Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Journal

2007

Terrorism

Discipline
Institution
Publication

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

The R.F.I.D. Act Of 2006 And E-Pedigrees: Tackling The Problem Of Counterfeit Drugs In The United States Wholesale Industry, Suchira Ghosh Jan 2007

The R.F.I.D. Act Of 2006 And E-Pedigrees: Tackling The Problem Of Counterfeit Drugs In The United States Wholesale Industry, Suchira Ghosh

Michigan Telecommunications & Technology Law Review

Gaps within the drug distribution system make it increasingly vulnerable to bad actors, such as counterfeiters and terrorists. Congress intended the Prescription Drug Marketing Act (PDMA) of 1987 to close these gaps, but the PDMA has not fully succeeded. Important PDMA provisions that require tracking of drugs throughout the distribution chain in the form of "pedigrees" were set to be implemented as of Dec. 1, 2006, although a recent court order has stayed complete implementation. However, these PDMA requirements do not apply uniformly to all drug distributors in the United States. Moreover, since paper pedigrees can be forged, the pedigree …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Jan 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Journal of Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


Practicing Globally: Extraterritorial Implications Of The Usa Patriot Act's Money-Laundering Provisions On The Ethical Requirements Of Us Lawyers In An International Environment, Pamella Seay Jan 2007

Practicing Globally: Extraterritorial Implications Of The Usa Patriot Act's Money-Laundering Provisions On The Ethical Requirements Of Us Lawyers In An International Environment, Pamella Seay

South Carolina Journal of International Law and Business

No abstract provided.


Let Privateers Marque Terrorism: A Proposal For A Reawakening, Robert P. Dewitte Jan 2007

Let Privateers Marque Terrorism: A Proposal For A Reawakening, Robert P. Dewitte

Indiana Law Journal

No abstract provided.


Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce Jan 2007

Human Rights And The War On Terror: Complete 2005 - 2007 Topical Research Digest, Jack Donnelly, Simon Amajuru, Susannah Compton, Robin Davey, Syd Dillard, Amanda Donahoe, Charles Hess, Sydney Fisher, Kelley Laird, Victoria Lowdon, Chris Maggard, Alexandra Nichols, Travis Ning, Toni Panetta, Greg Sanders, James Smithwick, Angela Woolliams, Chris Saeger, Sarah Bania-Dobyns, Eric Dibbern, David Gillespie, Latife Bulur, Katie Friesen, Arika Long, Arianna Nowakowski, Joel R. Pruce

Human Rights & Human Welfare

“9/11 changed everything.” Not really. In fact, there has been far more continuity than change over the past six years in both international and domestic politics. Nonetheless, human rights often have been harmed—although not by terrorism but by “the war on terror.”


What's International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker Jan 2007

What's International Law Got To Do With It? Transnational Law And The Intelligence Mission, James E. Baker

Michigan Journal of International Law

This Article describes a continuum of contemporary threats to U.S. national security, with a focus on nonstate terrorism. Part III addresses the role of intelligence and national security law, and in particular law addressed to process, in combating these threats. Good process advances the liberty and safety interests embodied in the concept of national security. Good process improves the quality of decision. It also enhances accountability, which in turn improves decision. Where good process is defined in law to include executive directive, it is better insulated from the immediate imperatives of secrecy and speed.


The Chilling Effect Of Government Surveillance Programs On The Use Of The Internet By Muslim-Americans, Dawinder S. Sidhu Jan 2007

The Chilling Effect Of Government Surveillance Programs On The Use Of The Internet By Muslim-Americans, Dawinder S. Sidhu

University of Maryland Law Journal of Race, Religion, Gender and Class

No abstract provided.


Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston Jan 2007

Influence In An Age Of Terror: A Framework Of Response To Islamist Influence Operations, John Deniston

Global Tides

Adversarial influence operations perpetrated by Islamist terrorist networks confront the most foundational of America’s national defense capabilities: the will of the American people to fight. This assertion is predicated on four key determinations. First, Islamist terrorist networks use influence operations as an integral tool of global jihad. Second, these adversarial influence operations should be perceived as attacks and, subsequently, should demand response. Third, a wide array of US Government tools and institutions currently exists to counter this challenge. Fourth, precision-strike doctrine and cyber-attack response frameworks provide instructional examples of methods to create a coordinated US Government response to such influence …