Comba1ting Terrorism: Literature on Future Trends in Terrorism

Total Page:16

File Type:pdf, Size:1020Kb

Comba1ting Terrorism: Literature on Future Trends in Terrorism If you have issues viewing or accessing this file contact us at NCJRS.gov. LIBR.ARY CONGRESS COMBA1TING TERRORISM: LITERATURE ON FUTURE TRENDS IN TERRORISM An Annotated Bibliography Prepared by the Federal Research Division of the Library of Congress under an Interagency Agreement with The Office of the Assistant Secretary of Defense (Special Operations/Low-Intensity Conflict) June 1993 Prepared by: Project manager: Helen Metz Coordinator/analyst: Joshua Sinai Analysts: Rodney Katz 148084 Ramon Miro U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the officiai position or policies of the National Institute of Justice. Permission to reproduce this copyrighted material has been granted by • • --E.ubli c Dorncun Library of Congress to the Nationai Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permission of the copyright owner. • SOLTERBIB: Federal Research Division, Library of Congress Alali, A. Odasuo and Kenoye Kelvin Eke (eds.). Media Coveraqe of • Terrorism: Methods of Diffusion. Newbury Park, CA: Sage, 1991. ~ [Call Number: PN 4784 .T4S M4 1991] , The contributors to the book examine how the portrayal of i terrorist incidents by the media affects terrorist groups, • I government policies on media reporting of terrorism, and the public. The editors believe that government policymakers influence the communications media by describing some acts of political violence as terrorism while other acts are legitimized for religious, ideological, or political reasons. The editors argue that the lack of agreement in defining terrorism presents a • problem for the media, which is an important institution in "characterizing or labeling" violent acts that have political implications. There is therefore a need to arrive at a consensual definition of terrorism that can be used by the media, which tremendously influences an audience's perception of those who engage in acts of political violence. Chapters in the volume deal • with the characterization of terrorist acts in three elite American newspapers, American news magazines' labeling of terrorists, the role of journalists in covering terrorist events, the controversy over the impact of news coverage in spreading terrorism, television coverage of the TWA hostage crisis, the British. approach to airing IRA spokesmen on the BBC, news • coverage of terrorist victims, and the impact of the literature on terrorism on media practitioners. The editors conclude that u.S. Government policymaker are in most cases responsive to media and public concerns about censoring reports on terrorism, and that American news agencies generally establish their own guidelines in cooperation with the u.S. Government so as to • inform the public about newsworthy terrorist incident without becoming pliant facilitators of the terrorists. Keyword(s): terrorism; media Alexander, Yonah (ed.). "Technology Against Terrorism: The • Federal Effort,." Terrorism, 14, April-June 1991, 111-33. [Call Number: HV 6431.T46] This report examines in some detail the federal research and development effort aimed at developing technical tools to combat terrorist attacks. It contains selected statements made on • February 26, 1991 before the US Senate Committee on Governmental AffQirs by u.S. Government and congressional officials as well as other experts on counterterrorism research and development (CT R&D). The various speakers voice general support for a systems appro • • ------------------------------------ SOLTERBIB: Federal Research Division, Library of Congress Alali, A. Odasuo and Kenoye Kelvin Eke (eds.). Media Coverage of Terrorism: Methods of Diffusion. Newbury Park, CA: Sage, 1991. [Call Number: PN 4784 .T45 M4 1991] The contributors to the book examine how the portrayal of terrorist incidents by the media affects terrorist groups, government policies on media reporting of terrorism, and the public. The editors believe that government policymakers influence the communications media by describing some acts of political violence as terrorism while other acts are legitimized for religious, ideological, or political reasons. The editors argue that the lack of agreement