Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (28)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (14)
- University of Michigan Law School (11)
- Georgetown University Law Center (7)
- BLR (6)
-
- New York Law School (6)
- SelectedWorks (6)
- Vanderbilt University Law School (6)
- Embry-Riddle Aeronautical University (5)
- Maurer School of Law: Indiana University (5)
- American University Washington College of Law (4)
- Montclair State University (4)
- University of Georgia School of Law (4)
- University of Pittsburgh School of Law (4)
- Case Western Reserve University School of Law (3)
- Pace University (3)
- Roger Williams University (3)
- Seattle University School of Law (3)
- Touro University Jacob D. Fuchsberg Law Center (3)
- Cleveland State University (2)
- Duke Law (2)
- Liberty University (2)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (2)
- Penn State Law (2)
- Schulich School of Law, Dalhousie University (2)
- Singapore Management University (2)
- St. John's University School of Law (2)
- U.S. Naval War College (2)
- University of Florida Levin College of Law (2)
- University of San Diego (2)
- Publication Year
- Publication
-
- Scholarly Works (15)
- Articles (9)
- Georgetown Law Faculty Publications and Other Works (7)
- ExpressO (6)
- NYLS Law Review (6)
-
- Indiana Law Journal (5)
- International Bulletin of Political Psychology (5)
- Department of Justice Studies Faculty Scholarship and Creative Works (4)
- Faculty Scholarship (4)
- Georgia Journal of International & Comparative Law (4)
- Journal Articles (4)
- Mark A. Drumbl (4)
- Michigan Journal of International Law (4)
- Michigan Law Review (4)
- Vanderbilt Journal of Transnational Law (4)
- Articles in Law Reviews & Other Academic Journals (3)
- C. Peter Erlinder (3)
- Faculty Publications (3)
- Life of the Law School (1993- ) (3)
- Seattle University Law Review (3)
- All Faculty Scholarship (2)
- Articles, Book Chapters, & Popular Press (2)
- Elisabeth Haub School of Law Faculty Publications (2)
- International Law Studies (2)
- Jimmy Gurule (2)
- Research Collection Yong Pung How School Of Law (2)
- San Diego International Law Journal (2)
- Scholarly Articles (2)
- Senior Honors Theses (2)
- St. John's Law Review (2)
- Publication Type
- File Type
Articles 1 - 30 of 172
Full-Text Articles in Law
Activist Extremist Terrorist Traitor, J. Richard Broughton
Activist Extremist Terrorist Traitor, J. Richard Broughton
St. John's Law Review
(Excerpt)
Abraham Lincoln had a way of capturing, rhetorically, the national ethos. The “house divided.” “Right makes might” at Cooper Union. Gettysburg’s “last full measure of devotion” and the “new birth of freedom.” The “mystic chords of memory” and the “better angels of our nature.” “[M]alice toward none,” “charity for all,” and “firmness in the right.” But Lincoln not only evaluated America’s character; he also understood the fragility of those things upon which the success of the American constitutional experiment depended, and the consequences when the national ethos was in crisis. Perhaps no Lincoln speech better examines the threats to …
Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath
Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath
Pepperdine Law Review
The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …
Law School News: Adjunct Professor Of The Year 2021: David Coombs 05/19/2021, Michael M. Bowden
Law School News: Adjunct Professor Of The Year 2021: David Coombs 05/19/2021, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Criminalizing Terrorism Funding: "A Study In The Jordanian Legal System", Abdulellah Mohammed Alnawayseh
Criminalizing Terrorism Funding: "A Study In The Jordanian Legal System", Abdulellah Mohammed Alnawayseh
UAEU Law Journal
Terrorism Funds considered as modern issue which has been given an important attention by the international community in particular after the adoption of the international convention on the suppression of the financing of terrorism in 1999 and the security council resolution number 1373 dated 28 September 2001 which came after the 11th September attacks. This resolution has forced the UN members to criminalize terrorism funds and money laundry.
