Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Law

Journal

Terrorism

Institution
Publication Year
Publication

Articles 1 - 30 of 50

Full-Text Articles in Entire DC Network

Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath Jan 2023

Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath

Pepperdine Law Review

The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …


Let The Machines Do The Dirty Work: Social Media, Machine Learning Technology And The Iteration Of Racialized Surveillance, Subhah Wadhawan Jan 2022

Let The Machines Do The Dirty Work: Social Media, Machine Learning Technology And The Iteration Of Racialized Surveillance, Subhah Wadhawan

Canadian Journal of Law and Technology

Post 9/11, where the current social and cultural temperature has constructed Islam as interchangeable with terrorism, digital intermediaries have responded with increased censorship of speech related to, emerging from, or advocating Islamic ideology. At the heart of this paper is the argument that digital intermediaries have relied on the opaqueness of machine learning technology (‘‘MLT”) to realize racialized surveillance, whereby speech concerning Islamic content has been disproportionally censored. This paper maps out how inherent biases concerning the ideology of Islam have been interwoven into the coding and machine learning used by the major tech giants. As a result of the …


Fear, Loathing, And The Hemispheric Consequences Of Xenophobic Hate, Ernesto Sagás, Ediberto Román Dec 2021

Fear, Loathing, And The Hemispheric Consequences Of Xenophobic Hate, Ernesto Sagás, Ediberto Román

University of Miami International and Comparative Law Review

“When you have fifteen thousand people marching up . . . how do you stop these people?” “You shoot them” [crowd member shouts] [chuckling, Trump responds:] “[O]nly in the Panhandle can you get away with that thing.”1
President Donald Trump

“Thousands of criminal aliens. They’re pouring into our country.”2
President Donald Trump

“They’re not people, these are animals.”3
President Donald Trump

“Take a look at the death and destruction that’s been caused by people coming into this country caused by people that shouldn’t be here.”4
President Donald Trump

“ [We] have millions and millions of people …


National Security Policymaking In The Shadow Of International Law, Laura T. Dickinson Oct 2021

National Security Policymaking In The Shadow Of International Law, Laura T. Dickinson

Utah Law Review

Scholars have long debated whether and how international law impacts governmental behavior, even in the absence of coercive sanction. But this literature does not sufficiently address the possible impact of international law in the area of national security policymaking. Yet, policies that the executive branch purports to adopt as a wholly discretionary matter may still be heavily influenced by international legal norms, regardless of whether or not those norms are formally recognized as legally binding. And those policies can be surprisingly resilient, even in subsequent administrations. Moreover, because they are only seen as discretionary policies, they may be more easily …


Late Xx Century – Early Xxi Century Geopolitical View Of The Asian Region, Rano Almamatovna Tuychiyeva May 2021

Late Xx Century – Early Xxi Century Geopolitical View Of The Asian Region, Rano Almamatovna Tuychiyeva

Scientific reports of Bukhara State University

Introduction. Describe the geopolitical structure of the Asian region - to cover political, economic, social, cultural and ethnic issues in East Asia, Southeast Asia (the main part of the Asia-Pacific region), South Asia, the Indian Ocean region, Central Asia and the Middle East. The number of dedicated scientific publications is significantly exceeding the number and volume of similar texts being written about other regions of the world. A review of Asian security shows that security concerns have spread throughout Asia. At the same time, such problems also have a significant negative impact on mutual economic, trade and investment relations. Research …


The Threat Of Terrorism To Power Grids: Effects Of Electromagnetic Pulses To The United States, Justin Van Dunk Jul 2020

The Threat Of Terrorism To Power Grids: Effects Of Electromagnetic Pulses To The United States, Justin Van Dunk

Liberty University Journal of Statesmanship & Public Policy

Terrorism’s roots can be traced back to the French Revolution.[1] Since 1789 terrorism has adopted many faces and its reach stretches throughout the world. Amidst the difficulty of defining terrorism, the FBI has given us the following definition, “…the unlawful use of…violence against persons…to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” (Gaines & Miller, 2013, p. 539).[2] Bombing, hijacking, arson, assault, kidnapping, and hostage-taking are just a few of the attack tactics utilized throughout terrorist organization. However, with continuing advancements in technology nations need to consider …


