Vigilantism Against Migrants and Minorities; First Edition

Total Page:16

File Type:pdf, Size:1020Kb

Vigilantism Against Migrants and Minorities; First Edition 19 COMPARATIVE PERSPECTIVES ON VIGILANTISM AGAINST MIGRANTS AND MINORITIES Tore Bjørgo and Miroslav Maresˆ The notion of vigilantism covers a wide variety of phenomena. This volume has concentrated on vigilantism targeting migrants and minorities. Even within this broad category, our 17 case studies have described a wide variety of vigilante activities, diverging in modus operandi, target groups, levels of violence used, and degrees of support or opposition from the police, other governmental agencies, and political organizations. This concluding chapter will explore the research questions we listed at the beginning of the Introduction chapter: How do these vigilante activities operate, and how are they organized? What are the external justifications, group strategies and individual motivations behind this form of vigilante activism? Under what kinds of circumstances do these vigilante activities emerge, flourish or fail? What are the facilitating and mitigating – or permissive and repressive – factors? What are the vigilante groups’ relationships with the police, other authorities and political parties, and how does it influence the group and its activities? How can our empirical material and findings contribute to the broader aca- demic discussion on the phenomenon of vigilantism? In addition, we will also discuss some other patterns that recurred in the empirical chapters, such as the transnational dimensions of these vigilante movements, vigilantism as performance, and gender dimensions. Modus operandi in vigilantism against migrants and minorities: a typology The first research question – how do these vigilante activities operate, and how are they organized – calls for a typology of such movements. Based on the descriptions 306 Tore Bjørgo and Miroslav Maresˆ of a large number and wide variety of vigilante movements and groups we have been able to identify four main types of vigilante activities based on the ways they primarily operate (modus operandi): vigilante terrorism/pogroms/lynchings paramilitary militia movements border patrols street patrols The preceding case study chapters have been presented and ordered roughly according to this typology, starting with cases of vigilante terrorism and ending with street patrols. However, the distinctions between the various types are some- times rather fuzzy. These four types should be seen as ideal types, as specific groups may have traits of more than one type. In particular, militia type movements may engage in both border patrols, street patrols and terrorist death squads but in most cases in our data material, they don’t. We treat militias here as a distinct type but with a view to the fact that such militias might develop in the direction of one of the three other types. Vigilante terrorism, pogroms and lynchings Several leading terrorism scholars have identified vigilante terrorism as a subtype of terrorism (Schmid 2011: 171; Sprinzak 1995). One variety has been death squads operating with the tacit support of state agencies, sometimes conducted by military and police officers in their free time, in effect being right-wing state terrorism in disguise. This was the case with the quasi-official death squads in several Latin American countries (Argentina, Brazil, Guatemala, Mexico and El Salvador) during the 1970s, targeting and killing thousands of suspected communists and other left- wing radicals (Sprinzak 1995: 29–31). A similar death squad, known as GAL (Grupos Antiterroristas de Liberación), was set up illegally by officials of the Spanish government to suppress the ETA and its Basque supporters during the mid-1980s (Woodworth 2003). In our collection of case studies, certain varieties of the Jewish vigilantes on the Israeli-occupied West Bank share some similarities and traits of this type of vigilante terrorism, which operates with tacit or active state support (Gazit 2015, this volume). Some of these settlers are part of the state security system as military (reserve) officers or as part of the settlements’ defence squads, which are organized, trained and armed by the Israeli Defence Forces act and tend to be more restrained. Others belong to right-wing extremist groups, or loose youth movements. They committed acts of vandalism, arson of Palestinian fields, cars and houses, beatings, and in rare cases also acts of manslaughter. Some of the settler violence was revenge in the aftermath of Palestinian acts of violence. A more general justification for Jewish vigilantism was to demonstrate Israeli sovereignty over the West Bank and Jewish dominancy over the Palestinian population living there. Comparative perspectives 307 This has some resemblance with another case described in this volume (by Blee and Latif): the Ku Klux Klan and their campaigns of terror, lynchings and intimi- dation to enforce white supremacy over the black population in the US. The Ku Klux