Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in National Security Law

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen Jan 2014

Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen

Journal of Business & Technology Law

No abstract provided.


Wikileaks And The First Amendment, Geoffrey R. Stone May 2012

Wikileaks And The First Amendment, Geoffrey R. Stone

Federal Communications Law Journal

FCBA Distinguished Speaker Series

In November 2010, Julian Assange's WikiLeaks collaborated with major media organizations to release thousands of classified U.S. State Department documents. American soldier Bradley Manning stands accused of leaking those documents to the website. In response, Congress introduced the SHIELD Act to amend the Espionage Act of 1917, making it a crime for any person to disseminate any classified information concerning American intelligence or the identity of a classified informant. Such sweeping language, while possibly constitutional as applied to government employees like Manning, is plainly unconstitutional as applied to those like Assange and WikiLeaks who subsequently publish …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


A Soldier's Blog: Balancing Service Members' Personal Rights Vs. National Security Interests, Tatum H. Lytle Jun 2007

A Soldier's Blog: Balancing Service Members' Personal Rights Vs. National Security Interests, Tatum H. Lytle

Federal Communications Law Journal

This Note examines the competing interests between ensuring military personnel's freedom of speech while protecting national security interests. The Author recognizes the necessity of protecting national security interests but emphasizes that military personnel's rights to free speech must be protected as long as such speech poses no threat to military security. In conclusion, clearer protections must be implemented to protect military personnel's right to free speech.


Securing The Freedom Of The Communications Revolution, Michael K. Powell May 2005

Securing The Freedom Of The Communications Revolution, Michael K. Powell

Federal Communications Law Journal

No abstract provided.


Homeland Security And Wireless Telecommunications: The Continuing Evolution Of Regulation, Christopher Guttman-Mccabe, Amy Mushahwar, Patrick Murck May 2005

Homeland Security And Wireless Telecommunications: The Continuing Evolution Of Regulation, Christopher Guttman-Mccabe, Amy Mushahwar, Patrick Murck

Federal Communications Law Journal

Since the grant of the first Commercial Mobile Radio Service ("CMRS") license over twenty years ago, the wireless industry has grown from a service of convenience to one that is indispensable. What once was a device used for sporadic phone calls now is viewed by many Americans as a source of invaluable communication and security. As the wireless industry matured, government officials turned to the mobile phone as a way to make the United States safer. E-9 11, the Communications Assistance for Law Enforcement Act ("CALEA"), Wireless Priority Service ("WPS"), and Outage Reporting all were initiated on the wireless platform …