Constitutional Considerations of the Escrowed Encryption Standard

Total Page:16

File Type:pdf, Size:1020Kb

Constitutional Considerations of the Escrowed Encryption Standard DOCUMENT RESUME ED 392 080 CS 509 174 TITLE Proceedings of the Annual Meeting of the Association for Education in Journalism and Mass Communication (78th, Washington, DC, August 9-12, 1995). Law Division. INSTITUTION Association for Education in Journalism and Mass Communication. PUB DATE Aug 95 NOTE 422p.; For other sections of these proceedings, see CS 509 173-187 and CS 509 196. PUB TYPE Collected Works Conference Proceedings (021) EDRS PRICE MFOI/PC17 Plus Postage. DESCRIPTORS Censorship; *Constitutional Law; Copyrights; Higher Education; *Information Networks; Information Services; *Internet; *Journalism; Journalism Research; Legal Responsibility; *Libel and Slander; Mass Media Use; Online Systems; Universities IDENTIFIERS First Ar idment; *Journalists; Press Law; United States Constitution ABSTRACT The law section of the Proceedings contains the following 12 papers: "Constitutional Considerations of the Escrowed Encryption Standard" (Pat Bastian); "Exploring the Link between Source Credibility and Reputational Harm: Effects of Publication Type on Belief of Potentially Defamatory Statements"(Kenneth R. Blake); "Legislative Magic and the Leonard Law: Turning Private Universities into Public Entities" (Clay Calvert); "Technical Innovation Meets Economic and Financial Mohopoly: The Clear Channel Group and the Clear Channel Issue, 1934-1941" (James C. Foust); "Alachua Free-Net: Looking for the First Amendment at One Outpost on the Information Highway" (David R. Friedman and Matt Jackson); "Speakers' Rights in Private Forums: How the First Amendment Might Look on the Information Superhighway" (Michelle Johnion); "Retractions to Avoid Libel Suits: The Uniform Correction or Clarification of Defamation Act versus Tennessee Law" (Kelly C. Lockhart and Geoffrey Hull); "Who Belongs to the Pr;vileged Class? Journalistic Privilege for Non-Traditional Journalists" (Priscilla Coit Murphy); "Taming the Watchdog: Justice Byron White and the Repudiation of Press Privilege" (Alan Prendergast); "Anti-Abortion Political Ads: Balancing Questions of Indecency, Censorship, and Access" (Michael Spillman); "'Living Law' in the Newsroom: A Study of Social Influences" (Paul S. Voakes); and "When Copyright Law Silences Creativity: Digital Sampling and a Group Called 'Negativland" (Sylvia E. White). (CR) ********************************************************************** Reproductions supplied by EDRS are the best that can be made from the original document. *********************************************************************** PROCEEDINGS OF THE ANNUAL MEETING OF THE ASSOCIATION FOR EDUCATION IN JOURNALISM AND MASS COMMUNICATION (78th, Washington, DC, August 9-12, 1995).Law Division. U.S. DEPARTMENT OP EDUCATION 011.ce of EducalKmai Rim Imreh and Improvemont "PERMISSION TOREPRODUCE THIS EDUCATIONAL RESOURCES INFORMATION MATERIAL HAS BEEN CENTER (ERIC) GRANTED BY TnI3 document nes been reproduced es reCved from thill CWIWSOn Or organ/cation oroponahnp d 0 Mmor cnengos neve been mule to ornprowe rproductoon duality PonIS Or vl Or opmons stated on IN, doCu- mint do not nCruly rpritOrd Odra& TO THE EDUCATIONAL OE DI pOsitfOri or pohcy RESOURCES INFORMATION CENTER(ERIC).- ) BEST eOPY AVAILABLE CONSTITUTIONAL CONSIDERATIONS OF THE ESCROWED ENCRYPTION STANDARD Pat Bastian 2725 Vagabond Lane Plymouth, MN 55447 6AI CONSTITUTIONAL CONSIDERATIONS OF THE ESCROWED ENCRYPTION STANDARD Whether the computer revolution will be allowed to destroy what the American revolution won for us remains to be seen.' --- George B. Trubow I. INTRODUCTION Legal and political theorists, sociologists and philosophers have long-debated themerit of unconstrained speech. One perspective recognizes speechas a fundamental human need for self-expression; another considers the open marketplace of ideas crucial to the health of democracy. Regardless of the value of free speech-- individuality or community or a combination of the two-- the Bill of Rights provides a clear blueprint for expressive rights. Explicit freedoms of speech, press and assembly and the implicit right to privacyare based on these bedrock principles. Supreme Court interpretations of the First Amendment enjoin the government from prohibiting speech with which it disagrees'or restricting speech before its utterance' unless it has been established that such constraints wouldserve a narrowly-defined compelling government interest.In theory, at least, such principles would not vary with the method of communication. But in 1791, when the first ten amendments to the Constitutionwere written, communication was simpler than today. People spoke and wrote, listened and read. They chose the recipients of their communications and concealed private documents and confidential conversations behind locked doors. The Constitution guaranteed the collective rightto these Trubow, "The Fourth Amendment, Privacy, and Modern Technology; A Time for Reassessment," A Time for Choices, p.29 Texas v. Johnson, 491 U.S. 397 (1989) 3 Near v. Minnesota. 