Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Climate Security Insights From The Covid-19 Response, Mark Nevitt Apr 2023

Climate Security Insights From The Covid-19 Response, Mark Nevitt

Indiana Law Journal

The climate change crisis and COVID-19 crisis are both complex collective action problems. Neither the coronavirus nor greenhouse gas (GHG) emissions respect political borders. Both impose an opportunity cost that penalizes inaction. They are also increasingly understood as nontraditional, novel security threats. Indeed, COVID-19’s human cost is staggering, with American lives lost vastly exceeding those lost in recent armed conflicts. And climate change is both a threat accelerant and a catalyst for conflict—a characterization reinforced in several climate-security reports. To counter COVID-19, the President embraced martial language, stating that he will employ a “wartime footing” to “defeat the virus.” Perhaps …


The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan Jul 2020

The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan

Indiana Law Journal

In this Article, I take up one slice of what should be a broad re-examination of

U.S. law and policy. I argue that the new attacks have been undertaken by entities

that can and should be designated as foreign terrorist organizations. Doing this would

permit prosecutors to target those who support these entities with tools that are not

currently available. This Article is both a doctrinal argument that directly addresses

the many legal hurdles that make designating groups, such as foreign hackers and

troll farms, terrorist organizations a complicated endeavor, and a policy argument

about how U.S. law and policy …


The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim Apr 2018

The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim

Indiana Law Journal

On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …


Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia Jan 2018

Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia

Indiana Law Journal

Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal delivery device for malware, as users routinely launch unverified programs and forego virus detection. The illicit nature of the transaction forces users to rely almost entirely on the reputation of websites, uploaders, and other users to determine if a file is safe to download. …


Congressional Authorization Of The Campaign Against Isil, Tyler Salway Jan 2018

Congressional Authorization Of The Campaign Against Isil, Tyler Salway

Indiana Law Journal

I. THE BIRTH OF ISIL

II. CONGRESSIONAL AUTHORIZATION

A. EXPRESS AUTHORIZATION

1. METHODS OF INCLUSION

2. ISIL’S INCLUSION UNDER THE 9/11 AUMF

B. IMPLICIT AUTHORIZATION

III. ISIL AND THE TRUMP PRESIDENCY

CONCLUSION


Evading Constitutional Challenge: Dapa's Implications For Future Exercises Of Executive Enforcement Discretion, Lucy Chauvin Jan 2018

Evading Constitutional Challenge: Dapa's Implications For Future Exercises Of Executive Enforcement Discretion, Lucy Chauvin

Indiana Law Journal

I. UNITED STATES V. TEXAS: DEFINING THE BOUNDARIES OF ENFORCEMENT DISCRETION

A. DAPA AND THE CONSTITUTIONAL CHALLENGE

B. SCHOLARLY DEBATE: APPLICATION OF YOUNGSTOWN FRAMEWORK TO DAPA

II. TAKE CARE: CONFLICTING INTERPRETATIONS OF THE DUTY TO FAITHFULLY EXECUTE THE LAW

III. ENFORCEMENT DISCRETION: INTERACTION BETWEEN CONGRESS AND THE EXECUTIVE

A. HECKLER V. CHANEY: EARLY RECOGNITION OF EXECUTIVE ENFORCEMENT DISCRETION

B. ENFORCEMENT DISCRETION’S SPECIFIC APPLICATION TO IMMIGRATION LAW

C. THE MEANING OF “DEFERRED ACTION”

IV. THE HISTORICALLY LIMITED ROLE OF THE JUDICIARY

A. PRESUMPTIVE UNREVIEWABILITY

B. ADDITIONAL PROCEDURAL HURDLES

V. MOVING FORWARD: LESSONS TO BE LEARNED FROM THE OBAMA ADMINISTRATION

A. FRAMING …


Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin Jan 2018

Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin

Indiana Law Journal

The Article explains why addressing Too-Big-To-Fail 2.0 has not yet become a political and societal priority. First, digital service providers are technology companies, which, many believe, are shaped by market forces such that they fail and succeed in equal measure without producing negative ripple effects on the economy or society. Second, technology giants are not as carefully regulated as banks becauseunlike banks, they do not take insured deposits backed by the government. Third, even heavily regulated financial institutions have not been required until recently to focus on cybersecurity. Finally, some believe that there is no point in worrying about Too-Big-To-Fail …


