Pirates, Anarchists, and Terrorists: Violence and the Boundaries of Sovereignt Authority

Total Page:16

File Type:pdf, Size:1020Kb

Pirates, Anarchists, and Terrorists: Violence and the Boundaries of Sovereignt Authority ABSTRACT Title of dissertation: PIRATES, ANARCHISTS, AND TERRORISTS: VIOLENCE AND THE BOUNDARIES OF SOVEREIGNT AUTHORITY Mark Alexander Shirk, Doctor of Philosophy, 2014 Dissertation direct by: Prof. Virginia Haufler Department of Government and Politics This study examines how states combat episodes of violence that pose an ontological threat to the state. Sovereignty is a bundle of practices that draw, maintain, and redraw boundaries around political authority, the state is the polity constructed by these boundaries. The boundaries can be physical such as a border between state or conceptual such as that between public and private. These boundaries create the ‘conceptual maps that state leaders use to make sense of the world. The threat posed by violent action is constructed by narratives. Revisionist narratives of violence, the focus of this study, are illegible to states using current conceptual maps and therefore cannot be defeated while they remain. States are forced to redraw the boundaries of sovereign authority in the course of combating these threats, resulting in a transformed state. In my three cases – golden age piracy in the 18 th century, anarchist ‘propagandists of the deed’ at the turn of the 20 th , and al Qaeda – I demonstrate that the state develops creative solutions to concrete crises. For instance, golden age pirates exploited a surfeit of ungoverned land and open markets in the early 18th century Atlantic to attack trade forcing colonial states to bring their Atlantic colonies into the domestic sphere and shift the sea into an open space. Similarly, the rise of the labor movement and the development fingerprint databases and the universal passport system were, in part, responses to the threat of anarchists propounding “propaganda of the deed” at the turn of the 20 th century. Finally, counterterror innovations devised to combat al Qaeda, such as targeted killing and bulk data collection, have transformed borders from sites of exclusion designed to keep out undesirables to sites of collection where they are tracked and controlled. Each case demonstrates how states re-inscribe themselves by redrawing conceptual boundaries, such as between in order to make sense of an episode of revisionist and respond effectively. PIRATES, ANARCHISTS, AND TERRORISTS: VIOLENCE AND THE BOUNDARIES OF SOVEREIGN AUTHORITY by Mark Alexander Shirk Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park in partial fulfillment of the requirements for the degree of Doctor of Philosophy 2014 Advisory Committee: Professor Virginia Haufler, Chair Professor David Cunningham Professor Daniel Green Professor Paul Huth Professor Meyer Kestnbaum © Copyright by Mark Alexander Shirk 2014 Dedication This Dissertation is dedicated to my wonderful wife Fiona, who has not only provided support above and beyond what could be imagined but also proved a tireless editor. I also dedicate this to my parents, Alex and Bev, who supported me throughout my long education and my dog Cleo who doesn’t care about the vicissitudes of academic life, only that she gets fed and that I pet her belly. ii Acknowledgements This dissertation was not written alone and I have many people to mention without whom I could not have finished it. First, I am indebted to the Horowitz Foundation for Social Policy for a Dissertation Grant and the Harold D. Lasswell Award. This funded my archival research in London and Paris. Without it this would be a much different and much weaker project. This grant also allowed me to hire Annie Rehill to provide valuable translations of French archival material. I would also like to thank my dissertation committee: David Cunningham, Daniel Green, Paul Huth, Meyer Kestnbaum as well as my chair, Virginia Haufler who pushed hard for me to undertake archival research and do interviews despite my early reluctance. I also want to thank, in no particular order, Ken Conca, Patrick Thaddeus Jackson, George Quester, Scott Kastner, Jacqui Ignatova, Quddus Snyder, Ken Matis, Karol Soltan, Jennifer Hadden, Daniel Nexon, Barak Mendelsohn, Jeppe Mulich, Kirwin Ray Schaffer, Edward Lucas, Christian Bueger, Jan Stockbruegger, Jorg Kustermans, Andreas Behnke, Jennifer Lobasz, Frederic Shaffer, Lily Ling, Sheryl Strosschein, Bridget Coggins, and Hans-Martin Jaeger for comments on various parts and drafts of this project at the University of Maryland, in private conversations, and/or at conference panels and workshops. If I forgot anyone I sincerely apologize. iii Table of Contents List of Tables……………………………………………………………………...…….vi Chapter 1: Introduction………………………………………………………………..1 The argument……………………………………………………………………...6 Method…………………………………………………………………………...12 Plan of dissertation……………………………………………………………….19 Chapter 2: The State, Sovereignty, and Boundaries…………………………………26 Sovereignty in international relations……………………………………………28 The state and sovereignty……………………………………………………..….36 Boundaries………………………………………………………………….……42 Sovereignty and boundary drawing as practice……………………………….…48 The state as a bounded polity……………………………………………….……55 Conclusion……………………………………………………………………….58 Chapter 3: Violence, Threat, and the Boundaries of Sovereign Authority…………..61 Terrorism and threat……………………………………………………………...63 Violence, narrative, and threat…………………………………………………...69 Narratives of violence……………………………………………………………72 Significance……………………………………………………………..………..76 Revisionist violence and sovereign boundaries…………………………….……87 Shattering………………………………………………………………………...93 Re-inscribing…………………………………………………………………..…98 Conclusion……………………………………………………………………...102 Chapter 4: The Golden Age of Piracy and the Creation of an Atlantic World…..…104 Who were the golden age pirates?.......................................................................105 “No peace beyond the Line”……………………………………………………108 “Committing depredations and acts of hostility”…………………………...…..118 “Hostes humani generis”………………………………………………………..121 “How little acts of grace and mercy work on these vermine”……………….…127 “More effectually contribute to the suppressing of them”……………….……..130 “The absence of sovereignty over the oceans is not a timeless feature”……….140 Conclusion……………………………………………………………………...144 Chapter 5: Propaganda of the Deed, Passports, and Boundaries in Europe at the Turn of the 20 th Century…………………………………147 “Believing in a better future”……………………………………………...……146 “The anarchist assassin simply murders at haphazard”………………………...156 “Satan has made himself a dynamiter”………………………………………....161 “Vive l’anarchie!”………………………………………………………………168 “A mortal enemy of anarchy could not have done more”……………………...180 Conclusion……………………………………………………………………...195 iv Chapter 6: Drones, Data, and Boundaries in the Global War on Terror……………………………….…………………..199 “They’d been here all along”………………………………………………...…200 “This is civilization’s fight”…………………………………………………….208 “Not whether but when”………………………………………………………..218 “The robot is our answer to the suicide bomber”…………………...............…221 “There will be chalk dust on my cleats”………………………………………..240 Conclusion…………………………………………………………………...…252 Chapter 7: Boundaries in the 21 st century…………………………………………..255 Trends………………………………………………………………………..…255 Sovereignty…………………………………………………………………..…259 Globalization……………………………………………………………………261 Privacy in the 21 st century…………………………………………………..….265 Ways forward………………………………………………………………..…277 Works Cited………………………..……………………………………………..…….281 v List of Tables Table 3.1: Narratives in Historical Episodes of Violence……………………..…………75 Table 3.2: Threats and Dynamics Involved in Each Narrative………….……………….85 Table 4.1: English Trade (000 Tons): Entries and Clearances, 1686-1779…………….119 vi Chapter 1: Introduction At 2:49pm on April 15, 2013 the first of three explosions took place at the finish line of the Boston Marathon, resulting in 3 dead and 264 injured. A few days later the National Guard and Boston Police were on a manhunt for suspects Tamerlan and Dzhokar Tsarnaev. Tracked by a cell phone left in a car they had stolen, the Tsarnaev brothers would find themselves in a shootout with the authorities that killed 26 year old Tamerlan and injured 19 year old Dzhokar before the latter was able to escape. Thus began the manhunt; surreal scenes where armed National Guardsmen blocked off a perimeter thought to be where Dzhokar Tsarnaev was hiding and then went house to house, knocking on doors and searching the suburban homes of the residents of Watertown, Massachusetts. They entered houses and searched backyards producing a contrasting aesthetic of quiet, sanitized suburbia against the urgency and raw power of militarized searches. Only thing is, Dzhokar Tsarnaev was not within the area blocked out and searched. He had escaped onto a boat just outside the area, hiding under a tarp. After hours of these searches, it was only after a local man noticed blood on his boat and tipped off the police that Dzhokar Tsarnaev was arrested. This story stands as a metaphor for many the challenges posed to the state in the 21 st century. The Boston policemen and National Guardsmen sealed off a particular territory and searched it slowly, house by house, using a method of force that could be seen as an exemplify the modern territorial state attempting to exercise authority and power in the way that it knows best. Dzhokar Tsarnaev is one of the types of challenges which are posed by what has come to be known as ‘globalization’; weakening the state 1 from a place, physical or conceptual, just outside of its reach. No matter how much
Recommended publications
  • How Laura Poitras Helped Snowden Spill His Secrets
    How Laura Poitras Helped Snowden Spill His Secrets Documentary filmmaker Laura Poitras in Berlin. By PETER MAASS Published: August 13, 2013 This past January, Laura Poitras received a curious e-mail from an anonymous stranger requesting her public encryption key. For almost two years, Poitras had been working on a documentary about surveillance, and she occasionally received queries from strangers. She replied to this one and sent her public key — allowing him or her to send an encrypted e-mail that only Poitras could open, with her private key — but she didn’t think much would come of it. The stranger responded with instructions for creating an even more secure system to protect their exchanges. Promising sensitive information, the stranger told Poitras to select long pass phrases that could withstand a brute-force attack by networked computers. “Assume that your adversary is capable of a trillion guesses per second,” the stranger wrote. Before long, Poitras received an encrypted message that outlined a number of secret surveillance programs run by the government. She had heard of one of them but not the others. After describing each program, the stranger wrote some version of the phrase, “This I can prove.” 1 From www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?hpw 20 August 2013 Seconds after she decrypted and read the e-mail, Poitras disconnected from the Internet and removed the message from her computer. “I thought, O.K., if this is true, my life just changed,” she told me last month. “It was staggering, what he claimed to know and be able to provide.
    [Show full text]
  • Fighting for France's Political Future in the Long Wake of the Commune, 1871-1880
    University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2013 Long Live the Revolutions: Fighting for France's Political Future in the Long Wake of the Commune, 1871-1880 Heather Marlene Bennett University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the European History Commons Recommended Citation Bennett, Heather Marlene, "Long Live the Revolutions: Fighting for France's Political Future in the Long Wake of the Commune, 1871-1880" (2013). Publicly Accessible Penn Dissertations. 734. https://repository.upenn.edu/edissertations/734 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/734 For more information, please contact [email protected]. Long Live the Revolutions: Fighting for France's Political Future in the Long Wake of the Commune, 1871-1880 Abstract The traumatic legacies of the Paris Commune and its harsh suppression in 1871 had a significant impact on the identities and voter outreach efforts of each of the chief political blocs of the 1870s. The political and cultural developments of this phenomenal decade, which is frequently mislabeled as calm and stable, established the Republic's longevity and set its character. Yet the Commune's legacies have never been comprehensively examined in a way that synthesizes their political and cultural effects. This dissertation offers a compelling perspective of the 1870s through qualitative and quantitative analyses of the influence of these legacies, using sources as diverse as parliamentary debates, visual media, and scribbled sedition on city walls, to explicate the decade's most important political and cultural moments, their origins, and their impact.
    [Show full text]
  • The Continuum Companion to Anarchism
    The Continuum Companion to Anarchism 9781441172129_Pre_Final_txt_print.indd i 6/9/2001 3:18:11 PM The Continuum Companion to Anarchism Edited by Ruth Kinna 9781441172129_Pre_Final_txt_print.indd iii 6/9/2001 3:18:13 PM Continuum International Publishing Group The Tower Building 80 Maiden Lane 11 York Road Suite 704 London SE1 7NX New York, NY 10038 www.continuumbooks.com © Ruth Kinna and Contributors, 2012 All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitt ed, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the permission of the publishers. E ISBN: 978-1-4411-4270-2 Library of Congress Cataloging-in-Publication Data A catalog record of this title is available from the Library of Congress. Typeset by Newgen Imaging Systems Pvt Ltd, Chennai, India Printed and bound in the United States of America 9781441172129_Pre_Final_txt_print.indd iv 6/9/2001 3:18:13 PM Contents Contributors viii Acknowledgements xiv Part I – Research on Anarchism 1 Introduction 3 Ruth Kinna Part II – Approaches to Anarchist Research 2 Research Methods and Problems: Postanarchism 41 Saul Newman 3 Anarchism and Analytic Philosophy 50 Benjamin Franks 4 Anarchism and Art History: Methodologies of Insurrection 72 Allan Antliff 5 Participant Observation 86 Uri Gordon 6 Anarchy, Anarchism and International Relations 96 Alex Prichard Part III – Current Research in Anarchist Studies 7 Bridging the Gaps: Twentieth-Century Anglo-American Anarchist Thought 111 Carissa Honeywell 8 The Hitchhiker as Theorist: Rethinking Sociology and Anthropology from an Anarchist Perspective 140 Jonathan Purkis 9 Genders and Sexualities in Anarchist Movements 162 Sandra Jeppesen and Holly Nazar v 9781441172129_Pre_Final_txt_print.indd v 6/9/2001 3:18:13 PM Contents 10 Literature and Anarchism 192 David Goodway 11 Anarchism and the Future of Revolution 212 Laurence Davis 12 Social Ecology 233 Andy Price 1 3 Leyendo el anarchismo a través de ojos latinoamericanos : Reading Anarchism through Latin American Eyes 252 Sara C.
    [Show full text]
  • Patterns of Interacting and Mythologies of Change
    RESONANT MESSAGING: PATTERNS OF INTERACTING AND MYTHOLOGIES OF CHANGE Howard A. Thompson B.A.Sc., University of Ottawa, 1984 PROJECT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF BUSINESS ADMINISTRATION EMBA Program in the Faculty Business Administration O Howard A. Thompson 2003 SIMON FRASER UNIVERSITY December 2003 All rights reserved. This work may not be reproduced in whole or in part, by photocopy or other means, without permission of the author. Name: Howard A. Thompson Degree: Master of Business Administration Title of Project: RESONANT MESSAGING: Patterns of Interacting and Mythologies of Change Supervisory Committee: Dr. Mark Wexler Professor Faculty of Business Administration br%arolyn Smart Associate Professor Faculty of Business Administration Date Approved: Executive MBA Program Partial Copyright License I hereby grant to Simon Fraser University the right to lend my thesis, project or extended essay (the title of which is shown below) to users of the Simon Fraser University Library, and to make partial or single copies only for such users or in response to a request from the library of any other university, or other educational institution, on its own behalf or for one of its users. I further agree that permission for multiple copying of this work for scholarly purposes may be granted by me or the Dean of Graduate Studies. It is understood that copying or publication of this work for financial gain shall not be allowed without my written permission. Title of Thesis/Project/Extended Essay Resonant Messaging: Patterns of Interacting and Mythologies of Change Author: / Howard Thompson Date / This paper examines the relationships between an organization's patterns-of-interacting and the under-structure of heroic message-making in times of momentous organizational transition.