283 U.S. 697 (1931) 1 P. Bastian Escrowed Encryption Standard July, 1995 actions. Today the complications of electronic communication challenge these simple precepts. The abstraction of networked data transfer forces us to rethink traditional definitions of privacy, speech and publication. This paper will explore the controversial Escrowed Encryption Standard (EES), a federal plan to protect telephone and computer communications from illegal interception and to allow government access to these communications for surveillance.It will examine the plan's constitutional implications, with specific attention to the First, Fourth and Fifth Amendments. II. THE TECHNOLOGY EXPLOSION Twelve years ago Ithiel de So la Pool predicted a massive confluence of electronic communications systems in his prescient book, Technologies of Freedom: To serve the public, there will be networks on networks on networks. Separate nations will have networks, as they do now, but these will interconnect. Within nations, the satellite carriers, microwave cdrriers, and local carriers may be-- and in the United States almost certainly will bein the hands of separate organizations, but again, they will interconnect. So even the basic physical network will be a network of networks. And on top of these physical networks will be a pyramid of orvice networks. Through them will be published or delivered to the public a variety of things: movies, money, education, news, meetings, scientific data, manuscripts, petitions, and editorials.' Today we approach that vision. ARPAnet, the first generation of the Internet, was a 1969 experiment to connect the U.S. Defense Department communications in a system that de Sola Pool, Technologies of Freedom, p.227 2 P. Bastian Escrowed Encryption Standard July, 1995 could withstand partial outages (as in the case of nuclear attack).5It has since grown exponentially and now the Internet connects individuals and institutions educational, government, commercial and research -- worldwide.It began with four university computers. Today it is a global network of over three million host computers and 20 to 30 million individual computers' that is owned by no one. The Internet crosses and blurs the traditional lines between public and private fora, speech and press, cities, states and countries. As the massive networks on networks on networks has flourished, so has the diversity of participants. While the original ARPAnet was accessible only to scientists who had mastered arcane commands, today students, citiizens, and children in the mainstream population obtain information and communicate. Communication on the Internet takes many forms. Anyone with a computer, a modem, and a connection to the system may use one-to- many platforms to publish or participate in discussions. The same person may also use E-mail to communicate on a one-to-one basis. III. SECURITY One requirement that all computer users -- private, commercial and government agree upon is the need for security.In the physical world spaces are defined in tangible ways. 5 Gibbs and Smith, Navigating the Internet p.5. The Internet began in 1969 as ARPANET, a network of four computers at the Universities of Utah, California at Santa Barbara, California at Los Angeles, and Stanford Research Institute International. One of its goals was to develop flexible communications systems between computers for the government and the militny. 6 Press Release, The Internet Society, Aug. 5, 1994 6 P. Bastian Escrowed Encryption Standard July, 1995 Borders demarcate countries, fences enclose real property, walls contain homes and offices. We lock sensitive or personal documents in safes and choose the recipients ofour communication. Written correspondence is sealed and addressed; it is not postedon public bulletin boards. The times, places and manners of private conversations are designed to preclude intrusion. The cyberspace' equivalent of sealed envelopes is encryption. Encryption technology employs hardware and/or software to ensure that electronic communicationvoice and data is not intercepted by unwelcome and unintended parties. The technology permits communicators transmitting across telephone lines to encode conversations or data and permit only the intended recipient(s) to decode the message. As of November, 1993, there were approximately 200 non-U.S. and about 300 U.S.- based cryptographic products.'One product, Pretty Good Privacy (PGP), is considered uncrackable and is available to computer operators world-wide as a free, downloadable program.' The U.S.
