Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Dollar Unilateralism: The New Frontline Of National Security, Suzanne Katzenstein Jan 2015

Dollar Unilateralism: The New Frontline Of National Security, Suzanne Katzenstein

Indiana Law Journal

This Article makes three points. First, it draws attention to a profound shift toward “dollar unilateralism” by the U.S. government as it advances core national security goals. Relying on the special status of the U.S. dollar, the government has enlisted foreign banks to isolate targeted entities and track illicit financial flows. Second, drawing on examples such as Iran’s nuclear program, the Article identifies three formal and informal legal tactics the government has used to implement dollar unilateralism: financial sticks, high-profile blacklists, and direct diplomacy. Finally, the Article discusses the efficacy of dollar unilateralism and its implications for U.S. accountability. Dollar …


Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick Jan 2015

Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick

Indiana Law Journal

No abstract provided.


Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle Jan 2015

Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle

Indiana Law Journal

Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …