Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in National Security Law

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim Apr 2018

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim

Indiana Law Journal

On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …


Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan Apr 2017

Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan

Penn State Journal of Law & International Affairs

No abstract provided.


Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell Mar 2017

Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell

Georgia State University Law Review

On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.

Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …


Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein Feb 2017

Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein

Life of the Law School (1993- )

No abstract provided.


Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein Jan 2017

Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein

Law School Blogs

No abstract provided.


Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky Jun 2016

Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky

Law School Blogs

No abstract provided.


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein Mar 2016

Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein

Life of the Law School (1993- )

No abstract provided.


Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …


Run For The Border: Laptop Searches And The Fourth Amendment, Nathan Alexander Sales Mar 2009

Run For The Border: Laptop Searches And The Fourth Amendment, Nathan Alexander Sales

University of Richmond Law Review

No abstract provided.


Emergency Federalism: Calling On The States In Perilous Times, Adam M. Giuliano Dec 2007

Emergency Federalism: Calling On The States In Perilous Times, Adam M. Giuliano

University of Michigan Journal of Law Reform

The attacks of September 11 prompted a historic debate concerning terrorism and domestic emergency response. This ongoing dialogue has driven policy decisions touching upon both liberty and security concerns. Yet despite the enormous effort that has gone into the national response, the role of the sovereign states, and with it federalism, has received comparatively little attention. This Article explores the relevance of federalism within the context of the "War on Terror" and in the aftermath of Hurricane Katrina. Acknowledging that theories of federalism developed elsewhere are insufficient, he outlines a doctrine of 'emergency federalism.' The author argues that the Framers …


Their Liberties, Our Security: Democracy And Double Standards, David Cole Jan 2003

Their Liberties, Our Security: Democracy And Double Standards, David Cole

Georgetown Law Faculty Publications and Other Works

Some maintain that a "double standard" for citizens and noncitizens is perfectly justified. The attacks of September 11 were perpetrated by nineteen Arab noncitizens, and we have reason to believe that other Arab noncitizens are associated with the attackers and will seek to attack again. Citizens, it is said, are presumptively loyal; noncitizens are not. Thus, it is not irrational to focus on Arab noncitizens. Moreover, on a normative level, if citizens and noncitizens were treated identically, citizenship itself might be rendered meaningless. The very essence of war involves the drawing of lines in the sand between citizens of our …