Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Reconceptualizing Criminal Law Defenses, Victoria Nourse Jan 2003

Reconceptualizing Criminal Law Defenses, Victoria Nourse

Georgetown Law Faculty Publications and Other Works

In 1933, one of the leading theorists of the criminal law, Jerome Michael, wrote openly of the criminal law "as an instrument of the state." Today, criminal law is largely allergic to claims of political theory; commentators obsess about theories of deterrence and retribution, and the technical details of model codes and sentencing grids, but rarely speak of institutional effects or political commitments. In this article, the author aims to change that emphasis and to examine the criminal law as a tool for governance. Her approach is explicitly constructive: it accepts the criminal law that we have, places it in …


The Difference In Criminal Defense And The Difference It Makes, Abbe Smith Jan 2003

The Difference In Criminal Defense And The Difference It Makes, Abbe Smith

Georgetown Law Faculty Publications and Other Works

My own view of criminal defense lawyering owes much to Monroe Freedman. I agree with his "traditionalist view”, of criminal defense ethics as a lawyering paradigm in which zealous advocacy and the maintenance of client confidence and trust are paramount. Simply put, zeal and confidentiality trump most other rules, principles, or values. When there is tension between these "fundamental principles” and other ethical rules, criminal defense lawyers must uphold the principles, even in the face of public or professional outcry. Although a defender must act within the bounds of the law, he or she should engage in advocacy that is …


Digital Architecture As Crime Control, Neal K. Katyal Jan 2003

Digital Architecture As Crime Control, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

This paper explains how theories of realspace architecture inform the prevention of computer crime. Despite the prevalence of the metaphor, architects in realspace and cyberspace have not talked to one another. There is a dearth of literature about digital architecture and crime altogether, and the realspace architectural literature on crime prevention is often far too soft for many software engineers. This paper will suggest the broad brushstrokes of potential design solutions to cybercrime, and in the course of so doing, will pose severe criticisms of the White House's recent proposals on cybersecurity.

The paper begins by introducing four concepts of …


Conspiracy Theory, Neal K. Katyal Jan 2003

Conspiracy Theory, Neal K. Katyal

Georgetown Law Faculty Publications and Other Works

Over one-quarter of all federal criminal prosecutions and a large number of state cases involve prosecutions for conspiracy. Yet, the major scholarly articles and the bulk of prominent jurists have roundly condemned the doctrine. This Article offers a functional justification for the legal prohibition against conspiracy, centering on psychological and economic accounts. Advances in psychology over the past thirty years have demonstrated that groups cultivate a special social identity. This identity often encourages risky behavior, leads individuals to behave against their self-interest, solidifies loyalty, and facilitates harm against non-members. So, too, economists have developed sophisticated explanations for why firms promote …


American Servicemembers' Protection Act Of 2002, Lilian V. Faulhaber Jan 2003

American Servicemembers' Protection Act Of 2002, Lilian V. Faulhaber

Georgetown Law Faculty Publications and Other Works

On July 1, 2002, the Rome Statute of the International Criminal Court ("ICC") entered into force, establishing the first permanent international criminal tribunal. Although seventy-six countries had ratified the Rome Statute by that date, the United States was not among them. Instead, Congress responded to the creation of the ICC by passing a bill sponsored by House Majority Whip Tom DeLay (R-Tex.) that Republican legislators had been trying to get through the House and Senate for several years. On August 2, 2002, the American Servicemembers' Protection Act of 2002 ("ASPA") became law. The Act was designed to prevent United States …


The New Mccarthyism: Repeating History In The War In Terrorism, David Cole Jan 2003

The New Mccarthyism: Repeating History In The War In Terrorism, David Cole

Georgetown Law Faculty Publications and Other Works

This Essay will argue that the government has invoked two methods in particular in virtually every time of fear. The first, discussed in Part I, involves a substantive expansion of the terms of responsibility. Authorities target individuals not for what they do or have done but based on predictions about what they might do. These predictions often rely on the individuals' skin color, nationality, or political and religious associations. The second method, the subject of Part II, is procedural-the government invokes administrative processes to control, precisely so that it can avoid the guarantees associated with the criminal process. In hindsight, …