E155 Building Design for Homeland Security

Total Page:16

File Type:pdf, Size:1020Kb

E155 Building Design for Homeland Security Instructor Guide Risk Management Series Building Design for Homeland Security Instructor Guide January 2004 FEMA E 155 E155/ January 2004 RISK MANAGEMENT SERIES Building Design for Homeland Security PROVIDING PROTECTION TO PEOPLE AND BUILDINGS Instructor Guide www.fema.gov Any opinions, findings, conclusions, or recommendations expressed in this publication do not necessarily reflect the views of FEMA. Additionally, neither FEMA or any of its employees makes any warrantee, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, product, or process included in this publication. Users of information from this publication assume all liability arising from such use. BACKGROUND AND ACKNOWLEDGMENTS BACKGROUND The Federal Emergency Management Agency (FEMA) developed the Building Design for Homeland Security Course (E155), to provide needed information on how to mitigate the effects of potential terrorist attacks. The purpose of E155 is to familiarize students with assessment methodologies available to identify the relative level of risk for various threats, including blast and chemical, biological, or radiological. The students will be introduced to FEMA 426 and will be asked to provide cost-effective mitigation measures for a range of manmade hazards. The primary target audience for this course includes engineers, architects, and building officials. ACKNOWLEDGMENTS Principal Authors: Michael Chipley, UTD, Inc. Michael Kaminskas, UTD, Inc. Contributors: Milagros Kennett, FEMA, Project Officer, Risk Management Series Publications Dan Bondroff, EMI Training Specialist Eric Letvin, Greenhorne & O’Mara, Inc., Consultant Project Manager Christopher Arnold, Building Systems Development, Inc. Dwight Johnson, All About Training Instruction System Designer Gina Wightman, All About Training Instruction System Designer Deb Daly, Greenhorne & O’Mara, Inc. Wanda Rizer, Greenhorne & O’Mara, Inc. Julie Liptak, Greenhorne & O’Mara, Inc. BACKGROUND AND ACKNOWLEDGMENTS i This course was prepared under contract to FEMA. It will be revised periodically, and comments and feedback to improve future editions are welcome. Please send comments and feedback by e-mail to [email protected] ii BACKGROUND AND ACKNOWLEDGMENTS Course Title: Building Design for Homeland Security AGENDA Day 1 Instructor 8:30 a.m. Unit I – Introduction and Course Michael Chipley, Ph.D. Overview 10:00 a.m. Break Eric Letvin, Esq. 10:15 a.m. Unit II – Asset Value Assessment Eric Letvin, Esq. 11:30 a.m. Lunch Eric Letvin, Esq. 12:30 p.m. Unit III – Threat/Hazard Assessment Michael Chipley, Ph.D. 1:45 p.m. Break Eric Letvin, Esq. 2:00 p.m. Unit IV – Vulnerability Assessment Michael Kaminskas, P.E. 3:45 p.m. Break Eric Letvin, Esq. 4:00 p.m. Unit V – Risk Assessment/Risk Eric Letvin, Esq. Management 4:45 p.m. Day 1 Wrap-up and Day 2 Forecast Eric Letvin, Esq. 5:00 p.m. Dinner Eric Letvin, Esq. Course Title: Building Design for Homeland Security AGENDA Day 2 Instructor 8:30 a.m. Day 1 Review and Day 2 Overview Eric Letvin, Esq. 8:45 a.m. Unit V – Risk Assessment/Risk Michael Chipley, Ph.D. Management (continued) 9:15 a.m. Unit VI – Explosive Blast Michael Kaminskas, P.E. 10:15 a.m. Break Eric Letvin, Esq. 10:30 a.m. Unit VII – Chemical, Biological, and Michael Chipley, Ph.D. Radiological Measures 11:30 a.m. Lunch Eric Letvin, Esq. 12:30 p.m. Written Exam Michael Chipley, Ph.D. Michael Kaminskas, P.E. 1:00 p.m. Written Exam Review Michael Chipley, Ph.D. Michael Kaminskas, P.E. 1:30 p.m. Break Eric Letvin, Esq. 1:45 p.m. Unit VIII – Site and Layout Design Chris Arnold, FAIA Guidance 3:30 p.m. Break Eric Letvin, Esq. 3:45 p.m. Unit VIII – Site and Layout Design Chris Arnold, FAIA Guidance (continued) 4:30 p.m. Day 2 Wrap-up and Day 3 Forecast Eric Letvin, Esq. 5:00 p.m. Dinner Eric Letvin, Esq. Course Title: Building Design for Homeland Security AGENDA Day 3 Instructor 8:30 a.m. Day 2 Review and Day 3 Overview Eric Letvin, Esq. 8:45 a.m. Unit IX – Building Design Guidance Michael Kaminskas, P.E. 10:15 a.m. Break Eric Letvin, Esq. 10:30 a.m. Unit IX – Building Design Guidance Michael Kaminskas, P.E. (continued) 11:30 a.m. Lunch Eric Letvin, Esq. 12:30 p.m. Unit X – Electronic Security Systems Eric Letvin, Esq. 1:15 p.m. Break Eric Letvin, Esq. 1:30 p.m. Unit XI – Finalization of Case Study Michael Chipley, Ph.D. Results [Goal is to brief building owner on Michael Kaminskas, P.E. prioritized recommendations and justifications for security work.] 2:15 p.m. Break Eric Letvin, Esq. 2:30 p.m. Unit XI – Presentation of Group Case Michael Chipley, Ph.D. Study Results and Discussion (continued) Michael Kaminskas, P.E. [Assumes 6 teams and 10 minutes per team to present and 5 minutes per team to discuss.] 4:00 p.m. Unit XII – Course Wrap-up Eric Letvin, Esq. 5:00 p.m. Adjourn Eric Letvin, Esq. Course Title: Building Design for Homeland Security Unit I: Introduction and Course Overview Unit I COURSE TITLE Building Design for Homeland Security TIME 90 minutes UNIT TITLE Introduction and Course Overview OBJECTIVES 1. Describe the goal, objectives, and agenda for the course 2. Describe and find material in the course reference manual and student activity handout SCOPE The following topics will be covered in this unit: 1. Welcome and Opening Remarks 2. Instructor Introductions 3. Administrative Information 4. Student Introductions 5. Course Overview 6. Course Materials 7. Activity: Become familiar with Case Study materials REFERENCES 1. Course Agenda 2. Course Goal and Objectives 3. EMI Evaluation Forms 4. FEMA 426, Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings 5. Student Manual, Unit I 6. Case Study, Hazardville Information Company (HIC), for student activities 7. Unit I visuals REQUIREMENTS 1. FEMA 426, Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings (one per student) 2. Instructor Guide 3. Student Manual (one per student) 4. Overhead projector or computer display unit 5. Unit I visuals 6. Chart paper, easel, and markers IG I - 1 Unit I UNIT I OUTLINE Time Page I. Introduction and Course Overview 90 minutes IG I-3 1. Welcome and Opening Remarks 5 minutes IG I-3 2. Instructor Introductions 5 minutes IG I-3 3. Administrative Information 5 minutes IG I-3 4. Student Introductions 30 minutes IG I-3 5. Course Overview 15 minutes IG I-6 6. Course Materials 20 minutes IG I-8 7. Summary and Transition 10 minutes IG I-21 PREPARING TO TEACH THIS UNIT · Tailoring Content to the Local Area: Review the Instructor Notes to identify topics that should focus on the local area. Plan how you will use the generic content, and prepare for a locally oriented discussion. · Optional Activity: There are no optional activities in this unit. · Activity: The students will begin the familiarization with the Case Study materials. The Case Study is a complete risk assessment and analysis of mitigation options and strategies for a typical commercial office building located in a mixed urban-suburban environment business park. The assessment will use the DoD Antiterrorism standards and the GSA Interagency Security Criteria to determine Levels of Protection and identify specific vulnerabilities. Mitigation options and strategies will use the concepts provided in FEMA 426 and other standard reference materials such as the RS Means Building Security: Strategy and Costs, NFPA 5000, and other FEMA publications related to emergency planning and disaster recovery. · Refer students to their Student Manuals for worksheets and activities. IG I - 2 Course Title: Building Design for Homeland Security Unit I: Introduction and Course Overview INSTRUCTOR NOTES CONTENT/ACTIVITY VISUAL I-1 Welcome and Opening Remarks Welcome the students to the Building Design for Homeland Security Course. Introduce yourself, using: · Your name · A brief statement of background and experience Make the necessary administrative announcements, including: · Housing, parking, and meals · Attendance, start/stop times, breaks · Restroom locations · Messages and emergencies · Fire exits VISUAL I-2 Student Introductions Participant Introductions Ask the students to introduce themselves, Name including: Affiliation · Name Area of Concentration · Affiliation, brief background and experience statement, including work in • the course topic area if applicable €•€€• · One reason they are attending the course · What they plan to do with what they learn BUILDING DESIGN FOR HOMELAND SECURITY Unit I-2 IG I - 3 Course Title: Building Design for Homeland Security Unit I: Introduction and Course Overview INSTRUCTOR NOTES CONTENT/ACTIVITY VISUAL I-3 Course Goal Course Goal The goal of this course is to enhance student To enhance student understanding of the measures and technology understanding of the available to reduce risk from terrorist attack. measures and technology available to reduce risk from terrorist attack. Included in this understanding is the process for assessing risk to focus upon which mitigation measures have the greatest FEMA applicability and benefit. The students will understand the design approaches to mitigate U.S. AIR FORCE manmade hazards and comprehend the trade- BUILDING DESIGN FOR HOMELAND SECURITY Unit I-3 offs needed to optimize various design requirements. VISUAL I-4 Course Objectives Course Objectives The primary target audience for this course Participants will be able to: will be engineers, architects, and state and local government and building officials with 1. Explain the basic components of the assessment methodology. engineering and architectural backgrounds 2. Appreciate the different assessment methodology involved in mitigation planning and design to approaches that can be used. 3. Perform an assessment for a building by protect people and property against manmade identifying and prioritizing assets, threats, and hazards. vulnerabilities and calculating relative risk. After attending the Building Design for Homeland Security course, participants should BUILDING DESIGN FOR HOMELAND SECURITY Unit I-4 be able to: 1.
Recommended publications
  • The Palestinians' Right of Return Point
    Human Rights Brief Volume 8 | Issue 2 Article 2 2001 Point: The alesP tinians' Right of Return Hussein Ibish Ali Abunimah Follow this and additional works at: http://digitalcommons.wcl.american.edu/hrbrief Part of the Human Rights Law Commons, and the International Law Commons Recommended Citation Ibish, Hussein, and Ali Abunimah. "Point: The aleP stinians' Right of Return." Human Rights Brief 8, no. 2 (2001): 4, 6-7. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Human Rights Brief by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Ibish and Abunimah: Point: The Palestinians' Right of Return point/ The Palestinians’ Right of Return The Controversy Over the by Hussein Ibish and Ali Abunimah* Right of Return alestinians are the largest and In 1947, after a wave of Jewish immigration, the United Nations most long-suffering refugee pop- voted to divide Palestine into Arab and Jewish sectors, with Jerusalem Pulation in the world. There are administered as an international enclave. Despite Arab opposition, more than 3.7 million Palestinians reg- istered as refugees by the United the Jews began to build their own state. On May 14, 1948, Israel Nations Relief and Work Agency declared its independence. Shortly thereafter, the War of Indepen- (UNRWA), the UN agency responsi- dence broke out when Egypt, Syria, Jordan, and Lebanon refused to ble for them.
    [Show full text]
  • I Want to Believe I Want to Believe Posadism, Ufos, and Apocalypse Communism
    I Want to Believe I Want to Believe Posadism, UFOs, and Apocalypse Communism A.M. Gittlitz First published 2020 by Pluto Press 345 Archway Road, London N6 5AA www.plutobooks.com Copyright © A.M. Gittlitz 2020 Every effort has been made to trace copyright holders and to obtain their permission for the use of copyright material in this book. The publisher apologises for any errors or omissions in this respect and would be grateful if notified of any corrections that should be incorporated in future reprints or editions. The right of A.M. Gittlitz to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library ISBN 978 0 7453 4076 0 Hardback ISBN 978 0 7453 4077 7 Paperback ISBN 978 1 7868 0619 2 PDF eBook ISBN 978 1 7868 0621 5 Kindle eBook ISBN 978 1 7868 0620 8 EPUB eBook This book is printed on paper suitable for recycling and made from fully managed and sustained forest sources. Logging, pulping and manufacturing processes are expected to conform to the environmental standards of the country of origin. Typeset by Stanford DTP Services, Northampton, England Contents List of Illustrations vii List of Abbreviations viii Acknowledgements x Introduction 1 PART I: THE TRAGIC CENTURY 1. Commentaries on the Infancy of Comrade Posadas 19 2. Revolutionary Youth or Patriotic Youth? 24 3. The Death Throes of Capitalism 34 4. The Origins of Posadism 42 5.
    [Show full text]
  • National Strategy for Homeland Security 2007
    national strategy for HOMELAND SECURITY H OMELAND SECURITY COUNCIL OCTOBER 2 0 0 7 national strategy for HOMELAND SECURITY H OMELAND SECURITY COUNCIL OCTOBER 2 0 0 7 My fellow Americans, More than 6 years after the attacks of September 11, 2001, we remain at war with adversar- ies who are committed to destroying our people, our freedom, and our way of life. In the midst of this conflict, our Nation also has endured one of the worst natural disasters in our history, Hurricane Katrina. As we face the dual challenges of preventing terrorist attacks in the Homeland and strengthening our Nation’s preparedness for both natural and man-made disasters, our most solemn duty is to protect the American people. The National Strategy for Homeland Security serves as our guide to leverage America’s talents and resources to meet this obligation. Despite grave challenges, we also have seen great accomplishments. Working with our part- ners and allies, we have broken up terrorist cells, disrupted attacks, and saved American lives. Although our enemies have not been idle, they have not succeeded in launching another attack on our soil in over 6 years due to the bravery and diligence of many. Just as our vision of homeland security has evolved as we have made progress in the War on Terror, we also have learned from the tragedy of Hurricane Katrina. We witnessed countless acts of courage and kindness in the aftermath of that storm, but I, like most Americans, was not satisfied with the Federal response. We have applied the lessons of Katrina to thisStrategy to make sure that America is safer, stronger, and better prepared.
    [Show full text]
  • The Dynamics of Syria's Civil
    CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Browse Reports & Bookstore TERRORISM AND Make a charitable contribution HOMELAND SECURITY For More Information Visit RAND at www.rand.org Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. RAND perspectives (PEs) present informed perspective on a timely topic that address the challenges facing the public and private sectors. All RAND perspectives undergo rigorous peer review to ensure high standards for research quality and objectivity. Perspective C O R P O R A T I O N Expert insights on a timely policy issue The Dynamics of Syria’s Civil War Brian Michael Jenkins Principal Observations One-third of the population has fled the country or has been displaced internally.
    [Show full text]
  • A Schema of Right-Wing Extremism in the United States
    ICCT Policy Brief October 2019 DOI: 10.19165/2019.2.06 ISSN: 2468-0486 A Schema of Right-Wing Extremism in the United States Author: Sam Jackson Over the past two years, and in the wake of deadly attacks in Charlottesville and Pittsburgh, attention paid to right-wing extremism in the United States has grown. Most of this attention focuses on racist extremism, overlooking other forms of right-wing extremism. This article presents a schema of three main forms of right-wing extremism in the United States in order to more clearly understand the landscape: racist extremism, nativist extremism, and anti-government extremism. Additionally, it describes the two primary subcategories of anti-government extremism: the patriot/militia movement and sovereign citizens. Finally, it discusses whether this schema can be applied to right-wing extremism in non-U.S. contexts. Key words: right-wing extremism, racism, nativism, anti-government A Schema of Right-Wing Extremism in the United States Introduction Since the public emergence of the so-called “alt-right” in the United States—seen most dramatically at the “Unite the Right” rally in Charlottesville, Virginia, in August 2017—there has been increasing attention paid to right-wing extremism (RWE) in the United States, particularly racist right-wing extremism.1 Violent incidents like Robert Bowers’ attack on the Tree of Life synagogue in Pittsburgh, Pennsylvania in October 2018; the mosque shooting in Christchurch, New Zealand in March 2019; and the mass shooting at a Walmart in El Paso, Texas in August
    [Show full text]
  • 9110-9P Department of Homeland Security
    This document is scheduled to be published in the Federal Register on 06/23/2021 and available online at federalregister.gov/d/2021-13109, and on govinfo.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY [Docket No. CISA-2020-0018] Agency Information Collection Activities: Proposed Collection; Comment Request; Cybersecurity and Infrastructure Security Agency (CISA) Visitor Request Form AGENCY: Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS). ACTION: 30-day notice and request for comments; reinstatement without change of information collection request: 1670-0036. SUMMARY: The Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Office of Compliance and Security (OCS), as part of its continuing effort to reduce paperwork and respondent burden, invites the general public to take this opportunity to comment on a reinstatement, without change, of a previously approved information collection for which approval has expired. CISA will submit the following Information Collection Request to the Office of Management and Budget (OMB) for review and clearance in accordance with the Paperwork Reduction Act of 1995. CISA previously published a notice about this ICR, in the Federal Register on February 17, 2021, for a 60-day public comment period. There were no comments received. The purpose of this notice is to allow additional 30-days for public comments. DATES: The comment period for the information collection request published on February 17, 2021 at 86 FR 9949. Comments must be submitted on or before [INSERT DATE 30 DAYS AFTER DATE OF PUBLICATION IN THE FEDERAL REGISTER]. ADDRESSES: Written comments and recommendations for the proposed information collection should be sent within 30 days of publication of this notice to www.reginfo.gov/public/do/PRAMain .
    [Show full text]
  • Pointing Towards Clarity Or Missing the Point? a Critique of the Proposed "Social Group" Rule and Its Impact on Gender-Based Political Asylum
    POINTING TOWARDS CLARITY OR MISSING THE POINT? A CRITIQUE OF THE PROPOSED "SOCIAL GROUP" RULE AND ITS IMPACT ON GENDER-BASED POLITICAL ASYLUM LOREN G. STEWART* From the beginning of the marriage, her husband abused her. He raped her almost daily, beating her before and during each rape. He once dislocated her jawbone because her menstrual period was fifteen days late. When she refused to abort a pregnancy, he kicked her violently in her spine. Once, he kicked her in her genitalia, causing her severe pain and eight days of bleeding. She fled the city with their children, but he tracked them down and beat her unconscious. He broke windows and mirrors with her head. He told her that if she left him, he would find her, cut off her arms and legs with a machete and leave her in a wheelchair. She attempted suicide, but was unsuccessful. She contacted the police three times, but they did not respond. A judge denied her protection, saying that the court "would not interfere in domestic disputes."' She finally left him, fled to the United States, and applied for political asylum. Should women like Rodi Alvarado Pefia, described above, be eligible to receive political asylum in the United States?2 To be J.D. Candidate 2005, University of Pennsylvania Law School. B.A. History, cum laude, Yale University 1999. The author wishes to express his gratitude to Professors Fernando Chang-Muy, Louis S. Rulli and Catherine Struve for their guidance, enthusiasm, and inspiration. ratience,In re R-A-, 22 I. & N. Dec. 906, 908-10 (BIA 1999, Att'y Gen.
    [Show full text]
  • A Governor's Guide to Homeland Security
    A GOVERNOR’S GUIDE TO HOMELAND SECURITY THE NATIONAL GOVERNORS ASSOCIATION (NGA), founded in 1908, is the instrument through which the nation’s governors collectively influence the development and implementation of national policy and apply creative leadership to state issues. Its members are the governors of the 50 states, three territories and two commonwealths. The NGA Center for Best Practices is the nation’s only dedicated consulting firm for governors and their key policy staff. The NGA Center’s mission is to develop and implement innovative solutions to public policy challenges. Through the staff of the NGA Center, governors and their policy advisors can: • Quickly learn about what works, what doesn’t and what lessons can be learned from other governors grappling with the same problems; • Obtain specialized assistance in designing and implementing new programs or improving the effectiveness of current programs; • Receive up-to-date, comprehensive information about what is happening in other state capitals and in Washington, D.C., so governors are aware of cutting-edge policies; and • Learn about emerging national trends and their implications for states, so governors can prepare to meet future demands. For more information about NGA and the Center for Best Practices, please visit www.nga.org. A GOVERNOR’S GUIDE TO HOMELAND SECURITY NGA Center for Best Practices Homeland Security & Public Safety Division FEBRUARY 2019 Acknowledgements A Governor’s Guide to Homeland Security was produced by the Homeland Security & Public Safety Division of the National Governors Association Center for Best Practices (NGA Center) including Maggie Brunner, Reza Zomorrodian, David Forscey, Michael Garcia, Mary Catherine Ott, and Jeff McLeod.
    [Show full text]
  • Worldwide Attacks Against Dams
    Worldwide Attacks Against Dams A Historical Threat Resource for Owners and Operators 2012 i ii Preface This product is a compilation of information related to incidents that occurred at dams or related infrastructure world-wide. The information was gathered using domestic and foreign open-source resources as well as other relevant analytical products and databases. This document presents a summary of real-world events associated with physical attacks on dams, hydroelectric generation facilities and other related infrastructure between 2001 and 2011. By providing an historical perspective and describing previous attacks, this product provides the reader with a deeper and broader understanding of potential adversarial actions against dams and related infrastructure, thus enhancing the ability of Dams Sector-Specific Agency (SSA) partners to identify, prepare, and protect against potential threats. The U.S. Department of Homeland Security (DHS) National Protection and Programs Directorate’s Office of Infrastructure Protection (NPPD/IP),which serves as the Dams Sector- Specific Agency (SSA), acknowledges the following members of the Dams Sector Threat Analysis Task Group who reviewed and provided input for this document: Jeff Millenor – Bonneville Power Authority John Albert – Dominion Power Eric Martinson – Lower Colorado River Authority Richard Deriso – Federal Bureau of Investigation Larry Hamilton – Federal Bureau of Investigation Marc Plante – Federal Bureau of Investigation Michael Strong – Federal Bureau of Investigation Keith Winter – Federal Bureau of Investigation Linne Willis – Federal Bureau of Investigation Frank Calcagno – Federal Energy Regulatory Commission Robert Parker – Tennessee Valley Authority Michael Bowen – U.S. Department of Homeland Security, NPPD/IP Cassie Gaeto – U.S. Department of Homeland Security, Office of Intelligence and Analysis Mark Calkins – U.S.
    [Show full text]
  • Transnational Ethnic Communities and Rebel Groups' Strategies in a Civil Conflict
    Transnational Ethnic Communities and Rebel Groups’ Strategies in a Civil Conflict The case of the Karen National Union rebellion in Myanmar Bethsabée Souris University College London (UCL) 2020 A thesis submitted for the degree of Doctor of Philosophy in Political Science I, Bethsabée Souris, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the thesis 1 2 Abstract Few studies have systematically analysed how transnational ethnic kin groups affect the behaviour of domestic ethnic groups in an insurgency, in particular how they have an effect on the types of activities they conduct and their targets. The research question of this study is: What are the mechanisms through which transnational ethnic kin groups influence the domestic rebel ethnic group’s strategies? This thesis analyses the influence of transnational communities on domestic challengers to the state as a two-step process. First, it investigates under which conditions transnational ethnic kin groups provide political and economic support to the rebel ethnic group. It shows that networks between rebel groups and transnational communities, which can enable the diffusion of the rebel group’s conflict frames, are key to ensure transnational support. Second, it examines how such transnational support can influence rebel groups’ strategies. It shows that central to our understanding of rebel groups’ strategies is the cohesion (or lack thereof) of the rebel group. Furthermore, it identifies two sources of rebel group’s fragmentation: the state counter-insurgency strategies, and transnational support. The interaction of these two factors can contribute to the fragmentation of the group and in turn to a shift in the strategies it conducts.
    [Show full text]
  • WAR in the WEST the Bundy Ranch Standoff and the American Radical Right
    WAR IN THE WEST The Bundy Ranch Standoff and the American Radical Right A Special Report from the Southern Poverty Law Center Montgomery, Alabama JULY 2014 southern poverty law center WAR IN THE WEST The Bundy Ranch Standoff and the American Radical Right THE SOUTHERN POVERTY LAW CENTER is a nonprofit organization that combats hate, intolerance and discrimination through education and litigation. Its Intelligence Project, which prepared this report and also produces the quarterly investigative magazine Intelligence Report, tracks the activities of hate groups and the nativist movement and monitors militia and other extremist antigovernment activity. Its Teaching Tolerance project helps foster respect and understanding in the classroom. Its litigation arm files lawsuits against hate groups for the violent acts of their members. MEDIA AND GENERAL INQUIRIES Mark Potok or Heidi Beirich Southern Poverty Law Center 400 Washington Ave., Montgomery, Ala. (334) 956-8200 www.splcenter.org This report was prepared by the staff of the Intelligence Project of the Southern Poverty Law Center. The Center is supported entirely by private donations. No government funds are involved. © Southern Poverty Law Center. All rights reserved. southern poverty law center about the report Written by Ryan Lenz and Mark Potok Edited by Heidi Beirich Designed by Russell Estes, Shannon Anderson and Sunny Paulk Cover photos by Jim Urquhart/Reuters/Corbis and Ryan Lenz southern poverty law center table of contents Executive Summary 5 Guns of April: The Bundy Standoff 8 Backgrounding Bundy: The Movement 18 Land Use and the ‘Patriots’: A Timeline 22 southern poverty law center After the climbdown: Militiamen and other support- ers of Cliven Bundy head for the corral where govern- ment agents were holding the Nevadan’s cattle.
    [Show full text]
  • The Ukrainian Weekly 1983, No.7
    www.ukrweekly.com Published by the Ukrainian National Association Inc., a fraternal non-profit association! rainian Weekly - 9 -4 Vol. LI No. 7 THE UKRAINIAN WEEKLY SUNDAY, FEBRUARY 13,1983 25 cen^: Patriarch Josyf opens synod session National committee is formed VATICAN CITY - Patriarch Josyf Also on Sunday, January 30, the Rev. Slipyj addressed the first session of the Michael Hrynchyshyn, a Redemptorist to commemorate famine Synod of Ukrainian Catholic Bishops priest from Canada, was consecrated held here on Sunday, January 30, by bishop in Rome. Pope John Paul II had SOUTH BOUND BROOK, N.J. - Philadelphia was elected chairman, and saying that "this is a historic event in the named the clergyman apostolic exarch Representatives of 45 U.S. Ukrainian Dr. Anatoly Lysyj, Valentyna Kuzmych life of our Church," reported the weekly for Ukrainian Catholics in France. He organizations met on Saturday, Ja­ and representatives of three Ukrainian English edition of America, the Ukrai­ will succeed Bishop Volodymyr Маїап– nuary 29, here at the Ukrainian Ortho­ fraternal organizations - the Ukrai­ nian Catholic daily. chuk, who requested to be released from dox Church Center's Home of Ukrai­ nian National Association, Ukrainian The patriarch told the bishops his duties. nian Culture to discuss plans for obser­ Fraternal Association and the Pro­ gathered at the synod that it was not just The Rev. Hrynchyshyn was conse­ vances of the 50th anniversary of the vidence Association of Ukrainian Ca­ an occasion to solve problems, to ex­ crated bishop by Patriarch Josyf; the Soviet-made famine of 1932-33, and tholics — were elected vice chairmen.
    [Show full text]