Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

National Security Law

Terrorism

Articles 1 - 30 of 30

Full-Text Articles in Entire DC Network

Newsletter, Winter 2022 Jan 2022

Newsletter, Winter 2022

Newsletter

No abstract provided.


The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan Jul 2020

The Changing Face Of Terrorism And The Designation Of Foreign Terrorist Organizations, Patrick J. Keenan

Indiana Law Journal

In this Article, I take up one slice of what should be a broad re-examination of

U.S. law and policy. I argue that the new attacks have been undertaken by entities

that can and should be designated as foreign terrorist organizations. Doing this would

permit prosecutors to target those who support these entities with tools that are not

currently available. This Article is both a doctrinal argument that directly addresses

the many legal hurdles that make designating groups, such as foreign hackers and

troll farms, terrorist organizations a complicated endeavor, and a policy argument

about how U.S. law and policy …


Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin Jan 2020

Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin

Articles by Maurer Faculty

תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …


Political Extremism And Domestic Terrorism In America, Mark Potok Apr 2019

Political Extremism And Domestic Terrorism In America, Mark Potok

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson Dec 2017

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological …


Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson Oct 2017

Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson

Articles

In this section: Congress Enacts Sanctions Legislation Targeting Russia • United States and Qatar Sign Memorandum of Understanding over Terrorism Financing • Trump Reverses Certain Steps Toward Normalizing Relations with Cuba • United States Announces Plans to Withdraw from Paris Agreement on Climate Change • President Trump Issues Trade-Related Executive Orders and Memoranda • United States, Russia, and Jordan Sign Limited Ceasefire for Syria • Trump Administration Recertifies Iranian Compliance with JCPOA Notwithstanding Increasing Concern with Iranian Behavior


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


The Identification And Exploitation Of Terrorist Financing, Jacob S. Gordon May 2016

The Identification And Exploitation Of Terrorist Financing, Jacob S. Gordon

Senior Honors Theses

Terrorism and the threat of terrorist attacks have forced the United States to place a high priority on developing a comprehensive counterterrorism strategy. A crucial component of this overarching strategy focuses on targeting the finances of a terrorist organization, hoping to eliminate or stifle their sources of funding in an effort to render the organization incapable of launching successful operations due to an absence of funding. By analyzing the most common financing options that terrorist groups use, the United States can hone its ability to disrupt the funding operations for terrorist groups. Likewise, developing a method for tracking the laundering …


Book Reviews, Usawc Press Dec 2015

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Law Of War Developments Issue Introduction, David Glazier Apr 2015

Law Of War Developments Issue Introduction, David Glazier

Loyola of Los Angeles Law Review

No abstract provided.


Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson Jan 2015

Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson

Articles

In this section: United States Objects to Russia’s Continued Violations of Ukraine’s Territorial Sovereignty, Including by Convoys Purporting to Provide Humanitarian Aid • United States and Afghanistan Sign Bilateral Security Agreement • United States Announces “Changes and Confirmations” in Its Interpretation of the UNConvention Against Torture • United States and China Make Joint Announcement to Reduce Greenhouse Gas Emissions, Bolstering Multilateral Climate Change Negotiations • United States Deepens Its Engagement with ISIL Conflict • NATO Affirms that Cyber Attacks May Trigger Collective Defense Obligations


The Trickle-Down War, Rosa Brooks Jan 2014

The Trickle-Down War, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …


Continued Oversight Of U.S. Government Surveillance Authorities : Hearing Before The S. Committee On The Judiciary, 113th Cong., December 11, 2013 (Statement By Professor Carrie F. Cordero, Geo. U. L. Center), Carrie F. Cordero Dec 2013

Continued Oversight Of U.S. Government Surveillance Authorities : Hearing Before The S. Committee On The Judiciary, 113th Cong., December 11, 2013 (Statement By Professor Carrie F. Cordero, Geo. U. L. Center), Carrie F. Cordero

Testimony Before Congress

My views are informed by this up-front perspective regarding how the USA PATRIOT Act of 2001, the Intelligence Reform and Terrorism Prevention Act of 2004, and later the FISA Amendments Act of 2008, vastly improved the Intelligence Community’s ability to protect the nation from another attack on the scale of September 11th. More recently, I have had the added benefit of having spent the past three years outside of government to reflect, and to engage with the academic community, and to some extent the public, regarding some of the issues this Committee is considering today.


