首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
析美国反对常设国际刑事法院的理由和举措   总被引:1,自引:1,他引:0  
喻贵英 《法律科学》2006,24(4):121-131
2002年国际社会期待已久的常设国际刑事法院开始运作,它标志着一个历史性时刻的到来——侵略罪、灭绝种族罪、危害人类罪、战争罪的犯罪人不再能够逃脱国际刑事责任。然而,作为国际社会的唯一超级大国美国却也因此对常设国际刑事法院开始了强烈反对,一切可以想到和做到的阻挠措施均已被采取。美国反对常设国际刑事法院,旨在维护其自身利益和世界霸权地位,其理由和举措不符合联合国宗旨和正义原则。  相似文献   

2.
Terrorism is a notoriously plastic word, depending on user, audience, and political context. This paper focuses on shifts in its meanings since the early 1970s. As federal statutes made terrorism a criminal offense, common usage changed from a broad meaning to one that specified terrorism as a political crime. The argument is that the state shapes meaning and public discourse through law. Peircean semiotics and the semiotic philosophy of Russian linguist Vološinov provide a framework to explore relationships among politics, law, and civil life. Applied to the events of September 11, 2001 such an analysis further allows better understanding of certain interpreters of the September 11 attacks, notably Jean Baudrillard, Jacques Derrida, and Jürgen Habermas.  相似文献   

3.
SUSAN MANN 《Law & policy》1987,9(4):417-449
The McCarran-Walter Act mandates the exclusion of nonimmigrant aliens from entry into the United States. Hundred of detentions and exclusions occur yearly under the Act, and Latin Americans appear to be disproportionately likely to be excluded.
This article argues that the Act, a Cold War statute, ignores current political reality and American self-interest. The exclusionary subsections provide no more protection from terrorists and other genuine internal security risks than is available from other statutes. But they reduce the exchange of people and ideas, including foreign policy issues; fuel a negative image abroad of America; and impermissibly burden the first amendment and equal protection rights of American citizens. This article proposes that the subsections in question be repealed and replaced with narrower statutes.  相似文献   

4.
This article compares the life course transitions and household statuses of Canadian and American women and men in late nineteenth-century Canada and the United States. Using a set of integrated census data from 1871 Canada and the United States in 1880, the article suggests that household status differences between the two nations centered on gender. Canadian and American men timed or experienced their own transitions into and out of marriage and household headship at similar ages and to a similar extent. Demographic and economic differences between Victorian Canada and the United States, however, produced distinctions in Canadian and American women's life course transitions and household status: for Canadian women, older ages at first marriage, and the prolongation of the duration of the status, spouse of the household head. For their part, American elderly women more frequently lived as single and widowed heads of households than did their Canadian counterparts.  相似文献   

5.
《Global Crime》2013,14(3-4):250-270
ABSTRACT

The FARC, Colombia’s oldest and biggest guerrilla organisation, has long been constructed as the country’s public enemy number one, an enemy that is increasingly portrayed as an outright criminal actor who abandoned all political ambitions. This image of the FARC as a criminal threat to the Colombian state and society is central to a broader turn towards criminalisation in Colombian politics. Through the lens of a critical governance perspective and the notion of the state’s discursive selectivity this article analyses turning points during which the construction of Colombian society’s criminal enemies became a driving force in the country’s security governance. Which social forces support the implementation of criminalising forms of security governance and how? What are the social and political consequences of the latter? In answering these questions, the article argues that the war on (guerrilla) crime assumes a ‘productive’ role for Colombia’s formal democracy.  相似文献   

