Terrorist Tactics and Strategies Compiled and Selected by Judith Tinnes

Total Page:16

File Type:pdf, Size:1020Kb

Terrorist Tactics and Strategies Compiled and Selected by Judith Tinnes PERSPECTIVES ON TERRORISM Volume 12, Issue 5 Bibliography: Terrorist Tactics and Strategies Compiled and selected by Judith Tinnes [Bibliographic Series of Perspectives on Terrorism - BSPT-JT-2018-6] Abstract This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliographies and other resources on terrorist tactics and strategies (such as the planning of attacks, targeting, decision making, and successful or failed plots). Though focusing on recent literature, the bibliography is not restricted to a particular time period and covers publications up to September 2018. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to broaden the search. Keywords: bibliography; resources; literature; terrorism; tactics, strategies, planning, plots, attacks, targeting, decision making NB: All websites were last visited on 16.09.2018. - See also Note for the Reader at the end of this literature list. Bibliographies and other Resources Al-Khalidi, Ashraf; Renahan, Thomas (Eds.) (2015, May-): Daesh Daily: An Update On ISIS Activities. URL: http://www.daeshdaily.com Atkins, Stephen E. (2011): Annotated Bibliography. In: Stephen E. Atkins (Ed.): The 9/11 Encyclopedia. (Vol. 1). (2nd ed.). Santa Barbara: ABC-CLIO, 481-508. Bergen, Peter et al. (2016-): Terrorism in America after 9/11. (New America In-Depth Report). URL: https:// www.newamerica.org/in-depth/terrorism-in-america Bowie, Neil G. (2017, August): Terrorism Events Data: An Inventory of Databases and Data Sets, 1968-2017. Perspectives on Terrorism, 11(4), 50-72. URL: https://www.universiteitleiden.nl/binaries/content/assets/ customsites/perspectives-on-terrorism/2017/issue-4/0620174-terrorism-events-data-an-inventory-of- databases-and-data-sets-1968-2017-by-neil-g.-bowie.pdf Bowie, Neil G.; Schmid, Alex P. (2011): Databases on Terrorism. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. (Routledge Handbooks). Abingdon: Routledge, 294-340. Central Intelligence Agency (CIA) (2017, November): November 2017 Release of Abbottabad Compound Material. [Data Set]. URL: https://www.cia.gov/library/abbottabad-compound/index.html Duncan, Gillian; Schmid, Alex P. (2011): Bibliography of Terrorism. In: Alex P. Schmid (Ed.): The Routledge Handbook of Terrorism Research. (Routledge Handbooks). Abingdon: Routledge, 475-597. [ca. 4,600 Titles] Grossman, Andrew (2017, September-October): A Research Guide to Cases and Materials on Terrorism. (GlobaLex Bibliography). URL: http://www.nyulawglobal.org/globalex/Terrorism1.html IntelCenter (2002-): Free Reports & Maps. URL: https://intelcenter.com/reports-charts.html Kaaman, Hugo (2016, April-): Hugo Kamaan [Blog]. URL: https://zaytunarjuwani.wordpress.com LaFree, Gary; Dugan, Laura (Principal Investigators); Miller, Erin (Program Manager) et al. (2001-): Global Terrorism Database (GTD). [START Database]. URL: http://www.start.umd.edu/gtd Marlatt, Greta E. (2015, June): Suicide Terrorism: A Brief Bibliography of Scholarly Resources. (Dudley Knox ISSN 2334-3745 78 October 2018 PERSPECTIVES ON TERRORISM Volume 12, Issue 5 Library Bibliography). URL: https://www.hsdl.org/?view&did=233590 Marlatt, Greta E. (2016, May): Lone Wolf Terrorism – A Brief Bibliography. (HSDL Bibliography). URL: https:// www.hsdl.org/?view&did=727224 Melaugh, Martin (1996-): CAIN Web Service: Bibliographies, Databases, Electronic Services. [Meta-Bibliography, Subject: Northern Ireland Conflict]. URL: http://cain.ulst.ac.uk/bibdbs/index.html Mickolus, Edward F.; Simmons, Susan L. (1997): Terrorism, 1992-1995: A Chronology of Events and a Selectively Annotated Bibliography. (Bibliographies and Indexes in Military Studies, No. 9). Westport: Greenwood