror and the Erosion of American Democracy 15 (2011); David Cole & James Dempsey, Terrorism and the Constitution 240 (2006); Erwin Chemerinsky, Civil Liberties and the War on Terrorism, 45 Washburn L.J. 1, 2 (2005).
- 38E.g., Wadie Said, Crimes of Terror: The Legal and Political Implications of Federal Terrorism Prosecutions 72 (2015); David Cole, The New McCarthyism: Repeating History in the War on Terrorism, 38 Harv. C.R-C.L. L. Rev. 1, 8–11 (2003).
- 39E.g., Jennifer Stisa Granick, American Spies: Modern Surveillance, Why You Should Care, and What to Do About It 217 (2017); Laura Donohue, The Future of Foreign Intelligence: Privacy and Surveillance in a Digital Age 159 (2016).
- 40E.g., Laura Donohue, Constitutional and Legal Challenges to the Anti-Terrorist Finance Regime, 43 Wake Forest L. Rev. 643, 661 (2008); Sahar Aziz, Note, The Law on Providing Material Support to Terrorist Organizations: The Erosion of Constitutional Rights or a Legitimate Tool for Preventing Terrorism?, 9 Tex. J. on C.L. & C.R. 45, 60–61, 78–79 (2003).
- 41E.g., David Cole, Enemy Alien: Double Standards and Constitutional Freedoms in the War on Terrorism 5 (2005); Sahar F. Aziz, Reflections on Security, Race, and Rights Twenty-Years After 9/11, 12 J. Nat’l Sec. L. & Pol’y 135, 136 (2021); Leti Volpp, The Citizen and the Terrorist, 49 UCLA L. Rev. 1575, 1576–80 (2002).
- 42See generally, e.g., Joshua L. Dratel, Reimagining the National Security State: Illusions and Constraints, in Reimagining the National Security State: Liberalism on the Brink (Karen Greenberg ed. 2020) (arguing that while climate change, income inequality, racism, and other matters should be treated as U.S. national security issues since they pose an existential threat to the United States, terrorism poses no such threat).
- 43E.g., Mary B. McCord, Criminal Law Should Treat Domestic Terrorism as the Moral Equivalent of International Terrorism, Lawfare (Aug. 21, 2017), https://www.lawfaremedia.org/article/criminal-law-should-treat-domestic-terrorism-moral-equivalent-international-terrorism[perma.cc/5NQE-S3TK].
- 44E.g., McKay Smith & Garrett Mulrain, Equi-Failure: The National Security Implications of the Equifax Hack and a Critical Proposal for Reform, 9 J. Nat’l Sec. L. & Pol’y 549, 572–77 (2018); Abraham R. Wagner & Paul Finkelman, Security, Privacy, and Technology Development: The Impact on National Security, 2 Tex. A&M L. Rev. 597, 611, 628–33 (2015).
- 45See, e.g., Steven Joseph Arango, Data Brokers: A Benefit or Peril to U.S. National Security, 20 Ohio St. Tech. L.J. 107, 133–35 (2023) (arguing that data brokers threaten national security by selling the personal data of Americans to foreign adversaries and should be subject to congressional regulation); Tom Lin, Business Warfare, 63 B.C. L. Rev. 1, 4 (2022) (highlighting “the contemporary war on business, its growing importance to corporate and national affairs, and the pressing need for better, pragmatic approaches to understanding and addressing these rising threats to our economic stability, national security, and social welfare”).
- 46E.g., Bryan Frederick & Caitlin McCulloch, Under the Weather – The National Security Risks from Climate Change Could Go Well Beyond What the U.S. Government Thinks, Just Sec. (Mar. 7, 2024), https://www.justsecurity.org/93111/under-the-weather-the-national-security-risks-from-climate-change-could-go-well-beyond-what-the-u-s-government-thinks/[perma.cc/XQ7B-KDCW];Jacob Hacker & Oona Hathaway, Universal Health Care Is a National Security Issue, Just Sec. (Mar. 12, 2020), https://www.justsecurity.org/69130/universal-health-care-is-a-national-security-issue/[perma.cc/GRG2-P6LD].
- 47E.g., Oona Hathaway, COVID-19 Shows How the U.S. Got National Security Wrong, Just Sec. (Apr. 7, 2020), https://www.justsecurity.org/69563/covid-19-shows-how-the-u-s-got-national-security-wrong/[perma.cc/XQ66-CYR8].The U.S. government already broadly considers infectious disease and climate change to be national security problems, as discussed below. White House, National Security Strategy 27–29 (2022) [hereinafter Biden National Security Strategy]; see infra note 141 and accompanying text. Some expansionist proposals have, nevertheless, suggested specific national security strategies to deal with those issues. See, e.g., Mark Nevitt, Is Climate Change a National Emergency?, 55 U.C. Davis L. Rev. 591, 593–95 (2021) (arguing that climate change should be declared a “national emergency” under the National Emergencies Act in order to address the climate crisis); Alan Rozenshtein, Digital Disease Surveillance, 70 Am. U. L. Rev. 1511, 1517 (2021) (arguing that “there is a strong prima facie case for” government-mandated disease surveillance for pandemics like COVID-19).
- 48See, e.g., Maryam Jamshidi, The Discriminatory Executive and the Rule of Law, 92 U. Colo. L. Rev. 77, 156–67 (2021) (describing various changes made to federal mass surveillance laws in response to civil liberties concerns); Jenny Martinez, Process and Substance in the War on Terror, 108 Colum. L. Rev. 1013, 1028–29 (2008) (describing various post-9/11 Supreme Court decisions which recognized that War on Terror detainees at Guantanamo Bay enjoy certain procedural rights, despite the U.S. government’s views and practices to the contrary). The Obama administration’s approach to the national security sector underscores the limited inroads civil liberties reforms have made in the field. Despite its avowed commitment to incorporating rights protections into U.S. national security practices, the Obama administration often fell very short of the mark and, instead, reproduced and even exacerbated the previous administration’s civil liberties failures. E.g., Herman, supra note 37, at 6–9; Setty, supra note 34, at 95–108.
- 49See, e.g., Kristen Eichensehr & Cathy Hwang, National Security Creep in Corporate Transactions, 123 Colum. L. Rev. 549, 551 (2023) (noting that the U.S. government has recently expanded its “national security-related review and regulation of cross-border investments to allow government intervention in more transactions than ever before”). In some sense, this is not an expansion of national security. As noted below, U.S. national security has been substantially guided by economic interests from the very beginning of the U.S. republic. See, infra, Part III.A. That being said, U.S. national security policies are increasingly targeting discrete economic and technological areas that were not previously subject to national security treatment and are, as such, in spiritual accord with expansionist proposals.
- 50See Dep’t of Commerce, Biden-Harris Administration Announces Final National Security Guardrails for CHIPS for America Incentives Program (Sept. 12, 2023), https://www.commerce.gov/news/press-releases/2023/09/biden-harris-administration-announces-final-national-security[perma.cc/77QT-DKQC](classifying certain semiconductors as critical to U.S. national security).
- 51Through a new office in the U.S. Department of Defense, known as the Office of Strategic Capital, the government is reportedly developing strategies to attract private investment to so-called critical national security technologies. Office of Strategic Capital, Dep’t Defense, https://www.cto.mil/osc/[perma.cc/E22Z-J2X8];Ken Klippenstein & Daniel Boguslaw, Pentagon Tries to Cast Bank Run as National Security Threat, Intercept (Apr. 3, 2023), https://theintercept.com/2023/04/03/silicon-valley-bank-bailout-pentagon/#:~:text=So%20when%20Silicon%20Valley%20Bank,reporting%20by%20Defense%20One%20revealed [perma.cc/7UBL-AU82].
- 52Recently, the Biden administration issued an executive order that seeks to create a regulatory framework that would restrict or otherwise prohibit U.S. persons from selling bulk sensitive personal data to “countries of concern,” among other things. White House, Executive Order on Preventing Access to Americans’ Bulk Sensitive Personal Data and United States-Government Data by Countries of Concern (Feb. 28, 2024), https://www.whitehouse.gov/briefing-room/presidential-actions/2024/02/28/executive-order-on-preventing-access-to-americans-bulk-sensitive-personal-data-and-united-states-government-related-data-by-countries-of-concern/[perma.cc/LYZ9-F78K].
- 53This is not to say that reformist and expansionist approaches always focus on the law exclusively and do not ever consider the non-legal factors informing U.S. national security. Indeed, some of these approaches critique and question the field’s basic orientation in ways that raise political economy considerations. See, e.g., Dratel, supra note 42, at 113–14 (arguing that U.S. national security prioritizes the wrong threats, like terrorism, partly because of the influence of private government contractors). That being said, these arguments often focus on very discrete slices of national security—typically, terrorism and war—and do not explore the national security state’s broader political economy.
- 54See supra note 36 and accompanying text for a brief discussion of the issue of unchecked and expansive Executive authority in U.S. national security.
- 55See Rana, Who Decides on Security?, supra note 4, at 1421 (arguing that, despite the efforts of national security reformists, “presidential and military prerogatives continue to expand even when the courts or Congress intervene” and that “the ultimate result [of these reformist efforts] . . . has been to entrench further the system of discretion and centralization”). See also Aziz Rana, National Security Law and the Originalist Myth, in Race and National Security 57 (Matiangai Sirleaf ed. 2023) (noting that reformist efforts that fail to grapple with the racial and imperialist origins of national security “offer a limited account of the reforms necessary for genuine anti-imperial change in the present”).
- 56See Jamshidi, Climate Change Is a Human Security, Not a National Security, Issue, supra note 17 at 36–37 (arguing that treating climate change as a national security issue may privilege military-oriented responses that fail to tackle the underlying causes of climate change).
- 57For example, engaging with the political economy of police violence has mid-wived transformative and radial approaches to legal scholarship on policing, including abolitionist scholarship. See, e.g., Amna Akbar, An Abolitionist Horizon for (Police) Reform, 108 Calif. L. Rev. 1781 (2020) (focusing on structuralist accounts of police violence—as being “routine . . . legal, tak[ing] many shapes . . . target[ing] people based on their race and class . . . [and] reflect[ing] and reproduc[ing] our political, economic, and social order”—in order to develop an abolitionist approach to legal scholarship on policing). There is no legitimate or sensible reason why national security should be inoculated from similar approaches.
- 58Andrew Bacevich, American Empire: the Realities and Consequences of U.S. Diplomacy 9 (2002).
- 59See id. at 8 (noting that “in practice, the myth of the ‘reluctant superpower’—Americans asserting themselves only under duress and then always for the noblest purposes—reigns today as the master narrative explaining (and justifying) the nation’s exercise of global power”).
- 60Id. at 7–8. The notion of reacting to or defending against continuous, never-ending threats is at the heart of prevailing conceptions of U.S. national security, as reflected in numerous presidential national security statements. E.g., Biden National Security Strategy, supra note 47; White House, Trump Administration, U.S. National Security Strategy (2017), https://trumpwhitehouse.archives.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf[perma.cc/QQY2-LN8N];White House, Obama Administration, U.S. National Security Strategy (2015), https://obamawhitehouse.archives.gov/sites/default/files/docs/2015_national_security_strategy_2.pdf [perma.cc/NC5V-F77N].
- 61See, e.g., Stephen Walt, The Hell of Good Intentions: America’s Foreign Policy Elite and the Decline of U.S. Primacy 14 (2018) (describing and critiquing the tendency of most post-Cold War, U.S. presidential administrations to use America’s global power to “defend and spread the traditional liberal principles of individual freedom, democratic governance, and a market-based economy”); White House, U.S. National Security Strategy (2002), https://georgewbush-whitehouse.archives.gov/nsc/nssall.html[perma.cc/Q2P5-SXS7][hereinafter “Bush 2002 National Security Strategy”] (“We will defend the peace by fighting terrorists and tyrants. We will preserve the peace by building good relations among the great powers. We will extend the peace by encouraging free and open societies on every continent.”).
- 62E.g., Samuel Huntington, Why International Primacy Matters, 17 Int’l Sec. 68, 83 (1993); John M. Owen, IV, Transnational Liberalism and U.S. Primacy, 26 Int’l Sec. 117, 150 (2001–2002).
- 63Aziz Rana, Left Internationalism in the Heart of Empire, Dissent (May 23, 2022), https://www.dissentmagazine.org/online_articles/left-internationalism-in-the-heart-of-empire/[https://perma.cc/32UA-2368];Rana, The Left’s Missing Foreign Policy, supra note 14.
- 64Walt, supra note 61, at 14; Williams, supra note 14 at 20. See generally Aziz Rana, The Two Faces of American Freedom (2010) (describing three hundred years of U.S. foreign policy as guided by a belief in America’s unique ability to bring freedom and democracy to the world). As historian William Appleman Williams argued, this notion of U.S. exceptionalism is deeply rooted in an American-version of liberalism that emerged in the nineteenth century, but took on greater force in the early twentieth century, and that understood U.S. expansion as good not only for the United States but also for the entire world. Williams, supra note 14, at 92–94.
- 65Williams, supra note 14, at 20. See Owen, Transnational Liberalism and U.S. Primacy, supra note 62, at 151 (arguing that the United States uses its global power “not to subjugate” but rather “to establish and uphold order via institutions that yield increasing benefits over time” and that, “[i]f the United States is an imperial power, the world may never have known such a benevolent empire”).
- 66These imperialist ambitions have been justified, in part, by the same ideology of American exceptionalism found in establishment discourses around U.S. national security and foreign policy. Williams, supra note 14, at 60–61.
- 67See, e.g., Bacevich, supra note 58, at 30 (observing that the American empire was not an unintended accident but rather “emerged out of particular worldview and reflected a coherent strategy . . . ”). While the term “national security” emerged in the mid-twentieth century, U.S. domestic and foreign policies have long been guided by notions of security. Laura Donohue, The Limits of National Security, 48 Am. Crim. L. Rev. 1573, 1577–79 (2011).
- 68Bacevich, supra note 58, at 25; Williams, supra note 14, at 21–23.
- 69See Ellen Meiksins Wood, Empire of Capital 129–30 (2005) (arguing that since World War II the United States has administered an economic empire “sustained by political and military hegemony” over other states); Williams, supra note 14, at 55–59 (describing U.S. foreign policy at the turn of the twentieth century as aimed at creating an “informal empire,” which uses U.S. economic and political power to dominate weaker countries, and arguing that this brand of empire became the “central feature of American foreign policy in the twentieth century”). While the United States has also engaged in territorial conquest since the closing of the U.S. continental frontier—as described below—this territorial imperialism has been the exception rather than the norm, partly because of racist fears about incorporating large non-white populations into the United States. See infra notes 94, 102, and accompanying text.
- 70Rana, supra note 64, at 13–14; see also Nikil Pal Singh, Race and America’s Long War xii (2017) (“The frontier wars, the wars of the early U.S. empire, and the twentieth century’s world wars all illuminated affinities between war making and race making. . .”); Matiangai Sirleaf, Confronting the Color Line in National Security, in Race and National Security 9 (Matiangai Sirleaf ed. 2023) (“[O]ne of the persistent ways that race manifests in national security law is in the determination of who or what counts as a ‘threat.’”).
