This report examines the use of these entities in nearly all cases of corruption. It builds upon case law, interviews with investigators, corporate registries and financial institutions and a 'mystery shopping' exercise to provide evidence of this criminal practice.
This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, "homegrown" and "domestic" are terms that describe terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. It also outlines actions underway to build trust and partnership between community groups and government agencies and the tensions that may occur between law enforcement and engagement activities.
A growing number of states use private military and security companies (PMSCs) for a variety of tasks, which were traditionally fulfilled by soldiers. This book provides a comprehensive analysis of the law that applies to PMSCs active in situations of armed conflict, focusing on international humanitarian law. It examines the limits in international law on how states may use private actors, taking the debate beyond the question of whether PMSCs are mercenaries. The authors delve into issues such as how PMSCs are bound by humanitarian law, whether their staff are civilians or combatants, and how the use of force in self-defence relates to direct participation in hostilities, a key issue for an industry that operates by exploiting the right to use force in self-defence. Throughout, the authors identify how existing legal obligations, including under state and individual criminal responsibility should play a role in the regulation of the industry.
The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.
Written by leading scholars, the fourteen case studies in this volume will help policymakers, scholars, and students make sense of contemporary cyber conflict through historical analogies to past military-technological problems.