Terrorism Against Democracy

Total Page:16

File Type:pdf, Size:1020Kb

Terrorism Against Democracy Terrorism Against Democracy By M. Merrick Yamamoto CISSM Working Paper January 2015 Center for International and Security Studies at Maryland 4113 Van Munching Hall, School of Public Policy University of Maryland College Park, MD 20742 (301) 405-7601 Terrorism Against Democracy Based in Part on Stansfield Turner’s University of Maryland Course, “Terrorism & Democracy” By M. Merrick Yamamoto © 2015 by M. Merrick Yamamoto Preface & Acknowledgements This monograph approaches the problem of terrorism from the perspective of the process of a terrorist attack; that is, how terrorism is intended to “operate.” Comprehension of the intended process of the terrorist attack can help defeat terrorists, reduce terrorism, and avoid the damage that can result from poor responses to attacks. Part I of the monograph analyzes terrorism. Chapter 1 analyzes what terrorism is, and what kinds of acts are and are not terrorism. Chapter 2 analyzes the ways that terrorism is intended to operate on third-parties—the governments, organizations, individuals, and groups from which terrorists seek to elicit responses. Chapter 3 analyzes the causes of terrorism, and the threats that terrorism poses. Part II addresses what to do about terrorism—how to prevent terrorism, respond effectively to attacks, and defeat terrorists. Analysis of the steps of the terrorist attack shows that terrorism can be prevented and countered at each step. The monograph then addresses a general counterterrorism strategy. The monograph uses the Turner-Yamamoto Terrorism Model as a guide to comprehending terrorism and how to combat it. The model illustrates the steps of the terrorist attack, and shows how terrorism is intended to operate. Adapted forms of the model show different aspects of terrorism such as the role of the media in terrorist attacks, and why people choose to use terrorism. The model can be used to identify ways to prevent terrorist attacks, respond effectively if they occur, and reduce the use of terrorism. The model has other uses, such as to identify the characteristics of terrorism. These characteristics can show the differences between terrorism and other forms of political violence, and can be used to analyze incidents to determine whether or not they are acts of terrorism. The model helps identify which characteristics must be included in any definition of terrorism, evaluate the strengths and weaknesses of different definitions, and develop accurate and useful definitions. Appendices address the definition of terrorism, the problems involved with trying to obtain agreement on a definition of terrorism, and analysis of arguments that have been made to try to justify terrorist attacks. Analysis shows that terrorism can be accurately defined in more than one way, that obstacles to obtaining a widely agreed-upon definition can be overcome, and that none of the arguments that terrorists and their supporters use to try to justify terrorism are valid. The impetus to prepare this monograph came from Admiral Stansfield Turner’s course, “Terrorism & Democracy,” which he taught from 2002–2006 in response to the 9/11 attacks on September 11, 2001. During the period that he taught the course, he encouraged the development of a number of the principles in the monograph and included them in his course, and until his retirement was involved with many aspects of the monograph. *** Many thanks are due to Admiral Stansfield Turner, Dr. John Steinbruner, Captain George Thibault, Susan Borcherding, Dr. Andrea Williams, Kenneth Williams, and Michelle Davis for their help. Special thanks to Dr. Margaret Scheffelin for her invaluable and untiring assistance in the development of the principles underlying the monograph; Edward J. Scheffelin and the Visual Tutor Company for generous support; and, most of all, Clifford Yamamoto. Contents PREFACE & ACKNOWLEDGEMENTS DEDICATION PART I: WHAT IS TERRORISM AND HOW DOES IT OPERATE? ........................ 1 CHAPTER 1: WHAT IS TERRORISM? .......................................................................... 1 I. TERRORISM AND THE TERRORIST ATTACK ....................................................................... 1 II. THE CHARACTERISTICS OF TERRORISM ........................................................................ 