Severn House Paperbacks Spring 2021

Total Page:16

File Type:pdf, Size:1020Kb

Severn House Paperbacks Spring 2021 SEVERN HOUSE PUBLISHERS Hitmen I Have Known Bill James In the 35th installment of the popular Harpur and Iles police procedural series, tensions in the community are mounting following the gruesome deaths of two men. Alarmingly, suspicion falls on Assistant Chief Constable Iles. He seems at ease with the accusations, as are his superiors in the police f... Summary Assistant Chief Constable Iles finds himself suspected of murder in the fast-paced 35th installment of the popular Harpur and Iles police procedural series. Tensions in the community are mounting following the gruesome deaths of two men, both of whom were accused yet acquitted of the murder of an undercover police officer. It looks like vigilante justice, but who is responsible? Alarmingly, suspicion falls on Assistant Chief Constable Iles. Severn House Publishers 9781847519900 Matters escalate when a TV show investigating the murders is aired, further implicating Iles. Iles seems at Pub Date: 1/26/21 ease with the accusations, as are his superiors in the police force. But others are not feeling so secure. $17.95 USD/$19.95 CAD Trade Paperback Local crime bosses Ralph Ember and Mansel Shale fear reprisals against Iles will result in their own businesses 192 Pages Carton Qty: 38 suffering. And so they begin to plan how to remove potential troublemakers from their path . Fiction / Mystery & Detective Contributor Bio FIC022020 Critically acclaimed crime writer Bill James is a former journalist who wrote for The Sunday Times, Daily Series: A Harpur and Iles Mirror, Spectator, New Review and Punch. Married with four children, he lives in Wales. Mystery 8.7 in H | 5.6 in W Dreams of Fear Hilary Bonner When routine police enquiries reveal evidence indicating that Jane Ferguson’s assumed suicide was actually a murder, her husband becomes the chief suspect. Called in to launch a major inquiry, Detective Inspector David Vogel discovers that nothing connected with the death is as it seems, uncovering ... Summary A young mother’s death leads Bristol detective David Vogel to uncover a shocking series of family secrets stretching back 30 years. Jane Ferguson suffers from horrific nightmares which she claims not to be able to explain. And when her traumatised 6-year-old daughter finds Jane dead, hanging by the neck in the hallway of the family’s seaside home, it is assumed she took her own life. Severn House Publishers 9781780296531 But routine police enquiries reveal evidence indicating that Jane has been murdered, and her businessman Pub Date: 1/26/21 husband Felix, commodore of the local yacht club, becomes the chief suspect. $17.95 USD/$19.95 CAD Trade Paperback Called in to launch a major inquiry, Detective Inspector David Vogel discovers that nothing connected with 256 Pages Jane Ferguson’s death is as it seems. Gradually, he uncovers a deeply disturbing story involving a succession Carton Qty: 28 Fiction / Mystery & of shocking family secrets stretching back over three decades. Detective FIC022020 Contributor Bio Series: A David Vogel Hilary Bonner is the author of fourteen previous crime novels and five non-fiction books. A past Chair of the Mystery Crime Writers' Association, she divides her time between Somerset and London. 8.7 in H | 5.6 in W Severn House Jan-June '21 Paperback - Page 1 SEVERN HOUSE PUBLISHERS Black Cage, The Jack Fredrickson Exposing a botched murder investigation has left Milo Rigg's reputation and career as a crime-reporting journalist in tatters. But then a second case turns up months later, with disturbing similarities. Are the two cases linked, and could this be Milo's chance to right the wrongs of the past and unc... Summary Crime reporter Milo Rigg must uncover a brutal serial killer to restore his battered reputation in this first in a gripping new mystery series. Exposing the botched murder investigation of three young boys has left Milo Rigg's reputation and career as a crime-reporting journalist in tatters. But when the naked, frozen bodies of two young sisters, Priscilla and Beatrice Graves, are found down a ravine in Chicago months later, there are disturbing similarities. Are the Severn House Publishers two cases linked, and could this be Milo's chance to right the wrongs of the past? 9781780296579 Pub Date: 1/26/21 Restored to his former reporter role, Milo is back – and he’s asking uncomfortable questions again. Confronted $17.95 USD/$19.95 CAD Trade Paperback with deception and corruption at every turn, can Milo uncover the identity of a ruthless serial killer and finally rid himself of the black cage that threatens to consume him? 224 Pages Carton Qty: 32 Fiction / Mystery & Contributor Bio Detective Jack Fredrickson lives with his wife, Susan, west of Chicago. He is the author of seven Dek Elstrom PI FIC022100 mysteries, the first of which, A Safe Place for Dying, was nominated for the Shamus Award for Best First Series: A Milo Rigg mystery Novel, and one standalone, Silence the Dead. 8.7 in H | 5.6 in W Death and the Chevalier Robin Blake Lancashire, 1745. The Young Pretender is marching south to claim the English throne. Meanwhile, Coroner Titus Cragg searches for the head belonging to a decapitated body found in a pond. As simmering tensions split the town, Cragg finds himself arrested for murder, and must team up with his old frie... Summary As the Young Pretender and his Jacobite army approach, Coroner Titus Cragg must solve a brutal murder – and prevent himself being executed for the crime. November, 1745. Preston, Lancashire. Rumours abound that Charles Edward Stuart, the Young Pretender, has landed in Scotland, intent on marching south to claim the English throne. Meanwhile Coroner Titus Cragg must investigate a headless body discovered in an icy pond. There is evidence to suggest a connection with Severn House Publishers the approaching rebel army – unless someone is deliberately using the Highlanders’ invasion as a cover for 9781780296722 murder. Pub Date: 1/26/21 $17.95 USD/$19.95 CAD Trade Paperback As simmering tensions, conflicting loyalties and open hostilities engulf the town, Cragg finds himself arrested for murder. In order to clear his name and escape execution by firing squad, Titus must team up with his old 288 Pages friend, Dr Luke Fidelis, to expose the real killer. Carton Qty: 26 Fiction / Mystery & Detective Contributor Bio FIC022060 Robin Blake is the author of five previous Cragg & Fidelis mysteries, as well as acclaimed works on the Series: A Cragg and Fidelis artists Van Dyke and Stubbs. He has written, produced and presented extensively for radio, and is widely Mystery published as a critic. He lives in London. 8.7 in H | 5.6 in W Severn House Jan-June '21 Paperback - Page 2 SEVERN HOUSE PUBLISHERS Mr Campion's Seance Mike Ripley 1946, London. The crime at the heart of The Bottle Party Murder, the new detective novel from Albert Campion’s godsibling Evadne Childe, bears several striking similarities to a real, recent and unsolved murder in Soho. But Evadne wrote the book before the murder occurred – so is it just a weird coi... Summary The truth is stranger than fiction for Albert Campion in this gripping mystery where murder, detective novels and the supernatural collide. 1946, London. The eagerly anticipated new detective novel from Albert Campion’s godsibling, bestselling author Evadne Childe, is proving to be another runaway success. Unfortunately, it has also caught the attention of Superintendent Stanislaus Oates for reasons that go beyond its superior plotting. Severn House Publishers 9781780297101 The crime at the heart of The Bottle Party Murder bears a number of striking similarities to a very real, recent Pub Date: 1/26/21 and unsolved murder at the Grafton Club in Soho. Evadne wrote the book before the murder occurred, yet $17.95 USD/$19.95 CAD Trade Paperback predicts it remarkably accurately – is it just a weird coincidence, is Evadne getting her information from ‘the other side’, or is something more sinister afoot? 272 Pages Carton Qty: 20 Fiction / Mystery & The repercussions of this extraordinary and complex case will reach out over the next fifteen years, drawing Detective in three of Mr Campion’s favourite policemen – Oates, Yeo and Luke – before finally coming to its violent FIC022060 conclusion in 1962. Series: An Albert Campion Mystery Contributor Bio 8.7 in H | 5.6 in W Mike Ripley has twice won the Crime Writers' Association's Last Laugh Award, and is the author of twenty-four comedy thrillers and historical novels. He writes a hugely respected monthly review column for Shots Magazine entitled Getting Away With Murder and is also the author of Kiss Kiss Bang Bang, a 'reader's history' of the heyday of British action and spy thrillers, 1953-75, which won the H.R.F. Keating Award for non-fiction in 2017. Hold Your Breath, China