CPC Outreach Journal #484

Total Page:16

File Type:pdf, Size:1020Kb

CPC Outreach Journal #484 USAF COUNTERPROLIFERATION CENTER CPC OUTREACH JOURNAL Maxwell AFB, Alabama Issue No. 484, 21 February 2006 Articles & Other Documents: Commercial Photos Show Chinese Nuke Buildup Rice Asks For $75 Million To Increase Pressure On Iran Niger Uranium Rumors Wouldn't Die Iran Working On Nuclear Arms Plan, France Says Iran Hints At Compromise On Nuclear Inspections Europeans Reaffirm Diplomacy With Iran Bioterrorism, Hyped Iranian Fatwa Approves Use Of Nuclear Weapons Nuke-Armed Iran A Way Off: Experts On tape, Hussein talks of WMDs Talks On Enriching Nuclear Fuel For Iran In Russia Seem To Stall Welcome to the CPC Outreach Journal. As part of USAF Counterproliferation Center’s mission to counter weapons of mass destruction through education and research, we’re providing our government and civilian community a source for timely counterproliferation information. This information includes articles, papers and other documents addressing issues pertinent to US military response options for dealing with nuclear, biological and chemical threats and attacks. It’s our hope this information resource will help enhance your counterproliferation issue awareness. Established in 1998, the USAF/CPC provides education and research to present and future leaders of the Air Force, as well as to members of other branches of the armed services and Department of Defense. Our purpose is to help those agencies better prepare to counter the threat from weapons of mass destruction. Please feel free to visit our web site at www.au.af.mil/au/awc/awcgate/awc-cps.htm for in-depth information and specific points of contact. Please direct any questions or comments on CPC Outreach Journal to Jo Ann Eddy, CPC Outreach Editor, at (334) 953-7538 or DSN 493-7538. To subscribe, change e-mail address, or unsubscribe to this journal or to request inclusion on the mailing list for CPC publications, please contact Mrs. Eddy. The following articles, papers or documents do not necessarily reflect official endorsement of the United States Air Force, Department of Defense, or other US government agencies. Reproduction for private use or commercial gain is subject to original copyright restrictions. All rights are reserved Washington Times February 16, 2006 Pg. 1 Commercial Photos Show Chinese Nuke Buildup By Bill Gertz, The Washington Times Commercial satellite photos made public recently provide a new look at China's nuclear forces and bases images that include the first view of a secret underwater submarine tunnel. A Pentagon official said the photograph of the tunnel entrance reveals for the first time a key element of China's hidden military buildup. Similar but more detailed intelligence photos of the entrance are highly classified within the U.S. government, the official said. "The Chinese have a whole network of secret facilities that the U.S. government understands but cannot make public," said the official, who spoke on the condition of anonymity. "This is the first public revelation of China's secret buildup." The photographs, taken from 2000 to 2004, show China's Xia-class ballistic missile submarine docked at the Jianggezhuang base, located on the Yellow Sea in Shandong province. Nuclear warheads for the submarine's 12 JL-1 missiles are thought to be stored inside an underwater tunnel that was photographed about 450 meters to the northwest of the submarine. The high-resolution satellite photo shows a waterway leading to a ground-covered facility. Other photographs show additional underground military facilities, including the Feidong air base in Anhui province with a runway built into a nearby hill. The photographs were obtained by the nonprofit groups Natural Resources Defense Council (NRDC) and Federation of American Scientists. The photos first appeared Friday in the winter edition of the quarterly newsletter Imaging Notes. The photographs are sharp enough to identify objects on the ground about 3 feet in size. Such digital images were once the exclusive domain of U.S. technical intelligence agencies, but in recent years, commercial companies have deployed equally capable space-based cameras. Disclosure of the underground bases supports analyses of Pentagon and intelligence officials who say China is engaged in a secret military buildup that threatens U.S. interests, while stating publicly that its forces pose no threat. Defense Secretary Donald H. Rumsfeld said during a trip to China in October that Beijing was sending "mixed signals" by building up forces in secret and without explaining their purpose. Adm. Gary Roughead, commander of the Navy's Pacific Fleet, said he did not consider China "a threat." But he also said in a speech Tuesday that China's purpose behind its rapid military buildup is not fully known. "That's a little unclear," he said, noting that "increased transparency" is needed from China. The photographs included several shots of Chinese H-6 strategic bombers and related aerial refueling tankers at Dangyang airfield in Hubei province. Also, 70 nuclear-capable Qian-5 aircraft were