Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Entire DC Network

The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan Jul 2020

The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan

Indiana Law Journal

In this Article, I take up one slice of what should be a broad re-examination of

U.S. law and policy. I argue that the new attacks have been undertaken by entities

that can and should be designated as foreign terrorist organizations. Doing this would

permit prosecutors to target those who support these entities with tools that are not

currently available. This Article is both a doctrinal argument that directly addresses

the many legal hurdles that make designating groups, such as foreign hackers and

troll farms, terrorist organizations a complicated endeavor, and a policy argument

about how U.S. law and policy …


Political Extremism And Domestic Terrorism In America, Mark Potok Apr 2019

Political Extremism And Domestic Terrorism In America, Mark Potok

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


Book Reviews, Usawc Press Dec 2015

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Law Of War Developments Issue Introduction, David Glazier Apr 2015

Law Of War Developments Issue Introduction, David Glazier

Loyola of Los Angeles Law Review

No abstract provided.


Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev Nov 2012

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev

San Diego International Law Journal

The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …


Standing Our Ground: A Study Of Southeast Asian Counterterrorism Conventions Contributing To A Peaceful Existence, Major Dennis Hager Jul 2011

Standing Our Ground: A Study Of Southeast Asian Counterterrorism Conventions Contributing To A Peaceful Existence, Major Dennis Hager

University of Miami National Security & Armed Conflict Law Review

Less than a year after the September 11th attacks on New York and Washington D.C., terrorist groups in Southeast Asia carried out a number of high profile attacks in the region. In an area ripe for global terrorism the effects of counter‐terrorism conventions can be measured and the possibility of progress in the global war observed. The regional cooperation inherent in these conventions has been crucial to the success of peace for this region, and is especially significant considering the immense cultural and political differences among these nations.

With fourteen official languages and over 500 million people living in an …


Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce Jan 2007

Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce

Human Rights & Human Welfare

“9/11 changed everything.” Not really. In fact, there has been far more continuity than change over the past six years in both international and domestic politics. Nonetheless, human rights often have been harmed—although not by terrorism but by “the war on terror.”


What's International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker Jan 2007

What's International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker

Michigan Journal of International Law

This Article describes a continuum of contemporary threats to U.S. national security, with a focus on nonstate terrorism. Part III addresses the role of intelligence and national security law, and in particular law addressed to process, in combating these threats. Good process advances the liberty and safety interests embodied in the concept of national security. Good process improves the quality of decision. It also enhances accountability, which in turn improves decision. Where good process is defined in law to include executive directive, it is better insulated from the immediate imperatives of secrecy and speed.


Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue Jan 2006

Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue

Michigan Journal of International Law

This Article adopts a two-tiered approach: it provides a detailed, historical account of anti-terrorist finance initiatives in the United Kingdom and United States-two states driving global norms in this area. It then proceeds to a critique of these laws. The analysis assumes-and accepts-the goals of the two states in adopting these provisions. It questions how well the measures achieve their aim. Specifically, it highlights how the transfer of money laundering tools undermines the effectiveness of the states' counterterrorist efforts-flooding the systems with suspicious activity reports, driving money out of the regulated sector, and using inappropriate metrics to gauge success. This …


Catastrophic Terrorism- Thinking Fearfully, Acting Legally, Barry Kellman Jan 1999

Catastrophic Terrorism- Thinking Fearfully, Acting Legally, Barry Kellman

Michigan Journal of International Law

The time has come to move beyond howls of alarm to a public discussion of what policies should be adopted or reformed. That discussion should proceed even as crucial questions remain only partially answerable: How realistic is the possibility of catastrophic terrorism? How easy is it to make a catastrophic device that actually works? Why would any person or group want to kill hundreds, thousands, or tens of thousands of innocent victims?


Bellum Americanum: The U.S. View Of Twenty-First Century War And Its Possible Implications For The Law Of Armed Conflict, Michael N. Schmitt Jan 1998

Bellum Americanum: The U.S. View Of Twenty-First Century War And Its Possible Implications For The Law Of Armed Conflict, Michael N. Schmitt

Michigan Journal of International Law

After describing Bellum Americanum at some length, the article turns to the "stressors" it presents for the current law of armed conflict. The term stressors is used to suggest that law evolves as it is stressed by changing circumstances. Much as water seeks a constant level, law inevitably moves to fill normative lacunae. Correspondingly, law loses its normative valence when it no longer serves "community"-a relative concept-ends. Thus, law is contextual and directional. It is contextual in the sense that it is understood and applied based upon the specific social, economic, political, and military milieu in which it operates. …