Xiaolong Qiu Chief Inspector Chen is assigned to investigate a group of environmental activists trying to tackle the pollution issues in China. The case is supposed to be simple, but it is complicated by Chen having history with the leader of the group. Meanwhile Detective Yu is on the trail of a serial murderer... Summary Inspector Chen is on the case of a serial murderer when he is called away to report on environmentalists trying to tackle the pollution issues in China. Chief Inspector Chen and Detective Yu Guangming are brought into a serial murder case when the Homicide squad proves incapable of solving it. But before Chen can make a start, he is called away by a high-ranking Party member for a special assignment: to infiltrate a group of environmental activists meeting to discuss the Severn House Publishers pollution levels in the country and how to prompt the government into action.
Recommended publications
  • Counter-Terrorism 1 Counter-Terrorism
    Counter-terrorism 1 Counter-terrorism WARNING: Article could not be rendered - ouputting plain text. Potential causes of the problem are: (a) a bug in the pdf-writer software (b) problematic Mediawiki markup (c) table is too wide United States Coast GuardCoast Guard on counter-terrorism patrol in Upper New York Bay. Verrazano-Narrows Bridge in distance spanning The Narrows between Brooklyn (left) and Staten Island (right).TerrorismDefinitions of terrorismDefinitionsHistory of terrorismHistoryList of terrorist incidentsIncidents Counter-terrorism (also spelled counterterrorism) incorporates the practices, Military tacticstactics, techniques, and strategies that governments, militarymilitaries, police departments and corporations adopt to attack terrorist threats and/or acts, both real and imputed.The tactic of terrorism is available to insurgencyinsurgents and governments. Not all insurgents use Fearterror as a tactic, and some choose not to use it because other tactics work better for them in a particular context. Individuals, such as Timothy McVeigh, may also engage in terrorist acts such as the Oklahoma City bombing. If the terrorism is part of a broader insurgency, counter-terrorism may also form a part of a counter-insurgency doctrine, but political, economic, and other measures may focus more on the insurgency than the specific acts of terror. Foreign internal defense (FID) is a term used for programs either to suppress insurgency, or reduce the conditions under which insurgency could develop. Counter-terrorism includes both the detection of potential acts and the response to related events. PlanningUnited States Customs and Border Protection officers, fully armed and armored for a counter-terrorism operationMost counter-terrorism strategies involve an increase in standard police and domestic intelligence.
    [Show full text]
  • 1 Ethics of Nuclear Weapons and National Security Intelligence
    1 Ethics of Nuclear Weapons and National Security Intelligence Michael Andregg, University of St. Thomas in St. Paul, MN, USA, [email protected] for Presentation to the International Ethics Section of the ISA, San Francisco, April 6, 2013 Introduction From the beginning of the nuclear age there have been fears that we may have invented a weapon that will destroy us all. J. Robert Oppenheimer, who helped build the first fission bombs, commented often on this (1). Albert Einstein, whose letter to then President Franklin Roosevelt helped convince him to fund them, talked about the imperative to seek peace and new ways of thinking about everything as he neared death (2). Bertrand Russell coauthored a Manifesto with Einstein (and nine others) to warn the world that everything had changed (3). Yet thousands of thoughtful people still felt compelled by the urgencies of World War II to make nuclear weapons and to use two of them against other human beings. To end the war, they said to each other, and perhaps to show the Soviets who would be the big dog following. But then what? Another arms race had begun, and bigger, badder WMDs would be developed soon. As soon as more than one nation had nuclear weapons, some strategy had to be conceived for their use. Mutual Assured Destruction was the main result, and millions learned the irony of a “MAD” strategy, where safety was to be assured by capabilities and declared will to destroy human civilization if we were frightened enough by any enemy. Those we terrified produced similar weapons and strategies.