photographed parked at an airfield in Jianqiao, Zhejiang province, on the East China Sea coast. The Pentagon's four-year strategy report made public earlier this month stated that China is emerging as a power with "the greatest potential to compete militarily with the United States." The report stated that Beijing is investing heavily in "strategic arsenal and capabilities to project power beyond its borders." The report did not provide specifics. U.S. officials said, however, that the secrecy of the Chinese buildup has fueled a debate within the U.S. government over the threat posed by that country. U.S. intelligence agencies recently produced a National Intelligence Estimate, or major interagency analysis, that concluded China is using strategic deception to fool the United States and other nations about its goals and programs, including its military buildup. Pentagon officials have asked China to allow visits to underground facilities such as the submarine tunnel and a command center in Beijing, but either the requests were denied or the existence of the sites was denied. "The Chinese have denied having any underground submarine facilities," the Pentagon official said, noting that the satellite photos indicate that China has misled the United States. Underground submarine sites are one of 10 major types of facilities hidden by the Chinese military, U.S. officials said. The others include nuclear missile storage facilities, other weapons plants, command centers and political leadership offices. In 2004, China revealed the first of a new class of submarines. The development of the Yuan-class submarines was kept secret through the use of an underground factory in south-central China, the officials said. Since 2002, Beijing has deployed 14 submarines. And it is working on a new ballistic-missile submarine, known as the Jin class, and two new Shang-class attack submarines. According to a classified Defense Intelligence Agency assessment, China's nuclear forces include about 45 long- range missiles, 12 submarine-launched missiles and about 100 short-range missiles each with a single warhead. By 2020, China's arsenal will include up to 220 long-range missiles, up to 44 submarine-launched missiles and up to 200 short-range missiles, the DIA report stated. Richard Fisher, a China military analyst at the International Assessment and Strategy Center, said that in addition to the northern submarine base, China also has a major submarine base at Yulin, on Hainan island in the South China Sea. The southern base gives Chinese missile submarines easier access to firing areas than the Yellow Sea base, which is more vulnerable to attacks from U.S. anti-submarine warfare systems. http://www.washtimes.com/national/20060216-020211-7960r.htm (Return to Articles and Documents List) Washington Post February 16, 2006 Pg. 1 Rice Asks For $75 Million To Increase Pressure On Iran By Glenn Kessler, Washington Post Staff Writer Secretary of State Condoleezza Rice asked Congress yesterday to provide $75 million in emergency funding to step up pressure on the Iranian government, including expanding radio and television broadcasts into Iran and promoting internal opposition to the rule of religious leaders. The request would substantially boost the money devoted to confronting Iran -- only $10 million is budgeted to support dissidents in 2006 -- and signals a new effort by the Bush administration to persuade other nations to join the United States in a coalition to bolster Iranian activists, halt Iran's funding of terrorism and stem its nuclear ambitions, State Department officials said. "The United States will actively confront the policies of this Iranian regime, and at the same time we are going to work to support the aspirations of the Iranian people for freedom in their own country," Rice told the Senate Foreign Relations Committee at a hearing on the administration's foreign affairs budget. Iranian officials announced this week that they have begun enriching uranium, a step that appears likely to ensure that the country's nuclear program will be discussed by the U.N. Security Council next month. But U.S. officials despair that any action by the council will be slow and deliberate, so yesterday's effort appears to be part of a sustained campaign to enlist other countries to act against Iran even sooner. Rice will travel to Egypt, Saudi Arabia and the United Arab Emirates next week in part to discuss the "strategic challenge to the world represented by the Iranian regime," the State Department said. Another senior official, Undersecretary R. Nicholas Burns, also will discuss Iran next week with his counterparts in the Group of Eight industrialized nations. Officials will also seek to coordinate strategy on Iran with NATO members. Sen. Sam Brownback (R-Kan.), who has called for $100 million to promote democracy in Iran, applauded the initiative as the "absolutely right move at this point in time." Although some Iranian activists have criticized the administration for moving too slowly to support them, Brownback said the administration had been "very methodical" in fighting terrorism.
Recommended publications
  • Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’S Terrorist Today (T4) Through OSINT By: Mr
    Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract June 2011 Country Studies Public Places Open Source Intelligence (OSINT) Link Directory Targeting Tomorrow’s Terrorist Today (T4) through OSINT by: Mr. E. Ben Benavides CounterTerrorism Infrastructure Money Laundering Gang Warfare Open Source Intelligence is the non-cloak- and-dagger aspect of fact collecting. (Alan D. Tompkins) Human Smuggling Weapon Smuggling IEDs/EFPs Creative Commons Copyright © Ben Benavides—no commercial exploitation without contract Table of Contents Table of Contents ........................................................................................................................ 2 Comments ................................................................................................................................... 7 Open Source Intelligence (OSINT): What It Is and What It Isn’t ................................................... 8 How To Use Open Source Intelligence ........................................................................................ 9 Key Army Access Sites .............................................................................................................. 17 Must Haves References ............................................................................................................ 18 Core Open Source Intelligence Documents & Guides ........................................................... 18 MI Officer Students ...............................................................................................................
    [Show full text]
  • View/Print Page As PDF
    MENU Policy Analysis / Muqawama Fake News Surrounding Qasim Muslih’s Arrest (Part 2): Release Claims by Michael Knights, Crispin Smith, Hamdi Malik May 28, 2021 Also available in Arabic ABOUT THE AUTHORS Michael Knights Michael Knights is the Boston-based Jill and Jay Bernstein Fellow of The Washington Institute, specializing in the military and security affairs of Iraq, Iran, and the Persian Gulf states. Crispin Smith Crispin Smith is an associate at a Washington-based national security law group. His research focuses on Iraqi security, human rights, and law of armed conflict issues. Hamdi Malik Dr. Hamdi Malik is an Associate Fellow with the Washington Institute, specializing in Shia militias. He is the co-founder of the Militia Spotlight platform, which offers in-depth analysis of developments related to the Iranian-backed militias in Iraq and Syria. He is the coauthor of the Institute's 2020 study "Honored, Not Contained: The Future of Iraq’s Popular Mobilization Forces." Brief Analysis Part of a series: Militia Spotlight or see Part 1: How to Use Militia Spotlight Militias made a concerted effort to create the false impression that their colleague had been released immediately, and the claim was soon echoed by major global media outlets. n May 26, the Iraqi state arrested militia leader Qasim Muslih in connection with the May 9 murder of activist O Ehab al-Wazni. In June 2020, when fourteen Kataib Hezbollah (KH) members were arrested and thirteen suspects not covered by the warrant were quickly released, muqawama (resistance) groups were able to badly damage the Iraqi government’s credibility by publicizing the release.
    [Show full text]
  • USAF Counterproliferation Center CPC Outreach Journal #510
    USAF COUNTERPROLIFERATION CENTER CPC OUTREACH JOURNAL Maxwell AFB, Alabama Issue No. 510, 23 June 2006 Articles & Other Documents: N. Korean Threat Activates Shield U.S. Pressures North Korea Over Missile Bush, At Merchant Academy, Warns Iran On Nuclear U.S., Russia Break Impasse On Plan To Keep Arms Program From Rogue Users U.S. Readies System For Missile Detection North Korea Disavows Its Moratorium On Testing Of Long-Range Missiles U.S. Still Working Kinks Out Of Defense Shield Few Moves Left With N. Korea Iran's Gray Area On Nuclear Arms For N. Korean Missile, U.S. Defense Is Hit Or Miss Iran And N. Korea Cautioned At Summit Lawmakers Cite Weapons Found In Iraq Chemical Arms Found In Iraq, Report Reveals If Necessary, Strike And Destroy Former Defense Officials Urge U.S. Strike On North N. Korea Offer Of 2-Way Talks Rejected Korean Missile Site Iran Says Answer On Atom Deal Will Take More Than U.S. Set To Down Korean Missile A Month For Diehards, Search For Iraq's W.M.D. Isn't Over Latest U.S. Missile-Defense Test A Success U.S. Rejects Suggestion To Strike N. Korea Before It Russia Voices Alarm To N. Korea Fires Missile Is Iran Studying North Korea's Nuclear Moves? Cheney Pushes Nuclear Initiative Welcome to the CPC Outreach Journal. As part of USAF Counterproliferation Center’s mission to counter weapons of mass destruction through education and research, we’re providing our government and civilian community a source for timely counterproliferation information. This information includes articles, papers and other documents addressing issues pertinent to US military response options for dealing with nuclear, biological and chemical threats and attacks.
    [Show full text]
  • Truth in the Information Age
    Beuth Hochschule für Technik Berlin Sprachenpreis 2019 Truth in the Information Age - Dead or Just Hidden? By Miriam Werner Theater- und Veranstaltungstechnik und -management 20.09.2019 Introduction Pokémon Go, iPhone 7, Donald Trump, Prince and Powerball. Those were the top five Google searches in 2016.1 Although it is hard to get a specific number from Google, it is estimated that Google handles more than two trillion searches per year. When doing the math that makes more than 63,000 searches per second.2 With numbers like these, you can see how important it is for us to gather information and with the right tools we have 24/7 access as well. If it didn’t matter what sort of information we receive, then everything would be fine. But in the era where expressions like “fake news” seem to pop up everywhere, the question seems to arise whether anything we read is true, or better yet, “is truth dead in the information age?” To fully understand all the nuances of this question a few definitions are required. When looking at the expression “information age” it refers to a period of time starting at the end of the 20th century and continuing into the foreseeable future. It is the change from the industrial to the post-industrial society where a large portion of the economy lies in information technology. It is shaped by the invention of the computer and telecommunication thereby changing how information is spread, managed and saved. 3 For this essay, I will be referring to the last three to four decades that include the invention of the internet, allowing information to travel around the world in seconds as well as offering access to more people than ever before.
    [Show full text]
  • Oleg Deripaska Has Struggled for Legitimacy in the United States, Where He Has Been Dogged by Civil Lawsuits Questioning the Methods He Used to Build That Empire
    The Globe and Mail (Canada) May 11, 2007 Friday Preferred by the Kremlin, shunned by the States BYLINE: SINCLAIR STEWART, With a report from Greg Keenan in Toronto SECTION: NEWS BUSINESS; STRONACH'S NEW PARTNER: 'ONE OF PUTIN'S FAVOURITE OLIGARCHS'; Pg. A1 LENGTH: 957 words DATELINE: NEW YORK He is perhaps the most powerful of Russia's oligarchs, a precocious - some would say ruthless - billionaire, who built his fortune against the bloody backdrop of that country's "aluminum wars" in the 1990s. He has nurtured close ties to the Kremlin, married the daughter of former president Boris Yeltsin's son-in-law, amassed an estimated $8-billion in personal wealth and built a corporate empire that stretches from metals and automobiles to aircraft and construction. Yet for all his success at home, 39-year-old Oleg Deripaska has struggled for legitimacy in the United States, where he has been dogged by civil lawsuits questioning the methods he used to build that empire. Mr. Deripaska has repeatedly denied allegations levelled against him, and he has not been specifically accused by American authorities of any crime. However, these whispers about shady business dealings may raise concerns about his $1.5-billion investment in Canada's Magna International, not to mention Magna's attempts to win control of DaimlerChrysler, an iconic American company. The United States has recently shown protectionist proclivities, citing national security concerns to quash both a Chinese state-owned oil company's bid for Unocal Ltd. and a planned acquisition of U.S. port service contracts by Dubai Ports World.
    [Show full text]
  • Principles in Countering Terror Threats | the Washington Institute
    MENU Policy Analysis / Interviews and Presentations Principles in Countering Terror Threats by Moshe Yaalon Feb 19, 2006 ABOUT THE AUTHORS Moshe Yaalon Moshe "Bogie" Yaalon, Israel's former defense minister and military chief of staff, was the Rosenblatt Distinguished Visiting Fellow at The Washington Institute in 2016. n February 19, 2006, Lt. Gen. (ret.) Moshe Yaalon, outgoing chief of staff of the Israel Defense Forces (IDF), O addressed the Intelligence Summit in Arlington, Virginia. General Yaalon is a distinguished military fellow at the Institute. The following is the prepared text of his remarks. In the past five years, the State of Israel has experienced an unprecedented war of violence and terror, initiated and orchestrated by the Palestinian leadership. More then 1,000 Israelis have been killed—over 70 percent of which have been civilians. In addition, about 7,500 Israelis have been wounded in more than 25,000 terror attacks. These past five years have witnessed more than 140 suicide bombings against the Israeli population, and Palestinian terrorists have launched hundreds of rockets into Israeli cities and villages. In the face of these attacks, the State of Israel steadily maintained—until the implementation of the Disengagement plan—one basic principle: under no circumstance should we surrender to terror. I cannot emphasize it enough: this is the primary and most important principle in addressing terror threats. No surrender. I wish now to review some of the major developments in international terrorism over the past five years, each of which spoke to the changing nature of terrorist threats. •First, in spite of the global war on terror, the international jihad network continues to be active.
    [Show full text]
  • Fact and Fiction
    ACTIVITY SHEET A Fact and Fiction There are many types of material produced in our digital age that are meant to persuade consumers, to sell products, or to exploit big issues—some more dangerous than others. An article that looks like news but is actually an advertisement for a new shopping mall is not as dangerous as an article that appears to be objective but is actually propaganda meant to influence a local election. Once you understand the varieties of non-news content and disinformation out there, you’re on your way to becoming an informed reader of news. INSTRUCTIONS Below, use what you learned in class to fill in the definition for each kind. Then, provide an example of that category of content that you have seen or read. If an example does not come to mind, imagine an example that would fit the description. DEFINITIONS EXAMPLES n Propaganda Example n Hoax Example n Agenda-Based Misrepresentation Example n Circular Reporting Example n Clickbait Example n Advertisements or Sponsored Content Example ACTIVITY SHEET B Be an Active News Consumer Spotting an artificial version of something can be hard. Counterfeit dollar bills are made to look identical to real currency. Pieces of forged art have been sold for millions of dollars. And spotting disinformation disguised to look like credible journalism can be tricky. At first, anyway. Fortunately, there are ways to look at news that help us tell serious journalism from other kinds of content. In the spaces below, paraphrase a piece of disinformation or non-news content and an example of credible journalism, both of which you’ll find online.
    [Show full text]
  • Download Current Issue
    Global Security and Intelligence Studies Volume 5, Number 2 • Fall / Winter 2020 © 2020 Policy Studies Organization Editorial Welcome ......................................................................................... vii Melissa Layne and Carter Matherly Policy Relevant Commentary Prediction, Plus Patchwork, Equals Pandemic ................................................. 1 Margaret Marangione Research Articles Just Short of Cyberwar: A Focus on Jus Ad Vim to Inform an Ethical Framework for Cyberspace ............................................................ 19 Al Lewis The New River Report: Socio-Ecological System Impacts of Anthropogenic Pollution on New River Communities in Belize ................... 41 Kristin Drexler International NGOs Targeted by Terror: The Impact of Religiosity on Independence, Neutrality, and Impartiality .............................................. 73 Kathryn Lambert How Norm-Based Issue Frames Shape Public Support for Refugee Protection Policy: An Analysis Based on Survey Experiments in France and Germany ....................................................................................... 99 Melissa Schnyder Operationalizing Intelligence Collection in a Complex World: Bridging the Domestic & Foreign Intelligence Divide ................................. 123 Jim Burch (cont’d.) Notes from the Field Wrangling Stochasticity & Deconstructing Dimensionality: An Illustration of Fractals in Discursive Spaces ........................................... 155 Douglas Rose Book Reviews Mindf*ck, Cambridge
    [Show full text]
  • ATP 2-33.4 Intelligence Analysis
    ATP 2-33.4 Intelligence Analysis JANUARY 2020 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes ATP 2-33.4, dated 18 August 2014. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.army.mil), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). *ATP 2-33.4 Army Techniques Publication Headquarters No. 2-33.4 Department of the Army Washington, DC, 10 January 2020 Intelligence Analysis Contents Page PREFACE............................................................................................................. vii INTRODUCTION ................................................................................................... xi PART ONE FUNDAMENTALS Chapter 1 UNDERSTANDING INTELLIGENCE ANALYSIS ............................................. 1-1 Intelligence Analysis Overview ........................................................................... 1-1 Conducting Intelligence Analysis ........................................................................ 1-5 Intelligence Analysis and Collection Management ............................................. 1-8 The All-Source Intelligence Architecture and Analysis Across the Echelons ..... 1-9 Intelligence Analysis During Large-Scale Ground Combat Operations ........... 1-11 Intelligence Analysis During the Army’s Other Strategic Roles ........................ 1-13 Chapter 2 THE INTELLIGENCE ANALYSIS PROCESS ..................................................