Jordanhas ratified this convention by adopting legislation number 83 in 2003, and criminized bank activities which are related to terrorist activities in paragraph 2 article 147 from the criminal code. This …
Nuclear Terrorism: Statutory Shortcomings And Prosecutorial Opportunities, Rohan Mishra
Nuclear Terrorism: Statutory Shortcomings And Prosecutorial Opportunities, Rohan Mishra
International Law Studies
In 2016, President Barack Obama warned that “[t]he danger of a terrorist group obtaining and using a nuclear weapon is one of the greatest threats to global security.” Thus far, however, U.S. and international efforts to address nuclear terrorism have faced a fundamental dilemma: While the importance of preventing this threat is unquestioned, there has been limited opportunity or need to conduct prosecutions that hinge on nuclear terrorism charges. This dilemma reflects the current piecemeal approach to nuclear terrorism, which prioritizes policies that address the “back-end” risk of nuclear terrorism (i.e., the detonation of nuclear weapons or attack of nuclear …
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
The Trouble With Numbers: Difficult Decision Making In Identifying Right-Wing Terrorism Cases. An Investigative Look At Open Source Social Scientific And Legal Data, Daniela Peterka-Benton, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
Terrorism research has gained much traction since the 9/11 attacks, but some sub genres of terrorism, such as right-wing terrorism, have remained under-studied areas. Unsurprisingly data sources to study these phenomena are scarce and frequently face unique data collection obstacles. This paper explores five major, social-scientific terrorism databases in regards to data on right-wing terrorist events. The paper also provides an in-depth examination of the utilization of criminal legal proceedings to research right-wing terrorist acts. Lastly, legal case databases are introduced and discussed to show the lack of available court information and case proceedings in regards to right-wing terrorism.
The Icc Should Not Encourage Occupation, Uri Weiss
The Icc Should Not Encourage Occupation, Uri Weiss
Touro Law Review
No abstract provided.
Impact Of The “War On Terrorism” On Development Of International Criminal Law, Ayser Alhelme
Impact Of The “War On Terrorism” On Development Of International Criminal Law, Ayser Alhelme
Theses and Dissertations
This research elucidates international terrorism by reviewing the stages of sociological analysis of terrorism, and by analyzing its theoretical framework. This research traces the historical development of the prevailing uncertainty by which it is characterized. Implications on global security leads us to study international legal development to counter international terrorism that has engulfed entire human societies. The objectives include highlighting international terrorism, and the counter-terrorism measures on part of the international community as it develops international criminal law to handle the problem.
Criminological Description Of Crimes Related To Terrorism And Their Causes, Jamshid Ibrohimov
Criminological Description Of Crimes Related To Terrorism And Their Causes, Jamshid Ibrohimov
Review of law sciences
Terrorism is the most dangerous and difficult vocation of our time. In order to solve this social problem, it is necessary first of all to know exactly what terrorism is, its plot, essence, why and by whom it is used as a tool in the fight against terrorism. It is worth noting that now the fact that the identity of the terrorist was not described as a Fox, is one of the main problems in science. In this case, it is also very important to pay attention to the various data on the delivery of mercenaries maksad in the case …
Law School News: Adjunct Professor Of The Year: David Coombs 05-13-2020, Michael M. Bowden
Law School News: Adjunct Professor Of The Year: David Coombs 05-13-2020, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Racial Profiling: Past, Present, And Future, David A. Harris
Racial Profiling: Past, Present, And Future, David A. Harris
Articles
It has been more than two decades since the introduction of the first bill in Congress that addressed racial profiling in 1997. Between then and now, Congress never passed legislation on the topic, but more than half the states passed laws and many police departments put anti-profiling policies in place to combat it. The research and data on racial profiling has grown markedly over the last twenty-plus years. We know that the practice is real (contrary to many denials), and the data reveal racial profiling’s shortcomings and great social costs. Nevertheless, racial profiling persists. While it took root most prominently …
Thoughts, Crimes, And Thought Crimes, Gabriel S. Mendlow
Thoughts, Crimes, And Thought Crimes, Gabriel S. Mendlow
Michigan Law Review
Thought crimes are the stuff of dystopian fiction, not contemporary law. Or so we’re told. Yet our criminal legal system may in a sense punish thought regularly, even as our existing criminal theory lacks the resources to recognize this state of affairs for what it is—or to explain what might be wrong with it. The beginning of wisdom lies in the seeming rhetorical excesses of those who complain that certain terrorism and hate crime laws punish offenders for their malevolent intentions while purporting to punish them for their conduct. Behind this too-easily-written-off complaint is a half-buried precept of criminal jurisprudence, …
Confession Obsession: How To Protect Minors In Interrogations, Cindy Chau
Confession Obsession: How To Protect Minors In Interrogations, Cindy Chau
Journal of Race, Gender, and Ethnicity
No abstract provided.
Gender-Based Perceptions Of The 2001 Anthrax Attacks: Implications For Outreach And Preparedness, Christopher Salvatore, Brian J. Gorman
Gender-Based Perceptions Of The 2001 Anthrax Attacks: Implications For Outreach And Preparedness, Christopher Salvatore, Brian J. Gorman
Christopher Salvatore
Extensive research dealing with gender-based perceptions of fear of crime has generally found that women express greater levels of fear compared to men. Further, studies have found that women engage in more self-protective behaviors in response to fear of crime, as well as have different levels of confidence in government efficacy relative to men. The majority of these studies have focused on violent and property crime; little research has focused on gender-based perceptions of the threat of bioterrorism. Using data from a national survey conducted by ABC News / Washington Post, this study contrasted perceptions of safety and fear in …
Habeas Corpus In The Age Of Guantánamo, Cary Federman
Habeas Corpus In The Age Of Guantánamo, Cary Federman
Cary Federman
The purpose of the article is to examine the meaning of habeas corpus in the age of the war on terror and the detention camps at Guantanamo Bay. Since the war on terror was declared in 2001, the writ has been invoked from quarters not normally considered within the federal courts’ domain. In this article, I set out to do two things: first, I provide an overview of the writ’s history in the United States and explain its connection to federalism and unlawful executive detention. I then set out to bridge the two meanings of habeas corpus. Second, then, I …
Protecting Due Process During Terrorism Adjudications: Redefining "Crimes Against Humanity" And Eliminating The Doctrine Of Complimentary Jurisdiction In Favor Of The International Criminal Court, Daniel N. Clay
Arkansas Law Review
“When we sit in judgment we are holding ourselves out as people—as the kind of a community—that are worthy of this task. It is the seriousness, the gravity, of the act of judgment which gives rise to our legitimate and laudable emphasis on procedural fairness and substantive accuracy in criminal procedure. But these things focus on the defendant—the one judged. I am concerned about us who would presume to sit in judgment. Who are we that we should do this? Whether we intend to do so or not, we answer this question in part through the way we conduct our …
Trafficking Terror And Sexual Violence: Accountability For Human Trafficking And Sexual And Gender-Based Violence By Terrorist Groups Under The Rome Statute, Coman Kenny, Nikita Malik
Trafficking Terror And Sexual Violence: Accountability For Human Trafficking And Sexual And Gender-Based Violence By Terrorist Groups Under The Rome Statute, Coman Kenny, Nikita Malik
Vanderbilt Journal of Transnational Law
Terrorist groups are increasingly involved in human trafficking, specifically targeting women and girls of ideologically opposed groups or religions. Frequently, this phenomenon involves the perpetration of various forms of sexual violence against those trafficked. The commission of the interlinked crimes of human trafficking, sexual violence, and terrorism is relatively new, encompassing a vicious cycle in which each crime effectively flows from the commission of the others: sexual violence is facilitated by human trafficking, human trafficking is motivated, in part, by sexual violence, and both crimes spread terror among civilian populations. In light of the Prosecutor of the International Criminal Court …
Are Domestic Abusers Terrorists: Rhetoric, Reality, And Asylum Law, Natalie Nanasi
Are Domestic Abusers Terrorists: Rhetoric, Reality, And Asylum Law, Natalie Nanasi
Faculty Journal Articles and Book Chapters
The terms terrorism and terrorist are highly charged but all too often imprecisely utilized in legal, media, and political arenas. The terminology has even entered the field of intimate partner violence, where the phrases terrorism in the home or intimate terrorism have been used to describe domestic abuse. This language has proliferated not only due to identified commonalities between intimate partner abuse and terroristic behaviors but also because of the rhetorical impact of the words in highlighting the gravity of domestic violence. However, expanding the legal framework of terrorism into new areas has potentially serious and far-reaching consequences. It is …
