Terrorism and the Media (Including the Internet): an Extensive Bibliography

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Perspectives on Terrorism

Volume 7, Issue 1, Supplement

Terrorism and the Media (including the Internet): an Extensive Bibliography

Compiled and selected by Judith Tinnes

Introduction

This bibliography is intended to serve as an extensive up-to-date resource for studying and researching the multi-faceted relationships between terrorism and the media, including the Internet. It contains over 2.200 records covering academic or professional journal articles (most of them peer-reviewed), book chapters, reports, conference contributions, books, theses and other text publications, mainly in English and German. To keep the bibliography manageable, smaller, more informal publications, e.g., blog posts, research briefs, commentaries, newspaper articles, or newsletters, were not considered – with a few exceptions of contributions containing ideas or subjects that were underrepresented in long-form academic or professional literature.

The vast majority of resources included date from the 21st century, as after 9/11 – the biggest single media event in history – the amount of publications on the relationship between terrorism and the media has increased considerably. However, terrorist use of the media is as old as terrorism itself and has been researched since the beginning of terrorism studies. Therefore, this bibliography is not restricted to a particular time period and covers publications up to early February 2013.

Thematically, the bibliography covers many aspects of the relationship between terrorism and the media, including these:

•••••••••

terrorist use of the traditional media (TV, radio, newspapers); terrorist use of the new media, especially the Internet (E-Jihad, Cyberterrorism); online radicalization; 9/11 as a media event; media-oriented counter-terrorism measures; the psychological impact of media exposure to terrorist attacks; the portrayal of Islam and Muslims after 9/11; the depiction of terrorism in literature, movies and the arts; media-oriented hostage-takings.

Formally, the bibliography has been subdivided into two main sections: „Books and Theses“ and „Articles“; the titles in each section are alphabetically arranged, usually by authors. The Articles section has been structured by sub-sections for each alphabetic letter, starting with a heading consisting of the particular letter preceded by a hash key to enable readers to quickly access it (e.g., when searching for the letter C, open the search window of your text processing software by hitting <control> + <f> (on a Mac: <command> + <f>), then enter #C). A third short section at the end of the bibliography lists websites and blogs that regularly publish analyses of primary source materials (especially jihadist online publications). All websites were last visited on 18 February 2013.

  • S1
  • February 2013

Perspectives on Terrorism

Volume 7, Issue 1, Supplement

To provide readers with reliable information to locate the references, a detailed citation style (including full author first names, journal issue numbers, book series titles, and full URL paths to resources) was used. Where available, DOIs have been added. A DOI (Digital Object Identifier) is a unique and permanent identifier for electronic entities. It takes the form of a two-part character string (e.g. 10.1080/10304310302733): The first part identifies the registrant (in our example 10.1080 for Taylor & Francis), the second part identifies the particular electronic object (here: 10304310302733 for the journal article "September 11 and the Logistics of Communication" by Michael Galvin). In the bibliography, all DOIs were provided in a clickable format to enable readers to directly access the landing page associated with them. DOIs secure a more stable linking than traditional web adresses (URLs), which often alter or disappear, causing so-called 404 error messages. Nevertheless, it might happen that a DOI is defunct. In this case, the user of this bibliography should insert the title of an article – enclosed with quotation marks – into a search engine like Google to retrieve the publication's landing page.

Whenever retrievable, URLs for freely available versions of subscription-based publications have been provided. Thanks to the Open Access movement, self-archiving of publications in institutional repositories or on author homepages for free public use (so-called Green Open Access) has become more common. Please note, that the content of Green Open Access documents is not necessarily identical to the officially published versions (e.g., in case of pre-prints) it might therefore not have passed through all editorial stages publishers employ to ensure quality control (peer review, copy and layout editing etc.). In some cases, articles may only be cited after getting consent by the author(s).

To provide a balanced pool of references, a broad scope of resources and different search strategies were used to retrieve the bibliographic content. 23 free or subscription-based terrorism research journals were searched for articles by browsing their tables of contents manually in order not to miss important content. This core journal list was extended by 71 multi- or interdisciplinary journals of significant importance for terrorism researchers. These journals were identified by using keyword searches on publisher homepages, scanning journal lists, bibliographies, reference lists or citation analyses. For these journals, the tables of contents for the last decade were browsed manually; older back files were checked by using the automatic keyword search function on the journal’s or publisher’s homepages.

Furthermore, 136 websites, blogs, and publication lists of governmental, and non-governmental institutions, private companies, academic, professional, or individual experts were identified and manually browsed for relevant content (especially to retrieve gray literature such as reports or working papers, but also other literature types), or to get alerted with regard to new publications. As terrorism research is an interdisciplinary field with relevant publications scattered over a large scope of publication outlets, the compiler of this bibliography used cross-searches to extend the body of resources. 10 homepages of commercial academic publishers (amongst them Taylor & Francis, SAGE, and Wiley) were automatically searched for relevant content by using the advanced search features offered at their company websites. To keep the amount of results manageable, the keyword search was restricted to the abstract, title, and keywords fields (instead of full-text search).

The scope of the search was further extended by using 13 abstracting and indexing services (including Google Scholar, the Directory of Open Access Journals, and EBSCO) for publisher-

  • S2
  • February 2013

Perspectives on Terrorism

Volume 7, Issue 1, Supplement

independent, multi-disciplinary cross-searches. Results were filtered by employing advanced search functions. In addition, the compiler conducted searches with Google Books and WorldCat to retrieve books, edited volumes, and theses.

Due to the large amount of publications and the decentralisation of information resources in the modern publishing world, this bibliography, while extensive, cannot be totally comprehensive. Due to its length, it is only available in PDF format, not, as usual for contributions of Perspectives on Terrorism in both HTML and PDF format.

  • S3
  • February 2013

Perspectives on Terrorism

Volume 7, Issue 1, Supplement

- All websites were last visited on February 18, 2013 -

Books and Theses

Altheide, David L. (2006): Terrorism and the Politics of Fear. Lanham: AltaMira Press. Altheide, David L. (2009): Terror post 9/11 and the Media. New York: Peter Lang.

Alsultany, Evelyn (2012): Arabs and Muslims in the Media: Race and Representation after 9/11.

New York: New York University Press.

Aly, Anne (2010): A Study of Audience Responses to the Media Discourse about the "Other": The
Fear of Terrorism between Australian Muslims and the Broader Community. Lewiston: Edwin

Mellen Press.

Archetti, Cristina (2012): Understanding Terrorism in the Age of Global Media: A Communication

Approach. New York: Palgrave Macmillan.
Ar-Raqib, Akil; Roche, Edward M. (2009): Virtual Worlds, Real Terrorism. Den Haag: Aardwolf
Publications.

Awan, Akil; Hoskins, Andrew; O'Loughlin, Ben (2011): Radicalisation and Media: Connectivity and Terrorism in the New Media Ecology. (Media, War and Security). London: Routledge.

Awan, Imran; Blakemore, Brian (2012): Policing Cyber Hate, Cyber Threats and Cyber Terrorism.

Farnham: Ashgate.

Aziz, Syamsuddin (2010): Dominant Discourse on News-Making Decisions on Terrorism: The Case

of Indonesian Newspapers. Saarbrücken: LAP LAMBERT Academic Publishing.

Ballard, James David (2005): Terrorism, Media, and Public Policy: The Oklahoma City Bombing.

Cresskill: Hampton Press.

  • S4
  • February 2013

Perspectives on Terrorism

Volume 7, Issue 1, Supplement

Bañez, Justin D. (2010, December): The Internet and Homegrown Jihadist Terrorism: Assessing

U.S. Detection Techniques. (Master's Thesis, Naval Postgraduate School, Monterey, U.S.).

URL: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA536371

Barnett, Brooke; Reynolds, Amy (2009): Terrorism and the Press: An Uneasy Relationship. New

York: Peter Lang.

Ben-Shaul, Nitzan (2006): A Violent World: TV News Images of Middle Eastern Terror and War.

Lanham: Rowman and Littlefield.

Bielby, Clare (2012): Violent Women in Print: Representations in the West German Print Media of the 1960s and 1970s. Rochester: Camden House.

Bolt, Neville (2012): The Violent Image: Insurgent Propaganda and the New Revolutionaries. New

York: Columbia University Press.

Bradshaw, Renee (2008): The Public ’ s V i ew of Terrorism in their Communities as Related to Media-

Viewing Habits. (Master's Thesis, University of Texas, Arlington, U.S.). URL:

http://dspace.uta.edu/handle/10106/1061

Bräuchler, Birgit (2005): Cyberidentities at War: Der Molukkenkonflikt im Internet. Bielefeld: trans-

cript.

Buck, Christian F. (2007): Medien und Geiselnahmen. Fallstudien zum inszenierten Terror. Wies-

baden: VS Verlag für Sozialwissenschaften.

Bunt, Gary R. (2003): Islam in the Digital Age: E-Jihad, Online Fatwas and Cyber Islamic Envi-

ronments. London: Pluto Press.

Burgener, Kate (2005, June): Posen des Terrors: Analyse und Kritik medialer Inszenierungen.

(Diploma Thesis, Hochschule für Gestaltung und Kunst Zürich, Zurich, Switzerland). URL:

http://www.poolart.ch/mainmenu/work/cultural_gender_studies/posen_des_terrors.pdf

  • S5
  • February 2013

Perspectives on Terrorism

Volume 7, Issue 1, Supplement

Ceresa, Alessia (2008): New Technology: Terrorism and an International Prevention-Repression

Strategy. New York: NOVA Science Publishers.

Cettl, Robert (2009): Terrorism in American Cinema: An Analytical Filmography, 1960-2008. Jef-

ferson: McFarland.

