Law Review Article Template
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
RUNNING HEAD: Paramilitary Police Paramilitary Police Organizations
RUNNING HEAD: Paramilitary Police Paramilitary Police Organizations Abstract After providing the reader with examples of paramilitary structures and formalizing a definition of paramilitary, this manuscript analyzes the literature available and discusses several important themes, including: the rise of police militarization, international perspectives, community policing, hierarchy, subculture, and training. As the topic of community policing reemerges, the philosophical appeal remains, despite its use as a form of face saving and as a means to fund tactical units. On a subtler level, this study proposes that police subculture in the United States contrasts the general populace significantly, which could explain tensions between the police and public. Examination of the characteristics of this subculture shed some light onto the policing paradigm and on how communication unfolds inside and outside of police organizations. Through this synthesis, the appropriateness of a quasi-military paradigm and its resulting structure, language, and behavior, is brought into question. PARAMILITARY POLICE 2 “Every art and every inquiry, and similarly every action and choice, is thought to aim at some good; and for this reason the good has rightly been declared to be that at which all things aim.” (Aristotle, 2009, p. 3) Introduction Law enforcement is one of the most interactive pieces of government with the public. Most people, across all cultures, have some notion of what policing is and some opinion of what it should be. In the past three decades a rise in the militarization of policing in the United States has been speculated, observed, and critiqued by many scholars in academia and professionals in law enforcement. -
Czuzak 1 9/11 and the AMERICAN-SAUDI ALLIANCE
9/11 AND THE AMERICAN-SAUDI ALLIANCE: A PRAGMATIC RELATIONSHIP BETWEEN TWO UNLIKELY PARTNERS ©2017 By Andrew N. Czuzak A thesis presented in partial fulfillment of the requirements for completion Of the Bachelor of Arts degree in International Studies at the Croft Institute for International Studies The University of Mississippi University, Mississippi May 2017 Approved: Advisor: Dr. Vivian Ibrahim Reader: Dr. Yael Zeira Reader: Dr. Nicolas Trépanier Czuzak 1 TABLE OF CONTENTS CHAPTER 1: INTRODUCTION ...3-5 SECTION 1.1: HISTORICAL BACKGROUND ...5-9 CHAPTER 2: LITERATURE REVIEW ...10-15 CHAPTER 3: ANALYSIS & METHODS ...16 SECTION 3.1: STRATEGIC TIES ...17-26 SECTION 3.2: ECONOMIC AGREEMENTS ...27-35 SECTION 3.3: DIPLOMACY AND POLITICAL GESTURES ...36-40 SECTION 3.4: PUBLIC OPINION AND MEDIA EXPOSURE ...41-46 CHAPTER 4: CONCLUSION ...47-48 REFERENCES ...49-51 Czuzak 2 Chapter 1: Introduction Since July of 2016, Saudi Arabia has been in the public eye with the release of the “28 Pages” report and former President Obama’s veto of the Congressional decision to allow the victims of the September 11th attacks to sue Saudi Arabia. Despite allegations that stem nearly fifteen years back, the Saudi connection to 9/11 remains relevant to this day. Historically, these two nations have shared a “special relationship” based off mutual strategic interests and oil wealth, but did this relationship begin to crack earlier than these recent events show? This thesis’ importance is that it helps reveal which aspects of alliances are most important to the United States and Saudi Arabia in their relationship. I hypothesized that the parts that matter most are the “pragmatic” parts of the relationship. -
The US War on Cuba: from Economic Embargoes, Biological Warfare to US-Backed Terrorism
The US War on Cuba: From Economic Embargoes, Biological Warfare to US-Backed Terrorism By Timothy Alexander Guzman Region: Latin America & Caribbean, USA Global Research, August 01, 2021 Theme: History All Global Research articles can be read in 51 languages by activating the “Translate Website” drop down menu on the top banner of our home page (Desktop version). Visit and follow us on Instagram at @crg_globalresearch. *** . Before the rise of Cuba’s Communist party, there was a US-backed fascist government under the leadership ofFulgencio Batista who ruled Cuba with an iron fist. Batista was elected in 1940 serving a 4-year term. Then Batista’s reign of terror effectively began when he decided to run for re-election in 1952, but when his political party found itself practically in last place during the election with Roberto Agramonte of the Orthodox Party who was in the lead followed by Carlos Hevia of the Authentic Party, he decided to lead a military coup and cancel the elections. The current president at the time, President Carlos Prio Socarras went into exile as a result. So what did Washington do? They immediately recognized Batista’s government and gave him financial and military support among other benefits. In the meantime, Batista suspended the 1940 Constitution that he originally supported and then made a radical move by cancelling whatever civil liberties the Cuban people had left. Batista had total control over the Cuban economy that was once on equal grounds with Italy in terms of economic growth. One of Batista’s first moves as a typical dictator in Latin America when he gave his full-support to wealthy landowners who owned basically almost all of the sugar plantations on the island. -
Cyberattack Attribution As Empowerment and Constraint 3
A HOOVER INSTITUTION ESSAY Cyberattack Attribution as Empowerment and Constraint KRISTEN E. EICHENSEHR Aegis Series Paper No. 2101 Introduction When a state seeks to defend itself against a cyberattack, must it first identify the perpetrator responsible? The US policy of “defend forward” and “persistent engagement” in cyberspace raises the stakes of this attribution question as a matter of both international and domestic law. International law addresses in part the question of when attribution is required. The international law on state responsibility permits a state that has suffered an internationally wrongful act to take countermeasures, but only against the state responsible. This limitation implies that attribution is a necessary prerequisite to countermeasures. But international Law and Technology, Security, National law is silent about whether attribution is required for lesser responses, which may be more common. Moreover, even if states agree that attribution is required in order to take countermeasures, ongoing disagreements about whether certain actions, especially violations of sovereignty, count as internationally wrongful acts are likely to spark disputes about when states must attribute cyberattacks in order to respond lawfully. Under domestic US law, attributing a cyberattack to a particular state bolsters the authority of the executive branch to take action. Congress has authorized the executive to respond to attacks from particular countries and nonstate actors in both recent cyber-specific statutory provisions and the -
Ten Most Wanted Documents for 2004
Ten Most Wanted Documents for 2004 A Report for OpenTheGovernment.org by OMB Watch & Center for Democracy & Technology April 2004 OpenTheGovernment.org OpenTheGovernment.org Steering Committee Steven Aftergood Robert Leger Federation of American Society of Professional Scientists Journalists Carol Andress Conrad Martin** Environmental Defense Fund for Constitutional Government* Mary Alice Baish American Association of Law Elliot Mincberg Libraries People For the American Way Gary Bass* Reece Rushing OMB Watch Center for American Progress Tom Blanton* National Security Archive Peg Seminario AFL-CIO Doug Clifton** American Society of David Sobel Newspaper Editors* Electronic Privacy Information Center Lucy Dalglish Reporters Committee for Freedom of the Press * Co-Chairs ** ex officio member OpenTheGovernment.org - 2 - OpenTheGovernment.org Ten Most Wanted Documents for 2004 A Report for OpenTheGovernment.org by OMB Watch & Center for Democracy & Technology April 2004 OpenTheGovernment.org 1742 Connecticut Avenue NW Washington DC 20009 Phone 202-234-8494 Fax 202-234-8584 www.OpenTheGovernment.org [email protected] - 3 - OpenTheGovernment.org OpenTheGovernment.org OpenTheGovernment.org would like to express appreciation to the following for their generous support: Bauman Foundation Fund for Constitutional Government John S. and James L. Knight Foundation OMB Watch Schooner Foundation Acknowledgements The report benefited from the contributions of the many individuals and organizations contributing information, ideas, and suggestions. In addition to the steering committee for OpenTheGovernment.org, special acknowledgement should be made to Steve Aftergood, Scott Amey, Carol Andress, Mary Alice Baish, Danielle Brian, Bruce Craig, Lucy Dalglish, Cheryl Gregory, Robert Leger, Kate Martin, Sean Moulton, Joe Onek and Celia Wexler for their contributions to the report. -
Articles & Reports
1 Reading & Resource List on Information Literacy Articles & Reports Adegoke, Yemisi. "Like. Share. Kill.: Nigerian police say false information on Facebook is killing people." BBC News. Accessed November 21, 2018. https://www.bbc.co.uk/news/resources/idt- sh/nigeria_fake_news. See how Facebook posts are fueling ethnic violence. ALA Public Programs Office. “News: Fake News: A Library Resource Round-Up.” American Library Association. February 23, 2017. http://www.programminglibrarian.org/articles/fake-news-library-round. ALA Public Programs Office. “Post-Truth: Fake News and a New Era of Information Literacy.” American Library Association. Accessed March 2, 2017. http://www.programminglibrarian.org/learn/post-truth- fake-news-and-new-era-information-literacy. This has a 45-minute webinar by Dr. Nicole A. Cook, University of Illinois School of Information Sciences, which is intended for librarians but is an excellent introduction to fake news. Albright, Jonathan. “The Micro-Propaganda Machine.” Medium. November 4, 2018. https://medium.com/s/the-micro-propaganda-machine/. In a three-part series, Albright critically examines the role of Facebook in spreading lies and propaganda. Allen, Mike. “Machine learning can’g flag false news, new studies show.” Axios. October 15, 2019. ios.com/machine-learning-cant-flag-false-news-55aeb82e-bcbb-4d5c-bfda-1af84c77003b.html. Allsop, Jon. "After 10,000 'false or misleading claims,' are we any better at calling out Trump's lies?" Columbia Journalism Review. April 30, 2019. https://www.cjr.org/the_media_today/trump_fact- check_washington_post.php. Allsop, Jon. “Our polluted information ecosystem.” Columbia Journalism Review. December 11, 2019. https://www.cjr.org/the_media_today/cjr_disinformation_conference.php. Amazeen, Michelle A. -
Murder, Arrogance of Power, and the Struggle for Social Dominance in the US
Murder, Arrogance of Power, and the Struggle for Social Dominance in the US The moral cesspool of National Politics Introduction Since leaving a start-up company as a result of the dot-com bust, I have engaged in, among other things, reviewing the literature to try to understand the controversy regarding various, potentially linked, events, including: the murders of John Kennedy, Martin Luther King, and Robert Kennedy; Iran-Contra; the PROMIS affair; the October surprise; domestic call-boy—corruption rings; the Panama invasion, and the two Iraq wars. Note: Most people who read the following will find it extremely disturbing, since it shakes our confidence in our basic institutions and leaders. However, I believe that the material below is accurate. It represents a distillation of many books and web references which, though written independently by credible researchers, corroborate each other. Although I have footnoted many of the statements, I chose not to be even more comprehensive to make the document shorter and more readable. It is not enough to just document excesses, though. I plan another white paper to deal with correcting those excesses.1 Initially, two key remedies appear to be: Almost complete transparency in government, and declassification of almost everything over, say, 10 years old. Setting up independent review panels of any federal operations that have the capacity to commit, or allow, significant crimes. Decriminalization of drug possession and distribution. Drug money is funding almost all the illicit activities, and maintaining a web of corruption that is so pervasive that the entire government is dysfunctional2. 1 The revelations in this document are less than a few percent of that convincingly presented in the literature. -
Operation Northwoods: Justification for US Military Intervention in Cuba Documents