Klan is often seen as the classic case of vigilante terrorism but its modus operandi has varied considerably during its four historical phases. The highest number of lynchings and other forms of violence against blacks took place during the era of the first Klan, immediately after the end of the Civil War during the 1860s and 70s. According to Blee and Latif (this volume), Klan groups insisted that their vigilantism was necessary to protect southern white women, who they saw as particularly vulnerable with the collapse of the former slavery state to what the Klan described as the vengeance and sexual depravities of now-freed black men. Another justification was to keep the formally emancipated slaves down and enforce continued white supremacy. Although the Klan during this era was largely loosely organized gangs that operated outside the official law, they had a clear acquiescence of the white controlled law enforcement and judicial system of the post-Civil War southern states. Terrorist violence was a means of controlling the freed blacks and their allies (ibid.). The second Klan of the 1920s and 1930s was different, more of a broad and well-organized movement with 3–5 million sup- porters, including large numbers of women. Although violence still happened, large rallies, parades and racist political propaganda and boycott campaigns against immigrants, Catholics, Jews and blacks were more prominent features, and some- times quite successful. The third Klan, during the 1960s and 1970s, was a violent response to the Civil Rights movement and challenge to the segregation of the blacks in the South, using terror tactics. The third Klan’s vigilantism was directly and intensely violent, using techniques that ranged from arson, murders, bombing campaigns, threats, assaults, and cross burnings to other forms of racial terror. In many instances in the 1950s and 1960s, Klan violence was closely coordinated with local law enforcement and judicial officers (some of whom were openly associated with the Klan, or later exposed as Klan members) who declined to arrest or prosecute Klan members for even very flagrant crimes and violence (Blee and Latif, this volume). The fourth Klan, during the 1970s and 1980s in particular (and declining towards the 2000s), was violent as well and continued to attack racial minorities, immigrants and leftists, but even the state itself became a target for some Klan groups. By this time, backing or tacit support from law enforcement was no longer as common as previously, and some Klan groups came under close surveillance by the FBI, or were infiltrated by law enforcement. Moreover, they were bankrupted by effective legal actions from anti- racist organizations. The Klan could obviously continue their campaigns of terror as long as they could operate relatively freely, without any interference (or even with the blessing) of the local sheriff, judge, pastor and mayor. When repressive forces from law enforcement and NGOs put pressure on them, and the general social and 308 Tore Bjørgo and Miroslav Maresˆ FIGURE 19.1 Vigilante “justice”: The Duluth Lynching postcard is one of many postcards widely distributed in the aftermath of lynchings in the USA during the first decades of the 20th century. On June 15, 1920, three black men were taken from jail in the town In Duluth, Minnesota, and lynched by a mob of sev- eral thousand men, accused of having raped a nineteen-year old local girl. However, a medical examination found no evidence that the girl had been raped. This was apparently not a Ku Klux Klan lynching. For more infor- mation of the Duluth lynching, see http://www.mnhs.org/duluthlynchings/ lynchings.php, and https://en.wikipedia.org/wiki/1920_Duluth_lynchings and http://zenithcity.com/archive/legendary-tales/the-victims-of-the-1920- duluth-lynchings/2/. political environment was no longer as permissive with their racism and violence, their leeway became severely restricted. Another example of this type of vigilantism can be seen in India, where there have been several instances of Hindu cow protection groups attacking Muslims and other minority groups on the pretext of alleged cow slaughter or consumption. Although the state does not overtly support such cow vigilantism against Muslims or other minorities (rather it has publicly condemned it), the perpetrators involved are invariably linked to the state establishment (Ahuja, this volume). The cow protection groups across the country have links to and are members of cultural and charitable organizations affiliated to the ruling political party, the BJP. Even though members of the BJP, including the Prime Minister himself, have condemned the acts of violence
Recommended publications
  • 3. Security-Intelligence Services in the Republic of Serbia Bogoljub Milosavljević and Predrag Petrović
    3. Security-Intelligence Services in the Republic of Serbia Bogoljub Milosavljević and Predrag Petrović The Security-intelligence services (hence the intelligence services) are among the most important executive actors in any national security systems. In this chapter the term intelligence services denotes only specialised civilian and mili- tary organisations with security-intelligence functions, established within the state apparatus and operating under government control. Intelligence serv- ices should, first of all, provide state bodies with timely, relevant and precise 208 information. They should protect the constitutional order and national interests against penetration by foreign intelligence services and activities of organised criminal and terrorist groups. They are authorised to collect information from public sources, and can use secret methods, techniques and means.285 There are three organisations in Serbia with these responsibilities; the Secu- rity-Information Agency (SIA), the Military Security Agency (MSA) and the Mili- tary Intelligence Agency (MoI). The SIA is directly subordinated to the govern- ment and has the status of a special republic organisation, while both the MSA and MoI are organisational units (administrative bodies) within the Ministry of Defence (MoD) subordinated to the defence minister, and thus also to the gov- ernment. The functions of the intelligence services are specified by positive legal regulations286 and include the usual intelligence activities: 1. The collection and analysis of data relevant for national security, defence and protection of eco- 285 Reconciling the secrecy needs of intelligence services with the fundamental tenets of democ- racy is an important question. In order words, how can this secrecy be reconciled with transpar- ency of state institutions.
    [Show full text]
  • Law on Military Security Agency and Military Intelligence Agency
    LAW ON MILITARY SECURITY AGENCY AND MILITARY INTELLIGENCE AGENCY I GENERAL PROVISIONS Article 1 This Law shall regulate competences, activities, tasks, authority, oversight and control of the Military Security Agency (hereinafter referred to as the MSA) and the Military Intelligence Agency (hereinafter referred to as the MIA), co-operation, as well as other matters of importance for their operations. Article 2 The MSA and the MIA are the administrative bodies within the Ministry of Defence that perform security and intelligence activities of importance for defence and are part of a unified security and intelligence system of the Republic of Serbia. Article 3 The MSA and MIA shall be independent in conducting their activities within their scope of work. The MSA and MIA shall carry out mutual co-operation and exchange data. The method and contents of mutual co-operation and exchange of data stipulated in Paragraph 2 of this Article shall be regulated by the Minister of Defence. The MSA and the MIA shall co-operate and exchange data with competent institutions, organisations, services and bodies of the Republic of Serbia, as well as security services of other states and international organisations in compliance with the Constitution, the Law, other regulations and general acts, defined intelligence and security policy of the Republic of Serbia and ratified international agreements. In their work, the MSA and the MIA shall be neutral in terms of politics, ideology and interest. Article 4 The MSA and MIA shall have the status of a legal entity. The MSA and MIA shall have their insignia, symbols and other signs and marks.
    [Show full text]
  • Democratic Security Sector Governance in Serbia
    PRIF-Reports No. 94 Democratic Security Sector Governance in Serbia Filip Ejdus This report was prepared with the kind support of the Volkswagen-Stiftung. Peace Research Institute Frankfurt (PRIF) 2010 Correspondence to: PRIF Baseler Straße 27-31 60329 Frankfurt am Main Germany Telephone: +49(0)69 95 91 04-0 Fax: +49(0)69 55 84 81 E-Mail: [email protected] Internet: www.prif.org ISBN: 978-3-942532-04-4 Euro 10.- Summary On 5 October 2000, the citizens of Serbia toppled Slobodan Milošević in what came to be known as the “Bulldozer Revolution”. This watershed event symbolizes not only the end of a decade of authoritarian rule but also the beginning of a double transition: from authoritarian rule to democracy, on the one hand, and from a series of armed conflicts to peace, on the other. This transition has thoroughly transformed Serbian politics in general and Serbia’s security sector in particular. This October, Serbia’s democracy celebrated its tenth anniversary. The jubilee is an appropriate opportunity to reflect on the past decade. With this aim in mind, the report will seek to analyse the impact of democratization on security sector governance in Serbia over the period 2000-2010. In order to do so, in the first part of the report we have developed an analytical framework for studying democratic security sector governance, which is defined as the transparent organization and management of the security sector based on the accountability of decision-makers, respect for the rule of law and human rights, checks and balances, equal representation, active civic participation, public agreement and democratic oversight.