Chakravariti, Rahul (2009): Media Coverage of Terrorism and Methods of Diffusion. New Delhi:

MD Publications.

Chen, Hsinchun (2012): Dark Web: Exploring and Data Mining the Dark Side of the Web. (Integrat-

ed Series in Information Systems, Vol. 30). New York: Springer. DOI:

http://dx.doi.org/10.1007/978-1-4614-1557-2

Cockley, David (2009, May): The Media Spectacle of Terrorism and Response-Able Literature.

(Doctoral Dissertation, Texas A&M University, College Station, U.S.). URL:

http://repository.tamu.edu/handle/1969.1/ETD-TAMU-2009-05-367

Colarik, Andrew M. (2006): Cyber Terrorism: Political and Economic Implications. Hershey: Idea

Group.
Council of Europe's Committee of Experts on Terrorism (CODEXTER) (2007): Cyberterrorism:

The Use of the Internet for Terrorist Purposes. Strasbourg: Council of Europe Publishing. URL:

http://book.coe.int/ftp/3013.pdf

Dar, Gulam Mohammad (2005): Terrorism, Mass Media and Public Opinion. New Delhi: Dilpreet
Publishing House.

Dartnell, Michael Y. (2006): Insurgency Online: Web Activism and Global Conflict. Toronto: Uni-

versity of Toronto Press.
Dass, Niranjan (2008): Media and Terrorism. New Delhi: MD Publications Private Limited.

Däwes, Birgit (2011): Ground Zero Fiction: History, Memory, and Representation in the American

9/11 Novel. (American Studies, Vol. 8). Heidelberg: Winter.

  • S6
  • February 2013

Perspectives on Terrorism

Volume 7, Issue 1, Supplement

Debrix, Francois (2007): Tabloid Terror: War, Culture, and Geopolitics. London: Routledge.

DeFoster, Ruth Maku (2010, May): Domestic Terrorism on the Nightly News. (Master's Thesis, University of Minnesota, Minneapolis, U.S.). URL:

http://conservancy.umn.edu/bitstream/93028/1/DeFoster_Ruth_May2010.pdf

Deiß, Marina (2008): Gnade für Gnadenlose? 30 Jahre Deutscher Herbst und die "Begnadigungs- debatte" in den Medien. Marburg: Tectum.

Dillon, Sandra I. (2011, December): The Representation of Terrorism as Defective Communication in V o lker Schlöndorff ’ s D ie Stille nach dem Schuss, Gregor Schnitzler ’ s W a s tun wenn ’ s b rennt, Leander Scholz ’ s R osenfest and Ulrike Edschmid ’ s F rau mit Waffe: Zwei Geschichten aus ter-

roristischen Zeiten. (Doctoral Dissertation, University of Oregon, Eugene, U.S.). URL:

https://scholarsbank.uoregon.edu/xmlui/handle/1794/12149

DiMaggio, Anthony R. (2008): Mass Media, Mass Propaganda: Examining American News in the

"War on Terror". Lanham: Lexington Books.

Domke, David Scott (2004): Review of David Domke's God Willing? Political Fundamentalism in the White House, the "War on Terro r , " and the Echoing Press. London: Pluto Press.

El Difraoui, Asiem (2010): Al Qaida par l’image ou la prophétie du martyre: Une analyse poli- tique de la propagande audiovisuelle du jihad global. (Doctoral Dissertation, Institut d’Etudes

Politiques, Paris, France).

[Book version:] (2012): Al-Qaida par l'image: La prophétie du martyre. (1st ed.). (Proche Ori-

ent). Paris: Presses Universitaires de France.

Elter, Andreas (2008): Propaganda der Tat: Die RAF und die Medien. Frankfurt: Suhrkamp. Exoo, Calvin F. (2010): The Pen and the Sword: Press, Wa r , a nd Terror in the 21st Century. Los

Angeles: SAGE.

  • S7
  • February 2013

Perspectives on Terrorism

Volume 7, Issue 1, Supplement

Fahmy, Shahira (2007): Filling out the Frame: Transnational Visual Coverage and News Practi- tioners' Attitudes towards the Reporting of War and Terrorism. Saarbrücken: VDM Verlag Dr.

Müller.
Flood, Christopher et al. (2012): Islam, Security and Television News. Basingstoke: Palgrave

Macmillan. DOI: http://dx.doi.org/10.1057/9781137006882

Frindte, Wolfgang; Haußecker, Nicole (Eds.): Inszenierter Terrorismus: Mediale Konstruktionen

und individuelle Interpretationen. Wiesbaden: VS Verlag für Sozialwissenschaften.

Geelani, Syed Bismillah (2006): Manufacturing Terrorism: Kashmiri Encounters with Media and

the Law. New Delhi: Promilla & Co./Bibliophile South Asia.

Gerhards, Jürgen et al. (2011): Terrorismus im Fernsehen: Formate, Inhalte und Emotionen in west-

lichen und arabischen Sendern. Wiesbaden: VS Verlag für Sozialwissenschaften.