13 III. ACCURATE DEFINITIONS OF TERRORISM ..................................................................... 21 IV. SUMMARY ................................................................................................................... 22 CHAPTER 2. HOW TERRORISM “OPERATES” ....................................................... 23 INTRODUCTION.................................................................................................................. 23 I. TERRORIST “MECHANISMS” FOR ELICITING REPONSES .................................................. 23 II. THE LEVERAGE OF TERRORISM .................................................................................... 44 III. IS TERRORISM EFFECTIVE? .......................................................................................... 51 IV. SUMMARY ................................................................................................................... 55 CHAPTER 3. THE CAUSE AND THREAT OF TERRORISM .................................. 56 INTRODUCTION.................................................................................................................. 56 I. THE CAUSE OF TERRORISM ............................................................................................ 56 II. THE THREAT FROM TERRORISM .................................................................................... 61 III. SUMMARY ................................................................................................................... 70 PART II: THE CONTROL AND PREVENTION OF TERRORISM ......................... 71 CHAPTER 4. RESPONDING TO TERRORIST ATTACKS ....................................... 71 INTRODUCTION.................................................................................................................. 71 I. GOVERNMENTS .............................................................................................................. 72 II. THE PUBLIC ................................................................................................................ 106 III. THE MEDIA ............................................................................................................... 113 IV. SUMMARY ................................................................................................................. 116 CHAPTER 5. THE PREVENTION OF TERRORISM ............................................... 119 INTRODUCTION................................................................................................................ 119 I. THE TARGETS OF VIOLENCE ........................................................................................ 120 II. THE MEANS OF VIOLENCE .......................................................................................... 123 III. THE ATTACKER ......................................................................................................... 125 IV. SUMMARY ................................................................................................................. 138 CHAPTER 6. A COMPREHENSIVE COUNTERTERRORISM STRATEGY ....... 139 I. A COMPREHENSIVE, SUSTAINED STRATEGY ................................................................ 139 II. CONCLUSION .............................................................................................................. 146 APPENDIXES .................................................................................................................. 147 APPENDIX A. TERRORISM AND POLITICAL VIOLENCE MODELS ............... 147 APPENDIX B. CONSTRUCTION OF THE DEFINITION OF TERRORISM ....... 161 I. THE CHARACTERISTICS OF TERRORISM ....................................................................... 161 II. THE CHARACTERISTICS OF TERRORISM AND ITS DEFINITION ..................................... 190 APPENDIX C. AGREEMENT ON A DEFINITION OF TERRORISM ................... 193 INTRODUCTION................................................................................................................ 193 I. ARGUMENTS AGAINST DEFINING TERRORISM ............................................................. 193 II. ARGUMENTS FOR DEFINING TERRORISM .................................................................... 197 APPENDIX D. ATTEMPTS TO JUSTIFY TERRORISM ......................................... 