Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Georgetown University Law Center (5)
- University of Michigan Law School (4)
- New York Law School (2)
- Columbia Law School (1)
- Duke Law (1)
-
- Embry-Riddle Aeronautical University (1)
- Pace University (1)
- Schulich School of Law, Dalhousie University (1)
- The Catholic University of America, Columbus School of Law (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Florida Levin College of Law (1)
- University of San Diego (1)
- West Virginia University (1)
- Publication
-
- Georgetown Law Faculty Publications and Other Works (5)
- Faculty Scholarship (2)
- NYLS Law Review (2)
- Articles (1)
- Articles, Book Chapters, & Popular Press (1)
-
- Catholic University Law Review (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Michigan Journal of International Law (1)
- Michigan Law Review (1)
- Michigan Telecommunications & Technology Law Review (1)
- San Diego International Law Journal (1)
- Security Studies & International Affairs - Daytona Beach (1)
- Touro Law Review (1)
- UF Law Faculty Publications (1)
- West Virginia Law Review (1)
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Law
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
San Diego International Law Journal
The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …
Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay
Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay
Security Studies & International Affairs - Daytona Beach
This article analyzes the phenomenon of homeland security through the development of four conceptual lenses that were created out of the existing literatures in criminal justice, public administration, organization behavior, risk management, international relations, and the overlap between them. Using terrorism as a proxy for the homeland security enterprise, these conceptual lenses include: (1) homeland security as a criminal justice problem which views terrorism as a crime; (2) homeland security as a international relations problem which views terrorism as a war; (3) homeland security as an organization design problem which views terrorism as a network of sub-state transnational actors; and …
Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole
Confronting The Wizard Of Oz: National Security, Expertise, And Secrecy, David Cole
Georgetown Law Faculty Publications and Other Works
Aziz Rana’s account of the takeover of American national security by experts, and of the public’s acceptance of that state of affairs, offers an important and novel perspective on what ails us in national security today. In this Comment, I suggest that while Rana is correct to identify our deference to experts as a central aspect of the problem, the problem is more complicated. First, the phenomenon of elite control over foreign and security policy questions is not new, but likely dates back to the founding—when elites ruled not based on expertise but on the basis of status, class, and …
The Taint Of Torture: The Roles Of Law And Policy In Our Descent To The Dark Side, David Cole
The Taint Of Torture: The Roles Of Law And Policy In Our Descent To The Dark Side, David Cole
Georgetown Law Faculty Publications and Other Works
Was the Bush administration’s decision to employ “enhanced interrogation techniques” a mistake of policy, a violation of law, or both? This essay responds to Philip Zelikow’s insider account of how the decision to use these techniques was reached. The author suggests that while Zelikow makes a strong case that the decision to authorize the CIA to use coercive interrogation tactics was a mistaken policy judgment, it is important not to lose sight of the fact that it was also illegal. The latter conclusion demands a different response than the former. In particular, it underscores the necessity for accountability. The author …
Security Council Resolution 1887 And The Quest For Nuclear Disarmament, Usman Ahmed, Raghav Thapar
Security Council Resolution 1887 And The Quest For Nuclear Disarmament, Usman Ahmed, Raghav Thapar
Michigan Journal of International Law
Nuclear weapons pose an increased international threat to security in the modem era. Cheap transportation and the opening of national borders for trade have made it easy for nuclear materials to cross national boundaries. Informal networks have sprouted up, facilitating the proliferation and exchange of nuclear materials and the technology required to turn those materials into weapons. Advances in technology have made it easier to enrich uranium, instilling concerns of increased nuclear weapons proliferation. These changes in technology, the development of informal nuclear networks, and lax security in safeguarding weapons by states such as Russia and Pakistan have fueled global …
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
No Cause Of Action: Video Surveillance In New York City, Olivia J. Greer
Michigan Telecommunications & Technology Law Review
In 2010, New York City Police Commissioner Raymond Kelly announced a new network of video surveillance in the City. The new network would be able to prevent future terrorist attacks by identifying suspicious behavior before catastrophic events could take place. Kelly told reporters, "If we're looking for a person in a red jacket, we can call up all the red jackets filmed in the last 30 days," and "[w]e're beginning to use software that can identify suspicious objects or behaviors." Gothamist later made a witticism of Kelly's statement, remarking, "Note to terrorists: red jackets are not a good look for …
Sow What You Reap? Using Predator And Reaper Drones To Carry Out Assassinations Or Targeted Killings Of Suspected Islamic Terrorists, Thomas M. Mcdonnell
Sow What You Reap? Using Predator And Reaper Drones To Carry Out Assassinations Or Targeted Killings Of Suspected Islamic Terrorists, Thomas M. Mcdonnell
Elisabeth Haub School of Law Faculty Publications
This article explores whether targeted killing of suspected Islamist terrorists comports with international law generally, whether any special rules apply in so-called “failed states,” and whether deploying attack drones poses special risks for the civilian population, for humanitarian and human rights law, and for the struggle against terrorism. Part I of this article discusses the Predator Drone and its upgraded version Predator B, the Reaper, and analyzes their technological capabilities and innovations. Part II discusses international humanitarian law and international human rights law as applied to a state’s targeting and killing an individual inside or outside armed conflict or in …
Assassination Or Targeted Killings After 9/11, John Yoo
Assassination Or Targeted Killings After 9/11, John Yoo
NYLS Law Review
No abstract provided.
Judicial Foreign Relations Authority After 9/11, Martin S. Flaherty
Judicial Foreign Relations Authority After 9/11, Martin S. Flaherty
NYLS Law Review
No abstract provided.
