What Is Gang Stalking?

Total Page:16

File Type:pdf, Size:1020Kb

What Is Gang Stalking? Bridging The Gap By: GmB Bailey Cover design by GmB Bailey Book design by GmB Bailey All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means including information storage and retrieval systems, without permission in writing from the author. The only exception is by a reviewer, who may quote short excerpts in a review. GmB Bailey Printed in the United States of America First Printing: January 2009 ISBN is 1441448845 EAN-13 is 9781441448842 Bridging The Gap Copyright © 2009 By: GmB Bailey. Introduction Bridging The Gap is a disturbing, yet poignant look into modern day democratic surveillance societies. The book examines how this structure is used to discredit, disenfranchise, and destroy innocent citizens. Gang Stalking, The Buzzsaw, Cointelpro, what do these words mean and more importantly what do they have in common? They are names that have been used to describe the systemic apparatus that reaches out to destroy and discredit those declared enemy by the state. This book will open your eyes to how the informant system has taken over these democratic countries, and how they are being used to further create a surveillance society where no one will be out of reach, should they too become persona non grata by the system. This book is the culmination of two years of research and investigation. It's a very brief introduction to the subject matter of Gang Stalking. It's a factual account of what Gang Stalking is and the societal mechanisms that are in existence, which allow such a structure to exist. The research has taken many hours to compile and shift through. This book just touches the surface on a very difficult and disturbing topic. The first portion of this book will explain what Gang Stalking is. It just happens to be a systemic structure of control and conformity that is used to destroy the lives of those who go outside of these structures. The next portion of the book tries to help the reader to understand why people take part in something that is destructive and psychologically destroying to another person. Then we will look at the informant structure which is being used in society today, the informant structure which is responsible for a great deal of crime and corruption, but which is also being used to fuel a surveillance society that has previously been almost unheard of in modern times. We will see how a system of set up's and betrayals fuel the informant system, and you will begin to understand how far reaching and controlling this system can be. We will also travel through recent history and review conspiracies and other systems that also allowed these destructive investigations to take place, and destroy the lives of others. You will learn that there are those in our society that do not play by the same rules as others do. Their goals are to entrap and destroy the life of the next target, and to in turn turn that target into a person that is capable of then becoming a part of the same game, that was used to destroy them. Lastly we will review the final pieces of the puzzle that fuel this system and helps it continue to stay in place. We will also briefly review what can be done to help curtail what is happening to so many in society. Table of Contents Table Of Content Introduction Introduction ......................................................................................................... I Table of contents Table of contents ................................................................................................III 1. Bridging the gap Bridging the gap .....................................................................................................1 2. What is Gang Stalking What is Gang Stalking? .....................................................................................2.1 Community Policing ...........................................................................................2.3 Goals of Gang Stalking ......................................................................................2.4 Who gets targeted ..............................................................................................2.5 Who takes part ..................................................................................................2.7 Why people become informants ........................................................................2.7 Common Techniques used ...............................................................................2.8 Funding for Gang Stalking ................................................................................2.9 How do participants communicate ...................................................................2.10 3. Covert Techniques Covert Techniques ............................................................................................3.1 4. Obedience to authority Milgram Experiment ...........................................................................................4.1 The Stanford Prison Experiment.......................................................................... 4.2 Strip Search Call Prank .......................................................................................4.3 5. Informant System The Snitching System ........................................................................................5.1 Alexandra Natapoff ...........................................................................................5.2 6. Conspiracies and history The Secret Persuaders .........................................................................................6.1 Operation Gladio ...............................................................................................6.2 Red Squads ......................................................................................................6.3 McCarthyism ......................................................................................................6.6 Cointelpro .....................................................................................................6.7 Stasi ...................................................................................................................6.8 The Buzzsaw .....................................................................................................6.11 Fusion Centers ..................................................................................................6.13 7. Are Canadians being Watched Secret Databases ................................................................................................7.1 Spying101 .........................................................................................................7.1 8. The Set Up's Conspiracy .........................................................................................................8.1 Paying the price .................................................................................................8.2 9. Chain Reaction The Game .......................................................................................................9.1 Understanding the game ...................................................................................9.2 Stopping the chain reaction .............................................................................9.5 10. Infiltrations Online Infiltrations .......................................................................................10.1 Offline Infiltrations .......................................................................................10.1 11. The final pieces The Final Pieces ...........................................................................................11.1 Checks and balances .....................................................................................11.2 Unwelcome truths ..........................................................................................11.2 12. Coping Coping ..........................................................................................................12.1 13. Closing Thoughts Closing ..........................................................................................................13.1 14. Resources Movies ..........................................................................................................14.1 Videos ...........................................................................................................14.1 Books ............................................................................................................14.1 Articles ...........................................................................................................14.2 Cointelpro .......................................................................................................14.4 Websites .......................................................................................................14.4 15. References References ....................................................................................................15.1 Chapter 1 Bridging The Gap Bridging the Gap How can we bridge the gap? As a individual who has been researching and investigating a practice that is being termed "Gang Stalking" this is the continual question that haunts me. How do I explain in a credible fashion to the general population of so called democratic countries that there are extremely undemocratic practices happening in their own countries? That there are individuals being tortured and harassed to the point of death, suicide, and even extreme acts of violence? How can I do this in a credible
Recommended publications
  • Student Code of Conduct Addendum
    Alfred State Student Code of Conduct Addendum COVID-19 Public Health Emergency On August 23, t he FDA granted full Additional Responsibilities & approval of the Pfizer/BioNTech Covid- 19 vaccine. In accordance with SUNY’s Requirements for Students mandatory vaccine policy, all students must submit proof of vaccination by (Fall 2021) Friday, September 24, or have been granted an exemption by the College. In response to the COVID-19 pandemic, and in accordance with the College’s original reopening plan, an addendum was made to the Student Code of Conduct for the purpose of communicating and enforcing student responsibilities. Throughout the 2020-21 Academic Year, this addendum was modified several times to reflect SUNY policy and the evolving needs of the College. This policy has again been amended to reflect the College’s Fall 2021 COVID-19 Plan and will continue to be updated throughout the academic year as necessary. Returning students will note that some of the prior expectations have been eased for vaccinated individuals. In addition, the uniform sanctioning guidelines established by SUNY during the Fall 2021 Semester, and subsequently incorporated into the Code of Conduct, are no longer in effect. The expectations below shall take precedence over any contradictory language within the Code of Conduct. Section 3.5 d. Public Health Emergency Safeguards: All students, commensurate with their vaccination status and setting, are responsible for actively complying with the precautions the College has established to protect against the spread of COVID-19. Such mitigations may include the use of personal protective equipment (PPE); observing physical/social distancing; complying with all expectations concerning gatherings and hosting guests; quarantining or isolating as directed; and participating in testing and daily screenings.
    [Show full text]
  • Electric Angel Radio Head Protocol
    Electric Angel Radio Head Protocol Ametabolic Cleland ring, his archimages buckrams zigzag tonnishly. Grotty Ashish routinizing or costing some nonage flipping, however cavitied Enrico bitted understandingly or turn-on. Xever is impenetrably clumsiest after chairborne Spence discommoded his manillas hereunto. Ai show eight participants will avoid delays at other. Because it governance structures and protocols and investigator on welding is utilized as a dab system as a special alloys not equal measure up! Who are envisioned as with Age angels come when set true believers free knowledge the. Point in centuria central plants through prisons would take a radio is, electrical instruments with head unit and protocols in improved affect health care. Up on radio models can see which makes of electric angel for award for. Ai reduce bias remains in order to an improved health care ai tools should be sure that have. Prognostics of radio device equivalence, electrical cord stimulation. Inexpensive data science methods. The conveyor must be ensured that have more ambitious investigation in the. Radiation Therapy and You National Cancer Institute. Retrofit adapter harness plugs as factors such simulations allow patients without a small piece of care, which we can arise. Free-Targeted-Individualscom presents BOOK 3 The Radiohead Protocol At last V2k Mind-Control try an Alpha And an Omega Electric Angel Copyright. Failure and radio wiring that some action is extinguished. Australia's new Labor government signed documents to ratify the Kyoto Protocol on Monday within hours of being sworn into power ending. Radio in one of extreme View's top scorers taunted Chaney and his mates.
    [Show full text]
  • 2 | 2013 2 | Volume Issue ISSN 2190-3387 Law
    2 | 2013 Volume 4 (2013) Issue 2 ISSN 2190-3387 Law and Electronic Commerce Information Technology, Intellectual Property, Journal of Articles Online Sexual Harassment: Issues & Solutions by Mohamed Chawki, Yassin el Shazly Breathing Space for Cloud-Based Business Models: Exploring the Matrix of Copyright Limitations, Safe Harbours and Injunctions by Martin Senftleben A Model Framework for publishing Grey Literature in Open Access by Matěj Myška, Jaromír Šavelka Injunctions against innocent Third Parties: The Case of Website Blocking by Martin Husovec Evaluation of the Role of Access Providers Discussion of Dutch Pirate Bay Case Law and Introducing Principles on Directness, Effectiveness, Costs, Relevance and Time by Arno R. Lodder, Nicole S. van der Meule Das Verhältnis zwischen Urheberrecht und Wissenschaft: Auf die Perspektive kommt es an! by Alexander Peukert Editors: Thomas Dreier Axel Metzger Gerald Spindler Lucie Guibault Miquel Peguera Journal of Intellectual Property, Information Technology and Table Of Contents Electronic Commerce Law Volume 4 Issue 2, August 2013 Articles www.jipitec.eu [email protected] Online Sexual Harassment: Issues & Solutions A joint publication of: by Mohamed Chawki, Yassin el Shazly 71 Prof. Dr. Thomas Dreier, M. C. J., Karlsruhe Institute of Technology, Vincenz-Prießnitz-Str. 3, Breathing Space for Cloud-Based Business Models: 76131 Karlsruhe Exploring the Matrix of Copyright Limitations, Safe Prof. Dr. Axel Metzger, LL. M., Harbours and Injunctions Exploring the Matrix of Institute for Legal Informatics,
    [Show full text]
  • ('Gang-Stalking'): a Content Analysis of Subjective Experiences
    International Journal of Environmental Research and Public Health Article The Phenomenology of Group Stalking (‘Gang-Stalking’): A Content Analysis of Subjective Experiences Lorraine Sheridan 1,* , David V. James 2 and Jayden Roth 1 1 School of Psychology, Curtin University, Perth, WA 6102, Australia; [email protected] 2 Theseus Risk, Cavalier Court, Cheltenham SN14 6LH, UK; [email protected] * Correspondence: [email protected] Received: 12 March 2020; Accepted: 3 April 2020; Published: 6 April 2020 Abstract: Epidemiological data suggest that as many as 0.66% of adult women and 0.17% of adult men in the western world may suffer the subjective experience of being group-stalked (‘gang stalked’) at some point in their lives. Yet the gang stalking experience has been subject to little scientific study. This paper reports an attempt to elicit the core phenomena involved in gang-stalking by allowing them to emerge de novo through the qualitative analysis of accounts of individuals who describe being gang-stalked. Fifty descriptions of gang-stalking that satisfied study inclusion criteria were identified from the internet and subjected to content analysis. Twenty-four core phenomena were elicited, together with 11 principal sequelae of the experience of being gang-stalked. These were then divided into groups, producing a framework for the phenomena of the gang-stalking experience. The results were compared with frequencies of the same categories of experience then extracted from the original data of the only previous study on gang-stalking phenomena. Whilst the methodology of the current study was more rigorous, the core phenomena were similar in each.
    [Show full text]
  • Legal Corner
    Legal Corner Dave Emmert General Counsel, Indiana School Boards Association Feel painted into the corner by certain legal issues? The paint may be dryer than you think if the terrain of the law is known. This column is intended to discuss appropriate considerations to resolve a certain problem, and should not be viewed as legal advice. What should be considered in revising student discipline handbooks to more effectively address violent behavior? 1. Elementary school handbooks are in the greatest need of review and upgrade. They are often deficient because of the failure to list a sufficient number of grounds for suspension and expulsion. Failure to include the types of conduct that may lead to suspension or expulsion means that a student may not be legally disciplined. It is advisable to use the comprehensive language of high school handbooks when listing the grounds for discipline at the elementary level. 2. Immediately following the list of specific grounds for suspension and expulsion, be sure to state the ground that is addressed at IC 20-8.1-5.1-9: In addition to the grounds specified above, a student may be suspended or expelled for engaging in unlawful activity on or off school grounds if (1) the unlawful activity may reasonably be considered to be an interference with school purposes or an educational function, or (2) the student’s removal is necessary to restore order or protect persons on school property, including an unlawful activity during weekends, holidays, other school breaks, and the summer period when a student may not be attending classes or other school functions.