The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman Jul 2016

The Two Faces Of The Foreign Intelligence Surveillance Court, Emily Berman

Indiana Law Journal

When former National Security Agency contractor Edward Snowden leaked a massive trove of information about secret intelligence-collection programs implemented under the Foreign Intelligence Surveillance Act in the summer of 2013, U.S. surveillance activities were thrust to the forefront of public debate. This debate included the question of whether and how to reform the Foreign Intelligence Surveillance Court (“FISA Court”), the statutorily created secret court that reviews government applications to conduct surveillance in the United States. This discussion, however, has underemphasized a critical feature of the way the FISA Court works. As this Article will show, since the terrorist attacks of …


Cook V. Nara Versus The Public’S Right To Know, Sarah Lamdan Jan 2016

Cook V. Nara Versus The Public’S Right To Know, Sarah Lamdan

Indiana Law Journal

In Cook v. National Archives and Records Administration , the court misapplied the Freedom of Information Act’s (FOIA) privacy exemption to hide presidential records, favoring secrecy over the public interest. The court set up a double standard by protecting George W. Bush and Richard Cheney’s library reference requests—even though, under laws created during the Bush administration, librarians would face possible prison sentences for refusing to turn over similar requests.

In 2013, a Gawker reporter named John Cook made a FOIA request to the National Archives and Records Administration (NARA) to get more information on “who’s digging through what in former …


To Loose The Bonds: The Deceptive Promise Of Freedom From Pretrial Immigration Detention, Denise L. Gilman Jan 2016

To Loose The Bonds: The Deceptive Promise Of Freedom From Pretrial Immigration Detention, Denise L. Gilman

Indiana Law Journal

Each year, the United States government detains more than 60,000 migrants who are eligible for release during immigration court proceedings that will determine their right to stay in the United States. Detention or release should be adjudicated through a custody determination process focused on the question of whether a mi-grant poses a flight risk or danger to the community. Yet, because the process skips the critical inquiry into the need for detention before setting monetary bond require-ments for release that are difficult to fulfill, freedom remains elusive.

The custody determination process is a cornerstone in the U.S. immigration de-tention edifice …


Lawyering Wars: Failing Leadership, Risk Aversion, And Lawyer Creep—Should We Expect More Lone Survivors?, Arthur Rizer Jul 2015

Lawyering Wars: Failing Leadership, Risk Aversion, And Lawyer Creep—Should We Expect More Lone Survivors?, Arthur Rizer

Indiana Law Journal

“We are a nation of laws, not men.” This motto—made famous by the Supreme Court case Marbury v. Madison1—has existed since the founding of the United States. This maxim embodies the sentiment that, in order to prevent tyranny, citizens should be governed by fixed law rather than the whims of a dictator. In his decision, Chief Justice John Marshall did not qualify his remarks by saying, “we are a nation of laws, except in time of war.” Indeed with the modern U.S. military, Cicero’s observation that “[l]aws are inoperative in war” has never been further from the truth. Never before …


Dollar Unilateralism: The New Frontline Of National Security, Suzanne Katzenstein Jan 2015

Dollar Unilateralism: The New Frontline Of National Security, Suzanne Katzenstein

Indiana Law Journal

This Article makes three points. First, it draws attention to a profound shift toward “dollar unilateralism” by the U.S. government as it advances core national security goals. Relying on the special status of the U.S. dollar, the government has enlisted foreign banks to isolate targeted entities and track illicit financial flows. Second, drawing on examples such as Iran’s nuclear program, the Article identifies three formal and informal legal tactics the government has used to implement dollar unilateralism: financial sticks, high-profile blacklists, and direct diplomacy. Finally, the Article discusses the efficacy of dollar unilateralism and its implications for U.S. accountability. Dollar …


Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick Jan 2015

Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick

Indiana Law Journal

No abstract provided.


Biometric Id Cybersurveillance, Margaret Hum Oct 2013

Biometric Id Cybersurveillance, Margaret Hum

Indiana Law Journal

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …