Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 13 of 13
Full-Text Articles in National Security Law
The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim
Indiana Law Journal
On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …
Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan
Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan
Penn State Journal of Law & International Affairs
No abstract provided.
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Civil Liberty Or National Security: The Battle Over Iphone Encryption, Karen Lowell
Georgia State University Law Review
On June 5, 2013, Edward Snowden released what would be the first of many documents exposing the vast breadth of electronic surveillance the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA) had been conducting on millions of United States citizens. Although the federal agencies had legal authority under the Foreign Intelligence Surveillance Act (FISA) to collect metadata from companies such as Verizon, many Americans considered this data collection to be a massive invasion of privacy.
Equipped with the knowledge of sweeping domestic surveillance programs, citizens and technology firms fighting for strong privacy and security protection, have started …
Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein
Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein
Life of the Law School (1993- )
No abstract provided.
Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein
Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein
Law School Blogs
No abstract provided.
Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law
Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky
Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky
Law School Blogs
No abstract provided.
13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law
13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein
Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein
Life of the Law School (1993- )
No abstract provided.
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …
Run For The Border: Laptop Searches And The Fourth Amendment, Nathan Alexander Sales
Run For The Border: Laptop Searches And The Fourth Amendment, Nathan Alexander Sales
University of Richmond Law Review
No abstract provided.
Emergency Federalism: Calling On The States In Perilous Times, Adam M. Giuliano
Emergency Federalism: Calling On The States In Perilous Times, Adam M. Giuliano
University of Michigan Journal of Law Reform
The attacks of September 11 prompted a historic debate concerning terrorism and domestic emergency response. This ongoing dialogue has driven policy decisions touching upon both liberty and security concerns. Yet despite the enormous effort that has gone into the national response, the role of the sovereign states, and with it federalism, has received comparatively little attention. This Article explores the relevance of federalism within the context of the "War on Terror" and in the aftermath of Hurricane Katrina. Acknowledging that theories of federalism developed elsewhere are insufficient, he outlines a doctrine of 'emergency federalism.' The author argues that the Framers …
Their Liberties, Our Security: Democracy And Double Standards, David Cole
Their Liberties, Our Security: Democracy And Double Standards, David Cole
Georgetown Law Faculty Publications and Other Works
Some maintain that a "double standard" for citizens and noncitizens is perfectly justified. The attacks of September 11 were perpetrated by nineteen Arab noncitizens, and we have reason to believe that other Arab noncitizens are associated with the attackers and will seek to attack again. Citizens, it is said, are presumptively loyal; noncitizens are not. Thus, it is not irrational to focus on Arab noncitizens. Moreover, on a normative level, if citizens and noncitizens were treated identically, citizenship itself might be rendered meaningless. The very essence of war involves the drawing of lines in the sand between citizens of our …