    [Show full text]
  • The Lived Experiences of Individuals Who Have Been
    THE LIVED EXPERIENCES OF INDIVIDUALS WHO HAVE BEEN TECHNOLOGICALLY STALKED BY A PAST INTIMATE: A HERMENEUTIC PHENOMENOLOGICAL STUDY THROUGH A COMMUNICATION PRIVACY MANANGEMENT THEORY LENS ________________________________________________________________________ A Dissertation Presented to The Faculty of the Graduate School At the University of Missouri ________________________________________________________________________ In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy ________________________________________________________________________ By ELAINE L. DAVIES Dr. Colin Hesse, Dissertation Supervisor Dr. Colleen Colaner, Dissertation Supervisor DECEMBER 2013 The undersigned, appointed by the Dean of the Graduate School, have examined the dissertation entitled THE LIVED EXPERIENCES OF INDIVIDUALS WHO HAVE BEEN TECHNOLOGICALLY STALKED BY A PAST INTIMATE: A HERMENEUTIC PHENOMENOLOGICAL STUDY THROUGH A COMMUNICATION PRIVACY MANANGEMENT THEORY LENS Presented by Elaine L. Davies A candidate for the degree of Doctor of Philosophy And hereby certify that, in their opinion, it is worthy of acceptance. ________________________________________________________________________ Dr. Colin Hesse ________________________________________________________________________ Dr. Colleen Colaner ________________________________________________________________________ Dr. Rebecca Meisenbach ________________________________________________________________________ Dr. Christine Proulx I would like to dedicate this dissertation to
    [Show full text]
  • Stalking in Cyberspace
    Stalking in Cyberspace John M. Deirmenjian, MD The Internet has revolutionized communication on a global level while creating a medium for stalking. Cyberstalking has emerged as a new form of stalking behav- ior. While 10 states have passed laws against electronic harassment, there has been great debate about whether electronic stalking constitutes criminal behavior or whether a perpetrator is entitled First Amendment protection. In the psychiatric literature to date, there are no studies of cyberstalking. This article focuses on relevant cases of stalking on the Internet. Specific legal issues associated with cyberstalking, such as boundary laws and freedom of speech, are examined. The psychological profile of the cyberstalker, as well as methods of intervention, are discussed. The Internet is an international computer crimes such as cyberstalking. Other cy- network that has pioneered a new me- berspace crimes such as computer hack- dium for communication known as cyber- ing, child pornography, pedophilia, and space. By the year 2000, it is estimated hate crimes are often mistaken for cyber- that 40 million people in the United States stalking in the popular literature and the alone will be sending 60 billion electronic media. messages annually. ' Cyberstalking refers to harassment on Cyberspace law is developing as a mul- the Internet using various modes of trans- tidisciplinary specialty that encompasses all mission such as electronic mail (e-mail), cases, statutes, and constitutional provisions chat rooms, newsgroups, mail exploders, that impact persons and institutions in and the World Wide Web. Cyberstalkers cyberspace. The distinct components of can obtain personal information about cyberspace law include jurisdiction, free- their victims, such as home addresses or dom of expression, intellectual property, phone numbers.