Giroux, Henry A. (2006): Beyond the Spectacle of Terrorism: Global Uncertainty and the Chal-

lenge of the New Media. (Radical Imagination). Boulder: Paradigm Publishers.

Glück, Antje (2007): Terror im Kopf: Terrorismusberichterstattung in der deutschen und arabis-

chen Elitepresse. (Medien und politische Kommunikation – Naher Osten und islamische Welt, Vol. 14). Berlin: Frank & Timme.

Glück, Cornelia (2003): Die ETA und die Medien: Zwischen Zwangsehe und Zweckgemeinschaft:
Eine Analyse der Berichterstattung spanischer Medien über die baskische Terrororganisation und ihre Auswirkungen auf die Gesellschaft. (POLITICA – Schriftenreihe zur politischen Wis-

senschaft, Vol. 52). Hamburg: Verlag Dr. Kovač.

Golumbic, Martin Charles (2008): Fighting Terror Online: The Convergence of Security, Technolo-

gy, and the Law. New York: Springer. URL: http://www.springerlink.com/content/978-0-387- 73577-1

  • S8
  • February 2013

Perspectives on Terrorism

Volume 7, Issue 1, Supplement

Greenberg, Jeffrey H. (2007, January): Televised News Media Exposure, Fear of Terrorism, and So-

cial Problem-Solving. (Doctoral Dissertation, Drexel University, Philadelphia, U.S.). URL:

http://144.118.25.24/handle/1860/1242

Grishman, Paul (2010): Cyber Terrorism: The Use of the Internet for Terrorist Purposes. New Del-

hi: Axis Publications.
Gustin, Joseph F. (2004): Cyber Terrorism: A Guide for Facility Managers. Lilburn: Fairmont Press.

Gutman, Roy (2008): How we Missed the Story: Osama bin Laden, the Taliban, and the Hijacking

of Afghanistan. Washington: USIP Press.

Hachten, William A.; Scotton, James Francis (2011): The W orld News Prism: Challenges of Digital

Communication. Chichester: Wiley-Blackwell.

Handler, Lauren Krista (2004): Rhetorical Terrorism: Online News Visual Representation of Suicide

Bombing. (Master's Thesis, Florida State University, Tallahassee, U.S.). URL:

http://diginole.lib.fsu.edu/etd/4290

Harten, Shelley (2012): Reenactment eines Traumas: Die Entebbe Flugzeugentführung 1976: Deut- sche Terroristen in der israelischen Presse. Marburg: Tectum.

Hartmann, Anja (2011, July 13): Bildlich gesprochen: Medien, Trauma und Terror in ausgewählten

Romanen zum 11. September 2001. (Doctoral Dissertation, Ludwig-Maximilians-Universität

München, Munich, Germany). URL: http://edoc.ub.uni-muenchen.de/13476

Hill, Andrew (2009): Re-Imagining the War on Terror: Seeing, Waiting, Travelling. (New Security

Challenges Series). Basingstoke: Palgrave Macmillan.

Hodges, Adam (2011): The "War on Terror" Narrative: Discourse and Intertextuality in the Con- struction and Contestation of Sociopolitical Reality. (Oxford Studies in Sociolinguistics). Ox-

ford: Oxford University Press.

  • S9
  • February 2013

Perspectives on Terrorism

Volume 7, Issue 1, Supplement

Hoskins, Andrew; O'Loughlin, Ben (2007): Television and Terror: Conflicting Times and the Crisis

of News Discourse. (New Security Challenges Series). Basingstoke: Palgrave Macmillan.

Hoskins, Andrew; O'Loughlin, Ben (2010): W ar and Media: The Emergence of Diffused War. Cam-

bridge: Polity Press.

Howie, Luke (2010): Terror on the Screen: Witnesses and the Re-Animation of 9/11 as Image-Event,
Popular Culture and Pornography. Washington, D.C.: New Academia.

Jannepally, Hariwardhan Reddy (2010): The 2008 Mumbai Attack and Press Nationalism: A Con- tent Analysis of Coverage in the New York Times, Times of London, Dawn, and the Hindu.

(Master's Thesis, Ohio University, Athens, U.S.). URL: http://etd.ohiolink.edu/view.cgi?

acc_num=ohiou1283534128

Kaur, Gurmanpreet; Pawar, Anand (2012): Cyber Terrorism and Law. Saarbrücken: LAP LAM-
BERT Academic Publishing.

Kellner, Douglas (2005): Media Spectacle and the Crisis of Democracy: Terrorism, Wa r , a nd Elec-

tion Battles. (Cultural Politics & the Promise of Democracy). Boulder: Paradigm Publishers.

Kirchhoff, Susanne (2010): Krieg mit Metaphern: Mediendiskurse über 9/11 und den "War on Ter-

ror". (Critical Media Studies). Bielefeld: transcript.

Kuypers, Jim A. (2006): Bush's War: Media Bias and Justifications for War in a Terrorist Age. Lan-

ham: Rowman & Littlefield.

Lappin, Yaakov (2011): Virtual Caliphate: Exposing the Islamist State on the Internet. Washington:

Potomac Books.

Lewis, Jeff (2005): Language W ars: The Role of Media and Culture in Global Terror and Political

Recommended publications
  • John Arquilla David Ronfeldt of Engaging in Such Serious Doctrinal Change

    John Arquilla David Ronfeldt of Engaging in Such Serious Doctrinal Change

    SWARMING &The Future of Conflict A New Way of War Swarming is a seemingly amorphous, but deliberately structured, coordinated, strategic way to perform military strikes from all directions. It employs a sustainable pulsing of force and/or fire that is directed from both close-in and stand-off positions. It will work best—perhaps it will only work—if it is designed mainly around the deployment of myriad, small, dispersed, networked maneuver units. This calls for an organizational redesign—involving the creation of platoon-like “pods” joined in company-like “clusters”—that would keep but retool the most basic military unit structures. It is similar to the corporate redesign principle of “flattening,” which often removes or redesigns middle layers of management. This has proven successful in the ongoing revolution in business affairs and may prove equally useful in the military realm. From command and control of line units to logistics, profound shifts will have to occur to nurture this new “way of war.” This study examines the benefits—and also the costs and risks— Arquilla David Ronfeldt John of engaging in such serious doctrinal change. The emergence of a military doctrine based on swarming pods and clusters requires that defense policymakers develop new approaches to connectivity and control and achieve a new balance between the two. Far more than traditional approaches to battle, swarming clearly depends upon robust information flows. Securing these flows, therefore, can be seen as a necessary condition for successful swarming. Related Reading Arquilla, John, and David Ronfeldt, The Advent of Netwar, Santa Monica: RAND, MR-789-OSD, 1996.
  • The Elliott School of INTERNATIONAL AFFAIRS

    The Elliott School of INTERNATIONAL AFFAIRS

    THE ELLIOtt SCHOOL OF INTERNATIONAL AFFAIRS ANNUAL REPORT 2006/2007 MISSION THE MISSION OF THE ELLIOTT SCHOOL OF INTERNATIONAL AFFAIRS IS: • To educate the next generation of international leaders • To conduct research and produce scholarship that advances understanding of important global issues • To engage the public and the policy community in the United States and around the world, thereby fostering international dialogue and shaping policy solutions Our mission is to create knowledge, share wisdom and inspire action to make our world a better place. A MESSAGE FROM THE DEAN recent survey of scholars ranked the Elliott School’s undergraduate and graduate programs in the top 10. Only five schools in the world were ranked this highly in A both categories. It’s an impressive club. It’s also an important club. The issues we study at the Elliott School—ranging from war and peace to poverty and development—affect the lives of billions of our fellow human beings. Powerful international dynamics—population growth, rising levels of resource consumption, the expansion of the global economy, mounting environmental challenges—will shape the world in the decades ahead. Wise policy and effective international cooperation will be more important than ever. At the Elliott School, the study of international affairs is not an abstract exercise. Our aim is to make our world a better place. The Elliott School is in a unique position to make a difference. Our location in the heart of Washington, DC—just steps from some of the most influential U.S., international and non- governmental organizations in the world—enriches our teaching and research, and it provides us with unmatched opportunities to engage the U.S.
  • Air Supremacy in US Air Force History, Theory, and Doctrine

    Air Supremacy in US Air Force History, Theory, and Doctrine

    A HOUSE BUILT ON SAND: Air Supremacy in US Air Force History, Theory, and Doctrine E. Taylor Francis Major, USAF Air University James B. Hecker, Lieutenant General, Commander and President LeMay Center for Doctrine Development and Education Brad M. Sullivan, Major General, Commander AIR UNIVERSITY LEMAY CENTER FOR DOCTRINE DEVELOPMENT AND EDUCATION A House Built on Sand: Air Supremacy in US Air Force History, Theory, and Doctrine E. Taylor Francis, Major, USAF Lemay Paper No. 6 Air University Press Muir S. Fairchild Research Information Center Maxwell Air Force Base, Alabama Air University Commander and President Accepted by Air University Press May 2019 and published April 2020. Lt Gen James B. Hecker Commandant and Dean, LeMay Center for Doctrine Development and Education Maj Gen Brad Sullivan Director, Air University Press Lt Col Darin M. Gregg Project Editor Dr. Stephanie Havron Rollins Illustrator Daniel Armstrong Print Specialist Megan N. Hoehn Distribution Diane Clark Disclaimer Air University Press Opinions, conclusions, and recommendations expressed or implied 600 Chennault Circle, Building 1405 within are solely those of the authors and do not necessarily repre- Maxwell AFB, AL 36112-6010 sent the official policy or position of the organizations with which https://www.airuniversity.af.edu/AUPress/ they are associated or the views of the Air University Press, LeMay Center, Air University, United States Air Force, Department of Facebook: https://www.facebook.com/AirUnivPress Defense, or any other US government agency. This publication is cleared for public release and unlimited distribution. and This LeMay Paper and others in the series are available electronically Twitter: https://twitter.com/aupress at the AU Press website: https://www.airuniversity.af.edu/AUPress/ LeMay-Papers/.
  • Y University Library

    Y University Library

    Y university library Fortuno≠ Video Archive for Holocaust Testimonies professor timothy snyder Advisor PO Box 208240 New Haven CT 06520-8240 t 203 432-1879 web.library.yale.edu/testimonies Episode 6 — Renee Hartman Episode Notes by Dr. Samuel Kassow Renee Glassner Hartman was born in 1933 in Bratislava (Pressburg in German, Poszonyi in Hungarian). She had a younger sister, Herta, born in 1935. Their parents, like Herta, were deaF. Their father was a jeweler. This is the story oF two young children who were raised in a loving, religiously observant home and who experienced the traumatic and sudden destruction oF their childhood, the loss oF their parents, and their own deportation to the notorious Bergen-Belsen concentration camp, from which they were liberated by the British in 1945. As they struggled to stay alive, Renee and Herta were inseparable. No matter how depressed and distraught she became, Renee never forgot that her younger sister, unable to hear, totally depended on her. Together they survived a long nightmare that included betrayal, physical violence, liFe-threatening disease, and hunger. During the time when Renee and Herta were born, the Jews oF Bratislava lived in relative peace and security. BeFore World War I, most Jews in Bratislava had spoken Magyar or German (German was the language in Renee’s home). Between the wars they also had to learn Slovak as Bratislava, formerly under Hungarian administration, became part oF the new Czechoslovak state, which was founded in 1918. Under the leadership oF President Thomas Masaryk, Czechoslovakia was a democracy, and somewhat more prosperous than countries like Poland and Hungary.
  • The Use and Abuse of Holocaust Memory

    The Use and Abuse of Holocaust Memory

    http://www.aei.org/publications/pubID.23492/pub_detail.asp Print Mail The Use and Abuse of Holocaust Memory Bradley Lecture By Walter Reich Posted: Monday, November 28, 2005 SPEECHES AEI Online Publication Date: November 14, 2005 I’m very grateful to Chris DeMuth and to the AEI for inviting me to give this Bradley Lecture. It’s a privilege to speak about a subject that means a lot to me before an audience that means a lot to me. This is a case in which the seriousness of the topic is matched and deepened by the seriousness of those who’ve come here to engage it. For this opportunity I thank you, Chris, I thank the AEI and I thank the Bradley Foundation. The Irony of Holocaust Memory: Even as It Grows Stronger, It Grows More Vulnerable to Distortion and Misuse This talk is about Holocaust memory, and I want to be clear, at the outset, about what I mean by that term. By “Holocaust memory” I mean the public’s consciousness of the Holocaust in the years since the event--that is, what the public has known, or at least what it has thought it has known, about the Holocaust. And that consciousness, in turn, has depended on a number of factors that have changed radically over time. Those factors have included the readiness of Holocaust survivors to talk about the Holocaust; the readiness of Jewish communities around the world to talk about it or to have it be talked about; the readiness of governments, the media and the general public to focus on it; and, once the Holocaust did become the focus of general interest some thirty years after the event, the ways in which it has been presented to the public, both accurately and, too often, inaccurately, and what the public has absorbed from those presentations.
  • The Micromanagement Myth and Mission Command: Making the Case for Oversight of Military Operations by Christopher J

    The Micromanagement Myth and Mission Command: Making the Case for Oversight of Military Operations by Christopher J

    STRATEGIC PERSPECTIVES 33 The Micromanagement Myth and Mission Command: Making the Case for Oversight of Military Operations by Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for the Study of Chinese Military Affairs, and Center for the Study of Weapons of Mass Destruction. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the unified combatant commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: General William Westmoreland luncheon meeting with President Lyndon B. Johnson, The White House, April 6, 1968 (Yoichi Okamoto/ Courtesy LBJ Presidential Library/C9391-17A) The Micromanagement Myth and Mission Command The Micromanagement Myth and Mission Command: Making the Case for Oversight of Military Operations By Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 33 Series Editor: Thomas F. Lynch III National Defense University Press Washington, D.C. August 2020 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the State Department, Defense Department, or any other agency of the Federal Government.
  • Military Transformation? Which Transformation, and What Lies Ahead?

    Military Transformation? Which Transformation, and What Lies Ahead?

    THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY institution that helps improve policy and POPULATION AND AGING decisionmaking through research and PUBLIC SAFETY SCIENCE AND TECHNOLOGY analysis. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND National Security Research Division View document details This product is part of the RAND Corporation reprint series. RAND reprints present previously published journal articles, book chapters, and reports with the permission of the publisher. RAND reprints have been formally reviewed in accordance with the publisher’s editorial policy, and are compliant with RAND’s rigorous quality assurance standards for quality and objectivity. 2 Military Transformation? Which Transformation, and What Lies Ahead? Paul K. Davis The term “military transformation” should simply be understood to mean “profound change” in military affairs.1 It need not imply rapid or across-the-board change, nor the discarding of that which continues to work well. The changes, however, should be dramatic rather than mere improvements on the margin such as modestly better aircraft, tanks, or ships. Transformation is a process with no simple end point.2 Military transformations are only sometimes successful; they can even be dis- tinctly counterproductive because militaries often embrace concepts too strongly and uncritically.3 Since mistakes are to be expected, hedging and course correction are basic ingredients in successful transformation.
  • Russian Strategic Intentions

    Russian Strategic Intentions

    APPROVED FOR PUBLIC RELEASE Russian Strategic Intentions A Strategic Multilayer Assessment (SMA) White Paper May 2019 Contributing Authors: Dr. John Arquilla (Naval Postgraduate School), Ms. Anna Borshchevskaya (The Washington Institute for Near East Policy), Dr. Belinda Bragg (NSI, Inc.), Mr. Pavel Devyatkin (The Arctic Institute), MAJ Adam Dyet (U.S. Army, J5-Policy USCENTCOM), Dr. R. Evan Ellis (U.S. Army War College Strategic Studies Institute), Mr. Daniel J. Flynn (Office of the Director of National Intelligence (ODNI)), Dr. Daniel Goure (Lexington Institute), Ms. Abigail C. Kamp (National Consortium for the Study of Terrorism and Responses to Terrorism (START)), Dr. Roger Kangas (National Defense University), Dr. Mark N. Katz (George Mason University, Schar School of Policy and Government), Dr. Barnett S. Koven (National Consortium for the Study of Terrorism and Responses to Terrorism (START)), Dr. Jeremy W. Lamoreaux (Brigham Young University- Idaho), Dr. Marlene Laruelle (George Washington University), Dr. Christopher Marsh (Special Operations Research Association), Dr. Robert Person (United States Military Academy, West Point), Mr. Roman “Comrade” Pyatkov (HAF/A3K CHECKMATE), Dr. John Schindler (The Locarno Group), Ms. Malin Severin (UK Ministry of Defence Development, Concepts and Doctrine Centre (DCDC)), Dr. Thomas Sherlock (United States Military Academy, West Point), Dr. Joseph Siegle (Africa Center for Strategic Studies, National Defense University), Dr. Robert Spalding III (U.S. Air Force), Dr. Richard Weitz (Center for Political-Military Analysis at the Hudson Institute), Mr. Jason Werchan (USEUCOM Strategy Division & Russia Strategic Initiative (RSI)) Prefaces Provided By: RDML Jeffrey J. Czerewko (Joint Staff, J39), Mr. Jason Werchan (USEUCOM Strategy Division & Russia Strategic Initiative (RSI)) Editor: Ms.
  • Course Description Course Goals Grading Course Program And

    Course Description Course Goals Grading Course Program And

    Course program and reading list Semester 1 Year 2021 School: Lauder School of Government, Diplomacy & Strategy B.A Global Terrorism: Al Qaeda and Hezbollah Lecturer: Dr. Eitan Azani [email protected] Teaching Assistant: Dr. Koblentz Liram [email protected] Course No.: Course Type : Weekly Hours : Credit: 4515 Lecture 2 2 Course Requirements : Group Code : Language: Final Paper 211451501 English Course Description The course will discuss the following items: Radicalization Process – from Da’wa to Jihad Radicalization and Deradicalization in the Muslim World The Evolvement of Global Jihad Selected Strategies and Modus Operendi of Selected Terrorist Organizations Al Qaeda Hezbollah ISIS and the threat posed by Foreign Fighters On November 15th, 2020 there will be a “guided exercise”. The class will be divided (on Zoom) to working groups. Dr. Azani will visit the rooms and discuss with each group as per the selected subject matter. *Attendance is mandatory in that date*. Course Goals The scope of terrorist attacks launched in the US post-September 11, the growing use of the threat of using unconventional weapons, and the spread of a radical-Islamic network of terrorism have transformed the once localized threat of terrorism into an international problem. By intentionally targeting civilians while exploiting the freedom embedded in liberal-democratic values, terrorism presents a difficult and complex challenge to decision- makers and counter-terrorism experts. Grading Assessment: midterm presentation (20%) Final Exam (80%) Midterm presentation The assignment will be submitted by groups of 3-5 students Each group will select three of the topics below, out of which one topic will be selected for the group and must be approved by Dr.
  • Stayin' Alive: a Mixed-Methods Study of the Inconsistent Effects Of

