Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

Table Of Contents Jan 2022

Table Of Contents

Seattle University Law Review

Table of Contents


When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman Jan 2019

When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman

Pepperdine Law Review

In the electronic age, the internet—and—social media specifically, can be a tool for good but, abused and unchecked, can lead to great harm. Terrorist organizations utilize social media as a means of recruiting and training new members, urging them to action, and creating public terror. These platforms serve as the catalyst for equipping the growing number of “lone wolf” attackers taking action across the United States. Under civil liability provisions created under JASTA and the ATA, material supporters of terrorism can be held liable for their actions, and with the key role social media sites now play in supporting terrorism, …


The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara Jan 2019

The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara

Catholic University Journal of Law and Technology

As society becomes more technology driven, legal issues continue to arise around the world. From privacy to national security, technology develops at a rate the law simply cannot keep up with. In the United States, one of the biggest legal issues is how the new risks technology brings will interfere with our individual liberties.

Technologies like three-dimensional (“3D”) printing have transformed everything from lifesaving surgeries to gun manufacturing. This technology has led to a whole new way of communicating via computer coding, with the online open source movement leading innovation by allowing for the sharing and editing of files freely. …


Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall Jan 2018

Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall

Catholic University Journal of Law and Technology

Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes …


Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law Sep 2017

Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick May 2017

Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


Government Speech And The War On Terror, Helen Norton Jan 2017

Government Speech And The War On Terror, Helen Norton

Publications

The government is unique among speakers because of its coercive power, its substantial resources, its privileged access to national security and intelligence information, and its wide variety of expressive roles as commander-in-chief, policymaker, educator, employer, property owner, and more. Precisely because of this power, variety, and ubiquity, the government's speech can both provide great value and inflict great harm to the public. In wartime, more specifically, the government can affirmatively choose to use its voice to inform, inspire, heal, and unite -- or instead to deceive, divide, bully, and silence.

In this essay, I examine the U.S. government's role as …


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Publications

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …


The Government's Lies And The Constitution, Helen Norton Jan 2015

The Government's Lies And The Constitution, Helen Norton

Publications

Governments lie. They do so for many different reasons to a wide range of audiences on a variety of topics. Although courts and commentators have extensively explored whether and when the First Amendment permits the government to regulate lies told by private speakers, relatively little attention has yet been paid to the constitutional implications of the government's intentional falsehoods. This Article helps fill that gap by exploring when, if ever, the Constitution prohibits our government from lying to us.

The government’s lies can be devastating. This is the case, for example, of its lies told to resist legal and political …


The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa Jan 2014

The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa

Pepperdine Law Review

No abstract provided.


Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney Jan 2014

Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney

Articles, Book Chapters, & Popular Press

Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …


Breaking Terror's Bank Without Breaking The Law: A Comment On The Usa Patriot Act And The United States Financial War On Terrorism , Carrie L. Folendorf Apr 2013

Breaking Terror's Bank Without Breaking The Law: A Comment On The Usa Patriot Act And The United States Financial War On Terrorism , Carrie L. Folendorf

Journal of the National Association of Administrative Law Judiciary

This comment will discuss the effect of abandoning our Constitution in times of crisis by discussing how Executive Order 13,224 and the USA PATRIOT Act infringe upon our fundamental First Amendment freedoms of association, and how they violate the Due Process Clause of the Fifth Amendment by withholding notice and the opportunity to be heard. Part II will outline legislation which demonstrates how the United States has historically dealt with freezing the assets of designated terrorists, and will include a discussion of the provisions in the Anti-Terrorism and Effective Death Penalty Act of 1996 (AEDPA) and the USA PATRIOT Act …


The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen Jan 2013

The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen

Faculty Scholarship

The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, roughly a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice.