Self-Defense Against Terrorists: The Meaning Of Armed Attack, Steven Ratner Jan 2013

Self-Defense Against Terrorists: The Meaning Of Armed Attack, Steven Ratner

Book Chapters

The last decade has witnessed increased recourse by states to military force to respond to terrorist attacks on their soil that have originated from abroad. A number of states -- including the United States -- have justified these military actions as lawful self-defense in response to an armed attack, as permitted under Article 51 of the United Nations Charter. These claims raise multiple interpretive questions about the meaning of "armed attack" under Article 51 and of the various options that are allowed in response to one. This essay explores the contemporary understanding of an "armed attack" in terms of an …


Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev Nov 2012

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev

San Diego International Law Journal

The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …


Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay Aug 2012

Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay

Security Studies & International Affairs - Daytona Beach

This article analyzes the phenomenon of homeland security through the development of four conceptual lenses that were created out of the existing literatures in criminal justice, public administration, organization behavior, risk management, international relations, and the overlap between them. Using terrorism as a proxy for the homeland security enterprise, these conceptual lenses include: (1) homeland security as a criminal justice problem which views terrorism as a crime; (2) homeland security as a international relations problem which views terrorism as a war; (3) homeland security as an organization design problem which views terrorism as a network of sub-state transnational actors; and …


Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole Jul 2012

Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole

Georgetown Law Faculty Publications and Other Works

Aziz Rana’s account of the takeover of American national security by experts, and of the public’s acceptance of that state of affairs, offers an important and novel perspective on what ails us in national security today. In this Comment, I suggest that while Rana is correct to identify our deference to experts as a central aspect of the problem, the problem is more complicated. First, the phenomenon of elite control over foreign and security policy questions is not new, but likely dates back to the founding—when elites ruled not based on expertise but on the basis of status, class, and …


Responses To The Five Questions, Charles J. Dunlap Jr. Jan 2012

Responses To The Five Questions, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Standing Our Ground: A Study Of Southeast Asian Counterterrorism Conventions Contributing To A Peaceful Existence, Major Dennis Hager Jul 2011

Standing Our Ground: A Study Of Southeast Asian Counterterrorism Conventions Contributing To A Peaceful Existence, Major Dennis Hager

University of Miami National Security & Armed Conflict Law Review

Less than a year after the September 11th attacks on New York and Washington D.C., terrorist groups in Southeast Asia carried out a number of high profile attacks in the region. In an area ripe for global terrorism the effects of counter‐terrorism conventions can be measured and the possibility of progress in the global war observed. The regional cooperation inherent in these conventions has been crucial to the success of peace for this region, and is especially significant considering the immense cultural and political differences among these nations.

With fourteen official languages and over 500 million people living in an …


Under Attack: Terrorism Risk Insurance Regulation, Alexia Brunet Marks Jan 2011

Under Attack: Terrorism Risk Insurance Regulation, Alexia Brunet Marks

Publications

Scholarly debates over the September 11th attacks focus predominantly on high-profile issues, such as torture, preventive detention, interrogation, privacy, and surveillance. These debates have overshadowed the equally important and far-reaching issue of terrorism risk insurance, which not only involves billions of dollars, but provides powerful incentives to keep us safe. Developing a sound understanding of the market for terrorism risk insurance is essential to guiding the difficult determination of the appropriate balance between private and public responsibility for preventing and (when necessary) compensating for terrorism.

The attacks of September 11th represented one of the costliest insurance events in American history. …


Responses To The Ten Questions, Charles J. Dunlap Jr. Jan 2011

Responses To The Ten Questions, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


The Perilous Dialogue, Laura K. Donohue Apr 2009

The Perilous Dialogue, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

The master metaphor in the national security dialogue is, indeed, “security or freedom”. It dominates the counterterrorist discourse both in the United States and abroad. Transcripts from debates in Ireland’s Dáil Éireann, Turkey’s Büyük Millet Meclisi, and Australia’s Parliament are filled with reference to the need to weigh the value of liberty against the threat posed by terrorism. Perhaps nowhere is this more pronounced than in the United Kingdom, where, for decades, counterterrorist debates have turned on this framing. Owing in part, though, to different constitutional structures, what “security or freedom” means in America differs from what it means in …


The Twenty Year Test: Principles For An Enduring Counterterrorism Legal Architecture, James E. Baker Jan 2008

The Twenty Year Test: Principles For An Enduring Counterterrorism Legal Architecture, James E. Baker

