Lone Wolf Terrorism - a Brief Bibliography

Total Page:16

File Type:pdf, Size:1020Kb

Lone Wolf Terrorism - a Brief Bibliography View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Dudley Knox Library Publications Bibliographies 2015-02 Lone Wolf Terrorism - A Brief Bibliography Marlatt, Greta E. http://hdl.handle.net/10945/24281 Lone Wolf Terrorism – A Brief Bibliography Compiled by Greta E. Marlatt Created September 2013 Last Updated May 30, 2016 This compilation was prepared by the Homeland Security Digital Library, Naval Postgraduate School, Center for Homeland Defense and Security. CONTENTS LONE WOLF TERRORISM – A BRIEF BIBLIOGRAPHY 1 INTRODUCTION 3 ARTICLES 4 BOOKS 13 REPORTS 21 HEARINGS 26 THESES AND DISSERTATIONS 27 2 INTRODUCTION Search terms used to help compile/update this bibliography include: (“Lone Wolf” OR “Lone Wolves”) AND (terrorism OR terrorist) “Lone Offender” AND (terrorism OR terrorist) “Loner attacks” AND (terrorism or terrorist) “Leaderless resistance” AND (terrorism OR terrorist) (Solo OR Lone OR Single) AND Actor AND (terrorism OR terrorist) 3 ARTICLES Ackerman, Gary A, and Lauren E. Pinson. “An Army of One: Assessing CBRN Pursuit and Use by Lone Wolves and Autonomous Cells.” Terrorism and Political Violence 26, no. 1 (January-March 2014): 226-245. Alakoc, Burcu Pinar. “Competing to Kill: Terrorist Organizations versus Lone Wolf Terrorists.” Terrorism and Political Violence (2015) http://www.tandfonline.com/doi/abs/10.1080/09546553.2015.1050489#.Ve-2hqRRGM8 Andrews, John. "Case Study: The Lone Wolf Killer." The Counter Terrorist (August-September, 2009): 6-10. http://www.thecounterterroristmag.com/pdf/augsep09.andrews.lonewolfkiller.pdf Appleton, Catherine. “Lone Wolf Terrorism in Norway.” The International Journal of Human Rights 18, no. 2 (2014): 127-142. Bailey, Julius H. "Fearing Hate Reexamining the Media Coverage of the Christian Identity Movement." Journal for the Study of Radicalism 4, no. 1 (2010): 55-73. http://muse.jhu.edu/journals/journal_for_the_study_of_radicalism/v004/4.1.bailey.html Bakker, Edwin and Beatrice de Graaf. "Preventing Lone Wolf Terrorism: Some CT Approaches Addressed." Perspectives on Terrorism 5, no. 5-6 (December, 2011): 43-50. http://www.terrorismanalysts.com/pt/index.php/pot/article/view/preventing-lone-wolf Barnes, Beau D. "Confronting the One-Man Wolf Pack: Adapting Law Enforcement and Prosecution Responses to the Threat of Lone Wolf Terrorism." Boston University Law Review 92, (2012): 1614-1662. http://www.bu.edu/law/central/jd/organizations/journals/bulr/volume92n4/documents/BARNES.pdf Bates, Rodger A. "Dancing with Wolves: Today's Lone Wolf Terrorists." Journal of Public and Professional Sociology 4, no. 1 (2012): 1-15. http://digitalcommons.kennesaw.edu/jpps/vol4/iss1/1 Bates, Rodger A. and Mara Mooney. “Psychological Operations and Terrorism: The Digital Domain.” The Journal of Public and Professional Sociology 6, no. 1 (2014). http://digitalcommons.kennesaw.edu/jpps/vol6/iss1/2/ Becker, Michael. “Explaining Lone Wolf Target Selection in the United States.” Studies in Conflict and Terrorism 37, no. 11 (November 2014): 959-978. Becker, Michael. “A Response to ‘Key Issues and Research Agendas in Lone Wolf Terrorism.’” Studies in Conflict & Terrorism 39, no. 5 (2016): 472-476. Berntzen, Lars Erik and Sveinung Sandberg. “The Collection Nature of Lone Wolf Terrorism: Anders Behring Breivik and the Anti-Islamic Social Movement.” Terrorism and Political Violence 26, no. 5 (November-December 2014): 759-779. Böckler, Nils, Jens Hoffmann, and Andreas Zick. "The Frankfurt Airport Attack: A Case Study on the Radicalization of a Lone-actor Terrorist." Journal of Threat Assessment and Management 2, no. 3- 4 (September-December 2015): 153-163. 4 Borum, Randy. “Informing Lone-Offender Investigations.” Criminology & Public Policy 12, no. 1 (February 2013): 103-112. Borum, Randy, Robert Fein, and Bryan Vossekuil. "A Dimensional Approach to Analyzing Lone Offender Terrorism." Aggression and Violent Behavior 17, no. 5 (October 2012): 389-396. ———. "A Dimensional Approach to Analyzing Lone Offender Terrorism." Aggression and Violent Behavior 17, no. 5 (October 2012): 389-396. Brighi, Eilsabetta. “The Mimetic Politics of Lone-Wolf Terrorism.” Journal of International Political Theory 11, no. 1 (February 2015): 145-164. Brynielsson, Joel, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson and Pontus Svenson. "Harvesting and Analysis of Weak Signals for Detecting Lone Wolf Terrorists." Security Informatics 2, no. 11 (2013) http://www.security-informatics.com/content/pdf/2190-8532-2-11.pdf Capellan, Joel A. “Lone Wolf Terrorist or Deranged Shooter? A Study of Ideological Active Shooter Events in the US, 1970-2014.” Studies in Conflict & Terrorism 38, no. 6 (2015): 395-413. Caroline Joan Picart. "Documenting, Dissecting, and Decrying Terrorism and Anti-Terrorism." Rhetoric & Public Affairs 9, no. 4 (2006): 693-707. Carter, Jeremy G. and David L. Carter. "Law Enforcement Intelligence: Implications for Self- Radicalized Terrorism." Police Practice and Research: An International Journal 13, no. 2 (2012): 138-154. Chase, Alston. "Harvard and the Making of the Unabomber." Atlantic Monthly 285, no. 6 (June 2000): 41-65. http://www.theatlantic.com/past/docs/issues/2000/06/chase.htm Chermak, Steven M., Joshua D. Freilich, and Joseph Simone. "Surveying American State Police Agencies about Lone Wolves, Far-Right Criminality, and Far-Right and Islamic Jihadist Criminal Collaboration." Studies in Conflict & Terrorism 33, no. 11 (2010): 1019-1041. Cohen, Katie, Frederik Johansson, Lisa Kaati and Jonas Clausen Mork. “Detecting Linguistic For Radicals Violence in Social Media.” Terrorism and Political Violence 26, no. 1 (January-March 2014): 246-256. Cole, Juan. “The Double Standard for ‘Self-Radicalized Lone-Wolf Terrorists.’” The Washington Report on Middle East Affairs 35, no. 1 (January/February 2016): 14-16. Corner, Emily and Paul Gill. “A False Dichotomy? Mental Illness and Lone-Actor Terrorism.” Law and Human Behavior 39, no. 1 (February 2015): 23-34. Danilovic, Nedo and Dragan Manojlovic. “Criminology and Victimology Typology Aspects of Terrorism.” Megatrend Review 10, no. 3 (2013): 65-92. Danzell, Orlandrew E. and Lisandra M. Maisonet Montañez. “Understanding the Lone Wolf Terror Phenomena: Assessing Current Profiles.” Behavioral Sciences of Terrorism and Political Aggression 8, no. 2 (2016): 135-159. 5 de Roy van Zuijdewijn, Jeanine and Edwin Bakker. “Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations.” Findings.” Perspectives on Terrorism 10, no. 2 (April 2016): 42-49. http://www.terrorismanalysts.com/pt/index.php/pot/issue/view/57 Dishman, Chris. “The Leaderless Nexus: When Crime and Terror Converge.” Studies in Conflict & Terrorism 28, no. 3 (2005): 237-252. Ellis, Clare, Raffaello Pantucci, Jeanine de Roy van Zuijdewijn, Edwin Bakker, Melanie Smith, Benoit Gomis and Simon Palombi. “Analysing the Processes of Lone-Actor Terrorism: Research Findings.” Perspectives on Terrorism 10, no. 2 (April 2016): 33-41 http://www.terrorismanalysts.com/pt/index.php/pot/issue/view/57 Ellis, Patrick D. “Lone Wolf Terrorism and Weapons of Mass Destruction: An Examination of Capability and Countermeasures.” Terrorism and Political Violence 26, no. 1 (January-March 2014): 211- 225. Feldman, Matthew. “Comparative Lone Wolf Terrorism: Toward a Heuristic Definition.” Democracy and Security 9, no. 3 (2013): 270-286. Fisogni, Primavera. “Lone Wolves: Updating the Concept of Enemy in the Social Media Age.” International Journal of Cyber Warfare and Terrorism 4, no. 1 (January-March 2014): 36-44. Gajewski, Karen Ann. "Worth Noting." The Humanist 71, no. 2 (March/April 2011): 48. Gardell, Mattias. “Crusader Dreams: Oslo 2/27, Islamophobia, and the Quest for a Monocultural Europe.” Terrorism and Political Violence 26, no. 1 (January-March 2014): 129-155. Gartenstein-Ross, Daveed. “Lone Wolf Islamic Terrorism: Abdulhakim Mujahid Muhammad (Carlos Bledsoe) Case Study.” Terrorism and Political Violence 26, no. 1 (January-March 2014): 110-128. Gibbs, Nancy. "The Fort Hood Killer: Terrified... Or Terrorist?" Time Magazine (November 11, 2009). http://www.time.com/time/magazine/article/0,9171,1938698,00.html Gill, Paul and Emily Corner. "Disaggregating Terrorist Offenders: Implications for Research and Practice." Criminology & Public Policy 12, no. 1 (February 2013): 93-101. Gill, Paul, Emily Corner, and Jeffrey D. Simon. “Lone Wolf Terrorism: Understanding the Growing Threat.” Crime, Law and Social Change 62, no. 2 (September 2014): 191-194. Gill, Paul, John Horgan and Paige Deckert. “Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists.” Journal of Forensic Sciences 59, no. 2 (March 2014): 425- 435. http://broker.edina.ac.uk/521941/1/PMC4217375.pdf Gordon, Theodore, Yair Sharan and Elizabeth Florescu. “Prospects for Lone Wolf and SIMAD Terrorism.” Technological Forecasting and Social Change 95 (June 2015): 234-251. Griffin, Roger. "Shattering Crystals: The Role of 'Dream Time' in Extreme Right-Wing Political Violence." Terrorism & Political Violence 15, no. 1 (Spring 2003): 57-95. 6 Gruenewald, Jeff, Steven Chermak, and Joshua D. Freilich. “Distinguishing “Loner” Attacks from Other Domestic Extremist Violence.” Criminology & Public Policy 12, no. 1 (February 2013): 65-91. ———. “Far-Right Lone Wolf Homicides in the United States.” Studies in Conflict and Terrorism 36, no. 12 (December 2013): 1005-1024.
Recommended publications
  • Downloaded from Brill.Com09/29/2021 06:39:09AM Via Free Access
    fascism 4 (2015) 209-212 brill.com/fasc Book Review ∵ Mats Deland, Michael Minkenberg and Christin Mays, ed. In the Tracks of Breivik: Far Right Networks in Northern and Eastern Europe (Berlin/ Vienna: lit Verlag, 2014). Four years have already passed since Anders Behring Breivik, apparently single-handedly, committed the most murderous and destructive terrorist atrocity by the far right in post-war Europe. In 2011–2012, particularly during his criminal trial in Oslo, there was a lively public debate in in the Scandinavian media as to whether Breivik was a fascist, or represented some other permuta- tion of the contemporary European far right – an Islamophobic ‘counter-jihad- ist’; a militant, conservative nationalist; or a Christian extremist.1 Somewhat counterintuitively, since then relatively little scholarly attention has been devoted within comparative fascist studies to the implications of Breivik’s deeds, ideology, and self-proclaimed pan-European revolutionary movement. The title of this anthology – In the Tracks of Breivik – would suggest that its primary purpose is to map the far right networks of northern and eastern Europe in relation to the terrorist acts of July 22, 2011. Even if we realize that this formulation is an unfortunate literal translation of the Swedish phrase ‘i spåren av [Breivik]’ – for which a more idiomatic English rendering would be ‘in the wake of [Breivik]’, the implication would still be that the findings of the book are located in some direct relation to Breivik and his crimes. Even the promotional blurb on the back cover, as well as the opening and closing words of the introduction, reinforce this expectation.
    [Show full text]
  • “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-Terrorism Related Subjects by Joshua Sinai
    PERSPECTIVES ON TERRORISM Volume 8, Issue 1 IV. Book Reviews “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-terrorism Related Subjects by Joshua Sinai "is column consists of two parts: capsule reviews of ten books recently published on terrorism and counterterrorism-related topics, and - continuing the series begun in the previous column of highlighting books by signi$cant publishers (listed in alphabetical order) - capsule reviews of 13 important books published by CRC Press. Note: Future columns will review books by publishers such as Hurst, Oxford University Press, Palgrave Macmillan, Polity, Routledge, Rowman & Little#eld, Springer, Stanford University Press, and the University of Chicago Press. General Reviews Gershon Baskin, with Ilene Prusher, !e Negotiator: Freeing Gilad Schalit From Hamas. New Milford, CT: "e Toby Press, 2013. 283 pages, US$24.95 [Hardcover], ISBN: 978-1592643493. "is is a $rst-hand account by an American-Israeli peace activist of his role in arranging for the release of Gilad Schalit, an Israeli soldier who was kidnapped by Hamas in 2006. Schalit was released in October 2011 as part of an exchange deal by the Israeli government and Hamas for 1,027 Palestinian and Israeli Arab prisoners with a nexus to terrorist activity. Acting in his non-governmental capacity, Jerusalem-based Dr. Baskin was extensively involved (with other players) in the secret back channel negotiations between Israel and Hamas, with these dealings and the wider context in which they were conducted revealed in the letters, e-mails, and other documents that were exchanged between the players over the $ve-year period, which are contained in the book, thus making it a valuable primary source for those analyzing Israeli-Hamas relations.
    [Show full text]
  • Terrorist Tactics and Strategies Compiled and Selected by Judith Tinnes
    PERSPECTIVES ON TERRORISM Volume 12, Issue 5 Bibliography: Terrorist Tactics and Strategies Compiled and selected by Judith Tinnes [Bibliographic Series of Perspectives on Terrorism - BSPT-JT-2018-6] Abstract This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliographies and other resources on terrorist tactics and strategies (such as the planning of attacks, targeting, decision making, and successful or failed plots). Though focusing on recent literature, the bibliography is not restricted to a particular time period and covers publications up to September 2018. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to broaden the search. Keywords: bibliography; resources; literature; terrorism; tactics, strategies, planning, plots, attacks, targeting, decision making NB: All websites were last visited on 16.09.2018. - See also Note for the Reader at the end of this literature list. Bibliographies and other Resources Al-Khalidi, Ashraf; Renahan, Thomas (Eds.) (2015, May-): Daesh Daily: An Update On ISIS Activities. URL: http://www.daeshdaily.com Atkins, Stephen E. (2011): Annotated Bibliography. In: Stephen E. Atkins (Ed.): The 9/11 Encyclopedia. (Vol. 1). (2nd ed.). Santa Barbara: ABC-CLIO, 481-508. Bergen, Peter et al. (2016-): Terrorism in America after 9/11. (New America In-Depth Report). URL: https:// www.newamerica.org/in-depth/terrorism-in-america Bowie, Neil G. (2017, August): Terrorism Events Data: An Inventory of Databases and Data Sets, 1968-2017. Perspectives on Terrorism, 11(4), 50-72. URL: https://www.universiteitleiden.nl/binaries/content/assets/ customsites/perspectives-on-terrorism/2017/issue-4/0620174-terrorism-events-data-an-inventory-of- databases-and-data-sets-1968-2017-by-neil-g.-bowie.pdf Bowie, Neil G.; Schmid, Alex P.
    [Show full text]
  • The Christchurch Attack Report: Key Takeaways on Tarrant’S Radicalization and Attack Planning
    The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam i The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam ICCT Perspective December 2020 ii About ICCT The International Centre for Counter-Terrorism – The Hague (ICCT) is an independent think and do tank providing multidisciplinary policy advice and practical, solution- oriented implementation support on prevention and the rule of law, two vital pillars of effective counterterrorism. ICCT’s work focuses on themes at the intersection of countering violent extremism and criminal justice sector responses, as well as human rights-related aspects of counterterrorism. The major project areas concern countering violent extremism, rule of law, foreign fighters, country and regional analysis, rehabilitation, civil society engagement and victims’ voices. Functioning as a nucleus within the international counter-terrorism network, ICCT connects experts, policymakers, civil society actors and practitioners from different fields by providing a platform for productive collaboration, practical analysis, and exchange of experiences and expertise, with the ultimate aim of identifying innovative and comprehensive approaches to preventing and countering terrorism. Licensing and Distribution ICCT publications are published in open access format and distributed under the terms of the Creative Commons
    [Show full text]
  • HLS 225 Legal and Ethical Issues in Homeland Security
    Christopher Wren Association Week 2 Terrorism, Cybersecurity, Disaster Response What We’ll Learn in Week 2 The Homeland Security Enterprise takes a broad “All Hazards” approach to threats—preventing and responding to both man-made and natural threats Terrorism, Cyber, other Man-Made, and Natural Threats are reviewed in Week 2 U.S. interagency responses to these threats have improved since 9/11—but are far from totally ready Fundamental and Powerful Concept: DHS “All Hazards” Threat State (define): all natural and man-made hazards that can threaten the US homeland. Elaborate: includes natural hazards and threats, e.g., weather, geologic, disease, etc., and man-made hazards and threats to include both accidents and deliberate attempts to harm people, infrastructure, or resources. Exemplify: a hurricane is a natural hazard, a bridge or dam collapse is a man-made accident (hazard), a terrorist attack is a man-made hazard. An attack by a foreign military on U.S. territory is not an all hazards attack for DHS action—but is a national security issue to be handled by DOD. Illustrate: as doctors must diagnose and treat a person for all manner of different diseases and other afflictions, the Homeland Security Enterprise is responsible for preparing and responding to U.S. “all hazard” threats Defining the Virginia “All Hazards” Threat Terrorism-Related: WMD Weather-Related: Floods, (Nuclear/Radiological (Dirty Tornadoes, Hurricanes, Tropical Bombs), Chemical, Biological), Storms, Thunderstorms, Winter Explosive Devices (IED, etc.), Cyber
    [Show full text]
  • Brenton Tarrant: the Processes Which Brought Him to Engage in Political Violence
    CSTPV Short Papers Brenton Tarrant: the processes which brought him to engage in political violence Beatrice Williamson 1 Contents Introduction .......................................................................................................................... 3 Brenton Tarrant .................................................................................................................... 3 Conceptualising Tarrant and his violence ............................................................................. 5 The Lone Actor Puzzle ........................................................................................................... 5 ‘A dark social web’: online ‘radicalisation’ ............................................................................ 7 Online communities: Social Network Ties and Framing .................................................... 7 Funnelling and Streams ..................................................................................................... 9 Conclusion ........................................................................................................................... 11 Bibliography ........................................................................................................................ 12 2 Introduction Individual radicalisation is a complex and bespoke process influenced by multiple factors and variables, meaning every individual follows their own path to terrorism and political violence. This paper will endeavour to demonstrate and explore some of the
    [Show full text]
  • Terrorism and Responses Mr
    Terrorism and Responses Mr. Yisrael Neeman Course Number: 702.2199 Office Hours: TBA Semester: Spring 2019 Location: TBA Class Time: Thursday 15:15-17:45 Phone: 04-824-2065 Class Location: TBA E-Mail: [email protected] Course Description: This course will examine the issue of terrorism as a growing form of political violence into the 21st Century. The last three decades of the 20th Century witnessed a phenomenal growth in terrorist activity around the world. Some groups rose and fell quite rapidly, but others have managed sustained campaigns and have achieved spectacular tactical success, among them the attacks on the United States on September 11, 2001. We will investigate the causes, methods and responses involved in the ongoing conflict between terrorist organizations and their adversaries. Topics covered will include: What is terrorism, as distinct from other forms of violence? What are the objectives of terrorists? What are the strategy and tactics of terrorists? Is suicide terrorism a distinct form of terrorism or another tactic among many? Why do terrorists use the tactics of terrorism? Is the use of terrorist tactics ever justified? What is the history of terrorism and terrorist organizations? What are some of the major terrorist groups active today? How do religious beliefs and ideological dogma aid terrorists? Does terrorism work? Does it achieve strategic goals? How do terrorist organizations transform? Can terrorism be deterred, defeated or prevented? Is there a military solution? Is the use of torture ever justified for extracting information from terrorists? Targeted assassination? Requirements, grades, and so on 1 This course has just a few simple requirements: read the assignments, attend class, participate in discussions, write the papers, and pass the tests.
    [Show full text]
  • Perspectives on Terrorism, Volume 5, Issue
    Volume V, Issues 3-4 September 2011 PERSPECTIVES ON TERRORISM Volume 5, Issues 3-4 Special Double Issue on Terrorism and Political Violence in Africa Guest Editors: James J. F. Forest and Jennifer Giroux 2 September 2011 PERSPECTIVES ON TERRORISM Volume 5, Issues 3-4 Table of Contents: Articles Terrorism and Political Violence in Africa: Contemporary Trends in a Shifting Terrain ................................................................................................5 by James J.F. Forest and Jennifer Giroux Terrorism in Liberation Struggles: Interrogating the Engagement Tactics of the Movement for the Emancipation of the Niger Delta ........................18 by Ibaba Samuel Ibaba ‘Forcing the Horse to Drink or Making it Realise its Thirst’? Understanding the Enactment of Anti-Terrorism Legislation (ATL) in Nigeria .............................................................................................................33 by Isaac Terwase Sampson and Freedom C. Onuoha Opportunity Costs or Costly Opportunities? The Arab Spring, Osama Bin Laden, and Al-Qaeda's African Affiliates .............................................50 by Alex S. Wilner Al-Qaeda's Influence in Sub-Saharan Africa: Myths, Realities and Possibilities .....................................................................................................63 by James J.F. Forest From Theory to Practice: Exploring the Organised Crime-Terror Nexus in Sub-Saharan Africa ...................................................................................81 by Annette
    [Show full text]
  • Ways in and Ways out Ways and in Ways Høigård Tajet Kirsti
    Ways In and Ways Out Ways and In Ways Høigård Tajet Kirsti NTNU Norwegian University of Science and Technology Faculty of Social Sciences Master’s thesis and Technology Management Department of Political Science Trondheim, Spring2012 Trondheim, Science thesisinPolitical Master’s Extremism Islamist versus Right-WingExtremism Deradicalization: and ofRadicalization An Analysis Out InandWays Ways Høigård Tajet Kirsti To SL, with the hopes that you will someday deradicalize as well Acknowledgements I want to express my gratitude to my supervisor Tanja Ellingsen for good help, positive remarks and good assistance along the way. I also want to express my gratitude to my informants for letting me dig in their troublesome and often difficult past, I have learnt at least as much about human grief as I have about radicalization and deradicalization. Without the informants this thesis had not existed. I also want to thank Rashad Ali for meeting me at the British Museum where the atmosphere is great for deep conversations, and for all the assistance he provided me in the aftermath of the interview. I also want to express my gratitude to Hanif Qadir for welcoming me into the Active Change Foundation in London and for letting me interview him. I am also grateful to Pat Parry in the United Kingdom for assistance along the way. In addition I want to express my gratitude to all the people that I have been in contact with regarding finding the right informants, in particular all the local police stations that have helped me along the way, Åfjord Lensmannskontor, Manglerud Politistasjon, Brumunddal Lensmannskontor and Stange Lensmannskontor.
    [Show full text]
  • Accelerationism Theory
    CANADIAN ASSOCIATION FOR SECURITY AND INTELLIGENCE STUDIES VANCOUVER ACCELERATIONISM THEORY BRIEFING NOTE April 12, 2021 Disclaimer: This Briefing Note contains summaries of open sources and does not represent the views of the Canadian Association for Security and Intelligence Studies. Title: Accelerationsim Theory Date: 12/04/2021 Disclaimer: This briefing note contains summaries of open sources and does not represent the views of the Canadian Association for Security and Intelligence Studies. PURPOSE STATEMENT This briefing note examines accelerationism theory and its connection to several white nationalist groups that may be considered Violent Transnational Social Movements (VTSM), and the potential threats that accelerationism poses to national security and political stability. Since the mid-2010s, some members of the far-right and white nationalist movements have reportedly embraced and promoted accelerationism as a key component of their ideology using online forums (Anti-Defamation League, 2019; Beauchamp, 2019). This briefing note also examines the reported connections between accelerationism and acts of soft and kinetic violence committed against minorities, immigrant communities, Jewish communities, and governments (Beauchamp, 2019; Dearden, 2020; Waugh, 2019). THE SECURITY PROBLEM Several white nationalist groups that embrace accelerationism emerged in the late 2010s including Atomwaffen Division and The Base. Believers in accelerationism have recently been linked to several instances of soft and kinetic violence, which allegedly aim to de-stabilise existing social structures (Beauchamp, 2019; Dearden, 2020; Waugh, 2019). The continued online promotion of accelerationism poses a serious potential threat to minorities, immigrant communities, Jewish communities, and governments (Beauchamp, 2019). Accelerationists are often radicalised through easily accessible internet sources and encrypted chat rooms.
    [Show full text]
  • The Boston Marathon Bombing in the New York Times and Le Figaro
    University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Doctoral Dissertations Graduate School 8-2014 News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro Ioana Alexandra Coman University of Tennessee - Knoxville, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_graddiss Part of the Communication Technology and New Media Commons, International and Intercultural Communication Commons, Journalism Studies Commons, and the Mass Communication Commons Recommended Citation Coman, Ioana Alexandra, "News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro. " PhD diss., University of Tennessee, 2014. https://trace.tennessee.edu/utk_graddiss/2812 This Dissertation is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Doctoral Dissertations by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a dissertation written by Ioana Alexandra Coman entitled "News and the Public Sphere: The Boston Marathon Bombing in The New York Times and Le Figaro." I have examined the final electronic copy of this dissertation for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Doctor of Philosophy, with a major in Communication and Information. Peter Gross, Major Professor We have read this dissertation and recommend its acceptance: Elizabeth Hendrickson, Suzie Allard, Michael Palenchar, Harry Dahms Accepted for the Council: Carolyn R.
    [Show full text]
  • The Future of South Korea: Alternative Scenarios for 2030
    THE FUTURE OF SOUTH KOREA: ALTERNATIVE SCENARIOS FOR 2030 A DISSERTATION SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI‘I AT MĀNOA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN POLITICAL SCIENCE DECEMBER 2012 By Hyeonju Son Dissertation Committee: Jim Dator, Chairperson Manfred Henningsen Debora Halbert Hagen Koo Jang Hyun Kim Keywords: alternative futures scenarios, vision, preferred futures, Korea ACKNOWLEDGEMENTS This dissertation contains far more than the accumulation of years of working with futures studies. It has been a long journey, reflecting my own personal experience, vision, story, and family and social relationships. Indeed this dissertation would not have been possible without the help and support of the generous and inspiring people around me. I really appreciate their contribution to my development as a person and a scholar. My deepest gratitude goes to my advisor, Jim Dator, a talented teacher and passionate futurist, who guided me with his vast knowledge and expertise, and who promptly, answered my questions with comprehensive solutions. I am truly grateful to him for his patience, ongoing support, and wisdom. I would like to thank other committee members for their personal and intellectual support: Manfred Henningsen, Debora Halbert, Hagen Koo, and Jang Hyun Kim. I especially owe a huge debt of gratitude to Debora Halbert who put a lot of effort into the final stages of my writing. She not only edited my work, but also preserved my motivations with her encouragement. I also wish to extend a thank you to Sun-Ki Chai and Jungmin Seo, who were former committee members and inevitably left before the dissertation was completed.
    [Show full text]