Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Internet Law
Wikileaks And The First Amendment, Geoffrey R. Stone
Wikileaks And The First Amendment, Geoffrey R. Stone
Federal Communications Law Journal
FCBA Distinguished Speaker Series
In November 2010, Julian Assange's WikiLeaks collaborated with major media organizations to release thousands of classified U.S. State Department documents. American soldier Bradley Manning stands accused of leaking those documents to the website. In response, Congress introduced the SHIELD Act to amend the Espionage Act of 1917, making it a crime for any person to disseminate any classified information concerning American intelligence or the identity of a classified informant. Such sweeping language, while possibly constitutional as applied to government employees like Manning, is plainly unconstitutional as applied to those like Assange and WikiLeaks who subsequently publish …
Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham
Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham
Federal Communications Law Journal
On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …
Employer Liability For Employee Online Criminal Acts, Jeffrey S. Nowak
Employer Liability For Employee Online Criminal Acts, Jeffrey S. Nowak
Federal Communications Law Journal
While the computer and Internet have served as the foundation for a more efficient and effective workplace, they have also wreaked havoc on employers. Employees are increasingly using work-related time to enter the Information Superhighway to commit criminal acts upon third parties outside the employer’s business. Can an employer be held liable for such acts when they are committed using the employer’s computer and Internet system? While the doctrine of respondeat superior may shield employers from liability, the theory of negligent retention or supervision may allow injured parties a second bite at the employer liability apple. Because legislatures and courts …