Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Terrorism

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 52

Full-Text Articles in Law

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev Nov 2012

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev

San Diego International Law Journal

The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …


A Long, Strange Trip: Guantanamo And The Scarcity Of International Law, Richard J. Wilson Oct 2012

A Long, Strange Trip: Guantanamo And The Scarcity Of International Law, Richard J. Wilson

Richard J. Wilson

From June of 2004, through June of 2007, I represented Omar Khadr, a detainee at Guantanamo Bay, Cuba. Omar, a Canadian citizen, was 15 years old when captured, and he was - and is - one of the very few detainees facing trial by a military commission. President Obama's decision to close Guantanamo and to put the commission trials on hold leaves us all with questions as to what will happen. This reflection was written in 2007, just about when I stopped representing Omar. The lower federal courts have not, in my view, used international law in any meaningful way …


Book Review: Fresh Perspectives On The "War On Terror", Katherine Vaughns Oct 2012

Book Review: Fresh Perspectives On The "War On Terror", Katherine Vaughns

Katherine L. Vaughns

No abstract provided.


Of Civil Wrongs And Rights: Kiyemba V. Obama And The Meaning Of Freedom, Separation Of Powers, And The Rule Of Law Ten Years After 9/11, Katherine L. Vaughns, Heather L. Williams Oct 2012

Of Civil Wrongs And Rights: Kiyemba V. Obama And The Meaning Of Freedom, Separation Of Powers, And The Rule Of Law Ten Years After 9/11, Katherine L. Vaughns, Heather L. Williams

Katherine L. Vaughns

This article is about the rise and fall of continued adherence to the rule of law, proper application of the separation of powers doctrine, and the meaning of freedom for a group of seventeen Uighurs—a Turkic Muslim ethnic minority whose members reside in the Xinjiang province of China—who had been held at the Guantanamo Bay Naval Base since 2002. Most scholars regard the trilogy of Hamdi v. Rumsfeld, Hamdan v. Rumsfeld, and Boumediene v. Bush as demonstrating the Supreme Court’s willingness to uphold the rule of law during the war on terror. The recent experience of the Uighurs suggest that …


Dawinder S. Sidhu On Hate Crimes, Terrorism, And Sikhs, Dawinder S. Sidhu, Benjamin Wittes Oct 2012

Dawinder S. Sidhu On Hate Crimes, Terrorism, And Sikhs, Dawinder S. Sidhu, Benjamin Wittes

Faculty Scholarship

Dawinder S. Sidhu of the University of New Mexico School of Law writes in with the following comments on the fallout from the shooting at the Sikh Temple at Oak Creek, Wisconsin.


Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller Oct 2012

Cyber-Terrorism: Finding A Common Starting Point, Jeffrey T. Biller

Jeffrey T Biller

Attacks on computer systems for both criminal and political purposes are on the rise in both the United States and around the world. Foreign terrorist organizations are also developing information technology skills to advance their goals. Looking at the convergence of these two phenomena, many prominent security experts in both government and private industry have rung an alarm bell regarding the potential for acts of cyber-terrorism. However, there is no precise definition of cyber-terrorism under United States law or in practice among cyber-security academicians. The lack of a common starting point is one of the reasons existing law fails to …


Gender-Based Perceptions Of The 2001 Anthrax Attacks: Implications For Outreach And Preparedness, Christopher Salvatore, Brian J. Gorman Sep 2012

Gender-Based Perceptions Of The 2001 Anthrax Attacks: Implications For Outreach And Preparedness, Christopher Salvatore, Brian J. Gorman

Department of Justice Studies Faculty Scholarship and Creative Works

Extensive research dealing with gender-based perceptions of fear of crime has generally found that women express greater levels of fear compared to men. Further, studies have found that women engage in more self-protective behaviors in response to fear of crime, as well as have different levels of confidence in government efficacy relative to men. The majority of these studies have focused on violent and property crime; little research has focused on gender-based perceptions of the threat of bioterrorism. Using data from a national survey conducted by ABC News / Washington Post, this study contrasted perceptions of safety and fear in …


Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay Aug 2012

Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay

Security Studies & International Affairs - Daytona Beach

This article analyzes the phenomenon of homeland security through the development of four conceptual lenses that were created out of the existing literatures in criminal justice, public administration, organization behavior, risk management, international relations, and the overlap between them. Using terrorism as a proxy for the homeland security enterprise, these conceptual lenses include: (1) homeland security as a criminal justice problem which views terrorism as a crime; (2) homeland security as a international relations problem which views terrorism as a war; (3) homeland security as an organization design problem which views terrorism as a network of sub-state transnational actors; and …


The Bin Laden Exception, Erik Luna Jul 2012

The Bin Laden Exception, Erik Luna

Scholarly Articles

Osama bin Laden's demise provides an opportune moment to reevaluate the extraordinary measures taken by the U.S. government in the "war on terror," with any reassessment incorporating the threat posed by al Qaeda and other terrorist organizations. Some modest analysis suggests that terrorism remains a miniscule risk for the average American, and it hardly poses an existential threat to the United States. Nonetheless, terrorism-related fears have distorted the people's risk perception and facilitated dubious public policies, exemplified here by a series of programs implemented by the Transportation Security Administration (TSA). Among other things, this agency has adopted costly technology and …


Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole Jul 2012

Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole

Georgetown Law Faculty Publications and Other Works

Aziz Rana’s account of the takeover of American national security by experts, and of the public’s acceptance of that state of affairs, offers an important and novel perspective on what ails us in national security today. In this Comment, I suggest that while Rana is correct to identify our deference to experts as a central aspect of the problem, the problem is more complicated. First, the phenomenon of elite control over foreign and security policy questions is not new, but likely dates back to the founding—when elites ruled not based on expertise but on the basis of status, class, and …


An Examination Of Factors Affecting Information Sharing Among Law Enforcement Agencies, Scott Driskill Bransford May 2012

An Examination Of Factors Affecting Information Sharing Among Law Enforcement Agencies, Scott Driskill Bransford

Dissertations

The purpose of the present study was to investigate using survey data to find factors or barriers which contributed to local law enforcement participation and support of intelligence information sharing. Following the September 11, 2001, attacks in New York City and Arlington, Virginia, new homeland security initiatives and directives were created from the legislative and executive branches of the federal government. Several new initiatives and directives provided new communication opportunities for partnerships between all levels of law enforcement to combat the future threat of domestic terrorism.

The evaluation literature indicated that a majority of post-9/11, initiatives, including the creation of …


The Taint Of Torture: The Roles Of Law And Policy In Our Descent To The Dark Side, David Cole Apr 2012

The Taint Of Torture: The Roles Of Law And Policy In Our Descent To The Dark Side, David Cole

Georgetown Law Faculty Publications and Other Works

Was the Bush administration’s decision to employ “enhanced interrogation techniques” a mistake of policy, a violation of law, or both? This essay responds to Philip Zelikow’s insider account of how the decision to use these techniques was reached. The author suggests that while Zelikow makes a strong case that the decision to authorize the CIA to use coercive interrogation tactics was a mistaken policy judgment, it is important not to lose sight of the fact that it was also illegal. The latter conclusion demands a different response than the former. In particular, it underscores the necessity for accountability. The author …


Security Council Resolution 1887 And The Quest For Nuclear Disarmament, Usman Ahmed, Raghav Thapar Apr 2012

Security Council Resolution 1887 And The Quest For Nuclear Disarmament, Usman Ahmed, Raghav Thapar

Michigan Journal of International Law

Nuclear weapons pose an increased international threat to security in the modem era. Cheap transportation and the opening of national borders for trade have made it easy for nuclear materials to cross national boundaries. Informal networks have sprouted up, facilitating the proliferation and exchange of nuclear materials and the technology required to turn those materials into weapons. Advances in technology have made it easier to enrich uranium, instilling concerns of increased nuclear weapons proliferation. These changes in technology, the development of informal nuclear networks, and lax security in safeguarding weapons by states such as Russia and Pakistan have fueled global …


Privatization Of Public Water Services: The States' Role In Ensuring Public Accountability, Craig Anthony Arnold Mar 2012

Privatization Of Public Water Services: The States' Role In Ensuring Public Accountability, Craig Anthony Arnold

Pepperdine Law Review

The privatization of public water services in the United States has grown dramatically in recent years in response to political and ideological interest in privatizing public services, arguments about economic efficiencies, and the realities of overwhelming public costs related to water quality standards, infrastructure upgrade needs, and operational complexities. Many states have expressly enacted statutes authorizing municipalities to transfer services, operation and management, and even ownership of public water systems to private firms. This article systematically evaluates the status of water privatization in the U.S., the legal authority for privatization and its limits, and the most common and significant issues …


The Shifting Interpretations Of Interpol’S Article Three, Kyle Rene Mar 2012

The Shifting Interpretations Of Interpol’S Article Three, Kyle Rene

Kyle Rene

Article Three of INTERPOL’s Constitution prohibits INTERPOL from undertaking “any intervention or activities of a political, military, religious or racial character.” Notwithstanding this prohibition, INTERPOL itself has taken an active role in pursing the perpetrators of one of the most politically, religiously, and racially charged forms of crime, terrorism. The following Note discusses how INTERPOL has rationalized its pursuit of terrorists in light of Article Three’s mandate. The Note concludes by reassessing the value of Article Three, showing how, although Article Three has been interpreted to afford INTERPOL the latitude to pursue terrorists, it nonetheless represents an effective means of …


European Union Security Landscape Post-9/11: Necessary Protection Or Unjustified Expansion Of A Security Regime?, Colby Mangels Mar 2012

European Union Security Landscape Post-9/11: Necessary Protection Or Unjustified Expansion Of A Security Regime?, Colby Mangels

Claremont-UC Undergraduate Research Conference on the European Union

No abstract provided.


Nato's Role In The Global War On Terror: Is The Alliance Obsolete?, Benjamin Forster Mar 2012

Nato's Role In The Global War On Terror: Is The Alliance Obsolete?, Benjamin Forster

Claremont-UC Undergraduate Research Conference on the European Union

No abstract provided.


Conspiracy Law's Threat To Free Speech, Steven R. Morrison Mar 2012

Conspiracy Law's Threat To Free Speech, Steven R. Morrison

Steven R Morrison

Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …


Conspiracy Law's Threat To Free Speech, Steven R. Morrison Mar 2012

Conspiracy Law's Threat To Free Speech, Steven R. Morrison

Steven R Morrison

Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …


Conspiracy Law's Threat To Free Speech, Steven R. Morrison Feb 2012

Conspiracy Law's Threat To Free Speech, Steven R. Morrison

Steven R Morrison

Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …


Conspiracy Law's Threat To Free Speech, Steven R. Morrison Feb 2012

Conspiracy Law's Threat To Free Speech, Steven R. Morrison

Steven R Morrison

Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …


Conspiracy Law's Threat To Free Speech, Steven R. Morrison Feb 2012

Conspiracy Law's Threat To Free Speech, Steven R. Morrison

Steven R Morrison

Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …


Conspiracy Law's Threat To Free Speech, Steven R. Morrison Feb 2012

Conspiracy Law's Threat To Free Speech, Steven R. Morrison

Steven R Morrison

Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …


Conspiracy Law's Threat To Free Speech, Steven R. Morrison Feb 2012

Conspiracy Law's Threat To Free Speech, Steven R. Morrison

Steven R Morrison

Conspiracy law has been the consistent subject of controversy, but most commentators do not consider its negative effect on freedom of speech. When they do, their concerns focus only on the use of speech as the crime’s actus reus. The use of speech as evidence to prove this actus reus is as important and raises conceptually related issues, so current scholarship tells only half of the story. This Article addresses the use of speech as the actus reus of conspiracy and evidence thereof. It sets forth what I call the All-Purpose Speech Model. I argue that this Model accurately describes …


Operation Geronimo: The Legality Of The Targeted Killing Of Osama Bin Laden, Amanda M. Gibbens Jan 2012

Operation Geronimo: The Legality Of The Targeted Killing Of Osama Bin Laden, Amanda M. Gibbens

Amanda M. Gibbens

My recent article entitled, Operation Geronimo: The Legality of the Targeted Killing of Osama bin Laden addresses cutting-edge legal issues such as: counter-terrorism, self-defense, state sovereignty, and targeted killing. Due to the contemporary nature of the topic, few authors have published detailed assessments of the legality of the killing of Osama bin Laden. In my writing I analyze Operation Geronimo under both self-defense and law enforcement principles of treaty-based and customary international law. Additionally, I discuss U.S. constitutional law, the Authorization for Use of Military Force, and Executive Order 12,333 prohibiting assassinations.


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


Battlefield Borders, Threat Rhetoric, And The Militarization Of State And Local Law Enforcement, Danielle C. Jefferis Jan 2012

Battlefield Borders, Threat Rhetoric, And The Militarization Of State And Local Law Enforcement, Danielle C. Jefferis

American University National Security Law Brief

No abstract provided.


The Evolution Of Law And Policy For Cia Targeted Killing, Afsheen John Radsan Jan 2012

The Evolution Of Law And Policy For Cia Targeted Killing, Afsheen John Radsan

Faculty Scholarship

Many critiques of the Central Intelligence Agency’s alleged use of killer drones depend on law that does not bind the United States or on contestable applications of uncertain facts to vague law. While acknowledging a blurry line between law and policy, we continue to develop a due process for targeted killing. In the real world, intelligence is sometimes faulty, mistakes occur, and peaceful civilians are at risk. International humanitarian law, which applies during armed conflicts, demands very little in the way of process beyond the admonition to take feasible precautions. Even so, the intelligence-driven nature of targeted killing, and the …


Assassination Or Targeted Killings After 9/11, John Yoo Jan 2012

Assassination Or Targeted Killings After 9/11, John Yoo

NYLS Law Review

No abstract provided.


Preventing The Financing Of Terrorism, Richard Barrett Jan 2012

Preventing The Financing Of Terrorism, Richard Barrett

Case Western Reserve Journal of International Law

No abstract provided.