Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Denver (2)
- University of Kentucky (2)
- William & Mary Law School (2)
- Brigham Young University Law School (1)
- Columbia Law School (1)
-
- Florida State University College of Law (1)
- Georgetown University Law Center (1)
- Maurer School of Law: Indiana University (1)
- Selected Works (1)
- UIC School of Law (1)
- US Army War College (1)
- University of Colorado Law School (1)
- University of Dayton (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Michigan Law School (1)
- University of Missouri School of Law (1)
- University of Washington School of Law (1)
- Keyword
-
- National security (3)
- Administrative law (2)
- Counterterrorism (2)
- Security (2)
- Terrorism (2)
-
- War on terror (2)
- 1933 (1)
- 9/11 (1)
- Access to government information (1)
- Accounting (1)
- Agency law (1)
- Airplane hijacking (1)
- Airport security (1)
- Antiterrorism Measures (1)
- Assassinations (1)
- Audit (1)
- Auditing (1)
- Banking (1)
- Banking crisis (1)
- Biological Weapons (1)
- Bombing (1)
- Burke (Edmond) (1)
- CIA (1)
- CIA v Sims (1)
- Client/server (1)
- Counterterrorist measures (1)
- Crisis (1)
- Cybersecurity (1)
- Cyberspace (1)
- Cybertrespass (1)
- Publication
-
- Faculty Scholarship (2)
- Human Rights & Human Welfare (2)
- William & Mary Environmental Law and Policy Review (2)
- Articles (1)
- Articles by Maurer Faculty (1)
-
- Brigham Young University Education and Law Journal (1)
- Faculty Publications (1)
- Florida State University Journal of Transnational Law & Policy (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Kentucky Law Journal (1)
- Law Faculty Scholarly Articles (1)
- Michigan Law Review (1)
- Publications (1)
- Ronald D. Rotunda (1)
- School of Law Faculty Publications (1)
- The US Army War College Quarterly: Parameters (1)
- UIC John Marshall Journal of Information Technology & Privacy Law (1)
- Publication Type
Articles 1 - 20 of 20
Full-Text Articles in Entire DC Network
Burkean Minimalism, Cass R. Sunstein
Burkean Minimalism, Cass R. Sunstein
Michigan Law Review
Burkean minimalism has long played an important role in constitutional law. Like other judicial minimalists, Burkeans believe in rulings that are at once narrow and theoretically unambitious; what Burkeans add is an insistence on respect for traditional practices and an intense distrust of those who would renovate social practices by reference to moral or political reasoning of their own. An understanding of the uses and limits of Burkean minimalism helps to illuminate a number of current debates, including those involving substantive due process, the Establishment Clause, and the power of the president to protect national security. Burkean minimalists oppose, and …
National Security And The Endangered Species Act: A Fresh Look At The Exemption Process And The Evolution Of Army Environmental Policy, Jason C. Wells
National Security And The Endangered Species Act: A Fresh Look At The Exemption Process And The Evolution Of Army Environmental Policy, Jason C. Wells
William & Mary Environmental Law and Policy Review
No abstract provided.
Beware Of Boldness, Conrad C. Crane
Beware Of Boldness, Conrad C. Crane
The US Army War College Quarterly: Parameters
No abstract provided.
Bioweapon Impacts On Public Health And The Environment, David Pimentel, Marcia Pimentel
Bioweapon Impacts On Public Health And The Environment, David Pimentel, Marcia Pimentel
William & Mary Environmental Law and Policy Review
No abstract provided.
State-Sponsored Crime: The Futility Of The Economic Espionage Act, Susan W. Brenner, Anthony C. Crescenzi
State-Sponsored Crime: The Futility Of The Economic Espionage Act, Susan W. Brenner, Anthony C. Crescenzi
School of Law Faculty Publications
The United States is facing an international challenge: economic espionage, the theft of our intellectual assets and proprietary information. The events of September 11, 2001, pushed the seriousness of this activity to the far recesses of the public’s consciousness. While this threat to our national security lacks the visceral impact of September 11, the long-term national security implications (a decline in economic competitiveness) stemming from the systemic theft of intellectual property has consequences no less serious than a real-world terrorist attack. Espionage targeting intellectual assets and proprietary information is driven by the international competition characterizing a global economy. Americans have …
Implementing The Usa Patriot Act: A Case Study Of The Student And Exchange Visitor Information System (Sevis), Kam C. Wong
Implementing The Usa Patriot Act: A Case Study Of The Student And Exchange Visitor Information System (Sevis), Kam C. Wong
Brigham Young University Education and Law Journal
No abstract provided.
Christina M. Cerna On The Torture Papers: The Road To Abu Ghraib. Edited By Karen J. Greenberg And Joshua L. Dratel. Cambridge, Ma: Cambridge University Press, 2005. 1249 Pp., Christina M. Cerna
Christina M. Cerna On The Torture Papers: The Road To Abu Ghraib. Edited By Karen J. Greenberg And Joshua L. Dratel. Cambridge, Ma: Cambridge University Press, 2005. 1249 Pp., Christina M. Cerna
Human Rights & Human Welfare
A review of:
The Torture Papers: The Road to Abu Ghraib. Edited by Karen J. Greenberg and Joshua L. Dratel. Cambridge, MA: Cambridge University Press, 2005. 1249 pp.
Examining The Declining Utility Of Military Force, Ali Wyne
Examining The Declining Utility Of Military Force, Ali Wyne
Human Rights & Human Welfare
A review of:
The New American Militarism: How Americans Are Seduced by War by Andrew J. Bacevich. Oxford: Oxford University Press, 2005. 270pp.
The People's Agent: Executive Branch Secrecy And Accountability In An Age Of Terrorism, Sidney A. Shapiro, Rena I. Steinzor
The People's Agent: Executive Branch Secrecy And Accountability In An Age Of Terrorism, Sidney A. Shapiro, Rena I. Steinzor
Faculty Scholarship
The increase in government secrecy is an important and troubling policy trend. Although the trend predates the 2000 presidential election, the movement towards government secrecy has accelerated dramatically in the Bush Administration. The case for open government is usually based on political principles embraced by the Framers of the U.S. Constitution. This article seeks to bolster these arguments by applying “agency theory” to the question of how much secrecy is too much. While agency theory is most often used to analyze private sector economic relationships, commentators have also applied it to the analysis of methods for holding legislators and Executive …
Domestic Surveillance And The Constitution, 24 J. Marshall J. Computer & Info. L. 177 (2006), Lawrence Friedman, René M. Landers
Domestic Surveillance And The Constitution, 24 J. Marshall J. Computer & Info. L. 177 (2006), Lawrence Friedman, René M. Landers
UIC John Marshall Journal of Information Technology & Privacy Law
This article argues that President Bush’s domestic electronic surveillance program is unconstitutional. The program allows the President to order the NSA to conduct surveillance of electronic communications, including communications involving United States citizens, without court order. The authors conclude that the President lacked the statutory or constitutional power to authorize such a program and that the program runs afoul to the letter and the spirit of the constitutional protection against unreasonable searches and seizures embraced by the Fourth Amendment of the United States Constitution. Congress and the President share overlapping constitutional authority in matters of foreign affairs and national security. …
Cia V. Sims: Mosaic Theory And Government Attitude, Christina E. Wells
Cia V. Sims: Mosaic Theory And Government Attitude, Christina E. Wells
Faculty Publications
In CIA v. Sims, the United States Supreme Court held that the CIA could withhold information about controversial government-sponsored psychological experiments in response to Freedom of Information Act (FOIA) requests. The Court reasoned that the requested information would reveal intelligence sources related to national defense, which were specifically protected from disclosure under the National Security Act of 1947. Accordingly, the Court concluded that the CIA could refuse to disclose the information under FOIA Exemption 3, which allows withholding of information “specifically exempted from disclosure by statute.” Numerous scholars assailed Sims, arguing that the Court's broad reading of the National Security …
Fear, Legal Indeterminacy, And The American Lawyering Culture, Michael Hatfield
Fear, Legal Indeterminacy, And The American Lawyering Culture, Michael Hatfield
Articles
On August 1, 2002, then Assistant Attorney General Jay S. Bybee signed for President Bush a memorandum of law concluding that some torture was not necessarily illegal if the President ordered it. This Essay examines how Bybee could arrive at a conclusion that is fundamentally at odds with both our national moral spirit and our law. In doing so, it cautions American lawyers to recognize the difference between what is "legal" and what is "arguably legal, " and to be aware of their own extra-legal biases when interpreting the law.