Georgetown Law Faculty Publications and Other Works

The United States faces three enduring terrorism-related threats. First, there is the realistic prospect of additional attacks in the United States including attacks using weapons of mass destruction (“WMD”). Second, in responding to this threat, we may undermine the freedoms that enrich our lives, the tolerance that marks our society, and the democratic values that define our government. Third, if we are too focused on terrorism, we risk losing sight of this century’s other certain threats as well as the capacity to respond to them, including the state proliferation of nuclear weapons, nation-state rivalry, pandemic disease, oil dependency, and environmental …


Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce Jan 2007

Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce

Human Rights & Human Welfare

“9/11 changed everything.” Not really. In fact, there has been far more continuity than change over the past six years in both international and domestic politics. Nonetheless, human rights often have been harmed—although not by terrorism but by “the war on terror.”


What’S International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker Jan 2007

What’S International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker

Georgetown Law Faculty Publications and Other Works

The United States faces an immediate and continuous threat of terrorist attack using weapons of mass destruction, including nuclear weapons. The intelligence function and national security law, including international law--or more accurately transnational law--are central to addressing this threat. Indeed, international law is more relevant today in addressing this threat than it was before September 11. Part II of this article describes a continuum of contemporary threats to U.S. national security, with a focus on nonstate terrorism. Part III addresses the role of intelligence and national security law, and in particular law addressed to process, in combating these threats. Part …


What's International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker Jan 2007

What's International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker

Michigan Journal of International Law

This Article describes a continuum of contemporary threats to U.S. national security, with a focus on nonstate terrorism. Part III addresses the role of intelligence and national security law, and in particular law addressed to process, in combating these threats. Good process advances the liberty and safety interests embodied in the concept of national security. Good process improves the quality of decision. It also enhances accountability, which in turn improves decision. Where good process is defined in law to include executive directive, it is better insulated from the immediate imperatives of secrecy and speed.


Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue Jan 2006

Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

This article adopts a two-tiered approach: it provides a detailed, historical account of anti-terrorist finance initiatives in the United Kingdom and United States—two states driving global norms in this area. It then proceeds to a critique of these laws. The analysis assumes—and accepts—the goals of the two states in adopting these provisions. It questions how well the measures achieve their aim. Specifically, it highlights how the transfer of money laundering tools undermines the effectiveness of the states' counterterrorist efforts—flooding the systems with suspicious activity reports, driving money out of the regulated sector, and using inappropriate metrics to gauge success. This …


Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue Jan 2006

Anti-Terrorist Finance In The United Kingdom And United States, Laura K. Donohue

Michigan Journal of International Law

This Article adopts a two-tiered approach: it provides a detailed, historical account of anti-terrorist finance initiatives in the United Kingdom and United States-two states driving global norms in this area. It then proceeds to a critique of these laws. The analysis assumes-and accepts-the goals of the two states in adopting these provisions. It questions how well the measures achieve their aim. Specifically, it highlights how the transfer of money laundering tools undermines the effectiveness of the states' counterterrorist efforts-flooding the systems with suspicious activity reports, driving money out of the regulated sector, and using inappropriate metrics to gauge success. This …


Catastrophic Terrorism- Thinking Fearfully, Acting Legally, Barry Kellman Jan 1999

Catastrophic Terrorism- Thinking Fearfully, Acting Legally, Barry Kellman

Michigan Journal of International Law

The time has come to move beyond howls of alarm to a public discussion of what policies should be adopted or reformed. That discussion should proceed even as crucial questions remain only partially answerable: How realistic is the possibility of catastrophic terrorism? How easy is it to make a catastrophic device that actually works? Why would any person or group want to kill hundreds, thousands, or tens of thousands of innocent victims?


Bellum Americanum: The U.S. View Of Twenty-First Century War And Its Possible Implications For The Law Of Armed Conflict, Michael N. Schmitt Jan 1998

Bellum Americanum: The U.S. View Of Twenty-First Century War And Its Possible Implications For The Law Of Armed Conflict, Michael N. Schmitt

Michigan Journal of International Law

After describing Bellum Americanum at some length, the article turns to the "stressors" it presents for the current law of armed conflict. The term stressors is used to suggest that law evolves as it is stressed by changing circumstances. Much as water seeks a constant level, law inevitably moves to fill normative lacunae. Correspondingly, law loses its normative valence when it no longer serves "community"-a relative concept-ends. Thus, law is contextual and directional. It is contextual in the sense that it is understood and applied based upon the specific social, economic, political, and military milieu in which it operates. …