Open Access. Powered by Scholars. Published by Universities.®

Criminal Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Criminal Law

Criminal Defamation And The Evolution Of The Doctrine Of Freedom Of Expression In International Law, Jo M. Pasqualucci Jan 2006

Criminal Defamation And The Evolution Of The Doctrine Of Freedom Of Expression In International Law, Jo M. Pasqualucci

Vanderbilt Journal of Transnational Law

Restrictions on freedom of expression may take direct and indirect forms. A state may censor speech, criminalize defamation, harass the media or individual journalists, fail to investigate crimes against the media , require the compulsory licensing of journalists, or fail to enact freedom of information laws or laws that prohibit monopoly ownership of the media. A victim of a restriction on freedom of expression that violates international law may have no recourse in domestic courts, either because state law offers no remedy or because judges are too intimidated to enforce the laws as written. In such instances, victims need recourse …


Who's Afraid Of The Big Bad Wolf? The International Criminal Court As A Weapon Of Asymmetric Warfare, W. C. Austin Jan 2006

Who's Afraid Of The Big Bad Wolf? The International Criminal Court As A Weapon Of Asymmetric Warfare, W. C. Austin

Vanderbilt Journal of Transnational Law

The United States is engaged in a war on terror against enemies who wage "asymmetric war" through terrorism, media manipulation, and "law-fare"---exploiting judicial processes to achieve political or military objectives.

This Article explores whether the fledgling International Criminal Court (ICC) could eventually be exploited by these groups as a tool of asymmetric "law-fare." It briefly traces the history of the ICC and recounts why the United States opposes the Court. Examining the methods of asymmetric war, the Authors then explore whether the ICC could be exploited by future asymmetric warriors.

The Authors describe three asymmetric methods that could be used …