Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim Apr 2018

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim

Indiana Law Journal

On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …


The Politics Of Legal Arrangements: The "Duty Of Care," Justifying, Extending, And Perpetuating The Public-In-The-Private Forms Of Protection, Anna Leander Feb 2018

The Politics Of Legal Arrangements: The "Duty Of Care," Justifying, Extending, And Perpetuating The Public-In-The-Private Forms Of Protection, Anna Leander

Indiana Journal of Global Legal Studies

This article explores the place of formal legal arrangements in the politics surrounding the hybrid, enmeshed public-in-the-private forms of authority this special issue focuses on. It does so by analyzing the significance of one specific legal arrangement, the Duty of Care, for the politics surrounding public-in-the-private forms of protection. I show that the Duty of Care does considerable political work. It contributes to decentering, commercializing, and depoliticizing protection. In so doing, the Duty of Care is justifying this specific form of protection, defining and extending its scope, and perpetuating it. The article makes this argument by drawing both on the …


Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin Jan 2018

Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin

Indiana Law Journal

The Article explains why addressing Too-Big-To-Fail 2.0 has not yet become a political and societal priority. First, digital service providers are technology companies, which, many believe, are shaped by market forces such that they fail and succeed in equal measure without producing negative ripple effects on the economy or society. Second, technology giants are not as carefully regulated as banks becauseunlike banks, they do not take insured deposits backed by the government. Third, even heavily regulated financial institutions have not been required until recently to focus on cybersecurity. Finally, some believe that there is no point in worrying about Too-Big-To-Fail …


Evading Constitutional Challenge: Dapa's Implications For Future Exercises Of Executive Enforcement Discretion, Lucy Chauvin Jan 2018

Evading Constitutional Challenge: Dapa's Implications For Future Exercises Of Executive Enforcement Discretion, Lucy Chauvin

Indiana Law Journal

I. UNITED STATES V. TEXAS: DEFINING THE BOUNDARIES OF ENFORCEMENT DISCRETION

A. DAPA AND THE CONSTITUTIONAL CHALLENGE

B. SCHOLARLY DEBATE: APPLICATION OF YOUNGSTOWN FRAMEWORK TO DAPA

II. TAKE CARE: CONFLICTING INTERPRETATIONS OF THE DUTY TO FAITHFULLY EXECUTE THE LAW

III. ENFORCEMENT DISCRETION: INTERACTION BETWEEN CONGRESS AND THE EXECUTIVE

A. HECKLER V. CHANEY: EARLY RECOGNITION OF EXECUTIVE ENFORCEMENT DISCRETION

B. ENFORCEMENT DISCRETION’S SPECIFIC APPLICATION TO IMMIGRATION LAW

C. THE MEANING OF “DEFERRED ACTION”

IV. THE HISTORICALLY LIMITED ROLE OF THE JUDICIARY

A. PRESUMPTIVE UNREVIEWABILITY

B. ADDITIONAL PROCEDURAL HURDLES

V. MOVING FORWARD: LESSONS TO BE LEARNED FROM THE OBAMA ADMINISTRATION

A. FRAMING …


Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia Jan 2018

Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia

Indiana Law Journal

Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal delivery device for malware, as users routinely launch unverified programs and forego virus detection. The illicit nature of the transaction forces users to rely almost entirely on the reputation of websites, uploaders, and other users to determine if a file is safe to download. …


Congressional Authorization Of The Campaign Against Isil, Tyler Salway Jan 2018

Congressional Authorization Of The Campaign Against Isil, Tyler Salway

Indiana Law Journal

I. THE BIRTH OF ISIL

II. CONGRESSIONAL AUTHORIZATION

A. EXPRESS AUTHORIZATION

1. METHODS OF INCLUSION

2. ISIL’S INCLUSION UNDER THE 9/11 AUMF

B. IMPLICIT AUTHORIZATION

III. ISIL AND THE TRUMP PRESIDENCY

CONCLUSION