- 71Rana, National Security Law and the Originalist Myth, supra note 55, at 60–61.
- 72Greg Grandin, The End of the Myth: from the Frontier to the Border Wall in the Mind of America 45 (2019).
- 73Id. at 29.
- 74Id. at 4–5.
- 75For some, World War II is probably one of the clearest examples of this. Bacevich, supra note 58, at 87. Others, however, disagree and describe U.S. entry into that war as primarily driven by the perennial American interest in imperial expansionism. Williams, supra note 14, at 185–200.
- 76Williams, supra note 14, at 21. While beyond the scope of this Article, there are other contradictions and tensions in how the United States has pursued its foreign and national security policies. These include a so-called “humanitarian” impulse that has “prompted [the United States] to improve the lot of less fortunate peoples.” Id. at 88. The United States has often pursued that goal by trying to “mak[e] . . . [those people] more like Americans” and has ultimately undermined their well-being by privileging the “expansion . . . of markets for American exports, and control of raw materials for American industry” over their self-determination. Id.
- 77See, e.g., Bacevich, supra note 58, at 88 (noting that “no single factor can account for every detail of U.S. policy abroad . . . [b]ut in the long view, and to a greater extent than any other factor, the pursuit of [economic] openness [and imperial expansionism] defines the essential azimuth of U.S. policy, a course set more than a century ago and followed ever since”).
- 78See, e.g., James Thuo Gathii, Beyond Color-Blind National Security Law, in Race and National Security 29 (Matiangai Sirleaf ed. 2023) (“There are very few examples of policy-related work or scholarship in the national security area that are explicitly grounded in exploring its colonial underpinnings”).
- 79Mary Ann Heiss, Bernath Lecture: The Evolution of the Imperial Idea and U.S. National Identity, 26 Diplomatic Hist. 511, 511–12 (2002). This is not to say that government insiders have not viewed the United States as an imperial power. After the end of the Cold War, scholarly experts with significant government cache, like Arthur Schlesinger, Jr., began to describe the United States as an empire, a view that became more prevalent after 9/11. Bacevich, supra note 58, at 30; Niall Ferguson, ‘We’re an Empire Now’: The United States Between Imperial Denial and Premature Decolonization, 16 Macalester Int’l 3 (2005). These views have, however, been met with much resistance and remain excluded from official government policy and discourse. Bacevich, supra note 58, at 30; Greg Grandin, Empire’s Workshop: Latin America, the United States, and the Making of an Imperial Republic 4–5 (2021); Ferguson, supra note 79, at 4.
- 80As one historian has observed, translating broad swathes of history into shorter periods is valuable since it allows for patterns and trends to be identified across time, even if it also risks oversimplifications and omissions. Heiss, supra note 79, at 514.
- 81The historical periodization of national security described here is based on Laura Donohue’s work in The Limits of National Security, supra note 67. This presentation deviates from hers, however, in emphasizing the enduring role war, imperialist expansion, and subjugation of outsiders have played throughout all four periods of national security. In particular, my retelling of national security’s historical evolution incorporates crucial insights from scholarly work steeped in the long arc of U.S. imperialism, including Aziz Rana’s Two Faces of American Freedom, supra note 64, Greg Grandin’s The End of the Myth, supra note 72, William Appleman Williams’ The Tragedy of American Diplomacy, supra note 14, and Ellen Meiksins Wood’s Empire of Capital, supra note 69.
- 82Donohue, The Limits of National Security, supra note 67, at 1587–88.
- 83Id.
- 84Grandin, The End of the Myth, supra note 72, at 40–41; Rana, supra note 64, at 12; Williams, supra note 14, at 22–23.
- 85Donohue, The Limits of National Security, supra note 67, at 1595–96.
- 86Williams, supra note 14, at 60.
- 87Deepa Kumar, Islamophobia and the Politics of Empire: 20 Years After 9/11 48 (2020).
- 88Rana, supra note 64, at 96.
- 89Donohue, The Limits of National Security, supra note 67, at 1600.
- 90Grandin, Empire’s Workshop, supra note 79, at 4. In line with the Monroe Doctrine, U.S. war-making outside the continental United States was aimed primarily at Latin America and the Caribbean during the first period of national security. Id. at 2–3.
- 91Donohue, The Limits of National Security, supra note 67, at 1630.
- 92Id. at 1648–49. See Williams, supra note 14, at 110–12 (rejecting the view that the inter-war period, between World Wars I and II, was dominated by isolationist U.S. policies and describing it, instead, as involving continued U.S. overseas political and economic expansionism).
- 93Donohue, The Limits of National Security, supra note 67, at 1618–19.
- 94Daniel Immerwahr, How to Hide an Empire: A History of the Greater United States 61–72 (2019).
- 95The decision not to continue accumulating foreign territorial holdings had to do, at least partly, with fears regarding how that territorial expansion would impact the United States’ racial makeup. Rana, supra note 64, at 281–84; see infra note 102 and accompanying text. That being said, the United States ultimately held onto many of the extra-continental holdings it accumulated in the nineteenth and early twentieth centuries, incorporating a few of those territories—specifically Hawaii and Alaska—as states, while maintaining others as non-incorporated territories. Immerwahr supra note 94, at 11.
- 96Rana, supra note 64, at 283–84; see Leo Panitch & Sam Gindin, Global Capitalism and American Empire, Socialist Reg. 11–12 (2004) (describing policies of informal non-territorial empire pursued by the U.S. government in the late nineteenth and early twentieth centuries).
- 97Rana, supra note 64, at 218; Williams, supra note 14, 27–57. As part of these efforts, the United States sought to “cast the economy and politics of the poorer, weaker, underdeveloped countries in a pro-American mold.” Id.
- 98Donohue, The Limits of National Security, supra note 67, at 1643–44.
- 99Williams, supra note 14, at 38, 86–87, 121.
- 100See Grandin, The End of the Myth, supra note 72, at 138–47 (describing how America’s expansionist wars during the second period of national security turned U.S. racism onto the foreign peoples conquered by the American military, facilitated the resurgence of the KKK, and provided Black Americans with a means for social mobilization as long as they were “willing to fight for the nation”).
- 101See Rana, supra note 64, at 189–91 (describing popular and government backlash during the first period of national security—in the mid- to late-nineteenth century—against Asian, and especially Chinese, immigrants, who were depicted as threats to white economic power and incapable of assimilating into white American identity). The Supreme Court’s decision in the Chinese Exclusion Case (130 U.S. 581 (1889))—which also came towards the end of the first period of national security and upheld a federal law excluding certain Chinese nationals from the United States on racial and economic grounds—was the first judicial decision to ground federal authority to regulate immigration in national security, where it has remained since. Matthew Lindsay, Immigration as Invasion: Sovereignty, Security, and the Origins of the Federal Immigration Power, 45 Harv. C.R.-C.L. L. Rev. 1, 40–43, 46–47 (2010). During the late nineteenth century and much of the twentieth century, federal immigration laws, which were authorized by a now pervasive national security rationale, continuously and explicitly discriminated against non-Anglo, especially Asian, immigrants for economic and racial reasons. Rana, National Security Law and the Originalist Myth, supra note 55, at 237–39; Kevin R. Johnson, Systemic Racism in U.S. Immigration Law, 97 Ind. L.J. 1455, 1460–62, 1471 (2022).
- 102Immerwahr supra note 94, at 77–87.
- 103Rana, supra note 64, at 220–26; see Donohue, The Limits of National Security, supra note 67, at 1650 (noting that during the second period of national security the U.S. government responded to labor resistance by calling on the U.S. military to respond to strikes).
