944 resultados para Law and terrorism


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

From the Introduction. This article seeks to examine the relationship between European Union law, international law, and the protection of fundamental rights in the light of recent case law of the European Court of Justice (ECJ) and the Court of First Instance (CFI) relating to economic sanctions against individuals. On 3 September 2008, the ECJ delivered its long-awaited judgment in Kadi and Al Barakaat on appeal from the CFI.3 In its judgment under appeal,4 the CFI had held that the European Community (EC) is competent to adopt regulations imposing economic sanctions against private organisations in pursuance of UN Security Council (UNSC) Resolutions seeking to combat terrorism; that although the EC is not bound directly by the UN Charter, it is bound pursuant to the EC Treaty to respect international law and give effect to UNSC; and that the CFI has jurisdiction to examine the compatibility of EC regulations implementing UNSC resolutions with fundamental rights not as protected by the EC but as protected by jus cogens. On appeal, following the Opinion of Maduro AG, the ECJ rejected the CFI’s approach. It held that UNSC resolutions are binding only in international law. It subjected the contested regulations to full review under EC human rights standards and found them in breach of the right to a hearing, the right to judicial protection and the right to property. Kadi and Al Barakaat is the most important judgment ever delivered by the ECJ on the relationship between EC and international law and one of its most important judgments on fundamental rights. It is imbued by constitutional confidence, commitment to the rule of law but also some scepticism towards international law. In the meantime, the CFI has delivered a number of other judgments on anti-terrorist sanctions assessing the limits of the “emergency constitution” at European level. The purpose of this paper is to examine the above case law and explore the dilemmas and tensions facing the EU judiciary in seeking to define and protect the EU’s distinct constitutional space. It is divided as follows. It first looks at the judgment in Kadi. After a short presentation of the factual and legal background, it explores the question whether the EU has competence to adopt smart sanctions. It then examines whether the EU is bound by resolutions of the Security Council, whether the ECJ has jurisdiction to review Community measures implementing such resolutions and the applicable standard of judicial scrutiny. It analyses the contrasting views of the CFI, the Advocate General, and the ECJ taking account also of the case law of the European Court of Human Rights (ECtHR). Further, it explores the consequences of annulling the contested regulation. It then turns to discussing CFI case law in relation to sanctions lists drawn up not by the UN Security Council but by the EC. The paper concludes by welcoming the judgment of the ECJ. Whilst its reasoning on the issue of Community competence is questionable, once such competence is established, it is difficult to support the abrogation of Community standards for the protection of fundamental rights. Such standards should ensure procedural due process whilst recognising the importance of public security.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The ‘war on terror’ and ongoing terrorist attacks around the world have generated a growing body of literature on national and international measures to counteract terrorist activity. This detailed study investigates an aspect of contemporary counter-terrorism that has been largely overlooked; the impact of these measures on the continued viability of the democratic state.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter explores the extent to which courts can contribute to the countering of terrorism. It suggests that the contribution will depend on the type of actor the courts are attempting to hold to account as well as on the powers that are conferred on courts by national and international legal regimes. It concludes that courts are most legitimate and effective in relation to terrorist suspects and law enforcers, but less so in relation to counter-terrorism operatives and law-makers.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Catastrophic events, such as wars and terrorist attacks, tornadoes and hurricanes, earthquakes, tsunamis, floods and landslides, are always accompanied by a large number of casualties. The size distribution of these casualties has separately been shown to follow approximate power law (PL) distributions. In this paper, we analyze the statistical distributions of the number of victims of catastrophic phenomena, in particular, terrorism, and find double PL behavior. This means that the data sets are better approximated by two PLs instead of a single one. We plot the PL parameters, corresponding to several events, and observe an interesting pattern in the charts, where the lines that connect each pair of points defining the double PLs are almost parallel to each other. A complementary data analysis is performed by means of the computation of the entropy. The results reveal relationships hidden in the data that may trigger a future comprehensive explanation of this type of phenomena.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This book is highly topical considering the recent resurgence of violence by the PKK, the incursions into Northern Iraq by the Turkish army and security forces and Turkey’s EU accession negotiations. Turkey has become an increasingly important player in Middle Eastern geopolitics. More than two decades of serious conflict in Turkey are proving to be a barrier to improved relations between Turkey and the EU. This book is the first study to address fully the legal and political dimensions of the conflict, and their impact on mechanisms for conflict resolution in the region, offering a scholarly exploration of a debate that is often politically and emotionally highly charged. Kerim Yildiz and Susan Breau look at the practical application of the law of armed conflicts to the ongoing situation in Turkey and Northern Iraq. The application of the law in this region also means addressing larger questions in international law, global politics and conflict resolution. Examples include belligerency in international law, whether the ‘war on terror’ has resulted in changes to the law of armed conflict and terrorism and conflict resolution. The Kurdish Conflict explores the practical possibilities of conflict resolution in the region, examining the political dynamics of the region, and suggesting where lessons can be drawn from other peace processes, such as in Northern Ireland. This book will be of great value to policy-makers, regional experts, and others interested in international humanitarian law and conflict resolution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter outlines the Australian federal policing and allied agency responses to international drug trafficking activity and terrorism. The chapter is situated alongside a broader analysis of the structure of each key agency and the various interagency enforcement mechanisms established domestically and internationally to improve enforcement performance.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The phenomenon of terrorism is one of the most asymmetrical, amorphous and hybrid threats to international security. At the beginning of the 21st century, terrorism grew to a pandemic. Ensuring freedom and security of individuals and nations has become one of the priority postulates. Terrorism steps out of all legal and analytic-descriptive standards. An immanent feature of terrorism, e.g. is constant conversion into malicious forms of violence. One of the most alarming changes is a tendency for debasement of essence of law, a state and human rights Assurance of safety in widely accessible public places and in private life forces creation of various institutions, methods and forms of people control. However, one cannot in an arbitrary way limit civil freedom. Presented article stresses the fact that rational and informed approach to human rights should serve as a reference point for legislative and executive bodies. Selected individual applications to the European Court of Human Rights are presented, focusing on those based on which standards regarding protection of human rights in the face of pathological social phenomena, terrorism in particular, could be reconstructed and refined. Strasbourg standards may prove helpful in selecting and constructing new legal and legislative solutions, unifying and correlating prophylactic and preventive actions.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This report is the primary output of Project 4: Copyright and Intellectual Property, the aim of which was to produce a report considering how greater access to and use of government information could be achieved within the scope of the current copyright law. In our submission for Project 4, we undertook to address: •the policy rationales underlying copyright and how they apply in the context of materials owned, held and used by government; • the recommendations of the Copyright Law Review Committee (CLRC) in its 2005 report on Crown copyright; • the legislative and regulatory barriers to information sharing in key domains, including where legal impediments such as copyright have been relied upon (whether rightly or wrongly) to justify a refusal to provide access to government data; • copyright licensing models appropriate to government materials and examples of licensing initiatives in Australia and other relevant jurisdictions; and • issues specific to the galleries, libraries, archives and museums (“GLAM”) sector, including management of copyright in legacy materials and “orphan” works. In addressing these areas, we analysed the submissions received in response to the Government 2.0 Taskforce Issues Paper, consulted with members of the Task Force as well as several key stakeholders and considered the comments posted on the Task Force’s blog. This Project Report sets out our findings on the above issues. It puts forward recommendations for consideration by the Government 2.0 Task Force on steps that can be taken to ensure that copyright and intellectual property promote access to and use of government information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Heteronormative discourses provide the most common lens through which sexuality is understood within university curricula. This means that sexuality is discussed in terms of categories of identity, with heterosexuality accorded primacy and all ‘others’ indeed ‘othered.’ This paper reports on research carried out by the authors in a core first year university justice class, in which students of law and/or justice were required to engage with, discuss, and reflect on discourses on sexuality. It uses a poststructural framework to identify how students understand non-heterosexualities and how they personally relate to queer identities, in the sense that it asks questions about gender and sexual identity, and the discourses surrounding them. It was found that strongly negative attitudes to non-heterosexualities are quite resistant to challenge, and that some students express being confronted with queerness as a deep-seated fear of being drawn into otherness against their will. The result was that, while many students were able to unpack their attitudes towards queerness and engage in critical reflection and re-evaluation of their attitudes, students with strongly negative views towards non-heterosexualities conversely refused to engage at all, typically perceiving even the engagement itself as a threat to their core heterosexual identity. However, the authors caution against relying on the idea that students are simply “homophobic” to explain this reluctance, as this term does not necessarily account for the complexity of the discourses that inform students’ reactions in this context. This “homophobia” may simply be related to a way of performing gender and sexual identity as opposed to overt discrimination and fear.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This presentation outlines key aspects of public policy in broad terms insofar as they relate to establishment, implementation and compliance with legal measurement standards. It refers in particular to traceability of a legal measurement unit from its source in a single international standard as a compliance issue. It comments on accreditation of legal measurement and liability concerned with errors in measurement.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis is about the derivation of the addition law on an arbitrary elliptic curve and efficiently adding points on this elliptic curve using the derived addition law. The outcomes of this research guarantee practical speedups in higher level operations which depend on point additions. In particular, the contributions immediately find applications in cryptology. Mastered by the 19th century mathematicians, the study of the theory of elliptic curves has been active for decades. Elliptic curves over finite fields made their way into public key cryptography in late 1980’s with independent proposals by Miller [Mil86] and Koblitz [Kob87]. Elliptic Curve Cryptography (ECC), following Miller’s and Koblitz’s proposals, employs the group of rational points on an elliptic curve in building discrete logarithm based public key cryptosystems. Starting from late 1990’s, the emergence of the ECC market has boosted the research in computational aspects of elliptic curves. This thesis falls into this same area of research where the main aim is to speed up the additions of rational points on an arbitrary elliptic curve (over a field of large characteristic). The outcomes of this work can be used to speed up applications which are based on elliptic curves, including cryptographic applications in ECC. The aforementioned goals of this thesis are achieved in five main steps. As the first step, this thesis brings together several algebraic tools in order to derive the unique group law of an elliptic curve. This step also includes an investigation of recent computer algebra packages relating to their capabilities. Although the group law is unique, its evaluation can be performed using abundant (in fact infinitely many) formulae. As the second step, this thesis progresses the finding of the best formulae for efficient addition of points. In the third step, the group law is stated explicitly by handling all possible summands. The fourth step presents the algorithms to be used for efficient point additions. In the fifth and final step, optimized software implementations of the proposed algorithms are presented in order to show that theoretical speedups of step four can be practically obtained. In each of the five steps, this thesis focuses on five forms of elliptic curves over finite fields of large characteristic. A list of these forms and their defining equations are given as follows: (a) Short Weierstrass form, y2 = x3 + ax + b, (b) Extended Jacobi quartic form, y2 = dx4 + 2ax2 + 1, (c) Twisted Hessian form, ax3 + y3 + 1 = dxy, (d) Twisted Edwards form, ax2 + y2 = 1 + dx2y2, (e) Twisted Jacobi intersection form, bs2 + c2 = 1, as2 + d2 = 1, These forms are the most promising candidates for efficient computations and thus considered in this work. Nevertheless, the methods employed in this thesis are capable of handling arbitrary elliptic curves. From a high level point of view, the following outcomes are achieved in this thesis. - Related literature results are brought together and further revisited. For most of the cases several missed formulae, algorithms, and efficient point representations are discovered. - Analogies are made among all studied forms. For instance, it is shown that two sets of affine addition formulae are sufficient to cover all possible affine inputs as long as the output is also an affine point in any of these forms. In the literature, many special cases, especially interactions with points at infinity were omitted from discussion. This thesis handles all of the possibilities. - Several new point doubling/addition formulae and algorithms are introduced, which are more efficient than the existing alternatives in the literature. Most notably, the speed of extended Jacobi quartic, twisted Edwards, and Jacobi intersection forms are improved. New unified addition formulae are proposed for short Weierstrass form. New coordinate systems are studied for the first time. - An optimized implementation is developed using a combination of generic x86-64 assembly instructions and the plain C language. The practical advantages of the proposed algorithms are supported by computer experiments. - All formulae, presented in the body of this thesis, are checked for correctness using computer algebra scripts together with details on register allocations.