Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev Nov 2012

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev

San Diego International Law Journal

The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …


Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay Aug 2012

Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay

Security Studies & International Affairs - Daytona Beach

This article analyzes the phenomenon of homeland security through the development of four conceptual lenses that were created out of the existing literatures in criminal justice, public administration, organization behavior, risk management, international relations, and the overlap between them. Using terrorism as a proxy for the homeland security enterprise, these conceptual lenses include: (1) homeland security as a criminal justice problem which views terrorism as a crime; (2) homeland security as a international relations problem which views terrorism as a war; (3) homeland security as an organization design problem which views terrorism as a network of sub-state transnational actors; and …


Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole Jul 2012

Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole

Georgetown Law Faculty Publications and Other Works

Aziz Rana’s account of the takeover of American national security by experts, and of the public’s acceptance of that state of affairs, offers an important and novel perspective on what ails us in national security today. In this Comment, I suggest that while Rana is correct to identify our deference to experts as a central aspect of the problem, the problem is more complicated. First, the phenomenon of elite control over foreign and security policy questions is not new, but likely dates back to the founding—when elites ruled not based on expertise but on the basis of status, class, and …


The Taint Of Torture: The Roles Of Law And Policy In Our Descent To The Dark Side, David Cole Apr 2012

The Taint Of Torture: The Roles Of Law And Policy In Our Descent To The Dark Side, David Cole

Georgetown Law Faculty Publications and Other Works

Was the Bush administration’s decision to employ “enhanced interrogation techniques” a mistake of policy, a violation of law, or both? This essay responds to Philip Zelikow’s insider account of how the decision to use these techniques was reached. The author suggests that while Zelikow makes a strong case that the decision to authorize the CIA to use coercive interrogation tactics was a mistaken policy judgment, it is important not to lose sight of the fact that it was also illegal. The latter conclusion demands a different response than the former. In particular, it underscores the necessity for accountability. The author …


Security Council Resolution 1887 And The Quest For Nuclear Disarmament, Usman Ahmed, Raghav Thapar Apr 2012

Security Council Resolution 1887 And The Quest For Nuclear Disarmament, Usman Ahmed, Raghav Thapar

Michigan Journal of International Law

Nuclear weapons pose an increased international threat to security in the modem era. Cheap transportation and the opening of national borders for trade have made it easy for nuclear materials to cross national boundaries. Informal networks have sprouted up, facilitating the proliferation and exchange of nuclear materials and the technology required to turn those materials into weapons. Advances in technology have made it easier to enrich uranium, instilling concerns of increased nuclear weapons proliferation. These changes in technology, the development of informal nuclear networks, and lax security in safeguarding weapons by states such as Russia and Pakistan have fueled global …


No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer Jan 2012

No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer

Michigan Telecommunications & Technology Law Review

In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …


Sow What You Reap? Using Predator And Reaper Drones To Carry Out Assassinations Or Targeted Killings Of Suspected Islamic Terrorists, Thomas M. Mcdonnell Jan 2012

Sow What You Reap? Using Predator And Reaper Drones To Carry Out Assassinations Or Targeted Killings Of Suspected Islamic Terrorists, Thomas M. Mcdonnell

Elisabeth Haub School of Law Faculty Publications

This article explores whether targeted killing of suspected Islamist terrorists comports with international law generally, whether any special rules apply in so-called “failed states,” and whether deploying attack drones poses special risks for the civilian population, for humanitarian and human rights law, and for the struggle against terrorism. Part I of this article discusses the Predator Drone and its upgraded version Predator B, the Reaper, and analyzes their technological capabilities and innovations. Part II discusses international humanitarian law and international human rights law as applied to a state’s targeting and killing an individual inside or outside armed conflict or in …


Assassination Or Targeted Killings After 9/11, John Yoo Jan 2012

Assassination Or Targeted Killings After 9/11, John Yoo

NYLS Law Review

No abstract provided.


Judicial Foreign Relations Authority After 9/11, Martin S. Flaherty Jan 2012

Judicial Foreign Relations Authority After 9/11, Martin S. Flaherty

NYLS Law Review

No abstract provided.


Due Process In American Military Tribunals After September 11, 2001, Gary Shaw Jan 2012

Due Process In American Military Tribunals After September 11, 2001, Gary Shaw

Touro Law Review

The Authorization for Use of Military Force ("AUMF") provides broad powers for a president after September 11, 2001. President Bush, under the AUMF, claimed he had the power to hold "enemy combatants" without due process. This gave rise to two questions that the article addresses: "Could they be held indefinitely without charges or proceedings being initiated? If proceedings had to be initiated, what process was due to the defendants?"


Responses To The Five Questions, Charles J. Dunlap Jr. Jan 2012

Responses To The Five Questions, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


A Tale Of Two Brothers: The Impact Of The Khadr Cases On Canadian Anti-Terrorism Law, Robert Currie Jan 2012

A Tale Of Two Brothers: The Impact Of The Khadr Cases On Canadian Anti-Terrorism Law, Robert Currie

Articles, Book Chapters, & Popular Press

After something of a slow start, Canada’s post-9/11 terrorism laws have seen a fair amount of traffic over the last several years, and many of these prosecutions were high-profile in both the public and the legal senses. The case of the “Toronto 18” was well-chewed over by the press, coverage oscillating between grim amusement at the apparent incompetence of some of the accused and the sobering danger presented by others. The Supreme Court of Canada recently granted leave to appeal in the cases of Momin Khawaja, who was convicted for various terrorist activities carried out within and outside Canada, and …


Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel Ryan Kosloskey Jan 2012

Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel Ryan Kosloskey

West Virginia Law Review

No abstract provided.


Preventing Atoms For Peace From Becoming Atoms Of Terror: The National Environmental Policy Act Is Not A Vehicle For Addressing Terrorism, David D. Leege Jan 2012

Preventing Atoms For Peace From Becoming Atoms Of Terror: The National Environmental Policy Act Is Not A Vehicle For Addressing Terrorism, David D. Leege

Catholic University Law Review

No abstract provided.


The First Amendment’S Borders: The Place Of Holder V. Humanitarian Law Project In First Amendment Doctrine, David Cole Jan 2012

The First Amendment’S Borders: The Place Of Holder V. Humanitarian Law Project In First Amendment Doctrine, David Cole

Georgetown Law Faculty Publications and Other Works

In Holder v. Humanitarian Law Project, the Supreme Court’s first decision pitting First Amendment rights against national security interests since the terrorist attacks of September 11, 2001, the Court appears to have radically departed from some of the First Amendment’s most basic principles, including the maxims that speech may not be penalized because of its viewpoint, that even speech advocating crime deserves protection until it constitutes incitement, and that political association is constitutionally protected absent specific intent to further a group’s illegal ends. These principles lie at the core of our political and democratic freedoms, yet Humanitarian Law Project …


A Functional Approach To Targeting And Detention, Monica Hakimi Jan 2012

A Functional Approach To Targeting And Detention, Monica Hakimi

Articles

The international law governing when states may target to kill or preventively detain nonstate actors is in disarray. This Article puts much of the blame on the method that international law uses to answer that question. The method establishes different standards in four regulatory domains: (1) law enforcement, (2) emergency, (3) armed conflict for civilians, and (4) armed conflict for combatants. Because the legal standards vary, so too may substantive outcomes; decisionmakers must select the correct domain before determining whether targeting or detention is lawful. This Article argues that the "domain method" is practically unworkable and theoretically dubious. Practically, the …


Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …


Detention Debates, Deborah N. Pearlstein Jan 2012

Detention Debates, Deborah N. Pearlstein

Michigan Law Review

Since the United States began detaining people in efforts it has characterized, with greater and lesser accuracy, as part of global counterterrorism operations, U.S. detention programs have spawned more than 200 different lawsuits producing 6 Supreme Court decisions, 4 major pieces of legislation, at least 7 executive orders across 2 presidential administrations, more than 100 books, 231 law review articles (counting only those with the word "Guantanamo" in the title), dozens of reports by nongovernmental organizations, and countless news and analysis articles from media outlets in and out of the mainstream. For those in the academic and policy communities who …


National Security Federalism In The Age Of Terror, Matthew C. Waxman Jan 2012

National Security Federalism In The Age Of Terror, Matthew C. Waxman

Faculty Scholarship

National security law scholarship tends to focus on the balancing of security and liberty, and the overwhelming bulk of that scholarship is about such balancing on the horizontal axis among branches at the federal level. This Article challenges that standard focus by supplementing it with an account of the vertical axis and the emergent, post-9/11 role of state and local government in American national security law and policy. It argues for a federalism frame that emphasizes vertical intergovernmental arrangements for promoting and mediating a dense array of policy values over the long term. This federalism frame helps in understanding the …


Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky Jan 2012

Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky

UF Law Faculty Publications

Many anti-terrorism measures are enacted with broad public support. There is often a general willingness on the part of the public to accept greater civil liberties deprivations in the face of a specific threat, or otherwise in times of general crisis, than would otherwise be the case. Sweeping anti-terrorism legislation is frequently crafted in reaction to the presence, or perceived presence, of immense, imminent danger. The medium and long-term consequences of the legislation may not fully be comprehended when political leaders and policymakers take swift action in the face strong public pressure in light of a recent terrorist attack or …


Where Liberty Lies: Civil Society And Individual Rights After 9/11, David Cole Jan 2012

Where Liberty Lies: Civil Society And Individual Rights After 9/11, David Cole

Georgetown Law Faculty Publications and Other Works

Had someone told you, on September 11, 2001, that the United States would not be able to do whatever it wanted in response to the terrorist attacks of that day, you might well have questioned their sanity. The United States was the most powerful country in the world, and had the world’s sympathy in the immediate aftermath of the attacks. Who would stop it? Al Qaeda had few friends beyond the Taliban. As a historical matter, Congress and the courts had virtually always deferred to the executive in such times of crisis. And the American polity was unlikely to object …