Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Written Testimony Of Gerald S. Dickinson For The U.S. Senate Hearing On Fencing Along The Southwest Border (Senate Committee On Homeland Security And Governmental Affairs), Gerald S. Dickinson Apr 2017

Written Testimony Of Gerald S. Dickinson For The U.S. Senate Hearing On Fencing Along The Southwest Border (Senate Committee On Homeland Security And Governmental Affairs), Gerald S. Dickinson

Testimony

It is with great pleasure that I submit this written testimony at the request of the Office of the Ranking Member, Senator McCaskill. I am pleased that the Homeland Security and Governmental Affairs Committee is devoting its April 4, 2017 hearing to an examination of efforts to secure the southwest border through the construction of a wall. Further, as a law professor who writes and teaches in the areas of constitutional property and land use, I take great interest in the committee's focus on the legal authorities related to the wall construction along the U.S.-Mexico border.


Government Speech And The War On Terror, Helen Norton Jan 2017

Government Speech And The War On Terror, Helen Norton

Publications

The government is unique among speakers because of its coercive power, its substantial resources, its privileged access to national security and intelligence information, and its wide variety of expressive roles as commander-in-chief, policymaker, educator, employer, property owner, and more. Precisely because of this power, variety, and ubiquity, the government's speech can both provide great value and inflict great harm to the public. In wartime, more specifically, the government can affirmatively choose to use its voice to inform, inspire, heal, and unite -- or instead to deceive, divide, bully, and silence.

In this essay, I examine the U.S. government's role as …


From The National Surveillance State To The Cybersurveillance State, Margaret Hu Jan 2017

From The National Surveillance State To The Cybersurveillance State, Margaret Hu

Scholarly Articles

This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …


Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer Jan 2017

Energy Subsidies: Worthy Goals, Competing Priorities, And Flawed Institutional Design, David M. Schizer

Faculty Scholarship

The United States uses on targeted subsidies for both "green" energy and hydrocarbons. These subsidies pursue worthwhile goals. But unfortunately, many have design flaws that make them less effective or even counterproductive. The goal of this Article is to show how to do better.

Specifically, this Article focuses on three sets of issues. First, there often is tension between our environmental and national security goals. Unfortunately, the economics literature on energy largely ignores these trade-offs by omitting national security from the analysis. This Article takes issue with this approach and suggests ways to manage these trade-offs. Second, this Article argues …


Restoring The Balance Between Secrecy And Transparency: The Prosecution Of Nationai Security Leaks Under The Espionage Act, Christina E. Wells Jan 2017

Restoring The Balance Between Secrecy And Transparency: The Prosecution Of Nationai Security Leaks Under The Espionage Act, Christina E. Wells

Faculty Publications

This Issue Brief reviews the relationship between secrecy, transparency and accountability in the United States, including the role of anonymous leaks. It also examines the threat that increased Espionage Act prosecutions pose to government accountability and discusses why changes to the Espionage Act are necessary to preserve an appropriate balance between government secrecy and transparency.


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn Jan 2017

The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey D. Kahn

Faculty Journal Articles and Book Chapters

Terry v. Ohio's “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …


Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr. Jan 2017

Social Justice And Silicon Valley: A Perspective On The Apple-Fbi Case And The “Going Dark” Debate, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.