Counter-Terrorism Reference Curriculum

Total Page:16

File Type:pdf, Size:1020Kb

Counter-Terrorism Reference Curriculum COUNTER-TERRORISM REFERENCE CURRICULUM CTRC Academic Project Leads & Editors Dr. Sajjan M. Gohel, International Security Director Asia Pacific Foundation Visiting Teacher, London School of Economics & Political Science [email protected] & [email protected] Dr. Peter Forster, Associate Professor Penn State University [email protected] PfPC Reference Curriculum Lead Editors: Dr. David C. Emelifeonwu Senior Staff Officer, Educational Engagements Canadian Defence Academy Associate Professor Royal Military College of Canada Department of National Defence [email protected] Dr. Gary Rauchfuss Director, Records Management Training Program National Archives and Records Administration [email protected] Layout Coordinator / Distribution: Gabriella Lurwig-Gendarme NATO International Staff [email protected] Graphics & Printing — ISBN XXXX 2010-19 NATO COUNTER-TERRORISM REFERENCE CURRICULUM Published May 2020 2 FOREWORD “With guns you can kill terrorists, with education you can kill terrorism.” — Malala Yousafzai, Pakistani activist for female education and Nobel Prize laureate NATO’s counter-terrorism efforts have been at the forefront of three consecutive NATO Summits, including the recent 2019 Leaders’ Meeting in London, with the clear political imperative for the Alliance to address a persistent global threat that knows no border, nationality or religion. NATO’s determination and solidarity in fighting the evolving challenge posed by terrorism has constantly increased since the Alliance invoked its collective defence clause for the first time in response to the terrorist attacks of 11 September 2001 on the United States of America. NATO has gained much experience in countering terrorism from its missions and operations. However, NATO cannot defeat terrorism on its own. Fortunately, we do not stand alone. One of the strengths the Alliance can build on is our engagement with the global network of partner countries and other International Organizations who bring in a wealth of experience and knowledge. Many of these have contributed to the development of this refer- ence curriculum, together with the Partnership for Peace Consortium of Defence Academies and Security Studies Institutes. Understanding the terrorist threat of today and tomorrow requires not only improved awareness but constant learning and investment in the education of future generations. We sincerely hope that this curriculum will serve the wider counter-terrorism community as an insightful reference document and that it can contribute to national educational processes of both interested Allies and partners, including through NATO’s Defence Education Enhancement Programme (DEEP). Dr. Antonio Missiroli Dr. John Manza Assistant Secretary General Assistant Secretary General Emerging Security Challenges Division Operations Division 3 About this Reference Curriculum The Counter-Terrorism Reference Curriculum (CTRC) We are grateful for the support of the Defence Education is the result of a collaborative multinational team of Enhancement Programme (DEEP) and the PfPC volunteers drawn from Europe, North America, Africa Education Development Working Group under Dr. Al and Asia. As part of the Partnership for Peace Consor- Stolberg and Dr. David Emelifeonwu. In addition, Laura tium’s (PfPC) Combating Terrorism Working Group Alami, Defense Security Cooperation Agency (DSCA), (CTWG), academics and researchers, as well as practi- Maria Galperin Donnelly, PfPC International Programs tioners from governmental bodies, law enforcement and Manager, Dr. Gary Rauchfuss, National Archives and the armed forces combined to create this document. Records Administration, and Mariusz Solis, NATO Our aim was to produce a nuanced and broad approach DEEP Coordinator, who all helped make this effort to understanding the concepts of terrorism and counter- possible through direct and tangible support. We also terrorism by looking at past problems in order to under- wish to acknowledge Prof. Yonah Alexander, stand the current dilemmas with the intention to try Elena Beganu, Dr. Juliette Bird, Gabriele Cascone, and anticipate future challenges. Dr. James Forest, Dr. Akram Fraihat, Ferenc Hegyesi, Charlotte Jordan, Dr. Sandër Lleshaj, Lindsey Martin, This document aims to address terrorism and counter- Richard Prosen, Dr. Tom Robertson, Prof. Alex Schmid terrorism with sufficient depth that will enable all and Rebecca Trieu for their significant efforts in this learners in NATO member states and partner countries endeavour. Without the immense contributions of or organisations, regardless of experience, to develop a Allison Bailey, Leah Contreras, Ashley McAdam, David more complete picture of the issues and challenges that Winston and Tyler Zurisko, this document simply exist, past, present and potentially future. It takes into would not have come together. Last but most certainly full consideration the national, regional and interna- not least, all the contributors that stayed committed to tional security policy and defence policy implications. the project for its entirety are owed an enormous debt The reference curriculum provides a multidisciplinary of gratitude. approach that helps learners develop the knowledge and skills needed to understand terrorism and counter- terrorism in order to successfully anticipate and mitigate Dr. Sajjan M. Gohel and Dr. Peter K. Forster potential threats. CTRC Academic Project Leads & Editors 4 I. AIM OF THIS DOCUMENT of the field, the curriculum serves as a useful summary of their focus areas and an introduction to debates outside Terrorism has been a defining theme of the post- their specialties Cold War age. While its roots stretch back some two millennia, its contemporary relevance has ensured that terrorist acts and states’ attempts to counter them have II. COUNTER-TERRORISM AND CHALLENGES scarcely left the news cycle for two decades. The method of terrorism does not just entail violence but is also an act As noted, the study of terrorism and counter-terrorism of ideological communication, as well as psychological is a methodologically diverse field, replete with debate, warfare against the public morale and state apparatus. extending even to fundamental definitional discussions. On the theoretical side, it is important to note the It is important to stress that terrorism, extremism, distinction between ‘terrorism’ and ‘terrorists’; while the radicalism and sectarianism have been experienced by features of terrorists change according to circumstance, all nations. These forms of fanaticism are not tied to, or the features of ‘terrorism’, such as the importance part of, any religion, creed or race of people. Terrorism of ideology, remain constant. Operationally, further is a global threat that requires shared solutions. challenges persist, as states are forced to essentially calculate the degree of risk with which they are Beyond the most well-known and heavily researched comfortable, juxtaposed against the potential impact of terrorist organisations, there is an ever evolving and a successful attack. dynamic landscape that continues to generate challenges for state security apparatuses. The very endurance An increasingly technologically-driven world makes of terrorism as a tactic, strategy, and way of warfare security considerably more difficult. Terrorist groups demonstrates that while states may increasingly wish to have demonstrated impressive literacy and agility with be done with terrorism, it remains, evolves and spawns a variety of new-age innovations in interconnectivity, new movements that present threats that may not have from the far corners of the dark web to popular easily been previously envisioned. accessible social media platforms. These formats enable the widespread propagation of ideas, tactics and Despite its prominence, terrorism remains an emergent strategy, at a rate that was simply not possible in decades issue. There are still significant debates in the field regarding what terrorism is, how it should be studied, past. Encrypted messaging systems complicate efforts and what are the best methods to counter it. Thus, the to track suspected terrorists or identify their associates, creation of this reference curriculum is, in part, a means networks and strategies. Technological advances have of identifying and securing a useful common ground in also provided new avenues to bolster one’s security order to gain a better understanding of holistic counter- apparatus, but terrorist groups have arguably adopted terrorism strategies. Additionally, this curriculum these new tools to an even more effective degree than identifies gaps and areas which can serve to cut across the institutions they target. disciplinary and practical boundaries, particularly those between civilian, law enforcement and military As the COVID-19 pandemic altered virtually every facet institutions. As a reference document this curriculum of human life globally, it also potentially shapes how can serve to increase greater intellectual and professional terrorists recruit and plot new and evolving targets of interoperability within and between partner countries opportunity. Furthermore, the coronavirus impacts on and NATO alliance members. governance by creating political, social and economic instability. Terrorists could exploit this as well as other This document, while comprehensive, is not exhaustive. scenarios and situations, such as ensuing regional Without sacrificing depth, it is intentionally broad, tensions between nations. designed to enhance the
