Search Details

Word: assaultive (lookup in dictionary) (lookup stats)
Dates: during 2000-2009
Sort By: most recent first (reverse)


Usage:

...early 2006, a young man named DeJarion Echols stood in a federal courtroom in Waco, Texas, and pleaded for leniency. After police found about 40 grams of crack cocaine, cash and an assault rifle in his bedroom, the promising athlete and father pleaded guilty to crack distribution and gun charges. "I made a bad choice" by dealing crack to pay for college, Echols, then 23, told U.S. District Judge Walter S. Smith Jr. According to a court transcript, the judge declared in apparent frustration, "This is one of those situations where I'd like to see a congressman sitting before...

Author: /time Magazine | Title: Will Crack-Cocaine Sentencing Reform Help Current Cons? | 8/7/2009 | See Source »

...Georgian forces launched an early-morning assault on South Ossetia after days of clashes between Moscow and Tbilisi over the fate of the breakaway republic and that of Abkhazia, another republic that had declared independence from Georgia following wars in the early 1990s. Hours after the attack, Russia responded with what the West condemned as a "disproportionate" use of force. Within five days, Russian forces had driven Georgian troops out of South Ossetia and into central Georgia. During the war, international human-rights groups accused Georgia of indiscriminately shelling civilian areas and Russia of allowing the ethnic cleansing of Georgian...

Author: /time Magazine | Title: One Year On, Could Russia and Georgia Fight Another War? | 8/7/2009 | See Source »

Adding to the chaos is the fact that the zombie computers often show no signs of being infected. Hackers look for computers with security vulnerabilities and infect them in advance of an attack. When the hackers are ready to launch the assault, the master computer awakens its zombie army, and the attack begins. Because DDoS utilizes multiple computers from multiple locations - and because hackers may use their network for only a single attack - there's no way to protect against a seemingly random array of computers suddenly going rogue. Once the attack begins, websites can try to trace the sudden...

Author: /time Magazine | Title: How Did Hackers Cripple Twitter? | 8/6/2009 | See Source »

...targeting one of his key allies is seen as another means of weakening Abbas' authority. A second target will be Prime Minister Salam Fayyad, a political independent appointed by Abbas at Washington's behest, although against strong opposition from both Hamas and Fatah. (See pictures of Israel's assault on Gaza...

Author: /time Magazine | Title: Fatah Conference Aims to Boost Its Radical Credentials | 8/4/2009 | See Source »

...behalf of children and veterans. A banner on the bottom of the Hells Angels website reads, "When we do right nobody remembers, when we do wrong nobody forgets." Yet many Hells Angels have clearly lived up to their lawless image - arrests and convictions for drug trafficking (especially meth), assault, weapons possession and even murder have trailed the group for decades. Most notoriously, Hells Angels allegedly plotted to kill rock legend Mick Jagger following the infamous 1969 riot at California's Altamont Speedway, where the gang was providing security. The Rolling Stones front man had criticized the Angels after a biker...

Author: /time Magazine | Title: The Hells Angels | 8/3/2009 | See Source »

Previous | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | Next