China Brief Vol 14 Issue 10.Pdf
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Introduction
1 Introduction Dennis Blair The second volume of Military Engagement relates the stories of how democratic civil-military relations developed in five world regions and fourteen individual countries. This introduction pro- vides some background on those who authored these stories and describes the patterns observed and the lessons that can be drawn from them. The Authors The regional summaries were written by a team of coauthors, almost all having both practical experience in armed forces or defense ministries of their countries and subsequent careers with security think tanks. They also contributed ideas and criticisms of the analysis and recommendations in the companion volume. Juan Emilio Cheyre, while chief of staff of the Chilean army, took the final steps to bring his service out of the Pinochet era. Matthew Rhodes is a professor at the Marshall Center in Germany, an insti- tution at the center of military-military relations among countries around the world. Istvan Gyarmati, who participated in the early brainstorming sessions for the handbook, was deputy defense minister of Hungary during the Hungarian armed forces’ transi- tion from its Warsaw Pact organization to meet NATO standards. Muthiah Alagappa, a general in the Malaysian Army, has become the foremost scholar of Asian civil-military relations subsequent to 1 01-2478-0 ch1.indd 1 5/16/13 6:03 PM 2 Dennis Blair his retirement. Tannous Mouawad served as Lebanon’s military attaché to the United States and the chief of Lebanon’s military intelligence service. Martin Rupiya was an officer in the Zimbabwean National Army and now heads a security affairs think tank in South Africa Each of the regional coauthors recruited additional authors to write the indi- vidual case studies; two of them wrote a case study as well. -
Effectiveness of Royal Malaysian Navy's Sea Training Program for Work Performance Onboard Ship Lt Kdr Ramli Bin Samsudin TL
Effectiveness of Royal Malaysian Navy’s Sea Training Program For Work Performance Onboard Ship Lt Kdr Ramli Bin Samsudin TLDM Submitted to the Graduate School of Business Faculty of Business and Accountancy University of Malaya, in partial fulfillment of the requirements for the Degree of Master of Management Oktober 2009 i ACKNOWLEDGEMENT First and foremost, I would like first to thank Allah the merciful for His continuous and endless blessing for me to complete this research paper. My gratitude also goes out to my family for their encouragement and patience on my endlessly absence from home for the duration of the course. I would like to thank Dr. Chan Wai Meng who supported me in this study. I have learned a lot about researching and writing from my conversations with her over my academic work. I would like to thank her for her support and encouragement in this research. I appreciate her time and thoughtful suggestions. In addition, I would like to thank the Malaysian Army, Royal Malaysian Navy and Malaysian Armed Forces for giving us the opportunity to further our studies to a higher level. Lastly, I would like to thank all UCMMC 2008/2009 course participants for their support and comradeship for the duration of the course. Finally, I greatly appreciate the participants from KD SULTAN IDRIS 1 who participated in my research project and the management that allowed me to collect data at their site. I could not have succeeded without the care and support from all. RAMLI BIN SAMSUDIN UNIVERSITY OF MALAYA SESSION 2008/2009 iv TABLE OF CONTENTS Pages ABSTRACT ii ACKNOWLEDGEMENT iv TABLE OF CONTENTS v LIST OF TABLES viii LIST OF ABBREVIATIONS ix CHAPTER 1 : INTRODUCTION 1.1 Background of the study 1 1.2 Overview of KD SULTAN IDRIS 1 ( KDSI 1) 2 1.3 Organizational Structu re 3 1.4 Overview of Basic Junior Officer Course 4 1.5 Overview of Sea Training Phase 5 1.6 Objectives of Sea Training Program 6 1.7 Sea Training Program Core Subjects 6 1.7.1. -
Dissertation JIAN 2016 Final
The Impact of Global English in Xinjiang, China: Linguistic Capital and Identity Negotiation among the Ethnic Minority and Han Chinese Students Ge Jian A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2016 Reading Committee: Laada Bilaniuk, Chair Ann Anagnost, Chair Stevan Harrell Program Authorized to Offer Degree: Anthropology © Copyright 2016 Ge Jian University of Washington Abstract The Impact of Global English in Xinjiang, China: Linguistic Capital and Identity Negotiation among the Ethnic Minority and Han Chinese Students Ge Jian Chair of the Supervisory Committee: Professor Laada Bilaniuk Professor Ann Anagnost Department of Anthropology My dissertation is an ethnographic study of the language politics and practices of college- age English language learners in Xinjiang at the historical juncture of China’s capitalist development. In Xinjiang the international lingua franca English, the national official language Mandarin Chinese, and major Turkic languages such as Uyghur and Kazakh interact and compete for linguistic prestige in different social scenarios. The power relations between the Turkic languages, including the Uyghur language, and Mandarin Chinese is one in which minority languages are surrounded by a dominant state language supported through various institutions such as school and mass media. The much greater symbolic capital that the “legitimate language” Mandarin Chinese carries enables its native speakers to have easier access than the native Turkic speakers to jobs in the labor market. Therefore, many Uyghur parents face the dilemma of choosing between maintaining their cultural and linguistic identity and making their children more socioeconomically mobile. The entry of the global language English and the recent capitalist development in China has led to English education becoming market-oriented and commodified, which has further complicated the linguistic picture in Xinjiang. -
Xinjiang, China, Afghanistan and Pakistan
Image Courtesy: Wikimedia Commons Xinjiang, China, Afghanistan and Pakistan Subramanyam Sridharan P a g e 1 | 11 Introduction Ever since Op. Bear Trap[1] which led to the induction, the eventual humiliating withdrawal of Soviet military from Afghanistan, that graveyard of all Superpowers, and the ultimate dismantling of the Soviet Union itself within a couple of years in the closing quarter of the previous century, jihadi terrorism, extremism and fundamentalism have engulfed this region of Af-Pak and beyond, spilling over into India, the Central Asian Republics (CAR), South East Asia, China, parts of Asia and Europe, Russia, the Levant et al. Three of the major players, apart from Wahhabi West Asian monarchies and Egypt, involved in the Afghan Jihad were the US, Pakistan, and China, each for their very own reasons. As the adage relentlessly proves, the hands that fed the snake were eventually bitten by it. The US was attacked on the morning of Tuesday, September 11, 2001, within its own supposedly impenetrable precincts and that country has not been the same again ever since. Pakistan, the ‘epicenter of worldwide terrorism’ has even been termed as the ‘Terrorist State’ [2] and is thoroughly emaciated today economically, barely managing to exist and that too due almost entirely to China, and is on the verge of being blacklisted by the Financial Action Task Force (FATF), three decades after the Jihad ended. China has been now and then wracked by terrorism by the East Turkestan Islamic Movement (ETIM) separatists and has been unable to eliminate them altogether even while going to extraordinary and inhuman lengths to retain Xinjiang within itself. -
Comprehensive Encirclement
COMPREHENSIVE ENCIRCLEMENT: THE CHINESE COMMUNIST PARTY’S STRATEGY IN XINJIANG GARTH FALLON A thesis submitted for the degree of Master of Philosophy School of Humanities and Social Sciences International and Political Studies July 2018 1 THE UNIVERSITY OF NEW SOUTH WALES Thesis/Dissertation Sheet Surname or Family name: FALLON First name: Garth Other name/s: Nil Abbreviation for degree as given in the University calendar: MPhil School: Humanitiesand Social Sciences Faculty: UNSW Canberraat ADFA Title: Comprehensive encirclement: the Chinese Communist Party's strategy in Xinjiang Abstract 350 words maximum: (PLEASETYPE) This thesis argues that the Chinese Communist Party (CCP) has a strategy for securing Xinjiang - its far-flung predominantly Muslim most north-western province - through a planned program of Sinicisation. Securing Xinjiang would turna weakly defended 'back door' to China into a strategic strongpointfrom which Beijing canproject influence into Central Asia. The CCP's strategy is to comprehensively encircle Xinjiang with Han people and institutions, a Han dominated economy, and supporting infrastructure emanatingfrom inner China A successful program of Sinicisation would transform Xinjiang from a Turkic-language-speaking, largely Muslim, physically remote, economically under-developed region- one that is vulnerable to separation from the PRC - into one that will be substantially more culturally similar to, and physically connected with, the traditional Han-dominated heartland of inner China. Once achieved, complete Sinicisation would mean Xinjiang would be extremely difficult to separate from China. In Xinjiang, the CCP enacts policies in support of Sinication across all areas of statecraft. This thesis categorises these activities across three dimensions: the economic and demographic dimension, the political and cultural dimension, and the security and international cooperationdimension. -
Transition in Afghanistan: Filling the Security Vacuum – the Expansion of Uighur Extremism?
Sources of Tension in Afghanistan and Pakistan: A Regional Perspective Transition in Afghanistan: Filling the Security Vacuum – The Expansion of Uighur Extremism? Raffaello Pantucci and Edward Schwarck May 2014 CIDOB Policy Research Project CIDOB BARCELONA CENTRE FOR INTERNATIONAL AFFAIRS With support from TRANSITION IN AFGHANISTAN: FILLING THE SECURITY VACUUM – THE EXPANSION OF UIGHUR EXTREMISM? Raffaello Pantucci and Edward Schwarck Raffaello Pantucci is Senior Research Fellow at the Royal United Services his paper aims to map out as clearly as possible the current threat Institute for Defence and Security from Uighur extremist groups in Afghanistan and Pakistan, and as- Studies (RUSI). His research focuses on certain whether these groups will develop into a regional threat terrorism and China’s relations with T Central and South Asia. over the next few years. Edward Schwarck is Research Fellow It will be argued that Uighur Sunni-jihadist groups in Afghanistan and Pa- and Head of the Asia Programme at the Royal United Services Institute for kistan are unlikely to be able to fill the security void in either country after Defence and Security Studies (RUSI). His the West’s withdrawal. Traditionally, these groups have struggled to gain research centres on domestic security in China – particularly in Xinjiang – and traction within the global jihadist community. China has also done an ef- Chinese foreign policy in the Asia- fective job of building regional relationships that means local governments Pacific region. would block their ascension into power. Furthermore, the number of Ui- ghur militants remains marginal, suggesting that, at worst, they might be able to take control of some small settlements. -
A Structural Analysis of Counter-Terrorism Legal Architecture in China, 33 Emory Int'l L
Emory International Law Review Volume 33 Issue 3 2019 Fighting the "Three Evils": A Structural Analysis of Counter- Terrorism Legal Architecture in China Enshen Li Follow this and additional works at: https://scholarlycommons.law.emory.edu/eilr Recommended Citation Enshen Li, Fighting the "Three Evils": A Structural Analysis of Counter-Terrorism Legal Architecture in China, 33 Emory Int'l L. Rev. 311 (2019). Available at: https://scholarlycommons.law.emory.edu/eilr/vol33/iss3/1 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory International Law Review by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. LIPROOFS_5.23.19 5/23/2019 10:00 AM FIGHTING THE “THREE EVILS”: A STRUCTURAL ANALYSIS OF COUNTER-TERRORISM LEGAL ARCHITECTURE IN CHINA Enshen Li* ABSTRACT In the aftermath of September 11 attacks, China has not been immune to the global trend of destructive terrorism. However, China’s perceptions of terrorism and legal responses to it greatly diverge from those of other countries. This Article first seeks to understand the cause, source, and impact of terrorist threats in China, known as “Three Evils”—terrorism, extremism, and separatism, through a critical inquiry of the country’s ethnic and religious policies. It then proceeds to delineate China’s legal framework for combating the “Three Evils” to explore the cultural characteristics of the government’s approach against these rising threats. Tracing the evolution of the country’s counter-terrorism laws and policies, this Article argues that China has developed an operational infrastructure composed of four strands to fight terrorism: crackdown, criminalization, control, and cooperation. -
1 Testimony Before the U.S.-China Economic and Security Review
Testimony before the U.S.-China Economic and Security Review Commission China and South Asia March 10, 2016 Daniel S. Markey [email protected] Senior Research Professor in International Relations and Academic Director, Global Policy Program, Johns Hopkins University School of Advanced International Studies; Adjunct Senior Fellow for India, Pakistan, and South Asia, Council on Foreign Relations Members of the Commission, Thank you for this opportunity to address you today as part of your hearing on China’s role in South Asia. It is an honor to participate with other leading experts on this topic. As you have offered a series of questions to guide our discussion, I have endeavored to answer each question in turn. My answers tend to reflect a South Asia-heavy perspective and are informed, in part, by a recent research trip to Pakistan. Let me observe from the outset, however, that the topic is an extremely timely and exciting one. China’s new initiatives and ambitions should make it clear that we must focus greater attention on strategic connections across Asia and not be wedded to a longstanding tradition of stove-piping our policy and academic research between East, South, Central, and West Asia. Over the coming decades, as the region becomes increasingly interconnected, our strategies and policies must keep pace. 1. Describe the tenor of China-Pakistan relations in recent years. To what extent has the Xi Administration pursued relations with Pakistan similarly to or differently from previous administrations? The China-Pakistan relationship has experienced a burst of high-profile activity in recent years, centered on the China-Pakistan Economic Corridor and linked to China’s broader ambitions for its western periphery. -
United States 4.0 Introduction This Chapter Critically Examines The
Chapter 4: United States 4.0 Introduction This chapter critically examines the evolution of counter terrorist financing (CTF) legislation in the United States of America1 and identifies how its CTF policy has adversely affected the right to a public trial. Whilst little attention by regulatory agencies was paid to terrorist financing prior to September 11 2001,2 the terrorist attacks spurred the U.S. into taking action against the funding of terrorism. This action came in the form of a wealth of legislation aimed at starving the flow of funds to terrorists. This chapter focuses on the consequences that these laws have had on the right to a public trial in the U.S and argues that the emergency measures adopted in the wake of September 11 have become institutionalized, as acts of terrorism have become more prevalent.3 The permanence of these once temporary measures in conjunction with any deviation from legal processes and derogation from human rights at times of emergency calls into question the legitimacy of the U.S. CTF legislative framework. The chapter begins by discussing the CTF measures that predate September 11 and it then goes on to examine the monumental legislative shift away from financial crime in the U.S. following the attacks. The chapter looks at the manner in which these laws, in particular the Presidential Executive Order 13,224 and Title III of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act 20014 were swiftly implemented. Next, the chapter identifies and examines the U.S. -
Mass Murder: American Unexceptionalism, D.C
MASS MURDER: AMERICAN UNEXCEPTIONALISM, D.C. V. HELLER, AND “REASONABLENESS” Clayton E. Cramer* ABSTRACT Lower courts have used a variety of techniques to largely ignore District of Columbia v. Heller (2008) and McDonald v. Chicago (2010), primarily by defining various categories of gun ownership outside a narrow definition of the “core” of the right protected by the Second Amendment. Will this same approach be used by a future Supreme Court to effectively reverse Heller by declaring some weapons too effective for mass murder to be protected? Is mass murder exceptionally American? If so, can America’s relatively laissez-faire gun control laws be the cause? Could a narrow reading of the Second Amendment, post-District of Columbia v. Heller, qualify as “reasonable” or “rational” because of the social costs of this supposed American exceptionalism? I. THE RELEVANCE OF MASS MURDER While mass murders receive enormous media attention, they are actually very atypical of murder in the United States. USA Today’s survey of mass murders 2006-2010 observed that they are “only about 1% of all murders nationally.”1 While each such incident is clearly catastrophic, it * Adjunct Faculty, College of Western Idaho. Cramer is the author of CONCEALED WEAPON LAWS OF THE EARLY REPUBLIC: DUELING, SOUTHERN VIOLENCE, AND MORAL REFORM (1999) (cited by Justice Breyer in McDonald v. Chicago, 561 U.S. 742, 933 (2010) (Breyer, J., dissenting)), and LOCK, STOCK, AND BARREL: THE ORIGINS OF AMERICAN GUN CULTURE (2018), as well as co- author of, among other articles, such as Clayton E. Cramer & Joseph Edward Olson, What Did “Bear Arms” Mean in the Second Amendment?, 6 GEO. -
Lethal Violence Update Violence Lethal Chapter
Chapter Two 49 Lethal Violence Update n recent years, lethal violence has remained and reviews changes in rates for the entire period firmly in the headlines. In the aftermath of for which data is available (2004–12). The chapter I the Arab uprisings, for instance, violence continues to use the ‘unified approach’ to lethal erupted in Libya and Syria, with the latter experi- violence that was introduced in the previous edi- 1 encing particularly high levels of lethality ever tion of this report. The approach covers conflict, LETHAL UPDATE VIOLENCE since. Honduras, Mexico, and Venezuela have criminal, and interpersonal forms of violence and been exhibiting a high incidence of violent deaths includes data from a large variety of sources on in the face of ongoing gang and drug wars. In fact, homicide, conflict, and other forms of violence. some of the world’s highest homicide rates are In highlighting medium- and long-term changes found in these countries. Volatility in the levels in lethal violence as well as the most recent of violence in the Central African Republic, Egypt, available figures on violent deaths, the chapter and Ukraine serve as reminders that episodes of also draws attention to improvements in the col- 1 great lethality can be short-lived and concentrated. lection of data. Indeed, the availability of more Meanwhile, in many other countries around the 2 refined data allows for more accurate estimates world, enduring trends hold the promise that levels and for the unpacking of patterns in lethal vio- 3 of violence may continue to drop. lence (see Box 2.2). -
1206 Radar Program, 134 14K Triad, 80 Linkage to China and North
Index 1206 Radar Program, 134 Agreement on Border 14K Triad, 80 Security (1967), linkage to China and North Malaysia and Indonesia, Korea, 82 129 1st Special Forces Group Agreement on Information (Airborne), 76 Exchange and Establishment of A Communication Abdul Khayer Alonto, 86 Procedures (2002), Abdurajak Abubakar 122–24, 133 Janjalani, 73, 75 AK-47, 28, 30, 111 Abkhazia, 32 durability and reliability, 31 Abu Sayyaf Group (ASG), 7, introduction into tribally 41, 73–78 violent societies, 35 dwindling support, 75 Al Harakat Al Islamiya, 73 raid on Sipadan, 145 Al Khobar gang, 80 Aceh, 42 Al Qaeda, 6, 30 Afghanistan, 40 arms from Afghanistan abandoned stockpiles of conflict, 41 guns, 23 black arms transfers from, African Market Complex, 33 35–37 Albania, 31–32 Agreement on Border Ambalat dispute, 130 Crossing, Philippines American Market Complex, and Indonesia, 128 27–30 08 Sulu_AM Index.indd 201 1/18/11 1:23:52 PM 202 Index “ammo dumps”, 39 grey, 20 Andaman sub-regional secondary sources, 23 market complex, 42 source, 23–24 Anglo-Malayan Defense transporter, 25–27 Arrangement (AMDA), types, 19–20 123 white, 20 Angola, 35 ASEAN Centre for Ant traders, 26, 79 Combating anti-communist groups, U.S. Transnational Crime supported, 28 (ACTC), 126 anti-smuggling agreements, ASEAN Plan of Action bilateral, 60 (PoA) to Combat Anti-Smuggling Treaty Transnational Crime, (1967), 128–29 120, 122, 125–26 apartheid, fall of, South ASEAN Way, 119 Africa, 36 Association of Southeast Armed Forces of the Asian Nations (ASEAN) Philippines (AFP), 7 export