Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton Jun 2017

Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton

Pace Intellectual Property, Sports & Entertainment Law Forum

Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …


A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr May 2017

A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr

Senior Honors Theses

Since the 9/11 attacks, American legislation and legal policy in regards to classifying and processing captured terrorists has fallen short of being fully effective and lawful. Trial and error by the Bush and Obama administrations has uncovered two key lessons: (1) captured terrorists are not typical prisoners of war and thus their detainment must involve more legal scrutiny than the latter; and (2) captured terrorists are not ordinary criminals and thus the civilian criminal court system, due to constitutional constraints, is not capable of adequately trying every count of terrorism. Other nations, including France and Israel, approach this problem with …


A Human Rights Perspective To Global Battlefield Detention: Time To Reconsider Indefinite Detention, Yuval Shany Mar 2017

A Human Rights Perspective To Global Battlefield Detention: Time To Reconsider Indefinite Detention, Yuval Shany

International Law Studies

This article discusses one principal challenge to detention without trial of suspected international terrorists—the international human rights law (IHRL) norm requiring the introduction of an upper limit on the duration of security detention in order to render it not indefinite in length. Part One of this article describes the “hardline” position on security detention, adopted by the United States in the immediate aftermath of the 9/11 terror attacks (followed, with certain variations, by other countries, including the United Kingdom and the State of Israel), according to which international terrorism suspects can be deprived of their liberty without trial for the …


Crimmigration-Counterterrorism, Margaret Hu Jan 2017

Crimmigration-Counterterrorism, Margaret Hu

Scholarly Articles

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …


Blood Antiquities: Addressing A Culture Of Impunity In The Antiquities Market, Paul Williams, Christin Coster Jan 2017

Blood Antiquities: Addressing A Culture Of Impunity In The Antiquities Market, Paul Williams, Christin Coster

Articles in Law Reviews & Other Academic Journals

For decades, parties to conflicts have used the cover of war to destroy and loot cultural property and antiquities for financial gain and symbolic victory. The “blood antiquities” excavated in conflict areas and sold mostly in western markets fuel not only continued conflict, but also (as in cases such as Syria and Iraq) terrorism that can reach around the world. The culture of impunity for both buyers and sellers of antiquities allows the blood-antiquities trade to thrive.

A robust international legal framework does exist to ensure accountability for the destruction of cultural heritage. Because looting is a major cause of …


Revisiting The Public Safety Exception To Miranda For Suspected Terrorists: Dzhokhar Tsarnaev And The Bombing Of The 2013 Boston Marathon, Hannah Lonky Jan 2017

Revisiting The Public Safety Exception To Miranda For Suspected Terrorists: Dzhokhar Tsarnaev And The Bombing Of The 2013 Boston Marathon, Hannah Lonky

Journal of Criminal Law and Criminology

This Comment examines the application of the public safety exception to Miranda to cases of domestic terrorism, looking particularly at the case of Dzhokhar Tsarnaev and the 2013 Boston Marathon bombing. By comparing the Department of Justice’s War on Terror policies to the Warren Court’s rationale for Miranda, this Comment argues that courts should require law enforcement officers to have reasonable knowledge of an immediate threat to public safety before they may properly invoke the Quarles public safety exception.


Patriot Act A More Perfect Policy.Docx, D'Andre Devon Lampkin Dec 2016

Patriot Act A More Perfect Policy.Docx, D'Andre Devon Lampkin

D'Andre Lampkin

This essay provides an overview of the USA Patriot Act and introduce readers to some of the controversial aspects of the main provisions outlined in the original bill. While the paper states an affirmative position regarding the language of the law, this essay challenges readers to decide whether the benefits of the Patriot Act outweighed the founded, potential, and unknown violations of the United States Constitution.