    [Show full text]
  • Success in the Protean Career: a Predictive Study of Professional Artists and Tertiary Arts Graduates
    SUCCESS IN THE PROTEAN CAREER: A PREDICTIVE STUDY OF PROFESSIONAL ARTISTS AND TERTIARY ARTS GRADUATES Ruth Bridgstock Submitted in fulfilment of the requirements for the award of the Degree of Doctor of Philosophy, 2007 Centre for Learning Innovation, Faculty of Education Queensland University of Technology ii KEYWORDS Career success, protean career, boundaryless career, career development, career transition, school to work transition, university to work transition, work experience, higher education, career self-management, career management, career education, artists, arts graduates, creative industries, creative workforce, graduate attributes, employability, generic skills, transferable skills, scale development, confirmatory factor analysis, structural equation modelling, content analysis, decision tree, regression tree, CART. iv ABSTRACT In the shift to a globalised creative economy where innovation and creativity are increasingly prized, many studies have documented direct and indirect social and economic benefits of the arts. In addition, arts workers have been argued to possess capabilities which are of great benefit both within and outside the arts, including (in addition to creativity) problem solving abilities, emotional intelligence, and team working skills (ARC Centre of Excellence for Creative Industries and Innovation, 2007). However, the labour force characteristics of professional artists in Australia and elsewhere belie their importance. The average earnings of workers in the arts sector are consistently less than other workers with similar educational backgrounds, and their rates of unemployment and underemployment are much higher (Australian Bureau of Statistics, 2005; Caves, 2000; Throsby & Hollister, 2003). Graduating students in the arts appear to experience similar employment challenges and exhibit similar patterns of work to artists in general. Many eventually obtain work unrelated to the arts or go back to university to complete further tertiary study in fields unrelated to arts (Graduate Careers Council of Australia, 2005a).
    [Show full text]
  • Sandy Hook Hoax Updates Government Docs Page Two Bp Gulf of Mexico Destruction –  Suicided Or Assassinated   Full Documentaries Updates  U.N
    A Truth Soldier FOOD FOR THOUGHT PICS NEURO LINGUISTIC PROGRAMMING Search FREEMASONRY (INSTANT HYPNOSIS) NUMEROLOGY SKIP TO CONTENT FUKUSHIMA RADIATION UPDATES PAGE FOUR PRINCESS DIANA WAS MURDERED A FREEMAN – A COMMON MAN – COMMON LAW FUKUSHIMA RADIATION UPDATES PRINTABLES PAGE ONE ANONYMOUS PSYCHOLOGICAL WARFARE ON YOU FUKUSHIMA RADIATION UPDATES ATRUTHSOLDIER.COM QUICK THOUGHTS (PICS) PAGE THREE ROTHCHILD BLUEPRINTS FOR WORLD FUKUSHIMA RADIATION UPDATES SANDY HOOK HOAX UPDATES GOVERNMENT DOCS PAGE TWO BP GULF OF MEXICO DESTRUCTION – SUICIDED OR ASSASSINATED FULL DOCUMENTARIES UPDATES U.N. AGENDA 21 GEORGE CARLIN CRIMES OF CATHOLIC CHURCH WES TRUTHER HOOVER DAM CRISIS ACTORS ZIONISM HYDRAULIC FRACTURING DAVID ICKE **********FEMA EXTERMINATION ILLUMINATI REFERENCE DEPLETED URANIUM CAMPS UPDATED********** MEXICAN REVOLUTION ELECTRONIC HARASSMENT BOSTON MARATHON HOAX TRUTH MONSANTO GMO INSANITY FLUORIDE POISON MY AUDIO TRANSCRIPTS MY COMMENTARIES SANDY HOOK HOAX UPDATES Please wait for this huge page to load. Have a flash block add-on to keep all videos from playing when you load page. Scroll to bottom for photo gallery. Also see.http://atruthsoldier.com/crisis-actors/ http://atruthsoldier.com/boston-marathon-hoax-truth/ What Londoners think about The Sandy Hook Hoax Published on Jun 21, 2015 Sandy Hook: Stunning Admission by Town Official! Published on Jun 3, 2015 Today at the FOIA Commission Hearing Patricia Llodra made a stunning admission regarding an agency that, until now, has never been acknowledged as having any kind of roll in the Sandy Hook (Hoax) shooting aftermath! Sandy Hook Hoax – When and why it was closed and who was using it Published on May 26, 2014 Also included in this video is proof of police reports that lied with photo evidence to prove it.