Recommended publications
  • Send#6753 to the MEMBERS of the ACADEMIC COUNCIL FORTY-FIFTH SENATE REPORT No. 9 Summary of Actions Taken by the Senate May 2, 2
    SenD#6753 TO THE MEMBERS OF THE ACADEMIC COUNCIL FORTY-FIFTH SENATE REPORT No. 9 Summary of Actions Taken by the Senate May 2, 2013 At its meeting on Thursday, May 2, 2013, the Forty-fifth Senate of the Academic Council took the following actions. At the recommendation of the Board on Judicial Affairs, the Undergraduate Senate and the Graduate Student Council, the Faculty Senate approved by unanimous voice vote the amendment of the Student Judicial Charter of 1997 to incorporate the Alternative Review Process of 2013 as detailed in the two documents labeled SenD#6763. Rex Jamison Academic Secretary to the University Professor of Medicine, Emeritus May 2, 2013 Senate Minutes 1 SenD#6753 MINUTES OF THE FORTY-FIFTH SENATE OF THE ACADEMIC COUNCIL May 2, 2013 I. Call to Order The Vice Chair of the 45th Senate, David Palumbo-Liu, filling in for the Chair, Ray Levitt, who was ailing, called the first meeting of Spring Quarter to order at 3:15 PM. In attendance were 34 members, 6 ex officio members and many guests. Vice Chair Palumbo-Liu opened the session with an abundance of good news: “Please join me in congratulating Adam Johnson, Associate Professor of English, on his Pulitzer Prize for Fiction. [ Applause ] “Seven faculty members were recently elected to the Academy of Arts and Sciences: Arthur Bienenstock, Professor Emeritus of Materials Science and Applied Physics; Nicholas Bloom, Professor of Economics; Alan Code, the Ward W. and Priscilla B. Woods Professor in the School of Humanities and Sciences; David Dill, Professor of Computer Science; Simon Jackman, Professor of Political Science; Peter Michelson, Professor of Physics and chair of C-RES; and Suzanne Pfeffer, the Emma Pfeiffer Merner Professor in the Medical Sciences, School of Medicine.” [ Applause ] II.
    [Show full text]
  • Sogni Rubatirubati
    SogniSogni RubatiRubati © Di Jeff Hawkins, 2008. Tratto da http://counterfeitdreams.blogspot.com/ Traduzione in italiano © Simonetta Po per “Allarme Scientology” www.allarmescientology.it , 2009 Prefazione del traduttore Jeff Hawkins è stato staff della Chiesa di Scientology per 35 anni, la maggioranza dei quali in Sea Org. Per tutta la sua carriera si è occupato di promozione e marketing, ha tra l'altro lavorato, curato e diretto le riviste interne e ha progettato e lanciato alcune tra le campagne pubblicitarie di maggior successo della Chiesa di Scientology. Ha lavorato a Pubs WW a Edimburgo, partecipato al trasferimento a Copenhagen di quella che sarebbe diventata la New Era Publications, concluso la carriera a Golden Era Productions oltre a collaborazioni con Bridge Publications e ASI (Author Services Inc.) Il suo è un racconto dettagliato della vita di staff e mostra la schizofrenia delle decine e decine di organizzazioni Scientology, la loro farraginosa burocrazia, il complicato organigramma. Parla dell'indifferenza verso il vero merito del lavoro svolto, della follia delle "statistiche", di come venga premiata l'obbedienza piuttosto che la creatività e il buon senso, spesso messo da parte per compiacere i capi di turno. E di come, in definitiva, a vincere sia sempre l'ottusità, in quello che dovrebbe invece essere il regno per eccellenza della razionalità (caratteristica dell'Essere "chiarito" con la "tecnologia" di Hubbard) e dell'intelligenza al suo massimo livello. Ciononostante quello di Hawkins è un racconto pacato e sereno che non scade mai nel vittimismo, ma nemmeno nell'apologia. Con Hawkins si ripercorrono quattro decenni fondamentali per la storia della Chiesa di Scientology: gli anni della costituzione della Sea Org come organizzazione veramente "del mare", imbarcata sulla piccola flotta privata del "Commodoro".