    [Show full text]
  • AUTHORITY REQUESTS for ACCESS to ELECTRONIC COMMUNICATION – Legal Overview
    AUTHORITY REQUESTS FOR ACCESS TO ELECTRONIC COMMUNICATION – legal overview MAY 2015 CONTENTS MAY 2015 CONTENTS INTRODUCTION | P 3 NORWAY | PAGE 33 SWEDEN | PAGE 43 DENMARK | PAGE 14 HUNGARY* SERBIA | PAGE 37 MONTENEGRO | PAGE 25 BULGARIA | PAGE 8 PAKISTAN* INDIA* BANGLADESH | PAGE 5 MYANMAR | PAGE 30 THAILAND | PAGE 48 MALAYSIA | PAGE 18 * these countries are covered in other reports, see ‘Introduction’ DISCLAIMER: Telenor Group is thankful for Hogan Lovells’ assistance in preparing this legal overview. Hogan Lovells has acted solely as legal adviser to Telenor Group. This overview may not be relied upon as legal advice by any other person, and neither Telenor Group nor Hogan Lovells accept any responsibility or liability (whether arising in tort (including negligence), contract or otherwise) to any other person in relation to [this report] or its contents or any reliance which any other person may place upon it. COPYRIGHT LICENSE: This legal overview is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License 2015 by Telenor ASA 2 PB INTRODUCTION MAY 2015 INTRODUCTION INTRODUCTION rights to privacy and freedom of expression; others use much wider-ranging powers with substantially greater human rights This document provides an overview of the most common kinds impacts. Some of the statutes in question are lengthy and of laws which compel the Telenor Group to give government contain carefully expressed checks and balances. Others are authorities access to customer communications in ten of the only a few pages long, with unchecked and sweeping powers countries in which Telenor operates. The remaining three set out in a few short sentences.
    [Show full text]
  • Military Security Agency Military Security Agency
    MILITARY SECURITY AGENCY Military Security Agency Military Security Agency (MSA) is the military security service responsible for security and counterintelligence protection of the Ministry of Defence and the Serbian Armed Forces. It was formed on 29 September 2003, based on the Act on the Federal Republic of Yugoslavia Security Services. In December of the same year it was presented to the public, and officially has started operating on 1 January 2004. By adopting the Act on the Essentials of the Republic of Serbia Security Services System, in 2007, it was defined that MSA is a part of unique security and intelligence system of the Republic of Serbia, as an administrative body within the Ministry of Defence. By the Act on the Military Security Agency and Military Intelligence Agency, passed in 2009, competencies, activities, tasks, authorities, supervision and control of MSA were regulated. This Act defines the modern solutions for efficacious countering current security threats. In a transparent way, implementation of special authorities of MSA was regulated by it, with the goal of protection and timely suppression of threats directed towards the Ministry of Defence and the Serbian Armed Forces. Prior to the forming of the Military Security Agency, the military security service had been organized differently and had different names: - issues on security protection of army, for the first time in the recent history, were regulated by the Military Act of the Principality of Serbia, passed on 12 November 1839, in which, for the first time, penalties for treason, escape, rebellion, espionage, acts against the Constitution and “freedom of people“ were defined.
    [Show full text]
  • The Anatomy of Capturing Serbia's Security - Intelligence Sector
    The Anatomy of Capturing Serbia's Security - Intelligence Sector Author: Predrag Petrović 2 The Anatomy of Capturing Serbia's Security-Intelligence Sector BELGRADE CENTRE FOR SECURITY POLICY Publisher: Belgrade Centre for Security Policy Đure Jakšića 6/5, Beograd Tel. +381 (0)11 328 72 26 E-mail: www.bezbednost.org Author: Predrag Petrović [email protected] Translation: Ivan Kovanović Design and layout: DTP Studio Belgrade, January 2020 The Policy Brief began as part of the “Who Oversees the Overseers: Western Balkan Security Services” project, which is supported by the European Fund for the Balkans (EFB). The content of this study is the exclusive responsibility of its author and it in no way reects the views of the EFB. 3 Abstract In its Enlargement Strategy for 2018, the European Union assessed that elements of state capture are present throughout the Western Balkans. Our research shows, howe- ver, that when it comes to Serbia this is a very restrained assessment as whole state institutions and sectors – the security services and institutions tasked with their con- trol and oversight – have been captured by the ruling Serbian Progressive Party (SNS). Key positions in the security and intelligence sector are staffed by close associates of party officials or directly by party officials and its founding members. The Director of the BIA, Bratislav Gašić, and the head of the Security Services Coordination Bureau, Nebojša Stefanović, are founding members and high-ranking officials in the SNS. Key posts in the judiciary that are significant for the activities of the security services have been taken up by close associates of party officials or of the leader of the SNS and the President of Serbia, Aleksandar Vučić.
    [Show full text]
  • Volume I Section IV-III - Europe
    Volume I Section IV-III - Europe Armenia CTFP - Fiscal Year 2012 Department of Defense Training Course Title Qty Training Location Student's Unit US Unit - US Qty Total Cost Start Date End Date Combating Terrorism Language Program (CTLP) 1 MARSHALL CENTER MoD MARSHALL CENTER $8,250 1/6/2012 2/9/2012 Combating Terrorism Language Program (CTLP) 12-01 1 Garmisch-Partenkirchen, Germany Ministry of Defense MC $8,706 1/6/2012 2/9/2012 NESA Executive Seminar 02-12 1 Washington, DC, United States Ministry of Defense NESA $10,560 4/24/2012 5/8/2012 Program in Advanced Security Studies (PASS) 12-05 1 Garmisch-Partenkirchen, Germany National Assembly MC $11,291 3/23/2012 5/31/2012 Territories and population Protection Program in Advanced Security Studies (PASS) 12-05 1 Garmisch-Partenkirchen, Germany MC $11,275 3/23/2012 5/31/2012 Department Program on Terrorism and Security Studies 1 MARSHALL CENTER MoD MARSHALL CENTER $10,100 2/10/2012 3/16/2012 Program on Terrorism and Security Studies (PTSS) 12-03 1 Garmisch-Partenkirchen, Germany Ministry of Defense MC $9,430 2/10/2012 3/16/2012 Senior Executive Seminar (SES) 1 Garmisch-Partenkirchen, Germany Ministry of Foreign Affairs MC $5,180 9/5/2012 9/13/2012 Senior Executive Seminar (SES) 1 MARSHALL CENTER Ministry of Foreign Affairs MARSHALL CENTER $3,950 9/5/2012 9/13/2012 Tampa Florida (JSOU - Joint Spec Ops Special OPS Combating Terrorism 1 DMCDJSFLTA Intelligence Department of General Staff $11,484 5/7/2012 5/18/2012 University) Tampa Florida (JSOU - Joint Spec Ops Special OPS Combating Terrorism
    [Show full text]
  • Serbia Country Report
    BTI 2014 | Serbia Country Report Status Index 1-10 7.51 # 20 of 129 Political Transformation 1-10 7.95 # 21 of 129 Economic Transformation 1-10 7.07 # 29 of 129 Management Index 1-10 6.22 # 26 of 129 scale score rank trend This report is part of the Bertelsmann Stiftung’s Transformation Index (BTI) 2014. It covers the period from 31 January 2011 to 31 January 2013. The BTI assesses the transformation toward democracy and a market economy as well as the quality of political management in 129 countries. More on the BTI at http://www.bti-project.org. Please cite as follows: Bertelsmann Stiftung, BTI 2014 — Serbia Country Report. Gütersloh: Bertelsmann Stiftung, 2014. This work is licensed under a Creative Commons Attribution 4.0 International License. BTI 2014 | Serbia 2 Key Indicators Population M 7.2 HDI 0.769 GDP p.c. $ 11544.3 Pop. growth1 % p.a. -0.5 HDI rank of 187 64 Gini Index 29.6 Life expectancy years 74.6 UN Education Index 0.787 Poverty3 % 0.6 Urban population % 56.7 Gender inequality2 - Aid per capita $ 178.9 Sources: The World Bank, World Development Indicators 2013 | UNDP, Human Development Report 2013. Footnotes: (1) Average annual growth rate. (2) Gender Inequality Index (GII). (3) Percentage of population living on less than $2 a day. Executive Summary Between 2011 and early 2013, Serbia has made some progress in achieving its goals of moving closer to EU membership, bolstering a free market economy and strengthening the rule of law. Yet results have been mixed.
    [Show full text]
  • KOSOVO FIRST *** Analysis of the Context of the Adoption Process and Analysis of the Draft National Security Strategy of the Republic of Serbia
    KOSOVO FIRST *** Analysis of the context of the adoption process and analysis of the draft National Security Strategy of the Republic of Serbia Report by the Center for Euro-Atlantic Studies (CEAS), Serbia September 2018 1 KOSOVO FIRST *** Analysis of the context of the adoption process and analysis of the draft National Security Strategy of the Republic of Serbia Report by the Center for Euro-Atlantic Studies (CEAS), Serbia September 2018 “This assessment report was made possible with partial funding from the National Endowment for Democracy (NED). The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the NED” KOSOVO FIRST Title: KOSOVO FIRST Analysis of the context of the adoption process and analysis of the draft National Security Strategy of the Republic of Serbia Author: Center for Euro-Atlantic Studies (CEAS) Publisher: Center for Euro-Atlantic Studies (CEAS) Dr. Dragoslava Popovica 15, 11000 Belgrade, Serbia Editor: Jelena Milic 2 Many people tie EU accession to a better life. Which is not true. – Aleksandar Chepurin, Ambassador of the Russian Federation to the Republic of Serbia, December 10, 2018 We have a common goal with Serbia. That goal for Serbia is advancing on the road to EU membership. This is a strategic goal of Serbia and something the United States are strongly supporting. – Matthew Palmer, Acting Deputy Assistant Secretary of State of the United States, September 12, 2018 3 KOSOVO FIRST If we ever achieve any agreement with Pristina, Serbia would have to get clear warranty that it would become an EU member state by 2025.
    [Show full text]
  • Theoretical Aspects of the Research to the Capacity of the Security System from the Symbolic Approaches
    THEORETICAL ASPECTS OF THE RESEARCH TO THE CAPACITY OF THE SECURITY SYSTEM FROM THE SYMBOLIC APPROACHES DOI: 10.5937/vojdelo1506141M Zoran Milosavljević Institute for Political Studies in Belgrade Jovan Krstić Association of Public Prosecutors of Serbia he Symbolic Approach to Security System Reform (SSR T Symbolic Policy Capacity Building) is a set of ideas and concepts that sends a clear message to the environment that Serbia has broken with authoritarian regimes and their corresponding security systems of the past. As an illustration of the epochal meaning of this approach, the laborious and, based on the latest events, largely incomplete reform of the security services in Pakistan can be used. One of the tasks of social science is making a global assessment on the situation of Human Security. The United Nations has to address it, but our nation needs a serious reconsideration of Common Values (the general security values to be protected) and Public Interest (so ‒ called policy of persecution). Why? Because the interest of the citizens is generally neglected by the bureaucracy by prioritizing the interests of various collectives from the state itself to the interest groups, political parties across the country (that same bureaucracy). Concept of the Economic Security is weak (although the most important, including freedom of the market, environment protection, protection of consumers etc.) because we have no long-term Development Strategy, which would be the basis of good Security Culture. If we consistently consider a system and security as such, we note that something is missing in the list of protected property, as priorities, the lack of protection of certain human rights in the corpus iuris of Human Rights (specifically the right to equal access of citizens to private property and private enterprise).
    [Show full text]
  • The 1325 Scorecard - Serbia Summary (September 29, 2015)
    The 1325 Scorecard - Serbia Summary (September 29, 2015) General Assessment: Overall, Serbia has done major steps in implementing UNSCR 1325 and integrating a gender perspective in its Armed Forces at the policy level in last few years. Serbia was the second country to adopt a National Action Plan1 (NAP) in the Balkans after Bosnia and Herzegovina. It is currently discussing development of the 2nd NAP that should provide more in-depth focus on a smaller number of priority areas and actions.2 However, there are improvements that Serbia can make, such as integrating gender perspective at the operational level, allocating earmarked funding for the implementation of the NAP, streamlining implementation and monitoring and evaluation structure and enabling meaningful civil society participation. National importance/Political Will: There is strong support for UNSCR 1325 at the political level although not fully institutionalized in formal strategic documents. Serbia was among the first post-conflict states that had adopted a NAP in 2010. The NAP has 7 overarching pillars which all but one are oriented towards delivering change in the country: 1) creation of institutional mechanisms; 2) increasing participation by women in the security sector; 3) strengthening the role of women and increasing their participation in decision-making in defence and security; 4) participation by women in conflict resolution, post-conflict situations and peacekeeping missions; 5) instruments of legal protection for women; 6) education and training of security sector
    [Show full text]
  • Corruption in the Security Sector in Serbia
    CORRUPTION IN THE SECURITY SECTOR IN SERBIA Editor: Predrag Petrović CORRUPTION IN THE SECURITY SECTOR IN SERBIA CORRUPTION IN THE SECURITY SECTOR Belgrade Centre for Security Policy CORRUPTION IN THE SECURITY SECTOR IN SERBIA Editor: Predrag Petrović 2013 Corruption in the Security Sector in Serbia Publisher Translation Belgrade Centre for Security Policy Matthew White Gundulićev venac 48, Belgrade Tel: 011 3287 226 Design Email: [email protected] Marko Marinković www.bezbednost.org http://korupcija.bezbednost.org Printed by UNAGRAF Editor Predrag Petrović Copies 500 Technical Editor Saša Đorđević ISBN 978-86-6237-040-2 Authors Bogoljub Milosavljević, Danilo Pejović, Marko Milošević, Marko Savković, Miroslav Hadžić, Predrag Petrović, Saša Đorđević CIP - Каталогизација у публикацији Народна библиотека Србије, Београд 355.1.072.6/.7(497.11)(082) CORRUPTION in the Security Sector in Serbia / editor Predrag Petrović. - Belgrade : Belgrade centre for Security Policy, 2013 (Beograd : Unagraf). - 115 str. : tabele ; 25 cm Izv. stv. nasl.: Korupcija u sektoru bezbednosti Srbije. - Tiraž 500. - About the authors: str. 113. - Napomene i bibliografske reference uz tekst. - Bibliografija: str. 104-112. ISBN 978-86-6237-040-2 1. Petrović, Predrag [уредник] a) Корупција - Безбедносни сектор - Србија - Зборници COBISS.SR-ID 199154700 Published with the support of the Agency for the Fight against Corruption as part of the project “Risk Map of Corruption in the Security Sector”. The views of the authors expressed in the text do not necessarily reflect those of the Agency. Contents Abbreviations . 7 List of Boxes, Tables and Figures . 8 About the Project . .9 Preface . .10 I Introduction . .12 What do citizens need to know about corruption in the security sector? .
    [Show full text]