Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Law

Series

Terrorism

Institution
Publication Year
Publication

Articles 1 - 30 of 73

Full-Text Articles in Law

Digital Terror Crimes, Cody Corliss Jan 2024

Digital Terror Crimes, Cody Corliss

Law Faculty Scholarship

Terror actors operating within armed conflict have weaponized social media by using these platforms to threaten and spread images of brutality in order to taunt, terrify, and intimidate civilians. These acts or threats of violence are terror, a prohibited war crime in which acts or threats of violence are made with the primary purpose of spreading terror among the civilian population. The weaponization of terror content through social media is a digital terror crime.

This article is the first to argue that the war crime of terror applies to digital terror crimes perpetrated through social media platforms. It situates digital …


Law School News: Adjunct Professor Of The Year 2021: David Coombs 05/19/2021, Michael M. Bowden May 2021

Law School News: Adjunct Professor Of The Year 2021: David Coombs 05/19/2021, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia Jan 2021

The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.


Law School News: Adjunct Professor Of The Year: David Coombs 05-13-2020, Michael M. Bowden May 2020

Law School News: Adjunct Professor Of The Year: David Coombs 05-13-2020, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Racial Profiling: Past, Present, And Future, David A. Harris Jan 2020

Racial Profiling: Past, Present, And Future, David A. Harris

Articles

It has been more than two decades since the introduction of the first bill in Congress that addressed racial profiling in 1997. Between then and now, Congress never passed legislation on the topic, but more than half the states passed laws and many police departments put anti-profiling policies in place to combat it. The research and data on racial profiling has grown markedly over the last twenty-plus years. We know that the practice is real (contrary to many denials), and the data reveal racial profiling’s shortcomings and great social costs. Nevertheless, racial profiling persists. While it took root most prominently …


Are Domestic Abusers Terrorists: Rhetoric, Reality, And Asylum Law, Natalie Nanasi Jan 2019

Are Domestic Abusers Terrorists: Rhetoric, Reality, And Asylum Law, Natalie Nanasi

Faculty Journal Articles and Book Chapters

The terms terrorism and terrorist are highly charged but all too often imprecisely utilized in legal, media, and political arenas. The terminology has even entered the field of intimate partner violence, where the phrases terrorism in the home or intimate terrorism have been used to describe domestic abuse. This language has proliferated not only due to identified commonalities between intimate partner abuse and terroristic behaviors but also because of the rhetorical impact of the words in highlighting the gravity of domestic violence. However, expanding the legal framework of terrorism into new areas has potentially serious and far-reaching consequences. It is …


How The War On Terror Is Transforming Private U.S. Law, Maryam Jamshidi Jan 2018

How The War On Terror Is Transforming Private U.S. Law, Maryam Jamshidi

UF Law Faculty Publications

In thinking about the War on Terror’s impact on U.S. law, what most likely comes to mind are its corrosive effects on public law, including criminal law, immigration, and constitutional law. What is less appreciated is whether and how the fight against terrorism has also impacted private law. As this Article demonstrates, the War on Terror has had a negative influence on private law, specifically on torts, where it has upended long-standing norms, much as it has done in the public law context.

Case law construing the private right of action under the Antiterrorism Act of 1992, 18 U.S.C. § …


A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr May 2017

A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr

Senior Honors Theses

Since the 9/11 attacks, American legislation and legal policy in regards to classifying and processing captured terrorists has fallen short of being fully effective and lawful. Trial and error by the Bush and Obama administrations has uncovered two key lessons: (1) captured terrorists are not typical prisoners of war and thus their detainment must involve more legal scrutiny than the latter; and (2) captured terrorists are not ordinary criminals and thus the civilian criminal court system, due to constitutional constraints, is not capable of adequately trying every count of terrorism. Other nations, including France and Israel, approach this problem with …


Crimmigration-Counterterrorism, Margaret Hu Jan 2017

Crimmigration-Counterterrorism, Margaret Hu

Scholarly Articles

The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …


Blood Antiquities: Addressing A Culture Of Impunity In The Antiquities Market, Paul Williams, Christin Coster Jan 2017

Blood Antiquities: Addressing A Culture Of Impunity In The Antiquities Market, Paul Williams, Christin Coster

Articles in Law Reviews & Other Academic Journals

For decades, parties to conflicts have used the cover of war to destroy and loot cultural property and antiquities for financial gain and symbolic victory. The “blood antiquities” excavated in conflict areas and sold mostly in western markets fuel not only continued conflict, but also (as in cases such as Syria and Iraq) terrorism that can reach around the world. The culture of impunity for both buyers and sellers of antiquities allows the blood-antiquities trade to thrive.

