The political offense exception and terrorism / Abraham D. Sofaer
In: http://hdl.handle.net/2027/umn.31951002935245x
"November 1985"--P. 5. ; Shipping list no.: 85-1131-P. ; Caption title. ; Mode of access: Internet.
551457 results
Sort by:
In: http://hdl.handle.net/2027/umn.31951002935245x
"November 1985"--P. 5. ; Shipping list no.: 85-1131-P. ; Caption title. ; Mode of access: Internet.
BASE
In An introduction to political crime, Jeffrey Ian Ross provides the most comprehensive and contemporary analysis of political crime addressing both violent and nonviolent crimes committed by and against the state (e.g. political corruption, illegal domestic surveillance, and human rights violations) in the United States, Canada, United Kingdom and other advanced industrialized democracies since the 1960s. Written by a respected social scientist, this book reviews appropriate theories of political crime and explains numerous definitional and conceptual issues, causes of political crimes, ways to control it, and effects of different types of political crime. Ross integrates new scholarship on state crime, and post 9/11 developments in both scholarship and current affairs and uses numerous examples to help readers understand the issues. The book is supported by a companion website, containing additional materials for both students and lecturers, which is available from the link above
In: Canadian State Trials v.III
In: The Osgoode Society for Canadian Legal History
The third volume in the Canadian State Trials series examines Canadian legal responses to real or perceived threats to the safety and security of the state from 1840 to 1914, a period of extensive challenges associated with fundamental political and socio-economic change
In: Critical issues in crime and society
Current media and political discourse on crime has long ignored crimes committed by States themselves, despite their greater financial and human toll. For two decades, scholars have examined how and why States violate their own laws and international law and explored what can be done to reduce or prevent these injustices. Through essays by leading scholars, State Crime offers a set of cases exemplifying state criminality along with various methods for controlling governmental transgressions. It is an indispensable resource for those who examine the behavior of States and those who study crime
From the trial of Socrates to the post-9/11 military commissions, trials have always been useful instruments of politics. Yet there is still much that we do not understand about them. Why do governments use trials to pursue political objectives, and when? What differentiates political trials from ordinary ones? Contrary to conventional wisdom, not all political trials are show trials or contrive to set up scapegoats. This volume offers a novel account of political trials that is empirically rigorous and theoretically sophisticated, linking state-of-the-art research on telling cases to a broad argument about political trials as a socio-legal phenomenon. All the contributors analyse the logic of the political in the courtroom. From archival research to participant observation, and from linguistic anthropology to game theory, the volume offers a genuinely interdisciplinary set of approaches that substantially advance existing knowledge about what political trials are, how they work, and why they matter.
The US government has spent as much time covering up conspiracies as it has helping the American people. In Hidden History, you will see the amount of effort that our government has dedicated over the past fifty years to lying and covering up the truth to the world. Starting with the assassination of President John F. Kennedy, Don Jeffries chronicles a wide variety of issues that have plagued our country's history. Whether it is the assassinations of MLK and RFK, Iran-Contra, the Oklahoma City bombing, TWA Flight 800, voting fraud, or 9/11, every major disaster or war that we've sitnessed has somehow been distorted by those who are supposed to be protecting us. Jeffries also delves into extensive research on the death of John F. Kennedy, Jr. - and what he finds will shock you. So whether you've only heard bits and pieces of these stories or you've read several books on the topics, Hidden History is the book that belongs in every conspiracy theorist's library, as the information included here has never been collected together in any other published work available. So sit down, strap in, and get ready to be shocked and awed by how much has been hidden by our government over the past fifty years. Updated for 2016, this version features a new introduction by political insider Roger Stone
In: Transformative Politics Series, ed. Joy James
Terrorism is a complex phenomenon that cannot be understood through reading of a number of unrelated academic articles or a dry overview of the history of terrorism or the investigative techniques. For A New Understanding of Terrorism, the Editors have chosen a different paradigm. They have selected numerous case studies from actual events that illustrate various typologies of terrorist actions, be it from a separatist, nationalist, lone-wolf individual terrorist, religious fanatics or environmentalist orientation, and they present these cases within the context of following the trajectories of the terrorist activity, the terrorist act itself and, the response to the event from the relevant authorities. Some chapters concentrate on terrorist attacks that actually took place, others speculate about the possibilities of an attack occurring sometime in the future, such as the chapters on the Olympic Games, Aviation or Rail Security. When possibilities rather than a specific event are discussed, the authors of these chapters draw the attention of the reader towards the same direction—the reasoning, the actual event and the response that followed. The thorough analysis of the presented case studies and the applied counter-measures will, hopefully, if not curtail then possibly at least mitigate the operational and ideological strength of terrorist groups or individual actors. A New Understanding of Terrorism will enable the reader to make the connection between the emotional charge inherent in any terrorist activity, the cold-blooded tactics that lead to the terrorist event itself and the pragmatic and very straightforward, but at the same time very simplistically designed, strategic response that has to come from a synergy between academics, military and law enforcement brainstorming design in order to be more effective in the future.
Does the CIA covertly utilize "mind control" drugs and techniques? Are satanic messages subliminally hidden in popular music? Were Freemasons behind London's Jack the Ripper murders? Did Kurt Cobain really commit suicide, or was he murdered? Did American astronauts really walk on the moon or was the whole event concocted on a sound stage? Does your vote really count or is the U.S. president chosen by secretive societies such as the Bilderberg Group, the Council on Foreign Relations, and the Illuminati? In an objective, fact-based manner, The Encyclopedia of Conspiracies and Conspiracy Theories
In: http://hdl.handle.net/2027/mdp.39015032198676
"Serial no. J-97-67." ; CIS Microfiche Accession Numbers: CIS 82 S521-18 ; Includes bibliographical references. ; Microfiche. ; Mode of access: Internet.
BASE
Item 1020-A, 1020-B (microfiche). ; "April 1981." ; At head of title: 97th Congress, 1st session. Committee print. ; Mode of access: Internet.
BASE
In: http://hdl.handle.net/2027/mdp.39015019186660
"Emergency Preparedness Project." ; Includes bibliography. ; Mode of access: Internet.
BASE
At head of title: Committee print. ; Mode of access: Internet.
BASE
In: http://hdl.handle.net/2027/mdp.39015014701034
Reuse of record except for individual research requires license from Congressional Information Service, Inc. ; At head of title: Committee print. ; CIS Microfiche Accession Numbers: CIS 73 H482-2 ; Microfiche. ; Mode of access: Internet.
BASE
In: http://hdl.handle.net/2027/uiug.30112065518851
Running title: History of the Bastile. ; Mode of access: Internet.
BASE