You don’t have permission to view the content, please login via HKU Portal
R. v. Delisle 329 NSR (2d) 36 (2012)
You don’t have permission to view the content, please login via HKU Portal
R. v. Khawaja, 2012 SCC 69 (CanLII), [2012] 3 SCR 555
You don’t have permission to view the content, please login via HKU Portal
Bradley P.C Wiffen, “The myth of universal jurisdiction in Canadian Anti-Terrorism Law” 59(1) Criminal law quarterly (Toronto) (2012)
You don’t have permission to view the content, please login via HKU Portal
Reg Whitaker, “The Post-9/11 National Security Regime in Canada: Strengthening Security, Diminishing Accountability” 16(2) Review of Constitutional Studies (2012)
You don’t have permission to view the content, please login via HKU Portal
Kent Roach, “Counter-terrorism in and outside Canada and in and outside the Anti-Terrorism Act’ 16(2) Review of constitutional studies (2012)
You don’t have permission to view the content, please login via HKU Portal
Kevin Walby and Seantel Anaïs, “Communications Security Establishment Canada (CSEC), Structures of Secrecy, and Ministerial Authorization after September 11” 27(3) Canadian journal of law and society (2012)
You don’t have permission to view the content, please login via HKU Portal
Order Establishing a List of Foreign State Supporters of Terrorism (2012)
You don’t have permission to view the content, please login via HKU Portal
Justice for Victims of Terrorism Act (2012)
You don’t have permission to view the content, please login via HKU Portal
Laura K. Donohue, “The Evolution and Jurisprudence of the Foreign Intelligence Surveillance Court and Foreign Intelligence Surveillance Court of Review”, Vol 12(2), Harvard National Security Journal (2021)
You don’t have permission to view the content, please login via HKU Portal
Laura Halonen, “Catch them if you can: compatibility of United Kingdom and United States legislation against financing terrorism with public international law rules on jurisdiction” 26(2) Emory international law review (2012)
You don’t have permission to view the content, please login via HKU Portal
Global Anti-Terrorism Law and Policy (2nd Edition)
You don’t have permission to view the content, please login via HKU Portal
The Oxford Handbook of National Security Intelligence
You don’t have permission to view the content, please login via HKU Portal
Anthony W. Pereira, “Of Judges and Generals: “Security Courts under Authoritarian Regimes in Argentina, Brazil, and Chile,” in Rule of Law: The Politics of Courts in Authoritarian Regimes (Cambridge University Press, 2012) 23-57
You don’t have permission to view the content, please login via HKU Portal
Sedition and the Advocacy of Violence: Free Speech and Counter-Terrorism
You don’t have permission to view the content, please login via HKU Portal
Roger Kiska, “Hate Speech: A Comparison between the European Court of Human Rights and the United States Supreme Court Jurisprudence” 25 Regent University Law Review (2012)
You don’t have permission to view the content, please login via HKU Portal
United States v. El-Mezain 10-10590 (5th Cir. Dec. 7, 2011)
You don’t have permission to view the content, please login via HKU Portal
Helen Fenwick, “Preventive Anti-Terrorist Strategies in the UK and ECHR: Control Orders, TPIMs and the Role of Technology” 25(3) International Review of Law, Computers & Technology (2011)
You don’t have permission to view the content, please login via HKU Portal
United States v. Kassar 660 F.3d 108 (2d Cir. 2011)
You don’t have permission to view the content, please login via HKU Portal
Jessie Blackbourn, “The evolving definition of terrorism in UK law”, Vol. 3(2), Behavioral sciences of terrorism and political aggression (2011)
You don’t have permission to view the content, please login via HKU Portal