Operation Northwoods: Justification for US military intervention in Cuba documents libcom.org/library/operation-northwoods-justification-u-s-military-intervention-cuba Below is the complete text from the Freedom of Information Act- released US government document detailing the Pentagon plan to murder innocent civilians and blame the Cuban government as a pretext to invade Cuba. Code-named Operation Northwoods, US Navy members were also to be killed as part of a "terror campaign" This plan, which President John F. Kennedy refused to implement, had the written approval of the Chairman of the Joint Chiefs of Staff Lyman Louis Lemnitzer, and every other member of the Joint Chiefs of Staff. This FOIA-released document is archived at The National Security Archive at George Washington University (Washington, D.C.). TOP SECRET SPECIAL HANDLING NOFORN UNCLASSIFIED THE JOINT CHIEFS OF STAFF WASHINGTON 25, D.C. 13 March 1962 MEMORANDUM FOR THE SECRETARY OF DEFENSE Subject: Justification for US Military Intervention in Cuba (TS) 1/15 1. The Joint Chiefs of Staff have considered the attached Memorandum for the Chief of Operations, Cuba Project, which responds to a request of that office for brief but precise description of pretexts which would provide justification for US military intervention in Cuba. 2. The Joint Chiefs of Staff recommend that the proposed memorandum be forwarded as a preliminary submission suitable for planning purposes. It is assumed that there will be similar submissions from other agencies and that these inputs will be used as a basis for developing a time-phased plan. Individual projects can then be considered on a case-by- case basis. -
Saudi 28 Pages & 911 Report 14.9.16
Saudi Arabia and 9/11: Establishing the Truth Behind the Release of the 28 Pages and the “Justice Against Sponsors of Terrorism Act” By Anthony H. Cordesman Update: September 14, 2016 Please provide comments to [email protected] Cover: DoD photo by Master Sgt. Ben Bloker, U.S. Air Force Saudi Arabia and the Justice Against Sponsors of Terrorism Attack 14/9/16 2 Saudi Arabia and the Justice Against Sponsors of Terrorism Act President Obama has made it clear that he intends to veto the legislation the House passed on September 9, 2016 that would allow families of those killed in the Sept. 11, 2001, attacks to sue Saudi Arabia for any role its officials played in the terrorist attack. He should veto the bill and the Congress should pause and not override that veto. It is all too easy to understand anger the families and survivors of those who were victims on 9/11 feel, and the desire they have to find someone to punish and blame and for some compensation for their losses. It is equally easy to understand the mixed motives of a Congress caught up in the politics of tenth anniversary of the attack, an election year, and the desire not to seem soft on terrorism. Saudi Arabia is also one of America’s most difficult strategic partners for Americans to understand, and its progress, reforms, and strategic importance are often badly understated. It is easier to focus on the fact it is an Islamic state at a time when extremist threats like ISIS, Al Qaida, and the Taliban, than deal with the complicated security issues in the Gulf region and the fact the U.S. -
The Armed Forces: Roles and Responsibilities in Good Security
SSR BACKGROUNDER The Armed Forces Roles and responsibilities in good security sector governance About this series The SSR Backgrounders provide concise introductions to topics and concepts in good security sector governance (SSG) and security sector reform (SSR). The series summarizes current debates, explains key terms and exposes central tensions based on a broad range of international experiences. The SSR Backgrounders do not promote specific models, policies or proposals for good governance or reform but do provide further resources that will allow readers to extend their knowledge on each topic. The SSR Backgrounders are a resource for security governance and reform stakeholders seeking to understand but also to critically assess current approaches to good SSG and SSR. About this SSR Backgrounder This SSR Backgrounder is about the roles and responsibilities of national armed forces