RAF Assassination of Alfred Herrhausen

Total Page:16

File Type:pdf, Size:1020Kb

RAF Assassination of Alfred Herrhausen If you have issues viewing or accessing this file contact us at NCJRS.gov. J • , • - ,ij A - .- -T A ~ I - I ,'to It • A - .. ~ ""., I. 153346 U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the National Institute of Justice. Permission to reproduce this ~ material has been granted by Public Ibrnain/Bur. of Diplomati c Security/U.S. Dept. of S'tate to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permission ofthe~ owner. DEPARTMENT OF STATE PUBLICATION 10099 Bureau of Diplomatic Security Released February 1994 United States Department of State Bureau of Diplomatic Security Terrorist Tactics and Security Practices This publication was prepared by the Office of Intelligence and Threat Analysis, Bureau of Diplomatic Security (DSIDSSIIT A). Comments and queries are welcomed and may be directed to the Chief of DSIDSSIITA on 202-663-0786. Terrorist Tactics and Security Practices Acknowledgements This publication would not have been possible without the assistance of Regional Security Officers (RSOs) at U.S. Embassies worldwide who provided the Office of Intelligence and Threat Analysis (DS/DSS/ITA) with information, photographs, and schematics on a regular basis. Special thanks to the Graphics Branch of the U.S. Department of State for most of the original art work in this publication. Andrew Corsun Editor ii Table of Contents v letter from the Assistant Secretary for the Bureau of Diplomatic Security 1 Introduction 3 RAF Assassination of Alfred Herrhausen 13 Dev-Sol Attacks on Americans 59 Middle Eastern Terrorism in Eastern Europe 67 MANPADs: The Potential for Use as a Terrorist Tactic 115 Embassy Drawdowns and Evacuations iii United States DepRrtment of State Assistant Secretary of State for Diplol1wtic Security Washington, D.C. 20520 February 1994 The Bureau of Diplomatic Security's Office of Intelligence and Threat Analysis (DS/ DSSIlTA) is inaugurating a new analytical publication, Terrorist Tactics and Security Practices. The purpose of the publication is to identify and assess significant security concerns including terrorist tactics, techniques, and innovations, as well as suggesting possible countermeasures useful to potential victims. Terrorist Tactics and Security Practices complements DS/DSSIlTA's annual chronology Significant Incidents of Political Violence Against Americans and will be published on an unscheduled basis as information worthy of dissemination becomes available. This issue focuses on two of the most violent indigenous Marxist-Leninist terrorist groups in Western Europe-Germany's Red Army Faction (RAF) and the Turkish group Devrimci-Sol (Revolutionary Left). Other articles deal with the potential use of surface-to-air missiles by terrorists, increased Middle East terrorist activity in Eastern Europe, and lessons learned from evacuations of U.S. diplomatic missions in sub­ Saharan Africa. I believe the insights this report offers will provide better awareness and understanding of security and terrorist-related issues. Anthony C. t\Quainton C2r:1 (, r. 1::::-~_ .. 'A~tant Secretary Bureau of Diplomatic Security v --~----------------------------------..., Introduction Terrorist Tactics and Security Practices is a compendium of security issues and events that have or could impact U.S. interests overseas. Some articles include lessons learned that may help avoid similar events. The first article analyzes the assassination of Germany's "senior industrialist," Alfred Herrhausen, by Germany's Red Army Faction (RAF). Although Herrhausen traveled in an armored car with a lead and follow car, the a:'; hor de­ scribes how the RAF, through meticulous planning, was able to defeat a $200,000 armored Mercedes using a simple-though ingenious-"Radio Shack" type photoelec­ tric cell device. Turkey's Dev-Sol (Revolutionary Left) is currently the most active and violent European Fighting Communist Organiza­ tion (FCO). After briefly looking at the historical roots of leftwing terrorism in Turkey, the article focuses on the assassination of two Americans and the attempted assassi­ nation of a third by Dev-Sol. Also featured is a 21-page security program developed as a countermeasure during the resurgence of anti-American terrorist activity in Turkey. The security guidelines are designed to assist the reader in preparing his or her own security package based on local requirements, threat levels, and resources. As Middle Eastern terrorism has steadily decreased in West­ ern Europe! there has been an increase-albeit small-in Middle East terrorist activity in Eastern Europe. The third article looks at the reasons for the increase and also synop­ sizes the December 1991 attack on Soviet Jews at Ferihegy Airport in Budapest, Hungary. 1 Terrorist Tactics and Security Practices The scope of the fourth article deals with the proliferation of manportable, surface-to-air missiles (MANPADS) and the potential threat they pose to civil aircraft. Since MANPADS are relatively small, easily concealable, and mobile, insur­ gent groups, narcocriminals, and terrorists are increasingly attempting to acquire them. An outgrowth of the post Cold War era is the increase in ethnic and nationalist strife. To ensure the safety of official Americans and private U.S. citizens who may get caught up in civil disorder, the U.S. Department of State has estab­ lished guidelines and procedures for the evacuation of U.S. Government personnel and private American citizens. Using case studies of the civil unrest in Liberia, Zaire, and Somalia, the last article describes the circumstances and mechanisms for implementing the drawdown and evacua­ tion of Americans. 2 RAF Assassination of Alfred Herrhausen "On 30 November 1989, our 'Wolfgang Beer Commando' executed the head of the Deutsche Bank, Alfred Herrhausen. We blew up his armored Mercedes with the help of a shape-charged mine that we made ourselves." -RAF Communique, dated December 2, 1989 Background The Red Army Faction (RAF) has been West Germany's most By Dennis Pluchinsky dangerous leftist terrorist group since its inception in the early 1970s. In recent years, the RAF has demonstrated the tendency to carry out a major assassination and then go underground for periods up to 14 months. For example, attacks by the RAF com­ mando level have taken place in February 1985, August 1985, July 1986, October 1986, and September 1988. Prior to the assassination of Alfred Herrhausen, the RAF had been inactive for 14 months. In the months preceding the RAP's attack on Herrhausen, there was no specific intelligence to indicate that he had been directly targeted by the RAP. Generally speaking, Herrhausen was one of many prominent West German p\':sonalities who were considered to be logical and attractive targets for the RAF. While there were no specific indicators that the RAF was entering an attack mode, there were several general developments that suggested a height­ ened state of alert. Firstly, imprisoned members of the RAF had engaged in a hunger strike from February to May. The RAF commando level would generally carry out some type of action during a hunger strike. This time, they did nothing. The hunger strike failed to achieve its objectives and was terminated. Sec­ ondly, in early November, one of the imprisoned RAF architects of the hunger strike sent a letter to the "outside" (read: com­ mando level). In it, he relinquishes the "initiative" to the outside. Some people have interpreted this as the final blessing for an RAF attack. The Target It is a mistake to perceive Alfred Herrhausen as just a bank chair­ man. He was the Chairman of the Deutsche Bank, the largest 3 Terrorist Tactics and Security Practices bank of the third largest economic power in the world, and larger than any u.s. bank. However, Herrhausen's influence extended beyond the Deutsche Bank. He has been called Germany's "se­ nior industrialist" and the "most influential economic strategist in Germany." A personal friend and economic advisor to Helmut Kohl, the Chancellor of West Germany, Herrhausen played a central role in pushing t.he Deutsche Bank and West German business toward Eastem Europe. He also engineered the merger between Daimler-Benz and MBB into the biggest arms manufac­ turing complex in West Germany. From the RAF's perspective, he had become a key figure in the "military-industrial complex." His role in expanding Deutsche Bank into Eastern Europe and his involvement in the Daimler-Benz merger made him an ideal symbolic target for the RAF. One u.s. chief executive officer has stated that the "impact of his assassination is no less than that of a European head of state." Herrhausen's murder was significant enough to make the cover of Der Spiegel, a West German news magazine similar in style and influence to Newsweek or Time. The West German government has offered a $2.2 million reward for information leading to the capture of his assassins. Herrhausen was 59 years old. The Attack Herrhausen lived in a quiet, exclusive residential area in Bad Homburg, a suburb of Frankfurt. On November 30, he left his home at around 8:30 a.m. in a three-car motorcade and was travel­ ling down a narrow, tree-lined road that went through a park (see schematic 1). He usually left his home at about the same time each morning and took the same route to work. Due to a school cros1iing and bus stop on this road, cars have to reduce their speed (to about 30-35 mph) as they drive through the area. As Herrhausen's lead security car approached the attack site, it may have noticed on the left side of the road a man in a jogging uniform wearing what appeared to be a Sony W~lkman-like device over his ears.