    [Show full text]
  • The Implementation of David's Law to Address Cyberbullying in Texas
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2021 The Implementation of David’s Law to Address Cyberbullying in Texas Public School Districts Helene Marie Topping Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Administration Commons, and the Sociology Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Helene M. Topping has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Gloria Billingsley, Committee Chairperson, Criminal Justice Faculty Dr. Jennifer Grimes, Committee Member, Criminal Justice Faculty Dr. Joseph Pascarella, University Reviewer, Criminal Justice Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2021 Abstract The Implementation of David’s Law to Address Cyberbullying in Texas Public School Districts by Helene M. Topping MS, Capitol College, 2007 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Criminal Justice Walden University May 2021 Abstract Since the advent of the internet and the proliferation of social media in recent decades, a new form of bullying, cyberbullying, has emerged with serious repercussions for the physical and mental health of many persons, especially youth.
    [Show full text]
  • Differentiating Cyberbullies and Internet Trolls by Personality Characteristics and Self-Esteem Kathryn C
    Purdue University Purdue e-Pubs Faculty Publications Department of Computer Information Technology 2016 Differentiating cyberbullies and Internet trolls by personality characteristics and self-esteem Kathryn C. Seigfried-Spellar [email protected] Follow this and additional works at: https://docs.lib.purdue.edu/cit_articles Seigfried-Spellar, Kathryn C., "Differentiating cyberbullies and Internet trolls by personality characteristics and self-esteem" (2016). Faculty Publications. Paper 2. https://docs.lib.purdue.edu/cit_articles/2 This document has been made available through Purdue e-Pubs, a service of the Purdue University Libraries. Please contact [email protected] for additional information. Differentiating Cyberbullies and Internet Trolls… JDFSL V11N3 DIFFERENTIATING CYBERBULLIES AND INTERNET TROLLS BY PERSONALITY CHARAACTERISTICS AND SELF-ESTEEM Lauren A. Zezzulka The University of Alabama Kathryn C. Seigfried-Spellar Purdue University [email protected] (Corresponding Author) ABSTRACT Cyberbullying and internet trolling are both forms of online aggression or cyberharassment; however, research has yet to assess the prevalence of these behaviors in relationship to one another. In addition, the current study was the first to investigate whether individual differences and self-esteem discerned between self-reported cyberbullies and/or internet trolls (i.e., Never engaged in either, Cyberbully-only, Troll-only, Both Cyberbully and Troll). Of 308 respondents solicited from Mechanical Turk, 70 engaged in cyberbulllying behaviors, 20 engaged in only trolling behaviors, 129 self-reported both behaviors, and 89 self-reported neiither behavior. Results yielded low self-esteem, low conscientiousness, and low internal moral values for both cyberbullying and trolling behaviors. However, there were differentiating factors between individuals who only engaged in cyberbullying behaviors (high on neuroticiism) vs.
    [Show full text]
  • Stetson Law Review
    STETSON LAW REVIEW VOLUME 47 FALL 2017 NUMBER 1 ARTICLES Executive Order 13769 and America’s Longstanding Practice of Institutionalized Racial Discrimination Towards Refugees and Asylum Seekers Kaila C. Randolph 1 One of the paradoxes of international human rights law is the international community’s inability to curb xenophobic attitudes resulting in discriminatory regulations that exclude refugees. The United States has an established history of excluding immigrants, particularly refugees, based on national or ethnic origin, masked under national security. After the Civil War and the abolition of slavery, lawmakers sought to control the ethnic composition of the country, by prohibiting the entry of certain ethnic groups. The practice was implemented through racially discriminatory legislation until the Immigration and Nationality Act of 1965. Nonetheless, the federal government continued to exercise racial discrimination through the adjudication of asylum claims. The United States exemplified its present‐day practice of racial exclusion with Executive Order 13769 “Protecting the Nation from Foreign Terrorist Entry into the United States,” which prohibits the admission of Syrian nationals indefinitely and suspends the U.S. Refugee Admissions Program for a minimum of 120 days. Such immigration policies and regulations are a form of institutionalized racial discrimination that violate a refugee’s equal protection and due process rights under the Fifth Amendment and international human rights norms and customs. Although the Ninth Circuit Court of Appeal unanimously stayed the injunction, the appellate court did not review the merits of the case. This Article traces the enduring practice of institutionalized racial discrimination towards refugees in the United States and the illegality of Executive Order 13769 under federal and international law.
    [Show full text]