This Article challenges the standard account of that disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an …


Occupy Wall Street And The U.S. Army's 82nd Airborne Division: A Hypothetical Examination Of The Slippery Slope Of Military Intervention During Civil Disturbance, Mckay Smith Jun 2012

Occupy Wall Street And The U.S. Army's 82nd Airborne Division: A Hypothetical Examination Of The Slippery Slope Of Military Intervention During Civil Disturbance, Mckay Smith

McKay Smith

Throughout 2011, the world was an incredibly angry place. The global economy was in disarray. The streets of Tunisia, Egypt, Libya, and Syria had erupted in unprecedented violence. While Americans watched events spiral out of control abroad, a new movement was taking shape domestically. The Occupy movement is a self-described, nonpartisan protest movement targeting economic injustice and social inequality. At its core, however, many domestic protestors also vocally deride the current state of U.S. politics. This article analyzes the Army’s authority to collect information in support of domestic operations, particularly operations aimed at quelling civil disturbance. Historically, the use of …


Wikileaks And The First Amendment, Geoffrey R. Stone May 2012

Wikileaks And The First Amendment, Geoffrey R. Stone

Federal Communications Law Journal

FCBA Distinguished Speaker Series

In November 2010, Julian Assange's WikiLeaks collaborated with major media organizations to release thousands of classified U.S. State Department documents. American soldier Bradley Manning stands accused of leaking those documents to the website. In response, Congress introduced the SHIELD Act to amend the Espionage Act of 1917, making it a crime for any person to disseminate any classified information concerning American intelligence or the identity of a classified informant. Such sweeping language, while possibly constitutional as applied to government employees like Manning, is plainly unconstitutional as applied to those like Assange and WikiLeaks who subsequently publish …


Regulating From Typewriters In An Internet Age: The Development & Regulation Of Mass Media Usage In Presidential Campaigns, Anthony J. King Jan 2012

Regulating From Typewriters In An Internet Age: The Development & Regulation Of Mass Media Usage In Presidential Campaigns, Anthony J. King

Anthony J. King

The American election process has become a misleading process of campaign promises and self-promotion, thus diluting its primary and most fundamental purpose. This discrepancy can be traced to three primary groups; (1) the candidates, who supplied the motive; (2) the mass media, who supplied the means; and (3) the electorate, who so far have allowed it to happen. Seeking to remedy the situation lawmakers have turned to regulations of the media in attempt to assure fairness and nurture the marketplace of ideas. These numerous attempts at fairness have been met with a mixed reception and mixed results leading to questions …


Advising Terrorism: Material Support, Safe Harbors, And Freedom Of Speech, Peter Margulies Jan 2011

Advising Terrorism: Material Support, Safe Harbors, And Freedom Of Speech, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Documents, Leaks, And The Boundaries Of Expression: Government Whistleblowing In An Over Classified Age, Susan Nevelow Mart Jan 2007

Documents, Leaks, And The Boundaries Of Expression: Government Whistleblowing In An Over Classified Age, Susan Nevelow Mart

Publications

No abstract provided.


Truth And Consequences: First Amendment Protection For Accurate Reporting On Government Investigations, Jonathan Donnellan, Justin Peacock Jan 2006

Truth And Consequences: First Amendment Protection For Accurate Reporting On Government Investigations, Jonathan Donnellan, Justin Peacock

NYLS Law Review

No abstract provided.


Protecting The Lady From Toledo: Post-Usa Patriot Act Electronic Surveillance At The Library, Susan Nevelow Mart Jan 2004

Protecting The Lady From Toledo: Post-Usa Patriot Act Electronic Surveillance At The Library, Susan Nevelow Mart

Publications

Library patrons are worried about the government looking over their shoulder while they read and surf the Internet. Because of the broad provisions of the USA PATRIOT Act, the lack of judicial and legislative oversight, the potential for content overcollection, and the ease with which applications for pen register, section 215 orders, or national security letters can be obtained, these fears cannot be dismissed.


National Security Interests Vs. The First Amendment: Haig V. Agee, Joan R. M. Bullock Jan 1982

National Security Interests Vs. The First Amendment: Haig V. Agee, Joan R. M. Bullock

Journal Publications

In Haig v. Agee, the United States Supreme Court held that the Secretary of State has the authority to revoke a passport when the bearer's activities abroad "are causing or are likely to cause serious damage to the national security or the foreign policy of the United States." This note will examine the implications of Agee as a standard in resolving conflicts between national security and first amendment rights of the individual.