Combating Terrorism As A Condition Of Preserving The Political Stability Of A Democratic Society, R Tlavberdiev
Combating Terrorism As A Condition Of Preserving The Political Stability Of A Democratic Society, R Tlavberdiev
ProAcademy
This article addresses the challenges of ensuring the protection of children involved in violent extremism and terrorism through the recruitment and exploitation of minors by extremist and terrorist groups. Based on the analysis conducted' the author proposes to continue the implementation of international standards for juvenile justice in Uzbekistan and to strengthen the role of international organizations in ensuring the protection of the rights and interests of children.
The Ad Hoc Federal Crime Of Terrorism: Why Congress Needs To Amend The Statute To Adequately Address Domestic Extremism, Nathan Carpenter
The Ad Hoc Federal Crime Of Terrorism: Why Congress Needs To Amend The Statute To Adequately Address Domestic Extremism, Nathan Carpenter
St. John's Law Review
(Excerpt)
This Note argues that Congress should add such crimes to the list specified in the federal crime of terrorism statute and amend the statute’s intent requirement. This will allow the Department of Justice to more adequately use its resources to address the growing prevalence of hate groups, increase investigatory capabilities, and emphasize the threat posed by such groups. Part I explores the current federal crime of terrorism and analyzes how various terrorism-related cases are adjudicated. Part II introduces the prevailing threat of political extremists operating within the United States and shows that they should no longer be placed in …
Volume 1, Issue 2 (2017) Inaugural Issue
Volume 1, Issue 2 (2017) Inaugural Issue
International Journal on Responsibility
Contents:
Introduction: Terry Beitzel, Types of Responsibility: Challenges and Opportunities
3 – 5 Howard Zehr, Restorative Justice and the Gandhian Tradition.
6 – 26 Richard E. Rubenstein, Responsibility for Peacemaking in the Context of Structural Violence.
27 – 64 Marc Pufong, Terror, Insecurity, State Responsibility and Challenges: Yesterday and Today?
65 – 77 Ron Kraybill, Responsibility, Community and Conflict Resolution in an Age of Polarization.
78 – 96 John Fairfield, Beyond non-violence to courtship.
97 – 98 Call for papers for forthcoming issues of the International Journal on Responsibility and instructions for authors.
Hb 452 - Domestic Terrorism, John J. Crowley, Tatiana E. Posada
Hb 452 - Domestic Terrorism, John J. Crowley, Tatiana E. Posada
Georgia State University Law Review
The Act creates and defines the offense of domestic terrorism in Georgia. It establishes that a person must have the intent to intimidate the public or coerce the government while causing significant harm in order to be liable for domestic terrorism. The Act also provides for training law enforcement to identify and combat domestic terrorism, to share the information with the Georgia Information Sharing and Analysis Center, and for the Georgia Information Sharing and Analysis Center to share that information with the United States Department of Homeland Security.
How The War On Terror Is Transforming Private U.S. Law, Maryam Jamshidi
How The War On Terror Is Transforming Private U.S. Law, Maryam Jamshidi
UF Law Faculty Publications
In thinking about the War on Terror’s impact on U.S. law, what most likely comes to mind are its corrosive effects on public law, including criminal law, immigration, and constitutional law. What is less appreciated is whether and how the fight against terrorism has also impacted private law. As this Article demonstrates, the War on Terror has had a negative influence on private law, specifically on torts, where it has upended long-standing norms, much as it has done in the public law context.