    [Show full text]
  • When Fear Is Substituted for Reason: European and Western Government Policies Regarding National Security 1789-1919
    WHEN FEAR IS SUBSTITUTED FOR REASON: EUROPEAN AND WESTERN GOVERNMENT POLICIES REGARDING NATIONAL SECURITY 1789-1919 Norma Lisa Flores A Dissertation Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY December 2012 Committee: Dr. Beth Griech-Polelle, Advisor Dr. Mark Simon Graduate Faculty Representative Dr. Michael Brooks Dr. Geoff Howes Dr. Michael Jakobson © 2012 Norma Lisa Flores All Rights Reserved iii ABSTRACT Dr. Beth Griech-Polelle, Advisor Although the twentieth century is perceived as the era of international wars and revolutions, the basis of these proceedings are actually rooted in the events of the nineteenth century. When anything that challenged the authority of the state – concepts based on enlightenment, immigration, or socialism – were deemed to be a threat to the status quo and immediately eliminated by way of legal restrictions. Once the façade of the Old World was completely severed following the Great War, nations in Europe and throughout the West started to revive various nineteenth century laws in an attempt to suppress the outbreak of radicalism that preceded the 1919 revolutions. What this dissertation offers is an extended understanding of how nineteenth century government policies toward radicalism fostered an environment of increased national security during Germany’s 1919 Spartacist Uprising and the 1919/1920 Palmer Raids in the United States. Using the French Revolution as a starting point, this study allows the reader the opportunity to put events like the 1848 revolutions, the rise of the First and Second Internationals, political fallouts, nineteenth century imperialism, nativism, Social Darwinism, and movements for self-government into a broader historical context.
    [Show full text]
  • Corporate Impersonation: the Possibilities of Personhood in American Literature, 1886-1917
    Corporate Impersonation: The Possibilities of Personhood in American Literature, 1886-1917 by Nicolette Isabel Bruner A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2015 Doctoral Committee Professor Gregg D. Crane, Chair Professor Susanna L. Blumenthal, University of Minnesota Professor Jonathan L. Freedman Associate Professor Scott R. Lyons “Everything…that the community chooses to regard as such can become a subject—a potential center—of rights, whether a plant or an animal, a human being or an imagined spirit; and nothing, if the community does not choose to regard it so, will become a subject of rights, whether human being or anything else.” -Alexander Nékám, 1938 © Nicolette Isabel Bruner Olson 2015 For my family – past, present, and future. ii Acknowledgements This dissertation could not have been completed without the support of my committee: Gregg Crane, Jonathan Freedman, Scott Lyons, and Susanna Blumenthal. Gregg Crane has been a constant source of advice and encouragement whose intimate knowledge of law and literature scholarship has been invaluable to my own development as a scholar. Jonathan Freedman’s class on “Fictions of Finance” inspired much of the work in this dissertation, as did Susanna Blumenthal’s seminar on “The Concept of the Person” during my time at the University of Michigan Law School. Jonathan’s good humor, grace, and sympathetic yet critical eye have profoundly shaped my work. As I have expanded my research into animal studies, Scott Lyons guided me to new intellectual domains. Finally, ever since I began working with her during my first year of law school, Susanna has been a source of wisdom, encouragement, and generosity.
    [Show full text]
  • Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
    PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions.