Recommended publications
  • Munich Olympics Gene Eisen Terrorists Strike the 1972 Summer Olympics Held in Munich, West Germany, Were Breezing Along Successfully for the First Ten Days
    Remembering the Munich Olympics Gene Eisen Terrorists Strike The 1972 Summer Olympics held in Munich, West Germany, were breezing along successfully for the first ten days. Then, tragedy struck in the early morning hours of September 5. The Palestinian Black September terrorists attacked eleven Israeli team members in their dormitory. After a struggle, the terrorist killed two Israelis, and nine Israelis were taken hostage. West Germany issued a postal souvenir sheet, Scott B489a-d, on August 18, 1972. The sheet pictures the 1972 Olympic Games Village (Figure 1 red arrow). Shown are the men’s buildings in the section above the 40+20pf stamp. The third-row building at the extreme left end of the village housed the Israeli team. The group of buildings is shown directly north of the twin poles holding up the Figure 1 1972 Olympic Games Village Sports Hall roof. It was these buildings where the terrorists broke in. used in the operation had not received proper training as sharpshooters. Add to that, they were improperly located, Negotiations too few, and lacked radios to communicate with each other and with the command post. The snipers were armed with The Black September terrorists demanded the release of over assault rifles rather than sniper rifles, and their weapons 200 Palestinians held in Israeli prisons and two left-wing lacked long-range scopes and night-vision capabilities. extremists in German prisons. German negotiators were Second, the officers on the plane who were supposed to willing to accept their demands, but Israel rejected them. subdue the terrorists unanimously chose to abandon their Israel’s Prime Minister Golda Meir stated, “If we give in post.
    [Show full text]
  • The Blue State: UNRWA's Transition from Relief to Development in Providing Education to Palestinian Refugees in Jordan
    University of Mississippi eGrove Honors College (Sally McDonnell Barksdale Honors Theses Honors College) Spring 5-1-2021 The Blue State: UNRWA's Transition from Relief to Development in Providing Education to Palestinian Refugees in Jordan Alana Mitias University of Mississippi Follow this and additional works at: https://egrove.olemiss.edu/hon_thesis Part of the Arabic Studies Commons, and the International Law Commons Recommended Citation Mitias, Alana, "The Blue State: UNRWA's Transition from Relief to Development in Providing Education to Palestinian Refugees in Jordan" (2021). Honors Theses. 1699. https://egrove.olemiss.edu/hon_thesis/1699 This Undergraduate Thesis is brought to you for free and open access by the Honors College (Sally McDonnell Barksdale Honors College) at eGrove. It has been accepted for inclusion in Honors Theses by an authorized administrator of eGrove. For more information, please contact [email protected]. THE BLUE STATE: UNRWA’S TRANSITION FROM RELIEF TO DEVELOPMENT IN PROVIDING EDUCATION TO PALESTINIAN REFUGEES IN JORDAN by Alana Michelle Mitias A thesis submitted to the faculty of The University of Mississippi in partial fulfillment of the requirements of the Sally McDonnell Barksdale Honors College. Oxford, Mississippi April 2021 Approved by ____________________________ Advisor: Dr. Lauren Ferry ____________________________ Reader: Dr. Emily Fransee ____________________________ Reader: Professor Ashleen Williams © 2021 Alana Michelle Mitias ALL RIGHTS RESERVED ii TABLE OF CONTENTS CHAPTER I: INTRODUCTION……………………………………………..…………..1 CHAPTER II: INTERNATIONAL DIMENSION & LEGAL FRAMEWORK………....8 CHAPTER III: JORDAN’S EVOLUTION AS A HOST STATE………………...…….20 CHAPTER IV: UNRWA’S TRANSITION FROM RELIEF TO DEVELOPMENT…...38 CHAPTER V: ANALYSIS……………………………………………………………...50 CHAPTER VI: CONCLUSION………………………………………………………...56 BIBLIOGRAPHY……………………………………………………………………….61 iii “An expenditure for education by UNRWA should not be regarded as relief any more than is a similar expenditure by any Government or by UNESCO.