203 INTRODUCTION................................................................................................................ 203 I. CLAIMS THAT “OTHERS” ARE RESPONSIBLE FOR ATTACKS ........................................ 203 II. CLAIMS THAT TERRORIST VIOLENCE IS JUSTIFIED ..................................................... 206 III. WAR AND MILITARY “JUSTIFICATIONS” .................................................................... 212 IV. SUMMARY ................................................................................................................. 226 SELECTED BIBLIOGRAPHY ...................................................................................... 227 INDEX ............................................................................................................................... 232 Dedication For Michael Selves, Dean Mattson, and the other Pentagon victims of the 9/11 attacks; Admiral Stansfield Turner;
Recommended publications
  • IATA CLEARING HOUSE PAGE 1 of 21 2021-09-08 14:22 EST Member List Report
    IATA CLEARING HOUSE PAGE 1 OF 21 2021-09-08 14:22 EST Member List Report AGREEMENT : Standard PERIOD: P01 September 2021 MEMBER CODE MEMBER NAME ZONE STATUS CATEGORY XB-B72 "INTERAVIA" LIMITED LIABILITY COMPANY B Live Associate Member FV-195 "ROSSIYA AIRLINES" JSC D Live IATA Airline 2I-681 21 AIR LLC C Live ACH XD-A39 617436 BC LTD DBA FREIGHTLINK EXPRESS C Live ACH 4O-837 ABC AEROLINEAS S.A. DE C.V. B Suspended Non-IATA Airline M3-549 ABSA - AEROLINHAS BRASILEIRAS S.A. C Live ACH XB-B11 ACCELYA AMERICA B Live Associate Member XB-B81 ACCELYA FRANCE S.A.S D Live Associate Member XB-B05 ACCELYA MIDDLE EAST FZE B Live Associate Member XB-B40 ACCELYA SOLUTIONS AMERICAS INC B Live Associate Member XB-B52 ACCELYA SOLUTIONS INDIA LTD. D Live Associate Member XB-B28 ACCELYA SOLUTIONS UK LIMITED A Live Associate Member XB-B70 ACCELYA UK LIMITED A Live Associate Member XB-B86 ACCELYA WORLD, S.L.U D Live Associate Member 9B-450 ACCESRAIL AND PARTNER RAILWAYS D Live Associate Member XB-280 ACCOUNTING CENTRE OF CHINA AVIATION B Live Associate Member XB-M30 ACNA D Live Associate Member XB-B31 ADB SAFEGATE AIRPORT SYSTEMS UK LTD. A Live Associate Member JP-165 ADRIA AIRWAYS D.O.O. D Suspended Non-IATA Airline A3-390 AEGEAN AIRLINES S.A. D Live IATA Airline KH-687 AEKO KULA LLC C Live ACH EI-053 AER LINGUS LIMITED B Live IATA Airline XB-B74 AERCAP HOLDINGS NV B Live Associate Member 7T-144 AERO EXPRESS DEL ECUADOR - TRANS AM B Live Non-IATA Airline XB-B13 AERO INDUSTRIAL SALES COMPANY B Live Associate Member P5-845 AERO REPUBLICA S.A.
    [Show full text]
  • The SPD and the Debacle of the 2009 German Federal Elections
    Focus on Germany London Office November 2009 The SPD and the Debacle of the 2009 German Federal Elections: An opportunity for renewal The result of the 2009 German federal elections was disastrous for the German Social Democratic Party (SPD). Germany’s oldest party slumped to its worst re- sult in the history of the Federal Republic, polling only 23% of the vote (down from 34% in 2005) (SBD 2009a and 2009b). The authors, William E Paterson and James Sloam, however, argue that this devastating defeat must be placed into the wider context of long-term developments in German and European politics: the decline of the German catch-all parties (and rise of the three smaller parties); and, the changing role of political parties in general and social democratic par- ties in modern politics. The election result is not the end or even the beginning of the end of social democracy. What the SPD now needs are a new generation of charismatic leaders, a post crisis narrative and new more porous and responsive structures. William E Paterson and James Sloam* The result of the 2009 German federal elections voted for the party only four years earlier). For was disastrous for the German Social Democ- German party politics – unused to political land- ratic Party (SPD). Germany’s oldest party slides – this marked an extraordinary turn of slumped to its worst result in the history of the events. Trust in the SPD’s competence, identifi- Federal Republic, polling only 23% of the vote cation with its values, and belief in its credibility (down from 34% in 2005) (SBD 2009a and all nosedived.
    [Show full text]
  • The Origins of Hamas: Militant Legacy Or Israeli Tool?