in good security sector governance (SSG). The armed forces are a cornerstone of state and human security, but their legitimacy and effectiveness depend on fulfilling their mission accountably within a framework of democratic, civilian control, rule of law and respect for human rights. This backgrounder explains how good SSG can improve both accountability and effectiveness in the interests of state and human security. This SSR Backgrounder answers the following questions: What are the armed forces? Page 2 What are the roles of the armed forces in good SSG? Page 3 How does democratic civilian control of the armed forces contribute to good SSG? Page 4 What -
Fake News and Misinformation Policy Lab Practicum (Spring 2017)
ST ANFORD Fake News & Misinformation Policy Practicum 2017 PRACTICUM RESEARCFacebookH TEAM: Research Team Jacob Finkel, JD ’19, Steven Jiang,Mufan BS ’17, Luo, PhD ‘22 Mufan Luo, PhD ’22, Rebecca Mears, JD/MPP ’19, Danaë Metaxa-Kakavouli, PhD ’20Camille, Peeples, JD ‘18 Camille Peeples, JD ’18, BrendanArjun Sasso, Shenoy,JD ’19, JD ‘19 Arjun Shenoy, JD ’19, Vincent Sheu, JD/MS ’18 , Nicolás Torres-Echeverry, JSM ’17 Google Research Team INSTRUCTOR AND PROJECTDanaë LEAD MetaxaS: -Kakavouli, PhD ‘20 Nicolás Torres-Echeverry, JSM ‘17 SENATOR RUSS FEINGOLD Edwin A. Heafey, Jr., Visiting Professor of Law Luciana Herman, Ph.D. Twitter Research Team Lecturer in Law Program Director, Law and Policy LabJacob Finkel, JD ‘19 Steven Jiang, BS ‘17 Ashwin Aravind, JD ‘18 Teaching Assistant Rebecca Mears, JD/MPP ‘19 Katie Joseff, MA ‘19 Research Assistant Reddit Research Team October POLICY CLIENT: Brendan Sasso, JD ‘19 Hewlett Foundation MadisonVincent Initiative Sheu, JD/MS ’18 2017 1 Acknowledgements This report reflects the research and analysis of an inter-disciplinary law and graduate student team enrolled in the Stanford Law School Fake News and Misinformation Policy Lab Practicum (Spring 2017). Under the guidance of instructor Senator Russ Feingold, the Edwin A. Heafey Visiting Professor of Law, the practicum surveyed the roles of four major online platforms in the spread of fake news beginning with the 2016 U.S. election. Assisting Senator Feingold in the practicum were Policy Lab Program Director and Lecturer Luciana Herman, Ph.D., and Teaching Assistant Ashwin Aravind, J.D. ’18. Brendan Sasso, J.D. ’19, served as the exceptional lead student editor for the report. -
Saudi Arabia: Background and U.S. Relations
Saudi Arabia: Background and U.S. Relations Updated September 21, 2018 Congressional Research Service https://crsreports.congress.gov RL33533 Saudi Arabia: Background and U.S. Relations Summary The kingdom of Saudi Arabia, ruled by the Al Saud family since its founding in 1932, wields significant global influence through its administration of the birthplace of the Islamic faith and by virtue of its large oil reserves. Close U.S.-Saudi official relations have survived a series of challenges since the 1940s. In recent years, shared concerns over Sunni Islamist extremist terrorism and Iranian government policies have provided some renewed logic for continued strategic cooperation. Political upheaval and conflict in the Middle East and North Africa have created new challenges, and the Trump Administration has sought to strengthen U.S. ties to Saudi leaders as the kingdom implements a series of new domestic and foreign policy initiatives. Successive U.S. Administrations have referred to the Saudi government as an important partner, and U.S. arms sales and related security cooperation have continued with congressional oversight and amid some congressional opposition. The Trump Administration, like its recent predecessors, praises Saudi government counterterrorism efforts. Since 2009, the executive branch has notified Congress of proposed foreign military sales to Saudi Arabia of major defense articles and services with a potential aggregate value of nearly $139 billion. The United States and Saudi Arabia concluded arms sale agreements worth more than $65 billion, from FY2009 through FY2016. Since March 2015, the U.S.-trained Saudi military has used U.S.-origin weaponry, U.S. logistical assistance, and shared intelligence in support of military operations in Yemen.