A robust international legal framework does exist to ensure accountability for the destruction of cultural heritage. Because looting is a major cause of …


The Identification And Exploitation Of Terrorist Financing, Jacob S. Gordon May 2016

The Identification And Exploitation Of Terrorist Financing, Jacob S. Gordon

Senior Honors Theses

Terrorism and the threat of terrorist attacks have forced the United States to place a high priority on developing a comprehensive counterterrorism strategy. A crucial component of this overarching strategy focuses on targeting the finances of a terrorist organization, hoping to eliminate or stifle their sources of funding in an effort to render the organization incapable of launching successful operations due to an absence of funding. By analyzing the most common financing options that terrorist groups use, the United States can hone its ability to disrupt the funding operations for terrorist groups. Likewise, developing a method for tracking the laundering …


Newsroom: Margulies On Terror Suspect Arrest, Roger Williams University School Of Law Jun 2015

Newsroom: Margulies On Terror Suspect Arrest, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Mirandizing Terrorism Suspects? The Public Safety Exception, The Rescue Doctrine, And Implicit Analogies To Self-Defense, Defense Of Others, And Battered Woman Syndrome, Bruce Ching Jan 2015

Mirandizing Terrorism Suspects? The Public Safety Exception, The Rescue Doctrine, And Implicit Analogies To Self-Defense, Defense Of Others, And Battered Woman Syndrome, Bruce Ching

Journal Articles

This article argues that in creating the public safety exception to the Miranda requirements, the Supreme Court implicitly analogized to the criminal law doctrines of self-defense and defense of others. Thus, examining the justifications of self-defense and defense of others can be useful in determining the contours of the public safety exception and the related "rescue doctrine" exception. In particular, the battered woman syndrome -- which is recognized in a majority of the states and has been successfully invoked by defendants in some self-defense cases -- could provide a conceptual analogue for arguments about whether law enforcement officers were faced …


Terrorism Trials In Article Iii Courts, Laura K. Donohue Jan 2015

Terrorism Trials In Article Iii Courts, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Some individuals reject Article III courts as a forum for bringing terrorist suspects to justice on the grounds that the ordinary judicial system cannot handle such cases. As an empirical matter, this claim is simply false. Since 2001, myriad terrorism trials have progressed through the criminal system. The U.S. Department of Justice (DOJ) reports that between 2001 and 2010, there were 998 defendants indicted in terrorism prosecutions. Eighty-seven percent of the defendants were convicted on at least one charge. According to the Executive Office for the U.S. Attorneys, from FY 2004 to FY 2009, there were 3,010 terrorism prosecutions. It …


The Difference Prevention Makes: Regulating Preventive Justice, David Cole Mar 2014

The Difference Prevention Makes: Regulating Preventive Justice, David Cole

Georgetown Law Faculty Publications and Other Works

Since the terrorist attacks of September 11, 2001, the United States and many other countries have adopted a ‘‘paradigm of prevention,’’ employing a range of measures in an attempt to prevent future terrorist attacks. This includes the use of pre textual charges for preventive detention, the expansion of criminal liability to prohibit conduct that precedes terrorism, and expansion of surveillance at home and abroad. Politicians and government officials often speak of prevention as if it is an unqualified good. Everyone wants to prevent the next terrorist attack, after all. And many preventive initiatives, especially where they are not coercive and …


Special Administrative Measures: An Example Of Counterterror Excesses And Their Roots In U.S. Criminal Justice, Francesca Laguardia Jan 2014

Special Administrative Measures: An Example Of Counterterror Excesses And Their Roots In U.S. Criminal Justice, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

This article examines the creation and implementation of pretrial Special Administrative Measures [SAMs], a version of pretrial solitary confinement now used most often to confine terror suspects in the federal criminal justice system. Through an in-depth archival study, this article brings attention to the importance of 20th-century criminal justice trends to the 21st-century response to the threat of terrorism, including an increasingly preventive focus and decreasing judicial checks on executive action. The findings suggest that practices believed to be excessive responses to the threat of terrorism are in fact a natural outgrowth of late modern criminal justice.