    Stayin' Alive: a Mixed-Methods Study of the Inconsistent Effects Of

    MIAMI UNIVERSITY The Graduate School Certificate for Approving the Dissertation We hereby approve the Dissertation of Katherine Wynn Mitakides Candidate for the Degree: Doctor of Philosophy Director (Dr. John Rothgeb) Reader (Dr. Venelin Ganev) Reader (Dr. Warren Mason) Graduate School Representative (Dr. Sheldon Anderson) ABSTRACT STAYIN’ ALIVE: A MIXED-METHODS STUDY OF THE INCONSISTENT EFFECTS OF LEADERSHIP DECAPITATION ON TERRORIST ORGANIZATIONS by Katherine Wynn Mitakides The purpose of this sequential mixed methods study is to provide policymakers with a more- complete understanding of the varying effectiveness of leadership decapitation as a counterterrorism technique. To this end, my central research question asks, “why do certain terrorist groups endure despite experiencing leadership decapitation?”. Drawing on previous studies of terrorism and theories of organizational behavior, I suggest that a high degree of bureaucratization and the provision of social services reduce the destabilizing effects of leadership decapitation by decreasing a group’s functional dependence on any single individual to secure the resources necessary to survive. The first phase of this study is a qualitative exploration of two existing explanations of organizational endurance, bureaucracy and incentive- based organizational maintenance, that should, prima facie, explain leadership decapitation’s varying outcomes. I use a deviant case study of the Egyptian Muslim Brotherhood, one of the oldest and most important politically-violent groups in history, to illustrate existing explanations’ weaknesses and to find evidence linking my proposed characteristics to the outcome of survival. Based on my qualitative findings, I generate a set of hypotheses about the relationship between select organization-level factors and the effectiveness of leadership decapitation.
  • Swarming and the Future of Conflict

    Swarming and the Future of Conflict

    SWARMING &The Future of Conflict A New Way of War Swarming is a seemingly amorphous, but deliberately structured, coordinated, strategic way to perform military strikes from all directions. It employs a sustainable pulsing of force and/or fire that is directed from both close-in and stand-off positions. It will work best—perhaps it will only work—if it is designed mainly around the deployment of myriad, small, dispersed, networked maneuver units. This calls for an organizational redesign—involving the creation of platoon-like “pods” joined in company-like “clusters”—that would keep but retool the most basic military unit structures. It is similar to the corporate redesign principle of “flattening,” which often removes or redesigns middle layers of management. This has proven successful in the ongoing revolution in business affairs and may prove equally useful in the military realm. From command and control of line units to logistics, profound shifts will have to occur to nurture this new “way of war.” This study examines the benefits—and also the costs and risks— Arquilla David Ronfeldt John of engaging in such serious doctrinal change. The emergence of a military doctrine based on swarming pods and clusters requires that defense policymakers develop new approaches to connectivity and control and achieve a new balance between the two. Far more than traditional approaches to battle, swarming clearly depends upon robust information flows. Securing these flows, therefore, can be seen as a necessary condition for successful swarming. Related Reading Arquilla, John, and David Ronfeldt, The Advent of Netwar, Santa Monica: RAND, MR-789-OSD, 1996.
  • Perspectives on Terrorism, Volume 8, Issue 2 (2014)

    Perspectives on Terrorism, Volume 8, Issue 2 (2014)

    PERSPECTIVES ON TERRORISM Volume 8, Issue 2 Table of Contents Welcome from the Editors 1 I. Articles Survival of the Fittest: Why Terrorist Groups Endure 2 by Joseph K. Young and Laura Dugan Hezbollah’s Man in Egypt 24 by Matthew Levitt Defining and Distinguishing Secular and Religious Terrorism 36 by Heather S. Gregg Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon 52 by Lee Jarvis and Stuart Macdonald II. Resources Bibliography: Muslim Brotherhood (Part 1) 66 Compiled and selected by Judith Tinnes Bibliography: (Countering) Violent Extremism and Terrorism 92 Compiled and selected by Eric Price III. Book Reviews “Counterterrorism Bookshelf” – 27 Books on Terrorism & Counterterrorism Related Subjects 103 by Joshua Sinai IV. Notes from the Editors About Perspectives on Terrorism 113 ISSN 2334-3745 i April 2014 PERSPECTIVES ON TERRORISM Volume 8, Issue 2 Welcome from the Editors Dear Reader, We are pleased to announce the release of Volume VIII, Issue 2 (April 2014) of Perspectives on Terrorism at www.terrorismanalysts.com. Our free online journal is a joint publication of the Terrorism Research Initiative (TRI), headquartered in Vienna, and the Centre for Terrorism and Security Studies (CTSS), headquartered at the University of Massachusetts’ Lowell campus. The report from a recent conference on conflict and reconciliation in Syria, co-sponsored by TRI and CTSS, is now available on the journal’s home page ( www.terrorismanalysts.com ), along with the announcement of a new conference – “Religious Extremism in Syria”– to be held May 2 in Vienna, Austria. Also, CTSS is co- sponsoring (with the Society for Terrorism Research) the 8th Annual International Conference on Terrorism and Counterterrorism (17-19 September in Boston, Massachusetts).