Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- National Security Law (21)
- International Law (12)
- Military, War, and Peace (11)
- Constitutional Law (9)
- Human Rights Law (8)
-
- Law and Politics (7)
- Criminal Law (6)
- Social and Behavioral Sciences (6)
- Law and Society (5)
- First Amendment (3)
- Arts and Humanities (2)
- Civil Rights and Discrimination (2)
- Courts (2)
- Criminal Procedure (2)
- Criminology and Criminal Justice (2)
- Fourteenth Amendment (2)
- Fourth Amendment (2)
- International Humanitarian Law (2)
- Law Enforcement and Corrections (2)
- Legal Studies (2)
- Public Law and Legal Theory (2)
- Science and Technology Law (2)
- Transnational Law (2)
- Administrative Law (1)
- Business Organizations Law (1)
- Communication (1)
- Continental Philosophy (1)
- Energy and Utilities Law (1)
- Environmental Law (1)
- Institution
-
- Selected Works (8)
- SelectedWorks (8)
- Georgetown University Law Center (5)
- University of Michigan Law School (4)
- New York Law School (3)
-
- Case Western Reserve University School of Law (2)
- Claremont Colleges (2)
- St. Mary's University (2)
- American University Washington College of Law (1)
- Columbia Law School (1)
- Duke Law (1)
- Embry-Riddle Aeronautical University (1)
- Mitchell Hamline School of Law (1)
- Montclair State University (1)
- Pace University (1)
- Pepperdine University (1)
- Schulich School of Law, Dalhousie University (1)
- The Catholic University of America, Columbus School of Law (1)
- The University of Southern Mississippi (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Florida Levin College of Law (1)
- University of Missouri School of Law (1)
- University of New Mexico (1)
- University of San Diego (1)
- Washington and Lee University School of Law (1)
- West Virginia University (1)
- Publication
-
- Steven R Morrison (7)
- Georgetown Law Faculty Publications and Other Works (5)
- Faculty Scholarship (4)
- NYLS Law Review (3)
- Claremont-UC Undergraduate Research Conference on the European Union (2)
-
- Faculty Articles (2)
- Faculty Publications (2)
- Katherine L. Vaughns (2)
- Amanda M. Gibbens (1)
- American University National Security Law Brief (1)
- Articles (1)
- Articles, Book Chapters, & Popular Press (1)
- Case Western Reserve Journal of International Law (1)
- Catholic University Law Review (1)
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
- Dissertations (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Jeffrey T Biller (1)
- Kyle Rene (1)
- Madelyn Hsiao-Rei Hicks (1)
- Michigan Journal of International Law (1)
- Michigan Law Review (1)
- Michigan Telecommunications & Technology Law Review (1)
- Nick J. Sciullo (1)
- Pepperdine Law Review (1)
- Richard J. Wilson (1)
- Ryan T. Williams (1)
- San Diego International Law Journal (1)
- Scholarly Articles (1)
- Security Studies & International Affairs - Daytona Beach (1)
- Publication Type
- File Type
Articles 1 - 30 of 52
Full-Text Articles in Law
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
San Diego International Law Journal
The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …
A Long, Strange Trip: Guantanamo And The Scarcity Of International Law, Richard J. Wilson
A Long, Strange Trip: Guantanamo And The Scarcity Of International Law, Richard J. Wilson
Richard J. Wilson
From June of 2004, through June of 2007, I represented Omar Khadr, a detainee at Guantanamo Bay, Cuba. Omar, a Canadian citizen, was 15 years old when captured, and he was - and is - one of the very few detainees facing trial by a military commission. President Obama's decision to close Guantanamo and to put the commission trials on hold leaves us all with questions as to what will happen. This reflection was written in 2007, just about when I stopped representing Omar. The lower federal courts have not, in my view, used international law in any meaningful way …
Book Review: Fresh Perspectives On The "War On Terror", Katherine Vaughns
Book Review: Fresh Perspectives On The "War On Terror", Katherine Vaughns
Katherine L. Vaughns
No abstract provided.
Of Civil Wrongs And Rights: Kiyemba V. Obama And The Meaning Of Freedom, Separation Of Powers, And The Rule Of Law Ten Years After 9/11, Katherine L. Vaughns, Heather L. Williams
Of Civil Wrongs And Rights: Kiyemba V. Obama And The Meaning Of Freedom, Separation Of Powers, And The Rule Of Law Ten Years After 9/11, Katherine L. Vaughns, Heather L. Williams
Katherine L. Vaughns
This article is about the rise and fall of continued adherence to the rule of law, proper application of the separation of powers doctrine, and the meaning of freedom for a group of seventeen Uighurs—a Turkic Muslim ethnic minority whose members reside in the Xinjiang province of China—who had been held at the Guantanamo Bay Naval Base since 2002. Most scholars regard the trilogy of Hamdi v. Rumsfeld, Hamdan v. Rumsfeld, and Boumediene v. Bush as demonstrating the Supreme Court’s willingness to uphold the rule of law during the war on terror. The recent experience of the Uighurs suggest that …
Dawinder S. Sidhu On Hate Crimes, Terrorism, And Sikhs, Dawinder S. Sidhu, Benjamin Wittes
Dawinder S. Sidhu On Hate Crimes, Terrorism, And Sikhs, Dawinder S. Sidhu, Benjamin Wittes
Faculty Scholarship
Dawinder S. Sidhu of the University of New Mexico School of Law writes in with the following comments on the fallout from the shooting at the Sikh Temple at Oak Creek, Wisconsin.
Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller
Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller
Jeffrey T Biller
Attacks on computer systems for both criminal and political purposes are on the rise in both the United States and around the world. Foreign terrorist organizations are also developing information technology skills to advance their goals. Looking at the convergence of these two phenomena, many prominent security experts in both government and private industry have rung an alarm bell regarding the potential for acts of cyber-terrorism. However, there is no precise definition of cyber-terrorism under United States law or in practice among cyber-security academicians. The lack of a common starting point is one of the reasons existing law fails to …
Gender-Based Perceptions Of The 2001 Anthrax Attacks: Implications For Outreach And Preparedness, Christopher Salvatore, Brian J. Gorman
Gender-Based Perceptions Of The 2001 Anthrax Attacks: Implications For Outreach And Preparedness, Christopher Salvatore, Brian J. Gorman
Department of Justice Studies Faculty Scholarship and Creative Works
Extensive research dealing with gender-based perceptions of fear of crime has generally found that women express greater levels of fear compared to men. Further, studies have found that women engage in more self-protective behaviors in response to fear of crime, as well as have different levels of confidence in government efficacy relative to men. The majority of these studies have focused on violent and property crime; little research has focused on gender-based perceptions of the threat of bioterrorism. Using data from a national survey conducted by ABC News / Washington Post, this study contrasted perceptions of safety and fear in …
Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay
Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay
Security Studies & International Affairs - Daytona Beach
This article analyzes the phenomenon of homeland security through the development of four conceptual lenses that were created out of the existing literatures in criminal justice, public administration, organization behavior, risk management, international relations, and the overlap between them. Using terrorism as a proxy for the homeland security enterprise, these conceptual lenses include: (1) homeland security as a criminal justice problem which views terrorism as a crime; (2) homeland security as a international relations problem which views terrorism as a war; (3) homeland security as an organization design problem which views terrorism as a network of sub-state transnational actors; and …
The Bin Laden Exception, Erik Luna
The Bin Laden Exception, Erik Luna
Scholarly Articles
Osama bin Laden's demise provides an opportune moment to reevaluate the extraordinary measures taken by the U.S. government in the "war on terror," with any reassessment incorporating the threat posed by al Qaeda and other terrorist organizations. Some modest analysis suggests that terrorism remains a miniscule risk for the average American, and it hardly poses an existential threat to the United States. Nonetheless, terrorism-related fears have distorted the people's risk perception and facilitated dubious public policies, exemplified here by a series of programs implemented by the Transportation Security Administration (TSA). Among other things, this agency has adopted costly technology and …
Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole
Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole
Georgetown Law Faculty Publications and Other Works
Aziz Rana’s account of the takeover of American national security by experts, and of the public’s acceptance of that state of affairs, offers an important and novel perspective on what ails us in national security today. In this Comment, I suggest that while Rana is correct to identify our deference to experts as a central aspect of the problem, the problem is more complicated. First, the phenomenon of elite control over foreign and security policy questions is not new, but likely dates back to the founding—when elites ruled not based on expertise but on the basis of status, class, and …
An Examination Of Factors Affecting Information Sharing Among Law Enforcement Agencies, Scott Driskill Bransford
An Examination Of Factors Affecting Information Sharing Among Law Enforcement Agencies, Scott Driskill Bransford
Dissertations
The purpose of the present study was to investigate using survey data to find factors or barriers which contributed to local law enforcement participation and support of intelligence information sharing. Following the September 11, 2001, attacks in New York City and Arlington, Virginia, new homeland security initiatives and directives were created from the legislative and executive branches of the federal government. Several new initiatives and directives provided new communication opportunities for partnerships between all levels of law enforcement to combat the future threat of domestic terrorism.
The evaluation literature indicated that a majority of post-9/11, initiatives, including the creation of …
The Taint Of Torture: The Roles Of Law And Policy In Our Descent To The Dark Side, David Cole
The Taint Of Torture: The Roles Of Law And Policy In Our Descent To The Dark Side, David Cole
Georgetown Law Faculty Publications and Other Works
Was the Bush administration’s decision to employ “enhanced interrogation techniques” a mistake of policy, a violation of law, or both? This essay responds to Philip Zelikow’s insider account of how the decision to use these techniques was reached. The author suggests that while Zelikow makes a strong case that the decision to authorize the CIA to use coercive interrogation tactics was a mistaken policy judgment, it is important not to lose sight of the fact that it was also illegal. The latter conclusion demands a different response than the former. In particular, it underscores the necessity for accountability. The author …
Security Council Resolution 1887 And The Quest For Nuclear Disarmament, Usman Ahmed, Raghav Thapar
Security Council Resolution 1887 And The Quest For Nuclear Disarmament, Usman Ahmed, Raghav Thapar
Michigan Journal of International Law
Nuclear weapons pose an increased international threat to security in the modem era. Cheap transportation and the opening of national borders for trade have made it easy for nuclear materials to cross national boundaries. Informal networks have sprouted up, facilitating the proliferation and exchange of nuclear materials and the technology required to turn those materials into weapons. Advances in technology have made it easier to enrich uranium, instilling concerns of increased nuclear weapons proliferation. These changes in technology, the development of informal nuclear networks, and lax security in safeguarding weapons by states such as Russia and Pakistan have fueled global …
Privatization Of Public Water Services: The States' Role In Ensuring Public Accountability, Craig Anthony Arnold
Privatization Of Public Water Services: The States' Role In Ensuring Public Accountability, Craig Anthony Arnold
Pepperdine Law Review
The privatization of public water services in the United States has grown dramatically in recent years in response to political and ideological interest in privatizing public services, arguments about economic efficiencies, and the realities of overwhelming public costs related to water quality standards, infrastructure upgrade needs, and operational complexities. Many states have expressly enacted statutes authorizing municipalities to transfer services, operation and management, and even ownership of public water systems to private firms. This article systematically evaluates the status of water privatization in the U.S., the legal authority for privatization and its limits, and the most common and significant issues …
The Shifting Interpretations Of Interpol’S Article Three, Kyle Rene
The Shifting Interpretations Of Interpol’S Article Three, Kyle Rene
Kyle Rene
Article Three of INTERPOL’s Constitution prohibits INTERPOL from undertaking “any intervention or activities of a political, military, religious or racial character.” Notwithstanding this prohibition, INTERPOL itself has taken an active role in pursing the perpetrators of one of the most politically, religiously, and racially charged forms of crime, terrorism. The following Note discusses how INTERPOL has rationalized its pursuit of terrorists in light of Article Three’s mandate. The Note concludes by reassessing the value of Article Three, showing how, although Article Three has been interpreted to afford INTERPOL the latitude to pursue terrorists, it nonetheless represents an effective means of …
European Union Security Landscape Post-9/11: Necessary Protection Or Unjustified Expansion Of A Security Regime?, Colby Mangels
European Union Security Landscape Post-9/11: Necessary Protection Or Unjustified Expansion Of A Security Regime?, Colby Mangels
Claremont-UC Undergraduate Research Conference on the European Union
No abstract provided.
Nato's Role In The Global War On Terror: Is The Alliance Obsolete?, Benjamin Forster
Nato's Role In The Global War On Terror: Is The Alliance Obsolete?, Benjamin Forster
Claremont-UC Undergraduate Research Conference on the European Union
No abstract provided.
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Steven R Morrison
Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Steven R Morrison
Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Steven R Morrison
Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Steven R Morrison
Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Steven R Morrison
Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Steven R Morrison
Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Conspiracy Law's Threat To Free Speech, Steven R. Morrison
Steven R Morrison
Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …
Operation Geronimo: The Legality Of The Targeted Killing Of Osama Bin Laden, Amanda M. Gibbens
Operation Geronimo: The Legality Of The Targeted Killing Of Osama Bin Laden, Amanda M. Gibbens
Amanda M. Gibbens
My recent article entitled, Operation Geronimo: The Legality of the Targeted Killing of Osama bin Laden addresses cutting-edge legal issues such as: counter-terrorism, self-defense, state sovereignty, and targeted killing. Due to the contemporary nature of the topic, few authors have published detailed assessments of the legality of the killing of Osama bin Laden. In my writing I analyze Operation Geronimo under both self-defense and law enforcement principles of treaty-based and customary international law. Additionally, I discuss U.S. constitutional law, the Authorization for Use of Military Force, and Executive Order 12,333 prohibiting assassinations.
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
Michigan Telecommunications & Technology Law Review
In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …
Battlefield Borders, Threat Rhetoric, And The Militarization Of State And Local Law Enforcement, Danielle C. Jefferis
Battlefield Borders, Threat Rhetoric, And The Militarization Of State And Local Law Enforcement, Danielle C. Jefferis
American University National Security Law Brief
No abstract provided.
The Evolution Of Law And Policy For Cia Targeted Killing, Afsheen John Radsan
The Evolution Of Law And Policy For Cia Targeted Killing, Afsheen John Radsan
Faculty Scholarship
Many critiques of the Central Intelligence Agency’s alleged use of killer drones depend on law that does not bind the United States or on contestable applications of uncertain facts to vague law. While acknowledging a blurry line between law and policy, we continue to develop a due process for targeted killing. In the real world, intelligence is sometimes faulty, mistakes occur, and peaceful civilians are at risk. International humanitarian law, which applies during armed conflicts, demands very little in the way of process beyond the admonition to take feasible precautions. Even so, the intelligence-driven nature of targeted killing, and the …
Assassination Or Targeted Killings After 9/11, John Yoo
Assassination Or Targeted Killings After 9/11, John Yoo
NYLS Law Review
No abstract provided.
Preventing The Financing Of Terrorism, Richard Barrett
Preventing The Financing Of Terrorism, Richard Barrett
Case Western Reserve Journal of International Law
No abstract provided.