    [Show full text]
  • Bivictrix Therapeutics Plc (A Company Incorporated in England and Wales Under the Companies Act 2006 with Company Number 13470690)
    THIS DOCUMENT IS IMPORTANT AND REQUIRES YOUR IMMEDIATE ATTENTION. If you are in any doubt about the contents of this document, you should consult your stockbroker, bank manager, solicitor, accountant or other independent professional adviser who specialises in advising on the acquisition of shares and other securities and is duly authorised under the Financial Services and Markets Act 2000 (as amended) (“FSMA”), if you are resident in the UK, or if you are not resident in the UK, from another appropriately authorised independent adviser. This document, which comprises an AIM admission document drawn up in accordance with the AIM Rules, has been issued in connection with the application for admission to trading on AIM of the entire issued and to be issued ordinary share capital of the Company. This document does not constitute an offer to the public requiring an approved prospectus under section 85 of FSMA and, accordingly, this document does not constitute a prospectus for the purposes of FSMA and the Prospectus Regulation Rules and has not been pre-approved by the FCA pursuant to section 85 of FSMA. Application has been made for the entire issued and to be issued ordinary share capital of the Company (the “Shares”) to be admitted to trading on AIM, a market operated by the London Stock Exchange. It is expected that Admission will become effective, and that dealings in the Shares will commence on 11 August 2021. The Shares are not dealt on any other recognised investment exchange and no application has been or is being made for the Shares to be admitted to any such exchange.
    [Show full text]
  • Journalistic Responsibility and the Fight Against the Spread of False Information Online
    Pierce-The American College of Greece Model United Nations | 2019 Committee: UN Educational, Scientific and Cultural Organization (UNESCO) Issue: Journalistic responsibility and the fight against the spread of false information online Student officer: Manos Moschos Position: Deputy President PERSONAL INTRODUCTION Dear delegates, My name is Manos Moschos and I am a student at Pierce-The American College of Greece. Although this will be my first-time chairing, I wish that this study guide will end up being beneficial. I hope you are as excited as I am for the following MUN conference and looking forward to further embracing the MUN community. I started attending conferences in 2017 and I can assure you that Model United Nations is a unique experience and a whole world itself. As a Deputy President of the UNESCO, it is my personal aim to help every single one of you before and during the committee so as to ensure that the debate will be carried out successfully, maximizing its quality and providing my assistance when needed, but most importantly making sure that the 3d ACGMUN is one of your most fruitful conferences. I would also like to congratulate all of you on choosing to attend UNESCO while simultaneously I can reassure you that you are going to enjoy it. The topics of this specific committee are not only very crucial, but also of international concern and thus, in order to be solved, they need the implementation of the appropriate measures, which could be suggested in your resolutions. All delegations are expected and strongly encouraged to fully participate in the conference.
    [Show full text]
  • Understanding the Public Temper Through an Evaluation of Rumours: an Ethnographical Method Using Educational Technology
    ARTICLE DOI: 10.1057/s41599-018-0197-2 OPEN Understanding the public temper through an evaluation of rumours: an ethnographical method using educational technology Abdulrahman Essa Al Lily1, Shaher R. Elayyan2, Ahmed Ali Alhazmi3 & Saleh Alzahrani1 ABSTRACT The power of rumours is that they can be broadly exchanged, generating a ‘public temper’ (which is everybody’s temper without being anybody’s temper in particular). 1234567890():,; This article, therefore, describes an approach to measuring the public temper, examining particularly the public temper of an Arab society, namely Saudi Arabia. It addresses the following research question: is it possible to analyse existing (scholarly) rumours to see if they can be used as informants of the public temper of the culture in which they exist? This question is answered ethnographically by analysing 579 Arabic online rumours collected by students as part of their critical engagement with educational technology. Having analysed the data, four categories emerged: the concerns, interests, attitudes and values of Saudi Arabia. According to the literature, these four categories, taken together, constitute the emotional domain (i.e., the public temper) of a society. Thus, a theoretical proposition (and contribution to the existing literature regarding sociology) is that rumours mirror the public temper of a culture, reflecting a range of emotions from simple to complex (from concerns, interests and attitudes to values). Simpler emotions (e.g., concerns) appear to be more easily affected by rumours than more complex emotions (e.g., values). An implication of this study is that rumours have ‘biographies’, which detail public tempers across space and time. Rumours are ‘records’ of public tempers that should be read in the same way archaeologists read land- scapes and remains.
    [Show full text]