Due Process In American Military Tribunals After September 11, 2001, Gary Shaw
Due Process In American Military Tribunals After September 11, 2001, Gary Shaw
Touro Law Review
The Authorization for Use of Military Force ("AUMF") provides broad powers for a president after September 11, 2001. President Bush, under the AUMF, claimed he had the power to hold "enemy combatants" without due process. This gave rise to two questions that the article addresses: "Could they be held indefinitely without charges or proceedings being initiated? If proceedings had to be initiated, what process was due to the defendants?"
Responses To The Five Questions, Charles J. Dunlap Jr.
Responses To The Five Questions, Charles J. Dunlap Jr.
Faculty Scholarship
No abstract provided.
A Tale Of Two Brothers: The Impact Of The Khadr Cases On Canadian Anti-Terrorism Law, Robert Currie
A Tale Of Two Brothers: The Impact Of The Khadr Cases On Canadian Anti-Terrorism Law, Robert Currie
Articles, Book Chapters, & Popular Press
After something of a slow start, Canada’s post-9/11 terrorism laws have seen a fair amount of traffic over the last several years, and many of these prosecutions were high-profile in both the public and the legal senses. The case of the “Toronto 18” was well-chewed over by the press, coverage oscillating between grim amusement at the apparent incompetence of some of the accused and the sobering danger presented by others. The Supreme Court of Canada recently granted leave to appeal in the cases of Momin Khawaja, who was convicted for various terrorist activities carried out within and outside Canada, and …
Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel Ryan Kosloskey
Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel Ryan Kosloskey
West Virginia Law Review
No abstract provided.
Preventing Atoms For Peace From Becoming Atoms Of Terror: The National Environmental Policy Act Is Not A Vehicle For Addressing Terrorism, David D. Leege
Preventing Atoms For Peace From Becoming Atoms Of Terror: The National Environmental Policy Act Is Not A Vehicle For Addressing Terrorism, David D. Leege
Catholic University Law Review
No abstract provided.
The First Amendment’S Borders: The Place Of Holder V. Humanitarian Law Project In First Amendment Doctrine, David Cole
The First Amendment’S Borders: The Place Of Holder V. Humanitarian Law Project In First Amendment Doctrine, David Cole
Georgetown Law Faculty Publications and Other Works
In Holder v. Humanitarian Law Project, the Supreme Court’s first decision pitting First Amendment rights against national security interests since the terrorist attacks of September 11, 2001, the Court appears to have radically departed from some of the First Amendment’s most basic principles, including the maxims that speech may not be penalized because of its viewpoint, that even speech advocating crime deserves protection until it constitutes incitement, and that political association is constitutionally protected absent specific intent to further a group’s illegal ends. These principles lie at the core of our political and democratic freedoms, yet Humanitarian Law Project …
A Functional Approach To Targeting And Detention, Monica Hakimi
A Functional Approach To Targeting And Detention, Monica Hakimi
Articles
The international law governing when states may target to kill or preventively detain nonstate actors is in disarray. This Article puts much of the blame on the method that international law uses to answer that question. The method establishes different standards in four regulatory domains: (1) law enforcement, (2) emergency, (3) armed conflict for civilians, and (4) armed conflict for combatants. Because the legal standards vary, so too may substantive outcomes; decisionmakers must select the correct domain before determining whether targeting or detention is lawful. This Article argues that the "domain method" is practically unworkable and theoretically dubious. Practically, the …
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …
Detention Debates, Deborah N. Pearlstein
Detention Debates, Deborah N. Pearlstein
Michigan Law Review
Since the United States began detaining people in efforts it has characterized, with greater and lesser accuracy, as part of global counterterrorism operations, U.S. detention programs have spawned more than 200 different lawsuits producing 6 Supreme Court decisions, 4 major pieces of legislation, at least 7 executive orders across 2 presidential administrations, more than 100 books, 231 law review articles (counting only those with the word "Guantanamo" in the title), dozens of reports by nongovernmental organizations, and countless news and analysis articles from media outlets in and out of the mainstream. For those in the academic and policy communities who …
National Security Federalism In The Age Of Terror, Matthew C. Waxman
National Security Federalism In The Age Of Terror, Matthew C. Waxman
Faculty Scholarship
National security law scholarship tends to focus on the balancing of security and liberty, and the overwhelming bulk of that scholarship is about such balancing on the horizontal axis among branches at the federal level. This Article challenges that standard focus by supplementing it with an account of the vertical axis and the emergent, post-9/11 role of state and local government in American national security law and policy. It argues for a federalism frame that emphasizes vertical intergovernmental arrangements for promoting and mediating a dense array of policy values over the long term. This federalism frame helps in understanding the …
Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky
Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky
UF Law Faculty Publications
Many anti-terrorism measures are enacted with broad public support. There is often a general willingness on the part of the public to accept greater civil liberties deprivations in the face of a specific threat, or otherwise in times of general crisis, than would otherwise be the case. Sweeping anti-terrorism legislation is frequently crafted in reaction to the presence, or perceived presence, of immense, imminent danger. The medium and long-term consequences of the legislation may not fully be comprehended when political leaders and policymakers take swift action in the face strong public pressure in light of a recent terrorist attack or …
Where Liberty Lies: Civil Society And Individual Rights After 9/11, David Cole
Where Liberty Lies: Civil Society And Individual Rights After 9/11, David Cole
Georgetown Law Faculty Publications and Other Works
Had someone told you, on September 11, 2001, that the United States would not be able to do whatever it wanted in response to the terrorist attacks of that day, you might well have questioned their sanity. The United States was the most powerful country in the world, and had the world’s sympathy in the immediate aftermath of the attacks. Who would stop it? Al Qaeda had few friends beyond the Taliban. As a historical matter, Congress and the courts had virtually always deferred to the executive in such times of crisis. And the American polity was unlikely to object …