Press. Motes, Kevin D. (2004, May): Annotated Bibliography of Government Documents Related to the Threat of Terrorism and the Attacks of September 11, 2001. (Oklahoma Department of Libraries Bibliography). URL: https://libraries.ok.gov/us-gov/bibliography-of-documents-related-to-911 National Consortium for the Study of Terrorism and Responses to Terrorism (START). (2005-). URL: http:// www.start.umd.edu NATO Multimedia Library (2011, August): The September 11 Attacks and the War on Terror. (Thematic Bibliography No. 8/11). URL: https://www.nato.int/nato_static/assets/pdf/pdf_library_them/20110831_ them0811.pdf NATO Multimedia Library (2015, July): Terrorism: An Overview of the Last Two Years. (Thematic Bibliography No. 4/15). URL: http://www.natolibguides.info/ld.php?content_id=13067274 Norwegian Defence Research Establishment (FFI); University of Oslo (2016-): Jihadi Document Repository. URL: http://www.hf.uio.no/ikos/english/research/jihadi-document-repository/index.html Office of the Director of National Intelligence (ODNI) (2015, May-): Bin Laden’s Bookshelf. URL: https://www. dni.gov/index.php/features/bin-laden-s-bookshelf Price, Eric (2011, September): Selected Literature on Terrorism and Political Violence/Conflict in Africa since the Second World War. Perspectives on Terrorism, 5(3-4), 118-133. URL: https://www.jstor.org/stable/26298532 Price, Eric (2012, October): Bibliography: Inside Terrorist Organisations. Perspectives on Terrorism, 6(4-5), 160-168. URL: https://www.jstor.org/stable/26296882 Price, Eric (2013, April): Literature on Kidnapping for Ransom and for Political Concessions. Perspectives on Terrorism, 7(2), 104-118. URL: https://www.universiteitleiden.nl/binaries/content/assets/customsites/ perspectives-on-terrorism/2013/issue-2/literature-on-kidnapping-for-ransom-and-for-political-concessions- -eric-price.pdf Price, Eric (2014, December): Bibliography on Single Issue Terrorism. Perspectives on Terrorism, 8(6), 123-129. URL: https://www.universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2014/ issue-6/bibliography-on-single-issue-terrorism--eric-price.pdf Price, Eric (2015, June): Bibliography: Lone Wolves/Actors of Terrorism. Perspectives on Terrorism, 9(3), 113-119. URL: https://www.universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2015/ volume-3/10-bibliography-lone-wolves-actors-of-terrorism-compiled-by-eric-price.pdf Tinnes, Judith (2015, February): Bibliography: Terrorism in, or Originating from the Caucasus, Central Asia, and Russia (Part 1). Perspectives on Terrorism, 9(1), 122-156. URL: https://www.universiteitleiden.nl/binaries/ content/assets/customsites/perspectives-on-terrorism/2015/volume-1/12-bibliography-terrorism-in-or- originating-from-the-caucasus-central-asia-and-russia-part-1-compiled-and-selected-by-judith-tinnes.pdf Tinnes, Judith (2015, December): Bibliography: Homegrown Terrorism and Radicalisation. Perspectives on Terrorism, 9(6), 119-153. URL: https://www.universiteitleiden.nl/binaries/content/assets/customsites/ perspectives-on-terrorism/2015/volume-6/9-bibliography-homegrown-terrorism-and-radicalisation- ISSN 2334-3745 79 October 2018 PERSPECTIVES ON TERRORISM Volume 12, Issue 5 compiled-and-selected-by-judith-tinnes.pdf Tinnes, Judith (2016, February-): Counting Lives Lost – Statistics of Camera-Recorded Extrajudicial Executions by the “Islamic State”. [Monitoring Project]. Perspectives on Terrorism, 10(1). URL: http://www. terrorismanalysts.com/pt/index.php/pot/article/view/483 Twitter: https://twitter.com/CountingLivesPT Tinnes, Judith (2016, December): Bibliography: Islamist Terrorism in Europe. Perspectives on Terrorism, 10(6), 171-206. URL: https://www.universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on- terrorism/2016/issue-6/616-bibliography-islamist-terrorism-in-europe-by-judith-tinnes.pdf