Government and Nongovernmental Collaboration to Build Community Resiliency Against Terrorism in Oklahoma City Kimberly K

Total Page:16

File Type:pdf, Size:1020Kb

Government and Nongovernmental Collaboration to Build Community Resiliency Against Terrorism in Oklahoma City Kimberly K Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2018 Government and Nongovernmental Collaboration to Build Community Resiliency Against Terrorism in Oklahoma City Kimberly K. Heltz Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Criminology Commons, Criminology and Criminal Justice Commons, Public Administration Commons, and the Quantitative, Qualitative, Comparative, and Historical Methodologies Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Kimberly K Heltz has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Jacqueline Thomas, Committee Chairperson, Public Policy and Administration Faculty Dr. Mark Gordon, Committee Member, Public Policy and Administration Faculty Dr. Timothy Fadgen, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2018 Abstract Government and Nongovernmental Collaboration to Build Community Resiliency Against Terrorism in Oklahoma City by Kimberly K Heltz MA, Norwich University, 2005 BS, Regents College, 2003 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University May 2018 Abstract The way communities build resiliency and prepare for acts of terrorism is ambiguous in the United States; best practices remain unclear. Due to mobility and advancements in communication technologies, individuals and organizations share information, incite anger, recruit, and act on ideological grievances with ease. Such grievances are bolstered by the political and social exclusion of disparate groups through poorly designed policies and ineffective government structures. Using a combination of social constructivism and systems thinking theories, this case study explored collaboration efforts between government agencies and nongovernment experts in Oklahoma City, OK, identifying best practices as a result of lessons learned following the 1995 bombing of the Alfred P. Murrah Federal Building. Data were acquired through public records related to the bombing, combined with a qualitative survey of 31 community leaders. These data were inductively coded and subjected to a thematic analysis procedure. Key findings indicate that while open communication with the community and increased coordination were suggested by participants, reports were kept internal to each agency and not widely shared or implemented effectively across the community. Sharing the identified best practices and acknowledging collaboration opportunities promotes positive social change by involving the broader community and building early resiliency to address ideologic grievances and create more effective community counterterrorism plans. Government and Nongovernmental Collaboration to Build Community Resiliency Against Terrorism in Oklahoma City by Kimberly K Heltz MA, Norwich University, 2005 BS, Regents College, 2003 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University May 2018 Dedication To my father for telling me I could do anything I dreamed of, to my mother who taught me how, to my sons who sacrificed their time and encouraged me every day, to my dearest husband who helped me over the final hurdles, and finally to my daughter and granddaughter who inspired me to finish and live my dreams. Thank you for believing in me. Table of Contents List of Tables ..................................................................................................................... iv Chapter 1: Introduction to the Study ....................................................................................1 Introduction ....................................................................................................................1 Background ....................................................................................................................2 Problem Statement .........................................................................................................6 Purpose of the Study ......................................................................................................9 Research Questions ......................................................................................................11 Theoretical Framework ................................................................................................11 Nature of the Study ......................................................................................................14 Definitions....................................................................................................................15 Assumptions .................................................................................................................17 Scope and Delimitations ..............................................................................................18 Limitations ...................................................................................................................18 Significance of the Study .............................................................................................19 Summary ......................................................................................................................20 Chapter 2: Literature Review .............................................................................................21 Introduction ..................................................................................................................21 Literature Search Strategy............................................................................................22 State of Terrorism Research.........................................................................................23 Definitional Challenges ........................................................................................ 24 Historic Patterns ...........................................................................................................26 i 1870-1920s: Anarchist Wave ................................................................................ 28 1920s-1960s: Anti-Colonial Wave ....................................................................... 29 1960s-1980s: New Left Wave/Marxist ................................................................. 30 1970s-2020s: Religious ......................................................................................... 31 Post 9/11 Security Environment ........................................................................... 