    [Show full text]
  • Serious and Organised Crime Strategy
    Serious and Organised Crime Strategy Cm 8715 Serious and Organised Crime Strategy Presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty October 2013 Cm 8715 £21.25 © Crown copyright 2013 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www. nationalarchives.gov.uk/doc/open-government-licence/ or e-mail: [email protected]. Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned. Any enquiries regarding this publication should be sent to us [email protected] You can download this publication from our website at https://www.gov.uk/government/ publications ISBN: 9780101871525 Printed in the UK by The Stationery Office Limited on behalf of the Controller of Her Majesty’s Stationery Office ID 2593608 10/13 33233 19585 Printed on paper containing 75% recycled fibre content minimum. Contents Home Secretary Foreword 5 Executive Summary 7 Introduction 13 Our Strategic Response 25 PURSUE: Prosecuting and disrupting serious and 27 organised crime PREVENT: Preventing people from engaging 45 in serious and organised crime PROTECT: Increasing protection against 53 serious and organised crime PREPARE: Reducing the impact of serious and 65 organised crime Annex A: Accountability, governance and funding 71 Annex B: Departmental roles and responsibilities for 73 tackling serious and organised crime 4 Serious and Organised Crime Strategy Home Secretary Foreword 5 Home Secretary Foreword The Relentless Disruption of Organised Criminals Serious and organised crime is a threat to our national security and costs the UK more than £24 billion a year.
    [Show full text]
  • Australian Criminal Intelligence Management (ACIM) Strategy 2017
    Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 AUSTRALIAN CRIMINAL INTELLIGENCE MANAGEMENT STRATEGY 2017–20 INTELLIGENCE PARTNERSHIPS FOR A SAFER AUSTRALIA Attorney-General’s Department Australia New Zealand Policing Advisory Agency Australian Criminal Intelligence Commission Australian Federal Police ACT Policing Australian Securities and Investments Commission Australian Security Intelligence Organisation Australian Taxation Office Australian Transaction Reports and Analysis Centre Department of Immigration and Border Protection/Australian Border Force New South Wales Police Force New Zealand Police Northern Territory Police Queensland Police Service South Australia Police Tasmania Police Victoria Police Western Australia Police 1 Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 CONTENTS FOREWORD 1 AUSTRALIAN CRIMINAL INTELLIGENCE LANDSCAPE 2 AUSTRALIAN CRIMINAL INTELLIGENCE MODEL 3 DEFINITION OF INTELLIGENCE 4 OVERSIGHT AND IMPLEMENTATION 5 WHAT WILL SUCCESS LOOK LIKE? 6 HOW WILL WE ACHIEVE SUCCESS? 7 CRITICAL SUCCESS FACTORS 10 HOW WILL WE MEASURE SUCCESS? 10 EVALUATION MODEL 11 MATURITY MODEL 12 CONCLUSION 14 REFERENCES 14 2 Australian Criminal Intelligence Commission Australian Criminal Intelligence Management Strategy 2017–20 FOREWORD The United Nations Office on Drugs and Crime (UNODC) describes criminal intelligence as “... the lifeblood of the fight against transnational organized crime. It is the foundation for
    [Show full text]
  • The Haqqani Network in Kurram the Regional Implications of a Growing Insurgency
    May 2011 The haQQani NetworK in KURR AM THE REGIONAL IMPLICATIONS OF A GROWING INSURGENCY Jeffrey Dressler & Reza Jan All rights reserved. Printed in the United States of America. ©2011 by the Institute for the Study of War and AEI’s Critical Threats Project Cover image courtesy of Dr. Mohammad Taqi. the haqqani network in kurram The Regional Implications of a Growing Insurgency Jeffrey Dressler & Reza Jan A Report by the Institute for the Study of War and AEI’s Critical Threats Project ACKNOWLEDGEMENts This report would not have been possible without the help and hard work of numerous individuals. The authors would like to thank Alex Della Rocchetta and David Witter for their diligent research and critical support in the production of the report, Maggie Rackl for her patience and technical skill with graphics and design, and Marisa Sullivan and Maseh Zarif for their keen insight and editorial assistance. The authors would also like to thank Kim and Fred Kagan for their necessary inspiration and guidance. As always, credit belongs to many, but the contents of this report represent the views of the authors alone. taBLE OF CONTENts Introduction.....................................................................................1 Brief History of Kurram Agency............................................................1 The Mujahideen Years & Operation Enduring Freedom .............................. 2 Surge of Sectarianism in Kurram ...........................................................4 North Waziristan & The Search for New Sanctuary.....................................7
    [Show full text]
  • Taliban Fragmentation FACT, FICTION, and FUTURE by Andrew Watkins
    PEACEWORKS Taliban Fragmentation FACT, FICTION, AND FUTURE By Andrew Watkins NO. 160 | MARCH 2020 Making Peace Possible NO. 160 | MARCH 2020 ABOUT THE REPORT This report examines the phenomenon of insurgent fragmentation within Afghanistan’s Tali- ban and implications for the Afghan peace process. This study, which the author undertook PEACE PROCESSES as an independent researcher supported by the Asia Center at the US Institute of Peace, is based on a survey of the academic literature on insurgency, civil war, and negotiated peace, as well as on interviews the author conducted in Afghanistan in 2019 and 2020. ABOUT THE AUTHOR Andrew Watkins has worked in more than ten provinces of Afghanistan, most recently as a political affairs officer with the United Nations. He has also worked as an indepen- dent researcher, a conflict analyst and adviser to the humanitarian community, and a liaison based with Afghan security forces. Cover photo: A soldier walks among a group of alleged Taliban fighters at a National Directorate of Security facility in Faizabad in September 2019. The status of prisoners will be a critical issue in future negotiations with the Taliban. (Photo by Jim Huylebroek/New York Times) The views expressed in this report are those of the author alone. They do not necessarily reflect the views of the United States Institute of Peace. An online edition of this and related reports can be found on our website (www.usip.org), together with additional information on the subject. © 2020 by the United States Institute of Peace United States Institute of Peace 2301 Constitution Avenue NW Washington, DC 20037 Phone: 202.457.1700 Fax: 202.429.6063 E-mail: [email protected] Web: www.usip.org Peaceworks No.
    [Show full text]
  • The Network of the Ismaili Castles in the Alamut Region Introduction
    The Network of the Ismaili Castles in the Alamut Region Introduction Early Ismailis in Persia Ismailis are one of the several religious sects of Shiite Islam which originally formed after the death of Imam Jaʿfar al-Sadeq in 765. These sects owe their origin to the issue of his succession (Fig. 2). In 909 they officially established a Shiite caliphate in modern Tunisia which was named Fatimid dynasty (909 -1171).1 The Fatimids benefited from a systematic method of propaganda (daʿwa) to extend their power and rule over the Muslim communities in the other part of the Islamic world. The daʿwa organization was composed of network of missionaries who disseminated the religious and political beliefs of Ismailis within the Fatimid dominions as well as in other regions.2 By the late 11th century, the number of converts in different regions of Persia (e.g. Isfahan, Rey, Khorasan, and Transoxania) had grown as a result of the activities of several daʿi (missionaries) operating in the Persian territories. The Ismaili daʿwa was even more successful in the areas of Deylaman and Qohistan which were already the centres of socio-religious oppositions against the Saljuq government.3 The main reason for such an acceptance of the daʿwa in the Persian lands was the widespread perception of social injustices caused by the political-economic policies of the Saljuq Turks (1037 - 1194).4 All of these conditions provided a 1 Farhad Daftary, “Ismailism, Ismaili History”, in the Encyclopedia of Iranica, Vol. XIV, Fasc. 2, 2007, pp. 178- 195, available online at http://www.iranicaonline.org/articles/ismailism-iii-ismaili-history, accessed 11 February 2014.
    [Show full text]
  • PERSPECTIVES on TERRORISM Volume 11, Issue 5
    ISSN 2334-3745 Volume V, Issue 5 October 2017 PERSPECTIVES ON TERRORISM Volume 11, Issue 5 Table of Contents Welcome from the Editors......................................................................................................1 Articles Countering Violent Extremism in Prisons: A Review of Key Recent Research and Critical Research Gaps.........................................................................................................................2 by Andrew Silke and Tinka Veldhuis The New Crusaders: Contemporary Extreme Right Symbolism and Rhetoric..................12 by Ariel Koch Exploring the Continuum of Lethality: Militant Islamists’ Targeting Preferences in Europe....................................................................................................................................24 by Cato Hemmingby Research Notes On and Off the Radar: Tactical and Strategic Responses to Screening Known Potential Terrorist Attackers................................................................................................................41 by Thomas Quiggin Resources Terrorism Bookshelf.............................................................................................................50 Capsule Reviews by Joshua Sinai Bibliography: Terrorist Organizations: Cells, Networks, Affiliations, Splits......................67 Compiled and selected by Judith Tinnes Bibliography: Life Cycles of Terrorism..............................................................................107 Compiled and selected by Judith
    [Show full text]
  • Long-Term Missing Child Guide for Law Enforcement
    Long-term missing child guide for law enforcement: Strategies for finding long-term missing children Long-term missing child guide for law enforcement: Strategies for finding long-term missing children 2016 Edited by Robert G. Lowery, Jr., and Robert Hoever National Center for Missing & Exploited Children® www.missingkids.org 1-800-THE-LOST® or 1-800-843-5678 ORI VA007019W Copyright © 2016 National Center for Missing & Exploited Children. All rights reserved. This project was supported by Grant No. 2015-MC-CX-K001 awarded by the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. This document is provided for informational purposes only and does not constitute legal advice or professional opinion about specific facts. Information provided in this document may not remain current or accurate, so recipients should use this document only as a starting point for their own independent research and analysis. If legal advice or other expert assistance is required, the services of a competent professional should be sought. Points of view or opinions in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. CyberTipline®, National Center for Missing & Exploited Children®, 1-800-THE-LOST® and Project ALERT® are registered trademarks of the National Center for Missing & Exploited Children. LONG-TERM MISSING CHILD GUIDE FOR LAW ENFORCEMENT - 2 Contents Acknowledgments.....10 Letter from John Walsh.....15 Foreword by Patty Wetterling.....16 Chapter 1: Introduction by Robert G. Lowery, Jr......18 Quick reference.....18 We are finding more long-term missing children now.....19 Are we doing enough?.....21 Chapter 2: Overview of missing children cases by Robert G.
