Catalog Search Results
Author
Language
English
Description
This assessment of the struggle for Pakistan's identity, from its birth in 1947 to the present day, provides a political and cultural understanding of the role and use of Islam in its evolution. The author, a Pakistani scholar, shows how Pakistan's viability as a state depends in large part on its ability to develop a new and progressive Islamic narrative.--Provided by the publisher.
Author
Language
English
Description
Emmy Award-winning journalist Robert Zelnick examines Israel's disengagement from Gaza and what it might lead to in the future. He details the thought behind the policy and the impact of the loss of Ariel Sharon, analyzes the Palestinian response from both moderates and Hamas, and underscores the politically realist-minded assumptions that continue to drive the policy forward.--Provided by the publisher.
Author
Language
English
Description
For grumpy old men everywhere: what are the things that have made Britain less great? Outspoken and controversial commentator Duncan Barkes looks at the "dumbing down" of BritainIn this enjoyable diatribe, Duncan Barkes picks over the remnants of a once great nation, and hones in on the issues that he feels have changed Britain for the worse. In this dumbed-down nation, our liberty is constantly threatened by increasing state control. Barkes pulls...
Author
Language
English
Formats
Description
"America is awash with conspiracy theories, and the shared view of reality we once took for granted has been permanently shattered. Jonathan Kay uses the 9/11 Truth movement as a springboard to examine this fragmented national mindset"--Provided by publisher.
Publisher
The Great Courses
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (31 minutes): digital, .flv file, sound
Language
English
Description
As privacy has become more of a concern, many technology service providers are instituting more and stronger encryption—including biometric finger scans to unlock phones and access data. But without a "back door"for government access, the intelligence community argues, national security is at risk. Unpack the tension from a Fifth Amendment perspective.
Publisher
The Great Courses
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (31 minutes): digital, .flv file, sound
Language
English
Description
For all the talk about national intelligence programs, local police probably gather more surveillance data than any other governmental entity. Find out what techniques cops use to solve crimes, from closed-circuit cameras to license plate readers, and explore how the NYPD has put all the pieces together.
88) From Poverty to Purpose, The Ben Carson Story: Role Model for Medicine & World-Renowned Neurosurgeon
Publisher
TMW Media
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (19 minutes): digital, .flv file, sound
Language
English
Description
How does an inner city African American kid with a self-proclaimed violent temper, become a world renowned brain surgeon, an inspiring role model for disadvantaged youth, a medical innovator and achieve success... against all odds? In 2001, CNN and Time Magazine named Ben Carson one of the nation's 20 foremost physicians and scientists. His mother was his most influential inspiration, changing Ben from worst to first. He gained respect as he soared...
89) Love Hate Love
Publisher
The Video Project
Pub. Date
2011.
Physical Desc
1 online resource (streaming video file) (83 minutes): digital, .flv file, sound
Language
English
Description
Love Hate Love weaves together the stories of three families whose lives were torn apart by some of the most notorious terrorist attacks of the 21st century, yet refused to succumb to despair or hate.. Liz Alderman’s son Peter was murdered in the 9/11 attacks on the World Trade Center. Esther Hyman’s only sister and a gifted artist was killed in the 2005 bus bombings in London. Australian business owner Ben Tullipan lost both his legs when a one-ton...
Publisher
The Great Courses
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (31 minutes): digital, .flv file, sound
Language
English
Description
Shift your attention to electronic surveillance, and see how the monitoring of web searches and emails allows the government to gain insights into potential security risks from abroad. But even though the surveillance program has oversight, some people fear the potential for abuse is high. Look at both sides of the issue.
Publisher
Deep Dish TV
Pub. Date
2005.
Physical Desc
1 online resource (streaming video file) (30 minutes): digital, .flv file, sound
Language
English
Description
The growing impact of artists and cultural performances that have invigorated and enlivened resistance to America's imperial war on Iraq. Picasso responded to the fascist takeover of Spain in the 1930s with his famous painting Guernica. Artists today are responding the U.S. occupation of Iraq and domestic repression with music, murals, street performance, comedy, cartoon animations and giant puppets. Part four of a twelve part series from Deep Dish...
