Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Michigan Law School (7)
- University of Miami Law School (5)
- Maurer School of Law: Indiana University (4)
- U.S. Naval War College (4)
- Case Western Reserve University School of Law (3)
-
- Fordham Law School (3)
- University of South Carolina (3)
- Nova Southeastern University (2)
- University of Denver (2)
- University of Maryland Francis King Carey School of Law (2)
- Embry-Riddle Aeronautical University (1)
- Liberty University (1)
- Loyola Marymount University and Loyola Law School (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- New York Law School (1)
- Notre Dame Law School (1)
- Pace University (1)
- Pepperdine University (1)
- SJ Quinney College of Law, University of Utah (1)
- Saint Louis University School of Law (1)
- Schulich School of Law, Dalhousie University (1)
- US Army War College (1)
- University of San Diego (1)
- University of Tennessee, Knoxville (1)
- Villanova University Charles Widger School of Law (1)
- Publication Year
- Publication
-
- Michigan Journal of International Law (6)
- International Law Studies (4)
- Case Western Reserve Journal of International Law (2)
- Federal Communications Law Journal (2)
- Fordham Law Review (2)
-
- Human Rights & Human Welfare (2)
- ILSA Journal of International & Comparative Law (2)
- Indiana Law Journal (2)
- South Carolina Law Review (2)
- University of Miami International and Comparative Law Review (2)
- University of Miami National Security & Armed Conflict Law Review (2)
- Canadian Journal of Law and Technology (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- International Journal of Nuclear Security (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Legislation (1)
- Liberty University Journal of Statesmanship & Public Policy (1)
- Loyola of Los Angeles Law Review (1)
- Maryland Carey Law (1)
- Michigan Telecommunications & Technology Law Review (1)
- NYLS Law Review (1)
- Pace Intellectual Property, Sports & Entertainment Law Forum (1)
- Pepperdine Law Review (1)
- Saint Louis University Public Law Review (1)
- San Diego International Law Journal (1)
- Scientific reports of Bukhara State University (1)
- South Carolina Journal of International Law and Business (1)
- The International Journal of Ethical Leadership (1)
- The US Army War College Quarterly: Parameters (1)
- University of Maryland Law Journal of Race, Religion, Gender and Class (1)
Articles 1 - 30 of 50
Full-Text Articles in Entire DC Network
Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath
Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath
Pepperdine Law Review
The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …
Let The Machines Do The Dirty Work: Social Media, Machine Learning Technology And The Iteration Of Racialized Surveillance, Subhah Wadhawan
Let The Machines Do The Dirty Work: Social Media, Machine Learning Technology And The Iteration Of Racialized Surveillance, Subhah Wadhawan
Canadian Journal of Law and Technology
Post 9/11, where the current social and cultural temperature has constructed Islam as interchangeable with terrorism, digital intermediaries have responded with increased censorship of speech related to, emerging from, or advocating Islamic ideology. At the heart of this paper is the argument that digital intermediaries have relied on the opaqueness of machine learning technology (‘‘MLT”) to realize racialized surveillance, whereby speech concerning Islamic content has been disproportionally censored. This paper maps out how inherent biases concerning the ideology of Islam have been interwoven into the coding and machine learning used by the major tech giants. As a result of the …
Fear, Loathing, And The Hemispheric Consequences Of Xenophobic Hate, Ernesto Sagás, Ediberto Román
Fear, Loathing, And The Hemispheric Consequences Of Xenophobic Hate, Ernesto Sagás, Ediberto Román
University of Miami International and Comparative Law Review
“When you have fifteen thousand people marching up . . . how do you stop these people?” “You shoot them” [crowd member shouts] [chuckling, Trump responds:] “[O]nly in the Panhandle can you get away with that thing.”1
President Donald Trump
“Thousands of criminal aliens. They’re pouring into our country.”2
President Donald Trump
“They’re not people, these are animals.”3
President Donald Trump
“Take a look at the death and destruction that’s been caused by people coming into this country caused by people that shouldn’t be here.”4
President Donald Trump
“ [We] have millions and millions of people …
National Security Policymaking In The Shadow Of International Law, Laura T. Dickinson
National Security Policymaking In The Shadow Of International Law, Laura T. Dickinson
Utah Law Review
Scholars have long debated whether and how international law impacts governmental behavior, even in the absence of coercive sanction. But this literature does not sufficiently address the possible impact of international law in the area of national security policymaking. Yet, policies that the executive branch purports to adopt as a wholly discretionary matter may still be heavily influenced by international legal norms, regardless of whether or not those norms are formally recognized as legally binding. And those policies can be surprisingly resilient, even in subsequent administrations. Moreover, because they are only seen as discretionary policies, they may be more easily …
Late Xx Century – Early Xxi Century Geopolitical View Of The Asian Region, Rano Almamatovna Tuychiyeva
Late Xx Century – Early Xxi Century Geopolitical View Of The Asian Region, Rano Almamatovna Tuychiyeva
Scientific reports of Bukhara State University
Introduction. Describe the geopolitical structure of the Asian region - to cover political, economic, social, cultural and ethnic issues in East Asia, Southeast Asia (the main part of the Asia-Pacific region), South Asia, the Indian Ocean region, Central Asia and the Middle East. The number of dedicated scientific publications is significantly exceeding the number and volume of similar texts being written about other regions of the world. A review of Asian security shows that security concerns have spread throughout Asia. At the same time, such problems also have a significant negative impact on mutual economic, trade and investment relations. Research …
