Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Wikileaks And The First Amendment, Geoffrey R. Stone May 2012

Wikileaks And The First Amendment, Geoffrey R. Stone

Federal Communications Law Journal

FCBA Distinguished Speaker Series

In November 2010, Julian Assange's WikiLeaks collaborated with major media organizations to release thousands of classified U.S. State Department documents. American soldier Bradley Manning stands accused of leaking those documents to the website. In response, Congress introduced the SHIELD Act to amend the Espionage Act of 1917, making it a crime for any person to disseminate any classified information concerning American intelligence or the identity of a classified informant. Such sweeping language, while possibly constitutional as applied to government employees like Manning, is plainly unconstitutional as applied to those like Assange and WikiLeaks who subsequently publish …


Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham May 2012

Should Cyber Exploitation Ever Constitute A Demonstration Of Hostile Intent That May Violate Un Charter Provisions Prohibiting The Threat Or Use Of Force?, Anna Wortham

Federal Communications Law Journal

More and more, the United States and other countries rely on complex infrastructures that are primarily controlled by information technology. Although extremely destructive cyber threats and attacks against nations are a reality, the laws governing cyber exploitation have not kept pace with this threat. Because the United States and other nations may use cyber capabilities offensively as well as defensively, it is important that the laws for engaging in such cyber conflict be well defined. Currently, it seems unlikely that cyber exploitation can ever be regarded as a threat or use of force under the UN Charter because it is …


A Soldier's Blog: Balancing Service Members' Personal Rights Vs. National Security Interests, Tatum H. Lytle Jun 2007

A Soldier's Blog: Balancing Service Members' Personal Rights Vs. National Security Interests, Tatum H. Lytle

Federal Communications Law Journal

This Note examines the competing interests between ensuring military personnel's freedom of speech while protecting national security interests. The Author recognizes the necessity of protecting national security interests but emphasizes that military personnel's rights to free speech must be protected as long as such speech poses no threat to military security. In conclusion, clearer protections must be implemented to protect military personnel's right to free speech.


Echelon's Effect: The Obsolescence Of The U.S. Foreign Intelligence Legal Regime, Matt Bedan Mar 2007

Echelon's Effect: The Obsolescence Of The U.S. Foreign Intelligence Legal Regime, Matt Bedan

Federal Communications Law Journal

The technological progress of the past thirty years has vastly increased the surveillance capabilities of the global intelligence community. At the same time, the law governing the use of this technology and its consequent information has remained largely static. This lack of adjustment, for better or worse, has rendered federal foreign intelligence surveillance law irrelevant in many respects.


Securing The Freedom Of The Communications Revolution, Michael K. Powell May 2005

Securing The Freedom Of The Communications Revolution, Michael K. Powell

Federal Communications Law Journal

No abstract provided.


New Objectives For Cfius: Foreign Ownership, Critical Infrastructure, And Communications Interception, James A. Lewis May 2005

New Objectives For Cfius: Foreign Ownership, Critical Infrastructure, And Communications Interception, James A. Lewis

Federal Communications Law Journal

Global economic integration creates new risks for national security. Foreign ownership of telecommunications service providers is an area of expanding concern. Foreign ownership could multiply opportunities for espionage by increasing foreign entities' access to U.S. communications and networks as well as increasing the complexity of defenders' tasks. Foreign ownership could make law enforcement communications interception more difficult. Foreign ownership could also increase the ability of a potential opponent to disrupt critical infrastructure and the services the foreign-controlled entities provide. These concerns create interest in improving existing processes for managing the risks associated with foreign ownership--such responsibility principally lies with the …


Homeland Security And Wireless Telecommunications: The Continuing Evolution Of Regulation, Christopher Guttman-Mccabe, Amy Mushahwar, Patrick Murck May 2005

Homeland Security And Wireless Telecommunications: The Continuing Evolution Of Regulation, Christopher Guttman-Mccabe, Amy Mushahwar, Patrick Murck

Federal Communications Law Journal

Since the grant of the first Commercial Mobile Radio Service ("CMRS") license over twenty years ago, the wireless industry has grown from a service of convenience to one that is indispensable. What once was a device used for sporadic phone calls now is viewed by many Americans as a source of invaluable communication and security. As the wireless industry matured, government officials turned to the mobile phone as a way to make the United States safer. E-9 11, the Communications Assistance for Law Enforcement Act ("CALEA"), Wireless Priority Service ("WPS"), and Outage Reporting all were initiated on the wireless platform …


Navigating Communications Regulation In The Wake Of 9/11, Jamie S. Gorelick, John H. Harwood Ii, Heather Zachary May 2005

Navigating Communications Regulation In The Wake Of 9/11, Jamie S. Gorelick, John H. Harwood Ii, Heather Zachary

Federal Communications Law Journal

In no industry has the impact of the events of September 11, 2001 ("9/11") been felt more strongly than in the communications industry. After 9/11, as the American people demanded a greater sense of security, Congress and the executive branch agencies reacted with new laws, new regulations, and new practices designed to protect our nation's critical communications infrastructure and enhance the ability of law enforcement and intelligence agencies to investigate those who would do us harm. The U.S. communications providers could do so consistent with their responsibilities to customers and to shareholders. That partnership, based upon rules developed over decades, …