Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Balancing Liberty And Security: A Proposal For Amplified Procedural Due Process Protections In The U.S. Sanctions Regime, Allison Lofgren Oct 2022

Balancing Liberty And Security: A Proposal For Amplified Procedural Due Process Protections In The U.S. Sanctions Regime, Allison Lofgren

William & Mary Bill of Rights Journal

This Note will concentrate on procedural due process concerns stemming from the imposition of terrorist financing sanctions, and it will primarily discuss designated U.S. persons. This is a narrow focus, but it can be viewed as a microcosm for due process issues present throughout the broader IEEPA [International Emergency Economic Powers Act] regime. Ultimately, this Note will conclude that OFAC [Office of Foreign Assets Control]'s terrorist financing designation process inadequately protects the procedural due process rights of targets, and it will advocate for the implementation of additional procedural protections that balance undeniable constitutional requirements with the critical concern of national …


If You Think Ai Won't Eclipse Humanity, You're Probably Just A Human, Gary D. Brown Dec 2021

If You Think Ai Won't Eclipse Humanity, You're Probably Just A Human, Gary D. Brown

William & Mary Bill of Rights Journal

Building machines that can replicate human thinking and behavior has fascinated people for hundreds of years. Stories about robots date from ancient history through da Vinci to the present. Whether designed to save labor or lives, to provide companionship or protection, loyal, capable, productive machines are a dream of humanity.

The modern manifestation of this interest in using human-like technology to advance social interests is artificial intelligence (AI). This is a paper about what that interest in AI means and how it might develop in the world of national security.

This abstract has been adapted from the author's introduction.


Protecting The States From Electoral Invasions, Drew Marvel Jan 2020

Protecting The States From Electoral Invasions, Drew Marvel

William & Mary Bill of Rights Journal

Since the 2016 U.S. presidential election, the threat of foreign interference in U.S. elections has loomed large in the minds of the American public. During the 2016 campaign season, Russian government-backed hackers infiltrated the networks and computers of the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee (DCCC), and various campaign officials, harvesting private information and installing spyware and malware for ongoing intelligence purposes. U.S. intelligence officials have indicated that, using similar tactics, the Russian hackers also targeted election systems and officials in all fifty states, successfully breaching at least two of those states’ election systems, Illinois and Florida. …


Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn Dec 2017

Encryption, Asymmetric Warfare, And The Need For Lawful Access, Geoffrey S. Corn

William & Mary Bill of Rights Journal

No abstract provided.


The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey Kahn Dec 2017

The Unreasonable Rise Of Reasonable Suspicion: Terrorist Watchlists And Terry V. Ohio, Jeffrey Kahn

William & Mary Bill of Rights Journal

Terry v. Ohio’s “reasonable suspicion” test was created in the context of domestic law enforcement, but it did not remain there. This Essay examines the effect of transplanting this test into a new context: the world of terrorist watchlists. In this new context, reasonable suspicion is the standard used to authorize the infringement on liberty that often results from being watchlisted. But nothing else from the case that created that standard remains the same. The government official changes from a local police officer to an anonymous member of the intelligence community. The purpose changes from crime prevention to counterterrorism. …


Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison Dec 2017

Private Actors, Corporate Data And National Security: What Assistance Do Tech Companies Owe Law Enforcement?, Caren Morrison

William & Mary Bill of Rights Journal

When the government investigates a crime, do citizens have a duty to assist? This question was raised in the struggle between Apple and the FBI over whether the agency could compel Apple to defeat its own password protections on the iPhone of one of the San Bernardino shooters. That case was voluntarily dismissed as moot when the government found a way of accessing the data on the phone, but the issue remains unresolved.

Because of advances in technology, software providers and device makers have been able to develop almost impenetrable protection for their customers’ information, effectively locking law enforcement out …


Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu Dec 2017

Horizontal Cybersurveillance Through Sentiment Analysis, Margaret Hu

William & Mary Bill of Rights Journal

This Essay describes emerging big data technologies that facilitate horizontal cybersurveillance. Horizontal cybersurveillance makes possible what has been termed as “sentiment analysis.” Sentiment analysis can be described as opinion mining and social movement forecasting. Through sentiment analysis, mass cybersurveillance technologies can be deployed to detect potential terrorism and state conflict, predict protest and civil unrest, and gauge the mood of populations and subpopulations. Horizontal cybersurveillance through sentiment analysis has the likely result of chilling expressive and associational freedoms, while at the same time risking mass data seizures and searches. These programs, therefore, must be assessed as adversely impacting a combination …


The Lesser Of Two Evils: Exploring The Constitutionality Of Indefinite Detentions Of Terror Enemy Combatants Following The End Of “Combat Operations” In Afghanistan, Justin A. Thatch Jun 2016

The Lesser Of Two Evils: Exploring The Constitutionality Of Indefinite Detentions Of Terror Enemy Combatants Following The End Of “Combat Operations” In Afghanistan, Justin A. Thatch

William & Mary Bill of Rights Journal

No abstract provided.


#Tweeting For Terrorism: First Amendment Implications In Using Proterrorist Tweets To Convict Under The Material Support Statute, Abigail M. Pierce Oct 2015

#Tweeting For Terrorism: First Amendment Implications In Using Proterrorist Tweets To Convict Under The Material Support Statute, Abigail M. Pierce

William & Mary Bill of Rights Journal

No abstract provided.


A Liberal Communitarian Approach To Security Limitations On The Freedom Of The Press, Amitai Etzioni May 2014

A Liberal Communitarian Approach To Security Limitations On The Freedom Of The Press, Amitai Etzioni

William & Mary Bill of Rights Journal

No abstract provided.


Congress Has The Power To Enforce The Bill Of Rigths Against The Federal Government; Therefore Fisa Is Constitutional And The President's Terrorist Surveillance Program Is Illegal, Wilson R. Huhn Dec 2007

Congress Has The Power To Enforce The Bill Of Rigths Against The Federal Government; Therefore Fisa Is Constitutional And The President's Terrorist Surveillance Program Is Illegal, Wilson R. Huhn

William & Mary Bill of Rights Journal

The principal point of this Article is that Congress has plenary authority to enforce the Bill of Rights against the federal government. Although this precept is a fundamental one, neither the Supreme Court nor legal scholars have articulated this point in clear, simple, and direct terms. The Supreme Court does not have a monopoly on the Bill of Rights. Congress, too, has constitutional authority to interpret our rights and to enforce or enlarge them as against the actions of the federal government. Congress exercised its power to protect the constitutional rights of American citizens when it enacted the Foreign Intelligence …


The Role Of Article Iii Courts In The War On Terrorism, Tung Yin Apr 2005

The Role Of Article Iii Courts In The War On Terrorism, Tung Yin

William & Mary Bill of Rights Journal

No abstract provided.