{"id":5564,"date":"2022-06-08T00:04:22","date_gmt":"2022-06-08T04:04:22","guid":{"rendered":"https:\/\/journals.law.harvard.edu\/nsj\/?p=5564"},"modified":"2022-06-08T08:12:42","modified_gmt":"2022-06-08T12:12:42","slug":"volume-13-issue-2","status":"publish","type":"post","link":"https:\/\/journals.law.harvard.edu\/nsj\/2022\/06\/volume-13-issue-2\/","title":{"rendered":"Volume 13, Issue 2"},"content":{"rendered":"<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Kostyuk-Landau_Dual-EC-DRGB.pdf\"><strong>Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process<\/strong><\/a><\/p>\n<p><em>By Nadiya Kostyuk and Susan Landau<\/em><\/p>\n<p>In recent decades, the U.S. National Institute of Standards and Technology (NIST), which develops cryptographic standards for non-national security agencies of the U.S. government, has emerged as the de facto international source for cryptographic standards. But in 2013, Edward Snowden disclosed that the National Security Agency had subverted the integrity of a NIST cryptographic standard\u2014the Dual_EC_DRBG\u2014enabling easy decryption of supposedly secured communications. This discovery reinforced the desire of some public and private entities to develop their own cryptographic standards instead of relying on a U.S. government process. Yet, a decade later, no credible alternative to NIST has emerged. NIST remains the only viable candidate for effectively developing internationally trusted cryptography standards.<\/p>\n<p>Cryptographic algorithms are essential to security yet are hard to understand and evaluate. These technologies provide crucial security for communications protocols. Yet the protocols transit international borders; they are used by countries that do not necessarily trust each other. In particular, these nations do not necessarily trust the developer of the cryptographic standard.<\/p>\n<p>Seeking to understand how NIST, a U.S. government agency, was able to remain a purveyor of cryptographic algorithms despite the Dual_EC_DRBG problem, we examine the Dual_EC_DRBG situation, NIST&#8217;s response, and why a non-regulatory, non-national security U.S. agency remains a successful international supplier of strong cryptographic solutions.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Glazier_WithdrawalFromAfghanistan.pdf\"><strong>Withdrawal from Afghanistan Marks Guant<\/strong><strong>\u00e1namo\u2019s Endpoint<\/strong><\/a><\/p>\n<p><em>By David Glazier<\/em><\/p>\n<p>The United States has held 779 men and boys in Guant\u00e1namo during the two decades since the 9\/11 attacks, justified by loose reliance on international law rules addressing prisoners of war; thirty-seven remained as of May 2022. The Supreme Court upheld the practice in its 2004 Hamdi v. Rumsfeld decision, holding that the congressional Authorization for the Use of Military Force against al-Qaeda and the Taliban included implied authorization of the \u201cfundamental incidents\u201d of war, including preventive detention and military trials. But it also explicitly noted that this authority ends at the close of \u201cactive hostilities.\u201d The war ended in August, 2021, yet detention continues to this day.<\/p>\n<p>Post-conflict use of military commission trials falling short of international and U.S. constitutional criminal procedure standards is also highly problematic. The Court\u2019s 2006 Hamdan v. Rumsfeld decision recognized that military commissions depend on federal war powers for their existence. So these trials, too, cannot legitimately continue post-conflict.<\/p>\n<p>While the Biden administration continues to pursue winding down Guant\u00e1namo via detainee transfers with \u201csecurity assurances,\u201d the law of war mandates prompt post-hostilities repatriation. There is no \u201cbad dude\u201d exception based on general threat perceptions\u2014only an actual criminal sentence or pending charges can justify delay. The detainees must now be charged in federal courts, extradited to another country for prosecution, or promptly repatriated.<\/p>\n<p>After demonstrating why the legal authority for Guant\u00e1namo detention and military commissions has expired, this Article provides recommended dispositions for each of the detainees remaining at Guant\u00e1namo consistent with residual law of war mandates. It concludes by arguing that this outcome actually serves larger overall U.S. national interests; Guant\u00e1namo\u2019s fiscal, legal, moral, and political costs have long outweighed its benefits.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Zarate-Watson_LexiconOfTerror.pdf\"><strong>The Lexicon of Terror: Crystallization of the Definition of \u201cTerrorism\u201d Through the Lens of Terrorist Financing &amp; The Financial Action Task Force<\/strong><\/a><\/p>\n<p><em>By Juan Zarate and Sarah Watson<\/em><\/p>\n<p>There is a widespread belief within both the scholarly and policymaking community that there is no broadly accepted international definition of terrorism. It is indeed the case that the United Nations has not succeeded in finalizing a counterterrorism treaty, and that acts of violence are often followed by a debate over whether they constitute acts of terrorism. This Article argues, however, that the vast majority of nations have in fact committed to adopting a substantive definition of terrorism and are steadily incorporating that definition into their domestic law through their adherence to the standards promulgated by the Financial Action Task Force. The widespread commitment to this definition offers scholars and policymakers the opportunity to move beyond fundamental, longstanding debates over the nature of terrorism and focus on applying this definition on the global stage. With a definition of terrorism in effect, terrorist actors and their supporters can be identified and isolated more effectively, with more innocent lives protected, and terrorism itself met clearly with the international opprobrium of banned international practices like piracy and slavery.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2022\/06\/Vol13Iss2_Cook_IsEsquireAHigherClearance.pdf\"><strong>Is Esquire a Higher Clearance than Top Secret?: A Comparison of the Bar Admission and National Security Clearance Processes<\/strong><\/a><\/p>\n<p><em>By John Cook<\/em><\/p>\n<p>In both the national security field and the legal profession, members are required to undergo significant background checks and appraisals before beginning work. While both lines of work involve significant amounts of trust, competence, and integrity, there is often far greater risk to the public at large from the unauthorized release of highly classified national security information than from a poorly performing, or even dishonest, attorney. Despite the heightened risk in the national security field, the information requirements for bar admission go beyond those of national security clearances. Given the higher stakes of national security clearances compared to attorney licensure, and that both processes currently seem to accomplish their respective goals effectively, there is no reason that the bar admission process should be more rigorous and extensive in scope than the national security clearance process.<\/p>\n<p>This Article compares the two processes with this thesis in mind, examining the provisions of the National Conference of Bar Examiners Character and Fitness Application in comparison with the U.S. government\u2019s Standard Form 86 (Application for National Security Positions of the United States Government) as well as other aspects of the two processes. Overall, this comparison leads to the conclusion that the bar admissions process should more closely parallel the procedures used for national security clearance decisions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dueling over Dual_EC_DRGB: The Consequences of Corrupting a Cryptographic Standardization Process By Nadiya Kostyuk and Susan Landau In recent decades, the U.S. National Institute of Standards and Technology (NIST), which develops cryptographic standards for non-national security agencies of the U.S. government, has emerged as the de facto international source for cryptographic standards. But in 2013, Edward Snowden disclosed that the National Security Agency had subverted the integrity of a NIST cryptographic standard\u2014the Dual_EC_DRBG\u2014enabling easy decryption of supposedly secured communications. This discovery reinforced the desire of some public and private entities to develop their own cryptographic standards instead of relying on [&hellip;]<\/p>\n","protected":false},"author":13020,"featured_media":5365,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[242,233],"tags":[],"class_list":["post-5564","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-main","category-volume-13"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/journals.law.harvard.edu\/nsj\/wp-content\/uploads\/sites\/82\/2021\/02\/grey-zone-coersion-900x500-1000x0-c-default.jpg?fit=1000%2C567&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/peZtUX-1rK","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/5564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/users\/13020"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/comments?post=5564"}],"version-history":[{"count":0,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/posts\/5564\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media\/5365"}],"wp:attachment":[{"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/media?parent=5564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/categories?post=5564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.harvard.edu\/nsj\/wp-json\/wp\/v2\/tags?post=5564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}