Publisher
The Great Courses
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (29 minutes): digital, .flv file, sound
Language
English
Description
Go inside what is likely the most extreme surveillance state in the history of civilization. It is estimated that, when you count casual informants, as many as one in six East Germans was a spy—keeping tabs on neighbors, friends and family. Survey the history of this insidious surveillance state and think about the lessons it can teach us today.
Publisher
The Great Courses
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (29 minutes): digital, .flv file, sound
Language
English
Description
Spycraft used to be limited to physical surveillance and electronic communications, but now, thanks to the Internet, hacking and digital espionage are the wave of the future. Investigate the techniques by which governments infiltrate each other, ponder the ethics of these actions, and think through the appropriate responses.
94) Biometrics
Publisher
The Great Courses
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (30 minutes): digital, .flv file, sound
Language
English
Description
Eye scans and facial recognition software were once the purview of science fiction, but now biometric identification is becoming commonplace. Here, examine the different forms of biometric screening, from fingerprinting to DNA analysis. While there are many benefits to this technology, you’ll also see the darker side of this data unleashed in the world.
Publisher
The Great Courses
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (30 minutes): digital, .flv file, sound
Language
English
Description
Drones—unmanned aerial vehicles—are flooding our skies, bringing with them a variety of concerns about safety and privacy. Review some of the many public and private uses of drones, and then consider policy issues such as: what constitutes permissible use of drone video footage? What safety regulations are appropriate? How can we reconcile civil liberties with the right to privacy?
Publisher
PBS
Pub. Date
2015.
Physical Desc
1 online resource (streaming video file) (54 minutes): digital, .flv file, sound
Language
English
Description
The global cyberwar is heating up and the stakes are no longer limited to the virtual world of computers. Now, thanks in part to secret documents released by Edward Snowden, the true scale of the National Security Agency's scope and power is coming to light. Besides spending billions of dollars to ingest and analyze the worlds' electronic communications, the NSA has set out to dominate a new battlefield—cyberspace. NOVA examines the science and...
Publisher
The Great Courses
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (33 minutes): digital, .flv file, sound
Language
English
Description
After 9/11, the CIA and the FBI were faulted for not sharing intelligence in advance of the attacks. But the two agencies faced stringent legal restrictions on sharing information, going back to the 1978 FISA legislation, which erected a "wall"between intelligence gathering and criminal investigations. Review the reasons for and the history of this legislation and the changes that happened after 9/11.
Publisher
The Great Courses
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (33 minutes): digital, .flv file, sound
Language
English
Description
The democratization of newsgathering and the expansion of the surveillance state have amplified tensions over the transparency of government operations. Trace the recent history of the news media from the Pentagon Papers to Wikileaks, and draw your own conclusions about what information should be published and who should be allowed to publish it.
Publisher
The Great Courses
Pub. Date
2016.
Physical Desc
1 online resource (streaming video file) (30 minutes): digital, .flv file, sound
Language
English
Description
Because our privacy laws are so far behind today’s technology, we need a modern conception of privacy that offers enough flexibility for national security, but that also protects against abuse. Here, reflect on the nature of privacy and consider the two extremes: a Panopticon world of total surveillance on the one hand, and complete invisibility on the other.
100) An Inconvenient Tax
Publisher
Seventh Art Releasing Exclusive
Pub. Date
2011.
Physical Desc
1 online resource (streaming video file) (79 minutes): digital, .flv file, sound
Language
English
Description
Albert Einstein once wrote, "The hardest thing in the world to understand is the income tax." The product of 95 years' worth of additions, subtractions, deductions, and exclusions, it has become such a headache that many are calling for it to be drastically simplified or even removed all together. With a looming fiscal crisis on the horizon, April 15th seems more like a scene from a B-Horror movie than a day to contribute to the common good of the...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request