Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Entire DC Network

Indefinite Detention And Antiterrorism Laws: Balancing Security And Human Rights, Joanne M. Sweeny Dec 2014

Indefinite Detention And Antiterrorism Laws: Balancing Security And Human Rights, Joanne M. Sweeny

Pace Law Review

This article does more than describe British and American anti-terrorism laws; it shows how those laws go through conflicted government branches and the bargains struck to create the anti-terrorism laws that exist today. Instead of taking these laws as given, this Article explains why they exist. More specifically, this article focuses on the path anti-terrorism legislation followed in the United States and the United Kingdom, with particular focus on each country’s ability (or lack thereof) to indefinitely detain suspected non-citizen terrorists. Both countries’ executives sought to have that power and both were limited by the legislatures and courts but in …


The Assumptions Behind The Assumptions In The War On Terror: Risk Assessment As An Example Of Foundational Disagreement In Counterterrorism Policy, Kenneth Anderson Jan 2008

The Assumptions Behind The Assumptions In The War On Terror: Risk Assessment As An Example Of Foundational Disagreement In Counterterrorism Policy, Kenneth Anderson

Articles in Law Reviews & Other Academic Journals

This 2007 article (based around an invited conference talk at Wayne State in early 2007) addresses risk assessment and cost benefit analysis as mechanisms in counterterrorism policy. It argues that although policy is often best pursued by agreeing to set aside deep foundational differences, in order to obtain a strategic plan for an activity such as counterterrorism, foundational differences must be addressed in order that policy not merely devolve into a policy minimalism that is always and damagingly tactical, never strategic, in order to avoid domestic democratic political conflict. The article takes risk assessment in counterterrorism, using cost benefit analysis, …


U.S. And U.K. Approaches To The War On Terror: The Surveillance Of Religious Worship, Jodie A. Kirschner Oct 2006

U.S. And U.K. Approaches To The War On Terror: The Surveillance Of Religious Worship, Jodie A. Kirschner

University of Miami International and Comparative Law Review

No abstract provided.


Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue Jan 2006

Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue

Michigan Journal of International Law

This Article adopts a two-tiered approach: it provides a detailed, historical account of anti-terrorist finance initiatives in the United Kingdom and United States-two states driving global norms in this area. It then proceeds to a critique of these laws. The analysis assumes-and accepts-the goals of the two states in adopting these provisions. It questions how well the measures achieve their aim. Specifically, it highlights how the transfer of money laundering tools undermines the effectiveness of the states' counterterrorist efforts-flooding the systems with suspicious activity reports, driving money out of the regulated sector, and using inappropriate metrics to gauge success. This …


Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue Jan 2006

Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

This article adopts a two-tiered approach: it provides a detailed, historical account of anti-terrorist finance initiatives in the United Kingdom and United States—two states driving global norms in this area. It then proceeds to a critique of these laws. The analysis assumes—and accepts—the goals of the two states in adopting these provisions. It questions how well the measures achieve their aim. Specifically, it highlights how the transfer of money laundering tools undermines the effectiveness of the states' counterterrorist efforts—flooding the systems with suspicious activity reports, driving money out of the regulated sector, and using inappropriate metrics to gauge success. This …