Recommended publications
  • 1996 Human Rights Report: Germany Page 1 of 5
    1996 Human Rights Report: Germany Page 1 of 5 The State Department web site below is a permanent electro information released prior to January 20, 2001. Please see w material released since President George W. Bush took offic This site is not updated so external links may no longer func us with any questions about finding information. NOTE: External links to other Internet sites should not be co endorsement of the views contained therein. U.S. Department of State Germany Country Report on Human Rights Practices for 1996 Released by the Bureau of Democracy, Human Rights, and Labor, January 30, 1997. GERMANY The Federal Republic of Germany is a constitutional parliamentary democracy with an independent judiciary; citizens periodically choose their representatives in free and fair multiparty elections. The head of the Federal Government, the Chancellor, is elected by the lower house of Parliament. The powers of the Chancellor and of the Parliament are set forth in the Basic Law (Constitution). The 16 states enjoy significant autonomy, especially as concerns law enforcement and the courts, education, the environment, and social assistance. Law enforcement is primarily a responsibility of state governments, and the police are organized at the state level. The jurisdiction of the Federal Criminal Office is limited to international organized crime, especially narcotics trafficking, weapons smuggling, and currency counterfeiting. Police forces in general are well trained, disciplined, and mindful of citizens' rights, although there were occasional instances of police abuse. Germany's highly advanced economy affords its residents a high standard of living. The economy has had difficulty pulling out of its 1993-94 recession, which followed a reunification boom in the early 1990's.
    [Show full text]
  • Study Guid E
    Year: 5 Subject: RE Unit of Study: Sikhism Linked Literature: We are Sikhs/My Sikh Faith or Ada Twist, Scientist by Andrea Beaty Special people in the Sikh Who are Sikhs? Special books in Sikhism Sikh places of worship Sikh family life Sikh celebrations faith Vocabulary I need to know: I need to do: Prior knowledge: Sikhism is a monotheistic religion because they believe in only one God Describe the key teachings and beliefs of Different religions have different be- Sikh Means disciple in Punjabi (Waheguru) who created the world and that different religions are all paths to this a religion, explaining how they shape the liefs and practises lives of individuals and contribute to Disciple Follower of God same God. It is one of the world’s youngest religions, founded about 500 years ago, in 1499, by Guru Nanak in the Punjab, Northern India. It is the fifth largest religion society. Some religious beliefs and practises Waheguru Wonderful lord or God in the world with over 20 million followers. People who follow Sikhism are called Explain practises and lifestyles associated with belonging to a faith. are similar across religions Cycle of many lives - rebirth of a soul in Sikhs. The word Sikh means ‘disciple’ in Punjabi. Sikhs are the disciples of God Reincarnation another body who follow the writings and teachings of the Ten Sikh Gurus. Devotion to God Explain some of the different ways indi- should be shown daily by meditating, praying and following the core beliefs, as well viduals show their beliefs. Religions have different place of wor- Released from the cycle of rebirth impelled by Explain own ideas about ‘tricky’ ques- ship, special (holy) books and tradi- Mukti/moksha the law of karma as behaving in a manner that creates good karma.
    [Show full text]
  • Cornell International Affairs Review Editor-In-Chief Stephany Kim ’19
    1 Cornell International Affairs Review Editor-in-Chief Stephany Kim ’19 Managing Editor Ronni Mok ’20 Graduate Editors Amanda Cheney Caitlin Mastroe Martijn Mos Katharina Obermeier Whitney Taylor Youyi Zhang Undergraduate Editors Victoria Alandy ’20 Carmen Chan ’19 Christopher Cho ’17 Nidhi Dontula ’20 Gage DuBose ’18 Michelle Fung ’19 Matthew Gallanty ’18 Yuichiro Kakutani ’19 Beth Kelley ’19 Veronika Koziel ’19 Ethan Mandell ’18 Tola Mcyzkowska ’17 Ryan Norton ’17 Juliette Ovadia ’20 Srinand Paruthiyil ’19 Chasen Richards ’18 Xavier Salvador ’19 Julia Wang ’19 Yuijing Wang ’20 Design Editors Yuichiro Kakutani ’19 Yujing Wang ’20 Executive Board President Sohrab Nafisi ’18 Treasurer Ronni Mok ’20 VP of Programming Xavier Salvador ’19 Volume X Spring 2017 2 The Cornell International Affairs Review Board of Advisors Dr. Heike Michelsen, Primary Advisor Associate Director of Academic Programming, Einaudi Center for International Studies Professor Robert Andolina Johnson School of Management Professor Ross Brann Department of Near Eastern Studies Professor Matthew Evangelista Department of Government Professor Peter Katzenstein Department of Government Professor Isaac Kramnick Department of Government Professor David Lee Department of Applied Economics and Management Professor Elizabeth Sanders Department of Government Professor Nina Tannenwald Brown University Professor Nicolas van de Walle Department of Government Cornell International Affairs Review, an independent student organization located at Cornell University, produced and is responsible
    [Show full text]
  • Bombing! Incidents by Target 1978-1987 10-YEAR TARGET % YEARLY GRAND TOTALIRANI{ 1978 1979 1980 1981 1982 1983 1984 1985 I 1986 1987 TOTAL TOTAL Residential
    If you have issues viewing or accessing this file contact us at NCJRS.gov. ..• I .....-. • - ... --. 8 i i II' .- , ,. ... • .,1 ,. '. ~ I .,...-.., .. ·.i~1~~ D ... IIJ • I • -e '"• "';:.~ 111 .. -- - ;.,;; '(', ' .. ~. '1'. .. ~ ;~'E·~"~';""">·'\.':;··"'~:""',*"f~·'1~.";' ~'I:{~~~ 121008 U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from ·the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official pOl'ition or policies of the National Institute of Justice. Permission to reproduce this c~g~qmaterial has been granted by ". Public Domain/Bur. of Alcohol, Tobacco & Firearms/US Dept. of llh~ffam,};1fc¥iminal Justice Reference Service (NCJRS). Further rep=~utslde of the NCJRS system requires permis- sion of the . wner. Cover: On January 12, 1987, an explosive device detonated between the front and rear seats of a Beechcraft aircraft while it was parked at the Osceola Municipal Allport, Osceola,'Arkansas. A TF assistance was requested by the Osceola Police Department. ATF responded to the scene and conducted a crime scene search. A joint investigation by ATF, the Arkansas State Police, and the Osceola Police Department ensued. A preliminary investigation revealed that a destructive device consisting of suspected dynamite had been placed inside the aircraft. The explosion caused damages estimated at $10,000 but no injuries. On February 12, 1987, a second explosive device.detonated inside the passenger compartment of another private aircraft at the Osceola airport. There were no deaths or ~uries, but damages were estimated at $15,000.
    [Show full text]
  • The Impact Crater at the Origin of the Julia Family Detected with VLT/SPHERE??,?? P
    A&A 618, A154 (2018) Astronomy https://doi.org/10.1051/0004-6361/201833477 & © ESO 2018 Astrophysics The impact crater at the origin of the Julia family detected with VLT/SPHERE??,?? P. Vernazza1, M. Brož2, A. Drouard1, J. Hanuš2, M. Viikinkoski3, M. Marsset4, L. Jorda1, R. Fetick1, B. Carry5, F. Marchis6, M. Birlan7, T. Fusco1, T. Santana-Ros8, E. Podlewska-Gaca8,9, E. Jehin10, M. Ferrais10, P. Bartczak8, G. Dudzinski´ 8, J. Berthier7, J. Castillo-Rogez11, F. Cipriani12, F. Colas7, C. Dumas13, J. Durechˇ 2, M. Kaasalainen3, A. Kryszczynska8, P. Lamy1, H. Le Coroller1, A. Marciniak8, T. Michalowski8, P. Michel5, M. Pajuelo7,14, P. Tanga5, F. Vachier7, A. Vigan1, B. Warner15, O. Witasse12, B. Yang16, E. Asphaug17, D. C. Richardson18, P. Ševecekˇ 2, M. Gillon10, and Z. Benkhaldoun19 1 Aix-Marseille Université, CNRS, LAM (Laboratoire d’Astrophysique de Marseille), Marseille, France e-mail: [email protected] 2 Institute of Astronomy, Charles University, Prague, V Holešovickᡠch 2, 18000, Prague 8, Czech Republic 3 Department of Mathematics, Tampere University of Technology, PO Box 553, 33101 Tampere, Finland 4 Astrophysics Research Centre, Queen’s University Belfast, BT7 1NN, UK 5 Université Côte d’Azur, Observatoire de la Côte d’Azur, CNRS, Laboratoire Lagrange, 06304 Nice Cedex 4, France 6 SETI Institute, Carl Sagan Center, 189 Bernado Avenue, Mountain View CA 94043, USA 7 IMCCE, Observatoire de Paris, 77 avenue Denfert-Rochereau, 75014 Paris Cedex, France 8 Astronomical Observatory Institute, Faculty of Physics, Adam Mickiewicz University,
    [Show full text]
  • Terrorism: Gender and Identity
    IOSR Journal Of Humanities And Social Science (IOSR-JHSS) Volume 20, Issue 11, Ver. IV (Nov. 2015) PP 01-07 e-ISSN: 2279-0837, p-ISSN: 2279-0845. www.iosrjournals.org Terrorism: Gender and Identity Dr. (Mrs.) Manjeet Hundal Head, Sociology Department S.R.C.S.D. College, Pathankot Abstract: Even in the beginning of the twenty first century with the attack at World Trade Center (America), terrorism continues to be one of the major issues, which the world is facing. In the early 1970's Germany experienced the activities of the ultra left-wing groups such as the Red Army Faction (RAF) and the Baader- Meinhof group. Spain has had the experience of Basque terrorists, Italy of the Red Brigades and Britain of the republican extremist groups such as the Irish Republican Army (IRA) in the Northern Ireland. The Tamil terrorist groups agitating for an independent 'Eelam' state in the North-East of Sri Lanka, Sikh extremists used terrorism for an independent 'Khalistan' in Punjab, India. The extremists in Punjab used extortion, bombings and hit squads to achieve their goal of an independent state. In the face of these terrorist attacks, the Indian government responded severely with torture and summary executions. Terrorism that breeds' violence, by its very nature ultimately becomes indiscriminate and unpredictable, which has an uneven impact on women's status. At the height of violence, the Punjabi women faced the terror of the Indian police by day and of the militants by night. This study based on Punjab terrorism(1978-1993) has been divided into three parts.
    [Show full text]
  • Explosive Device Response Operations
    EXPLOSIVE DEVICE RESPONSE OPERATIONS Capability Definition Explosive Device Response Operations is the capability to coordinate, direct, and conduct improvised explosive device (IED) response after initial alert and notification. Coordinate intelligence fusion and RESPOND MISSION: EXPLOSIVE DE analysis, information collection, and threat recognition, assess the situation and conduct appropriate Render Safe Procedures (RSP). Conduct searches for additional devices and coordinate overall efforts to mitigate chemical, biological, radiological, nuclear, and explosive (CBRNE) threat to the incident site. Outcome Threat assessments are conducted, the explosive and/or hazardous devices are rendered safe, and the area is cleared of hazards. Measures are implemented in the following priority order: ensure public safety; safeguard the officers on the