in defining terrorism presents a problem for the media, which is an important institution in "characterizing or labeling" violent acts that have political implications. There is therefore a need to arrive at a consensual definition of terrorism that can be used by the media, which tremendously influences an audience's perception of those who engage in acts of political violence. Chapters in the volume deal with the characterization of terrorist acts in three elite American newspapers, American news magazines' labeling of terrorists, the role of journalists in covering terrorist events, the controversy over the impact of news coverage in spreading terrorism, television coverage of the TWA hostage crisis, the British approach to airing IRA spokesmen on the BBC, news coverage of terrorist victims, and the impact of the literature on terrorism on media practitioners. The editors conclude that u.S. Government policymaker are in most cases responsive to media and public concerns about censoring reports on terrorism, and that American news agenciEls generally establish their own guidelines in cooperation with the u.S. Government so as to inform the public about newsworthy terrorist incident without becoming pliant facilitators of the terrorists. Keyword(s): t~rrorism; media Alexander, Yonah (ed.). "Technology Against Terrorism: The Federal Effort,." Terrorism, 14, April-June 1991, 111-33. [Call Number: HV 6431.T46] This report examines in some detail the federal research and development effort aimed at developing technical tools to combat terrorist attacks. It contains selected statements made on February 26, 1991 before the US Senate Committee on Governmental Affairs by u.S. Government and congressional officials as well as other experts on counterterrorism research and development (CT R&D). The various speakers voice general support for a systems approach to antiterrorism security that relies on multilayered security systems based on multiple technologies and human - 1 - ----- --~--------------------- j SOLTERBIB: Federal Research Division, Library of Congress expertise. The presenters also generally agree that there is no • "silver bullet" that can secure people and facilities against terrorists, but urge that CT R&D funding be increased to allow researchers to "stay ahead of the curve" in developing countermeasures. Topics discussed include interagency CT R&D, Federal Aviation Administration research and development of airport explosives detection devices, training of bomb detection • specialists by the Federal Bureau of Investigation, general assessments of counterterrorism technology, and possible terrorist use of biological weapons and potential countermeasures. Keyword(s): counterterrorism; u.s. Government policy; technology; • research and development; future trends Alexander, Yonah and Abraham H. Foxman (eds.). The 1988-1989 Annual on Terrorism. Boston: Martinus Nijhoff, 1990. [Call Number: HV 6431.A56 1988/89] • This volume contains a regional and global overview of international terrorism and an analysis of terrorism in the united states in the relevant period, as well as articles on terrorism, written in 1988 and 1989. They cover a variety of sUbjects: the invasion of the Maldives and its links with • international terrorism; the platform of the Islamic Resistance Movement (Hamas); the threat of "chemoterrorismi" the interface between energy and terrorism; the u.s. antiterrorism experience as seen from a French perspective; u.s. policy options; and terrorism and media values. Keyword(s): terrorism; united states; Islamic groups; chemical • weapons; u.s. Government policy; media Alexander, Yonah, and Dennis A. Pluchinsky. Europe's Red Terrorists: The Fighting Communist organizations. Portland, OR: Frank Cass, 1992. [Call Number: HV 6433 .E85E87 1992] • Keyword(s): terrorism; Europe; state sponsorship Alexander, Yonah, and Richard Latter. Terrorism & the Media: Dilemmas for Government, Journalists & the Public. Washington: Brassey's, 1990. [Call Number: P 96 .T47 1990] • Keyword(s): terrorism; media; u.s. Government policy Alexander, Yonah, and Robert G. Picard (eds.). In the Camera's Eye: News Coverage of Terrorist Events. Washington: Brassey's, 1991. [Call Number: PN 4784 .T45 I5 1990] • - 2 - • ____________________________________ ~ ___________ J • SOLTERBIB: Federal Research Division, Library of congress • The volume examines the communicative nature of terrorist acts and the role of the media during such violence. The authors analyze the impact of media-portrayed terrorist violence; the differences in meaning attached to the same events of individuals and nations with adversarial relations; the psychological rewards provided by media coverage to terrorist actors and how these • rewards shape their identities; the ways in which victims of terrorism interact with the media; how journalists become targets of terrorism; how strict guidelines for terrorism coverage can conflict with democratic values; and pressures that are placed on broadcasters during their coverage of terrorism. • Keyword(s): terrorism; media Alexander, Yonah, Phil Baum, and Raphael Danziger (eds.). "Terrorism: Future
Recommended publications
  • “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-Terrorism Related Subjects by Joshua Sinai
    PERSPECTIVES ON TERRORISM Volume 8, Issue 1 IV. Book Reviews “Counterterrorism Bookshelf” – 23 Books on Terrorism & Counter-terrorism Related Subjects by Joshua Sinai "is column consists of two parts: capsule reviews of ten books recently published on terrorism and counterterrorism-related topics, and - continuing the series begun in the previous column of highlighting books by signi$cant publishers (listed in alphabetical order) - capsule reviews of 13 important books published by CRC Press. Note: Future columns will review books by publishers such as Hurst, Oxford University Press, Palgrave Macmillan, Polity, Routledge, Rowman & Little#eld, Springer, Stanford University Press, and the University of Chicago Press. General Reviews Gershon Baskin, with Ilene Prusher, !e Negotiator: Freeing Gilad Schalit From Hamas. New Milford, CT: "e Toby Press, 2013. 283 pages, US$24.95 [Hardcover], ISBN: 978-1592643493. "is is a $rst-hand account by an American-Israeli peace activist of his role in arranging for the release of Gilad Schalit, an Israeli soldier who was kidnapped by Hamas in 2006. Schalit was released in October 2011 as part of an exchange deal by the Israeli government and Hamas for 1,027 Palestinian and Israeli Arab prisoners with a nexus to terrorist activity. Acting in his non-governmental capacity, Jerusalem-based Dr. Baskin was extensively involved (with other players) in the secret back channel negotiations between Israel and Hamas, with these dealings and the wider context in which they were conducted revealed in the letters, e-mails, and other documents that were exchanged between the players over the $ve-year period, which are contained in the book, thus making it a valuable primary source for those analyzing Israeli-Hamas relations.
    [Show full text]
  • 0714685003.Pdf
    CONTENTS Foreword xi Acknowledgements xiv Acronyms xviii Introduction 1 1 A terrorist attack in Italy 3 2 A scandal shocks Western Europe 15 3 The silence of NATO, CIA and MI6 25 4 The secret war in Great Britain 38 5 The secret war in the United States 51 6 The secret war in Italy 63 7 The secret war in France 84 8 The secret war in Spain 103 9 The secret war in Portugal 114 10 The secret war in Belgium 125 11 The secret war in the Netherlands 148 12 The secret war in Luxemburg 165 ix 13 The secret war in Denmark 168 14 The secret war in Norway 176 15 The secret war in Germany 189 16 The secret war in Greece 212 17 The secret war in Turkey 224 Conclusion 245 Chronology 250 Notes 259 Select bibliography 301 Index 303 x FOREWORD At the height of the Cold War there was effectively a front line in Europe. Winston Churchill once called it the Iron Curtain and said it ran from Szczecin on the Baltic Sea to Trieste on the Adriatic Sea. Both sides deployed military power along this line in the expectation of a major combat. The Western European powers created the North Atlantic Treaty Organization (NATO) precisely to fight that expected war but the strength they could marshal remained limited. The Soviet Union, and after the mid-1950s the Soviet Bloc, consistently had greater numbers of troops, tanks, planes, guns, and other equipment. This is not the place to pull apart analyses of the military balance, to dissect issues of quantitative versus qualitative, or rigid versus flexible tactics.
