Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 35 of 35

Full-Text Articles in Law

Wikileaks Would Not Qualify To Claim Federal Reporter’S Privilege In Any Form, Jonathan Peters May 2011

Wikileaks Would Not Qualify To Claim Federal Reporter’S Privilege In Any Form, Jonathan Peters

Jonathan Peters

This article addresses whether WikiLeaks could claim a federal reporter’s privilege if the U.S. government or a U.S. entity tried to compel one of the site’s staff members to disclose the source(s) of any documents it has released. After exploring the origins of the First Amendment-based privilege, I argue that WikiLeaks would not be able to claim it. First, the website does not engage in investigative reporting. Second, it has not taken steps consistently to minimize harm. I also discuss congressional attempts to pass a federal shield law, paying special attention to H.R. 985 and S. 448, the two most …


Wikileaks, The First Amendment, And The Press, Jonathan Peters Apr 2011

Wikileaks, The First Amendment, And The Press, Jonathan Peters

Jonathan Peters

This article focuses on one question: When can the government, consonant with the First Amendment, punish the publication of classified information related to national security? To that end, Part I outlines the constitutional standards that could apply to such a prosecution of WikiLeaks. Part II discusses whether WikiLeaks is part of the press and whether that matters for constitutional purposes. Part III concludes by urging the Justice Department to consider carefully whether it should prosecute WikiLeaks.


Government Speech 2.0, Helen L. Norton, Danielle Keats Citron Mar 2010

Government Speech 2.0, Helen L. Norton, Danielle Keats Citron

Danielle Keats Citron

New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …


Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden Jun 2009

Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden

Rob Frieden

Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …


Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron Mar 2009

Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron

Danielle Keats Citron

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …