NewYorkUniversity
LawReview

Notes

2018

After al-Qaida: A Prospective Counterterrorism AUMF

John Wynne

In the wake of the September 11th attacks, Congress passed the Authorization for Use of Military Force (2001 AUMF), which authorized the President to use military force against the responsible parties, namely al-Qaida and the Taliban. However, with al-Qaida now diminished, the 2001 AUMF, due to its explicit 9/11 focus, cannot continue to credibly provide the legal foundation for U.S. counterterrorism strategy against threats posed by new terror organizations. As other legal options fail either to restrain unilateral executive branch action or to legitimize the use of force, enacting a new counterterrorism-focused authorization for use of military force (AUMF) is the best method for enabling, while still controlling, the necessary use of military force against terrorist groups. Part I of this Note will examine the ways in which the 2001 AUMF, the President’s Article II powers, and non-military options are alone each insufficient to effectively address new terror threats. Part II will demonstrate why a new statutory AUMF is the best path forward by analyzing the strengths of the 2001 AUMF in both enabling and constraining the use of force. Part III will outline a prospective counterterrorism-specific AUMF, designed to offer the executive branch sufficient flexibility to meet new terrorist threats early, but, through statutory restrictions and increased congressional oversight, also provide clear and improved limitations on the unilateral presidential use of force.

The First Amendment and Regulatory Responses to Workplace Sexual Misconduct: Clarifying the Treatment of Compelled Disclosure Regimes

Elizabeth A. Aronson

In response to revelations about the pervasiveness of workplace sexual misconduct, legislators have proposed a variety of regulatory solutions. Among those responses are proposals to require companies to disclose information related to the settlement of sexual misconduct allegations made by employees. This proposal merits special attention because it conceivably compels speech, making it vulnerable to a First Amendment challenge. While such a claim appears surprising, recent developments in First Amendment law have taken the idea from laughable to plausible. This Note situates the proposals in light of recent First Amendment challenges to compelled disclosure regimes, using the proposals as a lens to examine how courts have addressed such challenges. The analysis demonstrates the need for greater clarity in the treatment of information-forcing regulations. A suggested approach is for courts to explicitly recognize regulatory exceptions to compelled speech claims when the compelled speech is only incidental to the broader purpose of the regulation.

Jurisdiction, Exhaustion of Administrative Remedies, and Constitutional Claims

Peter A. Devlin

The doctrine of exhaustion of administrative remedies says that a person challenging an agency decision must first pursue the agency’s available remedies before seeking judicial review. It was created by courts in order to promote an efficient justice system and autonomous administrative state. Congress has since written exhaustion requirements into many statutes to ensure and guide its application. Consequently, a court interpreting one of these statutory versions must first decide whether it is a jurisdictional rule or not. The fallout from this decision is the topic of this Note. By definition, jurisdictional rules are rigid: Courts may not create exceptions to them, parties may not waive or forfeit them, and they will loom over the proceedings from start to finish. Faced with a jurisdictional exhaustion requirement, courts have had to choose between diluting the concept of jurisdiction and allowing injustice. In this Note, I look for a way out of this tradeoff. I argue that statutory exhaustion requirements are neither jurisdictional nor non-jurisdictional rules, but rather mandatory rules with a particular set of effects on courts and parties. Courts, for example, may not apply equitable exceptions to statutory exhaustion requirements, but agencies may waive or forfeit them. I define this “mandatory” exhaustion by looking to case law, jurisdiction theory, constitutional structure, and the purposes of exhaustion. I also develop an exception for constitutional claims that arise outside of an agency’s proceedings. This exception helps avoid the threat to separation of powers that requiring exhaustion for such claims would create. As a result, if courts used mandatory exhaustion then they would be empowered to avoid injustice without creating a conceptual mess. Commentators have suggested that exhaustion requirements might be mandatory in nature, and the Second Circuit has treated them as such. But neither has provided much guidance on what that means. I try to fill in that gap by developing a descriptive and normative case for categorizing them as mandatory rules.

Holding the EPA Accountable: Judicial Construction of Environmental Citizen Suit Provisions

Katherine A. Rouse

What happens when a presidential administration fails or refuses to properly administer our nation’s environmental laws? Thanks to the design of our federal environmental statutes, American citizens are armed with a valuable legal tool to hold the Environmental Protection Agency (EPA) accountable: the citizen suit. Environmental citizen suits allow private citizens to sue the EPA to require it to carry out its statutory duties, and can be a valuable mechanism in the face of a presidential administration unsympathetic to environmental protection. Because citizen suit provisions allow citizens to sue the EPA Administrator for failing to perform an action or duty that is nondiscretionary under the statute, the permissibility of lawsuits frequently turns on judicial interpretation of the term “nondiscretionary duty.” There is currently a split across the federal courts as to how to construe this term. In fact, the case law on this topic has become somewhat muddled, with disparities arising among district courts and few courts of appeal ruling conclusively on the issue. Some courts have narrowed the term, thereby limiting opportunities for citizen suits. A primary disagreement is whether the presence of the word “shall” in a statutory provision is sufficient to impose a nondiscretionary duty or whether more is required. Some courts have determined that a duty is discretionary unless the provision also includes a “date-certain” deadline, requiring the Administrator to perform the prescribed action by a specific date that appears within that part of the statute. Other courts have resisted adopting a bright-line rule requiring a date-certain deadline before imposing a nondiscretionary duty on the Administrator. The Supreme Court has not spoken on this date-certain deadline rule. This Note will explore how courts have interpreted the term nondiscretionary duty in environmental citizen suit provisions. This Note argues that the federal judiciary as a whole should abandon the date-certain deadline rule and side with courts that construe nondiscretionary duty more broadly. This reading can be supported legally, and will ensure that citizens are able to sue to compel EPA action even when a presidential administration fails to carry out important environmental laws and regulations.

Is Selling Malware a Federal Crime?

Marcelo Triana

Congress enacted the Computer Fraud and Abuse Act (CFAA) to impose criminal penalties for a variety of computer misuse offenses. One provision, 18 U.S.C. §1030(a)(5)(A), criminalizes hacking and the use of malicious software (“malware”) by making it a crime to transmit code (i.e., malware) with “intent to cause damage.” Today, § 1030(a)(5)(A) fails to adequately police the black market for malware. The United States Department of Justice has recently used the statute to combat these markets by prosecuting hackers who sold malware. This Note argues that § 1030(a)(5)(A) is ill suited to combat the sale of malware for two reasons. First, certain types of malware do not fit under the CFAA’s definition of “damage.” Second, selling malware does not necessarily satisfy the statute’s “intent” element. Ultimately, the black market for malware needs to be policed, and Congress must amend the CFAA’s outdated elements to deal with the dangers of malware attacks on our increasingly connected society.

Unsafe Havens: Improving Third-Party Accreditation of Wildlife Sanctuaries

Simon J. Williams

A number of animal “sanctuaries” and “rescue centers” operate across the United States and, in spite of their sympathetic names that attract visitors and donors, in fact neglect their animals and commit egregious violations of the Animal Welfare Act (AWA). Since United States Department of Agriculture (USDA) enforcement of the AWA is extremely weak, third parties have begun certifying and accrediting different facilities of captive animal care. This Note addresses the work of such third-party accreditors and argues that, while they can indeed play a valuable role in regulating wildlife sanctuaries and educating the public, they can only achieve these goals effectively through a more detailed and comprehensive accreditation framework. Part I gives relevant background on the AWA and identifies how its ambiguities and enforcement deficit create informational and regulatory gaps in which third-party accreditors can take meaningful action. Part II analyzes the accreditors themselves, revealing the limited extent of their coverage, the ideological rifts that divide them, and important contrasts in their processes and standards for accreditation. Part III turns to potential solutions for addressing this fractured landscape. It proposes a tiered and detailed accreditation system that more effectively communicates relevant information to prospective visitors and donors. It also evaluates and critiques several alternative solutions.

The Missing Structural Debate: Reforming Disclosure of Online Political Communications

Pichaya P. Winichakul

The Federal Election Commission (FEC), the nation’s campaign finance regulator, is charged with administering one of America’s fundamental anti-corruption measures: disclosure and disclaimer requirements for political communications. The FEC has come under attack for failing to enforce its disclosure laws against the Internet Research Agency, the Russian-based organization recently indicted for meddling in American elections through use of online political propaganda. Had the FEC properly enforced the disclosure laws, it could have armed the millions of Americans who viewed Internet Research Agency advertisements with critical information to take to the polls. Efforts to address this campaign finance failure have coalesced around the Honest Ads Act, a bill that proposes substantive changes to the campaign finance disclosure rules. This Note argues that the Honest Ads Act mischaracterizes the problem that led to the FEC’s regulatory failure, and offers another explanation: the structural problems that have led to agency inaction and capture. This Note explores FEC inaction and capture and begins to develop a legislative alternative to the Honest Ads Act.

Termination Rights in the Music Industry: Revolutionary or Ripe for Reform?

Chase A. Brennick

When Congress passed the Copyright Act of 1976, it enacted Section 203, which allows authors to terminate transfers of the copyright in their works thirty-five years after the transfer. Congress intended this to be the author’s “second chance” after having made a disadvantageous first deal, either due to a lack of bargaining power or an inability to predict the work’s future value. Within the music industry, the impact of Section 203 has been contested, with some arguing that it will fundamentally shift the balance of power between recording artists and songwriters (the authors) and record labels and music publishers (the transferees), and others expecting that the provision will provoke contentious litigation of Section 203’s statutory exceptions. Because the first works reached termination eligibility in 2013, the effects of Section 203 remain unclear. In this Note, I argue that, even if an author circumvents the statutory exceptions, Section 203 is largely ineffective because several factors prevent a clean severance of the relationship between the author and transferee. Complications related to jointly authored works, the jurisdictional limitation to the United States, and contract provisions that survive post-termination create a situation where the author may regain his or her U.S. copyrights but will remain tethered to the transferee. Although an author could theoretically self- administer his or her U.S. copyrights or transfer these rights to a new transferee, the economically rational option is to retransfer the copyrights to the original transferee. This result precludes any significant impact on the music industry’s power dynamics, despite Congress’s (and the authors’) initial hopes that Section 203 would be a tool for change.

NITs a No-Go: Disclosing Exploits and Technological Vulnerabilities in Criminal Cases

Rupinder K. Garcha

Network investigative techniques (NITs) are law enforcement tools that allow the government to hack into targeted computers by exploiting technological vulnerabilities. NITs have succeeded in identifying and locating criminal actors operating on the Dark Web where traditional investigative techniques have failed. They play a critical role in the investigation of cybercrime and in the national security sphere. But disclosure of a NIT’s code can render it useless and jeopardize government operations that rely on that code. In numerous federal cases, criminal defendants have sought access to NIT code, and courts have had to decide whether the government must disclose the code. The government’s interest in confidentiality is inherently at tension with criminal defendants’ right to discovery and information material to their defense.
In order to make informed decisions about disclosure, courts must be cognizant of the equities at stake and understand technical details about NITs. Courts can better equip themselves by holding ex parte and in camera proceedings, and appointing experts to augment their understanding of technical issues. These procedures can ensure that the government is held accountable, defendants’ rights are protected, and NIT code is preserved. As the Dark Web expands, cybercrime is likely to become more pervasive, and criminal actors will devise more sophisticated means of anonymizing their presence online. Law enforcement will have to respond creatively and courts must be prepared to tackle novel issues that straddle technology and law.

To Seize the Initiative: Assessing Constitutional Due Process Challenges to the Defend Trade Secrets Act’s Ex Parte Seizure Provision

Stephen D. Levandoski

In an effort to protect innovation and increase trade secret enforcement, Congress passed the Defend Trade Secrets Act in 2016. The law contains an ex parte seizure provision that provides for the seizure of property in order to prevent the theft or transmission of a trade secret. This Note is the first to argue that the ex parte seizure provision raises serious constitutional due process concerns. It proceeds by framing the seizure provision within its historical and legislative context, identifying infirmities in the provision through the lens of due process, and addressing larger practical and policy implications. The potentially widespread and lasting effects of the seizure provision on employee mobility, innovation, and competition underscore the importance of eliminating the provision or severely limiting its scope.