Pre-Crime Restraints: The Explosion Of Targeted, Non-Custodial Prevention, Jennifer Daskal Jan 2014

Pre-Crime Restraints: The Explosion Of Targeted, Non-Custodial Prevention, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

This Article exposes the ways in which noncustodial pre-crime restraints have proliferated over the past decade, focusing in particular on three notable examples — terrorism-related financial sanctions, the No Fly List, and the array of residential, employment, and related restrictions imposed on sex offenders. Because such restraints do not involve physical incapacitation, they are rarely deemed to infringe core liberty interests. Because they are preventive, not punitive, criminal law procedural protections do not apply. They have exploded largely unchecked — subject to little more than bare rationality review and negligible procedural protections — and without any coherent theory as to …


Accelerated Formation Of Customary International Law, Michael P. Scharf Jan 2014

Accelerated Formation Of Customary International Law, Michael P. Scharf

Faculty Publications

This article examines the phenomenon of accelerated formation of customary international law. It argues that in periods of fundamental change (which the author characterizes as "Grotian Moments"), whether by technological advances, the commission of new forms of crimes against humanity, or the development of new means of warfare or terrorism, customary international law may form much more rapidly and with less state practice than is normally the case to keep up with the pace of developments. The article examines several case studies that explore the application and contours of the concept of "Grotian Moments."


The Trickle-Down War, Rosa Brooks Jan 2014

The Trickle-Down War, Rosa Brooks

Georgetown Law Faculty Publications and Other Works

The history of the European nation-state, wrote political sociologist Charles Tilly, is inextricably bound up with the history of warfare. To oversimplify Tilly’s nuanced and complex arguments, the story goes something like this: As power-holders (originally bandits and local strongmen) sought to expand their power, they needed capital to pay for weapons, soldiers and supplies. The need for capital and new recruits drove the creation of taxation systems and census mechanisms, and the need for more effective systems of taxation and recruitment necessitated better roads, better communications and better record keeping. This in turn enabled the creation of larger and …


Natural Law & Lawlessness: Modern Lessons From Pirates, Lepers, Eskimos, And Survivors, Paul H. Robinson Jan 2013

Natural Law & Lawlessness: Modern Lessons From Pirates, Lepers, Eskimos, And Survivors, Paul H. Robinson

All Faculty Scholarship

The natural experiments of history present an opportunity to test Hobbes' view of government and law as the wellspring of social order. Groups have found themselves in a wide variety of situations in which no governmental law existed, from shipwrecks to gold mining camps to failed states. Yet the wide variety of situations show common patterns among the groups in their responses to their often difficult circumstances. Rather than survival of the fittest, a more common reaction is social cooperation and a commitment to fairness and justice, although both can be subverted in certain predictable ways. The absent-law situations also …


Gender-Based Perceptions Of The 2001 Anthrax Attacks: Implications For Outreach And Preparedness, Christopher Salvatore, Brian J. Gorman Sep 2012

Gender-Based Perceptions Of The 2001 Anthrax Attacks: Implications For Outreach And Preparedness, Christopher Salvatore, Brian J. Gorman

Department of Justice Studies Faculty Scholarship and Creative Works

Extensive research dealing with gender-based perceptions of fear of crime has generally found that women express greater levels of fear compared to men. Further, studies have found that women engage in more self-protective behaviors in response to fear of crime, as well as have different levels of confidence in government efficacy relative to men. The majority of these studies have focused on violent and property crime; little research has focused on gender-based perceptions of the threat of bioterrorism. Using data from a national survey conducted by ABC News / Washington Post, this study contrasted perceptions of safety and fear in …


Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky Jan 2012

Mission Creep In National Security Law, Fletcher N. Baldwin Jr., Daniel R. Koslosky

UF Law Faculty Publications

Many anti-terrorism measures are enacted with broad public support. There is often a general willingness on the part of the public to accept greater civil liberties deprivations in the face of a specific threat, or otherwise in times of general crisis, than would otherwise be the case. Sweeping anti-terrorism legislation is frequently crafted in reaction to the presence, or perceived presence, of immense, imminent danger. The medium and long-term consequences of the legislation may not fully be comprehended when political leaders and policymakers take swift action in the face strong public pressure in light of a recent terrorist attack or …


A Tale Of Two Brothers: The Impact Of The Khadr Cases On Canadian Anti-Terrorism Law, Robert Currie Jan 2012

A Tale Of Two Brothers: The Impact Of The Khadr Cases On Canadian Anti-Terrorism Law, Robert Currie

Articles, Book Chapters, & Popular Press

After something of a slow start, Canada’s post-9/11 terrorism laws have seen a fair amount of traffic over the last several years, and many of these prosecutions were high-profile in both the public and the legal senses. The case of the “Toronto 18” was well-chewed over by the press, coverage oscillating between grim amusement at the apparent incompetence of some of the accused and the sobering danger presented by others. The Supreme Court of Canada recently granted leave to appeal in the cases of Momin Khawaja, who was convicted for various terrorist activities carried out within and outside Canada, and …


Where Liberty Lies: Civil Society And Individual Rights After 9/11, David Cole Jan 2012

