Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Law
Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary
Seattle Journal of Technology, Environmental, & Innovation Law
The aim of this article is to analyze and compare current events in the People's Republic of China and the United States to discuss the moral dilemmas that arise when establishing the boundary between national security interests and individual privacy rights. As we continue to intertwine our lives with technology, it has become increasingly important to establish clear privacy rights. The question then becomes: at what point should individuals sacrifice their rights for what the government considers the "greater good" of the country?
Further, this article analyzes the development of U.S. privacy law and its relationship to national security, technology, …
The Use And Abuse Of Domestic National Security Detention, Nicole Hallett
The Use And Abuse Of Domestic National Security Detention, Nicole Hallett
Seattle University Law Review
Are people convicted of terrorism-related offenses so dangerous that we must bend the Constitution to keep the public safe? Or should we treat them like people who commit other crimes—by prosecuting, convicting, sentencing, and then releasing them after they have served their criminal sentences? Can we trust the government to use the power to detain people without criminal charge without abusing it? The case of Adham Amin Hassoun raises these questions. Prosecuted after 9/11 for providing support to Muslims abroad in the 1990s, and sentenced under the United States’ expansive material support laws, Hassoun avoided a life sentence only to …