    [Show full text]
  • July 1979 • Volume Iv • Number Vi
    THE FASTEST GROWING CHURCH IN THE WORLD by Brother Keith E. L'Hommedieu, D.D. quite safe tosay that ofall the organized religious sects on the current scene, one church in particular stands above all in its unique approach to religion. The Universal LifeChurch is the onlyorganized church in the world withno traditional religious doctrine. Inthe words of Kirby J. Hensley,founder, "The ULC only believes in what is right, and that all people have the right to determine what beliefs are for them, as long as Brother L 'Hommed,eu 5 Cfla,r,nan right ol the Board of Trusteesof the Sa- they do not interferewith the rights ofothers.' cerdotal Orderof the Un,versalL,fe andserves on the Board of O,rec- Reverend Hensley is the leader ofthe worldwide torsOf tOe fnternahOna/ Uns'ersaf Universal Life Church with a membership now L,feChurch, Inc. exceeding 7 million ordained ministers of all religious bileas well as payfor traveland educational expenses. beliefs. Reverend Hensleystarted the church in his NOne ofthese expenses are reported as income to garage by ordaining ministers by mail. During the the IRS. Recently a whole town in Hardenburg. New 1960's, he traveled all across the country appearing York became Universal Life ministers and turned at college rallies held in his honor where he would their homes into religious retreatsand monasteries perform massordinations of thousands of people at a thereby relieving themselves of property taxes, at time. These new ministers were then exempt from least until the state tries to figure out what to do. being inducted into the armed forces during the Churches enjoycertain othertax benefits over the undeclared Vietnam war.
    [Show full text]
  • Jazzletter 93023 April 1984 - Vol
    P.O. Box 24o Ojai, Calif. Jazzletter 93023 April 1984 - Vol. 3 No. 9» punishment oftheir users. They claim ofcourse to be motivated by The Road to Gadgets a deep and sensitive concern for the well-being of the artists. We The Federal Bureau of Investigation released, early in I984. some shall examine the sincerity ofthis posture. Even the industry‘s own interesting statistics. The number of violent crimes committed in brochures admit that a great deal of taping is done because so the United States in I983 dropped more sharply than at any time manyrecords are difficult or impossible to buy. as a result of the since the organization began keeping figures on them in I960. constant elimination of inventory. The industry has no interest in Serious crimes. including murder, rape, robbery. aggravated substantial and long-lasting music. Often the only way to get assault, burglary, larceny, and motor vehicle theft. were albums containing it is to tape them. In fact. artists end up taping dramatically down. The attorney general‘s office quickly claimed their own out-of-print albums for friends. ‘at some of the decline, which amounted to a respectable seven This brings us to a separate but pertinent subject. \-pBl'C€I"tl, was due to federal law enforcement efforts. But most thoughtful authorities-, including F. Lee Bailey, rejected that explanation for the good reason that these crimes are not federal offenses, and.not subject to FBI prosecution. What then caused Dogs in the Manger ~ the decline? Due to this penchant for fast turnover and maximal profits, the “Demographics play the most important role,” the Washington record companies cancel an album the moment sales fall below a Post said in an editorial.