- 104Grandin, The End of the Myth, supra note 72, at 129–30; Donohue, The Limits of National Security, supra note 67, at 1656–57.
- 105Donohue, The Limits of National Security, supra note 67, at 1657.
- 106Id.
- 107Id. at 1650–55, 1658–60, 1666–69.
- 108Id. at 1666–67.
- 109David Jablonsky, The State of the National Security State, 32 Parameters 4 (2002).
- 110Rana, Who Decides on Security?, supra note 4, at 1458, 1468.
- 111Wood, supra note 69, at 128–30.
- 112Bacevich, supra note 58, at 4 (emphasis added).
- 113Grandin, The End of the Myth, supra note 72, at 187.
- 114Id. at 195–96.
- 115Id. at 196.
- 116Id. at 209, 228–29. The U.S. government attempted to suppress racial and class conflicts primarily through war and the expansion of the U.S. military, which came “to serve as the country’s most effective venue for class and race mobility and distributor of social services, such as education and welfare.” Id. As historian Greg Grandin argues, the military’s ability to keep these domestic tensions in check was substantially eroded by the Vietnam War, though the U.S. government continued to use war—albeit largely unsuccessfully—as a safety valve for enduring racial and ideological conflicts inside the United States even after Vietnam. Id. at 211–12, 228–29.
- 117Donohue, The Limits of National Security, supra note 67, at 1672–80, 1703.
- 118Id. at 1687.
- 119Benjamin Schwarz, The Arcana of Empire and Dilemma of American National Security, 101 Salmagundi 182, 190 (1994). As noted by political scientist Leo Panitch and economist Sam Gindin, after World War II, the United States created an integrated political and economic system with other capitalist powers that it primarily controlled and directed. Panitch & Gindin, supra note 96, at 13. This was achieved, in part, through military alliances, like NATO, as well as through the creation of multilateral financial institutions, like the International Monetary Fund and World Trade Organization, all of which were dominated by the United States. Id. at 15, 22.
- 120See Mahmood Mamdani, Good Muslim, Bad Muslim: America, the Cold War, and the Roots of Terror 179 (2003) (noting that, since the Vietnam War, the U.S. government has increasingly relied on proxies to wage its wars).
- 121Panitch & Gindin, supra note 96, at 16–17.
- 122Donohue, The Limits of National Security, supra note 67, at 1660.
- 123Huong Vo, Note, Us Against Them: The Path to National Security Is Paved by Racism, 50 Drake L. Rev. 661, 665, 672–73 (2002).
- 124Donohue, The Limits of National Security, supra note 67, 1664. These “disparate political views” included ideologies like communism. Id.
- 125Id. at 1689–91.
- 126E.g., Deepa Kumar, Terrorcraft: Empire and the Making of the Racialised Terrorist Threat, 62 Race & Class 34, 39–40, 44 (2020); Donohue, The Limits of National Security, supra note 67, at 1691.
- 127Rana, supra note 64, at 326–27.
- 128Bacevich, supra note 58, at 77, 87; Panitch & Gindin, supra note 96, at 23–25.
- 129Wood, supra note 69, at 133. This strategy—of connecting U.S. global economic expansion with coercively-induced economic and political reforms in other countries—is not new and has been pursued by the United States since, at least, the second period of national security. Williams, supra note 14, at 62–66.
- 130Wood, supra note 69, at 134–37.
- 131Id. at 144.
- 132Id. at 165.
- 133Id. at 159, 161; Schwarz, supra note 119, at 193. U.S. military supremacy during the fourth period of national security has also bolstered the “military-industrial-complex”—a conglomerate of government bureaucrats and private defense companies that promotes militarism within U.S. policymaking and that has been central to the strength of the U.S. economy during both the third and fourth periods. Wood, supra note 69, at 166; Richard J. Barnet, The Ideology of the National Security State, 26 The Massachusetts Rev. 483, 487 (1985); Robert Knowles, Delegating National Security, 98 Wash U. L. Rev. 1117, 1123 (2021).
- 134See infra notes 271–274 and accompanying text.
- 135Kumar, supra note 87, at 148–77.
- 136Michael German, The FBI Targets a New Generation of Black Activists, Brennan Ctr. (June 26, 2020), https://www.brennancenter.org/our-work/analysis-opinion/fbi-targets-new-generation-black-activists[perma.cc/B4FU-EHD8].As part of its work, the Black Lives Matter movement has dedicated itself to challenging “U.S. imperialism, capitalism and white supremacy.” Arun Kundnani, As College Campuses Erupt in Protest, Some See a Political Transformation, New Lines Mag. (May 1, 2024), https://newlinesmag.com/argument/as-college-campuses-erupt-in-protest-some-see-a-political-transformation/[https://perma.cc/3FS6-LB9H].
- 137Animal Rights Extremism and Ecoterrorism: Hearing Before the S. Jud’y Comm., 108th Cong. (May 18, 2004) (statement of John E. Lewis, FBI Deputy Assistant Director) https://archives.fbi.gov/archives/news/testimony/animal-rights-extremism-and-ecoterrorism[https://perma.cc/WML6-SMF7].See, e.g., Natasha Lennard, How the Prosecution of Animal Rights Activists as Terrorists Foretold Today’s Criminalization of Dissent, Intercept (Dec. 12, 2019), https://theintercept.com/2019/12/12/animal-people-documentary-shac-protest-terrorism/[https://perma.cc/WA2L-UUFM](drawing links between terrorism prosecutions against animal rights activists and their threats to corporate, anti-capitalist interests protected by the U.S. government); Alleen Brown, The Green Scare: How a Movement that Never Killed Anyone Became the FBI’s No. 1 Domestic Terrorism Threat, Intercept (Mar. 23, 2019), https://theintercept.com/2019/03/23/ecoterrorism-fbi-animal-rights/[https://perma.cc/2WHE-TP6N](connecting the government’s decision to label some eco-activists as terrorists to their challenges to U.S. corporate, capitalist interests).
- 138Sam Levin, Revealed: FBI Terrorism Taskforce Investigating Standing Rock Activists, Guardian (Feb. 10, 2017), https://www.theguardian.com/us-news/2017/feb/10/standing-rock-fbi-investigation-dakota-access[perma.cc/H8WW-EC9J].See Nick Estes, Our History Is the Future: Standing Rock v. the Dakota Access Pipeline, and the Long Tradition of Indigenous Resistance 14–15, 20–21 (2016) (situating the Standing Rock protest movement within a long history of indigenous resistance against U.S. capitalism and settler-colonialism).
- 139See supra notes 24–28 and accompanying text; see also Columbia Law Students for Palestine et al., From the Encampments: Student Reflections on Protests for Palestine, LPE Proj. (May 2, 2024), https://lpeproject.org/blog/from-the-encampments-student-reflections-on-protests-for-palestine/[https://perma.cc/LY7A-6U8R](describing the challenges pro-Palestine student protestors have made to U.S. imperialism and financial capitalism).
- 140See supra note 97 and accompanying text.
- 141Donohue, The Limits of National Security, supra note 67, at 1718–23. Many of these areas had also received national security-like treatment during the third period of national security, but were not formally included in the national security architecture until the fourth period. Id. at 1738.
- 142Id. at 1723.
- 143Id. at 1723, 1736.
- 144E.g., id. at 1723–25, 1736, 1741–43. See Jamshidi, Climate Change Is a Human Security, Not a National Security, Issue, supra note 17, at 17 (“Most solutions to national security problems prominently feature a militarized or military-focused approach.”).
- 145See supra note 15.
- 146National security legal scholarship has discussed some of the issues addressed in this sub-section. See, e.g., Lisa Grow Sun & RonNell Andersen Jones, Disaggregating Disasters, 60 UCLA L. Rev. 884, 924 (2013) (examining the central role played by “enemies” in U.S. national security discourse); Donohue, The Limits of National Security, supra note 67, at 1701–02 (describing how the U.S. government has manipulated public fear to justify the size and primacy of the U.S. national security state). In particular, legal scholarship—especially in the reformist vein—has paid much attention to the role of race in identifying threats. E.g., Volpp, supra note 41, at 1592–94. This Article adds to that literature by presenting a more comprehensive picture of the political, social, and economic factors that inform threat identification and connecting those factors to a larger narrative about the foundational premises of national security.
- 147For example, as suggested by the discussion below, U.S. economic interests, fear, as well as a tendency to construct enemies can all help explain why certain states are identified as threats to U.S. national security, while others are not.
- 148See Donohue, The Limits of National Security, supra note 67, at 1752 (“[T]he most important question now driving U.S. national security is what potential threats does the United States face?”).
- 149James Wood Forsyth, Jr., The Past as Prologue: Realist Thought and the Future of American Security Policy, 5 Strategic Stud. Q. 102, 103–05 (2011).
- 150Id. at 103.
- 151Id. at 108–09.
- 152Owen, Transnational Liberalism and U.S. Primacy, supra note 62, at 120.
- 153John M. Owen, IV, Liberalism and Security, Int’l Stud. (2017).
- 154Jack Snyder, One World, Rival Theories, Foreign Pol’y (Oct. 26, 2009), https://foreignpolicy.com/2009/10/26/one-world-rival-theories/[perma.cc/5PPU-U54X].
- 155Id.
- 156See generally Christian Huggel et. al, The Existential Risk Space of Climate Change, 174 Climatic Change 8 (2022) (proposing a framework for understanding the existential threats posed by climate change from a scientific perspective).
- 157Spyros Sakellaropoulos & Panagiotis Sotiris, American Foreign Policy as Modern Imperialism: From Armed Humanitarianism to Preemptive War, 72 Sci. & Soc’y 208, 210 (2008).
- 158Id. at 211.
- 159Id. at 211–12.
- 160Id. at 219–20.
- 161Id. at 215.
- 162Id. at 213.
- 163Wood, supra note 69, at 154.
- 164Id. at 155-6; Kumar, supra note 87, at 109; Williams, supra note 14, at 173.
- 165To clarify, the point here is that the Marxist theory explains why some non-liberal, non-democratic states are treated as friends while other non-liberal, non-democratic states are treated as enemies. Those states treated as enemies—i.e., Cuba, Venezuela, and Syria—would arguably also be defined as such by other international relations theories, like the liberal theory. By contrast, those non-liberal, non-democratic states—like Saudi Arabia and the Gulf States—would not be treated as friends under that theory, but would be treated as friends under the realist theory of international relations. E.g., Bradley Bowman, Realism and Idealism: US Policy toward Saudi Arabia, from the Cold War to Today, 35 Parameters 91, 93–94 (2005). Neither theory, however, meaningfully explains both why the first group of states is treated as an enemy and why the second group is treated as a friend. The Marxist theory does that explanatory work.
- 166Donohue, The Limits of National Security, supra note 67, at 1748.
- 167It is important to note that the U.S. government defines terrorism as a categorical national security threat. In other words, it is not just terrorism on U.S. soil or terrorism backed by other states that threatens U.S. national security but rather terrorism by any state or non-state actor more broadly. E.g., Biden National Security Strategy, supra note 47, at 30. While certain individual acts of terrorism—for example, terrorist violence against the United States backed by other states—might be better explained by other theories of international relations, the classification of terrorism as a national security threat, writ large, is, I believe, best explained by the Marxist theory of international relations.
- 168Daniel Heffron, What Do Realists Think About Climate Change?, Ctr. For Geopolitics & Realism Stud., Nov. 13, 2015, at 10.
- 169When it comes to existential actor-less threats, realism potentially provides another explanation for identifying those phenomena as national security concerns. One can argue, for example, that climate change may lead to wars and other armed conflicts between states; poses the kind of existential threat to states that invasion or military attack by other states presents; and/or that climate change-related threats undermine a state’s position and strength in relation to other states. On any of these views, and notwithstanding realism’s traditional focus on threats from other states, climate change should arguably be treated as a national security concern under the realist paradigm. E.g., Heffron, What Do Realists Think About Climate Change?, supra note 168. At the same time, the realist theory of international relations has a harder time explaining why climate change is treated as a national security issue but addressed in inadequate ways. See infra note 176 and accompanying text.
- 170Donohue, The Limits of National Security, supra note 67, at 1752–53.
- 171See, e.g., Watson Institute Costs of War Project, Corporate Power, Profiteering, and the “Camo Economy,” Brown Univ., https://watson.brown.edu/costsofwar/costs/social/corporate[https://perma.cc/SE8C-U24T](“Large defense contractors have played a central role in fighting the post-9/11 wars.”).
- 172See supra note 116.
- 173This is not to say that the United States is simply the “military arm” of the capitalist classes, but rather that, in upholding the objectives of U.S. capital, the United States takes into consideration the “collective interests” of those classes. Sakellaropoulos & Sotiris, supra note 157, at 227.
- 174Jeffrey Pierre & Scott Neuman, How Decades of Disinformation About Fossil Fuel Halted U.S. Climate Policy, NPR (Oct. 27, 2021), https://www.npr.org/2021/10/27/1047583610/once-again-the-u-s-has-failed-to-take-sweeping-climate-action-heres-why[https://perma.cc/R2KE-EFSC].
- 175For example, climate change affects different communities even within the same country or region differently. Huggel et al., supra note 156, at 13. It can also be challenging to predict when and how a climate change risk will produce catastrophic effects that necessitate “transformative change.” Id. at 14; see also Pedro Mariani, Climate Change and International Cooperation, Harv. Advanced Leadership, Soc. Impact Rev. (Feb. 2, 2024), https://www.sir.advancedleadership.harvard.edu/articles/climate-change-and-international-cooperation[https://perma.cc/8JKN-PBEX](observing that the existential threat from climate change “although certain, is not as immediate, condensed or recognizable as threats that have historically aligned nations behind a common purpose”). These circumstances may lead politicians and government policymakers to address climate change will less urgency.
- 176Certain off-shoots of realist thought underscore other explanations for why states might not take steps to address climate change—suggesting, for example, that in order to gain advantages over other countries states will want to consume more fossil fuel not less. Heffron, What Do Realists Think About Climate Change?, supra note 168, at 13. Yet another realist school of thought, which takes the internal structure of states into account, posits that democratic states will necessarily do less to mitigate climate change. Id. at 16. These realist theories have a harder time, however, explaining why a state might classify climate change as a national security threat in the first place. After all, if a state sees climate change as an opportunity to gain advantages over other states, it is unlikely to view climate change as a threat. By contrast, the Marxist theory can more coherently explain why climate change is both considered a national security threat and addressed in inadequate ways.
- 177Raskin & Spero, supra note 8, at 229; Christopher J. Fettweis, Nothing to Fear but Fear Itself: The National Security Policy of the United States 98–99, 108 in The Palgrave Handbook of National Security (Michael Clarke et al. eds. 2022); Barnet, supra note 133, at 490.
- 178Fettweis, supra note 177, at 98–99, 106–07.
- 179Id. at 96. While a sense of crisis and fear may be genuinely held by some members of the U.S. government, others—including high-ranking members of the U.S. military—have strongly suggested that the government also systematically stokes fear in order to manipulate the American public. Williams, supra note 14, at 273 (quoting U.S. General Douglas MacArthur—one of the most prominent American military figures of the 20th century—as observing that “[o]ur government has kept us in a perpetual state of fear—kept us in a continuous stampede of patriotic fervor—with the cry of a grave national emergency. . . . Yet, in retrospect, these disasters seem never to have happened, seem never to have been quite real”).
- 180See generally Fettweis, supra note 177.
- 181Id. at 108.
- 182Id.
- 183Id.
- 184Id. at 109–10.
- 185Donohue, The Limits of National Security, supra note 67, at 1701; see also Barnet, supra note 133, at 489 (“The national security state structures [after World War II] could not accomplish their task unless the American people were socialized to accept the idea that the only peace possible is a form of permanent war.”).
- 186Barnet, supra note 133, at 495.
- 187See generally Erik Luna, The Bin Laden Exception, 106 Nw. U. L. Rev. 1489 (2012) (arguing that false claims the United States is existentially threatened by terrorism, which have been made by government actors and others, have helped legitimize and justify violations of the Fourth Amendment by the Transportation Security Administration’s search-and-seizure regime at U.S. airports).
- 188See, e.g., Mark Neocleous, War Power, Police Power 192–93, 198, 209–10 (2014) (arguing that fear and anxiety are used by states, including the United States, to justify a permanent war footing in the service of capitalist accumulation); Williams, supra note 14, at 239–40 (arguing that after 1945 “a good many men” within the U.S. political leadership thought it was “necessary to ‘scare the hell out of the American people’ in order to win their active approval and support for the kind of vigorous anti-Soviet policy . . . [they] wanted,” a policy which focused on the expansion of U.S. economic and political influence around the globe); Schwarz, supra note 119, at 191 (arguing that, during the Cold War, the United States used the image of the Soviet Union to frighten Americans into accepting expansionist economic policies on the international plane).
- 189Barnet, supra note 133, at 491.
- 190David Rousseau, Identifying Threats and Threatening Identities: The Social Construction of Realism and Liberalism 4 (2006).
- 191Id. at 12.
- 192Ayse Zarakol, What Makes Terrorism Modern? Terrorism, Legitimacy, and the International System, 31 Rev. Int’l Stud. 2311, 2314 (2011).
- 193Kumar, supra note 87, at 100; Williams, supra note 14, at 173.
- 194According to William Appleman Williams, the United States is particularly prone to defining its enemies as “unnatural men . . . beyond the pale and almost, if not wholly, beyond redemption.” Williams, supra note 14, at 94. As Williams explained it, this tendency is rooted in the exceptionalist view of the United States as a moral force that improves and makes the entire world better. Id. at 93–94.
- 195Rana, National Security Law and the Originalist Myth, supra note 55, at 68.
- 196See Singh, supra note 70, at 31 (“American war craft remains perennially bound to American racecraft as the politics of fear and lineaments of enemies without and within morph together . . .”).
- 197See Kumar, Terrorcraft: Empire and the Making of the Racialised Terrorist Threat, supra note 126, at 163–64 (noting that the FBI engages in entrapment policies primarily targeting Muslim and other marginalized communities and that it uses this work of “creating terrorists as a way to justify the billions of dollars spent on counterterrorism activity”).
- 198Arun Kundnani, Islamophobia: Lay Ideology of U.S Empire, https://www.kundnani.org/wp-content/uploads/Kundnani-Islamophobia-as-lay-ideology-of-US-empire.pdf[https://perma.cc/Z3RK-SPM6].
- 199Though beyond the scope of this Article, private parties participate in national security in other ways as well. For example, certain national security programs obligate private persons to participate in national security work, without pay and potentially against their will. See, e.g., Huyen Pham, The Private Enforcement of Immigration Laws, 96 Geo. L.J. 777, 782 (2008) (“Private enforcement [of immigration laws] occurs when private parties, acting under a requirement of law, check for legal immigration status before granting applicants access to a restricted benefit.”). In other cases, private companies sell access to information or other technologies to the government, which is vital to its national security work. Jon D. Michaels, All the President’s Spies: Private-Public Intelligence Partnerships in the War on Terror, 96 Calif. L. Rev. 901, 917–19 (2008).
- 200E.g., Laura Dickinson, Outsourcing War and Peace: Preserving Public Values in a World of Privatized Foreign Affairs (2011); infra notes 205–211 and accompanying text.
- 201As reflected in the sources cited in this sub-section, my own work has largely focused on examining the role of private volunteers in U.S. national security.
- 202See, e.g., Michaels, All the President’s Spies: Private-Public Intelligence Partnerships in the War on Terror, supra note 199, at 910–18 (listing examples of various public-private partnerships that have been critical to the U.S. government’s intelligence gathering since 9/11).
- 203E.g., Jon D. Michaels, Constitutional Coup: Privatization’s Threat to the American Republic 114 (2017).
- 204Jody Freeman & Martha Minow, Reframing the Outsourcing Debate, in Government by Contract: Outsourcing and American Democracy 1, 2 (Jody Freeman & Martha Minow eds., 2009).
- 205Homeland Security Act of 2002, Pub. L. 107-296, 116 Stat. 2135 (Nov. 25, 2002).
- 206For example, the Intelligence Reform and Terrorism Prevention Act of 2004 created a new Director of National Intelligence to coordinate the government’s various intelligence agencies, as well as the National Counterterrorism Center, which is responsible for national and international counterterrorism efforts, among other things. Pub. L. 108-458, 118 Stat. 3638 (Dec. 17, 2004).
- 207Michaels, Constitutional Coup, supra note 203, at 114.
- 208See Dana Priest & William Arkin, National Security Inc., Wash. Post (July 20, 2010), https://www.washingtonpost.com/investigations/top-secret-america/2010/07/20/national-security-inc/[https://perma.cc/H92U-UANM](describing the U.S. government’s use of private contractors for intelligence, counterterrorism, and military-related activities).
- 209Michaels, Constitutional Coup, supra note 203, at 124.
- 210Paul R. Verkuil, Outsourcing Sovereignty: Why Privatization of Government Functions Threatens Democracy and What We Can Do About It 2 (2007); Martha Minow, Outsourcing Power: How Privatizing Military Efforts Challenges Accountability, Professionalism, and Democracy, 46 B.C. L. Rev. 989, 994–96, 999–1000 (2005).
- 211Jon D. Michaels, Deputizing Homeland Security, 88 Tex. L. Rev. 1435, 1441 (2010).
- 212Maryam Jamshidi, The Private Enforcement of National Security, 108 Cornell L. Rev. 739, 788–89 (2023).
- 213See generally Michaels, Deputizing Homeland Security, supra note 211 (describing various government programs that broadly encourage private parties to voluntarily engage in surveillance and intelligence gathering on the U.S. government’s behalf); Amna Akbar, National Security’s Broken Windows, 62 UCLA L. Rev. 834 (2015) (discussing efforts to recruit Muslims in the United States to surveil and report on “radicalized” members of their communities).
- 214Michaels, All the President’s Spies: Private-Public Intelligence Partnerships in the War on Terror, supra note 199, at 910–18.
- 215See generally Jamshidi, The Private Enforcement of National Security, supra note 212 (discussing how private parties use federal civil terrorism statutes to voluntarily enforce some of the government’s terrorism and sanctions-related national security policies); see also Maryam Jamshidi, How Private Actors Are Impacting U.S. Economic Sanctions, 15 Harv. Nat’l Sec. J. 119 (exploring the different ways private parties shape, influence, and enforce U.S. economic sanctions).