Case law construing the private right of action under the Antiterrorism Act of 1992, 18 U.S.C. § …
Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton
Sony, Cyber Security, And Free Speech: Preserving The First Amendment In The Modern World, Conrad Wilton
Pace Intellectual Property, Sports & Entertainment Law Forum
Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication …
A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr
A Comparative Approach To Counter-Terrorism Legislation And Legal Policy, Paul David Hill Jr
Senior Honors Theses
Since the 9/11 attacks, American legislation and legal policy in regards to classifying and processing captured terrorists has fallen short of being fully effective and lawful. Trial and error by the Bush and Obama administrations has uncovered two key lessons: (1) captured terrorists are not typical prisoners of war and thus their detainment must involve more legal scrutiny than the latter; and (2) captured terrorists are not ordinary criminals and thus the civilian criminal court system, due to constitutional constraints, is not capable of adequately trying every count of terrorism. Other nations, including France and Israel, approach this problem with …
A Human Rights Perspective To Global Battlefield Detention: Time To Reconsider Indefinite Detention, Yuval Shany
A Human Rights Perspective To Global Battlefield Detention: Time To Reconsider Indefinite Detention, Yuval Shany
International Law Studies
This article discusses one principal challenge to detention without trial of suspected international terrorists—the international human rights law (IHRL) norm requiring the introduction of an upper limit on the duration of security detention in order to render it not indefinite in length. Part One of this article describes the “hardline” position on security detention, adopted by the United States in the immediate aftermath of the 9/11 terror attacks (followed, with certain variations, by other countries, including the United Kingdom and the State of Israel), according to which international terrorism suspects can be deprived of their liberty without trial for the …
Revisiting The Public Safety Exception To Miranda For Suspected Terrorists: Dzhokhar Tsarnaev And The Bombing Of The 2013 Boston Marathon, Hannah Lonky
Journal of Criminal Law and Criminology
This Comment examines the application of the public safety exception to Miranda to cases of domestic terrorism, looking particularly at the case of Dzhokhar Tsarnaev and the 2013 Boston Marathon bombing. By comparing the Department of Justice’s War on Terror policies to the Warren Court’s rationale for Miranda, this Comment argues that courts should require law enforcement officers to have reasonable knowledge of an immediate threat to public safety before they may properly invoke the Quarles public safety exception.
Blood Antiquities: Addressing A Culture Of Impunity In The Antiquities Market, Paul Williams, Christin Coster
Blood Antiquities: Addressing A Culture Of Impunity In The Antiquities Market, Paul Williams, Christin Coster
Articles in Law Reviews & Other Academic Journals
For decades, parties to conflicts have used the cover of war to destroy and loot cultural property and antiquities for financial gain and symbolic victory. The “blood antiquities” excavated in conflict areas and sold mostly in western markets fuel not only continued conflict, but also (as in cases such as Syria and Iraq) terrorism that can reach around the world. The culture of impunity for both buyers and sellers of antiquities allows the blood-antiquities trade to thrive.
A robust international legal framework does exist to ensure accountability for the destruction of cultural heritage. Because looting is a major cause of …
Crimmigration-Counterterrorism, Margaret Hu
Crimmigration-Counterterrorism, Margaret Hu
Scholarly Articles
The discriminatory effects that may stem from biometric ID cybersurveillance and other algorithmically driven screening technologies can be better understood through the analytical prism of “crimmigration-counterterrorism”: the conflation of crime, immigration, and counterterrorism policy. The historical genesis for this phenomenon can be traced back to multiple migration law developments, including the Chinese Exclusion Act of 1882. To implement stricter immigration controls at the border and interior, both the federal and state governments developed immigration enforcement schemes that depended upon both biometric identification documents and immigration screening protocols. This Article uses contemporary attempts to implement an expanded regime of “extreme vetting” …
Patriot Act A More Perfect Policy.Docx, D'Andre Devon Lampkin