Ethnic and Sectarian Violence and the Propensity Towards Praetorianism in Pakistan
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Islamist Politics in South Asia After the Arab Spring: Parties and Their Proxies Working With—And Against—The State
RETHINKING POLITICAL ISLAM SERIES August 2015 Islamist politics in South Asia after the Arab Spring: Parties and their proxies working with—and against—the state WORKING PAPER Matthew J. Nelson, SOAS, University of London SUMMARY: Mainstream Islamist parties in Pakistan such as the Jama’at-e Islami and the Jamiat-e-Ulema-e-Islam have demonstrated a tendency to combine the gradualism of Brotherhood-style electoral politics with dawa (missionary) activities and, at times, support for proxy militancy. As a result, Pakistani Islamists wield significant ideological influence in Pakistan, even as their electoral success remains limited. About this Series: The Rethinking Political Islam series is an innovative effort to understand how the developments following the Arab uprisings have shaped—and in some cases altered—the strategies, agendas, and self-conceptions of Islamist movements throughout the Muslim world. The project engages scholars of political Islam through in-depth research and dialogue to provide a systematic, cross-country comparison of the trajectory of political Islam in 12 key countries: Egypt, Tunisia, Morocco, Kuwait, Saudi Arabia, Yemen, Syria, Jordan, Libya, Pakistan, as well as Malaysia and Indonesia. This is accomplished through three stages: A working paper for each country, produced by an author who has conducted on-the-ground research and engaged with the relevant Islamist actors. A reaction essay in which authors reflect on and respond to the other country cases. A final draft incorporating the insights gleaned from the months of dialogue and discussion. The Brookings Institution is a nonprofit organization devoted to independent research and policy solutions. Its mission is to conduct high-quality, independent research and, based on that research, to provide innovative, practical recommendations for policymakers and the public. -
ON DOCTORS and BOMBS Supermarkets Being Brought in to Colonise ESSAY As We Take a Step Back from the Events of the Primary Care
BaTHcE k Pages Contents Viewpoint 840 ON DOCTORS AND BOMBS supermarkets being brought in to colonise ESSAY As we take a step back from the events of the primary care. Management speak dominates The 21st century GP: summer, perhaps now it is possible to look the discourse, divide-and-rule is the modus physician and priest? Jim Pink, Lionel Jacobson rationally at the effects of the alleged terrorist operandi and drug company research rules and Mike Pritchard attacks in Glasgow and London on the the roost. League tables and other punitive medical profession in this country. measures are manifestations of the 842 Firstly, we need to recognise that the issues pathological culture of bullying and EDO Michael Lasserson are those of criminality and global politics and intimidation that defines transnational are in no way medico-legal or related to capitalist structures. Many diseases of 843 overseas recruitment procedures. We must affluence are actually diseases of ESSAY not succumb to the blind panic that overtook corporatism. From a non-patient’s perspective government and regulatory bodies following A few weeks ago, a colleague of mine in Peter Tomson the Shipman revelations. As a consequence Glasgow was stabbed in the middle of her of this ethos, a lawyer specialising in medical morning surgery. Are we now going to 844 negligence was put in charge of the suspect all patients and install CCTV in our REPORTAGE investigation and with stunning intellectual waiting and consulting-rooms? No, of course The 61st Edinburgh International Film Festival laziness, promptly succeeded in conflating not. Bad eggs do bad things, whether they David Watson criminality with competence issues. -
REFORM OR REPRESSION? Post-Coup Abuses in Pakistan
October 2000 Vol. 12, No. 6 (C) REFORM OR REPRESSION? Post-Coup Abuses in Pakistan I. SUMMARY............................................................................................................................................................2 II. RECOMMENDATIONS.......................................................................................................................................3 To the Government of Pakistan..............................................................................................................................3 To the International Community ............................................................................................................................5 III. BACKGROUND..................................................................................................................................................5 Musharraf‘s Stated Objectives ...............................................................................................................................6 IV. CONSOLIDATION OF MILITARY RULE .......................................................................................................8 Curbs on Judicial Independence.............................................................................................................................8 The Army‘s Role in Governance..........................................................................................................................10 Denial of Freedoms of Assembly and Association ..............................................................................................11 -