    [Show full text]
  • The Nsa's Prism Program and the New Eu Privacy Regulation: Why U.S
    American University Business Law Review Volume 3 | Issue 2 Article 5 2013 The SN A'S Prism Program And The ewN EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble Juhi Tariq American University Washington College of Law Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the International Law Commons, and the Internet Law Commons Recommended Citation Tariq, Juhi "The SAN 'S Prism Program And The eN w EU Privacy Regulation: Why U.S. Companies With A Presence In The EU ouldC Be In Trouble," American University Business Law Review, Vol. 3, No. 2 (2018) . Available at: http://digitalcommons.wcl.american.edu/aublr/vol3/iss2/5 This Note is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized editor of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NOTE THE NSA'S PRISM PROGRAM AND THE NEW EU PRIVACY REGULATION: WHY U.S. COMPANIES WITH A PRESENCE IN THE EU COULD BE IN TROUBLE JUHI TARIQ* Recent revelations about a clandestine data surveillance program operated by the NSA, Planning Tool for Resource Integration, Synchronization, and Management ("PRISM'), and a stringent proposed European Union ("EU") data protection regulation, will place U.S. companies with a businesspresence in EU member states in a problematic juxtaposition. The EU Proposed General Data Protection Regulation stipulates that a company can be fined up to two percent of its global revenue for misuse of users' data and requires the consent of data subjects prior to access.
    [Show full text]
  • George Thorley Class 12 Project
    SURVEILLANCE !1 Surveillance Watch The Many, To Catch The Few George J. Thorley Norwich Steiner School Author Note George J. Thorley, Level 3 Steiner School Certificate, Norwich Steiner School. This report is the piece of work required for the Steiner School Certificate Level 3 Class 12 Project. Correspondence concerning this report should be addressed to George Thorley, Norwich Steiner School, Hospital Lane, Norwich, NR1 2HW. Contact: [email protected] 11 - 05 - 2017 SURVEILLANCE !2 Contents Title 1 Summary 3 Introduction 4 Historical Context 5 9/11 7 USA PATRIOT Act 2001 8 Presidents Surveillance Program 10 The Timeline 12 Edward J Snowden 16 Prism 17 Tempora 20 Treasure Map 21 Conclusion 23 Diagrams 26 References 27 11 - 05 - 2017 SURVEILLANCE !3 Summary In this report, my main question will be: What was the extent of government mass surveillance, in particular the NSA in the United States, running from the September 11 attacks in 2001, to the Edward Snowden revelations in 2013? In answering this I will focus on how public and political feelings prompted the conditions possible for the security forces to be doing what they do in todays world. In particular, I will be looking at the National Security Agency (NSA) in the United States (US) and some of the revelations brought forward by Edward Snowden in 2013, along with the scale of involvement of the United Kingdom’s (UK) Government Communication Headquarters (GCHQ). I will then look at some of the fundamental questions that surround the world of mass surveillance, such as the effectiveness of the programs that were acted upon by security agencies, who they were really looking for, and whether, in my eyes, their methods were morally right.
    [Show full text]
  • Patterns of Terrorism in the United States, 1970-2013
    Patterns of Terrorism in the United States, 1970-2013 Final Report to Resilient Systems Division, DHS Science and Technology Directorate October 2014 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 8400 Baltimore Ave, Suite 250 • College Park, MD 20740 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The author of this report is Erin Miller at the University of Maryland. Questions about this report should be directed to Erin Miller at [email protected]. The initial collection of data for the Global Terrorism Database (GTD) data was carried out by the Pinkerton Global Intelligence Services (PGIS) between 1970 and 1997 and was donated to the University of Maryland in 2001. Digitizing and validating the original GTD data from 1970 to 1997 was funded by a grant from the National Institute of Justice in 2004 (PIs Gary LaFree and Laura Dugan; grant number: NIJ2002-DT-CX-0001) and in 2005 as part of the START Center of Excellence by the Department of Homeland Security Science and Technology Directorate (DHS S&T), Office of University Programs (PI Gary LaFree; grant numbers N00140510629 and 2008-ST-061-ST0004). Data collection for incidents that occurred between January 1998 and March 2008 and updates to the earlier data to make it consistent with new GTD coding criteria were funded by the DHS S&T Human Factors/Behavioral Sciences Division (HFD) (PIs Gary LaFree and Gary Ackerman; contract number HSHQDC-05-X-00482) and conducted by database staff at the National Consortium for the Study of Terrorism and Responses to Terrorism (START) and the Center for Terrorism and Intelligence Studies (CETIS).