    THE ORIGINS OF HAMAS: MILITANT LEGACY OR ISRAELI TOOL? JEAN-PIERRE FILIU Since its creation in 1987, Hamas has been at the forefront of armed resistance in the occupied Palestinian territories. While the move- ment itself claims an unbroken militancy in Palestine dating back to 1935, others credit post-1967 maneuvers of Israeli Intelligence for its establishment. This article, in assessing these opposing nar- ratives and offering its own interpretation, delves into the historical foundations of Hamas starting with the establishment in 1946 of the Gaza branch of the Muslim Brotherhood (the mother organization) and ending with its emergence as a distinct entity at the outbreak of the !rst intifada. Particular emphasis is given to the Brotherhood’s pre-1987 record of militancy in the Strip, and on the complicated and intertwining relationship between the Brotherhood and Fatah. HAMAS,1 FOUNDED IN the Gaza Strip in December 1987, has been the sub- ject of numerous studies, articles, and analyses,2 particularly since its victory in the Palestinian legislative elections of January 2006 and its takeover of Gaza in June 2007. Yet despite this, little academic atten- tion has been paid to the historical foundations of the movement, which grew out of the Muslim Brotherhood’s Gaza branch established in 1946. Meanwhile, two contradictory interpretations of the movement’s origins are in wide circulation. The !rst portrays Hamas as heir to a militant lineage, rigorously inde- pendent of all Arab regimes, including Egypt, and harking back to ‘Izz al-Din al-Qassam,3 a Syrian cleric killed in 1935 while !ghting the British in Palestine.
    [Show full text]
  • Survey of Terrorist Groups and Their Means of Financing
    SURVEY OF TERRORIST GROUPS AND THEIR MEANS OF FINANCING HEARING BEFORE THE SUBCOMMITTEE ON TERRORISM AND ILLICIT FINANCE OF THE COMMITTEE ON FINANCIAL SERVICES U.S. HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS SECOND SESSION SEPTEMBER 7, 2018 Printed for the use of the Committee on Financial Services Serial No. 115–116 ( U.S. GOVERNMENT PUBLISHING OFFICE 31–576 PDF WASHINGTON : 2018 VerDate Mar 15 2010 14:03 Dec 06, 2018 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 G:\GPO PRINTING\DOCS\115TH HEARINGS - 2ND SESSION 2018\2018-09-07 TIF TERRO mcarroll on FSR431 with DISTILLER HOUSE COMMITTEE ON FINANCIAL SERVICES JEB HENSARLING, Texas, Chairman PATRICK T. MCHENRY, North Carolina, MAXINE WATERS, California, Ranking Vice Chairman Member PETER T. KING, New York CAROLYN B. MALONEY, New York EDWARD R. ROYCE, California NYDIA M. VELA´ ZQUEZ, New York FRANK D. LUCAS, Oklahoma BRAD SHERMAN, California STEVAN PEARCE, New Mexico GREGORY W. MEEKS, New York BILL POSEY, Florida MICHAEL E. CAPUANO, Massachusetts BLAINE LUETKEMEYER, Missouri WM. LACY CLAY, Missouri BILL HUIZENGA, Michigan STEPHEN F. LYNCH, Massachusetts SEAN P. DUFFY, Wisconsin DAVID SCOTT, Georgia STEVE STIVERS, Ohio AL GREEN, Texas RANDY HULTGREN, Illinois EMANUEL CLEAVER, Missouri DENNIS A. ROSS, Florida GWEN MOORE, Wisconsin ROBERT PITTENGER, North Carolina KEITH ELLISON, Minnesota ANN WAGNER, Missouri ED PERLMUTTER, Colorado ANDY BARR, Kentucky JAMES A. HIMES, Connecticut KEITH J. ROTHFUS, Pennsylvania BILL FOSTER, Illinois LUKE MESSER, Indiana DANIEL T. KILDEE, Michigan SCOTT TIPTON, Colorado JOHN K. DELANEY, Maryland ROGER WILLIAMS, Texas KYRSTEN SINEMA, Arizona BRUCE POLIQUIN, Maine JOYCE BEATTY, Ohio MIA LOVE, Utah DENNY HECK, Washington FRENCH HILL, Arkansas JUAN VARGAS, California TOM EMMER, Minnesota JOSH GOTTHEIMER, New Jersey LEE M.
