Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang Apr 2023

Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang

Articles

In the early 2000s, shortly before the September 11 attacks, Daniel J. Solove noted that computer databases in the United States were controlled by public as well as private bureaucracies. In that sense, Solove argued, the "Big Brother" metaphor "fails to capture the most important dimension of the database problem." In his 2008 Lockhart lecture, constitutional law scholar Jack M. Balkin argued that the United States has gradually transformed from a welfare and national security state to a National Surveillance State: "a new form of governance that features the collection, collation, and analysis of information about populations both in the …


Brief For Respondents, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Robert J. Tolchin Jan 2023

Brief For Respondents, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Robert J. Tolchin

Court Briefs

No abstract provided.


Brief In Opposition, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Daniel W. Weininger Aug 2022

Brief In Opposition, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Daniel W. Weininger

Court Briefs

No abstract provided.


The Limits Of The Freedom Act's Amicus Curiae, Chad Squitieri Oct 2015

The Limits Of The Freedom Act's Amicus Curiae, Chad Squitieri

Washington Journal of Law, Technology & Arts

The federal government’s power to engage in surveillance for national security purposes is extensive. In an effort to reform the current national surveillance regime, scholars have called for, among other things, the creation of a “special advocate” to counter the government’s arguments before the Foreign Intelligence Surveillance Court. Feeling political pressure to improve an ever-unpopular national surveillance regime, lawmakers passed the USA FREEDOM Act (“Freedom Act”). Section 401 of the Freedom Act provides for the creation of an “amicus curiae,” a position that differs from earlier conceptions of a “special advocate” in important respects. This Essay examines those differences, and …


The U.K. Supreme Court At War, Po Jen Yap Apr 2015

The U.K. Supreme Court At War, Po Jen Yap

Washington International Law Journal

This article contends that the underlying normative assumptions of civil libertarians and national security “executive unilateralists” are premised on a variant of the “nirvana fallacy.” In other words, civil libertarians generate a best-case scenario for rigorous judicial oversight over executive action during emergencies and compare it to the worst-case scenario for executive action; the reverse holds true for executive unilateralists. In practice, the Supreme Court of the United Kingdom has been cognizant of the institutional advantages and limitations of its office when it adjudicates national security disputes, and has not succumbed to the criticisms of scholars in either camp. Instead, …


Citizenship Perception Strain In Cases Of Crime And War: On Law And Intuition, Mary De Ming Fan Apr 2010

Citizenship Perception Strain In Cases Of Crime And War: On Law And Intuition, Mary De Ming Fan

Articles

The jurisprudence on crime and war has repeatedly indicated that citizenship matters in determining the scope and applicability of constitutional protections. Just how citizenship matters and what vision of the citizen controls have been murky, however. A rich literature has developed deploring how the nation and the jurisprudence have appeared to slip beneath the baseline of protections when faced with formal citizens who challenge our popular notions about what citizens look like, feel like, and do. What warrants further examination is why this may be so. Understanding the processes that may blur the doctrine and lead to slippage in citizenship …


Balancing Security And Growth: Defining National Security Review Of Foreign Investment In China, Eric Jensen Jan 2010

Balancing Security And Growth: Defining National Security Review Of Foreign Investment In China, Eric Jensen

Washington International Law Journal

One of the most recent steps in China’s slow march towards liberalization of foreign investment is the introduction of the 2006 Provisions on Acquisition of Domestic Enterprises by Foreign Investors (“2006 M&A Provisions”). Article 12 of this law provides new procedures for review and approval of foreign investment in China. China’s national security review of foreign direct investment has the same motivations as the United States’ Committee on Foreign Investment in the United States (CFIUS) review, but it is much murkier and less efficient. CFIUS is governed by numerous statutory and regulatory guidelines. China should integrate some of the CFIUS …


Common Ground In The Sky: Extending The 1967 Outer Space Treaty To Reconcile U.S. And Chinese Security Interests, Alex B. Englehart Jan 2008

Common Ground In The Sky: Extending The 1967 Outer Space Treaty To Reconcile U.S. And Chinese Security Interests, Alex B. Englehart

Washington International Law Journal

A storm is brewing 100 kilometers above the Pacific Rim. The early 21st century finds the People’s Republic of China in the throes of astronomical economic growth, national development, and military expansion. The United States, meanwhile, is staunchly determined to develop an effective missile defense system and to extend its military capabilities in space as it pursues its global war on terrorism. China sees U.S. military space activities as a threat and, along with Russia, has pushed hard in recent years for a ban on all space weapons. So far, the United States has been unwilling to negotiate on the …


The Immigration-Terrorism Illusory Correlation And Heuristic Mistake, Mary De Ming Fan Jan 2007

The Immigration-Terrorism Illusory Correlation And Heuristic Mistake, Mary De Ming Fan

Articles

The national broil over immigration reform is fermenting an illusory correlation and mistaken heuristic. Two events illustrate the involvement of legislators in the manufacture and mplification of this heuristic mistake. A controversial bill passed by the House of Representatives in December 2005 explicitly and extensively packaged immigration control with antiterrorism.' During his term as a congressman, J. D. Hayworth published a book claiming that inflows of people over the U.S.-Mexico border pose a "terrorist threat," that the nation has witnessed an "illegal alien crime spree," and that high immigration rates from Mexico threaten social instability.[para] Such pronouncements by legislators generate …


Fear, Legal Indeterminacy, And The American Lawyering Culture, Michael Hatfield Jan 2006

Fear, Legal Indeterminacy, And The American Lawyering Culture, Michael Hatfield

Articles

On August 1, 2002, then Assistant Attorney General Jay S. Bybee signed for President Bush a memorandum of law concluding that some torture was not necessarily illegal if the President ordered it. This Essay examines how Bybee could arrive at a conclusion that is fundamentally at odds with both our national moral spirit and our law. In doing so, it cautions American lawyers to recognize the difference between what is "legal" and what is "arguably legal, " and to be aware of their own extra-legal biases when interpreting the law.


Preemptive Strikes And The Korean Nuclear Crisis: Legal And Political Limitations On The Use Of Force, Kelly J. Malone May 2003

Preemptive Strikes And The Korean Nuclear Crisis: Legal And Political Limitations On The Use Of Force, Kelly J. Malone

Washington International Law Journal

On January 29, 2002, President George W. Bush linked North Korea, Iran and Iraq as members of an "Axis of Evil," alleging that North Korea's attempts to acquire weapons of mass destruction constituted a threat to international peace and security. On September 20, 2002, the Bush Administration released its National Security Strategy ("Strategy"). The Strategy adopted a doctrine of preemptive action that, although recognized historically, has been significantly limited by the U.N. Charter. In doing so, the Bush Administration has challenged traditional limits on the use of force, attempting to adapt the concept of "imminent threat" to the danger posed …


Durable Consent And A Strong Transitional Peacekeeping Plan: The Successes Of Untaet In Light Of The Lessons Learned In Cambodia, Dianne M. Criswell Jun 2002

Durable Consent And A Strong Transitional Peacekeeping Plan: The Successes Of Untaet In Light Of The Lessons Learned In Cambodia, Dianne M. Criswell

Washington International Law Journal

In 1999, East Timor voted for independence from Indonesia. That same year the United Nations Security Council created the United Nations Transitional Authority in East Timor ("UNTAET") to help East Timor transition to democracy, self-governance, and sustainable development. Seven years earlier, the United Nations launched a similar mission in Cambodia called the United Nations Transitional Authority in Cambodia ("UNTAC"). There are many similarities between East Timor and Cambodia, and both UNTAET and UNTAC are second-generation United Nations peacekeeping missions. UNTAC and UNTAET had similar mandates, including security, civil administration, and elections. UNTAC encountered opposition from the Cambodian parties, and consent …


The 1997 U.S.-Japan Defense Guidelines Under The Japanese Constitution And Their Implications For U.S. Foreign Policy, Chris Ajemian Mar 1998

The 1997 U.S.-Japan Defense Guidelines Under The Japanese Constitution And Their Implications For U.S. Foreign Policy, Chris Ajemian

Washington International Law Journal

The 1997 U.S.-Japan Defense Guidelines represent additional commitment by Japan to the U.S.-Japan security alliance, the primary source of Northeast Asian security and stability. Certain tasks within Japan's enhanced role raise questions of whether the Guidelines are compatible with Article 9 of Japan's Constitution. On its face, Article 9 renounces Japan's right to wage war or maintain military force, yet it has been interpreted to allow a defensively-oriented, though massive, military. Based on the existing interpretation of Article 9, it is likely that Japan will declare its new role under the Guidelines constitutional. U.S. policy toward Japan in the short-term …


The Role Of Arms Control In Strategic Nuclear Doctrine: Sdi, Mad, And The Abm Treaty, William A. Kinsel Oct 1987

The Role Of Arms Control In Strategic Nuclear Doctrine: Sdi, Mad, And The Abm Treaty, William A. Kinsel

Washington Law Review

To resolve the underlying doctrinal dispute, the United States must choose either to abandon SDI in favor of MAD, or vice versa. This choice is necessary because, as this Comment demonstrates, the two doctrines cannot be maintained simultaneously. Once this primary choice is made, the debate over the interpretation of the ABM Treaty resolves itself into the secondary question of whether to terminate the Treaty to allow effective pursuit of SDI, or to reaffirm that treaty to permit continued reliance on the doctrine of MAD as the basis of our nuclear deterrent. This Comment, after identifying the competing premises of …


The Supreme Court And National Security, Osmond K. Fraenkel Nov 1958

The Supreme Court And National Security, Osmond K. Fraenkel

Washington Law Review

The framers of the Constitution well understood that fear for the safety of the state might result in tyranny and injustice. In the 17th Century, England had had a spate of treason trials, many of them spurred by the notorious informer Titus Oates. In the 18th, John Wilkes' fight against general warrants had had its echoes in Massachusetts. The speech of James Otis on similar abuses was described by John Adams as the birth of the "child Independence." And France had yielded many instances by its use of the infamous lettres de cachet. No doubt these examples contributed to the …