    [Show full text]
  • Book Reviews
    Journal of Strategic Security Volume 3 Number 1 Volume 3, No. 1: March 2010 Article 8 Book Reviews Timothy Hsia Sheldon Greaves Donald J. Goldstein Henley-Putnam University Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 71-78 Recommended Citation Hsia, Timothy; Greaves, Sheldon; and Goldstein, Donald J.. "Book Reviews." Journal of Strategic Security 3, no. 1 (2010) : 71-78. DOI: http://dx.doi.org/10.5038/1944-0472.3.1.7 Available at: https://scholarcommons.usf.edu/jss/vol3/iss1/8 This Book Review is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Book Reviews This book review is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/ vol3/iss1/8 Hsia et al.: Book Reviews Book Reviews The History of Camp Tracy: Japanese WWII POWs and the Future of Strategic Interrogation. By Alexander D. Corbin. Fort Belvoir, VA: Ziedon Press, 2009. ISBN: 978-0-578-02979- 5. Maps. Photographs. Notes. Bibliography. Index. Pp. 189. $15.95. The History of Camp Tracy, which received the Joint Chiefs of Staff His- tory Office's Fleet Admiral Chester W. Nimitz Archival Research Award, is an illuminating and educating read. The book is written by Alexander Corbin, an intelligence officer in the U.S.
    [Show full text]
  • Carleton University Winter 2000
    Carleton University Winter 2012 Department of Political Science PSCI 4008B NATIONAL SECURITY AND INTELLIGENCE IN THE MODERN STATE Tuesday 14:35 - 17:25 Please confirm location on Carleton Central Instructor: A. Bartley Office: B643 Loeb Building E-mail: [email protected] Office Hours: 5:30-6:00 p.m. Tuesday Phone: 613 520-2600 x 3214 (no voicemail) (or by appointment) Course Description: This is primarily a research seminar where students examine issues of national security and intelligence in the modern, democratic state. The course is designed to provide an overview of the intelligence process, the role of intelligence in government and the management of intelligence policy in democratic societies. The course has five themes: the nature and structure of the intelligence process, the role of intelligence in national security, a survey of intelligence institutions in modern democracies, the instruments and institutions modern states use to manage their intelligence communities and the evolving threat environment. There will be reference to current issues in intelligence and national security including: intelligence theory and practice, intelligence policy development, terrorism and law enforcement, individual privacy, human rights and state rights. Requirements: The major course requirement is a critical essay examining one specific issue or concept related to topics raised in lectures or readings. Essay proposals are to be submitted in writing (maximum 400 words) not later than Tuesday, Feb. 14. Proposals will be graded and returned at the next class. The essay is to be a maximum 25 pages in length (double-spaced, using a generally accepted scholarly style). Papers are due not later than 4 p.m., Tuesday, April 3.
    [Show full text]
  • Can Technology Prevent Leaks?
