Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (7)
- Social and Behavioral Sciences (4)
- International Law (3)
- International Relations (2)
- International and Area Studies (2)
-
- Military, War, and Peace (2)
- National Security Law (2)
- Political Science (2)
- Public Affairs, Public Policy and Public Administration (2)
- Administrative Law (1)
- African Studies (1)
- Arts and Humanities (1)
- Asian Studies (1)
- Central American Studies (1)
- Civil Rights and Discrimination (1)
- Computer Engineering (1)
- Computer Law (1)
- Computer Sciences (1)
- Defense and Security Studies (1)
- Eastern European Studies (1)
- Electrical and Computer Engineering (1)
- Engineering (1)
- Food and Drug Law (1)
- Forensic Science and Technology (1)
- Human Rights Law (1)
- Information Security (1)
- International Humanitarian Law (1)
- Latin American Studies (1)
- Legal Studies (1)
- Military and Veterans Studies (1)
- Institution
Articles 1 - 8 of 8
Full-Text Articles in Entire DC Network
The R.F.I.D. Act Of 2006 And E-Pedigrees: Tackling The Problem Of Counterfeit Drugs In The United States Wholesale Industry, Suchira Ghosh
The R.F.I.D. Act Of 2006 And E-Pedigrees: Tackling The Problem Of Counterfeit Drugs In The United States Wholesale Industry, Suchira Ghosh
Michigan Telecommunications & Technology Law Review
Gaps within the drug distribution system make it increasingly vulnerable to bad actors, such as counterfeiters and terrorists. Congress intended the Prescription Drug Marketing Act (PDMA) of 1987 to close these gaps, but the PDMA has not fully succeeded. Important PDMA provisions that require tracking of drugs throughout the distribution chain in the form of "pedigrees" were set to be implemented as of Dec. 1, 2006, although a recent court order has stayed complete implementation. However, these PDMA requirements do not apply uniformly to all drug distributors in the United States. Moreover, since paper pedigrees can be forged, the pedigree …
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney
Journal of Digital Forensics, Security and Law
Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …
Practicing Globally: Extraterritorial Implications Of The Usa Patriot Act's Money-Laundering Provisions On The Ethical Requirements Of Us Lawyers In An International Environment, Pamella Seay
South Carolina Journal of International Law and Business
No abstract provided.
Let Privateers Marque Terrorism: A Proposal For A Reawakening, Robert P. Dewitte
Let Privateers Marque Terrorism: A Proposal For A Reawakening, Robert P. Dewitte
Indiana Law Journal
No abstract provided.
Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce
Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce
Human Rights & Human Welfare
“9/11 changed everything.” Not really. In fact, there has been far more continuity than change over the past six years in both international and domestic politics. Nonetheless, human rights often have been harmed—although not by terrorism but by “the war on terror.”
What's International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker
What's International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker
Michigan Journal of International Law
This Article describes a continuum of contemporary threats to U.S. national security, with a focus on nonstate terrorism. Part III addresses the role of intelligence and national security law, and in particular law addressed to process, in combating these threats. Good process advances the liberty and safety interests embodied in the concept of national security. Good process improves the quality of decision. It also enhances accountability, which in turn improves decision. Where good process is defined in law to include executive directive, it is better insulated from the immediate imperatives of secrecy and speed.
The Chilling Effect Of Government Surveillance Programs On The Use Of The Internet By Muslim-Americans, Dawinder S. Sidhu
The Chilling Effect Of Government Surveillance Programs On The Use Of The Internet By Muslim-Americans, Dawinder S. Sidhu
University of Maryland Law Journal of Race, Religion, Gender and Class
No abstract provided.
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston
Global Tides
Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …