Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Internet Law

Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen Jan 2014

Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen

Journal of Business & Technology Law

No abstract provided.


Wikileaks And The First Amendment, Geoffrey R. Stone May 2012

Wikileaks And The First Amendment, Geoffrey R. Stone

Federal Communications Law Journal

FCBA Distinguished Speaker Series

In November 2010, Julian Assange's WikiLeaks collaborated with major media organizations to release thousands of classified U.S. State Department documents. American soldier Bradley Manning stands accused of leaking those documents to the website. In response, Congress introduced the SHIELD Act to amend the Espionage Act of 1917, making it a crime for any person to disseminate any classified information concerning American intelligence or the identity of a classified informant. Such sweeping language, while possibly constitutional as applied to government employees like Manning, is plainly unconstitutional as applied to those like Assange and WikiLeaks who subsequently publish …


Encryption Regulation In The Wake Of September 11, 2001: Must We Protect National Security At The Expense Of The Economy?, Matthew Parker Voors Mar 2003

Encryption Regulation In The Wake Of September 11, 2001: Must We Protect National Security At The Expense Of The Economy?, Matthew Parker Voors

Federal Communications Law Journal

This Note argues that although privacy and economic concerns have ruled the encryption debate during the past decade, the move toward increased privacy on the Internet and relaxed encryption regulation, designed to promote electronic commerce, comes at the expense of national security and the protection of Americans' safety. The Article begins with historical information about encryption and an examination of how businesses use encryption to secure their communications and financial transactions on the Internet. This Section also observes that this technology is employed by terrorist organizations to accomplish the same goal: to send private communications. The Author next details the …