A Failure of Initiative


Book Description




The Puppet Masters


Book Description

This report examines the use of these entities in nearly all cases of corruption. It builds upon case law, interviews with investigators, corporate registries and financial institutions and a 'mystery shopping' exercise to provide evidence of this criminal practice.




American Jihadist Terrorism: Combating a Complex Threat


Book Description

This report describes homegrown violent jihadists and the plots and attacks that have occurred since 9/11. For this report, "homegrown" and "domestic" are terms that describe terrorist activity or plots perpetrated within the United States or abroad by American citizens, legal permanent residents, or visitors radicalized largely within the United States. The report also discusses the radicalization process and the forces driving violent extremist activity. It analyzes post-9/11 domestic jihadist terrorism and describes law enforcement and intelligence efforts to combat terrorism and the challenges associated with those efforts. It also outlines actions underway to build trust and partnership between community groups and government agencies and the tensions that may occur between law enforcement and engagement activities.




Configuring the Networked Self


Book Description

The legal and technical rules governing flows of information are out of balance, argues Julie E. Cohen in this original analysis of information law and policy. Flows of cultural and technical information are overly restricted, while flows of personal information often are not restricted at all. The author investigates the institutional forces shaping the emerging information society and the contradictions between those forces and the ways that people use information and information technologies in their everyday lives. She then proposes legal principles to ensure that people have ample room for cultural and material participation as well as greater control over the boundary conditions that govern flows of information to, from, and about them.




Patent Litigation and Strategy


Book Description

This book sets out governing statutes and rules at the beginning of each chapter and includes sample litigation documents where possible. The casebook begins with discussions of who to sue, where to sue, pleading requirements, discovery, and trial strategy. It then moves into substantive legal issues. The Third Edition includes new material on pharmaceutical litigation under the Hatch-Waxman Act and the most developments in the law of invalidity and infringement. The book next addresses issues surrounding remedies, including injunctive relief (with a discussion of the Supreme Court's eBay decision), contempt proceedings, and damages. Also included are post-trial matters including jury instructions, special verdict forms, the preclusive effect of final judgments, judgment as a matter of law, and new trial motions. Finally, the book covers the appeal process and reexamination and reissue proceedings.




The Domestic Terrorist Threat


Book Description

The emphasis of counterterrorism policy in the United States since Al Qaeda's attacks of September 11, 2001 (9/11) has been on jihadist terrorism. However, in the last decade, domestic terrorists-people who commit crimes within the homeland and draw inspiration from U.S.-based extremist ideologies and movements-have killed American citizens and damaged property across the country. Not all of these criminals have been prosecuted under terrorism statutes. This latter point is not meant to imply that domestic terrorists should be taken any less seriously than other terrorists.




The Economic Outlook


Book Description




The Economic Outlook


Book Description







The Economic Outlook at Midyear


Book Description