Where Liberty Lies: Civil Society And Individual Rights After 9/11, David Cole

Georgetown Law Faculty Publications and Other Works

Had someone told you, on September 11, 2001, that the United States would not be able to do whatever it wanted in response to the terrorist attacks of that day, you might well have questioned their sanity. The United States was the most powerful country in the world, and had the world’s sympathy in the immediate aftermath of the attacks. Who would stop it? Al Qaeda had few friends beyond the Taliban. As a historical matter, Congress and the courts had virtually always deferred to the executive in such times of crisis. And the American polity was unlikely to object …


The First Amendment’S Borders: The Place Of Holder V. Humanitarian Law Project In First Amendment Doctrine, David Cole Jan 2012

The First Amendment’S Borders: The Place Of Holder V. Humanitarian Law Project In First Amendment Doctrine, David Cole

Georgetown Law Faculty Publications and Other Works

In Holder v. Humanitarian Law Project, the Supreme Court’s first decision pitting First Amendment rights against national security interests since the terrorist attacks of September 11, 2001, the Court appears to have radically departed from some of the First Amendment’s most basic principles, including the maxims that speech may not be penalized because of its viewpoint, that even speech advocating crime deserves protection until it constitutes incitement, and that political association is constitutionally protected absent specific intent to further a group’s illegal ends. These principles lie at the core of our political and democratic freedoms, yet Humanitarian Law Project …


Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue Jan 2012

Technological Leap, Statutory Gap, And Constitutional Abyss: Remote Biometric Identification Comes Of Age, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Federal interest in using facial recognition technology (“FRT”) to collect, analyze, and use biometric information is rapidly growing. Despite the swift movement of agencies and contractors into this realm, however, Congress has been virtually silent on the current and potential uses of FRT. No laws directly address facial recognition—much less the pairing of facial recognition with video surveillance—in criminal law. Limits placed on the collection of personally identifiable information, moreover, do not apply. The absence of a statutory framework is a cause for concern. FRT represents the first of a series of next generation biometrics, such as hand geometry, iris, …


The Law Of War In The War Against Terrorism, Michael A. Newton Jan 2011

The Law Of War In The War Against Terrorism, Michael A. Newton

Vanderbilt Law School Faculty Publications

The struggle to define the contours of the legal regime and to correctly communicate those expectations to the broader audience of civilians is a recurring problem that is integrally related to the current evolution of warfare. Shaping the expectations and perceptions of the political elites who control the contours of the conflict is perhaps equally vital. The paradox is that as the legal regime applicable to the conduct of hostilities has matured over the last century, the legal dimension of conflict has at times overshadowed the armed struggle between adversaries. As a result, the overall military mission will often be …


Criminal Reports: United States Of America V. Khadr, Steve Coughlan, Robert Currie Jan 2011

Criminal Reports: United States Of America V. Khadr, Steve Coughlan, Robert Currie

Articles, Book Chapters, & Popular Press

The United States of America sought the extradition of the applicant to face terrorism-related charges. The applicant had been taken into custody by the Pakistani Intelligence Agency, the ISI, and held in a secret detention centre for approximately fourteen months before he was released and repatriated to Canada. He had been interrogated by American FBI agents while in Pakistan and had given them a statement. He also gave a statement to CSIS following his return to Canada, and shortly after that gave a second statement to FBI officials. The applicant sought a stay of proceedings of the extradition hearing on …


Habeas Corpus In The Age Of Guantánamo, Cary Federman Jan 2010

Habeas Corpus In The Age Of Guantánamo, Cary Federman

Department of Justice Studies Faculty Scholarship and Creative Works

The purpose of the article is to examine the meaning of habeas corpus in the age of the war on terror and the detention camps at Guantanamo Bay. Since the war on terror was declared in 2001, the writ has been invoked from quarters not normally considered within the federal courts’ domain. In this article, I set out to do two things: first, I provide an overview of the writ’s history in the United States and explain its connection to federalism and unlawful executive detention. I then set out to bridge the two meanings of habeas corpus. Second, then, I …


Law Enforcement And Intelligence Gathering In Muslim And Immigrant Communities After 9/11, David A. Harris Jan 2010

Law Enforcement And Intelligence Gathering In Muslim And Immigrant Communities After 9/11, David A. Harris

Articles

Since the attacks of September 11, 2001, law enforcement agencies have actively sought partnerships with Muslim communities in the U.S. Consistent with community-based policing, these partnerships are designed to persuade members of these communities to share information about possible extremist activity. These cooperative efforts have borne fruit, resulting in important anti-terrorism prosecutions. But during the past several years, law enforcement has begun to use another tactic simultaneously: the FBI and some police departments have placed informants in mosques and other religious institutions to gather intelligence. The government justifies this by asserting that it must take a pro-active stance in order …