Reauthorization and improvement of DNA initiatives of the Justice for All Act of 2004 : hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Tenth Congress, second session, April 10, 2008.
Two New York Times Washington correspondents provide a detailed, “fact-based account of what precipitated some of this administration’s more brazen assaults on immigration” (The Washington Post) filled with never-before-told stories of this key issue of Donald Trump’s presidency. No issue matters more to Donald Trump and his administration than restricting immigration. Julie Hirschfeld Davis and Michael D. Shear have covered the Trump administration from its earliest days. In Border Wars, they take us inside the White House to document how Stephen Miller and other anti-immigration officials blocked asylum-seekers and refugees, separated families, threatened deportation, and sought to erode the longstanding bipartisan consensus that immigration and immigrants make positive contributions to America. Their revelation of Trump’s desire for a border moat filled with alligators made national news. As the authors reveal, Trump has used immigration to stoke fears (“the caravan”), attack Democrats and the courts, and distract from negative news and political difficulties. As he seeks reelection in 2020, Trump has elevated immigration in the imaginations of many Americans into a national crisis. Border Wars identifies the players behind Trump’s anti-immigration policies, showing how they planned, stumbled and fought their way toward changes that have further polarized the nation. “[Davis and Shear’s] exquisitely reported Border Wars reveals the shattering horror of the moment, [and] the mercurial unreliability and instability of the president” (The New York Times Book Review).
The expansion of world trade has brought with it an explosive growth in counterfeit merchandise. Estimates put the world total for counterfeit products at about one half trillion dollars annually, although it is impossible to accurately determine the true size of the counterfeit market. What is known is that this illicit trade has infected nearly every industry from pharmaceuticals to aircraft parts. Software and music piracy are easy targets widely reported in the media. In 2007, the Business Software Alliance (BSA) estimated that 38% of personal computer software installed worldwide was illegal and the losses to the software industry were $48 billion worldwide. The Recording Industry Association of America (RIAA) reported a 58% increase in the seizures of counterfeit CDs. Overall, a wide range of industries agree that there is a severe problem with the protection of intellectual property rights (IPR) throughout the world, yet there have been virtually no attempts to describe all aspects of the problem. This work aims to give the most complete description of various characteristics of the IPR environment in a global context. We believe a holistic understanding of the problem must include consumer complicity to purchase counterfeit products, tactics of the counterfeiters (pirates) as well as actions (or inaction) by home and host governments, and the role of international organizations and industry alliances. This book establishes the full environmental aspects of piracy, describes successful anti-counterfeiting actions and then prescribes measures IPR owners should take to protect their intellectual property.
The author was nominated as Assistant Attorney General for Civil Rights, but after critics from the right labelled her the "Quota Queen," the president not only withdrew his nomination but refused to allow her an opportunity to defend herself. Now she writes about what really happened behind closed doors, about the nation's racial history and commitment to equality and democracy, and about the courage of "ordinary" people.
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.