    [Show full text]
  • Terrorist Tactics and Strategies Compiled and Selected by Judith Tinnes
    PERSPECTIVES ON TERRORISM Volume 12, Issue 5 Bibliography: Terrorist Tactics and Strategies Compiled and selected by Judith Tinnes [Bibliographic Series of Perspectives on Terrorism - BSPT-JT-2018-6] Abstract This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliographies and other resources on terrorist tactics and strategies (such as the planning of attacks, targeting, decision making, and successful or failed plots). Though focusing on recent literature, the bibliography is not restricted to a particular time period and covers publications up to September 2018. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to broaden the search. Keywords: bibliography; resources; literature; terrorism; tactics, strategies, planning, plots, attacks, targeting, decision making NB: All websites were last visited on 16.09.2018. - See also Note for the Reader at the end of this literature list. Bibliographies and other Resources Al-Khalidi, Ashraf; Renahan, Thomas (Eds.) (2015, May-): Daesh Daily: An Update On ISIS Activities. URL: http://www.daeshdaily.com Atkins, Stephen E. (2011): Annotated Bibliography. In: Stephen E. Atkins (Ed.): The 9/11 Encyclopedia. (Vol. 1). (2nd ed.). Santa Barbara: ABC-CLIO, 481-508. Bergen, Peter et al. (2016-): Terrorism in America after 9/11. (New America In-Depth Report). URL: https:// www.newamerica.org/in-depth/terrorism-in-america Bowie, Neil G. (2017, August): Terrorism Events Data: An Inventory of Databases and Data Sets, 1968-2017. Perspectives on Terrorism, 11(4), 50-72. URL: https://www.universiteitleiden.nl/binaries/content/assets/ customsites/perspectives-on-terrorism/2017/issue-4/0620174-terrorism-events-data-an-inventory-of- databases-and-data-sets-1968-2017-by-neil-g.-bowie.pdf Bowie, Neil G.; Schmid, Alex P.
    [Show full text]
  • HLS 225 Legal and Ethical Issues in Homeland Security
    Christopher Wren Association Week 2 Terrorism, Cybersecurity, Disaster Response What We’ll Learn in Week 2 The Homeland Security Enterprise takes a broad “All Hazards” approach to threats—preventing and responding to both man-made and natural threats Terrorism, Cyber, other Man-Made, and Natural Threats are reviewed in Week 2 U.S. interagency responses to these threats have improved since 9/11—but are far from totally ready Fundamental and Powerful Concept: DHS “All Hazards” Threat State (define): all natural and man-made hazards that can threaten the US homeland. Elaborate: includes natural hazards and threats, e.g., weather, geologic, disease, etc., and man-made hazards and threats to include both accidents and deliberate attempts to harm people, infrastructure, or resources. Exemplify: a hurricane is a natural hazard, a bridge or dam collapse is a man-made accident (hazard), a terrorist attack is a man-made hazard. An attack by a foreign military on U.S. territory is not an all hazards attack for DHS action—but is a national security issue to be handled by DOD. Illustrate: as doctors must diagnose and treat a person for all manner of different diseases and other afflictions, the Homeland Security Enterprise is responsible for preparing and responding to U.S. “all hazard” threats Defining the Virginia “All Hazards” Threat Terrorism-Related: WMD Weather-Related: Floods, (Nuclear/Radiological (Dirty Tornadoes, Hurricanes, Tropical Bombs), Chemical, Biological), Storms, Thunderstorms, Winter Explosive Devices (IED, etc.), Cyber
    [Show full text]
  • Terrorism and Responses Mr
    Terrorism and Responses Mr. Yisrael Neeman Course Number: 702.2199 Office Hours: TBA Semester: Spring 2019 Location: TBA Class Time: Thursday 15:15-17:45 Phone: 04-824-2065 Class Location: TBA E-Mail: [email protected] Course Description: This course will examine the issue of terrorism as a growing form of political violence into the 21st Century. The last three decades of the 20th Century witnessed a phenomenal growth in terrorist activity around the world. Some groups rose and fell quite rapidly, but others have managed sustained campaigns and have achieved spectacular tactical success, among them the attacks on the United States on September 11, 2001. We will investigate the causes, methods and responses involved in the ongoing conflict between terrorist organizations and their adversaries. Topics covered will include: What is terrorism, as distinct from other forms of violence? What are the objectives of terrorists? What are the strategy and tactics of terrorists? Is suicide terrorism a distinct form of terrorism or another tactic among many? Why do terrorists use the tactics of terrorism? Is the use of terrorist tactics ever justified? What is the history of terrorism and terrorist organizations? What are some of the major terrorist groups active today? How do religious beliefs and ideological dogma aid terrorists? Does terrorism work? Does it achieve strategic goals? How do terrorist organizations transform? Can terrorism be deterred, defeated or prevented? Is there a military solution? Is the use of torture ever justified for extracting information from terrorists? Targeted assassination? Requirements, grades, and so on 1 This course has just a few simple requirements: read the assignments, attend class, participate in discussions, write the papers, and pass the tests.
    [Show full text]
  • Milan and the Memory of Piazza Fontana Elena Caoduro Terrorism
    Performing Reconciliation: Milan and the Memory of Piazza Fontana Elena Caoduro Terrorism was arguably the greatest challenge faced by Western Europe in the 1970s with the whole continent shaken by old resentments which turned into violent revolt: Corsican separatists in France, German speaking minorities in Italy’s South Tyrol, and Flemish nationalists in Belgium. Throughout that decade more problematic situations escalated in the Basque Provinces and Northern Ireland, where ETA and the Provisional IRA, as well as the Loyalist paramilitary groups (such as the UVF, and UDA) participated in long armed campaigns. According to Tony Judt, two countries in particular, West Germany and Italy, witnessed a different violent wave, as the radical ideas of 1968 did not harmlessly dissipate, but turned into a ‘psychosis of self- justifying aggression’ (2007, p. 469). In Italy, the period between 1969 and 1983, where political terrorism reached its most violent peak, is often defined as anni di piombo, ‘the years of lead’. This idiomatic expression derives from the Italian title given to Margarethe Von Trotta’s Die bleierne Zeit (1981, W. Ger, 106 mins.), also known in the UK as The German Sisters and in the USA as Marianne and Juliane.1 Following the film’s Golden Lion award at the 1981 Venice Film Festival, the catchy phrase ‘years of lead’ entered common language, and is now accepted as a unifying term for the various terrorist phenomena occurred in the long 1970s, both in Italy and West Germany. By the mid 1980s, however, terrorism had begun to decline in Italy. Although isolated episodes of left-wing violence continued to occur – two governmental consultants were murdered in 1999 and in 2002 respectively – special laws and the reorganisation of anti-terrorist police forces enabled its eradication, as did the 1 collaboration of many former radical militants.
    [Show full text]
  • Perspectives on Terrorism, Volume 5, Issue
    Volume V, Issues 3-4 September 2011 PERSPECTIVES ON TERRORISM Volume 5, Issues 3-4 Special Double Issue on Terrorism and Political Violence in Africa Guest Editors: James J. F. Forest and Jennifer Giroux 2 September 2011 PERSPECTIVES ON TERRORISM Volume 5, Issues 3-4 Table of Contents: Articles Terrorism and Political Violence in Africa: Contemporary Trends in a Shifting Terrain ................................................................................................5 by James J.F. Forest and Jennifer Giroux Terrorism in Liberation Struggles: Interrogating the Engagement Tactics of the Movement for the Emancipation of the Niger Delta ........................18 by Ibaba Samuel Ibaba ‘Forcing the Horse to Drink or Making it Realise its Thirst’? Understanding the Enactment of Anti-Terrorism Legislation (ATL) in Nigeria .............................................................................................................33 by Isaac Terwase Sampson and Freedom C. Onuoha Opportunity Costs or Costly Opportunities? The Arab Spring, Osama Bin Laden, and Al-Qaeda's African Affiliates .............................................50 by Alex S. Wilner Al-Qaeda's Influence in Sub-Saharan Africa: Myths, Realities and Possibilities .....................................................................................................63 by James J.F. Forest From Theory to Practice: Exploring the Organised Crime-Terror Nexus in Sub-Saharan Africa ...................................................................................81 by Annette
    [Show full text]
  • Italy and Its Traumatic Past
    How to Transform a ‘Place of Violence’ into a ‘Space of Collective Remembering’: Italy and its Traumatic Past Anna Lisa Tota* Abstract: This paper seeks to analyse cultural trauma theories and their consequences as well as their potential applicability to cases of collective trauma where access to the legal arena in the rehabilitation process is not possible. When ‘state terror’ occurs, such as in Latin America, or, more arguably Italy, access to the legal arena is systematically denied through a variety of criminal strategies. In these cases, the cultural working through of trauma takes place on the aesthetic level. What are the consequences of this process both for the inscription of the crucial event in public discourse and for its relationship with justice? Moreover, how do aesthetic codes affect the public definition of justice and a collective understanding of what happened? Introduction1 A new wave of international terrorism has emerged in the wake of the attacks of September 11, March 11 and July 7 affecting our common perceptions of risk, justice and everyday life. These attacks challenged existing ideas about the state, war, torture, prison, human rights and presented a host of new questions for intellectuals, social scientists, artists, politicians and common citizens to consider. The question of how to locate terror in the public space is a complex question but it can be analysed by considering the nature itself of the aesthetic codes used to transform a place of violence into a space of collective remembering. This process of transforming place is shaped by the performative nature of the narratives used in the different national contexts.
    [Show full text]
  • Public Opinion Survey Data to Measure Sympathy and Support for Islamist Terrorism: a Look at Muslim Opinions on Al Qaeda and IS
    Public Opinion Survey Data to Measure Sympathy and Support for Islamist Terrorism: A Look at Muslim Opinions on Al Qaeda and IS This Research Paper seeks to explore what ‘sympathy’ and ‘support’ ICCT Research Paper actually mean when it comes to terrorism. The text addresses some of February 2017 the problems of public opinion surveys, includes a conceptual discussion and then continues with the presentation of data from Author: public opinion surveys. It notes that opinion polls can be helpful in Alex P. Schmid gauging (verbal) support for terrorism but also finds that the questions asked in opinion polls are generally lacking precision while the answers are often influenced by political pressures. When translating (generally low) percentages of sympathy and support for al Qaeda and so-called Islamic State in various countries into actual population figures, it emerges that there is a sizeable radical milieu in both Muslim-majority countries and in Western Muslim diasporas, held together by the world wide web of the internet. While large majorities of Muslims in most countries have no love for jihadist extremists, there are more than enough breeding grounds for terrorism. The Research Paper concludes that better instruments for measuring sympathy and support for jihadist terrorism are needed to inform counter-terrorist strategies. DOI: 10.19165/2017.1.02 ISSN: 2468-0656 About the Author Alex P. Schmid Dr. Alex P. Schmid is a Research Fellow at the International Centre for Counter- Terrorism – The Hague (ICCT) and Associate Professor at the Institute of Security and Global Affairs (ISGA) at The Hague Campus of Leiden University.
    [Show full text]
  • 1 Creating an "Arc of Crisis": the Destabilization of The
    “MUNDO ÁRABE CONJUNTURA ATUAL E ANÁLISE DE CENÁRIOS”- 2011 Creating an "Arc of Crisis": The Destabilization of the Middle East and Central Asia The Mumbai Attacks and the “Strategy of Tension” By Andrew Gavin Marshall Global Research , December 7, 2008 Introduction The recent attacks in Mumbai, while largely blamed on Pakistan’s state-sponsored militant groups, represent the latest phase in a far more complex and long-term “strategy of tension” in the region; being employed by the Anglo- American-Israeli Axis to ultimately divide and conquer the Middle East and Central Asia. The aim is destabilization of the region, subversion and acquiescence of the region’s countries, and control of its economies, all in the name of preserving the West’s hegemony over the “Arc of Crisis.” The attacks in India are not an isolated event, unrelated to growing tensions in the region. They are part of a processof unfolding chaos that threatens to engulf an entire region, stretching from the Horn of Africa to India: the “Arc of Crisis,” as it has been known in the past. The motives and modus operandi of the attackers must be examined and questioned, and before quickly asserting blame to Pakistan, it is necessary to step back and review: Who benefits? Who had the means? Who had to motive? In whose interest is it to destabilize the region? Ultimately, the roles of the United States, Israel and Great Britain must be submitted to closer scrutiny. The Mumbai Attacks: 11/26/08 On November 26, 2008, a number of coordinated terrorist attacks occurred across India’s main commercial city of Mumbai, which lasted until November 29.
    [Show full text]
  • The Development of the British Conspiracy Thriller 1980-1990
    The Development of the British Conspiracy Thriller 1980-1990 Paul S. Lynch This thesis is submitted to the University of Hertfordshire in partial fulfilment of the requirements of the degree of Doctor of Philosophy. January 2017 Abstract This thesis adopts a cross-disciplinary approach to explore the development of the conspiracy thriller genre in British cinema during the 1980s. There is considerable academic interest in the Hollywood conspiracy cycle that emerged in America during the 1970s. Films such as The Parallax View (Pakula, 1975) and All the President’s Men (Pakula, 1976) are indicative of the genre, and sought to reflect public anxieties about perceived government misdeeds and misconduct within the security services. In Europe during the same period, directors Costa-Gavras and Francesco Rosi were exploring similar themes of state corruption and conspiracy in films such as State of Siege (1972) and Illustrious Corpses (1976). This thesis provides a comprehensive account of how a similar conspiracy cycle emerged in Britain in the following decade. We will examine the ways in which British film-makers used the conspiracy form to reflect public concerns about issues of defence and national security, and questioned the measures adopted by the British government and the intelligence community to combat Soviet subversion during the last decade of the Cold War. Unlike other research exploring espionage in British film and television, this research is concerned exclusively with the development of the conspiracy thriller genre in mainstream cinema. This has been achieved using three case studies: Defence of the Realm (Drury, 1986), The Whistle Blower (Langton, 1987) and The Fourth Protocol (MacKenzie, 1987).
    [Show full text]
  • Casapound Italia - Analyse Des Parcours D’Un Groupe De L’Ultra-Droite
    CasaPound Italia - Analyse des parcours d’un groupe de l’ultra-droite Sébastien Parker Thèse soumise à la Faculté des études supérieures et postdoctorales dans le cadre des exigences du programme de Maîtrise ès arts en science politique École d’études politiques Faculté des sciences sociales Université d’Ottawa © Sébastien Parker, Ottawa, Canada, 2017 Remerciements J’aimerais d’abord remercier mon superviseur, Frédéric Vairel, pour nos nombreuses rencontres ainsi que pour ses commentaires et ses conseils. Nos parcours se sont croisés bien avant ce projet et cette thèse reflète à bien des égards l’ensemble de nos discussions pendant l’ensemble de mon cheminement académique. Frédéric m’a offert un soutien inconditionnel pendant tout ce processus; sans lui, cette thèse n’aurait jamais été ce qu’elle est. J’espère, malgré sa grande humilité, qu’il le reconnaît. Je souhaite par ailleurs remercier les professeurs Stéphane Vibert et Daniel Stockemer, qui tous deux m’ont permis de percevoir mon sujet de recherche avec un regard nouveau. Nos discussions se sont reflétées dans la rédaction de cette thèse et vont continuer à influencer les idées que je mobilise pendant mes études doctorales. J’aimerais aussi remercier ceux qui – bien au-delà de mes modestes réalisations académiques – ont rendu mon parcours possible et dont je ressens l’influence au quotidien. D’abord à mes parents, Manon et Danny : ces quelques lignes ne rendent pas justice à tout ce que vous faites pour moi. Vous m’avez tellement donné pendant toutes ces années et j’espère du plus profond de mon cœur être capable de vous le rendre un jour.
    [Show full text]