Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Dollar Unilateralism: The New Frontline Of National Security, Suzanne Katzenstein
Dollar Unilateralism: The New Frontline Of National Security, Suzanne Katzenstein
Indiana Law Journal
This Article makes three points. First, it draws attention to a profound shift toward “dollar unilateralism” by the U.S. government as it advances core national security goals. Relying on the special status of the U.S. dollar, the government has enlisted foreign banks to isolate targeted entities and track illicit financial flows. Second, drawing on examples such as Iran’s nuclear program, the Article identifies three formal and informal legal tactics the government has used to implement dollar unilateralism: financial sticks, high-profile blacklists, and direct diplomacy. Finally, the Article discusses the efficacy of dollar unilateralism and its implications for U.S. accountability. Dollar …
Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick
Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick
Indiana Law Journal
No abstract provided.
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …