Violent Extremism in America

Total Page:16

File Type:pdf, Size:1020Kb

Violent Extremism in America VIOLENT EXTREMISM IN AMERICA Interviews with Former Extremists and Their Families on Radicalization and Deradicalization RYAN ANDREW BROWN TODD C. HELMUS RAJEEV RAMCHAND ALINA I. PALIMARU SARAH WEILANT ASHLEY L. RHOADES LIISA HIATT C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/RRA1071-1 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0679-8 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2021 RAND Corporation R® is a registered trademark. Cover Images: AdobeStock/photolink; Azuzl Cover Design: Peter Soriano Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface The January 6, 2021, attack at the U.S. Capitol, fueled by perceptions of a stolen 2020 presidential election, underscored a growing threat to America’s national secu- rity: homegrown terrorism and ideologically inspired violence. Given this evolving, ongoing threat, the U.S. government, research institutions, and private-sector partners have made significant investments in attempting to understand and prevent violent extremism. Previous RAND work has described successes and failures of radicaliza- tion prevention programs. In this project, researchers at the RAND Justice Policy Program approached questions of extremist radicalization and deradicalization from a public health perspective. This report describes personal accounts from former white supremacists, Islamic extremists, and their family members about joining extremist groups and, in some cases, deradicalizing. This research was supported by the National Institute of Justice (Grant No. 2017-ZA-CX-0005). Justice Policy Program RAND Social and Economic Well-Being is a division of the RAND Corporation that seeks to actively improve the health and social and economic well-being of popula- tions and communities throughout the world. This research was conducted in the Justice Policy Program within RAND Social and Economic Well-Being. The program focuses on such topics as access to justice, policing, corrections, drug policy, and court system reform, as well as other policy concerns pertaining to public safety and criminal and civil justice. For more information, email [email protected]. iii Contents Preface ................................................................................................. iii Figures and Tables ...................................................................................vii Summary ............................................................................................. ix Acknowledgments .................................................................................. xix Abbreviations ........................................................................................ xxi CHAPTER ONE Introduction and Background ..................................................................... 1 Violent Extremism in the United States ............................................................. 1 Definitions and Terms ................................................................................. 2 Rationale for the Current Approach ................................................................. 3 A Research Approach Derived from Suicide Prevention .......................................... 6 Limitations of the Approach .......................................................................... 7 Organization of This Report ......................................................................... 9 CHAPTER TWO Overview of the Literature ........................................................................11 Sources of Risk or Resiliency Associated with Radicalization ...................................12 Pathways to Radicalization ..........................................................................19 Processes of Exiting Extremist Organizations .................................................... 20 Perspectives on Mitigation Strategies for Extremism ............................................ 24 Conclusion ............................................................................................ 26 CHAPTER THREE Methods .............................................................................................. 27 Project Design ........................................................................................ 27 Sample Demographics and Case Details .......................................................... 27 Interview Process and Protocol ......................................................................31 Interview Analysis ....................................................................................32 v vi Violent Extremism in America CHAPTER FOUR Background Characteristics of Radical Extremists ...........................................35 Analysis of Interviews.................................................................................35 Conclusion .............................................................................................41 CHAPTER FIVE Pathways to Radicalization ....................................................................... 43 Analysis of Interviews................................................................................ 43 Conclusion .............................................................................................53 CHAPTER SIX Deradicalizing and Leaving Extremist Organizations .......................................55 Analysis of Interviews.................................................................................55 Conclusion .............................................................................................65 CHAPTER SEVEN Participant Perspectives on Mitigation Strategies .............................................67 Analysis of Interviews................................................................................ 68 Conclusion ............................................................................................ 84 CHAPTER EIGHT Synthesis and Recommendations .................................................................85 Strengths and Limitations ............................................................................85 Main Findings ........................................................................................ 86 Recommendations ................................................................................... 88 Conclusion ............................................................................................ 92 APPENDIXES A. Literature Review Methods and Scope .......................................................93 B. Interview Protocols ............................................................................. 99 References ........................................................................................... 105 Figures and Tables Figures 1.1. The Socioecological Model for Violence Prevention ................................. 5 2.1. Summary of Push and Pull Factors for Exit from Extremist Groups ............ 23 2.2. Objectives for CVE Community-Based Programs ................................. 26 Tables S.1. Summary of Study Findings and Recommendations ...............................xv 2.1. Summary of Indicators of Radicalization .............................................12 2.2. Extremist Attributes Across Ideologies ................................................18 3.1. Summary of Individuals Involved in Radicalization ................................29 3.2. Extreme Organization and Group Involvement .................................... 30 4.1. Summary of Personal Characteristics by Case ...................................... 36 5.1. Key Radicalization Themes Addressed in This Chapter (by case) ................ 44 6.1. Current Status of Focal Individuals .................................................. 56 6.2. Types of Individuals Involved in Successful Interventions..........................58 6.3. Characteristics of Successful Interventions by Individuals .........................59 vii Summary The January 6, 2021, attack at the U.S. Capitol, fueled by perceptions of a stolen 2020 presidential election, underscored a growing threat to America’s national secu- rity: homegrown terrorism and ideologically inspired violence. For some, as reports and images flooded social and traditional media, the assault might have come as a shock. But for many others, the incident was not surprising. Domestic attacks have maintained a steady and growing pace in recent years, and such events as the
Recommended publications
  • The Changing Face of American White Supremacy Our Mission: to Stop the Defamation of the Jewish People and to Secure Justice and Fair Treatment for All
    A report from the Center on Extremism 09 18 New Hate and Old: The Changing Face of American White Supremacy Our Mission: To stop the defamation of the Jewish people and to secure justice and fair treatment for all. ABOUT T H E CENTER ON EXTREMISM The ADL Center on Extremism (COE) is one of the world’s foremost authorities ADL (Anti-Defamation on extremism, terrorism, anti-Semitism and all forms of hate. For decades, League) fights anti-Semitism COE’s staff of seasoned investigators, analysts and researchers have tracked and promotes justice for all. extremist activity and hate in the U.S. and abroad – online and on the ground. The staff, which represent a combined total of substantially more than 100 Join ADL to give a voice to years of experience in this arena, routinely assist law enforcement with those without one and to extremist-related investigations, provide tech companies with critical data protect our civil rights. and expertise, and respond to wide-ranging media requests. Learn more: adl.org As ADL’s research and investigative arm, COE is a clearinghouse of real-time information about extremism and hate of all types. COE staff regularly serve as expert witnesses, provide congressional testimony and speak to national and international conference audiences about the threats posed by extremism and anti-Semitism. You can find the full complement of COE’s research and publications at ADL.org. Cover: White supremacists exchange insults with counter-protesters as they attempt to guard the entrance to Emancipation Park during the ‘Unite the Right’ rally August 12, 2017 in Charlottesville, Virginia.
    [Show full text]
  • Charting a New Course: Women Preventing Violent Extremism
    Charting a New Course I 2301 Constitution Avenue, NW Washington, DC 20037 www.usip.org © 2015 by the Endowment of the United States Institute of Peace. All rights reserved. First published 2015 To request permission to photocopy or reprint materials for course use, contact the Copyright Clearance Center at www.copyright.com. For print, electronic media, and all other subsidiary rights e-mail [email protected] Printed in the United States of America The paper used in this publication meets the minimum requirements of American National Standards for Information Science—Permanence of Paper for Printed Library Materials, ANSI Z39.48-1984. The views expressed in this publication are those of the authors alone. They do not necessarily reflect the views of the United States Institute of Peace. II Charting a WOMEN PREVENTING VIOLENT EXTREMISM New Course 2 Acknowledgments 3 Introduction 7 Why Gender Matters 9 Women on the Front Lines by Alistair Millar 11 Exercise: Act Like a Woman/ Act Like a Man 12 Blindspots by Jayne Huckerby 13 Exercise: Spheres of Influence 15 Women and the Dynamics of Extremist Violence 17 Listen to the Women Activists by Sanam Naraghi-Anderlini 19 Exercise: Gendered Motivations 20 When Women are the Problem by Mia Bloom 21 Exercise: Multiple Interpretations: Who is Right? 22 Motivations of Female Fighters by Nimmi Gowrinathan 25 Engaging Communities in Preventing Violent Extremism 27 Building Resilience to Violent Extremism by Georgia Holmer 29 Exercise: Allies and Challengers 30 Charting New Ways with New Partners by Edit Schlaffer 31 Resource: Active Listening Techniques 32 Everyday Technologies Can Help Counter Violence and Build Peace by Nancy Payne 33 Resource: Enabling Technologies for Preventing Violent Extremism 34 Increasing Understanding through Words by Alison Milofsky 35 Resource: Debate versus Dialogue 36 Acronyms 36 Resources 1 ACKNOWLEDGMENTS he creation of the thought for action kit, “Charting a New Course: Women TPreventing Violent Extremism,” has been a team effort.
    [Show full text]
  • Strategic Cooperation Between Japan and UNODC -The Joint Plan of Action
    Strategic Cooperation between Japan and UNODC -The joint plan of action- The Government of Japan (hereafter referred to as Japan) and the United Nations Office on Drugs and Crime (hereafter referred to as UNODC) have a long history of collaboration in countering illicit narcotic drugs, in crime prevention and criminal justice reform, as well as in countering terrorism. Japan has also been a leading provider of core support to the operations of UNODC. Japan and UNODC share mutual interest in further enhancing cooperation. During the first Strategic Policy Dialogue between Japan and UNODC, held in Yokohama on 2 June 2013 in the margins of the 5th Tokyo International Conference on African Development (TICAD V), they identified regional, thematic and other areas for strategic cooperation, and developed a joint plan of action. They also agreed to hold Strategic Policy Dialogue at the senior level annually in Tokyo or Vienna (alternately). Japan and UNODC reviewed the progress of the implementation of the plan of action during the Strategic Policy Dialogue recently held, and amended it as follows. 1. Regional Cooperation (1) Africa Japan welcomes the participation of UNODC in the TICAD V in June 2013 and the TICAD VI in August 2016 in the TICAD process. Through the follow-up of TICAD VI, Japan and UNODC will enhance substantive and operational collaboration in Africa, in particular, in areas related to peace and security such as strengthening of criminal justice systems, countering transnational organized crime (illicit trafficking of narcotic drugs, firearms, and persons), corruption and cybercrime as well as combating terrorism, violent extremism and piracy.
    [Show full text]
  • How to Get the Daily Stormer Be Found on the Next Page
    # # Publishing online In print because since 2013, offline Stormer the (((internet))) & Tor since 2017. is censorship! The most censored publication in history Vol. 97 Daily Stormer ☦ Sunday Edition 23–30 Jun 2019 What is the Stormer? No matter which browser you choose, please continue to use Daily Stormer is the largest news publication focused on it to visit the sites you normally do. By blocking ads and track- racism and anti-Semitism in human history. We are signifi- ers your everyday browsing experience will be better and you cantly larger by readership than many of the top 50 newspa- will be denying income to the various corporate entities that pers of the United States. The Tampa Tribune, Columbus Dis- have participated in the censorship campaign against the Daily patch, Oklahoman, Virginian-Pilot, and Arkansas Democrat- Stormer. Gazette are all smaller than this publication by current read- Also, by using the Tor-based browsers, you’ll prevent any- ership. All of these have dozens to hundreds of employees one from the government to antifa from using your browsing and buildings of their own. All of their employees make more habits to persecute you. This will become increasingly rele- than anyone at the Daily Stormer. We manage to deliver im- vant in the years to come. pact greater than anyone in this niche on a budget so small you How to support the Daily Stormer wouldn’t believe. The Daily Stormer is 100% reader-supported. We do what Despite censorship on a historically unique scale, and The we do because we are attempting to preserve Western Civiliza- Daily Stormer becoming the most censored publication in his- tion.
    [Show full text]
  • 2010 Hyundai Genesis
    2010 HYUNDAI_GENESIS If you’re reading this brochure, chances are you’re the kind of automotive enthusiast who, instead of simply opening your wallet and adding a status trophy to your garage, prefers to open something else: Your mind. It’s a refreshing attitude that often leads you to discover truly rewarding experiences, from new and unexpected sources. Like Genesis, from Hyundai. Nobody was looking for Hyundai to build a luxury car that would challenge the automotive elite. But we did. Nobody expected us to benchmark the industry’s best, then apply the art and science needed to meet those marks. But we did. Nobody thought we’d charm the pants off a jury of North America’s most esteemed automotive journalists, or be named "The Most Appealing Midsize Premium Car" in 2009 by J.D. Power and Associates.1 But we did. And by doing what few people expected of us, we now find ourselves as a car company that a lot of people are starting to think about in a whole new way. It’s 2010. Welcome to Hyundai. 1 The Hyundai Genesis received the highest numerical score among midsize premium cars in the proprietary J.D. Power and Associates 2009 Automotive Performance Execution and Layout Study.SM Study based on responses from 80,930 new-vehicle owners, measuring 245 models and measures opinions after 90 days of ownership. Proprietary study results are based on experiences and perceptions of owners surveyed in February-May 2009. Your experiences may vary. Visit jdpower.com. geNesIS 3.8 IN TItaNIUM GRay metallIC MEASURE GENESIS AGAINST OTHER LUXURY SEDANS.
    [Show full text]
  • Printed Covers Sailing Through the Air As Their Tables Are REVIEWS and REFUTATIONS  Ipped
    42 RECOMMENDED READING Articles Apoliteic music: Neo-Folk, Martial Industrial and metapolitical fascism by An- ton Shekhovtsov Former ELF/Green Scare Prisoner Exile Now a Fascist by NYC Antifa Books n ٻThe Nature of Fascism by Roger Gri Modernism and Fascism: The Sense of a Beginning under Mussolini and Hitler by Roger n ٻGri n ٻFascism edited by Roger Gri Black Sun: Aryan Cults, Esoteric Nazism, and the Politics of Identity by Nicholas Go- A FIELD GUIDE TO STRAW MEN odrick-Clarke Gods of the Blood: The Pagan Revival and White Separatism by Mattias Gardell Modernity and the Holocaust by Zygmunt Bauman Sadie and Exile, Esoteric Fascism, and Exterminate All the Brutes by Sven Lindqvist Confronting Fascism: Discussion Documents for a Militant Movement by Don Hamerquist, Olympias Little White Lies J. Sakai, Anti-Racist Action Chicago, and Mark Salotte Baedan: A Journal of Queer Nihilism Baedan 2: A Queer Journal of Heresy Baedan 3: A Journal of Queer Time Travel Against His-story, Against Leviathan! by Fredy Perlman Caliban and the Witch: Women, the Body, and Primitive Accumulation by Silvia Federici Witchcraft and the Gay Counterculture by Arthur Evans The Many-Headed Hydra: Sailors, Slaves, Commoners, and the Hidden History of the Revo- lutionary Atlantic by Peter Linebaugh and Marcus Rediker Gone to Croatan: Origins of North American Dropout Culture edited by Ron Sakolsky and James Koehnline The Subversion of Politics: European Autonomous Social Movements and the Decolonization of Everyday Life by Georgy Katsia cas 1312 committee // February 2016 How the Irish Became White by Noel Ignatiev How Deep is Deep Ecology? by George Bradford Against the Megamachine: Essays on Empire and Its Enemies by David Watson Elements of Refusal by John Zerzan Against Civilization edited by John Zerzan This World We Must Leave and Other Essays by Jacques Camatte 41 total resistance mounted to the advent of industrial society.
    [Show full text]
  • Cyber Laws for Dark Web: an Analysis of the Range of Crimes and the Level of Effectiveness of Law Over It
    An Open Access Journal from The Law Brigade Publishers 1 CYBER LAWS FOR DARK WEB: AN ANALYSIS OF THE RANGE OF CRIMES AND THE LEVEL OF EFFECTIVENESS OF LAW OVER IT Written by Sanidhya Mahendra 5th Year B.A.LL.B.(Hons.) Student, Uttaranchal University, Dehradun, India ABSTRACT In the 21st century, when we say “The future is now”, we mean that everything is possible, everything is accessible, everything is on our fingertips. This is because our entire world today is connected and controlled by the internet. This world wide connectivity offers us everything to use, like from shopping to travelling, from eating to feeding, and even for connecting to the people virtually, however the internet is not just limited to the millions of websites available for our daily use, rather it is far beyond that. We just access the 5 per cent of the entire internet and the rest of it is what may be a true horror for those who have been affected by it. This domain of internet is popularly known as the Dark Web. In this article the author has described the disturbing truths of the Dark Web. The author has described about its history and has pointed out the usage of the same by the criminals. The author further discusses the types of crime that are committed behind the veil of internet. The article thereafter defines the remedies available in various laws of India for the victims of cyber crimes. The author concludes the article with suggestions of improvement in the present laws. KEYWORDS: Dark Net, Dark web, Deep Web, TOR, Onion, Cryptocurrency, privacy, anonymous, VPN, ARPANET, Crawlers, Silk Road, Phishing INTRODUCTION Today the most significant invention is the invention Internet, and it has taken the eyes of all the generation in one go.
    [Show full text]
  • Mitigating Youth Radicalization and Violent Extremism
    Journal of Strategic Security Volume 4 Number 4 Volume 4, No. 4, Winter 2011: Perspectives on Radicalization and Article 4 Involvement in Terrorism Disarming Youth Combatants: Mitigating Youth Radicalization and Violent Extremism Alpaslan Özerdem Coventry University, [email protected] Sukanya Podder Coventry University, [email protected] Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 63-80 Recommended Citation Özerdem, Alpaslan and Podder, Sukanya. "Disarming Youth Combatants: Mitigating Youth Radicalization and Violent Extremism." Journal of Strategic Security 4, no. 4 (2012) : 63-80. DOI: http://dx.doi.org/10.5038/1944-0472.4.4.3 Available at: https://scholarcommons.usf.edu/jss/vol4/iss4/4 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Disarming Youth Combatants: Mitigating Youth Radicalization and Violent Extremism Abstract In the complex of motivating variables that define the push and pull factors behind recruitment and participation in civil conflict, "radicalization"—or "violent extremism"—is not conceived as a very strong motive, as is the case with studies on terrorism. As part of disarming youth combatants,the linkages between reintegration outcomes and possible rerecruitment into radical and extremist violence must be better understood to mitigate such risks. In our analysis, the policies guiding reintegration of child soldiers and youth should be better attuned to the relationship between recruitment motivations and reintegration outcomes, and must be approached from a political lens rather than a purely technical one.
    [Show full text]
  • SENATE—Wednesday, July 15, 2009
    July 15, 2009 CONGRESSIONAL RECORD—SENATE, Vol. 155, Pt. 13 17757 SENATE—Wednesday, July 15, 2009 The Senate met at 9:30 a.m. and was Mr. REID. Mr. President, I suggest HOUSE, Ms. KLOBUCHAR, Mr. SPECTER, Mr. called to order by the Honorable RO- the absence of a quorum. FRANKEN, Ms. MIKULSKI, Mr. MERKLEY, Mrs. LAND W. BURRIS, a Senator from the The ACTING PRESIDENT pro tem- GILLIBRAND, Mr. MENENDEZ, Mrs. SHAHEEN, State of Illinois. pore. The clerk will call the roll. Mr. KERRY, Mr. UDALL of Colorado, Mr. DODD, Mr. HARKIN, Mr. WYDEN, Mr. CASEY, The assistant legislative clerk pro- Ms. CANTWELL, Mr. LAUTENBERG, Mr. LIEBER- PRAYER ceeded to call the roll. MAN, Mrs. BOXER, Mr. BROWN, Mr. AKAKA, The Chaplain, Dr. Barry C. Black, of- Mr. REID. Mr. President, I ask unan- Mr. SANDERS, Mrs. MURRAY, and Mr. REED, fered the following prayer: imous consent that the order for the proposes an amendment numbered 1511. Let us pray. quorum call be rescinded. Mr. REID. Mr. President, I ask unan- Our Eternal God, we lift grateful The ACTING PRESIDENT pro tem- imous consent that the reading of the hearts for the great heritage of our Na- pore. Without objection, it is so or- amendment be dispensed with. tion. Thank You for those who pur- dered. The ACTING PRESIDENT pro tem- chased our freedom with blood, toil, Mr. REID. Mr. President, my under- pore. Without objection, it is so or- and tears. Give us this day a vivid vi- standing is the clerk will report the dered. sion of what You expect our Nation to matter before the Senate at this time.
    [Show full text]
  • Abraham!” “Yes?” Answered Abraham
    January 17, 2021 - Sacrifice Read this, from Genesis 22: God said, “Abraham!” “Yes?” answered Abraham. “I’m listening.” 2 He said, “Take your dear son Isaac whom you love and go to the land of Moriah. Sacrifice him there as a burnt offering on one of the mountains that I’ll point out to you.” 3-5 Abraham got up early in the morning and saddled his donkey. He took two of his young servants and his son Isaac. He had split wood for the burnt offering. He set out for the place God had directed him. On the third day he looked up and saw the place in the distance. Abraham told his two young servants, “Stay here with the donkey. The boy and I are going over there to worship; then we’ll come back to you.” 6 Abraham took the wood for the burnt offering and gave it to Isaac his son to carry. He carried the flint and the knife. The two of them went off together. 7 Isaac said to Abraham his father, “Father?” “Yes, my son.” “We have flint and wood, but where’s the sheep for the burnt offering?” 8 Abraham said, “Son, God will see to it that there’s a sheep for the burnt offering.” And they kept on walking together. 9-10 They arrived at the place to which God had directed him. Abraham built an altar. He laid out the wood. Then he tied up Isaac and laid him on the wood. Abraham reached out and took the knife to kill his son.
    [Show full text]
  • News Briefs the Elite Runners Were Those Who Are Responsible for Vive
    VOL. 117 - NO. 16 BOSTON, MASSACHUSETTS, APRIL 19, 2013 $.30 A COPY 1st Annual Daffodil Day on the MARATHON MONDAY MADNESS North End Parks Celebrates Spring by Sal Giarratani Someone once said, “Ide- by Matt Conti ologies separate us but dreams and anguish unite us.” I thought of this quote after hearing and then view- ing the horrific devastation left in the aftermath of the mass violence that occurred after two bombs went off near the finish line of the Boston Marathon at 2:50 pm. Three people are reported dead and over 100 injured in the may- hem that overtook the joy of this annual event. At this writing, most are assuming it is an act of ter- rorism while officials have yet to call it such at this time 24 hours later. The Ribbon-Cutting at the 1st Annual Daffodil Day. entire City of Boston is on (Photo by Angela Cornacchio) high alert. The National On Sunday, April 14th, the first annual Daffodil Day was Guard has been mobilized celebrated on the Greenway. The event was hosted by The and stationed at area hospi- Friends of the North End Parks (FOTNEP) in conjunction tals. Mass violence like what with the Rose F. Kennedy Greenway Conservancy and North we all just experienced can End Beautification Committee. The celebration included trigger overwhelming feel- ings of anxiety, anger and music by the Boston String Academy and poetry, as well as (Photo by Andrew Martorano) daffodils. Other activities were face painting, a petting zoo fear. Why did anyone or group and a dog show held by RUFF.
    [Show full text]
  • The Genesis and Development of "Parker's Back"
    University of the Pacific Scholarly Commons University of the Pacific Theses and Dissertations Graduate School 1976 The Genesis and Development of "Parker's Back" Kara Pratt Brewer University of the Pacific Follow this and additional works at: https://scholarlycommons.pacific.edu/uop_etds Part of the English Language and Literature Commons Recommended Citation Brewer, Kara Pratt. (1976). The Genesis and Development of "Parker's Back". University of the Pacific, Dissertation. https://scholarlycommons.pacific.edu/uop_etds/3201 This Dissertation is brought to you for free and open access by the Graduate School at Scholarly Commons. It has been accepted for inclusion in University of the Pacific Theses and Dissertations by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. THE GENESIS AND DEVELOPl'1ENT OF "PARKER'S BACK" by Kara Brewer An essay subrnitted.in partial fulfillment of the requirements for the degree of Doctor of Arts in the Depa~tment of English University of the Pacific IVJa.rch, 1976 This essay, written and submitted by Kara P. Brewer is approved for recommendation to the Graduate Council, University of the Pacific. Department Chairman or Dean: Essay Committee: Dated______ ~M~a~v~l~,~l~9~7~6~------------- "Parker's Back" is the last r-:~hort story Flannery 0' Connor wrote before the ravaging· disease Lupus took her• life in August of 1964. When Caroline Gordon visited her "in a hospital a fev1 weeks before her death," she spoke of her concern about finishing it. "She told me that the doc~~ tor had forbidden her to do any work.
    [Show full text]