scene (including the bomb technician); collect and preserve evidence; protect and preserve public and private property; and restore public services. Relationship to National Response Plan Emergency Support Function (ESF)/Annex This capability supports the following Emergency Support Functions (ESFs): Terrorism Incident Law Enforcement and Investigation Annex ESF #10: Oil and Hazardous Materials Response ESF #13: Public Safety and Security VICE RESPONSE OPERATIONS Preparedness Tasks and Measures/Metrics Activity: Develop and Maintain Plans, Procedures, Programs, and Systems Critical Tasks Res.B2c 1.1 Develop, distribute, and maintain National Guidelines for Bomb Technicians Develop effective procedures
    [Show full text]
  • Le Débat Sur La Fraction Armée Rouge Perception Et Mémoire Du Terrorisme D'extrême Gauche En Allemagne
    NoteNote dudu CerfaCerfa 5252 Le débat sur la Fraction armée rouge Perception et mémoire du terrorisme d'extrême gauche en Allemagne Annette Vowinckel Février 2008 Comité d’études des relations franco-allemandes (Cerfa) L'Ifri est, en France, le principal centre indépendant de recherche, d'infor-mation et de débat sur les grandes questions internationales. Créé en 1979 par Thierry de Montbrial, l'Ifri est une association reconnue d'utilité publique (loi de 1901). Il n'est soumis à aucune tutelle administrative, définit librement ses activités et publie régulièrement ses travaux. L'Ifri associe, au travers de ses études et de ses débats, dans une démarche interdisciplinaire, décideurs politiques et économiques, chercheurs et experts à l'échelle internationale. Avec son antenne à Bruxelles (Ifri-Bruxelles), l'Ifri s'impose comme l’un des rares think tanks français à se positionner au coeur même du débat européen. Les opinions exprimées dans ce texte n’engagent que la responsabilité des auteurs. Les “Notes du Cerfa” font l’objet d’un soutien de la Fondation Robert Bosch. Comité d’études des relations franco-allemandes (Cerfa) © Tous droits réservés, Ifri, 2008 ISBN : 978-2-86592-253-6 IFRI IFRI-BRUXELLES 27 rue de la Procession Rue Marie-Thérèse, 21 75740 paris cedex 15 - France B -1000 Bruxelles - Belgique TEL.: 33 (0)1 40 61 60 00 TEL.: 32(2) 238 51 10 FAX: 33 (0)1 40 61 60 60 FAX: 32(2) 238 51 15 E-Mail: [email protected] E-Mail: [email protected] SITE INTERNET: www.ifri.org SOMMAIRE Introduction………………………………………………………...2 La perception
    [Show full text]
  • Panospheric Video for Robotic Telexploration
    Panospheric Video for Robotic Telexploration John R. Murphy CMU-RI-TR-98-10 Submined in partial fulfiient of the requirements for the degree of Doctor of Philosophy in Robotics The Robotics Institute Cknegie Mellon University Pittsburgh, Pennsylvania 15213 May 1998 0 1998 by John R. Murphy. All rights reserved. This research was supported in part by NASA grant NAGW-117.5. The views and conclusions contained in this document are those of the author and should not be interpreted as representing the official policies, either expressed or implied, of NASA or the U.S. Government. Robotics Thesis Panospheric Video for Robotic Telexploration John Murphy Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the field of Robotics ACC-. William L. Whittaka TheEis Cormittee Chair Date Matthew T. Mason- - Program Chir Y Date APPROVED: fL-4 36 JiiIff+? Pa Christian0 Rowst Date - Abstract Teleoperation using cameras and monitors fails to achieve the rich and natural perceptions available during direct hands-on operation. Optimally. a reniote telepresence reproduces visual sensations that enable equivalent understanding and interaction as direct operation. Through irnrnersive video acquisition and display. the situational awareness ola remote operator is brought closer lo that of direct operation. Early teleoperation research considered the value of wide tields of view. Howe~er. utilization of wide fields of view meant sacrificing resolution and presenting distorted imagery to the viewer. With recent advances in technology. these problems are no longer barriers to hyper-wide field of view video. Acquisition and display of video conveying the entire surroundings of a tclcoperated mobile robot requires innolwtion of hardware and software.