6.
This article considers the effects of the operations of myth and metaphor on law through a comparison of a United States Supreme Court decision and a novel that deal with the contested trans-racial adoption of an American Indian child. It argues that the United States founding myth of Manifest Destiny—of the divinely ordained fate of the continent to host a (white) Christian state—is determinative of the way in which legal decisions regarding American Indians are made. The myth of Manifest Destiny contains a metaphor of vanished American Indians, such that contemporary American Indians are rendered nearly invisible and whose existence is not easily absorbed into the working of the American legal system. The American Indian Child Welfare Act provides protections against assimilation for indigenous families and community, thus working at cross-purposes to the ultimate aim of Manifest Destiny. What happens in those instances when legal provisions and interpretation run counter to Manifest Destiny? Through the consideration of the situation of a contested adoption, this article reveals the heavy influence of Manifest Destiny in the Supreme Court decision, which is counter to the vision of a pluralistic culture envisioned in both the novel and the Indian Child Welfare Act (ICWA) itself. The consequences of legal resistance to ICWA for American Indian communities and as to the operation of the legal system itself are discussed.  相似文献   

7.
The horrific events of September 11, 2001 led to calls for the deployment of state-of-the-art security systems and the creation of an “invisible shield” to protect America. Such proposals immediately triggered debate about the constitutional ethics of surveillance in the United States. While there has been widespread support for the surrender of some cherished civil liberties in the war against terror, surveillance, especially the visual variety, is still seen to be innately un-American. Technologies like biometric face recognition systems, critics argue, are not consistent with the values of an open society and should consequently be considered with great caution. The widespread introduction of such invasive technology, pundits claim, would signal a victory for the terrorists.Many American commentators fail to recognize, however, that the United States, far from being the open society they imagine, has long been characterized by exclusion. Moreover, such exclusion is increasingly enforced by the same high technology of which biometrics is a part. In fact, for at least a decade before the declaration of the war on terror, the United States has been undergoing a multifaceted process of fortification both within its cities and at the US-Mexican frontier. Investigation of this phenomena reveals the central role of the US’s longest running concept war, the war on drugs. This paper argues that within this narrative biometric surveillance and the creation of “an invisible wall” should not be regarded as a break with American traditions but as the next organic phase of an ongoing process of fortifying the United States.  相似文献   

8.
In 2006, then Attorney General Alberto R. Gonzales raised the possibility that journalists could be prosecuted for publishing national security information. In addition, the federal government's prosecution of two former lobbyists for the American Israel Public Affairs Committee (AIPAC) for possessing and disseminating national security information has been called an attempt by the government to prosecute individuals who behave like journalists. This article identifies existing laws under which the press could be criminally prosecuted for the possession and/or publication of national security information and describes how the courts have addressed those laws. The article concludes that while there is support for Constitutional protection for journalists in these cases, the Supreme Court of the United States is unlikely to interpret the First Amendment as protecting journalists from prosecution for possessing and/or publishing national security information. Therefore, the article contends that Congress should amend the statutes outlined herein to limit prosecution to instances when there is evidence of intent to harm the United States.  相似文献   

9.
The political effectiveness of legal expertise in the United States has rested on the ability of a peak association to present itself as representing the opinion of the profession as a whole. It has also relied on a broad epistemology in which lawyers claim to know the right thing to do. However, the effectiveness and placement of such expertise is a comparative issue. This article argues that organizations other than peak associations can muster the support required for legitimacy in the modem state. The legal profession's epistemology could lead it to narrow rather than broaden its claims in order to effectively claim expertise in something. The ability of the central state to shape a profession's mandate and to reject its advice will also influence the deployment of legal expertise. The article explores these issues in the context of the reform of administrative law in England and Wales. In England and Wales, an expertise-based commission mimicked the processes expected of a peak association. In anticipation of rejection by the central administration, it constrained rather than broadened its policy recommendations.  相似文献   

10.
司法模式、战争模式、治理模式是三种应对恐怖主义犯罪的模式。司法模式把恐怖主义界定为一种犯罪行为。为此反恐是侦查破案与打击犯罪的问题。此模式核心是恢复法律的权威,维护社会治安秩序。战争模式把恐怖主义界定为一种战争行为。为此反恐是打败或消灭敌人、取得战争胜利的问题。此模式核心是打击、歼灭恐怖分子并取得战争胜利。治理模式把恐怖主义界定为国家安全治理方面的缺失、低效或失败及其导致的对民众安全服务的缺失与低效。为此反恐是加强和改善有关恐怖主义问题的治理,以提供更有效的安全服务。此模式核心是塑造一种安全环境。治理模式对于恐怖主义及反恐问题界定不同于战争模式、司法模式。这种界定具有决定性影响。其直接决定这三种反恐模式在视野、目标、思路、标准、力量、措施与手段、时间维度、战略角度、精神层面等方面的不同。  相似文献   

