The Puppet Masters


Book Description

This report examines the use of these entities in nearly all cases of corruption. It builds upon case law, interviews with investigators, corporate registries and financial institutions and a 'mystery shopping' exercise to provide evidence of this criminal practice.




American Jihadist Terrorism: Combating a Complex Threat


Book Description

This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, "homegrown" and "domestic" are terms that describe terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. It also outlines actions underway to build trust and partnership between community groups and government agencies and the tensions that may occur between law enforcement and engagement activities.




Beyond the Water's Edge


Book Description

This report assesses domestic political support for internationalist foreign policy by analyzing the motivations of members of Congress on key foreign policy issues. It includes case studies on major foreign policy debates in recent years, including the use of force, foreign aid, trade policy and U.S.-Russia relations. It also develops a new series of archetypes for describing the foreign policy worldviews of members of the 115th Congress to replace the current stale and unsophisticated labels of internationalist, isolationist, hawk and dove. Report findings emphasize areas of bipartisan cooperation on foreign policy issues given member ideologies.




Configuring the Networked Self


Book Description

The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.




Understanding Cyber Conflict


Book Description

Written by leading scholars, the fourteen case studies in this volume will help policymakers, scholars, and students make sense of contemporary cyber conflict through historical analogies to past military-technological problems.







US Environmental Policy in Action


Book Description

US Environmental Policy in Action provides a comprehensive look at the creation, implementation, and evaluation of environmental policy, which is of particular importance in our current era of congressional gridlock, increasing partisan rhetoric, and escalating debates about federal/state relations. Now in its second edition, this volume includes updated case studies, two new chapters on food policy and natural resource policy, and revised public opinion data. With a continued focus on the front lines of environmental policy, Rinfret and Pautz take into account the major changes in the practice of US environmental policy during the Trump administration. Providing real-life examples of how environmental policy works rather than solely discussing how congressional action produces environmental laws, US Environmental Policy in Action offers a practical approach to understanding contemporary American environmental policy.