From Kamikaze to Jihadist: What Are Its Causes?
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
A Set of Japanese Word Cohorts Rated for Relative Familiarity
A SET OF JAPANESE WORD COHORTS RATED FOR RELATIVE FAMILIARITY Takashi Otake and Anne Cutler Dokkyo University and Max-Planck Institute for Psycholinguistics ABSTRACT are asked to guess about the identity of a speech signal which is in some way difficult to perceive; in gating the input is fragmentary, A database is presented of relative familiarity ratings for 24 sets of but other methods involve presentation of filtered or noise-masked Japanese words, each set comprising words overlapping in the or faint signals. In most such studies there is a strong familiarity initial portions. These ratings are useful for the generation of effect: listeners guess words which are familiar to them rather than material sets for research in the recognition of spoken words. words which are unfamiliar. The above list suggests that the same was true in this study. However, in order to establish that this was 1. INTRODUCTION so, it was necessary to compare the relative familiarity of the guessed words and the actually presented words. Unfortunately Spoken-language recognition proceeds in time - the beginnings of we found no existing database available for such a comparison. words arrive before the ends. Research on spoken-language recognition thus often makes use of words which begin similarly It was therefore necessary to collect familiarity ratings for the and diverge at a later point. For instance, Marslen-Wilson and words in question. Studies of subjective familiarity rating 1) 2) Zwitserlood and Zwitserlood examined the associates activated (Gernsbacher8), Kreuz9)) have shown very high inter-rater by the presentation of fragments which could be the beginning of reliability and a better correlation with experimental results in more than one word - in Zwitserlood's experiment, for example, language processing than is found for frequency counts based on the fragment kapit- which could begin the Dutch words kapitein written text. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
The Rape of Nanking: a Historical Analysis of the Aftershocks of Wartime Sexual Violence in International Relations
FACULTAD DE CIENCIAS HUMANAS Y SOCIALES The Rape of Nanking: a historical analysis of the aftershocks of wartime sexual violence in international relations. Autor: Ester Brito Ruiz Quinto Curso del Doble Grado de ADE y Relaciones Internacionales Director: Jose Manuel Saenz Rotko Madrid Junio 2018 Ester Brito Ruiz international relations. The Rape of Nanking: a historical analysis of the aftershocks of wartime sexual violence in in violence sexual wartime of aftershocks the of analysis historical a Nanking: of Rape The Index 1) Abstract & Key words. 2) Methodology & Research Design. 3) Introduction. 4) Historiography and debates on Nanking. 5) Historical analysis and drivers of the Second Sino-Japanese war and interbellum change in protocols against foreign combatants and civilians. a. Conditioning Japanese political factors. b. Economic drivers. c. The role of the international order. 6) The route to Nanking a. Introduction: planning and intent of Japanese imperial forces when entering Manchuria. b. Road to Nanking: the advance of the imperial army, Loot all, kill all, burn all imperative. c. The entry into the city and mass killings. d. Rape in Nanking and beyond the capital. e. Torture inflicted upon combatants and civilians. f. The weeks following the fall of Nanking. 7) Radicalization of the Japanese imperial army: understanding historical warfare practices and theories of violence. 8) Rape as a weapon of war. 9) Other war crimes and implications of Japanese Imperialism 10) Historical memory of Nanking a. Significance of diverging historical memory in politics b. China: the century of humiliation narrative c. Japan: the historical aggressor-victim dilemma 1 11) Historical impact of Nanking on current international relations. -
How Sophisticated Are Terrorist Attacks on Passenger Rail Transportation
How Sophisticated are Terrorist Attacks on Passenger Rail Project SP 0520 Transportation June 2020 Brian Michael Jenkins and Bruce R. Butterworth Executive Summary Summary of Key Findings Terrorist attacks on passenger rail transportation are statistically rare events in the developed world— only about seven attacks per year are carried out against all of the economically advanced countries combined. However, uncovered plots and attempts indicate continuing terrorist interest in attacking transportation targets. The vast majority of terrorist attacks on passenger rail transportation are aimed at disrupting travel or causing casualties. Most of the attacks (87%) and 100% of the casualties result from attacks on passengers aboard trains and in stations, i.e., where the people are. We have defined sophistication by identifying four criteria, of which at least one must be met: The attack must (1) involve the recruitment of inside assistance, the use of insider knowledge, or the acquisition of specialized skills through training; (2) require the penetration of manned or closely monitored security systems; (3) involve the use of sophisticated weapons, devices, or means (for an IED to be considered sophisticated, it must do more than simply explode—it must have a timing or remote detonating system that guarantees detonation at a remote time or in a specific location, or it must be miniaturized or disguised so as to evade detection); and (4) must be complex—it must involve multiple actors with individual roles or coordinated simultaneous or near-simultaneous attacks at different locations. Using those criteria, we find few of the terrorist attacks on public surface transport are sophisticated. -
Lessons from Colombia for Curtailing the Boko Haram Insurgency in Nigeria
Lessons From Colombia For Curtailing The Boko Haram Insurgency In Nigeria BY AFEIKHENA JEROME igeria is a highly complex and ethnically diverse country, with over 400 ethnic groups. This diversity is played out in the way the country is bifurcated along the lines of reli- Ngion, language, culture, ethnicity and regional identity. The population of about 178.5 million people in 2014 is made up of Christians and Muslims in equal measures of about 50 percent each, but including many who embrace traditional religions as well. The country has continued to experience serious and violent ethno-communal conflicts since independence in 1960, including the bloody and deadly thirty month fratricidal Civil War (also known as the Nigerian-Biafran war, 1967-70) when the eastern region of Biafra declared its seces- sion and which claimed more than one million lives. The most prominent of these conflicts recently pitch Muslims against Christians in a dangerous convergence of religion, ethnicity and politics. The first and most dramatic eruption in a series of recent religious disturbances was the Maitatsine uprising in Kano in December 1980, in which about 4,177 died. While the exact number of conflicts in Nigeria is unknown, because of a lack of reliable sta- tistical data, it is estimated that about 40 percent of all conflicts have taken place since the coun- try’s return to civilian rule in 1999.1 The increasing wave of violent conflicts across Nigeria under the current democratic regime is no doubt partly a direct consequence of the activities of ethno- communal groups seeking self-determination in their “homelands,” and of their surrogate ethnic militias that have assumed prominence since the last quarter of 2000. -
History of Suicide
History of suicide In general, the pagan world, both Roman and Greek, had a relaxed attitude towards the concept of suicide, a practice that was only outlawed with the advent of the Christians, who condemned it at the Council of Arles in 452 as the work of the Devil. In the Middle Ages, the Church had drawn-out discussions on the edge where the search for martyrdom was suicidal, as in the case of some of the martyrs of Córdoba. Despite these disputes and occasional official rulings, Catholic doctrine was not entirely settled on the subject of suicide until the later 17th century. There are some precursors of later Christian hostility in ancient Greek thinkers. Pythagoras, for example, was against the act, though more on mathematical than moral grounds, believing that there was only a finite number of souls for use in the world, and that the sudden and unexpected departure of one upset a delicate balance. Aristotle also condemned suicide, though for quite different, far more practical reasons, in that it robbed the community of the services of one of its members. A reading of Phaedo suggests that Plato was also against the practice, inasmuch as he allows Socrates to defend the teachings of the Orphics, who believed that the human body was the property of the gods, and thus self-harm was a direct offense against divine law. The death of Seneca (1684), painting by Luca Giordano, depicting the suicide of Seneca the Younger in Ancient Rome. In Rome, suicide was never a general offense in law, though the whole approach to the question was essentially pragmatic. -
Preventing Suicide: a Global Imperative
PreventingPreventing suicidesuicide A globalglobal imperativeimperative PreventingPreventing suicidesuicide A globalglobal imperativeimperative WHO Library Cataloguing-in-Publication Data Preventing suicide: a global imperative. 1.Suicide, Attempted. 2.Suicide - prevention and control. 3.Suicidal Ideation. 4.National Health Programs. I.World Health Organization. ISBN 978 92 4 156477 9 (NLM classification: HV 6545) © World Health Organization 2014 All rights reserved. Publications of the World Health Organization are The mention of specific companies or of certain manufacturers’ available on the WHO website (www.who.int) or can be purchased products does not imply that they are endorsed or recommended by from WHO Press, World Health Organization, 20 Avenue Appia, the World Health Organization in preference to others of a similar 1211 Geneva 27, Switzerland (tel.: +41 22 791 3264; fax: +41 22 791 nature that are not mentioned. Errors and omissions excepted, the 4857; e-mail: [email protected]). names of proprietary products are distinguished by initial capital letters. Requests for permission to reproduce or translate WHO publications –whether for sale or for non-commercial distribution– should be All reasonable precautions have been taken by the World Health addressed to WHO Press through the WHO website Organization to verify the information contained in this publication. (www.who.int/about/licensing/copyright_form/en/index.html). However, the published material is being distributed without warranty of any kind, either expressed or implied. The responsibility The designations employed and the presentation of the material in for the interpretation and use of the material lies with the reader. In this publication do not imply the expression of any opinion no event shall the World Health Organization be liable for damages whatsoever on the part of the World Health Organization concerning arising from its use. -
Are Judaism and Christianity As Violent As Islam? by Raymond Ibrahim Middle East Quarterly Summer 2009, Pp
Are Judaism and Christianity as Violent as Islam? by Raymond Ibrahim Middle East Quarterly Summer 2009, pp. 3-12 http://www.meforum.org/2159/are-judaism-and-christianity-as-violent-as-islam "There is far more violence in the Bible than in the Qur'an; the idea that Islam imposed itself by the sword is a Western fiction, fabricated during the time of the Crusades when, in fact, it was Western Christians who were fighting brutal holy wars against Islam."[1] So announces former nun and self-professed "freelance monotheist," Karen Armstrong. This quote sums up the single most influential argument currently serving to deflect the accusation that Islam is inherently violent and intolerant: All monotheistic religions, proponents of such an argument say, and not just Islam, have their fair share of violent and intolerant scriptures, as well as bloody histories. Thus, whenever Islam's sacred scriptures—the Qur'an first, followed by the reports on the words and deeds of Muhammad (the Hadith)—are highlighted as demonstrative of the religion's innate bellicosity, the immediate rejoinder is that other scriptures, specifically those of Judeo-Christianity, are as riddled with violent passages. More often than not, this argument puts an end to any discussion regarding whether violence and intolerance are unique to Islam. Instead, the default answer becomes that it is not Islam per se but rather Muslim grievance and frustration—ever exacerbated by economic, political, and social factors—that lead to violence. That this view comports perfectly with the secular West's "materialistic" epistemology makes it all the more unquestioned. -
Kamikazes! When Japanese Planes Attacked the U.S. Submarine Devilfish
KAMIKAZES! When Japanese Planes Attacked the U.S. Submarine Devilfish by NATHANIEL PATCH he image of desperate Japanese pilots purposely flying their Tplanes into American warships in the closing months of World War II figures prominently in American popular culture. When most people hear the term kamikaze, they think Fortunately, the Devilfish was close to the surface when of swarms of planes flying through a torrent of antiaircraft the explosion occurred, and the submarine took only mi fire and plowing into the decks of aircraft carriers, battle nor damage that the crew could control. ships, cruisers, and destroyers, taking the lives of sailors and The officers and crew in the control room took quick ac damaging or sinking the ships in this desperate act. tion to prevent the submarine from sinking and to mitigate Out of the hundreds of these attacks, one was quite un the damage done by the incoming saltwater. They leveled usual: the only kamikaze attack on an American subma off the submarine at 80 feet, and the drain pumps were rine, the USS Devilfish (SS 292). barely keeping up with the incoming water. The bilges of Why was this submarine attacked, and why was there the conning tower filled rapidly, and water began pouring only one attacker? The story of the attack on the Devilfish into the control room. A constant spray of saltwater from seems to be a fragment of a larger story, separated by time the conning tower splashed onto the electrical panels and and distance, occurring on March 20, 1945. If kamikazes consoles in the control room. -
The Right to Assisted Suicide and Euthanasia
THE RIGHT TO ASSISTED SUICIDE AND EUTHANASIA NEIL M. GORSUCH* I. INTRODUCTION ........................................................ 600 I. THE COURTS ............................................................. 606 A. The Washington Due Process Litigation............ 606 1. The Trial Court ...................... 606 2. The Ninth Circuit Panel Decision ............. 608 3. The En Banc Court ...................................... 609 B. The New York Equal ProtectionLitigation ........ 611 1. The Trial Court ........................................... 611 2. The Second Circuit ..................................... 612 C. The Supreme Court............................................. 613 1. The Majority Opinion ................................. 614 2. The Concurrences ....................................... 616 D. The Consequences ofGlucksberg and Quill .... 619 III. ARGUMENTS FROM HISTORY ................................... 620 A. Which History?................................................... 620 B. The Ancients ....................................................... 623 C. Early Christian Thinkers .................................... 627 D. English Common Law ......................................... 630 E. ColonialAmerican Experience........................... 631 F. The Modern Consensus: Suicide ........................ 633 G. The Modern Consensus: Assisting Suicide and Euthanasia.......................................................... 636 IV. ARGUMENTS FROM FAIRNESS .................................. 641 A . Causation........................................................... -
National Guidelines: Responding to Grief, Trauma, and Distress After a Suicide
Responding to Grief, Trauma, and Distress After a Suicide: U.S. National Guidelines Survivors of Suicide Loss Task Force April 2015 Blank page Responding to Grief, Trauma, and Distress After a Suicide: U.S. National Guidelines Table of Contents Front Matter Acknowledgements ...................................................................................................................................... i Task Force Co-Leads, Members .................................................................................................................. ii Reviewers .................................................................................................................................................... ii Preface ....................................................................................................................................................... iii National Guidelines Executive Summary ..................................................................................................................................... 1 Introduction ................................................................................................................................................ 4 Terminology: “Postvention” and “Loss Survivor” ....................................................................................... 4 Development and Purpose of the Guidelines ............................................................................................. 6 Audience of the Guidelines ........................................................................................................................