Transnational Shipments Of Nuclear Materials By Sea: Do Current Safeguards Provide Coastal States A Right To Deny Innocent Passage?, David B. Dixon
Transnational Shipments Of Nuclear Materials By Sea: Do Current Safeguards Provide Coastal States A Right To Deny Innocent Passage?, David B. Dixon
Florida State University Journal of Transnational Law & Policy
No abstract provided.
When Liberty And Security Collide: Foreign Policy Litigation And The Federal Judiciary, Kirk A. Randazzo
When Liberty And Security Collide: Foreign Policy Litigation And The Federal Judiciary, Kirk A. Randazzo
Kentucky Law Journal
No abstract provided.
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Articles by Maurer Faculty
No abstract provided.
Anglo-American Privacy And Surveillance, Laura K. Donohue
Anglo-American Privacy And Surveillance, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveillance since 9/11, as legal controls previously introduced to protect citizens’ privacy and to prevent the misuse of surveillance powers have been relaxed. What makes the situation qualitatively different now is not just the lowering of the bar: digitization and the rapid advancement of technology mean that the type and volume of information currently available eclipse that of previous generations. The issue is not confined to the United States. Despite the incorporation of the European Convention of Human Rights into British law, the United Kingdom also appears …
Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart
Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart
Publications
Ms. Mart examines the legal bases of the public's right to access government information, reviews the types of information that have recently been removed from the Internet, and analyzes the rationales given for the removals. She suggests that the concerted use of the Freedom of Information Act by public interest groups and their constituents is a possible method of returning the information to the Internet.
Self-Regulation For Safety And Security: Final Minutes Or Finest Hour?, Douglas C. Michael
Self-Regulation For Safety And Security: Final Minutes Or Finest Hour?, Douglas C. Michael
Law Faculty Scholarly Articles
The terrorist attacks of September 11, 2001, and the accounting and auditing crisis later caused by the Enron and Worldcom scandals of that same year, created a great sense of insecurity in many Americans. In this Article, I analyze the federal government's response to crisis. I first define what a crisis is: a sudden, existential threat to which the entity has insufficient resources to respond. I then explain how regulation for safety and security is unique in two aspects: perceptions matter, and the assistance of the regulated entities is essential. I proceed by describing and analyzing the regulatory history and …
Muslim Profiles Post-9/11: Is Racial Profiling An Effective Counterterrorist Measure And Does It Violate The Right To Be Free From Discrimination?, Bernard E. Harcourt
Muslim Profiles Post-9/11: Is Racial Profiling An Effective Counterterrorist Measure And Does It Violate The Right To Be Free From Discrimination?, Bernard E. Harcourt
Faculty Scholarship
Racial profiling as a defensive counterterrorism measure necessarily implicates a rights trade-off: if effective, racial profiling limits the right of young Muslim men to be free from discrimination in order to promote the security and well-being of others. Proponents of racial profiling argue that it is based on simple statistical fact and represents just smart law enforcement. Opponents of racial profiling, like New York City police commissioner Raymond Kelly, say that it is dangerous and just nuts.
As a theoretical matter, both sides are partly right. Racial profiling in the context of counterterrorism measures may increase the detection of terrorist …
The Detainee Cases Of 2004 And 2006 And Their Aftermath, Ronald D. Rotunda
The Detainee Cases Of 2004 And 2006 And Their Aftermath, Ronald D. Rotunda
Ronald D. Rotunda
The War on Terror, more than any other war, involves lawyers. For example, they track down terrorist funding, freeze bank funds, and engage in electronic surveillance. Even more significantly, those whom the military has captured are using the U.S. court system to seek release from their detention. While there are a few cases on this issue going back to the Civil War and World War II, the U.S. Supreme Court has issued major rulings on this question in the last few years. The media and those suing the Government claim that these cases have rejected and dealt severe blows to …