Open Access. Powered by Scholars. Published by Universities.®

Criminal Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Criminal Law

Transfer Of Child Offenders To Adult Criminal Courts In The Usa: An Unnecessary Exercise, Unconstitutional Practice, International Law Violation, Or All Of The Above?, Roger-Claude Liwanga, Patrick Ibe Jun 2021

Transfer Of Child Offenders To Adult Criminal Courts In The Usa: An Unnecessary Exercise, Unconstitutional Practice, International Law Violation, Or All Of The Above?, Roger-Claude Liwanga, Patrick Ibe

Georgia Journal of International & Comparative Law

There is an ongoing debate over the legality and effectiveness of the use of judicial waiver as a tool to fight violent crimes, including those committed by children in the United States. Judicial waiver or transfer of juveniles is a process by which child offenders are transferred from the juvenile court to adult criminal courts to be tried and sentenced as adult offenders. Despite the implicit recognition of the constitutionality of this practice by the United States Supreme Court, this paper contends that the transfer of child offenders to adult criminal courts violates key provisions of the Convention on the …


Self-Defense To Cyber Force: Combatting The Notion Of 'Scale And Effect', Thomas Eaton Jan 2021

Self-Defense To Cyber Force: Combatting The Notion Of 'Scale And Effect', Thomas Eaton

Scholarly Works

The ability to reach out, with a few keystrokes or a couple lines of code, through the interconnected world of cyberspace and create militarily advantageous effects 10,000 miles away has changed warfare as previously conceived, perhaps more than any other advancement in any other domain of war. Cyber weapons are weapons, and whatever law applies to conventional weapons equally applies to cyber weapons. Long before cyber operations were even science fiction, there was much debate over what constituted a use of force that would justify force in response. In many ways, the debate over what constitutes cyber-attacks has been pasted …