4 Terrorism by the State
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Introduction
INTRODUCTION IN A CARTOON in a Rio de Janeiro satirical magazine (fig. I.1), two black city dwellers chat in vernacular Portuguese about the infamous urban reforms that took place under Mayor Francisco Pereira Passos between 1903 and 1906. Their conversation touches on key aspects of the relationship between people of color, the government, and the modernizing spaces of the city: “The government’s knocking down houses; Mister Passos too. Mister Oswaldo from the hygiene department, he’s shutting down everything that don’t smell good . Tell me, where are we supposed to live?” “Well, I hear the experts been talking ’bout workers’ housing problems.” “To hell with the experts! You don’t make a house with words, or letters on a page. By the time they sort this out we’ll be in a fine mess!” “Well, there’s no way I’m living on the streets. When I have nowhere to lay down my bundle I’ll make some noise and force the government to put a roof over my head . .” “That’s easy for you to say, you don’t have a wife and children . .” “Then be like me—don’t have any! Nobody can make us! This is a free republic.” 3 © 2020 University of Pittsburgh Press. All rights reserved. 4 DEFIANT GEOGRAPHIES The magazine’s cartoonist imagines a discussion in which the humble black worker on the left criticizes city and state officials for their inaction in the face of the housing crisis that they have aggravated in a frenzy of demolition related to the reforms. -
Central America (Guatemala, El Salvador, Honduras, Nicaragua): Patterns of Human Rights Violations
writenet is a network of researchers and writers on human rights, forced migration, ethnic and political conflict WRITENET writenet is the resource base of practical management (uk) independent analysis e-mail: [email protected] CENTRAL AMERICA (GUATEMALA, EL SALVADOR, HONDURAS, NICARAGUA): PATTERNS OF HUMAN RIGHTS VIOLATIONS A Writenet Report by Beatriz Manz (University of California, Berkeley) commissioned by United Nations High Commissioner for Refugees, Status Determination and Protection Information Section (DIPS) August 2008 Caveat: Writenet papers are prepared mainly on the basis of publicly available information, analysis and comment. All sources are cited. The papers are not, and do not purport to be, either exhaustive with regard to conditions in the country surveyed, or conclusive as to the merits of any particular claim to refugee status or asylum. The views expressed in the paper are those of the author and are not necessarily those of Writenet or UNHCR. TABLE OF CONTENTS Acronyms ................................................................................................... i Executive Summary ................................................................................ iii 1 Introduction........................................................................................1 1.1 Regional Historical Background ................................................................1 1.2 Regional Contemporary Background........................................................2 1.3 Contextualized Regional Gang Violence....................................................4 -
PERSPECTIVES on TERRORISM Volume 11, Issue 5
ISSN 2334-3745 Volume V, Issue 5 October 2017 PERSPECTIVES ON TERRORISM Volume 11, Issue 5 Table of Contents Welcome from the Editors......................................................................................................1 Articles Countering Violent Extremism in Prisons: A Review of Key Recent Research and Critical Research Gaps.........................................................................................................................2 by Andrew Silke and Tinka Veldhuis The New Crusaders: Contemporary Extreme Right Symbolism and Rhetoric..................12 by Ariel Koch Exploring the Continuum of Lethality: Militant Islamists’ Targeting Preferences in Europe....................................................................................................................................24 by Cato Hemmingby Research Notes On and Off the Radar: Tactical and Strategic Responses to Screening Known Potential Terrorist Attackers................................................................................................................41 by Thomas Quiggin Resources Terrorism Bookshelf.............................................................................................................50 Capsule Reviews by Joshua Sinai Bibliography: Terrorist Organizations: Cells, Networks, Affiliations, Splits......................67 Compiled and selected by Judith Tinnes Bibliography: Life Cycles of Terrorism..............................................................................107 Compiled and selected by Judith -
Social Disorganization and the Public Level of Crime Control: a Spatial Analysis of Ecological Predictors of Homicide Rates in Bogota, Colombia
City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 2012 Social Disorganization and the Public Level of Crime Control: A Spatial Analysis of Ecological Predictors of Homicide Rates in Bogota, Colombia Gipsy Escobar Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/1730 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] SOCIAL DISORGANIZATION AND THE PUBLIC LEVEL OF CRIME CONTROL: A SPATIAL ANALYSIS OF ECOLOGICAL PREDICTORS OF HOMICIDE RATES IN BOGOTA, COLOMBIA by Gipsy Escobar A dissertation submitted to the Graduate Faculty in Criminal Justice in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2012 © 2012 GIPSY ESCOBAR All Rights Reserved ii This manuscript has been read and accepted by the Graduate Faculty in Criminal Justice in satisfaction of the dissertation requirement for the degree of Doctor of Philosophy. Joshua Freilich ___________________________ ______________________________ Date Chair of Examining Committee Joshua Freilich ___________________________ ______________________________ Date Executive Officer Desmond Arias Valerie West Michael D. White Supervisory Committee THE CITY UNIVERSITY OF NEW YORK iii ABSTRACT SOCIAL DISORGANIZATION AND THE PUBLIC LEVEL OF CRIME CONTROL: A SPATIAL ANALYSIS OF ECOLOGICAL PREDICTORS OF HOMICIDE IN BOGOTA, COLOMBIA by Gipsy Escobar Advisor: Joshua Freilich, J.D., Ph.D. Research in the social disorganization tradition has found community disadvantage to be one of the strongest and most consistent macro-level predictors of homicides in urban areas in the United States (Pratt & Cullen 2005). -
China╎s Cultural Revolution and How the Red Guard
University of Portland Pilot Scholars History Undergraduate Publications and Presentations History 12-2020 The Kids Aren’t Alright: China’s cultural revolution and how the Red Guard impacted family Lillian Healy Follow this and additional works at: https://pilotscholars.up.edu/hst_studpubs Part of the Asian History Commons, and the Chinese Studies Commons Citation: Pilot Scholars Version (Modified MLA Style) Healy, Lillian, "The Kids Aren’t Alright: China’s cultural revolution and how the Red Guard impacted family" (2020). History Undergraduate Publications and Presentations. 32. https://pilotscholars.up.edu/hst_studpubs/32 This Thesis is brought to you for free and open access by the History at Pilot Scholars. It has been accepted for inclusion in History Undergraduate Publications and Presentations by an authorized administrator of Pilot Scholars. For more information, please contact [email protected]. The Kids Aren’t Alright: China’s cultural revolution and how the Red Guard impacted family By Lillian Healy Submitted in partial fulfillment of the requirements for the degree of Bachelor of Arts in History University of Portland December 2020 When talking about the younger generation, many people think about their potential to change the world. As evident by modern social and political issues, young people are more likely to advocate for change. From social media platforms to protests, youth have become increasingly involved due to the information age that we live in. The narrative that kids receive is important, as how children are raised will impact what kind of person they will be. Whether its college students advocating for equal rights or younger students protesting for gun safety regulations, the world view children are exposed to will impact how they think and what they believe in. -
Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions. -
THE SECURITISATION of TIBETAN BUDDHISM in COMMUNIST CHINA Abstract
ПОЛИТИКОЛОГИЈА РЕЛИГИЈЕ бр. 2/2012 год VI • POLITICS AND RELIGION • POLITOLOGIE DES RELIGIONS • Nº 2/2012 Vol. VI ___________________________________________________________________________ Tsering Topgyal 1 Прегледни рад Royal Holloway University of London UDK: 243.4:323(510)”1949/...” United Kingdom THE SECURITISATION OF TIBETAN BUDDHISM IN COMMUNIST CHINA Abstract This article examines the troubled relationship between Tibetan Buddhism and the Chinese state since 1949. In the history of this relationship, a cyclical pattern of Chinese attempts, both violently assimilative and subtly corrosive, to control Tibetan Buddhism and a multifaceted Tibetan resistance to defend their religious heritage, will be revealed. This article will develop a security-based logic for that cyclical dynamic. For these purposes, a two-level analytical framework will be applied. First, the framework of the insecurity dilemma will be used to draw the broad outlines of the historical cycles of repression and resistance. However, the insecurity dilemma does not look inside the concept of security and it is not helpful to establish how Tibetan Buddhism became a security issue in the first place and continues to retain that status. The theory of securitisation is best suited to perform this analytical task. As such, the cycles of Chinese repression and Tibetan resistance fundamentally originate from the incessant securitisation of Tibetan Buddhism by the Chinese state and its apparatchiks. The paper also considers the why, how, and who of this securitisation, setting the stage for a future research project taking up the analytical effort to study the why, how and who of a potential desecuritisation of all things Tibetan, including Tibetan Buddhism, and its benefits for resolving the protracted Sino- Tibetan conflict. -
Aida World Congress 2006
AIDA WORLD CONGRESS 2006 INSURANCE, REINSURANCE AND THE IMPACT OF TERRORISM General Reporters: Professor Rob Merkin Professor Jerome Kullmann I THE QUESTIONNAIRE 1. MEANING OF TERRORISM (a) Is there any general definition of “terrorism”, “terrorist activity” or any related term in the general law within your jurisdiction? (b) If there is a definition, for what legal purposes is the definition relevant? 2. TERRORISM AND POLICY WORDINGS (a) To what extent do insurance and reinsurance policies written in your country exclude the liability of insurers and reinsurers for war risks? If so, is any distinction drawn between commercial and consumer contracts. Please answer this question on a class/sector by class/sector basis. (b) To what extent do insurance and reinsurance policies written in your country exclude the liability of insurers and reinsurers for terrorism risks? If so, is any distinction drawn between commercial and consumer contracts? Please answer this question on a class/sector by class/sector basis. (c) To what extent do war risks or exclusions and terrorism risks or exclusions or those for other acts of political or other violence such as malicious damage overlap? (d) Are there any market definitions of terrorism in use for insurance or reinsurance contracts? Please answer this question on class/sector by class/sector basis. If these have been introduced in response to recent developments how do these differ from previous provisions? (e) If there are policy restrictions on or exclusions of terrorism cover, when were these first -
Patterns of Terrorism in the United States, 1970-2013
Patterns of Terrorism in the United States, 1970-2013 Final Report to Resilient Systems Division, DHS Science and Technology Directorate October 2014 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 8400 Baltimore Ave, Suite 250 • College Park, MD 20740 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The author of this report is Erin Miller at the University of Maryland. Questions about this report should be directed to Erin Miller at [email protected]. The initial collection of data for the Global Terrorism Database (GTD) data was carried out by the Pinkerton Global Intelligence Services (PGIS) between 1970 and 1997 and was donated to the University of Maryland in 2001. Digitizing and validating the original GTD data from 1970 to 1997 was funded by a grant from the National Institute of Justice in 2004 (PIs Gary LaFree and Laura Dugan; grant number: NIJ2002-DT-CX-0001) and in 2005 as part of the START Center of Excellence by the Department of Homeland Security Science and Technology Directorate (DHS S&T), Office of University Programs (PI Gary LaFree; grant numbers N00140510629 and 2008-ST-061-ST0004). Data collection for incidents that occurred between January 1998 and March 2008 and updates to the earlier data to make it consistent with new GTD coding criteria were funded by the DHS S&T Human Factors/Behavioral Sciences Division (HFD) (PIs Gary LaFree and Gary Ackerman; contract number HSHQDC-05-X-00482) and conducted by database staff at the National Consortium for the Study of Terrorism and Responses to Terrorism (START) and the Center for Terrorism and Intelligence Studies (CETIS). -
Jurisdiction Over Terrorists Who Take Hostages: Efforts to Stop Terror-Violence Against United States Citizens Elizabeth R
American University International Law Review Volume 2 | Issue 1 Article 3 1987 Jurisdiction Over Terrorists Who Take Hostages: Efforts to Stop Terror-Violence Against United States Citizens Elizabeth R. P. Bowen Follow this and additional works at: http://digitalcommons.wcl.american.edu/auilr Part of the International Law Commons Recommended Citation Bowen, Elizabeth R. P. "Jurisdiction Over Terrorists Who Take Hostages: Efforts to Stop Terror-Violence Against United States Citizens." American University International Law Review 2, no. 1 (1987): 153-202. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University International Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTES AND COMMENTS JURISDICTION OVER TERRORISTS WHO TAKE HOSTAGES: EFFORTS TO STOP TERROR-VIOLENCE AGAINST UNITED STATES CITIZENS Elizabeth R. P. Bowen* INTRODUCTION ............................... 154 I. INTERNATIONAL TERRORISM: A GLOBAL CON- C ER N .......................................... 157 A. Hostage Taking: A Terror Tactic ............... 157 B. Definitional Dilemma: Terrorists v. Freedom Fighters ................................... 158 II. UNDERLYING AGITATORS .................... 162 A. State-Sponsored Terrorism ..................... 162 B. The Nature of Terrorist Warfare: Invisible Block- ades ........................................ 164 C. Television: The Role of the Media in the Growth of International Terrorism ........................ 165 1. First Amendment Balance ................. 166 2. Law Enforcement and Media .............. 167 D. Extradition: The Key to Prosecution ............. 168 III. UNITED STATES RESPONSE TO TERRORISM .. 171 A. Domestic Legislation .......................... 172 B. International Efforts of the United States ....... -
Steam-Valve Theory and Political Efficacy
The Steam-valve Theory: Terrorism and Political Efficacy by Edith Wu B.A. (Honours), Simon Fraser University, 2012 Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts in the School of Criminology Faculty of Arts and Social Sciences Edith Wu 2017 SIMON FRASER UNIVERSITY Summer 2017 All rights reserved. However, in accordance with the Copyright Act of Canada, this work may be reproduced, without authorization, under the conditions for Fair Dealing. Therefore, limited reproduction of this work for the purposes of private study, research, criticism, review and news reporting is likely to be in accordance with the law, particularly if cited appropriately. Approval Name: Edith Wu Degree: Master of Arts Title of Thesis: The Steam-valve Theory: Terrorism and Political Efficacy Examining Committee: Chair: Martin Andresen Associate Director and Professor Garth Davies Senior Supervisor Associate Professor Martin Bouchard Supervisor Professor André Gerolymatos External Examiner Director and Professor Stavros Niarchos Foundation Centre for Hellenic Studies Simon Fraser University Date Defended /Approved: May 24, 2017 ii Abstract A wealth of literature examines terrorism and its relationship with political participation, often concerning legitimate opportunities to effect political change. Overall, these studies support the notion that a democratic system is an effective bulwark against terrorism. There is, however, a paucity of research that evaluates societal activism from the citizen’s perspective and its effects on political violence. When a disgruntled public lacks proper avenues to be heard and engage meaningfully in the political process, terrorist events may arise. Using data from the Global Terrorism Database, World Values Survey, World Bank, and Freedom House, a multilevel negative binomial analysis is conducted to assess terrorist events in relation to political activism across 18 countries from 1990 to 2012, while considering factors often cited as catalysts for political violence. -
ABSTRACT Title of Document: the ANTI-CONFUCIAN CAMPAIGN
ABSTRACT Title of Document: THE ANTI-CONFUCIAN CAMPAIGN DURING THE CULTURAL REVOLUTION, AUGUST 1966-JANUARY 1967 Zehao Zhou, Doctor of Philosophy, 2011 Directed By: Professor James Gao, Department of History This dissertation examines the attacks on the Three Kong Sites (Confucius Temple, Confucius Mansion, Confucius Cemetery) in Confucius’s birthplace Qufu, Shandong Province at the start of the Cultural Revolution. During the height of the campaign against the Four Olds in August 1966, Qufu’s local Red Guards attempted to raid the Three Kong Sites but failed. In November 1966, Beijing Red Guards came to Qufu and succeeded in attacking the Three Kong Sites and leveling Confucius’s tomb. In January 1967, Qufu peasants thoroughly plundered the Confucius Cemetery for buried treasures. This case study takes into consideration all related participants and circumstances and explores the complicated events that interwove dictatorship with anarchy, physical violence with ideological abuse, party conspiracy with mass mobilization, cultural destruction with revolutionary indo ctrination, ideological vandalism with acquisitive vandalism, and state violence with popular violence. This study argues that the violence against the Three Kong Sites was not a typical episode of the campaign against the Four Olds with outside Red Guards as the principal actors but a complex process involving multiple players, intraparty strife, Red Guard factionalism, bureaucratic plight, peasant opportunism, social ecology, and ever- evolving state-society relations. This study also maintains that Qufu locals’ initial protection of the Three Kong Sites and resistance to the Red Guards were driven more by their bureaucratic obligations and self-interest rather than by their pride in their cultural heritage.