Works matching DE "TERRORISM investigation"
Results: 30
Framing an Alleged Terrorist: How Four Australian News Media Organizations Framed the Dr. Mohamed Haneef Case.
- Published in:
- Journal of Media & Religion, 2012, v. 11, n. 2, p. 91, doi. 10.1080/15348423.2012.688667
- By:
- Publication type:
- Article
The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps.
- Published in:
- Mobile Networks & Applications, 2017, v. 22, n. 2, p. 240, doi. 10.1007/s11036-016-0791-8
- By:
- Publication type:
- Article
PREVENTING THE NEW INTERNMENT: A SECURITY-SENSITIVE STANDARD FOR EQUAL PROTECTION CLAIMS IN THE POST- 9/11 ERA.
- Published in:
- Texas Journal on Civil Liberties & Civil Rights, 2007, v. 13, n. 1, p. 117
- By:
- Publication type:
- Article
THE LEGALITY OF THE NSA WIRETAPPING PROGRAM.
- Published in:
- Texas Journal on Civil Liberties & Civil Rights, 2006, v. 12, n. 1/2, p. 1
- By:
- Publication type:
- Article
The Laws on Providing Material Support to Terrorist Organizations: The Erosion of Constitutional Rights or a Legitimate Tool for Preventing Terrorism?
- Published in:
- Texas Journal on Civil Liberties & Civil Rights, 2003, v. 9, n. 1, p. 45
- By:
- Publication type:
- Article
MATERIAL WITNESS DETENTION IN A POST-9/1 WORLD: MISSION CREEP OR FRESH START?
- Published in:
- George Mason Law Review, 2010, v. 18, n. 1, p. 1
- By:
- Publication type:
- Article
Investigation Finds Dutch Program Aided Terror-Tied Groups.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2018, v. 24, n. 2, p. 7
- Publication type:
- Article
Understanding the Gender Gap in Domestic Terrorism Through Criminal Participation.
- Published in:
- Criminal Justice Policy Review, 2014, v. 25, n. 5, p. 531, doi. 10.1177/0887403413478016
- By:
- Publication type:
- Article
Terrorism Prosecutions in U.S. Federal Court: Exceptions to Constitutional Evidence Rules and the Development of a Cabined Exception for Coerced Confessions.
- Published in:
- Harvard National Security Journal, 2012, v. 4, n. 1, p. 58
- By:
- Publication type:
- Article
A NECESSARY EVIL? TO CREATE NEW EVIL! TORTURE AGAINST SUSPECTED TERRORISTS.
- Published in:
- Law & Justice Review, 2019, v. 10, n. 18, p. 185
- By:
- Publication type:
- Article
Harnessing the Power of the Past? Lord Hoffmann and the Belmarsh Detainees Case.
- Published in:
- Journal of Law & Society, 2005, v. 32, n. 4, p. 534, doi. 10.1111/j.1467-6478.2005.00337.x
- By:
- Publication type:
- Article
Detecting 2014 Northern Iraq Insurgency using night-time light imagery.
- Published in:
- International Journal of Remote Sensing, 2015, v. 36, n. 13, p. 3446, doi. 10.1080/01431161.2015.1059968
- By:
- Publication type:
- Article
Coping with a Nuclearising Iran.
- Published in:
- Survival (0039-6338), 2011, v. 53, n. 6, p. 37, doi. 10.1080/00396338.2011.636513
- By:
- Publication type:
- Article
9/11/11: A Decade of Intelligence.
- Published in:
- Survival (0039-6338), 2011, v. 53, n. 6, p. 5, doi. 10.1080/00396338.2011.636268
- By:
- Publication type:
- Article
Dancing the Two-Step Abroad: Finding a Place for Clean Team Evidence in Article III Courts.
- Published in:
- Columbia Journal of Law & Social Problems, 2014, v. 47, n. 4, p. 453
- By:
- Publication type:
- Article
Does Stop and Search Deter Crime? Evidence From Ten Years of London-wide Data.
- Published in:
- British Journal of Criminology, 2018, v. 58, n. 5, p. 1212, doi. 10.1093/bjc/azx085
- By:
- Publication type:
- Article
Mitterrand and the Terrorist Upsurge.
- Published in:
- Harvard International Review, 1982, v. 5, n. 2, p. 38
- By:
- Publication type:
- Article
TUNISIA – UAE: Female Flyer Row.
- Published in:
- Africa Research Bulletin: Economic, Financial & Technical Series, 2018, v. 54, n. 12, p. 21956B, doi. 10.1111/j.1467-6346.2018.08092.x
- Publication type:
- Article
Social network analysis and counter-terrorism: measures of centrality as an investigative tool.
- Published in:
- Behavioral Sciences of Terrorism & Political Aggression, 2013, v. 5, n. 2, p. 115, doi. 10.1080/19434472.2012.718792
- By:
- Publication type:
- Article
Cross-border terror networks: a social network analysis of the Canada–US border.
- Published in:
- Behavioral Sciences of Terrorism & Political Aggression, 2013, v. 5, n. 2, p. 155, doi. 10.1080/19434472.2012.760105
- By:
- Publication type:
- Article
Detecting significant changes in dark networks.
- Published in:
- Behavioral Sciences of Terrorism & Political Aggression, 2013, v. 5, n. 2, p. 94, doi. 10.1080/19434472.2012.725225
- By:
- Publication type:
- Article
Surveying American State Police Agencies About Lone Wolves, Far-Right Criminality, and Far-Right and Islamic Jihadist Criminal Collaboration.
- Published in:
- Studies in Conflict & Terrorism, 2010, v. 33, n. 11, p. 1019, doi. 10.1080/1057610X.2010.514698
- By:
- Publication type:
- Article
Terrorism in the Former Soviet Union: A Primer, A Puzzle, A Prognosis.
- Published in:
- Studies in Conflict & Terrorism, 1998, v. 21, n. 2, p. 119, doi. 10.1080/10576109808436059
- By:
- Publication type:
- Article
'No Credible Photographic Interest': Photography restrictions and surveillance in a time of terror.
- Published in:
- Philosophy of Photography, 2010, v. 1, n. 2, p. 177, doi. 10.1386/pop.1.2.177_1
- By:
- Publication type:
- Article
Intelligence Reform and Terrorism Prevention Act and the Information Sharing Environment.
- Published in:
- Homeland Defense Journal, 2008, v. 6, n. 2, p. 42
- By:
- Publication type:
- Article
Police legitimacy under the spotlight: media coverage of police performance in the face of a high terrorism threat.
- Published in:
- Journal of Experimental Criminology, 2015, v. 11, n. 1, p. 117, doi. 10.1007/s11292-014-9213-8
- By:
- Publication type:
- Article
EARLY DETECTION OF TERRORIST CAMPAIGNS.
- Published in:
- Forum on Crime & Society, 2004, v. 4, n. 1/2, p. 71
- By:
- Publication type:
- Article
A Nation of Informants: REINING IN POST-9/11 COERCION OF INTELLIGENCE INFORMANTS.
- Published in:
- Brooklyn Law Review, 2018, v. 83, n. 4, p. 1175
- By:
- Publication type:
- Article
An Evidence‐Based Forensic Taxonomy of Windows Phone Communication Apps.
- Published in:
- Journal of Forensic Sciences, 2018, v. 63, n. 3, p. 868, doi. 10.1111/1556-4029.13624
- By:
- Publication type:
- Article
The Forensic Challenge.
- Published in:
- PRISM Security Studies Journal, 2018, v. 7, n. 3, p. 84
- By:
- Publication type:
- Article