32 Theoretical Directions ..................................................................................................33 State/Regime Based Terrorism ............................................................................. 34 Insurgent Based Terrorism Theories ..................................................................... 39 Agent-based Analysis: Radicalization .................................................................. 39 Institutional Analysis: Organizational Management ............................................ 50 Systemic Analysis: Causes of Ideological Grievances ......................................... 55 Counterterrorism ..........................................................................................................61 Summary ......................................................................................................................66 Chapter 3: Research Method ..............................................................................................69 Introduction ..................................................................................................................69 Research Design and Rationale ...................................................................................69 Role of the Researcher .................................................................................................71 Methodology ................................................................................................................72 Issues of Trustworthiness .............................................................................................78 Summary ......................................................................................................................81 Chapter 4: Results ..............................................................................................................83 Introduction ..................................................................................................................83 ii Case Study Setting .......................................................................................................84 Historic Data Collection ..............................................................................................87 Analysis Process ..........................................................................................................87
Recommended publications
  • Jones (Stephen) Oklahoma City Bombing Archive, 1798 – 2003 (Bulk 1995 – 1997)
    JONES (STEPHEN) OKLAHOMA CITY BOMBING ARCHIVE, 1798 ± 2003 (BULK 1995 ± 1997). See TARO record at http://www.lib.utexas.edu/taro/utcah/03493/cah-03493.html (Approximately 620 linear feet) This collection is open for research use. Portions are restricted due to privacy concerns. See Archivist's Note for more details. Use of DAT and Beta tapes by appointment only; please contact repository for more information. This collection is stored remotely. Advance notice required for retrieval. Contact repository for retrieval. Cite as: Stephen Jones Oklahoma City Bombing Archive, 1798 ± 2003 (Bulk 1995 ± 1997), Dolph Briscoe Center for American History, University of Texas at Austin. [AR 98-395; 2003-055; 2005-161] ______________________________________________________________________________ BIOGRAPHICAL NOTE: Stephen Jones (born 1940) was appointed in May 1995 by the United States District Court in Oklahoma City to serve as the lead defense attorney for Timothy McVeigh in the criminal court case of United States of America v. Timothy James McVeigh and Terry Lynn Nichols. On April 19, 1995, two years to the day after the infamous Federal Bureau of Investigation and Bureau of Alcohol, Tobacco, and Firearms raid on the Branch Davidians at Waco, Texas, a homemade bomb delivered inside of a Ryder rental truck was detonated in front of the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma. Timothy McVeigh, as well as his accomplice Terry Nichols, were accused of and, in 1997, found guilty of the crime, and McVeigh was executed in 2001. Terry Nichols is still serving his sentence of 161 consecutive life terms without the possibility of parole in the ADX Florence super maximum-security prison in Florence, Colorado.
    [Show full text]
  • In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
    IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant.
    [Show full text]
  • Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
    PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions.
    [Show full text]
  • Psychiatric Disorders Among Survivors of the Oklahoma City Bombing
    ORIGINAL CONTRIBUTION Psychiatric Disorders Among Survivors of the Oklahoma City Bombing Carol S. North, MD, MPE Context Disasters expose unselected populations to traumatic events and can be used Sara Jo Nixon, PhD to study the mental health effects. The Oklahoma City, Okla, bombing is particularly sig- nificant for the study of mental health sequelae of trauma because its extreme magni- Sheryll Shariat, MPH tude and scope have been predicted to render profound psychiatric effects on survivors. Sue Mallonee, RN, MPH Objective To measure the psychiatric impact of the bombing of the Alfred P. Mur- J. Curtis McMillen, PhD rah Federal Building in Oklahoma City on survivors of the direct blast, specifically ex- amining rates of posttraumatic stress disorder (PTSD), diagnostic comorbidity, func- Edward L. Spitznagel, PhD tional impairment, and predictors of postdisaster psychopathology. Elizabeth M. Smith, PhD† Design, Setting, and Participants Of 255 eligible adult survivors selected from a confidential registry, 182 (71%) were assessed systematically by interviews approxi- mately 6 months after the disaster, between August and December 1995. ISASTERS OFFER UNIQUE OP- portunities to study mental Main Outcome Measures Diagnosis of 8 psychiatric disorders, demographic data, health effects of traumatic level of functioning, treatment, exposure to the event, involvement of family and friends, events in unselected popula- and physical injuries, as ascertained by the Diagnostic Interview Schedule/Disaster Supple- tions.D Because most disasters strike ran- ment. domly, studies of disasters circumvent Results Forty-five percent of the subjects had a postdisaster psychiatric disorder and 34.3% had PTSD. Predictors included disaster exposure, female sex (for any postdi- the limitations of research on trauma to 2 saster diagnosis, 55% vs 34% for men; x1 = 8.27; P = .004), and predisaster psychi- individuals in the community, where x 2 atric disorder (for PTSD, 45% vs 26% for those without predisaster disorder; 1 = 6.86; risk for traumatic events is con- P = .009).
    [Show full text]
  • Patterns of Terrorism in the United States, 1970-2013
    Patterns of Terrorism in the United States, 1970-2013 Final Report to Resilient Systems Division, DHS Science and Technology Directorate October 2014 National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence Based at the University of Maryland 8400 Baltimore Ave, Suite 250 • College Park, MD 20740 • 301.405.6600 www.start.umd.edu National Consortium for the Study of Terrorism and Responses to Terrorism A Department of Homeland Security Science and Technology Center of Excellence About This Report The author of this report is Erin Miller at the University of Maryland. Questions about this report should be directed to Erin Miller at [email protected]. The initial collection of data for the Global Terrorism Database (GTD) data was carried out by the Pinkerton Global Intelligence Services (PGIS) between 1970 and 1997 and was donated to the University of Maryland in 2001. Digitizing and validating the original GTD data from 1970 to 1997 was funded by a grant from the National Institute of Justice in 2004 (PIs Gary LaFree and Laura Dugan; grant number: NIJ2002-DT-CX-0001) and in 2005 as part of the START Center of Excellence by the Department of Homeland Security Science and Technology Directorate (DHS S&T), Office of University Programs (PI Gary LaFree; grant numbers N00140510629 and 2008-ST-061-ST0004). Data collection for incidents that occurred between January 1998 and March 2008 and updates to the earlier data to make it consistent with new GTD coding criteria were funded by the DHS S&T Human Factors/Behavioral Sciences Division (HFD) (PIs Gary LaFree and Gary Ackerman; contract number HSHQDC-05-X-00482) and conducted by database staff at the National Consortium for the Study of Terrorism and Responses to Terrorism (START) and the Center for Terrorism and Intelligence Studies (CETIS).
    [Show full text]
  • The Financial Impact of the Oklahoma City Bombing
    OKLAHOMA CITY NATIONAL MEMORIAL & MUSEUM RECOVERY: THE FINANCIAL IMPACT OF THE OKLAHOMA CITY BOMBING Buildings, property, and medical services can all be assigned value; but, there is no way to put a value on the loss of human life. The pain and sorrow is immeasurable. However, Oklahomans vowed never to forget those lost in the Oklahoma City bombing or succumb to the fear of terrorism. With that promise and unyielding perseverance, along with local, state and federal support, Oklahoma City has become a stronger, more resilient, community. Oklahoma City continues to benefit from funds provided for restoration following the bombing. At 9:02 a.m. on April 19, 1995, a bomb exploded on the north side of the Alfred P. Murrah Federal Building in Oklahoma City, destroying one-third of the building and killing 168 men, women and children. Over 300 buildings were destroyed or damaged and shattered glass covered a ten-block radius. Cities as far as 50 miles away felt and heard the explosion. People initially thought there had been a natural gas explosion. It soon became clear that this tragedy was not from natural causes, but an act of terrorism. Within minutes, fire, police, and medical personnel were on site. They were joined by civilians, as well as workers from the affected buildings. The Incident Command System was immediately set up by the Oklahoma City Fire Department to organize the search and rescue efforts. The police were responsible for securing the site, while the Federal Bureau of Investigation (FBI) conducted the criminal investigation. Recognizing the severity of the incident, the Oklahoma Department of Emergency Management quickly started the coordination of services between state and federal agencies, including the Federal Emergency Management Agency (FEMA).
    [Show full text]
  • A Theory of Categorical Terrorism
    A Theory of Categorical Terrorism Jeff Goodwin, New York University Abstract When revolutionaries or insurgents, broadly defined, indiscriminately attack civilians, they generally attack “complicitous civilians,” i.e., those categories of noncombatants which the revolutionaries see as benefiting from, supporting and/or having a substantial capacity to influence the states that the revolutionaries are attempting to displace or overthrow. Such “categorical” terrorism will be most extensive when revolutionaries view these states (or complicitous civilians themselves) as perpetrators of extensive, indiscriminate violence against the revolutionaries and their constituents. However, if significant numbers of complicitous civilians are seen by rebel groups as potential supporters (or as capable of being influenced by nonviolent appeals or protests), then they will not be indiscriminately attacked. Whether specific categories of civilians will be perceived as potential allies by revolutionaries depends mainly on the prior history of political interaction and cooperation between these civilians and the revolutionaries. Categorical terrorism is most likely where there has been little such interaction or cooperation, resulting in weak political alliances between the revolutionaries and complicitous civilians – for example, where the revolutionaries and complicitous civilians speak different languages, practice different religions, claim the same land, and/or are territorially segregated. The terrorist attacks of Sept. 11, 2001, have spurred many social scientists to explore the dynamics of terrorism, most for the first time. Before 9/11, terrorism research was the exclusive preserve, with very few exceptions, of small networks of political scientists and non-academic “security experts,” relatively few of whom were interested in social-science theory. Descriptive case studies abound, replete with ad hoc, case-specific explanations of terrorism.
    [Show full text]
  • Israel's Other Terrorism Challenge
    The University of Notre Dame Australia ResearchOnline@ND Arts Book Chapters School of Arts 2010 Israel's other terrorism challenge Sandra M. Nasr University of Notre Dame Australia, [email protected] Follow this and additional works at: https://researchonline.nd.edu.au/arts_chapters Recommended Citation Nasr, S. (2010). Israel's other terrorism challenge. In R. Jackson, E. Murphy, E & S. Poynting (eds.). Contemporary state terrorism: Theory and practice. Abingdon, Oxon: Routledge. This Book Chapter is brought to you by the School of Arts at ResearchOnline@ND. It has been accepted for inclusion in Arts Book Chapters by an authorized administrator of ResearchOnline@ND. For more information, please contact [email protected]. (In Contemporary State Terrorism: Theory and Practice , Sep. 2009) ‘Israel’s other Terrorism Challenge’ By Sandra Nasr In the West, we hear a lot about terrorism in relation to Israel: Palestinian militants in Gaza using rockets to fire at Israeli towns over the ‘border’; and Palestinian suicide bombers strapping on explosives and detonating their payloads in Israeli cafes, bars, restaurants and buses. These attacks on civilian targets for the purpose of making a political statement are, indeed, examples of terrorism and Israeli civilians are right to demand that their government act decisively to prevent such acts. Yet Israel often responds to these terrorist tactics by adopting its own. When Israel sanctions and employs tactics which are designed to instil fear, humiliate, injure or otherwise cause harm to a civilian population for a political purpose, the state is guilty of state terrorism. Identifying those policies which constitute state terrorism requires an examination of both the intent and effect of actions (and inaction) by the state.
    [Show full text]
  • Various Definitions of Terrorism
    Various Definitions of Terrorism Controversy in Defining Terrorism The difficulty in defining “terrorism” is in agreeing on a basis for determining when the use of violence (directed at whom, by whom, for what ends) is legitimate; therefore, the modern definition of terrorism is inherently controversial. The use of violence for the achievement of political ends is common to state and non-state groups. The majority of definitions in use has been written by agencies directly associated with government, and is systematically biased to exclude governments from the definition. The contemporary label of "terrorist" is highly pejorative-- it denotes a lack of legitimacy and morality. As a practical matter, so-called acts of “terrorism” or terrorism are often a tactic committed by the actors as part of a larger military or geo-political agenda. United Nations The UN General Assembly Resolution 49/60 (adopted on December 9, 1994), titled "Measures to Eliminate International Terrorism," contains a provision describing terrorism: Criminal acts intended or calculated to provoke a state of terror in the general public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them. The UN Member States still have no agreed-upon definition of terrorism, and this fact has been a major obstacle to meaningful international countermeasures. Terminology consensus would be necessary for a single comprehensive convention on terrorism, which some countries favor in place of the present 12 piecemeal conventions and protocols.
    [Show full text]
  • Building a Global Terrorism Database
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Building a Global Terrorism Database Author(s): Gary LaFree ; Laura Dugan ; Heather V. Fogg ; Jeffrey Scott Document No.: 214260 Date Received: May 2006 Award Number: 2002-DT-CX-0001 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. BUILDING A GLOBAL TERRORISM DATABASE Dr. Gary LaFree Dr. Laura Dugan Heather V. Fogg Jeffrey Scott University of Maryland April 27, 2006 This project was supported by Grant No. 2002-DT-CX-0001 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the authors and do not necessarily represent the official position or policies of the U.S. Department of Justice. TABLE OF CONTENTS Excutive Summary.................................................................................................. 1 Building a Global Terrorism Database ................................................................... 4 The Original PGIS Database.......................................................................... 6 Methods..................................................................................................................
    [Show full text]
  • Definition of Terrorism by Country in Oecd Countries
    DEFINITION OF TERRORISM BY COUNTRY IN OECD COUNTRIES There have been some definitional differences in the use of the terms ‘terrorism’ and ‘act of terrorism’ between OECD countries. It is for this reason that a comparison is necessary to clarify the scope of the operation of the terrorism risk insurance programmes. The OECD International Platform on Terrorism Risk Insurance shares information and identifies good practices for the financial management of terrorism risk, to contribute to fast economic recovery in the event of attacks. This comparative table is regularly updated. It is the product of joint work between national terrorism insurance schemes, the OECD and the World Forum of Catastrophe Programmes. www.oecd.org/daf/fin/insurance/terrorism-risk-insurance.htm DEFINITION OF TERRORISM BY COUNTRY IN OECD COUNTRIES Status of definition of Intention of terrorist act Identification of those Means used Targets/effects terrorism behind the act Contained in s 5 Terrorism Insurance Action done or threat made, with the Not specified An act (or threat of an act), that is not advocacy, An action that causes serious harm to a Act 2003 intention of advancing a political, religious protest, dissent or industrial action, that causes person, serious damage to property, or ideological cause, with the intention of specified damage. causes death or endangers life or creates a Act of terrorism has to be certified by coercing or influencing by intimidation the serious health or safety risk, or seriously the Commonwealth Treasurer, after government of Australia or the Australian interferes with, or disrupts or destroys an consultation with the Commonwealth States or Territories, or a foreign country, or electronic system.
    [Show full text]
  • Human Rights, the United Nations, and the Struggle Against Terrorism
    International Peace Academy United Nations Office of the High Commissioner for Human Rights Center on International Organization, Columbia University Human Rights, the United Nations, and the Struggle against Terrorism 7 NOVEMBER 2003 ■ NEW YORK CITY Acknowledgements IP A gratefully acknowledges support for this conference and for the Terrorism Program from the Government of the Netherlands, and support for the Terrorism Program from the Government of Norway. In addition we would like to thank IPA’s core donors—the Governments of Denmark, Norway, Sweden, the Ford Foundation, the William and Flora Hewlett Foundation and the Rockefeller Foundation—whose support enables programs such as this. HUMAN RIGHTS, THE UNITED NATIONS, AND THE STRUGGLE AGAINST TERRORISM Table of Contents Conference Report: “Terrorism and Human Rights,” by William G. O’Neill. 1 Executive Summary . 1 Introduction . 2 Counter-Terrorism and Human Rights: Finding the Balance . 2 Terrorism and the Violation of Human Rights: A Vicious Circle. 3 National Counter-Terrorism Strategies and Human Rights . 4 Regional Approaches to the War on Terrorism. 6 Challenges Ahead for the United Nations. 7 Appendix I: Conference Concept Paper, by William G. O’Neill . 9 Appendix II: Conference Agenda . 23 Appendix III: List of Participants . 26 Contents HUMAN RIGHTS, THE UNITED NATIONS, AND THE STRUGGLE AGAINST TERRORISM Terrorism and Human Rights William G. O’Neill Executive Summary with the Covenant on Civil and Political Rights, must be ready to assist by offering its legal expertise. A Special Rapporteur on Te r r o r i s m • The United Nations Secretary-General has a could be appointed by the Commission on Human unique role to play in reminding states that in Rights.
    [Show full text]