    [Show full text]
  • WALTER CRONKITE – IMAGE #28 the 20Th Summer Olympic Games
    WALTER CRONKITE – IMAGE #28 The 20th Summer Olympic Games were held in Munich, Germany, in 1972. Tensions ran high at these Olympics, because they were the first Olympic games held in Germany since the Nazis hosted them in 1936. The Israeli athletes and their trainers were especially nervous. Many had family members who had been murdered during the Holocaust or were themselves Holocaust survivors. The first few days of the Olympic Games went smoothly. On September 4th the Israeli team spent the evening out, seeing the play, Fiddler on the Roof. Then they went back to the Olympic Village to sleep. A little after 4 a.m. on September 5th, as the Israeli athletes slept, eight members of the Palestinian Liberation Organization terrorist group, Black September, jumped over the six-foot high fence that encircled the Olympic Village. The terrorists headed straight for 31 Connollystrasse, the building where the Israeli contingent was staying. Around 4:30 a.m. the terrorists entered the building. They rounded up the occupants of apartment 1 and, then, apartment 3. Several of the Israelis fought back. Two of them were killed. A couple of others were able to escape out windows. Nine were taken hostage. By 5:10 a.m. the police had been alerted, and news of the attack had spread around the world. The terrorists then dropped a list of their demands out the window. They wanted 234 prisoners released from Israeli prisons and two from German prisons by 9 a.m. Negotiators were able to extend the deadline to noon, then to 1 p.m., then to 3 p.m., then to 5 p.m.
    [Show full text]
  • The Munich Massacre: a New History
    The Munich Massacre: A New History Eppie Briggs (aka Marigold Black) A thesis submitted in partial fulfilment of the requirements of the degree of BA (Hons) in History University of Sydney October 2011 1 Contents Introduction and Historiography Part I – Quiet the Zionist Rage 1. The Burdened Alliance 2. Domestic Unrest Part II – Rouse the Global Wrath 3. International Condemnation 4. The New Terrorism Conclusion 2 Acknowledgments I would like to thank first and foremost Dr Glenda Sluga to whom I am greatly indebted for her guidance, support and encouragement. Without Glenda‟s sage advice, the writing of this thesis would have been an infinitely more difficult and painful experience. I would also like to thank Dr Michael Ondaatje for his excellent counsel, good-humour and friendship throughout the last few years. Heartfelt thanks go to Elise and Dean Briggs for all their love, support and patience and finally, to Angus Harker and Janie Briggs. I cannot adequately convey the thanks I owe Angus and Janie for their encouragement, love, and strength, and for being a constant reminder as to why I was writing this thesis. 3 Abstract This thesis examines the Nixon administration’s response to the Munich Massacre; a terrorist attack which took place at the 1972 Olympic Games in Munich. By examining the contextual considerations influencing the administration’s response in both the domestic and international spheres, this thesis will determine the manner in which diplomatic intricacies impacted on the introduction of precedent setting counterterrorism institutions. Furthermore, it will expound the correlation between the Nixon administration’s response and a developing conceptualisation of acts of modern international terrorism.
    [Show full text]
  • Air Traffic Situation: Monday 15 June 2020 & Week 24
    Maggi COVID19 Impact on European Air Traffic EUROCONTROL Comprehensive Assessment Air Traffic situation: Monday 15 June 2020 & Week 24 (08-14 June 2020) (compared with equivalent period in 2019) Key Highlights • Monday 15 June: o 7,930 flights yesterday Monday 15 June – an increase of 1,346 movements / 20.4% against Monday 8 June. This remain -77.9% against the equivalent day in 2019 but is the busiest day on the network since mid-March 2020. o Resumption of operations amongst others at Brussels Airlines and Austrian Airlines o Notable increases in movements at Lufthansa (228, +45.2%), Air France (204, +36.9%), Sun Express (66, +200%), and Netjets (100, +163.2%). • Traffic projections: Latest EUROCONTROL European Network Operations (NOP) 2020 Recovery Plan (published on 12 June), confirms an upward recovery trend: o Network traffic is expected to reach 10,000 flights by the end of June. o By mid-July, we expect 13,000 flights, which is expected to rise to 15,000 as a minimum later in July (mainly intra-European). This will be around 30-35% of normal capacity. • The traffic scenarios we projected on 24 April remain valid for a coordinated opening and EUROCONTROL is becoming more optimistic. 20 25 30 35 40 10 15 5 000 000 000 000 000 000 000 000 1. 0 • Summary points the on networksituation: 07 Mar 2020 -6% • -5% 09 Mar 2020 -10% -14% NM 11 Mar 2020 -14% W -16% 13 Mar 2020 -17% eek # -20% o o o o o o o o o 15 Mar 2020 -24% flights Network -34% 17 Mar 2020 -44% -51% 2 More than 7, Increase of KLM (145) and Bristow Norway (131).
