Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
-
- Publications (5)
- Catholic University Journal of Law and Technology (2)
- Life of the Law School (1993- ) (2)
- Pepperdine Law Review (2)
- Anthony J. King (1)
-
- Articles, Book Chapters, & Popular Press (1)
- Faculty Scholarship (1)
- Federal Communications Law Journal (1)
- Journal Publications (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Law Faculty Scholarship (1)
- McKay Smith (1)
- NYLS Law Review (1)
- Seattle University Law Review (1)
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Law
When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman
When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman
Pepperdine Law Review
In the electronic age, the internet—and—social media specifically, can be a tool for good but, abused and unchecked, can lead to great harm. Terrorist organizations utilize social media as a means of recruiting and training new members, urging them to action, and creating public terror. These platforms serve as the catalyst for equipping the growing number of “lone wolf” attackers taking action across the United States. Under civil liability provisions created under JASTA and the ATA, material supporters of terrorism can be held liable for their actions, and with the key role social media sites now play in supporting terrorism, …
The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara
The Itunes Of Downloadable Guns: Firearms As A First Amendment Right, Sandra Sawan Lara
Catholic University Journal of Law and Technology
As society becomes more technology driven, legal issues continue to arise around the world. From privacy to national security, technology develops at a rate the law simply cannot keep up with. In the United States, one of the biggest legal issues is how the new risks technology brings will interfere with our individual liberties.
Technologies like three-dimensional (“3D”) printing have transformed everything from lifesaving surgeries to gun manufacturing. This technology has led to a whole new way of communicating via computer coding, with the online open source movement leading innovation by allowing for the sharing and editing of files freely. …
Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall
Deepfake Videos: When Seeing Isn't Believing, Holly Kathleen Hall
Catholic University Journal of Law and Technology
Videos, known as deepfakes, use readily available software to create a work that shows people saying and doing things they may never have uttered or engaged in. The technology making the videos appear very authentic is advancing at such a rate that people may not be able to detect if the videos are fact or fiction. Given the hasty acceptance of other forms of fake news in society, deepfake videos have the ability to affect the nature of information the public receives about candidates and policies. This study examines the potential use of deepfake videos in the democratic process, analyzes …
Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law
Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick
Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick
Life of the Law School (1993- )
No abstract provided.
Government Speech And The War On Terror, Helen Norton
Government Speech And The War On Terror, Helen Norton
Publications
The government is unique among speakers because of its coercive power, its substantial resources, its privileged access to national security and intelligence information, and its wide variety of expressive roles as commander-in-chief, policymaker, educator, employer, property owner, and more. Precisely because of this power, variety, and ubiquity, the government's speech can both provide great value and inflict great harm to the public. In wartime, more specifically, the government can affirmatively choose to use its voice to inform, inspire, heal, and unite -- or instead to deceive, divide, bully, and silence.
In this essay, I examine the U.S. government's role as …
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Publications
Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …
The Government's Lies And The Constitution, Helen Norton
The Government's Lies And The Constitution, Helen Norton
Publications
Governments lie. They do so for many different reasons to a wide range of audiences on a variety of topics. Although courts and commentators have extensively explored whether and when the First Amendment permits the government to regulate lies told by private speakers, relatively little attention has yet been paid to the constitutional implications of the government's intentional falsehoods. This Article helps fill that gap by exploring when, if ever, the Constitution prohibits our government from lying to us.
The government’s lies can be devastating. This is the case, for example, of its lies told to resist legal and political …
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
The Post-Tsa Airport: A Constitution Free Zone?, Daniel S. Harawa
Pepperdine Law Review
No abstract provided.
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Warrant Canaries Beyond The First Amendment: A Comment, Jonathon Penney
Articles, Book Chapters, & Popular Press
Warrant canaries have emerged as an intriguing tool for Internet companies to provide some measure of transparency for users while also complying with national security laws. Though there is at least a reasonable argument for the legality of warrant canaries in the U.S. based primarily on First Amendment "compelled speech" doctrine, the same cannot be said for the use of warrant canaries in other "Five Eyes” intelligence agency countries — United Kingdom, Canada, New Zealand, and Australia — where the legality of warrant canaries has yet to be examined in either cases or scholarship. This comment, which provides an overview …
Breaking Terror's Bank Without Breaking The Law: A Comment On The Usa Patriot Act And The United States Financial War On Terrorism , Carrie L. Folendorf
Breaking Terror's Bank Without Breaking The Law: A Comment On The Usa Patriot Act And The United States Financial War On Terrorism , Carrie L. Folendorf
Journal of the National Association of Administrative Law Judiciary
This comment will discuss the effect of abandoning our Constitution in times of crisis by discussing how Executive Order 13,224 and the USA PATRIOT Act infringe upon our fundamental First Amendment freedoms of association, and how they violate the Due Process Clause of the Fifth Amendment by withholding notice and the opportunity to be heard. Part II will outline legislation which demonstrates how the United States has historically dealt with freezing the assets of designated terrorists, and will include a discussion of the provisions in the Anti-Terrorism and Effective Death Penalty Act of 1996 (AEDPA) and the USA PATRIOT Act …
The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen
The Leaky Leviathan: Why The Government Condemns And Condones Unlawful Disclosures Of Information, David E. Pozen
Faculty Scholarship
The United States government leaks like a sieve. Presidents denounce the constant flow of classified information to the media from unauthorized, anonymous sources. National security professionals decry the consequences. And yet the laws against leaking are almost never enforced. Throughout U.S. history, roughly a dozen criminal cases have been brought against suspected leakers. There is a dramatic disconnect between the way our laws and our leaders condemn leaking in the abstract and the way they condone it in practice.