    CAN TECHNOLOGY PREVENT LEAKS? Nathan Alexander Sales* The past decade has witnessed an unprecedented explosion in leak prosecutions. Since 2005, the government has charged leakers with violating the Espionage Act of 1917—which makes it a crime for government employees to reveal national defense information to persons not entitled to receive it1—ten times, including no fewer than nine prosecutions since President Obama took office in 2009. This prosecutorial surge stands in sharp contrast to the two Espionage Act cases brought in three quarters of a century after Congress enacted that World War I-era statute. Yet this dramatic jump in prosecutions does not appear to have corresponded with a comparably dramatic decline in the number of leaks that have occurred or in their severity. Government officials at all levels continue to reveal highly classified information routinely, from the senior administration officials who disclosed President Obama’s personal role in selecting targets for drone strikes to low-level employees like Bradley (now Chelsea) Manning and Edward Snowden who exfiltrated huge troves of diplomatic, military, and intelligence documents. “[L]eaking classified information occurs so regularly in Washington” that it has become “a routine method of communication about government.”2 Why? Part of the answer, I think, is that criminal prohibitions on leaking are fairly modest deterrents, especially for ideologically motivated leakers who seek to disclose large tranches of classified documents. The law attempts to deter undesirable conduct through commands backed by threats of punishment; the greater the magnitude of the sanctions, and the greater the probability those sanctions will be imposed, the less likely it is that people will commit the proscribed offense.
    [Show full text]
  • Journal of Strategic Security
    JOURNAL OF STRATEGIC SECURITY Vol. III, No. 1 March 2010 Editor Jeremy Tamsett, M.A. Associate Editors Gary Ackerman, M.A. Randy Borum, Ph.D. Monte Bullard, Ph.D. Denise Greaves, Ph.D. Edward J. Hagerty, Ph.D. Tom Hunter, M.A, M.Litt. Kim Lewis, M.I.M. Vincent Pollard, Ph.D. Ed Urie, M.S. Published Quarterly by Henley-Putnam University Press www.henley-putnam.edu Copyright © 2010 by Henley-Putnam University All rights reserved. No part of this publication shall be reproduced, stored in a retrieval system, or transmitted by any means electronic, mechanical, photocopying, recording, or otherwise without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every precaution has been taken in the preparation of this publication, the publisher and author(s) assume no responsibility for errors or omissions. Neither is any liability assumed for damages resulting from the use of the information contained herein. Paperback ISSN: 1944-0464 eBook ISSN: 1944-0472 Warning and Disclaimer Every effort has been made to make this publication as complete and as accurate as possible, but no warranty of fitness is implied. The informa- tion provided is on an "as is" basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this publication. ii Editorial Advisory Board Major General Craig Bambrough, USA (ret.) Dr. Donald Goldstein, Institute for Defense Analyses Dr. Richard J. Kilroy Jr., Virginia Military Institute Dr.
    [Show full text]
  • Introduction to Intelligence
    COURSE OUTLINE INTRODUCTION TO INTELLIGENCE Teacher: David CHUTER Academic year 2018/2019: Paris School of International Affairs – Fall Semester BIOGRAPHICAL INFORMATION David Chuter spent more than thirty years in two governments, international organizations and think-tanks. A specialist in international issues, he has been involved in defence and security issues around the world. His last job was as Special Adviser to the Policy Director of the French Ministry of Defence from 2005 to 2008. After that job he took early retirement to become an independent author, lecturer and consultant, based in Paris. He is the author of four books and many articles, on subjects ranging from the organization of the security sector to African security issues, transitional justice and the relationship between security and development. COURSE OUTLINE Session 1: (title) Introduction: what intelligence is and why it matters Recommended readings: Two good general introductions by former government officials are: • Michael Herman, Intelligence Power in Peace and War, Cambridge University Press, 1996 • David Omand, Securing the State, C Hurst, 2010 • A short but useful discussion of definitions by a distinguished intelligence historian is Michael Warner, “Wanted: A definition of ‘intelligence’ “ Studies in Intelligence, Vol 46, No 3, (2002) • Christopher Andrew, Richard J. Aldrich and Wesley K. Wark (eds), Secret Intelligence: A Reader, Routledge 2008, brings together a large number of essays on intelligence-related subjects. The essays are of varying quality, and some are too focused on Anglo-American style intelligence issues, but a number are of considerable value. All the essays were published elsewhere, and, where cited here, are given first with their original publication details.