White Collar Criminality: a Prediction Model Judith M
Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1991 White collar criminality: a prediction model Judith M. Collins Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Industrial and Organizational Psychology Commons, Personality and Social Contexts Commons, Social Psychology Commons, and the Social Psychology and Interaction Commons Recommended Citation Collins, Judith M., "White collar criminality: a prediction model " (1991). Retrospective Theses and Dissertations. 9607. https://lib.dr.iastate.edu/rtd/9607 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS This manuscript has been reproduced from the microfilm master. UMI films the text directly from the original or copy submitted. Thus, some thesis and dissertation copies are in typewriter face, while others may be from any type of computer printer. The quality of this reproduction is dependent upon the quality of the copy submitted. Broken or indistinct print, colored or poor quality illustrations and photographs, print bleedthrough, substandard margins, and improper alignment can adversely affect reproduction. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyright material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are reproduced by sectioning the original, beginning at the upper left-hand corner and continuing from left to right in equal sections with small overlaps. -
European Commission Pakistan Country Strategy Paper 2007-2013
Pakistan-European Community Country Strategy Paper for 2007-2013 1 TABLE OF CONTENTS List of Acronyms........................................................................................................................... 3 1. EXECUTIVE SUMMARY .............................................................................................. 4 2. THE POLITICAL, ECONOMIC, SOCIAL AND ENVIRONMENTAL SITUATION .................................................................................................................................. 6 2.1 Analysis of the political situation ....................................................................................... 6 2.2 Analysis of the economic situation including trade............................................................ 8 2.3 Analysis of social developments......................................................................................... 9 2.4 Analysis of the Environmental Situation .......................................................................... 10 3. AN OUTLINE OF PAKISTAN’S POLICY AGENDA............................................... 10 3.1 Poverty Alleviation and Macro-Reforms.......................................................................... 10 3.2 Economy and Trade .......................................................................................................... 11 3.3 Social Sector Reforms....................................................................................................... 12 3.4 Environmental policy........................................................................................................13 -
Divide and Conquer
ISSN 1936-5349 (print) ISSN 1936-5357 (online) HARVARD JOHN M. OLIN CENTER FOR LAW, ECONOMICS, AND BUSINESS DIVIDE AND CONQUER Eric A. Posner, Kathryn Spier, & Adrian Vermeule Discussion Paper No. 639 5/2009 Harvard Law School Cambridge, MA 02138 This paper can be downloaded without charge from: The Harvard John M. Olin Discussion Paper Series: http://www.law.harvard.edu/programs/olin_center/ The Social Science Research Network Electronic Paper Collection: http://ssrn.com/abstract=1349971 Divide and Conquer Eric A. Posner,* Kathryn Spier,** & Adrian Vermeule*** Abstract: The maxim “divide and conquer” (divide et impera) is invoked frequently in law, history, and politics, but often in a loose or undertheorized way. We suggest that the maxim is a placeholder for a complex of ideas related by a family resemblance, but differing in their details, mechanisms and implications. We provide an analytic taxonomy of divide and conquer mechanisms in the settings of a Stag Hunt Game and an indefinitely-repeated Prisoners’ Dilemma. A number of applications are considered, including labor law, bankruptcy, constitutional design and the separation of powers, imperialism and race relations, international law, litigation and settlement, and antitrust law. Conditions under which divide and conquer strategies reduce or enhance social welfare, and techniques that policy makers can use to combat divide and conquer tactics, are also discussed. JEL: K0 * University of Chicago Law School. ** Harvard Law School. *** Harvard Law School. Thanks to Adam Badawi, Anu Bradford, Jim Dana, Mary Anne Franks, Aziz Huq, Claudia Landeo, Jonathan Masur, Madhavi Sunder, Lior Strahilevitz, and an audience at the University of Chicago Law School for valuable comments, and Paul Mysliwiec and Colleen Roh for helpful research assistance. -
Imports-Exports Enterprise’: Understanding the Nature of the A.Q
Not a ‘Wal-Mart’, but an ‘Imports-Exports Enterprise’: Understanding the Nature of the A.Q. Khan Network Strategic Insights , Volume VI, Issue 5 (August 2007) by Bruno Tertrais Strategic Insights is a bi-monthly electronic journal produced by the Center for Contemporary Conflict at the Naval Postgraduate School in Monterey, California. The views expressed here are those of the author(s) and do not necessarily represent the views of NPS, the Department of Defense, or the U.S. Government. Introduction Much has been written about the A.Q. Khan network since the Libyan “coming out” of December 2003. However, most analysts have focused on the exports made by Pakistan without attempting to relate them to Pakistani imports. To understand the very nature of the network, it is necessary to go back to its “roots,” that is, the beginnings of the Pakistani nuclear program in the early 1970s, and then to the transformation of the network during the early 1980s. Only then does it appear clearly that the comparison to a “Wal-Mart” (the famous expression used by IAEA Director General Mohammed El-Baradei) is not an appropriate description. The Khan network was in fact a privatized subsidiary of a larger, State-based network originally dedicated to the Pakistani nuclear program. It would be much better characterized as an “imports-exports enterprise.” I. Creating the Network: Pakistani Nuclear Imports Pakistan originally developed its nuclear complex out in the open, through major State-approved contracts. Reprocessing technology was sought even before the launching of the military program: in 1971, an experimental facility was sold by British Nuclear Fuels Ltd (BNFL) in 1971. -
The Political Construction of Collective Insecurity: from Moral Panic To
Center for European Studies Working Paper Series 126 (October 2005) The Political Construction of Collective Insecurity: From Moral Panic to Blame Avoidance and Organized Irresponsibility by Daniel Béland Department of Sociology University of Calgary 2500 University Drive NW Calgary, Alberta, Canada T2N 1N4 Fax: (403) 282-9298 E-mail: [email protected]; web page: http://www.danielbeland.org/ Abstract This theoretical contribution explores the role of political actors in the social construction of collective insecurity. Two parts comprise the article. The first one briefly defines the concept of collective insecurity and the second one bridges existing sociological and political science literatures relevant for the analysis of the politics of insecurity. This theoretical framework articulates five main claims. First, although interesting, the concept of moral panic applies only to a limited range of insecurity episodes. Second, citizens of contemporary societies exhibit acute risk awareness and, when new collective threats emerge, the logic of “organized irresponsibility” often leads citizens and interest groups alike to blame elected officials. Third, political actors mobilize credit claiming and blame avoidance strategies to respond to these threats in a way that enhances their position within the political field. Fourth, powerful interests and institutional forces as well as the “threat infrastructure” specific to a policy area create constraints and opportunities for these strategic actors. Finally, their behavior is proactive or reactive, as political actors can either help push a threat onto the agenda early, or, at a later stage, simply attempt to shape the perception of this threat after other forces have transformed it into a major political issue. -
Social Engineering
Social Engineering Blurring reality and fake: A guide for the insurance professional www.cybcube.com Deception and disguise are criminal the radar of insurance professionals, as they methods that are as old as time. become more widely used. Numerous examples - from Ulysses Cyber insurance products do - and will and his Trojan Horse in Greek continue to - cover claims from social Mythology, to Fagan, the pickpocket, engineering attacks. This paper is designed in Charles Dicken’s Oliver Twist - to educate insurers on developing strains reinforce the long history of criminals of social engineering, so they can engage achieving their goals by hoodwinking with their clients meaningfully on their targets into believing that an cybersecurity and risk management interaction is something that it is not. strategies against these new attacks. Today, that deception is largely being carried CyberCube invests heavily in cybersecurity out in the non-physical realm. Recent huge expertise - both human capital with deep strides made in technology take historic social engineering techniques to new levels experience in the cyber security domain and in terms of both scale and sophistication. also in data sources and security signals that might flag vulnerabilities and risk areas. In this paper, we will outline some of the forms of social engineering and explore This paper combines those resources, to some of the criminal motivations for carrying offer some pointers on what warning signs out these attacks. We will take a deeper enterprises should be alert to, and how dive into four developing areas of social insurers could address this growing trend engineering, which we believe should be on before it becomes a major claims event. -
Human Rights Violations in Ethiopia
/ w / %w '* v *')( /)( )% +6/& $FOUFSGPS*OUFSOBUJPOBM)VNBO3JHIUT-BX"EWPDBDZ 6OJWFSTJUZPG8ZPNJOH$PMMFHFPG-BX ACKNOWLEDGMENTS This report was prepared by University of Wyoming College of Law students participating in the Fall 2017 Human Rights Practicum: Jennie Boulerice, Catherine Di Santo, Emily Madden, Brie Richardson, and Gabriela Sala. The students were supervised and the report was edited by Professor Noah Novogrodsky, Carl M. Williams Professor of Law and Ethics and Director the Center for Human Rights Law & Advocacy (CIHRLA), and Adam Severson, Robert J. Golten Fellow of International Human Rights. The team gives special thanks to Julia Brower and Mark Clifford of Covington & Burling LLP for drafting the section of the report addressing LGBT rights, and for their valuable comments and edits to other sections. We also thank human rights experts from Human Rights Watch, the United States Department of State, and the United Kingdom Foreign and Commonwealth Office for sharing their time and expertise. Finally, we are grateful to Ethiopian human rights advocates inside and outside Ethiopia for sharing their knowledge and experience, and for the courage with which they continue to document and challenge human rights abuses in Ethiopia. 1 DIVIDE, DEVELOP, AND RULE: HUMAN RIGHTS VIOLATIONS IN ETHIOPIA CENTER FOR INTERNATIONAL HUMAN RIGHTS LAW & ADVOCACY UNIVERSITY OF WYOMING COLLEGE OF LAW 1. PURPOSE, SCOPE AND METHODOLOGY 3 2. INTRODUCTION 3 3. POLITICAL DISSENTERS 7 3.1. CIVIC AND POLITICAL SPACE 7 3.1.1. Elections 8 3.1.2. Laws Targeting Dissent 14 3.1.2.1. Charities and Society Proclamation 14 3.1.2.2. Anti-Terrorism Proclamation 17 3.1.2.3. -
The Rwandan Genocide: Combating Stereotypes And
The Rwandan Genocide: Combating Stereotypes and Understanding the Origins Nicola Skakel Senior Honors Thesis Department of History April 9th 2018 Defense Committee: Dr. Susan K. Kent, Department of History, Primary Advisor Dr. Matthew Gerber, Department of History, Honors Council Representative Dr. Paul Shankman, Department of Anthropology, Advisor 1 Introduction On the 7th of April 1994, the small east African country of Rwanda erupted into one of the most deadly and intimate genocides the modern world had ever witnessed. Whilst the western world stood by and watched in just 100 days over 800,000 Rwandans out of a total population of 7 million, were systematically murdered in the most brutal and violent of ways. Those who were targeted made up the country’s minority ethnic group the Tutsis, and moderates from the majority group, the Hutus. For many, the legacy of Rwanda is a monstrous example of extreme pent up ethnic tensions that has its roots in European colonialism. In contrast, I will argue that the events not just of 1994 but also the unrest that proceeded it, arose from a highly complex culmination of long-standing historical tensions between ethnic groups that long pre-dated colonialism. In conjunction, a set of short-term triggers including foreign intervention, civil war, famine, state terrorism and ultimately the assassination of President Habyarimana also contributed to the outburst of genocide in 1994. Whilst it would be easy to place sole responsibility on European colonists for implementing a policy of divide and rule and therefore exacerbating ethnic tensions, it seems to me that genocide is never that cut and dried: it can never be explained by one factor. -
Pakistan's Violence
Pakistan’s Violence Causes of Pakistan’s increasing violence since 2001 Anneloes Hansen July 2015 Master thesis Political Science: International Relations Word count: 21481 First reader: S. Rezaeiejan Second reader: P. Van Rooden Studentnumber: 10097953 1 Table of Contents List of Abbreviations and Acronyms List of figures, Maps and Tables Map of Pakistan Chapter 1. Introduction §1. The Case of Pakistan §2. Research Question §3. Relevance of the Research Chapter 2. Theoretical Framework §1. Causes of Violence §1.1. Rational Choice §1.2. Symbolic Action Theory §1.3. Terrorism §2. Regional Security Complex Theory §3. Colonization and the Rise of Institutions §4. Conclusion Chapter 3. Methodology §1. Variables §2. Operationalization §3. Data §4. Structure of the Thesis Chapter 4. Pakistan §1. Establishment of Pakistan §2. Creating a Nation State §3. Pakistan’s Political System §4. Ethnicity and Religion in Pakistan §5. Conflict and Violence in Pakistan 2 §5.1. History of Violence §5.2. Current Violence §5.2.1. Baluchistan §5.2.2. Muslim Extremism and Violence §5. Conclusion Chapter 5. Rational Choice in the Current Conflict §1. Weak State §2. Economy §3. Instability in the Political Centre §4. Alliances between Centre and Periphery §5. Conclusion Chapter 6. Emotions in Pakistan’s Conflict §1. Discrimination §2. Hatred towards Others §2.1. Political Parties §2.2 Extremist Organizations §3. Security Dilemma §4. Conclusion Chapter 7. International Influences §1. International Relations §1.1. United States – Pakistan Relations §1.2. China –