    [Show full text]
  • Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
    PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions.
    [Show full text]
  • Ostracized in the West, Elected in the East – the Successors of the SED
    Volume 10. One Germany in Europe, 1989 – 2009 The Red Socks (June 24, 1994) The unexpected success of the successor party to the SED, the Party of Democratic Socialism (PDS), at the ballot box in East Germany put the established (Western) parties in a difficult situation: what response was called for, ostracism or integration? The essay analyzes the reasons behind the success of the PDS in the East and the changing party membership. The Party that Lights a Fire Ostracized in the West, voted for in the East – the successors to the SED are drawing surprising support. Discontent over reunification, GDR nostalgia, or a yearning for socialism – what makes the PDS attractive? Last Friday, around 12:30 pm, a familiar ritual began in the Bundestag. When representative Uwe-Jens Heuer of the PDS stepped to the lectern, the parliamentary group of the Union [CDU/CSU] transformed itself into a raging crowd. While Heuer spoke of his party’s SED past, heckling cries rained down on him: “nonsense,” “outrageous.” The PDS makes their competitors’ blood boil, more so than ever. Saxony-Anhalt votes for a new Landtag [state parliament] on Sunday, and the successor to the SED could get twenty percent of the vote. It did similarly well in the European elections in several East German states. In municipal elections, the PDS has often emerged as the strongest faction, for example, in Halle, Schwerin, Rostock, Neubrandenburg, and Hoyerswerda. A specter is haunting East Germany. Is socialism celebrating a comeback, this time in democratic guise? All of the Bonn party headquarters are in a tizzy.
    [Show full text]
  • Annual Report 2006-2008 FINAL
    WEATHERHEAD CENTER FOR INTERNATIONAL AFFAIRS H A R V A R D U N I V E R S I T Y two2006-2007 thousand six – two thousand seven ANNUAL REPORTS two2007-2008 thousand seven – two thousand eight 1737 Cambridge Street • Cambridge, MA 02138 www.wcfia.harvard.edu TABLE OF CONTENTS PEOPLE 2 Advisory Committee 2 Executive Committee 2 Administration 3 RESEARCH ACTIVITIES 5 Small Grants for Faculty Research Projects 5 Medium Grants for Faculty Research Projects 5 Large Grants for Faculty Research Projects 5 Large Grants for Faculty Research Semester Leaves 6 Junior Faculty Synergy Semester Leaves 7 Distinguished Lecture Series 8 Weatherhead Initiative in International Affairs 8 CONFERENCES 10 STUDENT PROGRAMS 31 RESEARCH SEMINARS 45 Africa Research Seminar 45 Challenges Of The Twenty-First Century: European And American Perspectives 46 Communist and Postcommunist Countries Seminar 47 Comparative Politics Research Workshop 47 Comparative Politics Seminar 52 Cultural Politics: Interdisciplinary Pespectives Seminar 52 Director’s Faculty Seminar 53 Economic Growth and Development Workshop 53 Economic History Workshop 54 Ethics And International Relations Seminar 56 Faculty Discussion Group On Political Economy 56 Futue of War Seminar 63 Herbert C. Kelman Seminar on International Conflict Analysis and Resolution 63 International Business Seminar 65 International Economics Workshop 66 International History Seminar 68 International Law and International Relations Seminar 70 Middle East Seminar 71 Political Violence and Civil War 73 Religion and Society 75 Research Workshop in International Relations 75 Research Workshop on Political Economy 77 Science and Society Seminar 83 South Asia Seminar 84 Southeast Asia Security and International Relations 85 Transatlantic Relations Semimar 85 U.S.
