Open Access. Powered by Scholars. Published by Universities.®

National Security Law Commons

Open Access. Powered by Scholars. Published by Universities.®

UIC John Marshall Journal of Information Technology & Privacy Law

Articles 1 - 4 of 4

Full-Text Articles in National Security Law

Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson Jan 2011

Stuxnet As Cyberwarfare: Applying The Law Of War To The Virtual Battlefield, 29 J. Marshall J. Computer & Info. L. 1 (2011), John Richardson

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


University Research Under Siege: How The War On Terror Has Placed Academic Freedom Under Fire, 26 J. Marshall J. Computer & Info. L. 547 (2009), James Templin Jan 2009

University Research Under Siege: How The War On Terror Has Placed Academic Freedom Under Fire, 26 J. Marshall J. Computer & Info. L. 547 (2009), James Templin

UIC John Marshall Journal of Information Technology & Privacy Law

The Comment analyzes the proposed revisions to United States export regulations contained in the Deemed Export Advisory Committee’s 2007 report. While the Advisory Committee’s work was much needed and its recommendations laudable, this comment discusses why its recommendations must be narrowly tailored in order to preserve the competitiveness of U.S. businesses and universities in the globalizing world and to advance national security. Part II explains the regulations that govern U.S. exports, including the deemed export regulatory regime and how those rules implement a range of national obligations and interests. This Part also discusses the events that threatened to significantly burden …


Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger Jan 2008

Safety Vs. Security: How Broad But Selective Public Access To Environmental Data Properly Balances Communities' Safety And Homeland Security, 25 J. Marshall J. Computer & Info. L. 273 (2008), Brad Schweiger

UIC John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Domestic Surveillance And The Constitution, 24 J. Marshall J. Computer & Info. L. 177 (2006), Lawrence Friedman, René M. Landers Jan 2006

Domestic Surveillance And The Constitution, 24 J. Marshall J. Computer & Info. L. 177 (2006), Lawrence Friedman, René M. Landers

UIC John Marshall Journal of Information Technology & Privacy Law

This article argues that President Bush’s domestic electronic surveillance program is unconstitutional. The program allows the President to order the NSA to conduct surveillance of electronic communications, including communications involving United States citizens, without court order. The authors conclude that the President lacked the statutory or constitutional power to authorize such a program and that the program runs afoul to the letter and the spirit of the constitutional protection against unreasonable searches and seizures embraced by the Fourth Amendment of the United States Constitution. Congress and the President share overlapping constitutional authority in matters of foreign affairs and national security. …