    [Show full text]
  • Prepublication Review in the Intelligence Community
    TILL DEATH DO US PART: PREPUBLICATION REVIEW IN THE INTELLIGENCE COMMUNITY Kevin Casey* As a condition of access to classified information, most employees of the U.S. intelligence community are required to sign nondisclosure agreements that mandate lifetime prepublication review. In essence, these agreements require employees to submit any works that discuss their experiences working in the intelligence community---whether writ- ten or oral, fiction or nonfiction---to their respective agencies and receive approval before seeking publication. Though these agreements constitute an exercise of prior restraint, the Supreme Court has held them constitu- tional. This Note does not argue fororagainsttheconstitutionality of prepublication review; instead, it explores how prepublication review is actually practiced by agencies and concludes that thecurrentsystem, which lacks executive-branch-wide guidance, grants too much discretion to individual agencies. It compares the policies of individual agencies with the experiences of actual authors who have clashed with prepublication-review boards to argue that agencies conduct review in a manner that is inconsistent at best, and downright biased and discriminatory at worst. The level of secrecy shrouding intelligence agencies and the concomitant dearth of publicly available information about their activi- ties make it difcult to evaluate their performance and, by extension, the performance of our electedofcials in overseeing such activities. In such circumstances, memoirs and other forms of expression
    [Show full text]
  • Fixing Leaks Assessing the Department of Defense’S Approach to Preventing and Deterring Unauthorized Disclosures
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Defense Research Institute View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This report is part of the RAND Corporation research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for re- search quality and objectivity. JAMES B. BRUCE ■ W. GEORGE JAMESON FIXING LEAKS ASSESSING THE DEPARTMENT OF DEFENSE’S APPROACH TO PREVENTING AND DETERRING UNAUTHORIZED DISCLOSURES C O R P O R A T I O N NATIONAL DEFENSE RESEARCH INSTITUTE FIXING LEAKS ASSESSING THE DEPARTMENT OF DEFENSE’S APPROACH TO PREVENTING AND DETERRING UNAUTHORIZED DISCLOSURES JAMES B.
    [Show full text]
  • Volume 5, Issue 2 (Fall/Winter 2017) Isbn-13: 978-0-692-11069-0 Isbn-10: 0-692-11069-0 Articles
    TM VOLUME 5 ISSUE 2 FALL/WINTER 2017 National Security Law Journal Antonin Scalia Law School George Mason University 3301 Fairfax Drive Arlington, VA 22201 www.nslj.org © 2017 National Security Law Journal. All rights reserved. Library of Congress Publication Data (Serial) ‪National Security Law Journal. ‪‪Arlington, Va. : National Security Law Journal, 2013-‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪ ‪ K14 .N18 ‪ ‪‪ISSN: ‪2373-8464‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪‪ ‪ Variant title: NSLJ National security—Law and legislation—Periodicals LC control no. 2014202997 (http://lccn.loc.gov/2014202997) Past issues available in print at the Law Library Reading Room of the Library of Congress (Madison, LM201). VOLUME 5, ISSUE 2 (FALL/WINTER 2017) ISBN-13: 978-0-692-11069-0 ISBN-10: 0-692-11069-0 ARTICLES REFORM OF THE INTELLIGENCE COMMUNITY PREPUBLICATION REVIEW PROCESS: BALANCING FIRST AMENDMENT RIGHTS AND NATIONAL SECURITY INTERESTS Christopher E. Bailey MULTIPLE PRINCIPALS AND THE (LACK OF) INTELLIGENCE OVERSIGHT Tobias T. Gibson COMMENTS THE KATZ OUTTA THE BAG: BRINGING NATIONAL SECURITY LETTERS INTO COMPLIANCE WITH THE “REASONABLE EXPECTATION OF PRIVACY” TEST Anees Mokhiber OUR ALLIES HAVE RIGHTS, TOO: JUDICIAL DEPARTURE FROM IN PERSONAM CASE LAW TO INTERFERENCE IN INTERNATIONAL POLITICS Laura J. Rosenberger VOLUME 5 FALL/WINTER 2017 ISSUE 2 PUBLISHED BY THE ANTONIN SCALIA LAW SCHOOL AT GEORGE MASON UNIVERSITY Cite as 5 NAT’L SEC. L.J. ___ (2017). The National Security Law Journal (“NSLJ”) is a student-edited legal periodical published twice annually at George Mason University School of Law in Arlington, Virginia. We print timely, insightful scholarship on pressing matters that further the dynamic field of national security law, including topics relating to foreign affairs, homeland security, intelligence, and national defense.