    [Show full text]
  • RESPONSES to INFORMATION REQUESTS (Rirs) Page 1 of 2
    Home > Research > Responses to Information Requests RESPONSES TO INFORMATION REQUESTS (RIRs) New Search | About RIR's | Help 03 April 2006 JOR101125.E Jordan: The "Arab National Movement" and treatment of its members by authorities (January 1999 - March 2006) Research Directorate, Immigration and Refugee Board of Canada, Ottawa Information on the Arab National Movement (ANM) in Jordan was scarce among the sources consulted by the Research Directorate. The ANM is described as a Marxist political party (Political Handbook of the Middle East 2006 2006, 238) founded in Beirut in 1948 following the founding of the State of Israel (HRW Oct. 2002; CDI 23 Oct. 2002). The ANM was founded (IPS n.d.) and led by George Habash who went on to create the Popular Front for the Liberation of Palestine (PLFP) (ibid.; HRW Oct. 2002). According to the Center for Defense Information (CDI), a part of the World Security Institute (WSI), which is a research institute supported by public charity and based in Washington, DC (CDI n.d.), the ANM "spread quickly throughout the Arab World" (ibid. 23 Oct. 2002). The CDI added that the ANM was allied with Egypt's Gamal Abdul- Nasser, with whom it shared views on "a unified, free and socialist Arab world with an autonomous Palestine" (ibid.). The Political Handbook of the Middle East 2006 stated that in a 1989 Jordanian poll, the ANM was one of several political parties supporting independent political candidates (2006, 238). The most recent media report on the ANM found by the Research Directorate was from the 29 August 1999 issue of the Jerusalem-based Al-Quds newspaper, which reported that members of the ANM were part of a subcommittee to the Jordanian Opposition Parties' Coordinating Committee, made up of the 14 Jordanian opposition parties.
    [Show full text]
  • Journal of Threat Assessment and Management Postdicting Violence with Sovereign Citizen Actors: an Exploratory Test of the TRAP-18 Darin J
    Journal of Threat Assessment and Management Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18 Darin J. Challacombe and Paul A. Lucas Online First Publication, October 1, 2018. http://dx.doi.org/10.1037/tam0000105 CITATION Challacombe, D. J., & Lucas, P. A. (2018, October 1). Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18. Journal of Threat Assessment and Management. Advance online publication. http://dx.doi.org/10.1037/tam0000105 Journal of Threat Assessment and Management © 2018 American Psychological Association 2018, Vol. 1, No. 999, 000 2169-4842/18/$12.00 http://dx.doi.org/10.1037/tam0000105 Postdicting Violence With Sovereign Citizen Actors: An Exploratory Test of the TRAP-18 Darin J. Challacombe Paul A. Lucas Fort Hays State University Appalachian State University The sovereign citizen movement is one of the largest antigovernment nationalism or domestic terrorist collectives in the United States. In the last decade, over a dozen public officials were injured or killed by individuals adhering to sovereign citizen ideology. The Terrorist Radicalization Assessment Protocol (TRAP-18; Meloy & Gill, 2016; Meloy, Habermeyer, & Guldimann, 2015) is a collection of 18 behavior-based warning signs for terror incidents which has been used to assess primarily international terrorism samples. In this study, the researchers applied the TRAP-18 to both violent and nonviolent incidents involving sovereign citizen members. Using chi-square tests for independence and a logistic regression analysis, the researchers found support for the TRAP-18. The sum of the TRAP-18 scores was able to postdict violent outcomes within the events included within the study.
    [Show full text]