Tinnes, Judith (2017, October): Bibliography: Life Cycles of Terrorism. Perspectives on Terrorism, 11(5), 108-140. URL: https://www.universiteitleiden.nl/binaries/content/assets/customsites/perspectives-on-terrorism/2017/ issue-5/0820175-bibliography-life-cycles-of-terrorism-compiled-and-selected-by-judith-tinnes.pdf Zelin, Aaron Y. (2010, June-): Jihadology. URL: http://jihadology.net Books and Edited Volumes Abrahms, Max (2018): Rules for Rebels: The Science of Victory in Militant History. Oxford: Oxford University Press. Brennan, Anna Marie (2018): Transnational Terrorist Groups and International Criminal Law. (Routledge Research in International Law). Abingdon: Routledge. Brown, Michael E. et al. (Eds.) (2010): Contending with Terrorism: Roots, Strategies, and Responses. (International Security Readers). Cambridge: The MIT Press. Bunker, Robert J.; Bunker, Pamela Ligouri (2018, August): Radical Islamist English-Language Online Magazines: Research Guide, Strategic Insights, and Policy Response. [e-Book]. Carlisle: Strategic Studies Institute (SSI) / U.S. Army War College Press. URL: http://ssi.armywarcollege.edu/pubs/display.cfm?pubID=1381 Celso, Anthony (2014): Al-Qaeda’s Post-9/11 Devolution: The Failed Jihadist Struggle against the Near and Far Enemy. New York: Bloomsbury Academic. Crenshaw, Martha; LaFree, Gary (2017): Countering Terrorism. Washington, DC: Brookings Institution Press. Cruickshank, Paul (Ed.) (2013): Al Qaeda. (5 Vols.). (Critical Concepts in Political Science). Abingdon: Routledge. Dahl, Erik J. (2013): Intelligence and Surprise Attack: Failure and Success from Pearl Harbor to 9/11 and beyond. Washington, DC: Georgetown University Press. Deol, Jeevan; Kazmi, Zaheer (Eds.) (2011): Contextualising Jihadi Thought. New York: Columbia University Press. English, Richard
Recommended publications
  • The Metamorphosis-AQI to ISIS
    THE METAMORPHOSIS FROM AQI TO THE ISLAMIC STATE OF IRAQ (2006–2011) Excerpted from The Terrorists of Iraq by Malcolm Nance (Taylor and Francis, 2014). 46 The Counter Terrorist ~ February/March 2015 By Malcolm W. Nance As early as 2005 al-Qaeda in Iraq (AQI) had sought to carve out a national entity within Iraq. They went so far as to declare an Islamic Emirate of Iraq. At the time they only occupied a few dozen safe houses in the Western governorates, some in Baghdad and a neighborhood in Anbar Province. he Jolan District in Fallujah had instead of operatives in a terrorist group. been dominated by AQI members Under the protection of the Iraqi Sunni Tand sympathizers starting in the months community, they wanted to carve out a after the invasion. It was quickly lost piece of secure terrain that would allow along with more than 1,000 jihadist foreign fighters to abandon their homes fighters to the U.S. Marines, who rooted and families, come via Syria to the “state” them out in intense house-to-house in their jihadist version of the Prophet combat. Even without occupying any Mohammed’s Hijra (emigration), and land, they understood that the concept start a new life toward an eventual place of appearing to be a virtual entity was a in paradise. They could take on local psychological multiplier for their fighters. wives, train, brag, and fight alongside Better to be considered heroes of a nation other men like themselves. They needed Jihadists traveling in pick up trucks. Photo by: Magharebia The Counter Terrorist ~ February/March 2015 47 a place of their own where they could be involved in something bigger than themselves—they could fight like the companions of the prophet Mohammed in a real, live jihad against the “crusaders” and “apostates.” The best of them would volunteer to die in martyrdom bombings and go straight to heaven! So it was decided that even itinerant “knights” needed a base of operations to call home.
    [Show full text]
  • “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-Terrorism Related Subjects by Joshua Sinai
    PERSPECTIVES ON TERRORISM Volume 8, Issue 1 IV. Book Reviews “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-terrorism Related Subjects by Joshua Sinai "is column consists of two parts: capsule reviews of ten books recently published on terrorism and counterterrorism-related topics, and - continuing the series begun in the previous column of highlighting books by signi$cant publishers (listed in alphabetical order) - capsule reviews of 13 important books published by CRC Press. Note: Future columns will review books by publishers such as Hurst, Oxford University Press, Palgrave Macmillan, Polity, Routledge, Rowman & Little#eld, Springer, Stanford University Press, and the University of Chicago Press. General Reviews Gershon Baskin, with Ilene Prusher, !e Negotiator: Freeing Gilad Schalit From Hamas. New Milford, CT: "e Toby Press, 2013. 283 pages, US$24.95 [Hardcover], ISBN: 978-1592643493. "is is a $rst-hand account by an American-Israeli peace activist of his role in arranging for the release of Gilad Schalit, an Israeli soldier who was kidnapped by Hamas in 2006. Schalit was released in October 2011 as part of an exchange deal by the Israeli government and Hamas for 1,027 Palestinian and Israeli Arab prisoners with a nexus to terrorist activity. Acting in his non-governmental capacity, Jerusalem-based Dr. Baskin was extensively involved (with other players) in the secret back channel negotiations between Israel and Hamas, with these dealings and the wider context in which they were conducted revealed in the letters, e-mails, and other documents that were exchanged between the players over the $ve-year period, which are contained in the book, thus making it a valuable primary source for those analyzing Israeli-Hamas relations.
    [Show full text]
  • Violent Extremism in Bangladesh: Analysing the Interplay Between Online and Offline Worlds
    Violent Extremism in Bangladesh: Analysing the Interplay Between Online and Offline Worlds Presented by Saimum Parvez Doctoral Candidate Govt. and IR Research Question RQs: How do online and offline interactions influence an individual towards violent extremism in Bangladesh? How do the online and offline contents produced by the violent extremists in Bangladesh construct the narrative that justifies violent Jihad? 2 Holey Artisan Twenty people, most of them foreigners, have been Attack killed in an attack on a cafe in Bangladesh by Islamic State. Most of the suspected Holey Artisan attackers were from well-off families and attended English medium private institutions. NIBRAS ISLAM • Turkish Hope School • Monash University • A soccer player, music fan • 22 years old Holey Artisan Attack ROHAN IMTIAZ • Scholastica School • Monash University • Son of a ruling party leader Najibullah Ansari VE in Bangladesh • Although militant groups have been present in Bangladesh since the 1990s and the country experienced a serious surge in attacks in 2005-6, the situation began to take a turn for the worst in mid-2013. • Various transnational terrorist groups, such as the Islamic State of Iraq and the Levant (ISIS) and Al Qaeda in Indian Subcontinent (AQIS), claimed responsibility for ghastly attacks upon religious and ethnic minorities, foreigners, liberal activists, authors and publishers. • The attack on 1 July, 2016 by a group of youths connected to the IS on a café in the upscale neighbourhood of the capital Dhaka sent a shockwave through the country and drew international attention. • Very few evidence-based discussions about who are these violent extremists and what is driving Bangladeshis to militancy.
    [Show full text]
  • The Islamic State Khorasan Province: a High- Stakes Political Blame-Game? Saurav Sarkar Research Associate, CAPS
    CAPS In Focus 25 November 2020 www.capsindia.org 37/20 The Islamic State Khorasan Province: A high- stakes political blame-game? Saurav Sarkar Research Associate, CAPS Keywords: Taliban, ISKP, Afghan government, Haqqani Network, Terrorism The signing of the U.S.-Taliban agreement in ISKP is a proxy of the Afghan government to defame the Taliban and spoil the peace process. February 2020 and the subsequent intra-Afghan There is not much merit to any of these talks were supposed to bring in some respite arguments and they are all largely driven by from the violence plaguing Afghanistan since the political agendas. However, these conflicting last two decades, at least in the short-term. narratives make progress towards peace difficult Unfortunately, there has not been much progress and sidelines emerging security threats. in the intra-Afghan talks nor in implementing the terms of the agreement. Amidst these political Breaking Down Conflicting Narratives in developments the Islamic State Khorasan recent ISKP attacks Province (ISKP) has emerged, unsurprisingly, as One of the most prolific and gruesome attacks a wildcard bent on unleashing carnage on the this year was the attack on the Gurudwara Har peace process by attacking multiple sensitive Rai Sahib in Kabul killing mostly Sikh targets. worshippers in March. A couple of weeks after The situation is further compounded by the the attack the leader of ISKP, Aslam Farooqi (a narratives promoted by opposing sides – the Pakistani national), was arrested by Afghan Afghan government and the Taliban (and their forces. After Farooqi’s arrest Afghan officials external supporters) – regarding attacks claimed were insinuating that the attack was conducted by or attributed to ISKP.
    [Show full text]
  • Blasphemy, Charlie Hebdo, and the Freedom of Belief and Expression
    Blasphemy, Charlie Hebdo, and the Freedom of Belief and Expression The Paris attacks and the reactions rashad ali The horrific events in Paris, with the killing of a group of Other reactions highlight and emphasise the fact journalists, a Police officer, and members of the Jewish that Muslims are also victims of terrorism – often the community in France have shocked and horrified most main victims – a point which Charlie Hebdo made in commentators. These atrocities, which the Yemen branch an editorial of the first issue of the magazine published of the global terrorist group al-Qaeda have claimed the following the attack on its staff. Still others highlight responsibility for,1 have led to condemnations from that Jews were targeted merely because they were Jews.2 across the political spectrum and across religious divides. This was even more relevant given how a BBC journalist Some ubiquitous slogans that have arisen, whether appeared to suggest that there was a connection between Je suis Charlie, Ahmed, or Juif, have been used to show how “Jews” treated Palestinians in Israel and the killing of empathy with various victims of these horrid events. Jews in France in a kosher shop.3 These different responses illustrate some of the divides in The most notorious response arguably has not come public reaction, with solidarity shown to various camps. from Islamist circles but from the French neo-fascist For example, some have wished to show support and comedian Dieudonne for stating on his Facebook solidarity with the victims but have not wished to imply account “je me sens Charlie Coulibaly” (“I feel like Charlie or show support to Charlie Hebdo as a publication, Coulibaly”).
    [Show full text]
  • The Lessons of Mumbai
    THE ARTS This PDF document was made available from www.rand.org as a public CHILD POLICY service of the RAND Corporation. CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY The RAND Corporation is a nonprofit research POPULATION AND AGING organization providing objective analysis and effective PUBLIC SAFETY solutions that address the challenges facing the public SCIENCE AND TECHNOLOGY and private sectors around the world. SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE Support RAND Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Learn more about the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation occasional paper series. RAND occasional papers may include an informed perspective on a timely policy issue, a discussion of new research methodologies, essays, a paper presented at a conference, a conference summary, or a summary of work in progress. All RAND occasional papers undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.
    [Show full text]
  • HLS 225 Legal and Ethical Issues in Homeland Security
    Christopher Wren Association Week 2 Terrorism, Cybersecurity, Disaster Response What We’ll Learn in Week 2 The Homeland Security Enterprise takes a broad “All Hazards” approach to threats—preventing and responding to both man-made and natural threats Terrorism, Cyber, other Man-Made, and Natural Threats are reviewed in Week 2 U.S. interagency responses to these threats have improved since 9/11—but are far from totally ready Fundamental and Powerful Concept: DHS “All Hazards” Threat State (define): all natural and man-made hazards that can threaten the US homeland. Elaborate: includes natural hazards and threats, e.g., weather, geologic, disease, etc., and man-made hazards and threats to include both accidents and deliberate attempts to harm people, infrastructure, or resources. Exemplify: a hurricane is a natural hazard, a bridge or dam collapse is a man-made accident (hazard), a terrorist attack is a man-made hazard. An attack by a foreign military on U.S. territory is not an all hazards attack for DHS action—but is a national security issue to be handled by DOD. Illustrate: as doctors must diagnose and treat a person for all manner of different diseases and other afflictions, the Homeland Security Enterprise is responsible for preparing and responding to U.S. “all hazard” threats Defining the Virginia “All Hazards” Threat Terrorism-Related: WMD Weather-Related: Floods, (Nuclear/Radiological (Dirty Tornadoes, Hurricanes, Tropical Bombs), Chemical, Biological), Storms, Thunderstorms, Winter Explosive Devices (IED, etc.), Cyber
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • 9 Charlie Hebdo Case Study
    Putri, et.al., Charlie Hebdo Case Study: Public Order as a Limit… 9 CHARLIE HEBDO CASE STUDY: PUBLIC ORDER AS LIMIT TO FREEDOM OF EXPRESSION* Devita Kartika Putri** and Agam Subarkah*** Abstract Intisari The freedom of expression is not an Kebebasan berekspresi bukan merupakan absolute right. It comes with limited hak mutlak. Terdapat keterbatasan dari limitations set out in the ICCPR and ECHR— ICCPR dan ECHR— yang berlaku kepada applicable to France, taking into account Prancis, dengan mempertimbangkan public order, ensuring the rights of others, ketertiban umum, menjamin hak-hak orang and it needs to be prescribed by law. A lain, dan perlu ditentukan oleh hukum. state may give its full support to the Sebuah negara dapat memberikan dukungan freedom of expression, but when its penuh terhadap kebebasan berekspresi, exercise is no longer harmless, one must tetapi ketika implementasinya tidak lagi question the extent of such freedom; how it berbahaya, harus dipertanyakan sejauh must be compatible and in respect with mana kebebasan tersebut; bagaimana other rights that are as important as the kebebasannya kompatibel dan sehubungan freedom of expression. This article seeks to dengan hak-hak lain yang sama pentingnya see how the limitation to freedom of dengan kebebasan berekspresi. Naskah ini expression can be applied in relation to berusaha untuk melihat bagaimana post Charlie Hebdo event. pembatasan kebebasan berekspresi dapat diterapkan dalam kaitannya dengan kasus Charlie Hebdo. Keywords: Charlie Hebdo, freedom of expression, public order, respect for religion, responsibility to protect, human rights. Kata Kunci: Charlie Hebdo, kebebasan berekspresi, ketertiban umum, menghormati agama, tanggung jawab untuk melindungi, hak asasi manusia.
    [Show full text]
  • Appendix-H-27 MADURAI KAMARAJ UNIVERSITY (University with Potential for Excellence)
    Placed at the meeting of Academic Council held on 12.12.2019 Appendix-H-27 MADURAI KAMARAJ UNIVERSITY (University with Potential for Excellence) Directorate of Distance Education Syllabus for M.A. History (Semester Pattern) (With effect from the academic year 2019-2020 onwards) Regulations, Scheme of Examinations and Syllabus Name of the Program : Master of Arts in History (M.A.) I. About the Department : The Department of History in the Directorate of Distance Education of Madurai Kamaraj University is one of the oldest departments started in 1971. The Department currently offers both UG & PG programs in History. II. Program Overview : The Master of Arts in History program at the Directorate is a conventional program focusing on ancient, medieval, modern and contemporary history, human life, socio-economic and political conditions, foreign relations, war strategies and administration. III.Objectives of the Program : 1. To know the glory of the past. 2. To study the socio-economic and political condition of the nations. 3. To make the students to understand the past history. 4. To facilitate the students for getting job opportunities. 5. Students are expected to advance in knowledge thereby contributing the society through the application of their academic training. IV.Program Target Group : The program is offered to the students of rural, semi-urban and urban background who aspire to acquire knowledge in the respective fields but could not continue the education through regular mode owing to various constraints. The Program may be structured in a way to attract the aspirants of Union Public Service Commission Examinations and State Public Service Commission Examinations.
    [Show full text]
  • AQIM's Blueprint for Securing Control of Northern Mali
    APRIL 2014 . VOL 7 . ISSUE 4 Contents Guns, Money and Prayers: FEATURE ARTICLE 1 Guns, Money and Prayers: AQIM’s Blueprint for Securing AQIM’s Blueprint for Securing Control of Northern Mali By Morten Bøås Control of Northern Mali By Morten Bøås REPORTS 6 AQIM’s Threat to Western Interests in the Sahel By Samuel L. Aronson 10 The Saudi Foreign Fighter Presence in Syria By Aaron Y. Zelin 14 Mexico’s Vigilante Militias Rout the Knights Templar Drug Cartel By Ioan Grillo 18 Drug Trafficking, Terrorism, and Civilian Self-Defense in Peru By Steven T. Zech 23 Maritime Piracy on the Rise in West Africa By Stephen Starr 26 Recent Highlights in Political Violence 28 CTC Sentinel Staff & Contacts An Islamist policeman patrolling the streets of Gao in northern Mali on July 16, 2012. - Issouf Sanogo/AFP/Getty Images l-qa`ida in the islamic As a result, even if the recent French Maghreb (AQIM) is military intervention in Mali has occasionally described as pushed back the Islamist rebels and an operational branch of the secured control of the northern cities of Aglobal al-Qa`ida structure. Yet AQIM Gao, Kidal and Timbuktu, a number of should not be viewed as an external al- challenges remain.1 The Islamists have Qa`ida force operating in the Sahel and not been defeated. Apart from the loss of Sahara. For years, AQIM and its offshoots prominent figures such as AQIM senior About the CTC Sentinel have pursued strategies of integration leader Abou Zeid and the reported death The Combating Terrorism Center is an in the region based on a sophisticated of Oumar Ould Hamaha,2 the rest of the independent educational and research reading of the local context.
    [Show full text]
  • Terrorism and Responses Mr
    Terrorism and Responses Mr. Yisrael Neeman Course Number: 702.2199 Office Hours: TBA Semester: Spring 2019 Location: TBA Class Time: Thursday 15:15-17:45 Phone: 04-824-2065 Class Location: TBA E-Mail: [email protected] Course Description: This course will examine the issue of terrorism as a growing form of political violence into the 21st Century. The last three decades of the 20th Century witnessed a phenomenal growth in terrorist activity around the world. Some groups rose and fell quite rapidly, but others have managed sustained campaigns and have achieved spectacular tactical success, among them the attacks on the United States on September 11, 2001. We will investigate the causes, methods and responses involved in the ongoing conflict between terrorist organizations and their adversaries. Topics covered will include: What is terrorism, as distinct from other forms of violence? What are the objectives of terrorists? What are the strategy and tactics of terrorists? Is suicide terrorism a distinct form of terrorism or another tactic among many? Why do terrorists use the tactics of terrorism? Is the use of terrorist tactics ever justified? What is the history of terrorism and terrorist organizations? What are some of the major terrorist groups active today? How do religious beliefs and ideological dogma aid terrorists? Does terrorism work? Does it achieve strategic goals? How do terrorist organizations transform? Can terrorism be deterred, defeated or prevented? Is there a military solution? Is the use of torture ever justified for extracting information from terrorists? Targeted assassination? Requirements, grades, and so on 1 This course has just a few simple requirements: read the assignments, attend class, participate in discussions, write the papers, and pass the tests.
    [Show full text]