Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


The Trickle-Down War, Rosa Brooks Jan 2014

The Trickle-Down War, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …


Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole Jul 2012

Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole

Georgetown Law Faculty Publications and Other Works

Aziz Rana’s account of the takeover of American national security by experts, and of the public’s acceptance of that state of affairs, offers an important and novel perspective on what ails us in national security today. In this Comment, I suggest that while Rana is correct to identify our deference to experts as a central aspect of the problem, the problem is more complicated. First, the phenomenon of elite control over foreign and security policy questions is not new, but likely dates back to the founding—when elites ruled not based on expertise but on the basis of status, class, and …


The Perilous Dialogue, Laura K. Donohue Apr 2009

The Perilous Dialogue, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The master metaphor in the national security dialogue is, indeed, “security or freedom”. It dominates the counterterrorist discourse both in the United States and abroad. Transcripts from debates in Ireland’s Dáil Éireann, Turkey’s Büyük Millet Meclisi, and Australia’s Parliament are filled with reference to the need to weigh the value of liberty against the threat posed by terrorism. Perhaps nowhere is this more pronounced than in the United Kingdom, where, for decades, counterterrorist debates have turned on this framing. Owing in part, though, to different constitutional structures, what “security or freedom” means in America differs from what it means in …


The Terrorist Is A Star!: Regulating Media Coverage Of Publicity-Seeking Crimes, Michelle Ward Ghetti Jun 2008

The Terrorist Is A Star!: Regulating Media Coverage Of Publicity-Seeking Crimes, Michelle Ward Ghetti

Federal Communications Law Journal

Publicity-seeking crimes, including terrorism, almost by definition depend on the media for their effectiveness. Twenty-five years ago, when the bulk of this article was written, critics both within and outside the news industry had begun to voice an awareness, if not a concern, for the ease with which such criminals obtained publicity on both a national and international platform and it looked as if something might be done within the media establishments to thwart this manipulation of the press. Today, it is possible to look back and see that, in fact, nothing has been done and, so, individuals such as …


The Twenty Year Test: Principles For An Enduring Counterterrorism Legal Architecture, James E. Baker Jan 2008

The Twenty Year Test: Principles For An Enduring Counterterrorism Legal Architecture, James E. Baker

Georgetown Law Faculty Publications and Other Works

The United States faces three enduring terrorism-related threats. First, there is the realistic prospect of additional attacks in the United States including attacks using weapons of mass destruction (“WMD”). Second, in responding to this threat, we may undermine the freedoms that enrich our lives, the tolerance that marks our society, and the democratic values that define our government. Third, if we are too focused on terrorism, we risk losing sight of this century’s other certain threats as well as the capacity to respond to them, including the state proliferation of nuclear weapons, nation-state rivalry, pandemic disease, oil dependency, and environmental …


What’S International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker Jan 2007

What’S International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker

Georgetown Law Faculty Publications and Other Works

The United States faces an immediate and continuous threat of terrorist attack using weapons of mass destruction, including nuclear weapons. The intelligence function and national security law, including international law--or more accurately transnational law--are central to addressing this threat. Indeed, international law is more relevant today in addressing this threat than it was before September 11. Part II of this article describes a continuum of contemporary threats to U.S. national security, with a focus on nonstate terrorism. Part III addresses the role of intelligence and national security law, and in particular law addressed to process, in combating these threats. Part …