This Article challenges the standard account of that disconnect, which emphasizes the difficulties of apprehending and prosecuting offenders, and advances an …
Occupy Wall Street And The U.S. Army's 82nd Airborne Division: A Hypothetical Examination Of The Slippery Slope Of Military Intervention During Civil Disturbance, Mckay Smith
McKay Smith
Throughout 2011, the world was an incredibly angry place. The global economy was in disarray. The streets of Tunisia, Egypt, Libya, and Syria had erupted in unprecedented violence. While Americans watched events spiral out of control abroad, a new movement was taking shape domestically. The Occupy movement is a self-described, nonpartisan protest movement targeting economic injustice and social inequality. At its core, however, many domestic protestors also vocally deride the current state of U.S. politics. This article analyzes the Army’s authority to collect information in support of domestic operations, particularly operations aimed at quelling civil disturbance. Historically, the use of …
Wikileaks And The First Amendment, Geoffrey R. Stone
Wikileaks And The First Amendment, Geoffrey R. Stone
Federal Communications Law Journal
FCBA Distinguished Speaker Series
In November 2010, Julian Assange's WikiLeaks collaborated with major media organizations to release thousands of classified U.S. State Department documents. American soldier Bradley Manning stands accused of leaking those documents to the website. In response, Congress introduced the SHIELD Act to amend the Espionage Act of 1917, making it a crime for any person to disseminate any classified information concerning American intelligence or the identity of a classified informant. Such sweeping language, while possibly constitutional as applied to government employees like Manning, is plainly unconstitutional as applied to those like Assange and WikiLeaks who subsequently publish …
Regulating From Typewriters In An Internet Age: The Development & Regulation Of Mass Media Usage In Presidential Campaigns, Anthony J. King
Regulating From Typewriters In An Internet Age: The Development & Regulation Of Mass Media Usage In Presidential Campaigns, Anthony J. King
Anthony J. King
The American election process has become a misleading process of campaign promises and self-promotion, thus diluting its primary and most fundamental purpose. This discrepancy can be traced to three primary groups; (1) the candidates, who supplied the motive; (2) the mass media, who supplied the means; and (3) the electorate, who so far have allowed it to happen. Seeking to remedy the situation lawmakers have turned to regulations of the media in attempt to assure fairness and nurture the marketplace of ideas. These numerous attempts at fairness have been met with a mixed reception and mixed results leading to questions …
Advising Terrorism: Material Support, Safe Harbors, And Freedom Of Speech, Peter Margulies
Advising Terrorism: Material Support, Safe Harbors, And Freedom Of Speech, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Documents, Leaks, And The Boundaries Of Expression: Government Whistleblowing In An Over Classified Age, Susan Nevelow Mart
Documents, Leaks, And The Boundaries Of Expression: Government Whistleblowing In An Over Classified Age, Susan Nevelow Mart
Publications
No abstract provided.
Truth And Consequences: First Amendment Protection For Accurate Reporting On Government Investigations, Jonathan Donnellan, Justin Peacock
Truth And Consequences: First Amendment Protection For Accurate Reporting On Government Investigations, Jonathan Donnellan, Justin Peacock
NYLS Law Review
No abstract provided.
Protecting The Lady From Toledo: Post-Usa Patriot Act Electronic Surveillance At The Library, Susan Nevelow Mart
Protecting The Lady From Toledo: Post-Usa Patriot Act Electronic Surveillance At The Library, Susan Nevelow Mart
Publications
Library patrons are worried about the government looking over their shoulder while they read and surf the Internet. Because of the broad provisions of the USA PATRIOT Act, the lack of judicial and legislative oversight, the potential for content overcollection, and the ease with which applications for pen register, section 215 orders, or national security letters can be obtained, these fears cannot be dismissed.
National Security Interests Vs. The First Amendment: Haig V. Agee, Joan R. M. Bullock
National Security Interests Vs. The First Amendment: Haig V. Agee, Joan R. M. Bullock
Journal Publications
In Haig v. Agee, the United States Supreme Court held that the Secretary of State has the authority to revoke a passport when the bearer's activities abroad "are causing or are likely to cause serious damage to the national security or the foreign policy of the United States." This note will examine the implications of Agee as a standard in resolving conflicts between national security and first amendment rights of the individual.