PDF: Volume 8 Issue 3

Total Page:16

File Type:pdf, Size:1020Kb

PDF: Volume 8 Issue 3 Editorial Introduction Criminology’s third war Special issue on terrorism and responses to terrorism Gary LaFree, Special Issue Editor University of Maryland oliticians in the United States have invoked the term “war” to develop national support for an all-out attack on criminal behavior on at least three separate occasions since World PWar II: the wars on crime, drugs, and terrorism. In each case, the word has been used as a metaphor to underscore the conviction that society is involved in a pitched battle and that there is no room for acquiescence or compromise. The implications of the war metaphor or a detailed examination of criminology’s role in these three campaigns is beyond the scope of this short introduction. However, I argue that several important similarities can be found across the three major crime-related political wars of the past century and that there is at least one important difference: Academic criminology was far more engaged in the wars on crime and drugs than it has been in the war on terrorism. Wars on Crime, Drugs, and Terrorism Each of the three wars can be linked directly to presidential politics. Given the United States president’s constitutional responsibility to serve as “commander in chief,” the president is the elected official who is most likely to invoke the war metaphor and be taken seriously. The phrase “war on crime” was actually already in U.S. politics by the early 1930s when Federal Bureau of Investigation Director J. Edgar Hoover sponsored a comic strip of the same name that was syndicated in newspapers across the country (Ruth and Reitz, 2003). But it was Arizona Sena- tor and Presidential Nominee Barry Goldwater who elevated the war-on-crime metaphor to national prominence by making it a key issue in the 1964 presidential election. Goldwater lost the election but forced President-Elect Lyndon Johnson to take the issue seriously. In the fall of 1964, Johnson tried to counter Goldwater’s focus on the microlevel dynamics of crime fighting by arguing that crime was rooted in broad, macrolevel social problems and that warring on poverty really constituted warring on crime (Flamm, 2005). But a year later, Johnson dropped the indirect link to poverty and instead declared a new and direct concern with the victims of crime: “I will not be satisfied until every woman and child in this Nation can walk any street, Direct correspondence to Gary LaFree, University of Maryland, College Park, MD 20742 (e-mail: [email protected]). © 2009 American Society of Criminology 431 Criminology & Public Policy • Volume 8 • Issue 3 Editorial Introduction LaFree enjoy any park, drive on any highway, and live in any community at any time of the day or night without fear of being harmed” (Flamm, 2005: 51). When Richard Nixon campaigned during the run-up to the election of 1968, he moved the war on crime even more directly to center stage in presidential politics. At the time of his State of the Union Address in 1970, Nixon declared that “If there is one area where the word ‘war’ is appropriate, it is in the fight against crime” (Huq and Muller, 2008: 218). Although the U.S. war on drugs can be traced as far back as the 1880s when the United States pressed for a treaty with China that included an absolute prohibition on the shipment of opium between the two countries (Eddy, 2003), the modern war on drugs is usually traced to 1971 when President Richard Nixon declared an all-out offensive on drugs—which he re- ferred to as “America’s public enemy number one” (2003: 1). In 1973, the Drug Enforcement Assistance Administration (DEA) was created and charged with enforcing federal drug laws. In 1978, the Comprehensive Drug Abuse Prevention and Control Act was amended to allow for asset forfeiture—which has since been widely used in the war on drugs. The war on drugs received a major boost with the election of Ronald Reagan in 1980. He responded to perceived drug-related problems by declaring: “The American people want their government to get tough and go on the offensive” (Walker, 1992: 26) and promising that police would attack the drug problem “with more ferocity than ever before” (Donziger, 1996: 115). In 1983, the Drug Abuse Resistance Education Program (DARE) was founded in Los Angeles and spread quickly to schools across the country. In 1985, First Lady Nancy Reagan launched the widely publicized Just Say No (to drugs) campaign, promoting it through television and radio, popular magazines, bumper stickers, and t-shirts. The Anti-Drug Abuse Act of 1988 created the Office of National Drug Control Policy (ONDCP) to lead the war on drugs, and William Bennett was appointed as its first director. In 1994, President Bill Clinton signed into law the Violent Crime Control and Law En- forcement Act, which called for mandatory prison sentences of 20 years to life for some drug offenders and the death penalty for those who committed murder in pursuit of illegal drug sales. Since the early 1970s, the United States has spent vast sums of money combating drug use and abuse and has created a far-flung bureaucracy to administer these programs. In addi- tion to agencies like the DEA and ONDCP that were created directly to combat drugs, a host of other agencies—including the departments of Health and Human Services (HHS), Justice, Homeland Security (DHS), State, Defense, Veterans Affairs, and Education—received major budget increases for programs tasked with the control of drugs and the treatment or punish- ment of drug offenders. Robinson and Scherlen (2007: 42) estimated that in FY 2005, total federal spending on the drug war amounted to $12.2 billion, with the largest amounts going to HHS, the Department of Justice, and DHS. Fewer than 10 days after the attacks on the World Trade Center and the Pentagon, President George W. Bush declared war on “terrorism with a global reach” and promised that the war would end only with the eradication of evil (Andreani, 2004: 31). In October 2001, the United States passed the USA Patriot Act, which provides a variety of legal tools to fight terrorism at 432 Criminology & Public Policy Special Issue Homeland Security and Terrorism home and abroad. The war on terrorism rapidly took concrete policy form in the campaign to topple the Taliban in Afghanistan. The invasion was preceded by an ultimatum to the Taliban to hand over terrorists and was at least implicitly sanctioned by the United Nations Security Council. After early successes in the Afghan campaign, the Bush administration introduced the doctrine of “preventive war,” which suggests that the United States had the right to resort to force to fight terrorists and their supporters at home and abroad, and strongly pushed the idea that Iraq was the next step in the global war on terrorism (Andreani, 2004). President Bush clearly identified his presidency with the war on terrorism and emphasized this connection in his ultimately successful election over Democratic opponent John Kerry. Despite obvious differences, there are several important similarities between all three of these declared wars on different types of criminal behavior (Caulkins, Kleiman, and Reuter, 2003; LaFree and Dugan, 2004). First, in all three cases, law enforcement is a necessary but not a sufficient solution. Although this argument has probably been the most controversial for the war on terrorism (LaFree and Hendrickson, 2007), it seems fair to conclude that most commentators now imagine at least some role for law enforcement in preventing terrorism and responding to terrorist attacks. Second, in all three cases, much evidence suggests that taking a tough stand and attacking the problem aggressively does not always produce desired results. Third, in the case of terrorism and drugs and to some extent crime, the problem has domestic and transnational aspects. Fourth, in the case of terrorism and drugs and to some extent crime, the problem cuts across various levels of government, agencies, disciplines, and the public and private sectors in complex ways. And finally, in all three areas, the war metaphor has produced substantial and to some extent unanticipated policy difficulties. Thus, Flamm (2005) claimed that, because President Johnson promoted the war-model idea of total victory against crime, he set himself up for certain failure. As former Attorney General Nicholas Katzenbach explained, “You are meant to win wars, and the War on Crime was in a sense an unwinnable war.” Similar arguments have been voiced in terms of the war metaphor applied to drugs (Robinson and Scherlen, 2007) and terrorism (LaFree and Hendrickson, 2007). However, ordinary street crime, drug distribution and use, and terrorism are also distinct in important ways, including the scope of violations (crimes and drug violations are com- mon, but terrorism is relatively rare); the motivations of participants (terrorists often perceive themselves as altruists; common criminals and drug distributors rarely do); and organizational structure (most common crimes are committed with little organized structure, whereas drug distribution networks and terrorist groups vary greatly in organizational complexity). From a research standpoint, a major difference between these three types of crime is the differential involvement of academic criminology. Although criminology has been involved front and center in the war on crime and drugs, thus far, its connection to the war on terrorism has been modest. It is true that criminologists have been making important contributions to the research literature on terrorism and responses to terrorism for many years. Two past presidents of the American Society of Criminology, Nicholas Kittrie (1978) and Austin Turk (1982, 1984), explicitly built terrorism into their research on Volume 8 • Issue 3 433 Editorial Introduction LaFree political crime in the 1970s and 1980s.
Recommended publications
  • Cyber Violence Against Women and Girls
    CYBER VIOLENCE AGAINST WOMEN AND GIRLS A WORLD-WIDE WAKE-UP CALL 2015 Photo credits:Shutterstock A REPORT BY THE UN BROADBAND COMMISSION FOR DIGITAL DEVELOPMENT WORKING GROUP ON BROADBAND AND GENDER CYBER VIOLENCE AGAINST WOMEN AND GIRLS: A WORLD-WIDE WAKE-UP CALL Acknowledgements This Report has been written collaboratively, drawing on insights and rich contributions from a range of Commissioners and Expert Members of the Working Group on Broadband and Gender. It has been researched and compiled by lead author Nidhi Tandon, assisted by Shannon Pritchard, with editorial inputs by teams from UN Women, UNDP and ITU. Design concepts were developed by Céline Desthomas of ITU. We wish to thank the following people for their contributions and kind review and comments (listed in alphabetical order of institution, followed by alphabetical order of surname): Dafne Sabanes Plou, Jac sm Kee and Chat Garcia Ramilo (APC); Dr Nancy Hafkin; Minerva Novero- Belec (UNDP); Corat Suniye Gulser (UNESCO); Jennifer Breslin and team (UN Women); Samia Melhem and team (World Bank). About the Commission The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to meet the Millennium Development Goals. Established in May 2010, the Commission unites top industry executives with government leaders, thought leaders and policy pioneers and international agencies and organizations concerned with development. The Broadband Commission embraces a range of different perspectives in a multi-stakeholder approach to promoting the roll-out of broadband, as well as providing a fresh approach to UN and business engagement.
    [Show full text]
  • Guidelines for the Forensic Analysis of Drugs Facilitating Sexual Assault and Other Criminal Acts
    Vienna International Centre, PO Box 500, 1400 Vienna, Austria Tel.: (+43-1) 26060-0, Fax: (+43-1) 26060-5866, www.unodc.org Guidelines for the Forensic analysis of drugs facilitating sexual assault and other criminal acts United Nations publication Printed in Austria ST/NAR/45 *1186331*V.11-86331—December 2011 —300 Photo credits: UNODC Photo Library, iStock.com/Abel Mitja Varela Laboratory and Scientific Section UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Guidelines for the forensic analysis of drugs facilitating sexual assault and other criminal acts UNITED NATIONS New York, 2011 ST/NAR/45 © United Nations, December 2011. All rights reserved. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. This publication has not been formally edited. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. List of abbreviations . v Acknowledgements .......................................... vii 1. Introduction............................................. 1 1.1. Background ........................................ 1 1.2. Purpose and scope of the manual ...................... 2 2. Investigative and analytical challenges ....................... 5 3 Evidence collection ...................................... 9 3.1. Evidence collection kits .............................. 9 3.2. Sample transfer and storage........................... 10 3.3. Biological samples and sampling ...................... 11 3.4. Other samples ...................................... 12 4. Analytical considerations .................................. 13 4.1. Substances encountered in DFSA and other DFC cases .... 13 4.2. Procedures and analytical strategy...................... 14 4.3. Analytical methodology .............................. 15 4.4.