The Threat Of Terrorism To Power Grids: Effects Of Electromagnetic Pulses To The United States, Justin Van Dunk
The Threat Of Terrorism To Power Grids: Effects Of Electromagnetic Pulses To The United States, Justin Van Dunk
Liberty University Journal of Statesmanship & Public Policy
Terrorism’s roots can be traced back to the French Revolution.[1] Since 1789 terrorism has adopted many faces and its reach stretches throughout the world. Amidst the difficulty of defining terrorism, the FBI has given us the following definition, “…the unlawful use of…violence against persons…to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives.” (Gaines & Miller, 2013, p. 539).[2] Bombing, hijacking, arson, assault, kidnapping, and hostage-taking are just a few of the attack tactics utilized throughout terrorist organization. However, with continuing advancements in technology nations need to consider …
The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan
The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan
Indiana Law Journal
In this Article, I take up one slice of what should be a broad re-examination of
U.S. law and policy. I argue that the new attacks have been undertaken by entities
that can and should be designated as foreign terrorist organizations. Doing this would
permit prosecutors to target those who support these entities with tools that are not
currently available. This Article is both a doctrinal argument that directly addresses
the many legal hurdles that make designating groups, such as foreign hackers and
troll farms, terrorist organizations a complicated endeavor, and a policy argument
about how U.S. law and policy …
The Definition Of Terrorism, Duncan Gaswaga
The Definition Of Terrorism, Duncan Gaswaga
The International Journal of Ethical Leadership
No abstract provided.
Political Extremism And Domestic Terrorism In America, Mark Potok
Political Extremism And Domestic Terrorism In America, Mark Potok
University of Miami National Security & Armed Conflict Law Review
No abstract provided.
International Civil Individual Responsibility And The Security Council: Building The Foundations Of A General Regime, Vincent-Joël Proulx
International Civil Individual Responsibility And The Security Council: Building The Foundations Of A General Regime, Vincent-Joël Proulx
Michigan Journal of International Law
This Article focuses on a few tools at the disposal of the United Nations Security Council (“UNSC”) to enhance individual (read: civil) responsibility concerning nonstate terrorist actors with a view to opening other avenues of inquiry regarding other subversive nonstate actors (“NSAs”), for instance in the areas of transnational torts, human rights (“HR”) violations, and environmental damage caused by business entities. As discussed in Part V, recent developments surrounding the application of the Alien Tort Claims Act (“ATCA”) in the United States and the prospect of establishing a basis for universal civil jurisdiction further signal that no such solid basis …
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson
International Journal of Nuclear Security
Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.
Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …
Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton
Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton
Pace Intellectual Property, Sports & Entertainment Law Forum
Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …
Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman
Facebook V. Jefferson: How Our Emerging, Networked Society Undermines Ideas Of Security And Privacy, Roy Wyman
South Carolina Law Review
No abstract provided.
Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar
Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar
South Carolina Law Review
No abstract provided.
Book Reviews, Usawc Press
Book Reviews, Usawc Press
The US Army War College Quarterly: Parameters
No abstract provided.
Remembering The Lessons Of 9/11: Preserving Tools And Authorities In The Fight Against Terrorism, Congressman Peter T. King
Remembering The Lessons Of 9/11: Preserving Tools And Authorities In The Fight Against Terrorism, Congressman Peter T. King
Journal of Legislation
As Chairman of the Subcommittee on Counterterrorism and Intelligence, a Member of the House Permanent Select Committee on Intelligence, and a Con- gressman from New York, 9/11 was a very personal experience that continues to resonate with me. I lost over 150 neighbors, friends and constituents on September 11th, but no one has a monopoly on grief. This issue went to the soul of the entire country, and touches our lives nearly 15 years later. That day forces us to acknowledge, whether some of us want to or not, that we have an unyielding enemy, vicious and bitter, that will …
The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker
The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker
Michigan Journal of International Law
Consider this sentence: “The Shining Path is a heroic organization.” Over the past thirty years, the Shining Path has waged a violent guerilla war against the Peruvian government, prompting the European Union to designate the group as a terrorist organization. In certain European countries, speech inciting or glorifying terrorist organizations is criminalized. As a result, citizens risk prosecution if they do not carefully limit what they say about the Shining Path, or other terrorist organizations. But where does free speech end and incitement to terrorism begin? The debate over free speech and incitement to terrorism is actively being played out …
Law Of War Developments Issue Introduction, David Glazier
Law Of War Developments Issue Introduction, David Glazier
Loyola of Los Angeles Law Review
No abstract provided.
