Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Law

Terrorism

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 175

Full-Text Articles in Law

Digital Terror Crimes, Cody Corliss Jan 2024

Digital Terror Crimes, Cody Corliss

Law Faculty Scholarship

Terror actors operating within armed conflict have weaponized social media by using these platforms to threaten and spread images of brutality in order to taunt, terrify, and intimidate civilians. These acts or threats of violence are terror, a prohibited war crime in which acts or threats of violence are made with the primary purpose of spreading terror among the civilian population. The weaponization of terror content through social media is a digital terror crime.

This article is the first to argue that the war crime of terror applies to digital terror crimes perpetrated through social media platforms. It situates digital …


Activist Extremist Terrorist Traitor, J. Richard Broughton Mar 2023

Activist Extremist Terrorist Traitor, J. Richard Broughton

St. John's Law Review

(Excerpt)

Abraham Lincoln had a way of capturing, rhetorically, the national ethos. The “house divided.” “Right makes might” at Cooper Union. Gettysburg’s “last full measure of devotion” and the “new birth of freedom.” The “mystic chords of memory” and the “better angels of our nature.” “[M]alice toward none,” “charity for all,” and “firmness in the right.” But Lincoln not only evaluated America’s character; he also understood the fragility of those things upon which the success of the American constitutional experiment depended, and the consequences when the national ethos was in crisis. Perhaps no Lincoln speech better examines the threats to …


Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath Jan 2023

Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath

Pepperdine Law Review

The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …


Sb 44 - Expanding The Street Gang Terrorism And Prevention Act, Aaron L. Brown, Anna C. Dillon Jan 2023

Sb 44 - Expanding The Street Gang Terrorism And Prevention Act, Aaron L. Brown, Anna C. Dillon

Georgia State University Law Review

The Act enhances penalties for violations of the Street Gang Terrorism and Prevention Act, including imposing mandatory minimums, and preserves the State’s right to appeal a court’s deviation from the mandatory minimum sentencing guidelines provided in the Act. The Act also imposes limits on the use of unsecured judicial release.


Law School News: Adjunct Professor Of The Year 2021: David Coombs 05/19/2021, Michael M. Bowden May 2021

Law School News: Adjunct Professor Of The Year 2021: David Coombs 05/19/2021, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Criminalizing Terrorism Funding: "A Study In The Jordanian Legal System", Abdulellah Mohammed Alnawayseh Mar 2021

Criminalizing Terrorism Funding: "A Study In The Jordanian Legal System", Abdulellah Mohammed Alnawayseh

UAEU Law Journal

Terrorism Funds considered as modern issue which has been given an important attention by the international community in particular after the adoption of the international convention on the suppression of the financing of terrorism in 1999 and the security council resolution number 1373 dated 28 September 2001 which came after the 11th September attacks. This resolution has forced the UN members to criminalize terrorism funds and money laundry.

Jordanhas ratified this convention by adopting legislation number 83 in 2003, and criminized bank activities which are related to terrorist activities in paragraph 2 article 147 from the criminal code. This …


Nuclear Terrorism: Statutory Shortcomings And Prosecutorial Opportunities, Rohan Mishra Feb 2021

Nuclear Terrorism: Statutory Shortcomings And Prosecutorial Opportunities, Rohan Mishra

International Law Studies

In 2016, President Barack Obama warned that “[t]he danger of a terrorist group obtaining and using a nuclear weapon is one of the greatest threats to global security.” Thus far, however, U.S. and international efforts to address nuclear terrorism have faced a fundamental dilemma: While the importance of preventing this threat is unquestioned, there has been limited opportunity or need to conduct prosecutions that hinge on nuclear terrorism charges. This dilemma reflects the current piecemeal approach to nuclear terrorism, which prioritizes policies that address the “back-end” risk of nuclear terrorism (i.e., the detonation of nuclear weapons or attack of nuclear …


The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia Jan 2021

The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.


The Icc Should Not Encourage Occupation, Uri Weiss Jan 2021

The Icc Should Not Encourage Occupation, Uri Weiss

Touro Law Review

No abstract provided.


Impact Of The “War On Terrorism” On Development Of International Criminal Law, Ayser Alhelme Nov 2020

Impact Of The “War On Terrorism” On Development Of International Criminal Law, Ayser Alhelme

Theses and Dissertations

This research elucidates international terrorism by reviewing the stages of sociological analysis of terrorism, and by analyzing its theoretical framework. This research traces the historical development of the prevailing uncertainty by which it is characterized. Implications on global security leads us to study international legal development to counter international terrorism that has engulfed entire human societies. The objectives include highlighting international terrorism, and the counter-terrorism measures on part of the international community as it develops international criminal law to handle the problem.


Criminological Description Of Crimes Related To Terrorism And Their Causes, Jamshid Ibrohimov Sep 2020

Criminological Description Of Crimes Related To Terrorism And Their Causes, Jamshid Ibrohimov

Review of law sciences

Terrorism is the most dangerous and difficult vocation of our time. In order to solve this social problem, it is necessary first of all to know exactly what terrorism is, its plot, essence, why and by whom it is used as a tool in the fight against terrorism. It is worth noting that now the fact that the identity of the terrorist was not described as a Fox, is one of the main problems in science. In this case, it is also very important to pay attention to the various data on the delivery of mercenaries maksad in the case …


Law School News: Adjunct Professor Of The Year: David Coombs 05-13-2020, Michael M. Bowden May 2020

Law School News: Adjunct Professor Of The Year: David Coombs 05-13-2020, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Confession Obsession: How To Protect Minors In Interrogations, Cindy Chau Jan 2020

Confession Obsession: How To Protect Minors In Interrogations, Cindy Chau

Journal of Race, Gender, and Ethnicity

No abstract provided.


Racial Profiling: Past, Present, And Future, David A. Harris Jan 2020

Racial Profiling: Past, Present, And Future, David A. Harris

Articles

It has been more than two decades since the introduction of the first bill in Congress that addressed racial profiling in 1997. Between then and now, Congress never passed legislation on the topic, but more than half the states passed laws and many police departments put anti-profiling policies in place to combat it. The research and data on racial profiling has grown markedly over the last twenty-plus years. We know that the practice is real (contrary to many denials), and the data reveal racial profiling’s shortcomings and great social costs. Nevertheless, racial profiling persists. While it took root most prominently …


Thoughts, Crimes, And Thought Crimes, Gabriel S. Mendlow Jan 2020

Thoughts, Crimes, And Thought Crimes, Gabriel S. Mendlow

Michigan Law Review

Thought crimes are the stuff of dystopian fiction, not contemporary law. Or so we’re told. Yet our criminal legal system may in a sense punish thought regularly, even as our existing criminal theory lacks the resources to recognize this state of affairs for what it is—or to explain what might be wrong with it. The beginning of wisdom lies in the seeming rhetorical excesses of those who complain that certain terrorism and hate crime laws punish offenders for their malevolent intentions while purporting to punish them for their conduct. Behind this too-easily-written-off complaint is a half-buried precept of criminal jurisprudence, …


Gender-Based Perceptions Of The 2001 Anthrax Attacks: Implications For Outreach And Preparedness, Christopher Salvatore, Brian J. Gorman Oct 2019

Gender-Based Perceptions Of The 2001 Anthrax Attacks: Implications For Outreach And Preparedness, Christopher Salvatore, Brian J. Gorman

Christopher Salvatore

Extensive research dealing with gender-based perceptions of fear of crime has generally found that women express greater levels of fear compared to men. Further, studies have found that women engage in more self-protective behaviors in response to fear of crime, as well as have different levels of confidence in government efficacy relative to men. The majority of these studies have focused on violent and property crime; little research has focused on gender-based perceptions of the threat of bioterrorism. Using data from a national survey conducted by ABC News / Washington Post, this study contrasted perceptions of safety and fear in …


Habeas Corpus In The Age Of Guantánamo, Cary Federman Apr 2019

Habeas Corpus In The Age Of Guantánamo, Cary Federman

Cary Federman

The purpose of the article is to examine the meaning of habeas corpus in the age of the war on terror and the detention camps at Guantanamo Bay. Since the war on terror was declared in 2001, the writ has been invoked from quarters not normally considered within the federal courts’ domain. In this article, I set out to do two things: first, I provide an overview of the writ’s history in the United States and explain its connection to federalism and unlawful executive detention. I then set out to bridge the two meanings of habeas corpus. Second, then, I …


Protecting Due Process During Terrorism Adjudications: Redefining "Crimes Against Humanity" And Eliminating The Doctrine Of Complimentary Jurisdiction In Favor Of The International Criminal Court, Daniel N. Clay Feb 2019

Protecting Due Process During Terrorism Adjudications: Redefining "Crimes Against Humanity" And Eliminating The Doctrine Of Complimentary Jurisdiction In Favor Of The International Criminal Court, Daniel N. Clay

Arkansas Law Review

“When we sit in judgment we are holding ourselves out as people—as the kind of a community—that are worthy of this task. It is the seriousness, the gravity, of the act of judgment which gives rise to our legitimate and laudable emphasis on procedural fairness and substantive accuracy in criminal procedure. But these things focus on the defendant—the one judged. I am concerned about us who would presume to sit in judgment. Who are we that we should do this? Whether we intend to do so or not, we answer this question in part through the way we conduct our …


Trafficking Terror And Sexual Violence: Accountability For Human Trafficking And Sexual And Gender-Based Violence By Terrorist Groups Under The Rome Statute, Coman Kenny, Nikita Malik Jan 2019

Trafficking Terror And Sexual Violence: Accountability For Human Trafficking And Sexual And Gender-Based Violence By Terrorist Groups Under The Rome Statute, Coman Kenny, Nikita Malik

Vanderbilt Journal of Transnational Law

Terrorist groups are increasingly involved in human trafficking, specifically targeting women and girls of ideologically opposed groups or religions. Frequently, this phenomenon involves the perpetration of various forms of sexual violence against those trafficked. The commission of the interlinked crimes of human trafficking, sexual violence, and terrorism is relatively new, encompassing a vicious cycle in which each crime effectively flows from the commission of the others: sexual violence is facilitated by human trafficking, human trafficking is motivated, in part, by sexual violence, and both crimes spread terror among civilian populations. In light of the Prosecutor of the International Criminal Court …


Are Domestic Abusers Terrorists: Rhetoric, Reality, And Asylum Law, Natalie Nanasi Jan 2019

Are Domestic Abusers Terrorists: Rhetoric, Reality, And Asylum Law, Natalie Nanasi

Faculty Journal Articles and Book Chapters

The terms terrorism and terrorist are highly charged but all too often imprecisely utilized in legal, media, and political arenas. The terminology has even entered the field of intimate partner violence, where the phrases terrorism in the home or intimate terrorism have been used to describe domestic abuse. This language has proliferated not only due to identified commonalities between intimate partner abuse and terroristic behaviors but also because of the rhetorical impact of the words in highlighting the gravity of domestic violence. However, expanding the legal framework of terrorism into new areas has potentially serious and far-reaching consequences. It is …


Combating Terrorism As A Condition Of Preserving The Political Stability Of A Democratic Society, R Tlavberdiev Dec 2018

Combating Terrorism As A Condition Of Preserving The Political Stability Of A Democratic Society, R Tlavberdiev

ProAcademy

This article addresses the challenges of ensuring the protection of children involved in violent extremism and terrorism through the recruitment and exploitation of minors by extremist and terrorist groups. Based on the analysis conducted' the author proposes to continue the implementation of international standards for juvenile justice in Uzbekistan and to strengthen the role of international organizations in ensuring the protection of the rights and interests of children.


The Ad Hoc Federal Crime Of Terrorism: Why Congress Needs To Amend The Statute To Adequately Address Domestic Extremism, Nathan Carpenter Nov 2018

The Ad Hoc Federal Crime Of Terrorism: Why Congress Needs To Amend The Statute To Adequately Address Domestic Extremism, Nathan Carpenter

St. John's Law Review

(Excerpt)

This Note argues that Congress should add such crimes to the list specified in the federal crime of terrorism statute and amend the statute’s intent requirement. This will allow the Department of Justice to more adequately use its resources to address the growing prevalence of hate groups, increase investigatory capabilities, and emphasize the threat posed by such groups. Part I explores the current federal crime of terrorism and analyzes how various terrorism-related cases are adjudicated. Part II introduces the prevailing threat of political extremists operating within the United States and shows that they should no longer be placed in …


Volume 1, Issue 2 (2017) Inaugural Issue May 2018

Volume 1, Issue 2 (2017) Inaugural Issue

International Journal on Responsibility

Contents:

Introduction: Terry Beitzel, Types of Responsibility: Challenges and Opportunities

3 – 5 Howard Zehr, Restorative Justice and the Gandhian Tradition.

