A Psychiatrist's Experience During the Drawdown in Vietnam: Coping
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. -
The Psychological Impact of Child Soldiering
Chapter 14 The Psychological Impact of Child Soldiering Elisabeth Schauer and Thomas Elbert Abstract With almost 80% of the fighting forces composed of child soldiers, this is one characterization of the ‘new wars,’ which constitute the dominant form of violent conflict that has emerged only over the last few decades. The development of light weapons, such as automatic guns suitable for children, was an obvious pre- requisite for the involvement of children in modern conflicts that typically involve irregular forces, that target mostly civilians, and that are justified by identities, although the economic interests of foreign countries and exiled communities are usually the driving force. Motivations for child recruitment include children’s limited ability to assess risks, feelings of invulnerability, and shortsightedness. Child soldiers are more often killed or injured than adult soldiers on the front line. They are less costly for the respective group or organization than adult recruits, because they receive fewer resources, including less and smaller weapons and equipment. From a different per- spective, becoming a fighter may seem an attractive possibility for children and adolescents who are facing poverty, starvation, unemployment, and ethnic or polit- ical persecution. In our interviews, former child soldiers and commanders alike reported that children are more malleable and adaptable. Thus, they are easier to indoctrinate, as their moral development is not yet completed and they tend to listen to authorities without questioning them. Child soldiers are raised in an environment of severe violence, experience it, and subsequently often commit cruelties and atrocities of the worst kind. This repeated exposure to chronic and traumatic stress during development leaves the children with mental and related physical ill-health, notably PTSD and severe personality E. -
CIA Best Practices in Counterinsurgency
CIA Best Practices in Counterinsurgency WikiLeaks release: December 18, 2014 Keywords: CIA, counterinsurgency, HVT, HVD, Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan, Thailand,HAMAS, FARC, PULO, AQI, FLN, IRA, PLO, LTTE, al-Qa‘ida, Taliban, drone, assassination Restraint: SECRET//NOFORN (no foreign nationals) Title: Best Practices in Counterinsurgency: Making High-Value Targeting Operations an Effective Counterinsurgency Tool Date: July 07, 2009 Organisation: Central Intelligence Agency (CIA) Author: CIA Office of Transnational Issues; Conflict, Governance, and Society Group Link: http://wikileaks.org/cia-hvt-counterinsurgency Pages: 21 Description This is a secret CIA document assessing high-value targeting (HVT) programs world-wide for their impact on insurgencies. The document is classified SECRET//NOFORN (no foreign nationals) and is for internal use to review the positive and negative implications of targeted assassinations on these groups for the strength of the group post the attack. The document assesses attacks on insurgent groups by the United States and other countries within Afghanistan, Algeria, Colombia, Iraq, Israel, Peru, Northern Ireland, Sri Lanka, Chechnya, Libya, Pakistan and Thailand. The document, which is "pro-assassination", was completed in July 2009 and coincides with the first year of the Obama administration and Leon Panetta's directorship of the CIA during which the United States very significantly increased its CIA assassination program at the -
Cognitive Warfare.Pdf
1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose. -
Hand Gestures
L2/16-308 More hand gestures To: UTC From: Peter Edberg, Emoji Subcommittee Date: 2016-10-31 Proposed characters Tier 1: Two often-requested signs (ILY, Shaka, ILY), and three to complete the finger-counting sets for 1-3 (North American and European system). None of these are known to have offensive connotations. HAND SIGN SHAKA ● Shaka sign ● ASL sign for letter ‘Y’ ● Can signify “Aloha spirit”, surfing, “hang loose” ● On Emojipedia top requests list, but requests have dropped off ● 90°-rotated version of CALL ME HAND, but EmojiXpress has received requests for SHAKA specifically, noting that CALL ME HAND does not fulfill need HAND SIGN ILY ● ASL sign for “I love you” (combines signs for I, L, Y), has moved into mainstream use ● On Emojipedia top requests list HAND WITH THUMB AND INDEX FINGER EXTENDED ● Finger-counting 2, European style ● ASL sign for letter ‘L’ ● Sign for “loser” ● In Montenegro, sign for the Liberal party ● In Philippines, sign used by supporters of Corazon Aquino ● See Wikipedia entry HAND WITH THUMB AND FIRST TWO FINGERS EXTENDED ● Finger-counting 3, European style ● UAE: Win, victory, love = work ethic, success, love of nation (see separate proposal L2/16-071, which is the source of the information below about this gesture, and also the source of the images at left) ● Representation for Ctrl-Alt-Del on Windows systems ● Serbian “три прста” (tri prsta), symbol of Serbian identity ● Germanic “Schwurhand”, sign for swearing an oath ● Indication in sports of successful 3-point shot (basketball), 3 successive goals (soccer), etc. HAND WITH FIRST THREE FINGERS EXTENDED ● Finger-counting 3, North American style ● ASL sign for letter ‘W’ ● Scout sign (Boy/Girl Scouts) is similar, has fingers together Tier 2: Complete the finger-counting sets for 4-5, plus some less-requested hand signs. -
How the Black Power Protest at the 1968 Olympics Killed Careers
https://www.history.com/news/1968-mexico-city-olympics-black-power-protest-backlash UPDATED: OCT 19, 2018 ORIGINAL: FEB 22, 2018 How the Black Power Protest at the 1968 Olympics Killed Careers ERIN BLAKEMORE It’s an iconic image: Two athletes raise their fists on the Olympic podium. The photograph, taken after the 200 meter race at the 1968 Summer Olympics in Mexico City, turned African-American athletes Tommie Smith and John Carlos from track-and-field stars into the center of a roiling controversy over their raised-fist salute, a symbol of black power and the human rights movement at large. But look in the photo and you’ll see another man as well: silver medalist Peter Norman, a white Australian runner. Norman didn’t raise his fist that day, but he stood with Smith and Carlos. Though his show of solidarity ended up destroying Norman’s career, the three athletes’ actions that day would be just one in a line of protests on the athletic stage. 2 U.S. athletes Tommie Smith, center, and John Carlos raise gloved hands skyward during the playing of the Star Spangled Banner after Smith reCeived the gold and Carlos the bronze for the 200 meter run at the Summer Olympic Games in MexiCo City, 1968. AP Photo Smith and Carlos, who had won gold and bronze, respectively, agreed to use their medal wins as an opportunity to highlight the social issues roiling the United States at the time. Racial tensions were at a height, and the Civil Rights movement had given way to the Black Power movement. -
Information Warfare on the Web in the Middle East
Source: Vice INFORMATION WARFARE ON THE WEB IN THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION 1 BRINGING WEB SCIENCE TO THE MIDDLE EAST KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Created in 2002 at Beirut’s Saint-Joseph University Faculty of Humanities KEEWARD KNOWLEDGE & EDUCATION Interdisciplinary Research Unit In Web Science Digital Transformation of Middle Eastern Societies New paradigms – Arab Spring – Conflicts – ISIS KEEWARD KNOWLEDGE & EDUCATION The Call For a Science of the Web Berners-Lee Interdisciplinarity (The 2 magics) Mixed methods (Data + Social) New tools to understand the impact of the Web on Society From power laws to people (Social Machines) KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Web Science 2010 – Raleigh, NC. Susan Halford, Cathy Pope, Leslie Carr KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Understanding the web requires knowledge and expertise from the social and human sciences KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Computer science is only one vantage point KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Co-constitution of technology and society The Web impacts society and society impacts the Web KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Heterogeneous actors (ANT – Latour) Radical symmetry between humans and non-humans. “the bureaucrat in the standards agency is just as important as the servers at Google or HTTP”. KEEWARD KNOWLEDGE & EDUCATION The Manifesto For Web Science Social and cultural -
B18 Silent Auction Book-Final.Pdf
Silent Auction Guidelines To place a bid, print your first and last name, your telephone number, and your bid amount. There is a minimum opening bid for each item. Bidding cannot start below the minimum. Each item has a mandated bid increase, listed on the bid sheet. Bid increases of less than the indicated amount are invalid. The silent auction will close at the beginning of the event program, at approximately 7:30 p.m. The person on the sheet with the highest valid bid at closing wins the item. Crossroads Fund Please do not bid on items once the auction has closed. Please do not remove any auction items from the display yourself. You can collect and pay for your items as soon as the auction closes, and after the event program. The silent auction check-out area is in the same room as the silent auction. We accept cash, personal checks, MasterCard, Visa, Discover and AMEX. Payment is due by 9:30 p.m. Silent Auction Item List If you are bidding on more than one item, please pay for all of your purchases at once. All sales are final, non-refundable, and items are sold as-is. Crossroads Fund makes no warranties. Crossroads Fund reserves the right to offer any item for which payment by the highest bidder has not been received by 9:30 p.m. to the next highest bidder at their bid price. Do your shopping tonight and support the Auction items typically expire March of 2019. Please refer to your items’ Crossroads Fund! You know you’ll use redeemable certificate for exact details. -
1.Russian Information Weapons; 2.Baltic Department of Defense, Or the US Defenses (Estonia, Latvia, Lithuania) Against Government
Sponsor: USEUCOM Contract No.: W56KGU-17-C-0010 Project No.: 0719S120 The views expressed in this document are those of the author Three Discussions of Russian Concepts: and do not reflect the official policy or position of MITRE, the 1.Russian Information Weapons; 2.Baltic Department of Defense, or the US Defenses (Estonia, Latvia, Lithuania) against government. Russian Propaganda; and 3.Russia’s Development of Non-Lethal Weapons Author: Timothy Thomas March 2020 Approved for Public Release: Distribution Unlimited. Case Numbers 20-0235; 20-0050; 20-0051; 19-3194; and 20-0145. ©2020 The MITRE Corporation. All rights reserved. McClean, VA 1 FOREWORD Russia has long been captivated by the power of information as a weapon, most notably in a historical sense using propaganda to influence and persuade audiences. With the onset of the information age, the concept’s development and application increased dramatically. The power of information-technologies when applied to weaponry increased the latter’s capabilities due to increased reconnaissance and precision applications. The power of social media was used to influence populations both at home and abroad. Both developments fit perfectly into Russia’s information warfare concept, whose two aspects are information-technical and information-psychological capabilities. Information’s universality, covertness, variety of software and hardware forms and implementation, efficiency of use when choosing a time and place of employment, and, finally, cost effectiveness make it a formidable commodity when assessed as weaponry. Russian efforts to define and use IWes are well documented. In the 1990s there were efforts to define information weapons (IWes) at the United Nations, efforts that failed. -
Racial Identity and Racism in the Gay and Lesbian Community in Post-Apartheid South Africa Emily Craven a Research Report Submit
Racial identity and racism in the gay and lesbian community in post-apartheid South Africa Emily Craven A research report submitted to the Faculty of Humanities, University of the Witwatersrand, Johannesburg in partial fulfilment of the requirements for the degree of Master of Arts in Political Studies. May 2011 Declaration I Emily Craven, declare that this research report is my own work. It is being submitted in partial fulfilment for a degree of Master of Arts in Political Studies at the University of the Witwatersrand, Johannesburg. I further declare that neither this report, nor any part of it, has been submitted for any degree or examination at any other university. _______________________ ______________________ i Acknowledgements I want first to say a huge thank you to my mother and father, Norma and Patrick Craven who were willing to take in and support their thirty something daughter when she decided to go back to school, without their endless support both financial and emotional this adventure would not have been possible. Also, to my dearest friend Simonne Horwitz who always believes in me. To my supervisor Antje Schuhmann who first discussed the idea of this work with me under a tent on a dusty field in Kwa Thema some years ago and who has seen it through to the end, thank you so much for everything. In addition I have to thank all the staff in the Wits Political Studies Department, a special thanks to Shireen Hassim for so much help not least for staying up all night to proof read my work, also to those people apart from Antje and Shireen who taught the coursework elements of my MA, Stephen Louw, Estienne Rodary and Malathi De Alwis and finally to Gillian Renshaw who is a superhero. -
H-Diplo Roundtable, Vol
2018 H-Diplo Roundtable Editors: Daniel Steinmetz-Jenkins and Diane @HDiplo Labrosse Roundtable and Web Production Editor: George Fujii Roundtable Review Introduction by Mark Edward Ruff Volume XIX, No. 41 (2018) 25 June 2018 Noah B. Strote. Lions and Lambs: Conflict in Weimar and the Creation of Post-Nazi Germany. New Haven and London: Yale University Press, 2017. ISBN: 9780300219050 (hardcover, $40.00). URL: http://www.tiny.cc/Roundtable-XIX-41 Contents Introduction by Mark Edward Ruff, Saint Louis University ................................................................ 2 Review by Jennifer Allen, Yale University ............................................................................................... 5 Review by James Chappel, Duke University .......................................................................................... 9 Review by Sean Forner, Michigan State University ........................................................................... 15 Review by Terence Renaud, Yale University ........................................................................................ 20 Author’s Response by Noah B. Strote, North Carolina State University ...................................... 24 © 2018 The Authors. Creative Commons Attribution-NonCommercial-NoDerivs 3.0 United States License. H-Diplo Roundtable Review, Vol. XIX, No. 41 (2018) Introduction by Mark Edward Ruff, Saint Louis University oah B. Strote’s new book, Lions and Lambs, could not be more timely. Arriving when liberal democracies are being battered -
Terrorism - the Efinitd Ional Problem Alex Schmid
Case Western Reserve Journal of International Law Volume 36 | Issue 2 2004 Terrorism - The efinitD ional Problem Alex Schmid Follow this and additional works at: https://scholarlycommons.law.case.edu/jil Part of the International Law Commons Recommended Citation Alex Schmid, Terrorism - The Definitional Problem, 36 Case W. Res. J. Int'l L. 375 (2004) Available at: https://scholarlycommons.law.case.edu/jil/vol36/iss2/8 This Article is brought to you for free and open access by the Student Journals at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Case Western Reserve Journal of International Law by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. TERRORISM - THE DEFINITIONAL PROBLEM* Alex Schmidt "Increasingly, questions are being raised about the problem of the definition of a terrorist. Let us be wise and focused about this: terrorism is terrorism.. What looks, smells and kills like terrorism is terrorism." - Sir Jeremy Greenstock, British Ambassador to the UnitedNations, in post September 11, 2001 speech' "It is not enough to declare war on what one deems terrorism without giving a precise and exact definition." - PresidentEmile Lahoud,Lebanon (2004)2 "An objective definition of terrorism is not only possible; it is also indispensable to any serious attempt to combat terrorism." - Boaz Ganor,Director of the InternationalPolicy Institutefor Counter- Terrorism3 * Presented at the War Crimes Research Symposium: "Terrorism on Trial" at Case Western Reserve University School of Law, sponsored by the Frederick K. Cox International Law Center, on Friday, Oct. 8, 2004. t The views and opinions expressed in this paper are solely those of the author and do not represent official positions of the United Nations which has not yet reached a consensus on the definition of terrorism.