11.
ABSTRACT

Security services regulations in the United States began formally in the second half of the twentieth century. Many states – never the federal government – first set and then increased, and sometimes decreased, standards over the years. With the shock from the events of 11 September 2001 (9/11) and the subsequent war on terrorism, the pace of regulatory growth increased. Even so, regulations for security personnel – especially security guards – remain at an indefensibly low level with 12 states having no requirements at all for unarmed security personnel and 14 having none for armed. Yet along the way, regulatory pre-employment screening requirements have incrementally improved, training demands, less so. Expecting a security officer with zero-to-a-few hours preassignment training to be a competent first responder, a skilled communicator with the public, a knowledgeable person about applicable law, an informed user of security technology, and a worker educated on the mission and operations of the workplace is not a convincing point of view. The security industry espouses higher standards, including through regulation, but then does not act upon its aspirations. For other security services – alarm installation and monitory personnel, investigators/private detectives, and locksmiths – regulations vary widely according to state. They don’t exist at all for security consultants. This article comments on and reviews regulations for all these security services.  相似文献   

12.
《Global Crime》2013,14(2):115-133
ABSTRACT

The paper addresses the nature of gang governance. It questions the notion that gangs regulate social and economic transactions and create stable orders in certain territories. It shows that, while presenting themselves as upholders of the ‘law’ in their territory, the gangs also create a climate of uncertainty and fear. The gangs manipulate their own unwritten rules and set up traps for residents and businessmen. These traps are designed to deprive non-gang civilians of presumed rights and identities and extort their money. The paper uses Schmitt’s notion of ‘state of exception’ and Agamben’s idea of ‘bare life’ to explain how gangs function.  相似文献   

13.
This article explores the United States' crackdown on crime in light of other state agency policy shifts under the Reagan administration, such as those affecting the poor, the unemployed, the rich, and the corporate world. Actions across these realms manifest continuity, as identified through the investigation of the state's duel roles of accumulation and legitimation. The fiscal and legitimation crises that develop corollary to state functioning in advanced capitalistic societies are drawn upon to interpret the creation of a new crime problem and get tough response across the United States over the 1980s. Different state policy directions are discussed as they have operated for the accumulation of the few at the expense of exacerbated inequality and injustice for all. Conclusions suggest that such developments hold the potential to call forth new callenges and change.  相似文献   

14.
In this article I place U.S. punishment trends in comparative context, seeking to show that the contemporary penal regime in the United States resembles patterns of governance prevalent throughout Latin America, the world's most economically unequal region. In both the U.S. and Latin America, I argue, neoliberal reforms have produced societies characterized by ever greater divides between the haves and have-nots, and state criminal justice institutions increasingly position themselves to police this boundary rather than mitigate its effects. In this article, I examine these trends through the lens of wars on crime and terrorism, arguing that in societies polarized between a dwindling set of haves and an ever more numerous (and potentially unruly) group of have-nots, an inexorable pull makes criminal justice institutions more aggressive in their enforcement of class and racial boundaries. Hallmarks include a widening of the criminal justice net (by broadening definitions of criminal activity, for example) and a deepening of the deprivations visited on those ensnared within it. The article concludes with reflections on the need for reconfiguring conceptions of human rights and their relation to security.  相似文献   

15.
With the threat of biological war becoming a more and more distinct possibility, there is a growing need for vaccines and cures for diseases. As warfare moves from the battlefield to the laboratory, the military must adapt its tactics in order to preserve national security. At the moment, soldiers consent to the risk associated with combat, but with the changing nature of war, the need may arise for soldiers to put themselves at risk not only through combat, but also through scientific experimentation, in order to produce vaccines or cures and ultimately maintain national security. By allowing soldiers to trade risk on the battlefield with risk in the laboratory, deeper research can be made into diseases and biological agents, and this would therefore lessen the threat of biological war or terrorism.  相似文献   

