Day 5 – January 28

News

Coronavirus: Chinese hospitals in chaos as lockdown spreads to affect 33m people

This is a developing story. What would this look like in the US?

Assignment

Supplement, pp. 1-14

Chapter 5 to b. Implied Authorization by Defense Appropriation, p.  121.

Supplement pp. 14-35.

Day 4 – January 23

News

Apple dropped plan for encrypting backups after FBI complained

U.S. To Impose Visa Restrictions For Pregnant Women –  https://www.bloombergquint.com/politics/us-to-impose-visa-restrictions-for-pregnant-women

Assignment

Finish materials from last class. Read to p. 95, C. THE PRESIDENT’S EMERGENCY POWERS. Be sure to get the note for p. 80 from the supplement. (Make sure you have the supplement, the remainder of chapter 4 is in the supplement.

Read this short post on how prize money was divided. Prize money was paid to regular navy crews as well as privateers.

Guide – Chap – 4 (II)

Resources

Binney, Charles Chauncey. “The Latest Chapter of the American Law of Prize and Capture.” The American Law Register (1898-1907) 54.9 (1906): 537-549.

The history of prize money, which ended in 1905.

Instances of Use of United States Armed Forces Abroad, 1798-2018

 

Day 3 – January 21

News

The Guardian: Guantánamo: psychologists who designed CIA torture program to testify

Iran Conflict Could Shift To Cyberspace, Experts Warn

Assignment

Chapter 3

You read Youngstown in Constitutional law, so this should be familiar.

Chapter 4 to Zivotofsky ex rel. Zivotofsky v. Kerry (Zivotofsky II) p.71

Guide – Chap 3-4

Resources

Examples of Presidental national security directives and executive orders

50 U.S. Code CHAPTER 34—NATIONAL EMERGENCIES

Day 2 – January 16

News

The Impeachment Parade

Trump: Apple Needs to Unlock iPhones from Pensacola Shooter

Apple responds to AG Barr over unlocking Pensacola shooter’s phone: “No.”

If Russia Hacked Burisma, Brace for the Leaks to Follow

Voting machines

Surveillance Capitalism

Try to listen to this before class. One of the key threads to cybersecurity is the merger of private actors and state actors.

Experimental evidence of massive-scale emotional contagion through social networks

Just read the abstract. One of the key strategies for cyberterrorism is state manipulation of social media.

Class Information

Review the Class Information and Resources page.

Assignment

Chapter 1 & 2

Resources

Constitutional Powers

Congressional Powers

To declare War, grant Letters of Marque and Reprisal, and make Rules concerning Captures on Land and Water

Raise and support armies

The navy

Regulation of the military

Calling up the militia

Governing state militias

Presidential Powers

Commander in Chief

Ambiguous Powers

Habeas corpus

Day 1 – January 14

No Class – Football hangover day