Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Lincoln, The Constitution Of Necessity, And The Necessity Of Constitutions: A Reply To Professor Paulsen, Michael Kent Curtis Nov 2017

Lincoln, The Constitution Of Necessity, And The Necessity Of Constitutions: A Reply To Professor Paulsen, Michael Kent Curtis

Maine Law Review

The George W. Bush administration responded to the terrorist attacks of September 11th with far-reaching assertions of a vast commander-in-chief power that it has often insisted is substantially free of effective judicial or legislative checks. As Scott Shane wrote in the December 17, 2005 edition of the New York Times, "[f]rom the Government's detention of [American citizens with no or severely limited access to courts, and none to attorneys, families, or friends] as [alleged] 'enemy combatants' to the just disclosed eavesdropping in the United States without court warrants, the administration has relied on an unusually expansive interpretation of the president's …


Holding Supporters Of Terrorism Accountable: The Exercise Of General Jurisdiction Over The Pa And Plo In A Post-Daimler Framework, Mark D. Christopher Jun 2017

Holding Supporters Of Terrorism Accountable: The Exercise Of General Jurisdiction Over The Pa And Plo In A Post-Daimler Framework, Mark D. Christopher

Georgia Journal of International & Comparative Law

No abstract provided.


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan Apr 2017

Adrift At Sea: How The United States Government Is Forgoing The Fourth Amendment In The Prosecution Of Captured Terrorists, Frank Sullivan

Penn State Journal of Law & International Affairs

No abstract provided.


A Human Rights Perspective To Global Battlefield Detention: Time To Reconsider Indefinite Detention, Yuval Shany Mar 2017

A Human Rights Perspective To Global Battlefield Detention: Time To Reconsider Indefinite Detention, Yuval Shany

International Law Studies

This article discusses one principal challenge to detention without trial of suspected international terrorists—the international human rights law (IHRL) norm requiring the introduction of an upper limit on the duration of security detention in order to render it not indefinite in length. Part One of this article describes the “hardline” position on security detention, adopted by the United States in the immediate aftermath of the 9/11 terror attacks (followed, with certain variations, by other countries, including the United Kingdom and the State of Israel), according to which international terrorism suspects can be deprived of their liberty without trial for the …