- 216Jamshidi, The Private Enforcement of National Security, supra note 212, at 792; Michaels, Deputizing Homeland Security, supra note 211, at 1438.
- 217Jamshidi, The Private Enforcement of National Security, supra note 212, at 801.
- 218Jamshidi, How Private Actors Are Impacting U.S. Economic Sanctions, supra note 215, at 136–40.
- 219Id. at 192–96.
- 220E.g., id. at 154–79.
- 221Jamshidi, The Private Enforcement of National Security, supra note 212, at 742–43. Private contractors, which directly assume the government’s role in enforcing national security policies and practices that target marginalized communities, self-evidently further corrosive forms of state power.
- 222See Maryam Jamshidi, Instruments of Dehumanization, Bos. Rev. (Dec. 9, 2023), https://www.bostonreview.net/articles/instruments-of-dehumanization/[https://perma.cc/GS42-K3V2](describing how federal civil terrorism statutes—which are part of national security’s private enforcement—have been consciously and intentionally used by private litigants to subordinate Palestinians); Darryl Li, Terrorism Torts and the Right to Colonize, LPE Proj. (Mar. 13, 2023), https://lpeproject.org/blog/terrorism-torts-and-the-right-to-colonize/ [https://perma.cc/9SFM-B3V8] (same).
- 223See supra notes 190–192 and accompanying text. Working for the government as a private national security contractor also usually necessitates that the contractor be a “friend” to the United States. Indeed, most of those positions require obtaining and maintaining a federal security clearance that is aimed, in part, at determining whether the person is “reliable, trustworthy, of good conduct and character, and loyal to the U.S.” Maj. Andrew Woodbury, Continuous Evaluation and Credit Reports: Ensuring Fairness in Current Security Clearance, 82 A.F. L. Rev. 224, 227, 229 (2022).
- 224See, e.g., Akbar, National Security’s Broken Windows, supra note 213, at 883–85 (noting that American Muslims who participate in the U.S. government’s efforts to identify “radical” Muslims in their communities must effectively acquiesce and be loyal to U.S. interests). See also Mamdani, supra note 120, at 15 (coining the phrase “good muslim, bad muslim” to denote those Muslims who are considered friends of U.S. empire and those who are considered enemies).
- 225Akbar, National Security’s Broken Windows, supra note 213, at 885, 890, 895–96.
- 226See, e.g., supra note 19 and accompanying text.
- 227Bernard Harcourt, The Counterrevolution: How Our Government Went to War Against Its Own Citizens 213 (2018).
- 228Id. at 214–15.
- 229Id. at 222.
- 230See infra note 239.
- 231Harcourt, supra note 227, at 227.
- 232Neocleous, supra note 188, at 46.
- 233Jamshidi, The Discriminatory Executive and the Rule of Law, supra note 48, at 79–84.
- 234David Dyzenhaus, Hobbes and the Legitimacy of Law, 20 Law & Phil. 461, 461–62 (2001).
- 235Jamshidi, The Discriminatory Executive and the Rule of Law, supra note 48, at 92–95.
- 236Id. at 94.
- 237Id. at 94–95.
- 238See id. at 92–93 (describing the requirements of the formalist rule of law). One might argue that the secrecy surrounding many national security projects—including secret laws—violates some of these formalist requirements. While this Article cannot consider this issue in any depth, it is worth noting that secrecy, in and of itself, does not necessarily violate formalist conceptions of law. Id. at 164 n. 510.
- 239Noura Erakat, Justice for Some: Law and the Question of Palestine 19 (2019).
- 240This is another reason why legal scholars who wish to radically reimagine the field of national security should develop relationships and work with the social movements focused on developing these kinds of political visions. See infra Part III.G.
- 241As used here, “regulation” is defined as “government intervention in the private domain.” Robert Knowles, Warfare as Regulation, 74 Wash. & Lee L. Rev. 1953, 1963 (2017).
- 242Id. at 1982–83; Council on Foreign Rels., What Is the Relationship Between Domestic and Foreign Policy? (June 29, 2023), https://education.cfr.org/learn/reading/what-relationship-between-domestic-and-foreign-policy[https://perma.cc/3T6J-PXU3].
- 243E.g., Aslı Bâli, Extending the Logic of Defund to America’s Endless Wars, in Race and National Security 145–69 (Matiangai Sirleaf ed. 2023); Wadie Said, Law Enforcement in the American Security State, 2019 Wis. L. Rev. 819, 823–24 (2019).
- 244See generally Mary L. Dudziak, War Time: An Idea, Its History, Its Consequences (2012) (challenging assumptions about the temporariness of wartime and demonstrating that wartime is an enduring condition in the United States).
- 245The term “police” is not used here to mean the police, but instead references the state’s general powers to regulate and control actors and activities inside its borders.
- 246This connection between domestic policing and war also comports with the history described in Part III.A., in particular, with the tendency for U.S. national security and foreign policy to be driven by domestic problems and concerns.
- 247Some legal scholars have started to explore the regulatory aspects of U.S. warfare—that is, warfare as something that not only needs to be regulated, but also as a form of regulation. E.g., Knowles, Warfare as Regulation, supra note 242.
- 248Cf., Rana, Left Internationalism in the Heart of Empire, supra note 63 (insisting that U.S. foreign policies and U.S. domestic policies, including economic and social policies, are deeply connected and that reimagining U.S. foreign policy, from a left perspective, requires making that linkage).
- 249See, e.g., Chris Hedges & Laila Al-Arian, Collateral Damage: America’s War Against Iraqi Civilians (2009) (detailing the control U.S. troops exercised, through security checkpoints and other mechanisms, over the daily lives of Iraqi civilians). Most disturbingly, this control included the ability to kill Iraqi civilians at will. Emma Slater, Hundreds of Civilians Gunned Down at Checkpoints, Bureau of Investigative Journalism (May 23, 2011), https://www.thebureauinvestigates.com/stories/2011-05-23/hundreds-of-civilians-gunned-down-at-checkpoints/#:~:text=The%20US%20war%20logs%20show,than%20not%2C%20that%20got%20killed.[https://perma.cc/V369-WZP7].
- 250See, e.g., Margaret Hu, Militarized Biometric Data Colonialism, in Race and National Security 140–43 (Matiangai Sirleaf ed. 2023) (discussing U.S. government practices of biometric surveillance on “almost the entire Afghan population” during the U.S. occupation of Afghanistan); Enduring Freedom: Abuses by U.S. Forces in Afghanistan, Hum. Rts. Watch (Mar. 8, 2004), https://www.hrw.org/report/2004/03/08/enduring-freedom/abuses-us-forces-afghanistan[https://perma.cc/U3EZ-2K43](detailing the U.S. military’s system of arrest and detention—used against both combatants and civilians—as part of its occupation of Afghanistan); Lynzy Billing, The Night Raids, ProPublica (Dec. 15, 2022), https://www.propublica.org/article/afghanistan-night-raids-zero-units-lynzy-billing[https://perma.cc/L2G9-ACRC](detailing CIA-backed night raids in Afghanistan during the U.S. occupation that resulted in the killing of hundreds of Afghan civilians).
- 251See Patrick Keenan, Drones and Civilians: Emerging Evidence of the Terrorizing Effects of the U.S. Drone Programs, 20 Santa Clara J. Int’l L. 1, 3–7 (2021) (arguing that U.S. drone programs terrorize civilians because of their persistent monitoring and surveillance, as well as the fear they generate among the surveilled that “their innocent movements . . . will lead to them being targeted by a missile”).