The Nsa In Global Perspective: Surveillance, Human Rights, And International Counterterrorism, Peter Margulies
The Nsa In Global Perspective: Surveillance, Human Rights, And International Counterterrorism, Peter Margulies
Fordham Law Review
No abstract provided.
The Role Of Counterterrorism Law In Shaping Ad Bellum Norms For Cyber Warfare, William Banks
The Role Of Counterterrorism Law In Shaping Ad Bellum Norms For Cyber Warfare, William Banks
International Law Studies
No abstract provided.
Cyber War And International Law: Does The International Legal Process Constitute A Threat To U.S. Vital Interests?, John F. Murphy
Cyber War And International Law: Does The International Legal Process Constitute A Threat To U.S. Vital Interests?, John F. Murphy
International Law Studies
No abstract provided.
The Looming Threat Of Cyberterrorism
The Looming Threat Of Cyberterrorism
Maryland Carey Law
Technology has the ability to make gray what was once the black letter of the law.
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
San Diego International Law Journal
The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …
Standing Our Ground: A Study Of Southeast Asian Counterterrorism Conventions Contributing To A Peaceful Existence, Major Dennis Hager
Standing Our Ground: A Study Of Southeast Asian Counterterrorism Conventions Contributing To A Peaceful Existence, Major Dennis Hager
University of Miami National Security & Armed Conflict Law Review
Less than a year after the September 11th attacks on New York and Washington D.C., terrorist groups in Southeast Asia carried out a number of high profile attacks in the region. In an area ripe for global terrorism the effects of counter‐terrorism conventions can be measured and the possibility of progress in the global war observed. The regional cooperation inherent in these conventions has been crucial to the success of peace for this region, and is especially significant considering the immense cultural and political differences among these nations.
With fourteen official languages and over 500 million people living in an …
After Osama Bin Laden: Assassination, Terrorism, War, And International Law, Louis Rene Beres
After Osama Bin Laden: Assassination, Terrorism, War, And International Law, Louis Rene Beres
Case Western Reserve Journal of International Law
No abstract provided.
Marginal Refuge: The Ramifications Of Terrorism For An Unsustainable United States Asylum Policy, Michael D. Yanovsky Sukenik
Marginal Refuge: The Ramifications Of Terrorism For An Unsustainable United States Asylum Policy, Michael D. Yanovsky Sukenik
University of Miami Law Review
No abstract provided.
The Terrorist Is A Star!: Regulating Media Coverage Of Publicity-Seeking Crimes, Michelle Ward Ghetti
The Terrorist Is A Star!: Regulating Media Coverage Of Publicity-Seeking Crimes, Michelle Ward Ghetti
Federal Communications Law Journal
Publicity-seeking crimes, including terrorism, almost by definition depend on the media for their effectiveness. Twenty-five years ago, when the bulk of this article was written, critics both within and outside the news industry had begun to voice an awareness, if not a concern, for the ease with which such criminals obtained publicity on both a national and international platform and it looked as if something might be done within the media establishments to thwart this manipulation of the press. Today, it is possible to look back and see that, in fact, nothing has been done and, so, individuals such as …
Sacred Violence: Religion And Terrorism, Jessie Hill, Adam F. Kimney
Sacred Violence: Religion And Terrorism, Jessie Hill, Adam F. Kimney
Case Western Reserve Journal of International Law
No abstract provided.
The R.F.I.D. Act Of 2006 And E-Pedigrees: Tackling The Problem Of Counterfeit Drugs In The United States Wholesale Industry, Suchira Ghosh
The R.F.I.D. Act Of 2006 And E-Pedigrees: Tackling The Problem Of Counterfeit Drugs In The United States Wholesale Industry, Suchira Ghosh
Michigan Telecommunications & Technology Law Review
Gaps within the drug distribution system make it increasingly vulnerable to bad actors, such as counterfeiters and terrorists. Congress intended the Prescription Drug Marketing Act (PDMA) of 1987 to close these gaps, but the PDMA has not fully succeeded. Important PDMA provisions that require tracking of drugs throughout the distribution chain in the form of "pedigrees" were set to be implemented as of Dec. 1, 2006, although a recent court order has stayed complete implementation. However, these PDMA requirements do not apply uniformly to all drug distributors in the United States. Moreover, since paper pedigrees can be forged, the pedigree …
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Journal of Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …