Defense of Secret Agreements, 49 Ariz

Defense of Secret Agreements, 49 Ariz

+(,1 2 1/,1( Citation: Ashley S. Deeks, A (Qualified) Defense of Secret Agreements, 49 Ariz. St. L.J. 713 (2017) Provided by: University of Virginia Law Library Content downloaded/printed from HeinOnline Fri Sep 7 12:26:15 2018 -- Your use of this HeinOnline PDF indicates your acceptance of HeinOnline's Terms and Conditions of the license agreement available at https://heinonline.org/HOL/License -- The search text of this PDF is generated from uncorrected OCR text. -- To obtain permission to use this article beyond the scope of your HeinOnline license, please use: Copyright Information Use QR Code reader to send PDF to your smartphone or tablet device A (QUALIFIED) DEFENSE OF SECRET AGREEMENTS Ashley S. Deeks* IN TRO DU CTION ............................................................................................ 7 14 I. THE SECRET COMMITMENT LANDSCAPE ............................................... 720 A. U.S. Treaties and Executive Agreements ....................................... 721 B. U .S. Political Arrangem ents ........................................................... 725 1. Secret Political Arrangements in U.S. Law ............................. 725 2. Potency of Political Arrangements ........................................... 728 C. Secret Agreements in the Pre-Charter Era ..................................... 730 1. Key Historical Agreements and Their Critiques ...................... 730 a. Sem inal Secret Treaties ....................................... 730 b. Critiques of the Treaties ...................................... 732 c. Treaty Registration Requirements ....................... 735 2. Covenant of the League of Nations .......................................... 736 3 . U .N . C h arter ............................................................................. 737 4. Seeds of N on-com pliance ........................................................ 737 a. Textual Challenges .............................................. 738 b. Practical Challenges ............................................ 739 II. DEFENDING SECRET COMMITMENTS IN THE CHARTER ERA .................. 740 A. Categories of Com m itm ents ........................................................... 741 1. Intelligence C ooperation .......................................................... 741 2. M ilitary C ooperation ................................................................ 744 3. Nuclear-Related A greem ents ................................................... 746 4. Weapons-Related Commitments .............................................. 749 5. Econom ic Com m itm ents .......................................................... 750 * Associate Professor, University of Virginia Law School. Thanks to Gabriella Blum, Jack Goldsmith, Duncan Hollis, John Quigley, Alan Rozenshtein, Rich Schragger, Steve Slick, Paul Stephan, Robert Taylor, Pierre Verdier, and participants in presentations at Harvard Law School and at the Forefront of International Law conference at Arizona State University Law School, for which this paper was written. Thanks also to Kevin Crenny, Christopher Mirasola, Adrianna ScheerCook, and the UVA Law librarians for excellent research assistance. Although I previously served in the State Department, I have drawn only from publicly available information in writing this article. The opinions and characterizations in this piece are those of the author, and do not necessarily represent official positions of the U.S. Government. 714 ARIZONA STATE LA W JOURNAL [Ariz. St. L.J. B . R easons for Secrecy ....................................................................... 751 1. Publicity Would Defeat Commitment's Legitimate P u rp o se ..................................................................................... 7 5 1 2. Enhanced Transparency Behind the Veil ................................. 753 3. Deference to Sovereignty ......................................................... 755 4. Lack of Public Support ............................................................. 756 5. Facilitating Illegality ................................................................ 758 C. Substantive Consistency with the U.N. Charter ............................. 759 1. Enhancing Self-defense ............................................................ 761 2. Avoiding C onflict .................................................................... 762 3. Furthering International Law ................................................... 765 4 . E x ception s ................................................................................ 766 D. Internalizing the Charter ................................................................ 769 III. CHECKING SECRET COMMITMENTS ....................................................... 773 A . L egislative C hecks ......................................................................... 774 B . Inter-agency C hecks ....................................................................... 776 C. Intra-agency C hecks ....................................................................... 778 D . F oreign C hecks .............................................................................. 78 1 E. Enhancing Oversight of Secret Commitments ............................... 782 1. Expanding Congressional Oversight of Secret Arrangem ents ........................................................................... 782 2. Enhancing Inter-agency Checks ............................................... 784 3. Diversifying Intra-agency Checks ............................................ 784 IV. INFORMING THE LITERATURE ................................................................ 786 A . E xecutive P ow er ............................................................................. 786 B . S ecrecy ...........................................................................................78 8 C. Treaty-Making and Compliance .................................................... 790 1. Reputation-Driven Compliance ............................................... 791 2. Power of Political Commitments ............................................. 792 V . C ON CLU SION ......................................................................................... 793 INTRODUCTION Secret international agreements have a bad reputation. Ever since states misused secret agreements during World War I, commentators have been quick to condemn these agreements as pernicious and destabilizing to international peace and security. As that war wound down, the prevailing view-crystallized most prominently by President Woodrow Wilson in his 49:0713] SECRET AGREEMENTS Fourteen Points-was that the use of secret agreements exacerbated the war's violence and should be abandoned. Many of the secret agreements of that era also undercut notions of self-determination and revealed hypocritical policies by democratic governments. The concerns triggered by secret agreements were so salient that states crafting the League of Nations Covenant and then the United Nations Charter included provisions intended to eliminate the use of these agreements. Conventional wisdom holds that the Charter has largely achieved this goal. As a descriptive matter, commentators today commonly assert that the use of secret agreements is rare, due in part to the norms in the Charter that favor the publication of international agreements and disfavor secrecy.' Many international legal scholars seem implicitly to accept this descriptive claim, and focus their work almost entirely on the public products of state-to-state interactions (such as international agreements and resolutions produced by international organizations).' Those who study foreign relations and the Executive's powers within the U.S. legal system likewise tend to focus on the Executive's public behavior and outputs; they spend much less time exploring how the Executive conducts international relations behind the curtain. It is almost enough to make one believe that secret agreements have disappeared from the international stage. Many would celebrate this disappearance. Various scholars argue that secret agreements inhibit peaceful relations among states and that their use signals that states are pursuing substantive goals that violate international law.3 This normative perspective on secret agreements finds its genesis in the 1. See, e.g., VIENNA CONVENTION ON THE LAW OF TREATIES: A COMMENTARY 1341 (Oliver Dorr & Kirsten Schmalenbach eds., 2012) [hereinafter VIENNA CONVENTION COMMENTARY] (stating that secret treaties no longer play an essential role in international relations); Charles Lipson, "hy Are Some International Agreements Informal?, in INTERNATIONAL LAW AND INTERNATIONAL RELATIONS 293, 328 (Beth A. Simmons & Richard H. Steinberg eds., 2007); Kal Raustiala, Form and Substance in InternationalAgreements, 99 AM. J. INT'L L. 581, 583 (2005) (describing secret agreements as "[1]ess in favor today"). For a general discussion of transparency norms in international law, see TRANSPARENCY IN INTERNATIONAL LAW (Andrea Bianchi & Anne Peters eds., 2013). 2. See generally, e.g., ANTHONY AUST, MODERN TREATY LAW AND PRACTICE (2d ed. 2007) (containing extensive discussion of treaty practice but virtually no discussion of secret agreements); SECRECY AND FOREIGN POLICY (Thomas Franck & Edward Weisband eds., 1974) (discussing various aspects of secrecy in foreign relations but mentioning "secret treaty commitments" in a single paragraph). Some scholars may recognize that secret commitments exist and that states

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    83 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us