The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan Jul 2020

The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan

Indiana Law Journal

In this Article, I take up one slice of what should be a broad re-examination of

U.S. law and policy. I argue that the new attacks have been undertaken by entities

that can and should be designated as foreign terrorist organizations. Doing this would

permit prosecutors to target those who support these entities with tools that are not

currently available. This Article is both a doctrinal argument that directly addresses

the many legal hurdles that make designating groups, such as foreign hackers and

troll farms, terrorist organizations a complicated endeavor, and a policy argument

about how U.S. law and policy …


The Definition Of Terrorism, Duncan Gaswaga Feb 2020

The Definition Of Terrorism, Duncan Gaswaga

The International Journal of Ethical Leadership

No abstract provided.


Political Extremism And Domestic Terrorism In America, Mark Potok Apr 2019

Political Extremism And Domestic Terrorism In America, Mark Potok

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


International Civil Individual Responsibility And The Security Council: Building The Foundations Of A General Regime, Vincent-Joël Proulx Jan 2019

International Civil Individual Responsibility And The Security Council: Building The Foundations Of A General Regime, Vincent-Joël Proulx

Michigan Journal of International Law

This Article focuses on a few tools at the disposal of the United Nations Security Council (“UNSC”) to enhance individual (read: civil) responsibility concerning nonstate terrorist actors with a view to opening other avenues of inquiry regarding other subversive nonstate actors (“NSAs”), for instance in the areas of transnational torts, human rights (“HR”) violations, and environmental damage caused by business entities. As discussed in Part V, recent developments surrounding the application of the Alien Tort Claims Act (“ATCA”) in the United States and the prospect of establishing a basis for universal civil jurisdiction further signal that no such solid basis …


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman Apr 2016

Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman

South Carolina Law Review

No abstract provided.


Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar Apr 2016

Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar

South Carolina Law Review

No abstract provided.


Book Reviews, Usawc Press Dec 2015

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Remembering The Lessons Of 9/11: Preserving Tools And Authorities In The Fight Against Terrorism, Congressman Peter T. King Jul 2015

Remembering The Lessons Of 9/11: Preserving Tools And Authorities In The Fight Against Terrorism, Congressman Peter T. King

Journal of Legislation

As Chairman of the Subcommittee on Counterterrorism and Intelligence, a Member of the House Permanent Select Committee on Intelligence, and a Con- gressman from New York, 9/11 was a very personal experience that continues to resonate with me. I lost over 150 neighbors, friends and constituents on September 11th, but no one has a monopoly on grief. This issue went to the soul of the entire country, and touches our lives nearly 15 years later. That day forces us to acknowledge, whether some of us want to or not, that we have an unyielding enemy, vicious and bitter, that will …


The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker Apr 2015

The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker

Michigan Journal of International Law

Consider this sentence: “The Shining Path is a heroic organization.” Over the past thirty years, the Shining Path has waged a violent guerilla war against the Peruvian government, prompting the European Union to designate the group as a terrorist organization. In certain European countries, speech inciting or glorifying terrorist organizations is criminalized. As a result, citizens risk prosecution if they do not carefully limit what they say about the Shining Path, or other terrorist organizations. But where does free speech end and incitement to terrorism begin? The debate over free speech and incitement to terrorism is actively being played out …


Law Of War Developments Issue Introduction, David Glazier Apr 2015

Law Of War Developments Issue Introduction, David Glazier

Loyola of Los Angeles Law Review

No abstract provided.


The Nsa In Global Perspective: Surveillance, Human Rights, And International Counterterrorism, Peter Margulies Apr 2014

The Nsa In Global Perspective: Surveillance, Human Rights, And International Counterterrorism, Peter Margulies

Fordham Law Review

No abstract provided.


The Role Of Counterterrorism Law In Shaping Ad Bellum Norms For Cyber Warfare, William Banks Dec 2013

The Role Of Counterterrorism Law In Shaping Ad Bellum Norms For Cyber Warfare, William Banks

International Law Studies

No abstract provided.


