Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson Oct 2017

Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson

Articles

In this section: Congress Enacts Sanctions Legislation Targeting Russia • United States and Qatar Sign Memorandum of Understanding over Terrorism Financing • Trump Reverses Certain Steps Toward Normalizing Relations with Cuba • United States Announces Plans to Withdraw from Paris Agreement on Climate Change • President Trump Issues Trade-Related Executive Orders and Memoranda • United States, Russia, and Jordan Sign Limited Ceasefire for Syria • Trump Administration Recertifies Iranian Compliance with JCPOA Notwithstanding Increasing Concern with Iranian Behavior


A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr May 2017

A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr

Senior Honors Theses

Since the 9/11 attacks, American legislation and legal policy in regards to classifying and processing captured terrorists has fallen short of being fully effective and lawful. Trial and error by the Bush and Obama administrations has uncovered two key lessons: (1) captured terrorists are not typical prisoners of war and thus their detainment must involve more legal scrutiny than the latter; and (2) captured terrorists are not ordinary criminals and thus the civilian criminal court system, due to constitutional constraints, is not capable of adequately trying every count of terrorism. Other nations, including France and Israel, approach this problem with …


Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson Apr 2017

Contemporary Practice Of The United States Relating To International Law, Kristina Daugirdas, Julian Davis Mortenson

Articles

In this section: • United States Abstains on Security Council Resolution Criticizing Israeli Settlements • United States Sanctions Russian Individuals and Entities After Accusing Russian Government of Using Hacking to Interfere with U.S. Election Process; Congressional Committees and Intelligence and Law Enforcement Agencies Continue to Investigate President Trump’s Connections to Russian Officials • Second Circuit Overturns $655 Million Jury Verdict Against Palestine Liberation Organization and Palestinian Authority • New Legislation Seeks to Confirm Immunity of Artwork and Facilitate Cultural Exchange • United States Confronts China over Seizure of Unmanned Drone in the South China Sea • International Criminal Court Prosecutor …


Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein Jan 2017

Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein

Law School Blogs

No abstract provided.


Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Newsroom: Law Scholarships For Syrian Refugees 01-26-2017, Karen Sloan, Roger Williams University School Of Law Jan 2017

Newsroom: Law Scholarships For Syrian Refugees 01-26-2017, Karen Sloan, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Crimmigration-Counterterrorism, Margaret Hu Jan 2017

Crimmigration-Counterterrorism, Margaret Hu

Scholarly Articles

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …


Human Rights In A Time Of Terror: Comparison Between Treatment In The European Courts Of Human Rights And The United States, Allen E. Shoenberger Jan 2017

Human Rights In A Time Of Terror: Comparison Between Treatment In The European Courts Of Human Rights And The United States, Allen E. Shoenberger

Faculty Publications & Other Works

No abstract provided.


Blood Antiquities: Addressing A Culture Of Impunity In The Antiquities Market, Paul Williams, Christin Coster Jan 2017

Blood Antiquities: Addressing A Culture Of Impunity In The Antiquities Market, Paul Williams, Christin Coster

Articles in Law Reviews & Other Academic Journals

For decades, parties to conflicts have used the cover of war to destroy and loot cultural property and antiquities for financial gain and symbolic victory. The “blood antiquities” excavated in conflict areas and sold mostly in western markets fuel not only continued conflict, but also (as in cases such as Syria and Iraq) terrorism that can reach around the world. The culture of impunity for both buyers and sellers of antiquities allows the blood-antiquities trade to thrive.

A robust international legal framework does exist to ensure accountability for the destruction of cultural heritage. Because looting is a major cause of …


Essay: Terrorists Are Always Muslim But Never White: At The Intersection Of Critical Race Theory And Propaganda, Caroline Mala Corbin Jan 2017

Essay: Terrorists Are Always Muslim But Never White: At The Intersection Of Critical Race Theory And Propaganda, Caroline Mala Corbin

Articles

When you hear the word "terrorist" who do you picture? Chances are, it is not a white person. In the United States, two common though false narratives about terrorists who attack America abound. We see them on television, in the movies, on the news, and, currently, in the Trump administration. The first is that "terrorists are always (brown) Muslims." The second is that "white people are never terrorists.

Different strands of critical race theory can help us understand these two narratives. One strand examines the role of unconscious cognitive biases in the production of stereotypes, such as the stereotype of …


Utilizing Secondary Sanctions To Curtail The Financing Of The Islamic State, Jimmy Gurule Jan 2017

Utilizing Secondary Sanctions To Curtail The Financing Of The Islamic State, Jimmy Gurule

Journal Articles

This article will discuss existing legislation used to curtail the financing of the Islamic State, the value of imposing secondary sanctions against the terrorist group, and concerns regarding the extraterritorial applications of US sanctions.


Impact Of Data On Litigation: Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott Jan 2017

Impact Of Data On Litigation: Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott

Faculty Articles

In order to explore the threats posed by cybersecurity breaches, first outline the steps taken by the government to address those threats in private sector economy, and then call attention to the ultimate solution, which will most certainly spur private businesses to create a more secure cyber environment for the American people - a Connie Francis-styled cyber civil action lawsuit. Technological advances opened up the unfathomable marvels of cyberspace and, by so doing, spawned a modern world that is now completely dependent on cyber, particularly in the context of sustaining and operating our critical infrastructure. Unfortunately, if supervisory control and …