    [Show full text]
  • Chapter 3: the Rise of the Antinuclear Power Movement: 1957 to 1989
    Chapter 3 THE RISE OF THE ANTINUCLEAR POWER MOVEMENT 1957 TO 1989 In this chapter I trace the development and circulation of antinuclear struggles of the last 40 years. What we will see is a pattern of new sectors of the class (e.g., women, native Americans, and Labor) joining the movement over the course of that long cycle of struggles. Those new sectors would remain autonomous, which would clearly place the movement within the autonomist Marxist model. Furthermore, it is precisely the widening of the class composition that has made the antinuclear movement the most successful social movement of the 1970s and 1980s. Although that widening has been impressive, as we will see in chapter 5, it did not go far enough, leaving out certain sectors of the class. Since its beginnings in the 1950s, opposition to the civilian nuclear power program has gone through three distinct phases of one cycle of struggles.(1) Phase 1 —1957 to 1967— was a period marked by sporadic opposition to specific nuclear plants. Phase 2 —1968 to 1975— was a period marked by a concern for the environmental impact of nuclear power plants, which led to a critique of all aspects of nuclear power. Moreover, the legal and the political systems were widely used to achieve demands. And Phase 3 —1977 to the present— has been a period marked by the use of direct action and civil disobedience by protesters whose goals have been to shut down all nuclear power plants. 3.1 The First Phase of the Struggles: 1957 to 1967 Opposition to nuclear energy first emerged shortly after the atomic bomb was built.
    [Show full text]
  • The Chronicle 75Th Year
    The Chronicle 75th Year. No. 52 Duke University, Durham, North Carolina Monday, November 12, 1979 - 4«N Greensboro march wet, but peaceful By Scott McCartney Party staged a peaceful funeral procession. GREENSBORO - funeral march yesterday According to Stuart Under the watchful eyes to bury five members of Kwoh, a spokesman for of 900 heavily-armed their party killed last week the CWP and a lawyer officers of the Greensboro in a shootout with the Ku from California, the group Police, the North Carolina Klux Klan. threatened the city with State Police and the five lawsuits. The CWP, which National Guard, 450 included members from Kwoh charged that the PHOTO BY SCOTT MCCARTNEY sympathizers from the police were blockading the Members of the Communist Workers Party assemble next to caskets of Communist Workers New York, Ohio and slain colleagues prior to yesterday's funeral march. Virginia, as well as from marchers from entering the Durham and the the march area, that Greensboro area, held the police were harrassing march "to avenge the demonstrators, and that death of the CWP Five," the city had reneged on a BSA meets with administration; according to its literature. previous agreement to allow widows of the five Officials in Greensboro slain men to bear Afro-American Studies discussed prepared for violence in unloaded rifles in "a the wake of last weekend's symbolic gesture." By Karen Dunn submitted several years earlier and that no effort had shootout between the The Black Student Alliance concluded a week of been made to procure the persons listed, Pye responded CWP and the Ku Klux Kwoh said the march activities Friday morning by.meeting with Chancellor "well then, the system needs to be examined and Klan.
    [Show full text]
  • Downloading of Movies, Television Shows and Other Video Programming, Some of Which Charge a Nominal Or No Fee for Access
    Table of Contents UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM 10-K (Mark One) ☒ ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE FISCAL YEAR ENDED DECEMBER 31, 2011 OR ☐ TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 FOR THE TRANSITION PERIOD FROM TO Commission file number 001-32871 COMCAST CORPORATION (Exact name of registrant as specified in its charter) PENNSYLVANIA 27-0000798 (State or other jurisdiction of (I.R.S. Employer Identification No.) incorporation or organization) One Comcast Center, Philadelphia, PA 19103-2838 (Address of principal executive offices) (Zip Code) Registrant’s telephone number, including area code: (215) 286-1700 SECURITIES REGISTERED PURSUANT TO SECTION 12(b) OF THE ACT: Title of Each Class Name of Each Exchange on which Registered Class A Common Stock, $0.01 par value NASDAQ Global Select Market Class A Special Common Stock, $0.01 par value NASDAQ Global Select Market 2.0% Exchangeable Subordinated Debentures due 2029 New York Stock Exchange 5.50% Notes due 2029 New York Stock Exchange 6.625% Notes due 2056 New York Stock Exchange 7.00% Notes due 2055 New York Stock Exchange 8.375% Guaranteed Notes due 2013 New York Stock Exchange 9.455% Guaranteed Notes due 2022 New York Stock Exchange SECURITIES REGISTERED PURSUANT TO SECTION 12(g) OF THE ACT: NONE Indicate by check mark if the Registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes ☒ No ☐ Indicate by check mark if the Registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act.