    [Show full text]
  • Identity & In-Group Critique in James Mason's Siege
    A Paler Shade of White: Identity & In-group Critique in James Mason’s Siege J.M. Berger RESOLVE NETWORK | April 2021 Racially and Ethnically Motivated Violent Extremism Series https://doi.org/10.37805/remve2021.1 The views expressed in this publication are those of the author. They do not necessarily reflect the views of the RESOLVE Network, the U.S. Institute of Peace, or any entity of the U.S. government. CONTENTS EXECUTIVE SUMMARY ......................................................................................... 1 INTRODUCTION ...................................................................................................... 2 HISTORY AND CONTEXT ...................................................................................... 4 METHODOLOGY: LINKAGEBASED ANALYSIS ............................................... 6 OVERVIEW OF CONTENT ..................................................................................... 7 INGROUP CRISIS: A PALER SHADE OF WHITE .............................................13 INGROUPS IN CRISIS ........................................................................................20 THE OUTGROUP IN THE INGROUP ...............................................................23 CONCLUSION: INSIGHTS & RECOMMENDATIONS .....................................25 BIBLIOGRAPHY .....................................................................................................28 EXECUTIVE SUMMARY Discussions of extremist ideologies naturally focus on how in-groups criticize and attack out-groups. But
    [Show full text]
  • The Radical Roots of the Alt-Right
    Gale Primary Sources Start at the source. The Radical Roots of the Alt-Right Josh Vandiver Ball State University Various source media, Political Extremism and Radicalism in the Twentieth Century EMPOWER™ RESEARCH The radical political movement known as the Alt-Right Revolution, and Evolian Traditionalism – for an is, without question, a twenty-first century American audience. phenomenon.1 As the hipster-esque ‘alt’ prefix 3. A refined and intensified gender politics, a suggests, the movement aspires to offer a youthful form of ‘ultra-masculinism.’ alternative to conservatism or the Establishment Right, a clean break and a fresh start for the new century and .2 the Millennial and ‘Z’ generations While the first has long been a feature of American political life (albeit a highly marginal one), and the second has been paralleled elsewhere on the Unlike earlier radical right movements, the Alt-Right transnational right, together the three make for an operates natively within the political medium of late unusual fusion. modernity – cyberspace – because it emerged within that medium and has been continuously shaped by its ongoing development. This operational innovation will Seminal Alt-Right figures, such as Andrew Anglin,4 continue to have far-reaching and unpredictable Richard Spencer,5 and Greg Johnson,6 have been active effects, but researchers should take care to precisely for less than a decade. While none has continuously delineate the Alt-Right’s broader uniqueness. designated the movement as ‘Alt-Right’ (including Investigating the Alt-Right’s incipient ideology – the Spencer, who coined the term), each has consistently ferment of political discourses, images, and ideas with returned to it as demarcating the ideological territory which it seeks to define itself – one finds numerous they share.
    [Show full text]
  • 2018 Csis Public Report
    /// 2018 CSIS PUBLIC REPORT Aussi disponible en français sous le titre : Rapport public du SCRS 2018 www.canada.ca Published in June 2019 © Her Majesty the Queen in Right of Canada, as represented by the Minister of Public Safety and Emergency Preparedness, 2019. © Public Works and Government Services Canada 2019 Cat No. PS71-2018 ISSN: 1188-4415 /// 2018 CSIS PUBLIC REPORT 2018 CSIS PUBLIC REPORT 1 2 2018 CSIS PUBLIC REPORT /// TABLE OF CONTENTS MESSAGE FROM THE DIRECTOR 8 THE RELEVANCE OF OUR WORK 13 Our Core Mandate, Partnerships, and Duties and Functions 14 Departmental Results Framework/Financials 15 The Intelligence Cycle 16 Threats to Canada’s National Security 19 The International Terrorism Landscape and Implications for Canada 24 Espionage and Foreign Influenced Activities 25 Protecting our Democratic Institutions 26 Economic Security 26 Cyber Threats to National Security 28 Security Screening 29 2018 CSIS PUBLIC REPORT 3 THE EXCELLENCE OF OUR PEOPLE 33 CSIS across Canada 34 Dedicated to Promoting Health and Wellness 35 Building Employee Resilience 36 Recruiting 37 Gender-Based analysis + 37 Demographics of CSIS Employees 39 THE CONFIDENCE OF CANADIANS 41 Accountabilities of the CSIS Director 42 Accountability and Retaining the Trust of Canadians 44 Transparency 45 Access to Information and Privacy statistics 45 CSIS Foreign Cooperation 46 Human Rights Considerations 46 Academic Outreach 48 New Legislation: C-59 – What does it mean for CSIS? 49 4 20182018 CSIS PUBLIC REPORT 2018 CSIS PUBLIC REPORT 5 /// OUR VISION “A SAFE, SECURE AND PROSPEROUS CANADA THROUGH TRUSTED INTELLIGENCE AND ADVICE”. 6 2018 CSIS PUBLIC REPORT 2018 CSIS PUBLIC REPORT 7 /// MESSAGE FROM THE DIRECTOR Almost 35 years ago, on July 16, 1984, the Canadian Security Intelligence Service (CSIS) came into existence.
    [Show full text]
  • Administrative National Security
    ARTICLES Administrative National Security ELENA CHACHKO* In the past two decades, the United States has applied a growing num- ber of foreign and security measures directly targeting individualsÐ natural or legal persons. These individualized measures have been designed and carried out by administrative agencies. Widespread appli- cation of individual economic sanctions, security watchlists and no-¯y lists, detentions, targeted killings, and action against hackers responsible for cyberattacks have all become signi®cant currencies of U.S. foreign and security policy. Although the application of each of these measures in discrete contexts has been studied, they have yet to attract an inte- grated analysis. This Article examines this phenomenon with two main aims. First, it documents what I call ªadministrative national securityº: the growing individualization of U.S. foreign and security policy, the administrative mechanisms that have facilitated it, and the judicial response to these mechanisms. Administrative national security encompasses several types of individualized measures that agencies now apply on a routine, inde®- nite basis through the exercise of considerable discretion within a broad framework established by Congress or the President. It is therefore best understood as an emerging practice of administrative adjudication in the foreign and security space. Second, this Article considers how administrative national security integrates with the presidency and the courts. Accounting for administra- tive national security illuminates the President's constitutional role as chief executive and commander-in-chief and his control of key aspects of * Lecturer on Law, Harvard Law School (Fall 2019); Post-doctoral Fellow, Perry World House, University of Pennsylvania; S.J.D. Candidate, Harvard Law School; LL.B., Hebrew University of Jerusalem (2014).
    [Show full text]
  • Gang Project Brochure Pg 1 020712
    Salt Lake Area Gang Project A Multi-Jurisdictional Gang Intelligence, Suppression, & Diversion Unit Publications: The Project has several brochures available free of charge. These publications Participating Agencies: cover a variety of topics such as graffiti, gang State Agencies: colors, club drugs, and advice for parents. Local Agencies: Utah Dept. of Human Services-- Current gang-related crime statistics and Cottonwood Heights PD Div. of Juvenile Justice Services historical trends in gang violence are also Draper City PD Utah Dept. of Corrections-- available. Granite School District PD Law Enforcement Bureau METRO Midvale City PD Utah Dept. of Public Safety-- GANG State Bureau of Investigation Annual Gang Conference: The Project Murray City PD UNIT Salt Lake County SO provides an annual conference open to service Salt Lake County DA Federal Agencies: providers, law enforcement personnel, and the SHOCAP Bureau of Alcohol, Tobacco, community. This two-day event, held in the South Salt Lake City PD Firearms, and Explosives spring, covers a variety of topics from Street Taylorsville PD United States Attorney’s Office Survival to Gang Prevention Programs for Unified PD United States Marshals Service Schools. Goals and Objectives commands a squad of detectives. The The Salt Lake Area Gang Project was detectives duties include: established to identify, control, and prevent Suppression and street enforcement criminal gang activity in the jurisdictions Follow-up work on gang-related cases covered by the Project and to provide Collecting intelligence through contacts intelligence data and investigative assistance to with gang members law enforcement agencies. The Project also Assisting local agencies with on-going provides youth with information about viable investigations alternatives to gang membership and educates Answering law-enforcement inquiries In an emergency, please dial 911.
    [Show full text]
  • Change and Structure in the Law of Armed Conflict After September 11 Peter Margulies
    Marquette Law Review Volume 95 Article 13 Issue 4 Summer 2012 The ogF of War Reform: Change and Structure in the Law of Armed Conflict After September 11 Peter Margulies Follow this and additional works at: http://scholarship.law.marquette.edu/mulr Part of the Law Commons Repository Citation Peter Margulies, The Fog of War Reform: Change and Structure in the Law of Armed Conflict After September 11, 95 Marq. L. Rev. 1417 (2012). Available at: http://scholarship.law.marquette.edu/mulr/vol95/iss4/13 This Article is brought to you for free and open access by the Journals at Marquette Law Scholarly Commons. It has been accepted for inclusion in Marquette Law Review by an authorized administrator of Marquette Law Scholarly Commons. For more information, please contact [email protected]. 18 - MARGULIES (DO NOT DELETE) 7/9/2012 10:27 PM THE FOG OF WAR REFORM: CHANGE AND STRUCTURE IN THE LAW OF ARMED CONFLICT AFTER SEPTEMBER 11 * PETER MARGULIES Salim Hamdan’s conviction in a military commission for material support of Al Qaeda separates utilitarians, who generally defer to state power, from protective theorists, who seek to shield civilians by curbing official discretion. Utilitarians view military commissions as efficient means for trying suspected terrorists. Protective theorists criticize the amorphous nature of material support charges. The clash between utilitarians and protective theorists colors other issues, including “enhanced” interrogation and limits on targeting. Protective theorists merit praise for their scrutiny of interrogation. In contrast, utilitarians have trivialized interrogation abuses. However, protective theorists’ scrutiny of states is burdened by hindsight bias.
    [Show full text]
  • Precipitating the Decline of Terrorist Groups : a Systems Analysis
    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1994-03 Precipitating the decline of terrorist groups : a systems analysis DeGhetto, Todd H. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/30893 NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS PRECIPITATING THE DECLINE OF TERRORIST GROUPS: A SYSTEMS ANALYS!S by Todd H. DeGhctto March, 1994 Thesis Advisor JamcsJ. Wirtz Approve<J for public release, distribution IS unlimited The s~s D2111ill DUDLEY KNOX LlBRPRY NAVAL POSTGRADUATE SCHOOl MONTEREY CA 93943-5101 Unclassified SecuntyCl ..l!ifiClllionoflhis~ REPORT DOCUMENTATION PAGE Is Report SecurityCI ..sificBlIon: Unclassified lbReslricli""MBI'klI\g!i 2aScaonlYCJMSlfic:ationAuibority 3 Di5lributioofAvailabilityofRepon lbDecl8SSlfi""lioniDowngraililgScbcdule Approved fur public release~ distribution is l-.llimited. 4 Pemnning Olpnizalioo Report Number(.) SMOIIi1oring0rpnizllionReponNumber(s) 6aN..-acofPerfunningOrilaniution 7a NlIIDe of Moniloriog OrgaDlzation Naval Postgraduate School Naval PostgradUIltl: School 6cAddress(cil)l.&/ak.andZlPcodI) 1bAddress(city._e. tmdZIP cotk) Monterey CA 93943-5000 MontereyCA93943-SOOO Addresslcily.SI<W.Qtt(iZlP~ WSourceofFuDdlngNumbcr.l Program Eli:ment No ProjecL No Task No Work Unit Accession No 11 Tille (incl'" ~ily cltu.ljkmklll) PRECIPITATING mE DECLINE OF TERRORIST GROUPS: A SYSTEMS ANALYSIS 12 PClllOlloi Autboti') Todd H. DeGbetto 16 SupplemCOlory Notation The views expressed in this thesis are those of the author and do not reflect the official policy or position 0 the Depanment of Defense or the U.s. Government. 18Sub;1ea. TQm$ (com", ... "" !f""<UJaryundidcmi/Yl!I'bI<>ct""",btI,) Subgroup Terror ... a System.. Red Bripdos. FLQ. Critical EmIr, DcI"IIilimi.:B1lon. MeI'l:lIIial Success. Burnout. 19Abs1f11C1(contI""""" ",i/""""'_""'whybl<>d""""-J This thesis shows how a government actor can use systems theory to hasten the deeline of a terrorist group.
    [Show full text]
  • The Evolution of Terrorism in Greece from 1975 to 2009
    Research Paper No. 158 Georgia Chantzi (Associate in the International Centre for Black Sea Studies, ICBSS) THE EVOLUTION OF TERRORISM IN GREECE FROM 1975 TO 2009 Copyright: University of Coventry, (Dissertation in the Humanities and Social Science), UK. PS. Mrs. Georgia Chantzi permitted RIEAS to publish her Research Thesis (MA). RESEARCH INSTITUTE FOR EUROPEAN AND AMERICAN STUDIES (RIEAS) # 1, Kalavryton Street, Alimos, Athens, 17456, Greece RIEAS URL:http://www.rieas.gr 1 RIEAS MISSION STATEMENT Objective The objective of the Research Institute for European and American Studies (RIEAS) is to promote the understanding of international affairs. Special attention is devoted to transatlantic relations, intelligence studies and terrorism, European integration, international security, Balkan and Mediterranean studies, Russian foreign policy as well as policy making on national and international markets. Activities The Research Institute for European and American Studies seeks to achieve this objective through research, by publishing its research papers on international politics and intelligence studies, organizing seminars, as well as providing analyses via its web site. The Institute maintains a library and documentation center. RIEAS is an institute with an international focus. Young analysts, journalists, military personnel as well as academicians are frequently invited to give lectures and to take part in seminars. RIEAS maintains regular contact with other major research institutes throughout Europe and the United States and, together with similar institutes in Western Europe, Middle East, Russia and Southeast Asia. Status The Research Institute for European and American Studies is a non-profit research institute established under Greek law. RIEAS‟s budget is generated by membership subscriptions, donations from individuals and foundations, as well as from various research projects.
    [Show full text]
  • 595 an Empirical Study of Terrorism Prosecutions in Canada
    EMPIRICAL STUDY OF TERRORISM PROSECUTIONS IN CANADA 595 AN EMPIRICAL STUDY OF TERRORISM PROSECUTIONS IN CANADA: ELUCIDATING THE ELEMENTS OF THE OFFENCES MICHAEL NESBITT* AND DANA HAGG** It has now been over 15 years since Canada enacted the Anti-Terrorism Act, codifying what we think of today as Canada’s anti-terrorism criminal laws. The authors set out to canvass how these provisions have been judicially interpreted since their inception through an empirical analysis of court decisions. After exploring how courts have settled initial concerns about these provisions with respect to religious and expressive freedoms, the authors suggest that courts’ interpretations of Canada’s terrorism offences still leave us with many questions, particularly with respect to the facilitation and financing offences. The authors explore these questions and speculate about future challenges that may or may not be successful with the hopes of providing guidance to prosecutors and defence lawyers working in this area. TABLE OF CONTENTS I. INTRODUCTION ............................................. 595 II. TERRORISM PROSECUTIONS TO DATE ............................ 599 III. JUDICIAL INTERPRETATIONS OF THE ELEMENTS OF TERRORISM OFFENCES .................................... 608 A. DEFINITIONS (SECTION 83.01)............................. 608 B. OFFENCES ............................................ 620 IV. CONCLUSIONS AND FUTURE CONSIDERATIONS ....................... 647 I. INTRODUCTION It has now been over 15 years since Canada expeditiously enacted the Anti-Terrorism
    [Show full text]
  • Stalkerware-Holistic
    The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry By Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, Ronald Deibert JUNE 2017 RESEARCH REPORT #119 A PREDATOR IN YOUR POCKET A Multidisciplinary Assessment of the Stalkerware Application Industry By Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ronald Deibert Research report #119 June 2019 This page is deliberately left blank Copyright © 2019 Citizen Lab, “The Predator in Your Pocket: A Multidisciplinary Assessment of the Stalkerware Application Industry,” by Christopher Parsons, Adam Molnar, Jakub Dalek, Jeffrey Knockel, Miles Kenyon, Bennett Haselton, Cynthia Khoo, and Ronald Deibert. Licensed under the Creative Commons BY-SA 4.0 (Attribution-ShareAlike Licence) Electronic version first published by the Citizen Lab in 2019. This work can be accessed through https://citizenlab.ca. Citizen Lab engages in research that investigates the intersection of digital technologies, law, and human rights. Document Version: 1.0 The Creative Commons Attribution-ShareAlike 4.0 license under which this report is licensed lets you freely copy, distribute, remix, transform, and build on it, as long as you: • give appropriate credit; • indicate whether you made changes; and • use and link to the same CC BY-SA 4.0 licence. However, any rights in excerpts reproduced in this report remain with their respective authors; and any rights in brand and product names and associated logos remain with their respective owners. Uses of these that are protected by copyright or trademark rights require the rightsholder’s prior written agreement.
    [Show full text]