    [Show full text]
  • Editorial the Stoic
    Vol. XXX THE STOIC Number 8 Editors: Decem ber 1990 S. A. Brittain J. A. Cazalet PhOIOWaphs: Fronl Cow!r J. S. Goss and Inside Back Cover P. D.deM.Oyens by E. A. G. Shi/linf,10n. Lucie E. Polter Inside Front CO\'er Staff Editors: Dr. T. A. OZlurk E. A. G. Shillington by S. A. Brinoin. Mr. E. S. Thompson D. J. G. Szalay EDITORIAL AS the recent Free Kuwait leaflets, badges and banners have amply demonstrated, Stoics may be removed but not remote from issues of international concern, such as possible conflict in the Gulf. or urgent questions about European integration, economic, political and social. Pineapple Day on 20th May was an equally vivid, if more domestic, illustration of active Stoic care and generosity. Staff and Stoics alike gave up their weekend to organise and participate, alongside the local community, in a variety of events which raised over £10,000. Our report and photographs are graphic testimony to the free interplay of charity and fun. On another summer occasion, Speech and Old Stoic Day, the Headmaster's maiden address emphasised that, marvellous as Stowe's heritage and beauty are, it is primarily the people here who endow the School with its purpose and character. That Stoic spirit of adventure was no less evident in last year's expeditions to the Galapagos and Nepal, the absorbing accounts of which are given within these pages. Daunted by neither size nor distance, individual initiatives look Stoics to South Africa, the Soviet Union, as well as Luxemburg and Liechtenstein, among other European mini-states.
    [Show full text]
  • Remembering Partition: Violence, Nationalism and History in India
    Remembering Partition: Violence, Nationalism and History in India Gyanendra Pandey CAMBRIDGE UNIVERSITY PRESS Remembering Partition Violence, Nationalism and History in India Through an investigation of the violence that marked the partition of British India in 1947, this book analyses questions of history and mem- ory, the nationalisation of populations and their pasts, and the ways in which violent events are remembered (or forgotten) in order to en- sure the unity of the collective subject – community or nation. Stressing the continuous entanglement of ‘event’ and ‘interpretation’, the author emphasises both the enormity of the violence of 1947 and its shifting meanings and contours. The book provides a sustained critique of the procedures of history-writing and nationalist myth-making on the ques- tion of violence, and examines how local forms of sociality are consti- tuted and reconstituted by the experience and representation of violent events. It concludes with a comment on the different kinds of political community that may still be imagined even in the wake of Partition and events like it. GYANENDRA PANDEY is Professor of Anthropology and History at Johns Hopkins University. He was a founder member of the Subaltern Studies group and is the author of many publications including The Con- struction of Communalism in Colonial North India (1990) and, as editor, Hindus and Others: the Question of Identity in India Today (1993). This page intentionally left blank Contemporary South Asia 7 Editorial board Jan Breman, G.P. Hawthorn, Ayesha Jalal, Patricia Jeffery, Atul Kohli Contemporary South Asia has been established to publish books on the politics, society and culture of South Asia since 1947.
    [Show full text]
  • Bombs and Terrorism for Patrol Course Outline
    Bombs and Terrorism for Patrol San Bernardino County Sheriff’s Department Expanded Course Outline I. Orientation and Overview A. Paperwork 1. Distribute POST roster 2. Distribute networking or regional attendance roster B. Housekeeping 1. Facility review and identify restrooms and emergency exits 2. Review breaks including breakroom and/or vending machines C. Introductions 1. Instructor and staff introductions 2. Student introductions D. Overview 1. Overview of the key learning outcomes of the class 2. Review of student and instructor expectations of the course E. Learning Activity and Student Assessment #1 - Student Experience 1. Students will individually complete an assessment questionnaire to determine their professional level experience with bombs and terrorism. 2. Upon completion of the questionnaire, students will review questions and answers using the questionnaire as a process of self-assessment for their prior knowledge related to bombs and terrorism. 3. Students will individually introduce themselves and indicate their level of experience in law enforcement and any related experience in dealing with bombs, explosives and terrorism related topics. 4. Students will also describe their level of responsibility as well as any previous training in bombs and terrorism courses they have completed. F. Key Takeaways 1. Officer safety Bombs and Terrorism for Patrol San Bernardino County Sheriff’s Department Expanded Course Outline 2. Better situational awareness 3. Current threats in the world II. Bombing Basics A. History 1. Brief history of criminal bombings 2. Recent criminal bombing incidents B. An overview of improvised explosive devices (IED) used by terrorists 1. Definitions 2. Essential components of an explosive device 1. Initiator 3.
    [Show full text]