    [Show full text]
  • The Jihadi Threat: ISIS, Al-Qaeda, and Beyond
    THE JIHADI THREAT ISIS, AL QAEDA, AND BEYOND The Jihadi Threat ISIS, al- Qaeda, and Beyond Robin Wright William McCants United States Institute of Peace Brookings Institution Woodrow Wilson Center Garrett Nada J. M. Berger United States Institute of Peace International Centre for Counter- Terrorism Jacob Olidort The Hague Washington Institute for Near East Policy William Braniff Alexander Thurston START Consortium, University of Mary land Georgetown University Cole Bunzel Clinton Watts Prince ton University Foreign Policy Research Institute Daniel Byman Frederic Wehrey Brookings Institution and Georgetown University Car ne gie Endowment for International Peace Jennifer Cafarella Craig Whiteside Institute for the Study of War Naval War College Harleen Gambhir Graeme Wood Institute for the Study of War Yale University Daveed Gartenstein- Ross Aaron Y. Zelin Foundation for the Defense of Democracies Washington Institute for Near East Policy Hassan Hassan Katherine Zimmerman Tahrir Institute for Middle East Policy American Enterprise Institute Charles Lister Middle East Institute Making Peace Possible December 2016/January 2017 CONTENTS Source: Image by Peter Hermes Furian, www . iStockphoto. com. The West failed to predict the emergence of al- Qaeda in new forms across the Middle East and North Africa. It was blindsided by the ISIS sweep across Syria and Iraq, which at least temporarily changed the map of the Middle East. Both movements have skillfully continued to evolve and proliferate— and surprise. What’s next? Twenty experts from think tanks and universities across the United States explore the world’s deadliest movements, their strate- gies, the future scenarios, and policy considerations. This report reflects their analy sis and diverse views.
    [Show full text]
  • Belgian Federalism After the Sixth State Reform by Jurgen Goossens and Pieter Cannoot
    ISSN: 2036-5438 Belgian Federalism after the Sixth State Reform by Jurgen Goossens and Pieter Cannoot Perspectives on Federalism, Vol. 7, issue 2, 2015 Except where otherwise noted content on this site is licensed under a Creative Commons 2.5 Italy License E - 29 Abstract This paper highlights the most important institutional evolutions of Belgian federalism stemming from the implementation of the sixth state reform (2012-2014). This reform inter alia included a transfer of powers worth 20 billion euros from the federal level to the level of the federated states, a profound reform of the Senate, and a substantial increase in fiscal autonomy for the regions. This contribution critically analyses the current state of Belgian federalism. Although the sixth state reform realized important and long-awaited changes, further evolutions are to be expected. Since the Belgian state model has reached its limits with regard to complexity and creativity, politicians and academics should begin to reflect on the seventh state reform with the aim of increasing the transparency of the current Belgian institutional labyrinth. Key-words Belgium, state reform, Senate, constitutional amendment procedure, fiscal autonomy, distribution of powers, Copernican revolution Except where otherwise noted content on this site is licensed under a Creative Commons 2.5 Italy License E - 30 1. Introduction After the federal elections of 2010, Belgian politicians negotiated for 541 days in order to form the government of Prime Minister Di Rupo, which took the oath on 6 December 2011. This resulted in the (unofficial) world record of longest government formation period. After the Flemish liberal party (Open VLD) elicited the end of the government of Prime Minister Leterme, Belgian citizens had to vote on 13 June 2010.
    [Show full text]
  • The Migration of Indians to Eastern Africa: a Case Study of the Ismaili Community, 1866-1966
    University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2019 The Migration of Indians to Eastern Africa: A Case Study of the Ismaili Community, 1866-1966 Azizeddin Tejpar University of Central Florida Part of the African History Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Masters Thesis (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Tejpar, Azizeddin, "The Migration of Indians to Eastern Africa: A Case Study of the Ismaili Community, 1866-1966" (2019). Electronic Theses and Dissertations, 2004-2019. 6324. https://stars.library.ucf.edu/etd/6324 THE MIGRATION OF INDIANS TO EASTERN AFRICA: A CASE STUDY OF THE ISMAILI COMMUNITY, 1866-1966 by AZIZEDDIN TEJPAR B.A. Binghamton University 1971 A thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in the Department of History in the College of Arts and Humanities at the University of Central Florida Orlando, Florida Spring Term 2019 Major Professor: Yovanna Pineda © 2019 Azizeddin Tejpar ii ABSTRACT Much of the Ismaili settlement in Eastern Africa, together with several other immigrant communities of Indian origin, took place in the late nineteenth century and early twentieth centuries. This thesis argues that the primary mover of the migration were the edicts, or Farmans, of the Ismaili spiritual leader. They were instrumental in motivating Ismailis to go to East Africa.
    [Show full text]