    [Show full text]
  • ALA Denounces Library Destruction at Occupy Wall Street
    Editor: Henry Reichman, California State University, East Bay Founding Editor: Judith F. Krug (1940–2009) Publisher: Barbara Jones Office for Intellectual Freedom, American Library Association ISSN 0028-9485 January 2012 Vol. LXI No. 1 www.ala.org/nif The American Library Association has denounced the destruction of books at a library established by Occupy Wall Street demonstrators when New York police raided a park where protesters were staying. The People’s Library, a library constructed by the New York Occupy Wall Street move- ment, was seized in the early morning hours of November 15 by the New York Police Department during a planned raid to evict Occupy Wall Street protesters from Zuccotti Park. The library held a collection of more than 5,000 items and provided free access ALA to books, magazines, newspapers and other materials. According to ALA members who visited the site, the library reflected many of ALA’s core intellectual freedom values and denounces best practices—a balanced, cataloged collection, representing diverse points of view, that included children’s books and reference service often provided by professional librarians library “The dissolution of a library is unacceptable,” said a statement by ALA President Molly Raphael. “Libraries serve as the cornerstone of our democracy and must be safeguarded.” destruction at During what the New York Police Department described as a temporary cleaning of Zuccotti Park, the library was torn down in the dark of night and its books, laptops, Occupy Wall archives, and support materials were thrown into dumpsters by armed police and city sani- tation workers. Numerous library staff were arrested, and, in one case, a librarian strapped the notebooks of original poetry from the library’s poetry readings to her body before Street lending aid to others who had been pepper-sprayed.
    [Show full text]
  • Terrorism Histori City and Counter-Terrorism Policy of India
    www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 Volume-7, Issue-2, March-April 2017 International Journal of Engineering and Management Research Page Number: 613-618 Terrorism Histori City and Counter-Terrorism Policy of India Dr. Jai Kumar Saroha Associate Professor, Department of Political Science, S D (PG) College, Ghaziabad, INDIA ABSTRACT psychic fear (sometimes indiscriminate) through the Terrorism is an international problem in today’s violent victimization and destruction of noncombatant global community. Many nations are affected, whether targets (sometimes iconic symbols). Such acts are meant to directly or indirectly. Most nations oppose terrorism, while send a message from an illicit clandestine organization. others condone or even support active, brutal terrorism and The purpose of terrorism is to exploit the media in order to terrorist groups. achieve maximum attainable publicity as an amplifying Terrorism is defined by the US State Department to contain four elements. The first is a threat of violence or an force multiplier in order to influence the targeted act of violence. Next is a political objective. Third is that audience(s) in order to reach short- and midterm political violence and threat of violence is a direct attack on civilians goals and/or desired long-term end states. making civilians a primary target. Lastly, it is perpetrated by "Terrorism" comes from the French a supporting a nation or nations of terrorism. word terrorisme, and originally referred specifically to state terrorism as practiced by the French government Keywords-- supporting, automatically, amplifying during the 1793–1794 Reign of Terror. The French word terrorisme in turn derives from the Latin verb terrere (e, terreo) meaning "to I.
    [Show full text]