Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Administrative Law (1)
- Cheney (1)
- Communications Law (1)
- Constitutional Law (1)
- Covert operations (1)
-
- Estates and trusts (1)
- Executive branch (1)
- FOIA (1)
- First Amendment (1)
- Government information (1)
- Guatemala (1)
- Information (1)
- Law and Society (1)
- Leaks (1)
- Politics (1)
- President/Executive Department (1)
- Redaction (1)
- Secrecy (1)
- Slayer statute (1)
- Transparency (1)
- Unitary executive (1)
- WikiLeaks (1)
- Publication
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
Arizona's Slayer Statute: The Killer Of Testator Intent, Adam D. Hansen
Arizona's Slayer Statute: The Killer Of Testator Intent, Adam D. Hansen
Adam D Hansen
In 2012, the Arizona legislature amended its slayer statute to close loopholes that had emerged during years of slayer case litigation. However, in so doing, the Arizona legislature neglected to consider the adverse impact the amendment would have on the trending social consideration of euthanasia. This Article sheds light on the unintended legal consequences of Arizona’s current slayer statute, considering the trending social issue of euthanasia. Part Two briefly presents terms, highlights two legal theories that were used in early American jurisprudence, and gives a short history of the codification of modern slayer statutes. Part Three gives an overview of …
The Implausibility Of Secrecy, Mark Fenster
The Implausibility Of Secrecy, Mark Fenster
Mark Fenster
Government secrecy frequently fails. Despite the executive branch’s obsessive hoarding of certain kinds of documents and its constitutional authority to do so, recent high-profile events—among them the WikiLeaks episode, the Obama administration’s celebrated leak prosecutions, and the widespread disclosure by high-level officials of flattering confidential information to sympathetic reporters—undercut the image of a state that can classify and control its information. The effort to control government information requires human, bureaucratic, technological, and textual mechanisms that regularly founder or collapse in an administrative state, sometimes immediately and sometimes after an interval. Leaks, mistakes, open sources—each of these constitutes a path out …