Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Journal

Terrorism

Discipline
Institution
Publication Year
Publication

Articles 61 - 72 of 72

Full-Text Articles in Entire DC Network

Turning The Tables: Using The Government’S Secrecy And Security Arsenal For The Benefit Of The Client In Terrorism Prosecutions, Sam A. Schmidt, Joshua L. Dratel Jan 2004

Turning The Tables: Using The Government’S Secrecy And Security Arsenal For The Benefit Of The Client In Terrorism Prosecutions, Sam A. Schmidt, Joshua L. Dratel

NYLS Law Review

No abstract provided.


Terrorism And The Law (Yonah Alexander And Edgar H. Brenner, Eds., Transnational Publishers 2001). , Fara Gold Oct 2003

Terrorism And The Law (Yonah Alexander And Edgar H. Brenner, Eds., Transnational Publishers 2001). , Fara Gold

University of Miami International and Comparative Law Review

No abstract provided.


Encryption Regulation In The Wake Of September 11, 2001: Must We Protect National Security At The Expense Of The Economy?, Matthew Parker Voors Mar 2003

Encryption Regulation In The Wake Of September 11, 2001: Must We Protect National Security At The Expense Of The Economy?, Matthew Parker Voors

Federal Communications Law Journal

This Note argues that although privacy and economic concerns have ruled the encryption debate during the past decade, the move toward increased privacy on the Internet and relaxed encryption regulation, designed to promote electronic commerce, comes at the expense of national security and the protection of Americans' safety. The Article begins with historical information about encryption and an examination of how businesses use encryption to secure their communications and financial transactions on the Internet. This Section also observes that this technology is employed by terrorist organizations to accomplish the same goal: to send private communications. The Author next details the …


Special Article: Recommendations For Optimal Personnel Security In The Cyberworld, Ibpp Editor Aug 2002

Special Article: Recommendations For Optimal Personnel Security In The Cyberworld, Ibpp Editor

International Bulletin of Political Psychology

This article considers the social construction of recommendations for personnel security in the context of a global cyberworld.


Computer Network Attacks By Terrorists: Some Legal Dimensions, John F. Murphy Jun 2002

Computer Network Attacks By Terrorists: Some Legal Dimensions, John F. Murphy

International Law Studies

No abstract provided.


Meeting The Challenge Of Cyberterrorism: Defining The Military Role In A Democracy, Charles J. Dunlap Jun 2002

Meeting The Challenge Of Cyberterrorism: Defining The Military Role In A Democracy, Charles J. Dunlap

International Law Studies

No abstract provided.


The Grave New World Of Terrorism: A Lawyer's View, James A. R. Nafziger Jan 2002

The Grave New World Of Terrorism: A Lawyer's View, James A. R. Nafziger

Denver Journal of International Law & Policy

No abstract provided.


Defining Terrorism As The Peace Time Equivalent Of War Crimes: A Case Of Too Much Convergence Between International Humanitarian Law And International Criminal Law?, Michael P. Scharf Jan 2001

Defining Terrorism As The Peace Time Equivalent Of War Crimes: A Case Of Too Much Convergence Between International Humanitarian Law And International Criminal Law?, Michael P. Scharf

ILSA Journal of International & Comparative Law

The problem of defining "terrorism" has vexed the international community for years.


What Big Eyes And Ears You Have!: A New Regime For Covert Governmental Surveillance, Mark G. Young Jan 2001

What Big Eyes And Ears You Have!: A New Regime For Covert Governmental Surveillance, Mark G. Young

Fordham Law Review

No abstract provided.


Catastrophic Terrorism- Thinking Fearfully, Acting Legally, Barry Kellman Jan 1999

Catastrophic Terrorism- Thinking Fearfully, Acting Legally, Barry Kellman

Michigan Journal of International Law

The time has come to move beyond howls of alarm to a public discussion of what policies should be adopted or reformed. That discussion should proceed even as crucial questions remain only partially answerable: How realistic is the possibility of catastrophic terrorism? How easy is it to make a catastrophic device that actually works? Why would any person or group want to kill hundreds, thousands, or tens of thousands of innocent victims?


International Terrorism Under The Law, Yassin El-Ayouty Jan 1999

International Terrorism Under The Law, Yassin El-Ayouty

ILSA Journal of International & Comparative Law

Terror has been generally defined as "the threat or use of violence in order to create extreme fear and anxiety in a target group so as to coerce them to meet political (or quasi-political) objectives of the perpetrators


Bellum Americanum: The U.S. View Of Twenty-First Century War And Its Possible Implications For The Law Of Armed Conflict, Michael N. Schmitt Jan 1998

Bellum Americanum: The U.S. View Of Twenty-First Century War And Its Possible Implications For The Law Of Armed Conflict, Michael N. Schmitt

Michigan Journal of International Law

After describing Bellum Americanum at some length, the article turns to the "stressors" it presents for the current law of armed conflict. The term stressors is used to suggest that law evolves as it is stressed by changing circumstances. Much as water seeks a constant level, law inevitably moves to fill normative lacunae. Correspondingly, law loses its normative valence when it no longer serves "community"-a relative concept-ends. Thus, law is contextual and directional. It is contextual in the sense that it is understood and applied based upon the specific social, economic, political, and military milieu in which it operates. …