Cyber War And International Law: Does The International Legal Process Constitute A Threat To U.S. Vital Interests?, John F. Murphy Dec 2013

Cyber War And International Law: Does The International Legal Process Constitute A Threat To U.S. Vital Interests?, John F. Murphy

International Law Studies

No abstract provided.


The Looming Threat Of Cyberterrorism Jan 2013

The Looming Threat Of Cyberterrorism

Maryland Carey Law

Technology has the ability to make gray what was once the black letter of the law.


Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev Nov 2012

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev

San Diego International Law Journal

The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …


Standing Our Ground: A Study Of Southeast Asian Counterterrorism Conventions Contributing To A Peaceful Existence, Major Dennis Hager Jul 2011

Standing Our Ground: A Study Of Southeast Asian Counterterrorism Conventions Contributing To A Peaceful Existence, Major Dennis Hager

University of Miami National Security & Armed Conflict Law Review

Less than a year after the September 11th attacks on New York and Washington D.C., terrorist groups in Southeast Asia carried out a number of high profile attacks in the region. In an area ripe for global terrorism the effects of counter‐terrorism conventions can be measured and the possibility of progress in the global war observed. The regional cooperation inherent in these conventions has been crucial to the success of peace for this region, and is especially significant considering the immense cultural and political differences among these nations.

With fourteen official languages and over 500 million people living in an …


After Osama Bin Laden: Assassination, Terrorism, War, And International Law, Louis Rene Beres Jan 2011

After Osama Bin Laden: Assassination, Terrorism, War, And International Law, Louis Rene Beres

Case Western Reserve Journal of International Law

No abstract provided.


Marginal Refuge: The Ramifications Of Terrorism For An Unsustainable United States Asylum Policy, Michael D. Yanovsky Sukenik Oct 2010

Marginal Refuge: The Ramifications Of Terrorism For An Unsustainable United States Asylum Policy, Michael D. Yanovsky Sukenik

University of Miami Law Review

No abstract provided.


The Terrorist Is A Star!: Regulating Media Coverage Of Publicity-Seeking Crimes, Michelle Ward Ghetti Jun 2008

The Terrorist Is A Star!: Regulating Media Coverage Of Publicity-Seeking Crimes, Michelle Ward Ghetti

Federal Communications Law Journal

Publicity-seeking crimes, including terrorism, almost by definition depend on the media for their effectiveness. Twenty-five years ago, when the bulk of this article was written, critics both within and outside the news industry had begun to voice an awareness, if not a concern, for the ease with which such criminals obtained publicity on both a national and international platform and it looked as if something might be done within the media establishments to thwart this manipulation of the press. Today, it is possible to look back and see that, in fact, nothing has been done and, so, individuals such as …


Sacred Violence: Religion And Terrorism, Jessie Hill, Adam F. Kimney Jan 2008

Sacred Violence: Religion And Terrorism, Jessie Hill, Adam F. Kimney

Case Western Reserve Journal of International Law

No abstract provided.


The R.F.I.D. Act Of 2006 And E-Pedigrees: Tackling The Problem Of Counterfeit Drugs In The United States Wholesale Industry, Suchira Ghosh Jan 2007

The R.F.I.D. Act Of 2006 And E-Pedigrees: Tackling The Problem Of Counterfeit Drugs In The United States Wholesale Industry, Suchira Ghosh

Michigan Telecommunications & Technology Law Review

Gaps within the drug distribution system make it increasingly vulnerable to bad actors, such as counterfeiters and terrorists. Congress intended the Prescription Drug Marketing Act (PDMA) of 1987 to close these gaps, but the PDMA has not fully succeeded. Important PDMA provisions that require tracking of drugs throughout the distribution chain in the form of "pedigrees" were set to be implemented as of Dec. 1, 2006, although a recent court order has stayed complete implementation. However, these PDMA requirements do not apply uniformly to all drug distributors in the United States. Moreover, since paper pedigrees can be forged, the pedigree …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Jan 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Journal of Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …