From Guns to Roses Explaining Rebel Use of Nonviolent Action Nora J

Total Page:16

File Type:pdf, Size:1020Kb

From Guns to Roses Explaining Rebel Use of Nonviolent Action Nora J From Guns to Roses Explaining Rebel Use of Nonviolent Action Nora J. Keller Submitted in partial fulllment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2017 © 2017 Nora J. Keller All rights reserved ABSTRACT From Guns to Roses Explaining Rebel Use of Nonviolent Action Nora J. Keller As rebel organizations are associated with violence and war, the term “rebel use of nonvio- lent action” seems paradoxical at rst glance. Yet, some rebel organizations — after pursu- ing their aims through militant means unsuccessfully — do start to use mass-based nonvi- olent action, mobilizing and organizing the population to participate in large-scale mass protests, demonstrations, or boycotts. Sometimes, as evidenced by the cases of Timor- Leste’s Maubere Council for National Resistance or the Nepalese Maoists, this strategic shift can bring them considerably closer to their ultimate goal. This study addresses the following question: Why do some rebel organizations strategically use nonviolent mass popular action in a civil war? The aims of this dissertation are two-fold: First, I explore, conceptualize and dene “rebel use of nonviolent action”. Second, I build a theory to explain to explain whether or not rebel groups will seize on an opportunity for using strategic nonviolent action that builds on the rebel group’s internal organizational processes. Precisely because mass- based nonviolent action is unexpected and very dicult to organize, there can be sig- nicant strategic benets for rebel organizations who successfully launch a nonviolent campaign. First, they demonstrate the breadth and depth of their popular support by mo- bilizing the people to actively and en masse put themselves at risk as protesters. Second, the use of nonviolent action displays a high degree of movement resilience and control, as nonviolent events that are most eective in urban areas must be coordinated with a rebel leadership likely located in the periphery. Third, the rebel group can signal norms adherence, as nonviolent action is generally associated with democratic values. Fourth, nonviolent action can garner signicant international attention, as masses of civilians peacefully protesting against a civil war backdrop create a powerful image. The proposed theoretical framework takes an organizational approach to understand- ing rebel group behavior, which accounts for the role of civilians as potential group actors. The appropriateness of this framework is established through an in-depth theory-building case study of Timor-Leste’s violent/nonviolent independence struggle. Based on insights gleaned from this case and a conceptual exploration of nonviolent action as a rebel strat- egy, my theory is anchored on the insight that a rebel operational shift towards the use of nonviolent action constitutes a particularly disruptive instance of strategic innovation. The theory unfolds in two parts: First, I argue that consolidated political authority in a rebel organization is necessary for disruptive innovation in the form of nonviolent action. Second, I explore the operational requirements for actually carrying out nonviolent ac- tion, and argue that embedded organizational structures linking rural rebel strongholds with urban popular centers are necessary to allow for both popular mobilization for non- violent action and control of individual events and the organization as a whole. The com- mon organizational “theme” uniting these two complex features is an operational focus on functional task dierentiation. The Timorese theory-building case study analyzes ndings from in-person interviews, rst-person accounts and historiography of the conict to trace and explore the relevant mechanisms leading from a violent (guerrilla) to a largely nonviolent conict strategy. This case study also establishes that the decision to adopt nonviolent action as a strategy and the actual planning of nonviolent events can be directly linked to a rebel organiza- tion’s leadership. To test the plausibility of the theory and explore the scope, I present two additional medium-length case studies of the Nepali Maoists and the Salvadoran Frente Farabundo Martí para la Liberación Nacional. In addition to providing the rst comprehensive conceptualization of nonviolent ac- tion as a rebel strategy, this dissertation makes two key analytical and conceptual con- tributions: First, I provide a framework for studying rebel groups as organizations with internal frameworks and processes that come together in a dominant structure that can explain operational and strategic choices, options, and trajectories. A comprehensive un- derstanding of a rebel group’s dominant structure requires careful over-time analysis. Second, the example of nonviolent action as a conict strategy shows the necessity of studying the population — and its ties to the rebel organizations — as active resistance participants that must be included in a comprehensive organizational analysis of a rebel group. Contents List of Tables iii List of Figures iv 1 Framing the Issue 1 1.1 The puzzle . 1 1.2 The eects of nonviolent action in a civil war . 7 1.3 Rebel use of nonviolent action and the study of conict . 11 1.4 Analytical approach, argument and contribution . 19 1.5 Dissertation roadmap . 21 2 Denition, Operationalization and Research Design 23 2.1 Denitions and operationalization . 23 2.2 The universe of cases . 36 2.3 Research design . 39 3 Rebel Use of Nonviolent Action: A Strategy 53 3.1 The strategic nature of nonviolent action . 53 3.2 Nonviolent action in civil wars . 60 3.3 What can rebels gain from using nonviolent action? . 63 3.4 Rebel risks of using nonviolent action . 75 4 Louder than Bombs: Timor-Leste’s Violent Nonviolent Independence 80 4.1 Timor-Leste’s colonial and pre-colonial socio-political roots . 83 4.2 Fretilin’s prewar rural-urban political network . 96 4.3 Fretilin’s civil war . 125 i 4.4 The Clandestine Front and nonviolent action . 145 5 Rebel Use of Nonviolent Action: An Organizational Process Theory 175 5.1 The necessity of centralized political authority in rebel organizations . 182 5.2 Nonviolent action, mobilization and control . 200 5.3 Complex rebel organizations and functional dierentiation . 212 5.4 Alternative explanations . 219 6 Probing Plausibility: Nepal’s Capable Maoists Turn Nonviolent 224 6.1 The Maoist insurgency and its nonviolent nale . 228 6.2 Political authority and decision-making in CPN-M . 236 6.3 Maoist communication, mobilization and control . 249 7 Increasing Condence: A Negative case and Refuting Alternative Hy- potheses 261 7.1 The Salvadoran FMLN: A failed attempt at urban popular mobilization . 262 7.2 The Free Aceh Movement and the insuciency of opportunity . 280 7.3 The limited role of ideology: the Jammu Kashmir Liberation Front . 283 8 Conclusion and Outlook 287 Bibliography 295 ii List of Tables 2.1 Operationalizing nonviolent action . 33 2.2 Operationalizing rebel use of nonviolent action . 37 2.3 The universe of cases . 39 2.4 Case selection overview . 52 3.1 Rebel benets of nonviolent action . 65 3.2 Rebel risks and drawbacks of nonviolent action . 76 5.1 Summary of hypotheses . 223 iii List of Figures 4.1 Timor-Leste’s precolonial social structure . 84 4.2 Fretilin’s prewar structure . 113 4.3 CNRM’s Structure in 1990 . 166 5.1 Summary of the organizational process theory . 179 5.2 Rebel nonviolent action as an instance of military innovation . 187 5.3 Conict actors and their relationships . 209 iv Acknowledgments In writing my dissertation about how complex organizations often rely on social networks to function and evolve, I was lucky enough to rely on my own social networks in writing this dissertation. At the Columbia University Political Science Department, I received un- wavering support and feedback from my advisors, Jack Snyder and Page Fortna. Tanisha Fazal, even from a distance, was always willing to lend an open ear to my questions and was an invaluable source of advice. Apart from my Columbia advisors, I want to say a special thank you to Stacy Goddard, my advisor at Wellesley College, who encouraged me to follow my intellectual curiosity to New York. At Columbia, I found a supportive and enriching community of peers and some of the best friends I have ever had. I could not have written this dissertation without Hadas Aron, Ali Cirone, Andy Guess, Emily Holland, Sarah Khan, Summer Lindsey, Nick Lotito, Mike Rubin, Stephanie Schwartz, and Camille Strauss-Kahn, with apologies to anyone I left out inadvertently. When a family emergency took me back to Zurich, Lars-Erik Cederman and his International Conict Research Group welcomed me with open arms. I want to thank him for his hospitality and advice. I also want to thank Nils-Christian Bormann, Micha Germann, Mirjam Hirzel, Philip Hunziker, Theresa Leimpeck, Carl Müller-Crepon, Yannick Pengl, Seraina Rüegger, Andi Schädel, Sebastian Schutte, Guy Schvitz, Fran Vil- lamil and Manuel Vogt for accepting me as one of their own and sharing many a lunchtime political debate. Many people volunteered their time, work, and data for my project. I want to thank my Timorese interview partners, in particular Mário Carrascalão, José Ramos-Horta, and Badi Mohammed Slama, who submitted to hours upon hours of interviewing on a painful subject. I also want to thank Dr. Octavianus Mote for sharing his considerable experience v with the West Papuan independence movement. I am particularly grateful to Dr. Helen Hill, Dr. Nuño Rodrigues Tchailoro, and Edith Bowles for sharing unpublished research on Timor-Leste. My research and eld work was generously supported by several insti- tutions and grants. I am indebted to the AC4 fellowship from the Earth Institute and the Weatherhead Institute of East Asian Studies at Columbia for their nancial support. Finally, I owe a big debt of gratitude to my family, both blood related and otherwise: My father, my stepmother, my host mother and host father, my sister and my stepfather, and my friends (you know who you are).
Recommended publications
  • National Strategy for Homeland Security 2007
    national strategy for HOMELAND SECURITY H OMELAND SECURITY COUNCIL OCTOBER 2 0 0 7 national strategy for HOMELAND SECURITY H OMELAND SECURITY COUNCIL OCTOBER 2 0 0 7 My fellow Americans, More than 6 years after the attacks of September 11, 2001, we remain at war with adversar- ies who are committed to destroying our people, our freedom, and our way of life. In the midst of this conflict, our Nation also has endured one of the worst natural disasters in our history, Hurricane Katrina. As we face the dual challenges of preventing terrorist attacks in the Homeland and strengthening our Nation’s preparedness for both natural and man-made disasters, our most solemn duty is to protect the American people. The National Strategy for Homeland Security serves as our guide to leverage America’s talents and resources to meet this obligation. Despite grave challenges, we also have seen great accomplishments. Working with our part- ners and allies, we have broken up terrorist cells, disrupted attacks, and saved American lives. Although our enemies have not been idle, they have not succeeded in launching another attack on our soil in over 6 years due to the bravery and diligence of many. Just as our vision of homeland security has evolved as we have made progress in the War on Terror, we also have learned from the tragedy of Hurricane Katrina. We witnessed countless acts of courage and kindness in the aftermath of that storm, but I, like most Americans, was not satisfied with the Federal response. We have applied the lessons of Katrina to thisStrategy to make sure that America is safer, stronger, and better prepared.
    [Show full text]
  • 9110-9P Department of Homeland Security
    This document is scheduled to be published in the Federal Register on 06/23/2021 and available online at federalregister.gov/d/2021-13109, and on govinfo.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY [Docket No. CISA-2020-0018] Agency Information Collection Activities: Proposed Collection; Comment Request; Cybersecurity and Infrastructure Security Agency (CISA) Visitor Request Form AGENCY: Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS). ACTION: 30-day notice and request for comments; reinstatement without change of information collection request: 1670-0036. SUMMARY: The Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Office of Compliance and Security (OCS), as part of its continuing effort to reduce paperwork and respondent burden, invites the general public to take this opportunity to comment on a reinstatement, without change, of a previously approved information collection for which approval has expired. CISA will submit the following Information Collection Request to the Office of Management and Budget (OMB) for review and clearance in accordance with the Paperwork Reduction Act of 1995. CISA previously published a notice about this ICR, in the Federal Register on February 17, 2021, for a 60-day public comment period. There were no comments received. The purpose of this notice is to allow additional 30-days for public comments. DATES: The comment period for the information collection request published on February 17, 2021 at 86 FR 9949. Comments must be submitted on or before [INSERT DATE 30 DAYS AFTER DATE OF PUBLICATION IN THE FEDERAL REGISTER]. ADDRESSES: Written comments and recommendations for the proposed information collection should be sent within 30 days of publication of this notice to www.reginfo.gov/public/do/PRAMain .
    [Show full text]
  • Pointing Towards Clarity Or Missing the Point? a Critique of the Proposed "Social Group" Rule and Its Impact on Gender-Based Political Asylum
    POINTING TOWARDS CLARITY OR MISSING THE POINT? A CRITIQUE OF THE PROPOSED "SOCIAL GROUP" RULE AND ITS IMPACT ON GENDER-BASED POLITICAL ASYLUM LOREN G. STEWART* From the beginning of the marriage, her husband abused her. He raped her almost daily, beating her before and during each rape. He once dislocated her jawbone because her menstrual period was fifteen days late. When she refused to abort a pregnancy, he kicked her violently in her spine. Once, he kicked her in her genitalia, causing her severe pain and eight days of bleeding. She fled the city with their children, but he tracked them down and beat her unconscious. He broke windows and mirrors with her head. He told her that if she left him, he would find her, cut off her arms and legs with a machete and leave her in a wheelchair. She attempted suicide, but was unsuccessful. She contacted the police three times, but they did not respond. A judge denied her protection, saying that the court "would not interfere in domestic disputes."' She finally left him, fled to the United States, and applied for political asylum. Should women like Rodi Alvarado Pefia, described above, be eligible to receive political asylum in the United States?2 To be J.D. Candidate 2005, University of Pennsylvania Law School. B.A. History, cum laude, Yale University 1999. The author wishes to express his gratitude to Professors Fernando Chang-Muy, Louis S. Rulli and Catherine Struve for their guidance, enthusiasm, and inspiration. ratience,In re R-A-, 22 I. & N. Dec. 906, 908-10 (BIA 1999, Att'y Gen.
    [Show full text]
  • A Governor's Guide to Homeland Security
    A GOVERNOR’S GUIDE TO HOMELAND SECURITY THE NATIONAL GOVERNORS ASSOCIATION (NGA), founded in 1908, is the instrument through which the nation’s governors collectively influence the development and implementation of national policy and apply creative leadership to state issues. Its members are the governors of the 50 states, three territories and two commonwealths. The NGA Center for Best Practices is the nation’s only dedicated consulting firm for governors and their key policy staff. The NGA Center’s mission is to develop and implement innovative solutions to public policy challenges. Through the staff of the NGA Center, governors and their policy advisors can: • Quickly learn about what works, what doesn’t and what lessons can be learned from other governors grappling with the same problems; • Obtain specialized assistance in designing and implementing new programs or improving the effectiveness of current programs; • Receive up-to-date, comprehensive information about what is happening in other state capitals and in Washington, D.C., so governors are aware of cutting-edge policies; and • Learn about emerging national trends and their implications for states, so governors can prepare to meet future demands. For more information about NGA and the Center for Best Practices, please visit www.nga.org. A GOVERNOR’S GUIDE TO HOMELAND SECURITY NGA Center for Best Practices Homeland Security & Public Safety Division FEBRUARY 2019 Acknowledgements A Governor’s Guide to Homeland Security was produced by the Homeland Security & Public Safety Division of the National Governors Association Center for Best Practices (NGA Center) including Maggie Brunner, Reza Zomorrodian, David Forscey, Michael Garcia, Mary Catherine Ott, and Jeff McLeod.
    [Show full text]
  • Transnational Ethnic Communities and Rebel Groups' Strategies in a Civil Conflict
    Transnational Ethnic Communities and Rebel Groups’ Strategies in a Civil Conflict The case of the Karen National Union rebellion in Myanmar Bethsabée Souris University College London (UCL) 2020 A thesis submitted for the degree of Doctor of Philosophy in Political Science I, Bethsabée Souris, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis 1 2 Abstract Few studies have systematically analysed how transnational ethnic kin groups affect the behaviour of domestic ethnic groups in an insurgency, in particular how they have an effect on the types of activities they conduct and their targets. The research question of this study is: What are the mechanisms through which transnational ethnic kin groups influence the domestic rebel ethnic group’s strategies? This thesis analyses the influence of transnational communities on domestic challengers to the state as a two-step process. First, it investigates under which conditions transnational ethnic kin groups provide political and economic support to the rebel ethnic group. It shows that networks between rebel groups and transnational communities, which can enable the diffusion of the rebel group’s conflict frames, are key to ensure transnational support. Second, it examines how such transnational support can influence rebel groups’ strategies. It shows that central to our understanding of rebel groups’ strategies is the cohesion (or lack thereof) of the rebel group. Furthermore, it identifies two sources of rebel group’s fragmentation: the state counter-insurgency strategies, and transnational support. The interaction of these two factors can contribute to the fragmentation of the group and in turn to a shift in the strategies it conducts.
    [Show full text]
  • Billing Code 9111-28-P Department of Homeland
    This document is scheduled to be published in the Federal Register on 04/21/2021 and available online at federalregister.gov/d/2021-08123,BILLING and on govinfo.gov CODE 9111-28-P DEPARTMENT OF HOMELAND SECURITY U.S. Immigration and Customs Enforcement [OMB Control Number 1653-0038] Agency Information Collection Activities: Student and Exchange Visitor Information System (SEVIS); Extension, With Change, of a Currently Approved Collection AGENCY: U.S. Immigration and Customs Enforcement, Department of Homeland Security. ACTION: 30-Day notice. SUMMARY: In accordance with the Paperwork Reductions Act (PRA) of 1995 the Department of Homeland Security (DHS), U.S. Immigration and Customs Enforcement (ICE) will submit the following Information Collection Request (ICR) to the Office of Management and Budget (OMB) for review and clearance. This information collection was previously published in the Federal Register on February 9, 2021, allowing for a 60-day comment period. ICE received one non-substantive comment. The purpose of this notice is to allow an additional 30 days for public comments. DATES: Comments are encouraged and will be accepted until [INSERT DATE 30 DAYS FROM AFTER DATE OF THE PUBLICATION IN THE FEDERAL RESIGTER]. ADDRESSES: Written comments and recommendations for the proposed information collection should be sent within 30 days of the publication of this notice to www.reginfo.gov/public/do/PRAMain. Find this particular information collection by selecting “Currently under 30-day Review – Open for Public Comments” or by using
    [Show full text]
  • National Incident Management System (NIMS)
    December 18, 2008 Dear NIMS Stakeholders: Homeland Security Presidential Directive (HSPD)-5, Management of Domestic Incidents, directed the development and administration of the National Incident Management System (NIMS). Originally issued on March 1, 2004, by the Department of Homeland Security (DHS), NIMS provides a consistent nationwide template to enable Federal, State, 1 tribal, and local2 governments, nongovernmental organizations (NGOs), and the private sector to work together to prevent, protect against, respond to, recover from, and mitigate the effects of incidents, regardless of cause, size, location, or complexity. HSPD-5 also required DHS to establish a mechanism for ongoing coordination to provide strategic direction for, and oversight of, NIMS. The National Integration Center (NIC)’s Incident Management Systems Integration Division (IMSI)—formerly the NIMS Integration Center—was established to support both routine maintenance and the continuous refinement of NIMS. Since 2006, the NIMS document has been revised to incorporate best practices and lessons learned from recent incidents. The NIMS revision also clarifies concepts and principles, and refines processes and terminology throughout the document. A wide range of feedback was incorporated while maintaining the core concepts of NIMS and no major policy changes were made to the document during the revision. Below is a summary of changes to the NIMS document: . Eliminated redundancy; . Reorganized document to emphasize that NIMS is more than the Incident Command System (ICS); . Clarified ICS concepts; . Increased emphasis on planning and added guidance on mutual aid; . Clarified roles of private sector, NGOs, and chief elected and appointed officials; 1 As defined in the Homeland Security Act of 2002, P.L.
    [Show full text]
  • Countering Russian Social Media Influence
    Countering Russian Social Media Influence Elizabeth Bodine-Baron, Todd C. Helmus, Andrew Radin, Elina Treyger C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/RR2740 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0182-3 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2018 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report documents research and analysis conducted as part of a project entitled Combatting Russian Social Media Information Opera- tions in the United States. The purpose of this project was to formulate specific and actionable approaches and policies for countering Russian disinformation on social media inside the United States.
    [Show full text]
  • July 22, 2020 the Honorable Chad Wolf U.S. Department of Homeland Security Office of the Secretary Washington, D.C. 20528 Dear
    July 22, 2020 The Honorable Chad Wolf U.S. Department of Homeland Security Office of the Secretary Washington, D.C. 20528 Dear Acting Secretary Wolf, On behalf of the undersigned higher education associations, we write to follow up on the now withdrawn July 6 Immigration and Customs Enforcement (ICE) directive1, seeking clarity regarding the status of incoming international students. Given the quickly approaching start of the fall semester, and the need for flexibility for international students and institutions during the global pandemic, further clarification is required, particularly regarding new or initial international students at our institutions. We estimate that over 250,000 international students are planning to enter the United States for the coming academic year, either as new or returning students. In addition, there are several thousand international students awaiting admission decisions. We seek assurances that all students with a valid visa will be able to enter the U.S. during this uncertain time. We are especially concerned that the July 15 FAQ issued by ICE states that initial students who have not yet arrived in the U.S. should remain in their home country.2 As you know, given the diversity of our institutions, as well as the various state and local public health responses to COVID-19, colleges and universities are planning multi-faceted, nuanced models for reopening campuses this fall. Some are proceeding with online learning only, others intend to be primarily in-person, and many others have a range of plans for hybrid models. Even most of the institutions pursuing an online-only strategy already provide housing and support for international students, and will continue to do so for new students upon arrival.
    [Show full text]
  • Terrorism Ideology and Perceptions of Homeland Security in Tennessee Law Enforcement
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by UTC Scholar TERRORISM IDEOLOGY AND PERCEPTIONS OF HOMELAND SECURITY IN TENNESSEE LAW ENFORCEMENT A Thesis Presented for The Master of Science Degree The University of Tennessee at Chattanooga Adam Baldwin May 2010 Copyright © 2010 by Adam Baldwin All rights reserved. ii To the Graduate Council: I am submitting herewith a thesis written by Adam Baldwin entitled “Terrorism Ideology and Perceptions of Homeland Security in Tennessee Law Enforcement.” I have examined the final electronic copy of this thesis for form and content and recommend that it be accepted in partial fulfillment of the requirements for the degree of Master of Science, with a major in Criminal Justice. Dr. Vic Bumphus We have read this thesis and recommend its acceptance: Dr. Gale Iles Dr. Roger Thompson Accepted for the Council: Stephanie Bellar Interim Dean of the Graduate School (Original Signatures are on file with official student records.) iii Dedication This thesis is dedicated to my family. To my parents Ralph and Lucinda, thank you for always supporting me and encouraging me to challenge myself. To my brother Neal, thank you for being not only a wonderful brother, but a great friend. Finally, to my fiancé Rachel, you are truly an inspiration and my best friend. You have inspired me never to settle and always strive to reach my full potential. Thank you for all your love, support, and understanding. iv Acknowledgements To the University of Tennessee at Chattanooga criminal justice faculty, thank you for providing a wonderful graduate experience.
    [Show full text]
  • Capital Trio Duncan Cumming, Piano; Hilary Cumming, Violin; Sölen¸ Dikener, Cello
    Williams College Department of Music Capital Trio Duncan Cumming, piano; Hilary Cumming, violin; Sölen¸ Dikener, cello Ludwig van Beethoven Sonata in C major, op. 102, No. 1 (1770-1827) I. Andante—Allegro vivace II. Adagio—Tempo d’Andante—Presto Bedrich Smetana Z Domoviny (From My Homeland) (1824-1884) I. Moderato II. Andantino—Moderato— Allegro vivo—Presto ***intermission*** Antonin Dvorák Piano Trio in E minor, Op. 90 (“Dumky”) (1841-1904) I. Lento maestoso—Allegro vivace, quasi doppio movimento II. Poco adagio—Vivace non troppo III. Andante—Poco più mosso— Vivace non troppo IV. Andante moderato—Allegretto scherzando V. Allegro—Meno VI. Lento maestoso—Vivace quasi doppio movimento Thursday, February 7, 2013 8:00 p.m. Brooks-Rogers Recital Hall Williamstown, Massachusetts Upcoming Events at Williams: See music.williams.edu for full details and to sign up for the weekly e-newsletters. 2/10 3:00pm Berkshire Symphony Soloist Recital Brooks-Rogers Recital Hall 2/12 6:00pm Berkshire Symphony Soloist Competition Brooks-Rogers Recital Hall 2/15 8:00pm Williams Chamber Players Brooks-Rogers Recital Hall 2/15 8:00pm Club Zambezi Dance Party! ’62 Center, CenterStage ** 2/16 2:00pm Club Zambezi Dance Party! (Families welcome!) ’62 Center, CenterStage ** 2/24 3:00pm World Music: Ballaké Sissoko, Malian Master Brooks-Rogers Recital Hall 2/27 12:15pm MIDWEEKMUSIC Chapin Hall Stage 3/1 8:00pm Joana Genova & Friends - Bartok & the Balkans Brooks-Rogers Recital Hall 3/2 8:00pm Visiting Artist: Paul LaRosa, baritone, Vivien Shotwell, mezzo Brooks-Rogers Recital Hall 3/3 1:00pm Vocal Master Class with Paul La Rosa and Vivian Shotwell Brooks-Rogers Recital Hall 3/6 12:15pm MIDWEEKMUSIC Chapin Hall Stage 3/8 8:00pm Berkshire Symphony: The Rite of Spring ’62 Center, MainStage 3/9 3:00pm Berkshire Symphony: The Rite of Spring ’62 Center, MainStage 3/9 8:00pm Berkshire Symphony: The Rite of Spring ’62 Center, MainStage 3/10 3:00pm Visiting Artist: Gilles Vonsattel, piano Chapin Hall No photography or recording without permission.
    [Show full text]
  • The "Decolonization" of East Timor and the United Nations Norms on Self-Determination and Aggression
    The "Decolonization" of East Timor and the United Nations Norms on Self-Determination and Aggression Roger S. Clarkt Introduction The island of Timor lies some 400 miles off the northwest coast of Australia, at the tip of the chain of islands forming the Republic of Indonesia. Before World War II, the western half of the island was administered by the Netherlands, the eastern half by Portugal. When Indonesia gained its independence from the Netherlands in 1949, the western half became Indonesian Timor, a part of Indonesia. Portugal continued to administer the eastern half of the island, East Timor, until 1975. East Timor was evacuated by the Portuguese authorities in Au- gust, 1975 during civil disorders condoned, if not fomented by the In- donesians. Within a few months, Indonesia invaded and annexed East Timor. It is estimated that, since 1975, more than 100,000 East Timorese have died from war, famine, and disease. Most of these deaths oc- curred after the Indonesian invasion and occupation. This Article ana- lyzes Indonesia's actions and concludes that they violated international law, specifically the norms regarding self-determination and aggression.' t Professor of Law, Rutgers, the State University School of Law at Camden, N.J. 1. In his syndicated column dated November 8, 1979, Jack Anderson estimated that about half of the 1975 population, which he gave as 600,000, had been "wiped out by war- fare, disease and starvation." Anderson, IslandLosinga Lonely Infamous War, Wash. Post, Nov. 8, 1979, § DC, at 11, col. 4. Most observers would put the number at less, but there is no doubt that the Indonesians perpetrated a massive human tragedy.
    [Show full text]