Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Entire DC Network

Counterterrorism Law And Policy In The United Kingdom, Canada, And Australia: A Comparative Perspective, Nadav Morag Jul 2023

Counterterrorism Law And Policy In The United Kingdom, Canada, And Australia: A Comparative Perspective, Nadav Morag

Journal of Strategic Security

This article looks at the similarities and differences in British, Canadian, and Australian counterterrorism laws and policies. Canada and Australia are contrasted with the United Kingdom because their respective approaches to counterterrorism are based on the British approach, and yet have evolved to take into account differences in the nature and scope of the threat and the differing styles of governance in place in Canada and Australia. The article looks at each country in the context of: counterterrorism laws; detention and disruption practices; investigatory approaches; intelligence and law enforcement institutions; and the treatment of foreign fighters. The article then draws …


Networks Of Threats: Interconnection, Interaction, Intermediation, Julien Theron Oct 2021

Networks Of Threats: Interconnection, Interaction, Intermediation, Julien Theron

Journal of Strategic Security

The rapidly changing global security environment requires to constantly adapt our understanding of threats. The findings of this paper confirm that threats interact with each other on three levels. Security, conflict, war, and strategic studies converge to build a new qualitative theoretical framework for threat analysis. Shaping the global security environment, threats communicate on three levels. Firstly, the interconnection of agents with similar ideological and/or strategic motivations connects threats. Secondly, interaction exacerbates incidental threats through cooperation, competition, and convergence. Thirdly, intermediation occurs between antagonistic threats trying to achieve common intermediary objectives. These networks are driven by agents maximizing their impact …


State Sponsored Radicalization, Sahar F. Aziz Sep 2021

State Sponsored Radicalization, Sahar F. Aziz

Michigan Journal of Race and Law

Where was the FBI in the months leading up to the violent siege on the U.S. Capitol in 2021? Among the many questions surrounding that historic day, this one reveals the extent to which double standards in law enforcement threaten our nation’s security. For weeks, Donald Trump’s far right-wing supporters had been publicly calling for and planning a protest in Washington, D.C. on January 6, the day Congress was to certify the 2021 presidential election results. Had they been following credible threats to domestic security, officials would have attempted to stop the Proud Boys and QAnon from breaching the Capitol …


Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel Ryan Kosloskey Jan 2012

Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel Ryan Kosloskey

West Virginia Law Review

No abstract provided.


Is Airline Passenger Profiling Necessary?, Timothy M. Ravich Oct 2007

Is Airline Passenger Profiling Necessary?, Timothy M. Ravich

University of Miami Law Review

No abstract provided.


Neutralizing The Threat: Reconsidering Existing Doctrines In The Emerging War On Terrorism, Frank A. Biggio Jan 2002

Neutralizing The Threat: Reconsidering Existing Doctrines In The Emerging War On Terrorism, Frank A. Biggio

Case Western Reserve Journal of International Law

No abstract provided.