Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Terrorism (4)
- September 11th (3)
- National security (2)
- Public health (2)
- Public safety (2)
-
- 11 Terrorist Attacks (1)
- 2001 (1)
- Access to the courts (1)
- Bail Reform Act (1)
- Bioterrorism (1)
- Carnivore (1)
- Cyber Law (1)
- Cyberspace (1)
- Departement of Defense (1)
- Detention (1)
- Electronic documents (1)
- Electronic evidence (1)
- Emails (1)
- Encrypted communications; security of SIPRNet; TMIP medical encryption; protections for medical facilities in armed conflict; treaty interpretation of encrypted transmissions from military medical facilities; "trust but verify" (1)
- Equal rights (1)
- Federal Bureau of Investigation (1)
- Foreign nationals (1)
- Habeas corpus (1)
- Intelligence (1)
- Internet (1)
- Internet service providers (1)
- Judicial review (1)
- Miltary commissions (1)
- Order 12333 (1)
- PATRIOT Act (1)
Articles 1 - 17 of 17
Full-Text Articles in Law
Designation Of Foreign Terrorist Organizations Under The Aedpa: The National Council Court Erred In Requiring Pre-Designation Process, Joshua A. Ellis
Designation Of Foreign Terrorist Organizations Under The Aedpa: The National Council Court Erred In Requiring Pre-Designation Process, Joshua A. Ellis
BYU Law Review
No abstract provided.
Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr
Marking Carnivore's Territory: Rethinking Pen Registers On The Internet, Anthony E. Orr
Michigan Telecommunications & Technology Law Review
"Carnivore" entered the online world's collective consciousness in June 2000 when the Federal Bureau of Investigation unveiled the Internet surveillance software program to telecommunications industry specialists. The FBI claims the program allows agents to scan the traffic of an Internet Service Provider (ISP) for messages or commands to or from a criminal suspect and then intercept only those messages, capturing copies of e-mails, web site downloads and other file transfers[...] A central issue in the controversy surrounding Carnivore is whether current law permits the FBI to employ the program in the Internet context. Bureau officials claim statutory authority for deployments …
Durable Consent And A Strong Transitional Peacekeeping Plan: The Successes Of Untaet In Light Of The Lessons Learned In Cambodia, Dianne M. Criswell
Durable Consent And A Strong Transitional Peacekeeping Plan: The Successes Of Untaet In Light Of The Lessons Learned In Cambodia, Dianne M. Criswell
Washington International Law Journal
In 1999, East Timor voted for independence from Indonesia. That same year the United Nations Security Council created the United Nations Transitional Authority in East Timor ("UNTAET") to help East Timor transition to democracy, self-governance, and sustainable development. Seven years earlier, the United Nations launched a similar mission in Cambodia called the United Nations Transitional Authority in Cambodia ("UNTAC"). There are many similarities between East Timor and Cambodia, and both UNTAET and UNTAC are second-generation United Nations peacekeeping missions. UNTAC and UNTAET had similar mandates, including security, civil administration, and elections. UNTAC encountered opposition from the Cambodian parties, and consent …
Fourth Dimensional Intelligence: Thoughts On Espionage, Law, And Cyberspace, David M. Crane
Fourth Dimensional Intelligence: Thoughts On Espionage, Law, And Cyberspace, David M. Crane
International Law Studies
No abstract provided.
The Cia And Covert Operations: To Disclose Or Not To Disclose - That Is The Question, Marcus Eyth
The Cia And Covert Operations: To Disclose Or Not To Disclose - That Is The Question, Marcus Eyth
Brigham Young University Journal of Public Law
No abstract provided.
Rational Profiling In America's Airports, R. Spencer Macdonald
Rational Profiling In America's Airports, R. Spencer Macdonald
Brigham Young University Journal of Public Law
No abstract provided.
Religious Freedom And The Challenge Of Terrorism, Gordon H. Smith
Religious Freedom And The Challenge Of Terrorism, Gordon H. Smith
BYU Law Review
No abstract provided.
Secret Codes, Military Hospitals, And The Law Of Armed Conflict: Could Military Medical Facilities' Use Of Encrypted Communications Subject Them To Attack Under International Law?, Philip R. Principe
Secret Codes, Military Hospitals, And The Law Of Armed Conflict: Could Military Medical Facilities' Use Of Encrypted Communications Subject Them To Attack Under International Law?, Philip R. Principe
University of Arkansas at Little Rock Law Review
No abstract provided.
Jose Padilla -- Government's Handling Of Alleged Terrorist, U.S. Citizen, Kevin Mccloskey
Jose Padilla -- Government's Handling Of Alleged Terrorist, U.S. Citizen, Kevin Mccloskey
Public Interest Law Reporter
No abstract provided.
American Taliban Avoids Charge Of Treason, Claims To Be Victim Of Coercion, Jennifer Malone
American Taliban Avoids Charge Of Treason, Claims To Be Victim Of Coercion, Jennifer Malone
Public Interest Law Reporter
No abstract provided.
U.S. Engages In Questionable Treatment Of Detainees At Guantanamo Bay, Anne Leinfelder
U.S. Engages In Questionable Treatment Of Detainees At Guantanamo Bay, Anne Leinfelder
Public Interest Law Reporter
No abstract provided.
Pro-Immigration Groups Still Hopeful After Terrorist Attacks, Joe D'Amato
Pro-Immigration Groups Still Hopeful After Terrorist Attacks, Joe D'Amato
Public Interest Law Reporter
No abstract provided.
The Constitutionality Of Detainment In The Wake Of September 1 Lth, Whitney D. Frazier
The Constitutionality Of Detainment In The Wake Of September 1 Lth, Whitney D. Frazier
Kentucky Law Journal
No abstract provided.
Conceptualizing The Field After September 11th: Foreword To A Symposium On Public Health Law, Lawrence O. Gostin
Conceptualizing The Field After September 11th: Foreword To A Symposium On Public Health Law, Lawrence O. Gostin
Kentucky Law Journal
No abstract provided.
Korematsu's Ghost: A Post-September 11th Analysis Of Race And National Security, Liam Braber
Korematsu's Ghost: A Post-September 11th Analysis Of Race And National Security, Liam Braber
Villanova Law Review
No abstract provided.
The Federal Government's Role In Protecting Public Health, Ernie Fletcher
The Federal Government's Role In Protecting Public Health, Ernie Fletcher
Kentucky Law Journal
No abstract provided.
Antiterrorism Military Commissions: The Ad Hoc Dod Rules Of Procedure, Jordan J. Paust
Antiterrorism Military Commissions: The Ad Hoc Dod Rules Of Procedure, Jordan J. Paust
Michigan Journal of International Law
While the article Antiterrorism Military Commissions: Courting Illegality was set for publication, the Department of Defense formally issued its first set of Procedures for Trials by Military Commission of Certain Non-United States Citizens in the War Against Terrorism. The President's November 13th Military Order had set up several per se violations of international law. Instead of attempting to avoid them, the DOD Order of March 21, 2002 continued the violations, set up additional violations of international law, and created various rules of procedure and evidence that, if not per se violative of international law, are highly problematic. This is a …