Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

An Analysis Of Domestic And Foreign Legal Mechanisms To Counter The Rise Of White Nationalism, John C. Jankosky Ii Jan 2021

An Analysis Of Domestic And Foreign Legal Mechanisms To Counter The Rise Of White Nationalism, John C. Jankosky Ii

American University National Security Law Brief

No abstract provided.


Maslenjak V. United States: A Concern About Prosecutors’ Limitless Leverage Regarding The International Refugee Policy, Fengming Jin Feb 2019

Maslenjak V. United States: A Concern About Prosecutors’ Limitless Leverage Regarding The International Refugee Policy, Fengming Jin

Immigration and Human Rights Law Review

No abstract provided.


Newsroom: Interrogation Expert Warns Against Use Of Torture 2-2-2018, Roger Williams University School Of Law Feb 2018

Newsroom: Interrogation Expert Warns Against Use Of Torture 2-2-2018, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks Mar 2017

Next Generation Foreign Intelligence Surveillance Law: Renewing 702, William C. Banks

University of Richmond Law Review

No abstract provided.


Icrc, Nato And The U.S. – Direct Participation In Hacktivities – Targeting Private Contractors And Civilians In Cyberspace Under International Humanitarian Law, Ido Kilovaty Sep 2016

Icrc, Nato And The U.S. – Direct Participation In Hacktivities – Targeting Private Contractors And Civilians In Cyberspace Under International Humanitarian Law, Ido Kilovaty

Duke Law & Technology Review

Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflicts. With that premise in mind, the question arises of whether or not a civilian carrying out cyber-attacks during an armed conflict becomes a legitimate target under international humanitarian law. This paper aims to explore this question using three different analytical and conceptual frameworks while looking at a variety of cyber-attacks along with their subsequent effects. One of the core principles of the law of armed conflict is distinction, which states that civilians in an armed conflict are granted a set of protections, mainly the protection from …


The Boundless War: Challenging The Notion Of A Global Armed Conflict Against Al-Qaeda And Its Affiliates, Andrew Beshai Apr 2015

The Boundless War: Challenging The Notion Of A Global Armed Conflict Against Al-Qaeda And Its Affiliates, Andrew Beshai

Loyola of Los Angeles Law Review

The U.S. military response to the 9/11 attacks has expanded into a “global war” without a definite geographic scope. Both the Bush and Obama administrations have executed attacks in several countries including Somalia, Afghanistan, Pakistan, and Yemen under the “global war” paradigm. This Article challenges the concept of a global armed conflict, instead favoring the “epicenter-of-hostilities” framework for determining the legality of military action against Al-Qaeda, the Taliban, and other terrorist groups. This approach, rooted in established international law, measures the existence of specific criteria in each nation where hostile forces are present to determine if an armed conflict in …


Reconciling Energy And Food Security Law, Rhett B. Larson Mar 2014

Reconciling Energy And Food Security Law, Rhett B. Larson

University of Richmond Law Review

This article argues that making "water security" a more predominant policy aim can help reconcile and integrate energy security and food security. Water security is the condition of a nation and its citizens having reasonable physical and economic access to sufficient and sustainable water, combined with acceptable levels of water-related risks (e.g., drought, flood, and water-related plagues).


International Human Rights Law And Security Detention, Douglass Cassel Nov 2013

International Human Rights Law And Security Detention, Douglass Cassel

Douglass Cassel

This article analyzes the grounds, procedures, and conditions required by International Human Rights Law for preventive detention of suspected terrorists as threats to security. Such detention is generally permitted, provided it is based on grounds and procedures previously established by law; is not arbitrary, discriminatory, or disproportionate; is publicly registered and subject to fair and effective judicial review; and the detainee is not mistreated and is compensated for any unlawful detention. In Europe, however, preventive detention for security purposes is generally not permitted. If allowed at all, it is permitted only when a State in time of national emergency formally …


Applying Geneva Convention Principles To Guantánamo Bay, Kyndra Rotunda Mar 2009

Applying Geneva Convention Principles To Guantánamo Bay, Kyndra Rotunda

University of Richmond Law Review

No abstract provided.


International Human Rights Law And Security Detention, Douglass Cassel Jan 2009

International Human Rights Law And Security Detention, Douglass Cassel

Journal Articles

This article analyzes the grounds, procedures, and conditions required by International Human Rights Law for preventive detention of suspected terrorists as threats to security. Such detention is generally permitted, provided it is based on grounds and procedures previously established by law; is not arbitrary, discriminatory, or disproportionate; is publicly registered and subject to fair and effective judicial review; and the detainee is not mistreated and is compensated for any unlawful detention. In Europe, however, preventive detention for security purposes is generally not permitted. If allowed at all, it is permitted only when a State in time of national emergency formally …