Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in National Security Law

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.


The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim Apr 2018

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim

Indiana Law Journal

On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …


Keynote Address: The Digital Forevermore, Thomas J. Ridge Mar 2017

Keynote Address: The Digital Forevermore, Thomas J. Ridge

University of Richmond Law Review

No abstract provided.


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Disappearing Government Information And The Internet's Public Domain, Susan Nevelow Mart Jan 2011

Disappearing Government Information And The Internet's Public Domain, Susan Nevelow Mart

Publications

This article surveys the types and amounts of information that have been removed from the Internet since September 11th. Information has been removed in the name of national security as well as for reasons of seeming political expediency. After discussing the bases of some of the rationales for removing the information, and the legal underpinnings of continued access, the article suggests several forms of advocacy that could be used to return the information to the public's domain.


Run For The Border: Laptop Searches And The Fourth Amendment, Nathan Alexander Sales Mar 2009

Run For The Border: Laptop Searches And The Fourth Amendment, Nathan Alexander Sales

University of Richmond Law Review

No abstract provided.


The Internet's Public Domain: Access To Government Information On The Internet, Susan Nevelow Mart Jan 2009

The Internet's Public Domain: Access To Government Information On The Internet, Susan Nevelow Mart

Publications

This article surveys the types and amounts of information that have been removed from the Internet since September 11th. Information has been removed in the name of national security as well as for reasons of seeming political expediency. After discussing the bases of some of the rationales for removing the information, and the legal underpinnings of continued access, the article suggests several forms of advocacy that could be used to return the information to the public's domain.


Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart Jan 2006

Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart

Publications

Ms. Mart examines the legal bases of the public's right to access government information, reviews the types of information that have recently been removed from the Internet, and analyzes the rationales given for the removals. She suggests that the concerted use of the Freedom of Information Act by public interest groups and their constituents is a possible method of returning the information to the Internet.