- 252See Jamshidi, How Private Actors Are Impacting U.S. Economic Sanctions, supra note 215, at 123–24, 192–94 (demonstrating how economic sanctions regulate and control the ability of persons to engage in commercial and financial transactions and otherwise deprive people in sanctioned countries of basic resources and employment opportunities). For more on the regulatory function of U.S. national security practices like administrative detention, drone strikes, and economic sanctions see Elena Chachko, Administrative National Security, 108 Geo. L. J. 1063 (2020).
- 253While this section mostly focuses on federal domestic national security activities, states have also increasingly invoked national security to regulate activities within their borders. E.g., Annie Erling Gofus, Florida’s New Real Estate Laws: Restrictions on Property Ownership by Foreign Nationals, Werc (Oct. 31, 2023), https://web.archive.org/web/20240302073747/https://www.worldwideerc.org/news/public-policy/florida-s-new-real-estate-laws-restrictions-on-property-ownership-by-foreign-nationals[https://perma.cc/8ZNM-8WAS].
- 254Said, Crimes of Terror, supra note 38, at 73–105.
- 255Norman Abrams, The Material Support Terrorism Offenses: Perspectives Derived from the (Early) Model Penal Code, 1 J. Nat’l Sec. L. & Pol’y 5, 5–7 (2005).
- 256Dru Stevenson, Effect of the National Security Paradigm on Criminal Law, 22 Stan. L. & Pol’y Rev. 129, 131 (2011).
- 257See supra note 101 and accompanying text.
- 258Shoba Sivaprasad Wadhia, National Security, Immigration and the Muslims Bans, 75 Wash. & Lee L. Rev. 1475, 1478–82 (2018).
- 259See generally Shoba Sivaprasad Wadhia, Is Immigration Law National Security Law?, 66 Emory L. J. 669 (2017) (examining how U.S. national security concerns shaped immigration policies during the 2010s).
- 260Granick, supra note 39, at 192–216.
- 261See Luna, supra note 187 (demonstrating how counter-terrorism priorities have impacted U.S. airport security).
- 262Under the Health Insurance Portability and Privacy Act of 1996 (HIPAA)—which creates a national standard to protect people’s sensitive medical information—a “covered entity may disclose protected health information to authorized federal officials for the conduct of lawful intelligence, counter-intelligence, and other national security activities” under the National Security Act and implementing authority. 45 C.F.R. § 164.512(k)(2).
- 263Arthur Culvahouse, Jr., A Practical Guide to International Sanctions Law and Lore: Mamas, Don’t Let Your Children Grow Up to Be Sanctions Lawyers, 32 Hous. J. Int’l L. 587, 592–93 (2010).
- 264See Eichensehr & Hwang, supra note 49, at 560–82 (describing the U.S. government’s practice of conducting national security reviews of certain inbound investments into the United States by foreign individuals and entities and outbound investments by U.S. persons abroad); Kevin Tang, The Patriot Act and Foreign Banking: Section III’s Role in Foreign Policy, 39 Rev. Banking & Fin. L. 135, 136–38 (2021) (describing how concerns about terrorism financing after 9/11 led to new federal laws requiring U.S. financial institutions to take certain measures with respect to any foreign jurisdiction, financial institution, or international transaction designated by the U.S. Treasury Secretary as a “primary money laundering concern”); Vilas Ramachandran, A Regulatory Back Door: General Prohibition Ten and America’s National Security, 20 Santa Clara J. Int’l L. 31, 36–46 (2022) (providing an overview of U.S. export control laws and noting that “[w]hen Congress deliberated the United States’ export control regime, its main goal was to secure America’s national security and further the nation’s interests around the world”).
- 265See Saptarishi Bandopadhyay & Joshua Coene, Disaster Risk in the Carceral State, 42 Stan. Envt’l L.J. 171, 208–10 (2023) (describing the Federal Emergency Management Agency, which is responsible for federal disaster management, as assuming a national security footing from its inception); Grow Sun & Andersen Jones, supra note 146, at 910–21 (describing various state and federal actions, rhetoric, and policies applying a war-framing to non-war natural disasters in the United States).
- 266See Mark Nevitt, Climate Security Insights from the COVID-19 Response, 98 Ind. L.J. 815, 819 (2023) (“[T]here is a growing understanding that the military will be called upon to respond to . . . climate-exacerbated natural disasters”).
- 267See id. at 819–20, 836–38 (describing various national security-based authorities used by the government to respond to COVID-19 and noting that the U.S. military played an “outsized role” in leading the government’s response).
- 268Neocleous, supra note 188, at 5.
- 269Id. at 13.
- 270Id. at 31–32, 175.
- 271Id. at 14.
- 272Of course, there are also individual national security scholars who are outliers and/or are actively challenging the national security status quo in radical ways.
- 273See Kumar, Terrorcraft: Empire and the Making of the Racialised Terrorist Threat, supra note 126, at 65 (noting the important contributions think tanks make to U.S. national security policy).
- 274Bacevich, supra note 58, at 8.
- 275See Antony Anghie, Imperialism, Sovereignty, and the Making of International Law 28–31 (2007) (discussing the work of a seminal Western scholar of international law and the ways it legitimized Spain’s conquest of the Americas); Kumar, supra note 87, at 35–36 (2020) (describing how scholarly production was used to further the interests of European colonialism in the nineteenth century).
- 276Kumar, supra note 87, at 34.
- 277Barnet, supra note 133, at 497.
- 278Kumar, supra note 87, at 61 (quoting international relations scholar Inderjeet Parmar).
- 279Within the U.S. national security sector, the default assumption is that experts within the Executive Branch—often with specialized military or security-related skills—are the ones best positioned to define U.S. national security and decide what constitutes a national security threat. Rana, Who Decides on Security?, supra note 4, at 1423–24. Much like many of the members of national security academia, however, these national security experts are substantially invested in maintaining the status quo. Glennon, National Security and Double Government, supra note 20.
- 280Amna Akbar, Sameer Ashar & Jocelyn Simonson, Movement Law, 73 Stan. L. Rev. 821, 824, 827 (2021).
- 281Id. at 824–25.
- 282Abolishing the War on Terror & Building Communities of Care: A Grassroots Policy Agenda for the Biden-Harris Administration and 117th Congress (2021) [hereinafter Abolishing the War on Terror]. I discuss the agenda at length in Whose Security Matters?, 116 AJIL Unbound 236 (2022).
- 283See, e.g. Akbar, An Abolitionist Horizon for (Police) Reform, supra note 57, for a description of abolitionist approaches to policing.
- 284The authors of Abolishing the War on Terror include the following organizations: Justice for Muslims Collective (since renamed Muslims for Just Futures), HEART Women & Girls, Vigilante Love, the Partnership to End Gendered Islamophobia, Project South, the Partnership for the Advancement of New Americans, and the U.S. Campaign for Palestinian Rights. Abolishing the War on Terror, supra note 282, at 1.
- 285Id.
- 286Id. at 2.
- 287Id. at 10, 11, 15.
- 288Jamshidi, Whose Security Matters?, supra note 282, at 240.
- 289Abolishing the War on Terror, supra note 282, at 33–50.
- 290Id. at 15.
- 291Some legal scholars have also started embracing abolitionist approaches to U.S. national security. See, e.g., Bâli, supra note 243 (calling for the defunding of the “military-industrial-policing complex” that sustains the U.S. national security state); Matiangai Sirleaf, Reforming, Transforming, and Radically Imagining National Security, in Race and National Security 251–63 (Matiangai Sirleaf ed. 2023) (advocating an abolitionist vision of national security). I am among these scholars. Maryam Jamshidi, Bringing Abolition to National Security, Just Sec. (Aug. 27, 2020), https://www.justsecurity.org/72160/bringing-abolition-to-national-security/[https://perma.cc/43XC-X625].