Security vs. Liberty : The Other War. (2007, April). Retrieved from America at a Crossroads: http://www.pbs.org/weta/crossroads/about/show_security_vs_liberty.htm Shipler, D. K. (2011). Our Vanished Civil Liberties. The Nation, 11.
17, No.1, pp.1-5. http://web.ebscohost.com.ezproxy.lib.monash.edu.au/ehost/pdfviewer/pdfviewer?vid=4&sid=a1299507-6b69-40db-aa10-bad33b8bbafd%40, Last accessed 26 March 2013. * Primoratz, I, "Terrorism", The Stanford Encyclopedia of Philosophy (Fall 2011 Edition), Edward N. Zalta (ed. ), http://plato.stanford.edu/archives/fall2011/entries/terrorism, last accessed 25 March 2013. * Spaaij R 2011, “Understanding lone wolf terrorism: Global patterns, motivations and prevention”, 2nd edn, Springer, New
Works Cited hunt, alexander. oct 2005. Craft Mod 2 * George W. Bush Annotated Bibliography Hunt, Alexander email@example.com Tuesday, 04 Oct 2005 22:14:12-0500 Iran: “Bush, Schroeder Exchange Views on Iran’s Nuclear Program” States News Service. 27 June 2005 The article states the unacceptable of Iran to develop nuclear weapons. He and the international community agree to attempt to stop nuclear development in unstable countries.
REFERENCES Jackson, Andrew R.W., and Julie Jackson. Forensic Science. Harlow, England: Pearson, 2004 Lyle, Douglas. Forensics for Dummies. Hoboken, N.J., Wiley, 2004 WEB SITES The Innocence Project.
14 January 2008. Retrieved 30 March 2008. 12.Jump up ^ "Hospital deep clean target missed". BBC News. 29 March 2008.
London, GBR: Routledge, 1996. p 4. http://www.site.ebrary.com/lib/ashford/Doc?id=10058083&ppg=13 Summary of the PATRIOT Act. (n.d). Retrieved on September 23, 2012 from http://www.discoverthenetworks.org/guideDesc.asp?catid=101&type=issue The Library of Congress Thomas. (2001). H.R.3162 Bill Summary & Status 107th Congress (2001 - 2002).
Philadelphia: University of Pennsyvania Press, 2004. Sheehan, Michael A. Crush The Cell: How to defeat Terrorism Without Terrorizing Ourselves. New York: Crown Publishers, 2008. Siegel, Larry J. Essentials of Criminal Justice, Sixth Edition. Belmont: Wadsworth Cengage Learning, 2009.
In addition presidential power was increased again with the ability to wage war being transferred from congress to the presidency. This growing presidential power was highlighted when “Nixon and John Mitchell, using national security as a justification, set up a secrete White House posse to burglarize officers, forge historical documents, and wiretap officials, embassies, newspapermen, and enemies”. The author also makes the argument that resurgent presidential power is based on the selection of the attorney general who over time has been the one to concoct or drum up support for war. Schlesigner then goes on to make the argument that just before George W. Bush took office the power of the “imperial president” was at an all time low and sets up the argument that George W. Bush expanded the presidential power and implemented an imperial presidency like no other before him had. The author argues that president Bush expanded presidential power and secrecy by narrowing the scope of the Presidential Records Act by issuing an executive order that would allow him to cancel the release of documents that the previous administration had made releasable.