6 – 26 Richard E. Rubenstein, Responsibility for Peacemaking in the Context of Structural Violence.

27 – 64 Marc Pufong, Terror, Insecurity, State Responsibility and Challenges: Yesterday and Today?

65 – 77 Ron Kraybill, Responsibility, Community and Conflict Resolution in an Age of Polarization.

78 – 96 John Fairfield, Beyond non-violence to courtship.

97 – 98 Call for papers for forthcoming issues of the International Journal on Responsibility and instructions for authors.


Hb 452 - Domestic Terrorism, John J. Crowley, Tatiana E. Posada Jan 2018

Hb 452 - Domestic Terrorism, John J. Crowley, Tatiana E. Posada

Georgia State University Law Review

The Act creates and defines the offense of domestic terrorism in Georgia. It establishes that a person must have the intent to intimidate the public or coerce the government while causing significant harm in order to be liable for domestic terrorism. The Act also provides for training law enforcement to identify and combat domestic terrorism, to share the information with the Georgia Information Sharing and Analysis Center, and for the Georgia Information Sharing and Analysis Center to share that information with the United States Department of Homeland Security.


How The War On Terror Is Transforming Private U.S. Law, Maryam Jamshidi Jan 2018

How The War On Terror Is Transforming Private U.S. Law, Maryam Jamshidi

UF Law Faculty Publications

In thinking about the War on Terror’s impact on U.S. law, what most likely comes to mind are its corrosive effects on public law, including criminal law, immigration, and constitutional law. What is less appreciated is whether and how the fight against terrorism has also impacted private law. As this Article demonstrates, the War on Terror has had a negative influence on private law, specifically on torts, where it has upended long-standing norms, much as it has done in the public law context.

Case law construing the private right of action under the Antiterrorism Act of 1992, 18 U.S.C. § …


Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr May 2017

A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr

Senior Honors Theses

Since the 9/11 attacks, American legislation and legal policy in regards to classifying and processing captured terrorists has fallen short of being fully effective and lawful. Trial and error by the Bush and Obama administrations has uncovered two key lessons: (1) captured terrorists are not typical prisoners of war and thus their detainment must involve more legal scrutiny than the latter; and (2) captured terrorists are not ordinary criminals and thus the civilian criminal court system, due to constitutional constraints, is not capable of adequately trying every count of terrorism. Other nations, including France and Israel, approach this problem with …


A Human Rights Perspective To Global Battlefield Detention: Time To Reconsider Indefinite Detention, Yuval Shany Mar 2017

A Human Rights Perspective To Global Battlefield Detention: Time To Reconsider Indefinite Detention, Yuval Shany

International Law Studies

This article discusses one principal challenge to detention without trial of suspected international terrorists—the international human rights law (IHRL) norm requiring the introduction of an upper limit on the duration of security detention in order to render it not indefinite in length. Part One of this article describes the “hardline” position on security detention, adopted by the United States in the immediate aftermath of the 9/11 terror attacks (followed, with certain variations, by other countries, including the United Kingdom and the State of Israel), according to which international terrorism suspects can be deprived of their liberty without trial for the …


Crimmigration-Counterterrorism, Margaret Hu Jan 2017

Crimmigration-Counterterrorism, Margaret Hu

Scholarly Articles

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …


Blood Antiquities: Addressing A Culture Of Impunity In The Antiquities Market, Paul Williams, Christin Coster Jan 2017

Blood Antiquities: Addressing A Culture Of Impunity In The Antiquities Market, Paul Williams, Christin Coster

Articles in Law Reviews & Other Academic Journals

For decades, parties to conflicts have used the cover of war to destroy and loot cultural property and antiquities for financial gain and symbolic victory. The “blood antiquities” excavated in conflict areas and sold mostly in western markets fuel not only continued conflict, but also (as in cases such as Syria and Iraq) terrorism that can reach around the world. The culture of impunity for both buyers and sellers of antiquities allows the blood-antiquities trade to thrive.

A robust international legal framework does exist to ensure accountability for the destruction of cultural heritage. Because looting is a major cause of …