16.
Due to the global and pervasive nature of the Internet, the increasingly intrusive nature of reporting by tabloids, the high cost of bringing privacy actions, and the difficulty and complexity involved in removing private information from the World Wide Web, privacy costs and remedies are under scrutiny in the United Kingdom. This article examines some of the proposed changes in this area including the availability of injunctions, pre-publication notification, levels of damage awards, opportunities for alternative dispute resolution, conditional fee agreements/success fees, and potential global solutions that may have an impact on the United States. The article argues that due to the nature of privacy claims initiated from information on the Internet, damage fee levels should be increased as well as the use of mediation and conditional fee agreements.  相似文献   

17.
When an employer becomes insolvent, employees’ claims for unpaid wages and contributions may be protected through statutory priorities, social security schemes, or a combination of both. This article compares the interplay of employee statutory priorities, if they exist, and social security schemes in France, Germany, and the United Kingdom. While France protects employees through both a statutory priority and a social security scheme, Germany and the United Kingdom have progressively reduced employment protection over the last forty years. Theories of varieties of capitalism and of legal origins cannot fully describe and explain the development of employment protection strategies in these countries. The evolution of the German and British regimes, in particular, are better explained as a sign of profound cultural shifts regarding the position of labour within firms and vis‐à‐vis other stakeholders. Finally, I also show that a cumulative application of employee priorities and insurance schemes is not necessarily redundant.  相似文献   

18.
The regulatory approach to privacy protection taken by many foreign jurisdictions is markedly different from that of the United States. The European Union (EU) best illustrates the international approach with its comprehensive privacy directive that applies to all EU members. By contrast, the approach regarding data privacy in the United States has been to pass industry-specific laws and often only in response to public outcry over some privacy concern. These fundamental differences have been the source of some conflict in international commercial transacting. Now that the global community is committed to eliminating terrorism, it remains to be seen if these different attitudes toward privacy by the United States and much of the rest of the world will affect global attempts to weed out terrorists. This article discusses the constitutional basis for most US policy approaches to privacy regulation. The article explains how the US constitution is the source for most of the differences between the US and international regulatory approaches to information privacy. Finally, the discussion addresses how new issues regarding privacy in the war on terrorism may be addressed by US Constitutional law.  相似文献   

19.
Post-9/11 the equilibrium between security and liberty has been subject to intense political and philosophical interrogation. The metaphor of balance, although perilous, is so pervasive as to demand scrutiny of what lies in the scales, what tips them, and in whose interest. Though international and constitutional lawyers have dominated the debate about balance, the experience of criminal justice suggests that articulating a principled approach provides greater prospects of protecting rights against unwarranted erosion. This more modest approach imposes structural and procedural safeguards through the twin engines of judicial oversight and unremitting defence of due process. In this way it may be possible to enhance collective security against terrorism without diminishing individual security against the state.  相似文献   

20.
The Local Role in Homeland Security   总被引:1,自引:0,他引:1  
There has been considerable discussion since September 11 of the enormous resource that local police potentially represent in the fight against terrorism. This article identifies limits to the local role in homeland security by analyzing a case study of Dearborn, Michigan. Partly because Dearborn is home to one of the largest concentrations of Arabs in the United States, its experience with homeland security highlights two kinds of burdens that cities incur when they engage in proactive surveillance to identify potential terrorists: damage to their reputation (since police surveillance implies that its objects are not trustworthy) and damage to police legitimacy (since new surveillance may undermine trust between police and the community). Because the benefits of efforts to identify terrorists typically accrue to jurisdictions other than the one that engages in it—unlike street crime, terrorism is a national or even international problem—local governments have little reason to pursue it. Instead, cities such as Dearborn have reason to emphasize what I call the "community protection" aspects of homeland security, such as target hardening and emergency response. This finding has more general implications for our understanding of the police role and the politics of policing, showing how both are shaped by the structural location police occupy in federalist systems of government.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号