    [Show full text]
  • Rubino De Aanslag Op Leopold II Bij EPO Verschenen Ook
    Rubino De aanslag op Leopold II Bij EPO verschenen ook: De grote mythen uit de geschiedenis van België, Vlaanderen en Wallonië Anne Morelli Belgische Emigranten. Oorlogsvluchtelingen, economische emigranten en politieke vluchtelingen uit onze streken van de 16de eeuw tot vandaag Anne Morelli Elementaire principes van oorlogspropaganda. Bruikbaar in geval van koude, warme of lauwe oorlog... Anne Morelli De mythe van de ‘goede oorlog’. Amerika en de Tweede Wereldoorlog Jacques R. Pauwels De Canadezen en de bevrijding van België 1944-1945 Jacques R. Pauwels Het Parijs van de sansculotten. Een reis door de Franse Revolutie Jacques R. Pauwels Een geschiedenis van de namen van landen en volkeren Jacques R. Pauwels Europese namen voor de wereld Jacques R. Pauwels De moord op Julius Caesar. Historische mythes over democratie Michael Parenti Wit & zwart. Verzet en collaboratie in een Vlaams dorp Roger Rutten De ereburgers. Een sociale geschiedenis van de Limburgse mijnwerkers Tine De Rijck en Griet Van Meulder Geschiedenis van het Amerikaanse volk Howard Zinn ANNE MORELLI RUBINO DE AANSLAG OP LEOPOLD II Voor het eerst gepubliceerd in 2006 door Editions Labor, Brussel, onder de titel Rubino. L’anarchiste italien qui tenta d’assassiner Léopold II, © Editions Labor, 2006. Omslagontwerp: Compagnie Paul Verrept Foto achterfl ap: © Anne Morelli Vormgeving: EPO Druk: drukkerij EPO © Anne Morelli en uitgeverij EPO vzw, 2009 Lange Pastoorstraat 25-27, 2600 Berchem Tel: 32 (0)3 239 68 74 Fax: 32 (0)3 218 46 04 E-mail: [email protected] www.epo.be Isbn 978 90 6445 124 9 D 2009/2204/7 Nur 680 Verspreiding voor Nederland Centraal Boekhuis BV Culemborg Inhoud 1.
    [Show full text]
  • A Theory of Categorical Terrorism
    A Theory of Categorical Terrorism Jeff Goodwin, New York University Abstract When revolutionaries or insurgents, broadly defined, indiscriminately attack civilians, they generally attack “complicitous civilians,” i.e., those categories of noncombatants which the revolutionaries see as benefiting from, supporting and/or having a substantial capacity to influence the states that the revolutionaries are attempting to displace or overthrow. Such “categorical” terrorism will be most extensive when revolutionaries view these states (or complicitous civilians themselves) as perpetrators of extensive, indiscriminate violence against the revolutionaries and their constituents. However, if significant numbers of complicitous civilians are seen by rebel groups as potential supporters (or as capable of being influenced by nonviolent appeals or protests), then they will not be indiscriminately attacked. Whether specific categories of civilians will be perceived as potential allies by revolutionaries depends mainly on the prior history of political interaction and cooperation between these civilians and the revolutionaries. Categorical terrorism is most likely where there has been little such interaction or cooperation, resulting in weak political alliances between the revolutionaries and complicitous civilians – for example, where the revolutionaries and complicitous civilians speak different languages, practice different religions, claim the same land, and/or are territorially segregated. The terrorist attacks of Sept. 11, 2001, have spurred many social scientists to explore the dynamics of terrorism, most for the first time. Before 9/11, terrorism research was the exclusive preserve, with very few exceptions, of small networks of political scientists and non-academic “security experts,” relatively few of whom were interested in social-science theory. Descriptive case studies abound, replete with ad hoc, case-specific explanations of terrorism.
    [Show full text]