    [Show full text]
  • It's Not Just a Story Any More
    (reprinted with permission from The Guardian, 4 August 1979) It's not just a story any more The phrase 'China syndrome' describes what happens if a nuclear plant backfires. Walt Patterson casts a professional eye over the film of that name and finds it alarmingly accurate. At the end of The China Syndrome, if the house lights don't come up too soon, you may notice an inconspicuous line far down the credits. After Best Boy Grip and Paint Foreman comes Technical Advisers [Nuclear] … MHB Technical Associates. Nowhere else in the publicity pack from Columbia Pictures is there any further reference to the specific technical content of the film, or to the technical advisers responsible. The coyness is curious, but understandable. In The China Syndrome the technical content is of a very different order to that, say, in Moonraker. In Moonraker the technical content is there essentially to astonish; its genuine credibility is irrelevant. In The China Syndrome, on the contrary, the technical content is central to the plot – and is moreover acutely controversial. It is not now, mark you, as controversial as it was before March 28 this year. The China Syndrome, of course, is about – among other things – the threat of an accident at a nuclear power station. The accident at the Three Mile Island nuclear power station near Harrisburg, which occurred about a month after the release of the film, was a classical if unnerving example of life imitating art. When the film was released the nuclear industry was still talking about hypothetical accidents at nuclear stations.
    [Show full text]
  • Duke University Commencement ~ 2013
    Sunday, the Twelfth of May, Two Thousand and Thirteen ten o’clock in the morning ~ wallace wade stadium Duke University Commencement ~ 2013 One Hundred Sixty-First Commencement Notes on Academic Dress Academic dress had its origin in the Middle Ages. When the European universities were taking form in the thirteenth and fourteenth centuries, scholars were also clerics, and they adopted Mace and Chain of Office robes similar to those of their monastic orders. Caps were a necessity in drafty buildings, and copes or capes with hoods attached were Again at commencement, ceremonial use is needed for warmth. As the control of universities made of two important insignia given to Duke gradually passed from the church, academic University in memory of Benjamin N. Duke. costume began to take on brighter hues and to Both the mace and chain of office are the gifts employ varied patterns in cut and color of gown of anonymous donors and of the Mary Duke and type of headdress. Biddle Foundation. They were designed and executed by Professor Kurt J. Matzdorf of New The use of academic costume in the United Paltz, New York, and were dedicated and first States has been continuous since Colonial times, used at the inaugural ceremonies of President but a clear protocol did not emerge until an Sanford in 1970. intercollegiate commission in 1893 recommended a uniform code. In this country, the design of a The Mace, the symbol of authority of the gown varies with the degree held. The bachelor’s University, is made of sterling silver throughout. It is thirty-seven inches long and weighs about gown is relatively simple with long pointed Significance of Colors sleeves as its distinguishing mark.
    [Show full text]
  • Peter Thiel 47 a LONG RED SUNSET Harvey Klehr Reviews American Dreamers: How the Left COVER: K.J
    2011_10_03 postal_cover61404-postal.qxd 9/13/2011 9:21 PM Page 1 October 3, 2011 49145 $4.99 JAMES LILEKS on ‘the Perry Approach’ thethe eNDeND ofof thethe futurefuture PETER THIEL PLUS: TIMOTHY B. LEE: Patent Absurdity ALLISON SCHRAGER: In Defense of Financial Innovation ROB LONG: A Farewell to Steve Jobs $4.99 40 0 74820 08155 6 www.nationalreview.com base_milliken-mar 22.qxd 9/12/2011 2:50 PM Page 2 base_milliken-mar 22.qxd 9/12/2011 2:50 PM Page 3 toc_QXP-1127940144.qxp 9/14/2011 2:10 PM Page 2 Contents OCTOBER 3, 2011 | VOLUME LXIII, NO. 18 | www.nationalreview.com COVER STORY Page 28 Ramesh Ponnuru on Social Security Swift Blind p. 18 Horseman? BOOKS, ARTS There is no law that the & MANNERS exceptional rise of the West 40 THE MISSING MAN must continue. So we could do Matthew Continetti reviews Keeping worse than to inquire into the the Republic: Saving America by Trusting Americans, widely held opinion that America by Mitch Daniels. is on the wrong track, to wonder 42 BLESS THE BEASTS whether Progress is not doing Claire Berlinski reviews The Bond: as well as advertised, and Our Kinship with Animals, perhaps to take exceptional Our Call to Defend Them, by Wayne Pacelle. measures to arrest and reverse any decline. Peter Thiel 47 A LONG RED SUNSET Harvey Klehr reviews American Dreamers: How the Left COVER: K.J. HISTORICAL/CORBIS Changed a Nation, by Michael Kazin. ARTICLES 49 BUSH RECONSIDERED 18 SOCIAL SECURITY ALERT by Ramesh Ponnuru Quin Hillyer reviews The Man in Perry and Romney debate a program in need of reform.
    [Show full text]
  • A Contract Theory of Academic Freedom1 Philip
    SAINT LOUIS UNIVERSITY SCHOOL OF LAW A CONTRACT THEORY OF ACADEMIC FREEDOM1 PHILIP LEE* INTRODUCTION Academic freedom is central to the core role of professors in a free society. Yet, current First Amendment protections exist to protect academic institutions, not the academics themselves. For example, in Urofsky v. Gilmore, six professors employed by various public colleges and universities in Virginia challenged a law restricting state employees from accessing sexually explicit material on computers owned or leased by the state.2 The professors claimed, in part, that such a restriction was in violation of their First Amendment academic freedom rights to conduct scholarly research.3 The Fourth Circuit upheld the law and noted that “to the extent the Constitution recognizes any right of ‘academic freedom’ above and beyond the First Amendment rights to which every citizen is entitled, the right inheres in the University, not in individual professors, and is not violated by the terms of the Act.”4 In other words, this particular court held that academic freedom protects the institution as a whole, but not the individual professors. When other courts have decided to protect various scholarly activities through First Amendment principles, 1. A version of this Article appears in chapters 4–6 of PHILIP LEE, ACADEMIC FREEDOM AT AMERICAN UNIVERSITIES: CONSTITUTIONAL RIGHTS, PROFESSIONAL NORMS, AND CONTRACTUAL DUTIES (2015), published by Lexington Books. Professor Lee’s book also contains expanded discussions on the history of the American Association of University Professors, additional professorial freedom categories based on the First Amendment, and a related case study. * Assistant Professor of Law, David A.
    [Show full text]
  • Digitalization and Television Newspictures As Evidence and As Libel
    Loyola of Los Angeles Entertainment Law Review Volume 9 Number 2 Article 2 3-1-1989 One Technological Step forward and Two Legal Steps Back: Digitalization and Television Newspictures as Evidence and as Libel Don E. Tomlinson Follow this and additional works at: https://digitalcommons.lmu.edu/elr Part of the Law Commons Recommended Citation Don E. Tomlinson, One Technological Step forward and Two Legal Steps Back: Digitalization and Television Newspictures as Evidence and as Libel, 9 Loy. L.A. Ent. L. Rev. 237 (1989). Available at: https://digitalcommons.lmu.edu/elr/vol9/iss2/2 This Article is brought to you for free and open access by the Law Reviews at Digital Commons @ Loyola Marymount University and Loyola Law School. It has been accepted for inclusion in Loyola of Los Angeles Entertainment Law Review by an authorized administrator of Digital Commons@Loyola Marymount University and Loyola Law School. For more information, please contact [email protected]. ONE TECHNOLOGICAL STEP FORWARD AND TWO LEGAL STEPS BACK: DIGITALIZATION AND TELEVISION NEWSPICTURES AS EVIDENCE AND AS LIBEL* Don E. Tomlinson** I. Introduction ............................................. 237 II. History of Television Newspictures as Admissible Evidence ................................................ 241 III. The Relationship of Television Newspictures to Libel ..... 244 IV. From Analog to Digital: A Revolution in Television Technology .............................................. 249 V. Concerns About and Uses of Digitexed Television Newspictures ............................................ 252 VI. Possible New Life for False Light Privacy Invasion ........ 255 VII. Analysis and Conclusions ................................ 256 I. INTRODUCTION Digitalization, the technological revolution now taking place in tele- vision,' will have a profound impact on the admissibility of television newspictures as evidence,2 and on the status of television newspictures as * Parts of this article appeared in two earlier articles by the author.
    [Show full text]