Volume XV, Issue 3 June 2021 PERSPECTIVES on TERRORISM Volume 15, Issue 3
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Downloaded from Brill.Com09/29/2021 06:39:09AM Via Free Access
fascism 4 (2015) 209-212 brill.com/fasc Book Review ∵ Mats Deland, Michael Minkenberg and Christin Mays, ed. In the Tracks of Breivik: Far Right Networks in Northern and Eastern Europe (Berlin/ Vienna: lit Verlag, 2014). Four years have already passed since Anders Behring Breivik, apparently single-handedly, committed the most murderous and destructive terrorist atrocity by the far right in post-war Europe. In 2011–2012, particularly during his criminal trial in Oslo, there was a lively public debate in in the Scandinavian media as to whether Breivik was a fascist, or represented some other permuta- tion of the contemporary European far right – an Islamophobic ‘counter-jihad- ist’; a militant, conservative nationalist; or a Christian extremist.1 Somewhat counterintuitively, since then relatively little scholarly attention has been devoted within comparative fascist studies to the implications of Breivik’s deeds, ideology, and self-proclaimed pan-European revolutionary movement. The title of this anthology – In the Tracks of Breivik – would suggest that its primary purpose is to map the far right networks of northern and eastern Europe in relation to the terrorist acts of July 22, 2011. Even if we realize that this formulation is an unfortunate literal translation of the Swedish phrase ‘i spåren av [Breivik]’ – for which a more idiomatic English rendering would be ‘in the wake of [Breivik]’, the implication would still be that the findings of the book are located in some direct relation to Breivik and his crimes. Even the promotional blurb on the back cover, as well as the opening and closing words of the introduction, reinforce this expectation. -
Business As an Instrument of Peace
B U S I N E S S F O R P E A C E R E S E A R C H S Y M P O S I U M Business as an Instrument of Peace 2011 Business for Peace Research Symposium Oslo, October 17 Oslo House of Literature - Oslo Concert Hall - Oslo City Hall Presented by: In collaboration with: Folder2011_V6.indd 1 13.10.11 05.44 Business as an Instrument of Peace – 2011 Business for Peace Research Symposium Together with OECD National Contact Point During the 2011 Business for Peace Symposium, groundbreaking research will be presented providing Norway, the U.S. Institute of Peace, and the insights into how business and society best can work Peace Research Institute Oslo, a “Business together in order to create the essential shared values as an Instrument of Peace” research that help foster stability and peace, in national and international contexts. Not any kind of trade and symposium will be held on October 17. economics, nor any kind of business activity, may have The International Council of Swedish such a positive effect. Colonialism, factories abusing Industry and Institute of Corporate workforces, and cronyism, for example, may sow the seeds for frustration and violence. Underneath the Responsibility/GWU, will also join us to names and policies of “trade” are specific, concrete present new research in detail during interactions among parties that may or may not be the day at Oslo Konserthus. Highlights positive and constructive. An important aspect to consider is the nature of the interactions of particular from the findings will be showcased and businesses, particular business people, and particular challenged at a gathering in Oslo City Hall, stakeholders such as employees, shareholders, in connection with Oslo Innovation Week. -
Rebooting U.S. Security Cooperation in Iraq
Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS POLICY FOCUS 137 Rebooting U.S. Security Cooperation in Iraq MICHAEL KNIGHTS THE WASHINGTON INSTITUTE FOR NEAR EAST POLICY www.washingtoninstitute.org The opinions expressed in this Policy Focus are those of the author and not necessarily those of The Washington Institute, its Board of Trustees, or its Board of Advisors. All rights reserved. Printed in the United States of America. No part of this publica- tion may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. © 2015 by The Washington Institute for Near East Policy The Washington Institute for Near East Policy 1828 L Street NW, Suite 1050 Washington, DC 20036 Design: 1000colors Photo: A Kurdish fighter keeps guard while overlooking positions of Islamic State mili- tants near Mosul, northern Iraq, August 2014. (REUTERS/Youssef Boudlal) CONTENTS Acknowledgments | v Acronyms | vi Executive Summary | viii 1 Introduction | 1 2 Federal Government Security Forces in Iraq | 6 3 Security Forces in Iraqi Kurdistan | 26 4 Optimizing U.S. Security Cooperation in Iraq | 39 5 Issues and Options for U.S. Policymakers | 48 About the Author | 74 TABLES 1 Effective Combat Manpower of Iraq Security Forces | 8 2 Assessment of ISF and Kurdish Forces as Security Cooperation Partners | 43 FIGURES 1 ISF Brigade Order of Battle, January 2015 | 10 2 Kurdish Brigade Order of Battle, January 2015 | 28 ACKNOWLEDGMENTS My thanks to a range of colleagues for their encouragement and assistance in the writing of this study. -
Nonprofit Security Grant Program Threat Incident Report
Nonprofit Security Grant Program Threat Incident Report: January 2019 to Present November 15, 2020 (Updated 02/22/2021) Prepared By: Rob Goldberg, Senior Director, Legislative Affairs [email protected] The following is a compilation of recent threat incidents, at home or abroad, targeting Jews and Jewish institutions (and other faith-based organization) that have been reported in the public record. When completing the Threat section of the IJ (Part III. Risk): ▪ First Choice: Describe specific terror (or violent homegrown extremist) incidents, threats, hate crimes, and/or related vandalism, trespass, intimidation, or destruction of property that have targeted its property, membership, or personnel. This may also include a specific event or circumstance that impacted an affiliate or member of the organization’s system or network. ▪ Second Choice: Report on known incidents/threats that have occurred in the community and/or State where the organization is located. ▪ Third Choice: Reference the public record regarding incidents/threats against similar or like institutions at home or abroad. Since there is limited working space in the IJ, the sub-applicant should be selective in choosing appropriate examples to incorporate into the response: events that are most recent, geographically proximate, and closely related to their type or circumstance of their organization or are of such magnitude or breadth that they create a significant existential threat to the Jewish community at large. I. Overview of Recent Federal Risk Assessments of National Significance Summary The following assessments underscore the persistent threat of lethal violence and hate crimes against the Jewish community and other faith- and community-based institutions in the United States. -
The Atlantic Council and Bellingcat Are Guilty of War Propaganda. As
An essential dimension of humanitarian work is human rights investigations to identify violations and crimes. Human rights investigation organizations, in the digital age, are taking advantage of the growing prevalence of online citizen evidence and extractable data from what they often refer to as ‘open sources’ and social media TheThe AtlanticAtlantic CouncilCouncil andand BellingcatBellingcat areare guiltyguilty ofof warwar propaganda.propaganda. AsAs @ian56789@ian56789 wrotewrote toto mee in in a amessage: message: “The“The membersmembers ofof thethe AtlanticAtlantic CouncilCouncil andand DFRLabDFRLab shouldshould bebe indictedindicted asas accomplicesaccomplices toto WarWar Crimes,Crimes, forfor providingproviding actualactual materialmaterial supportsupport toto alal--QaedaQaeda terrorists,terrorists, andand forfor TreasonTreason (actively(actively supportingsupporting officialofficial enemiesenemies ofof thethe USUS && UK).UK). TheyThey shouldshould bebe spendingspending thethe restrest ofof theirtheir liveslives inin jailjail andand finedfined everyevery pennypenny they'vethey've got.”got.” AndAnd thosethose abusingabusing andand exploitingexploiting BanaBana alal--AbedAbed inin theirtheir ongoingongoing warwar propagandapropaganda shouldshould joinjoin themthem.. FromFrom https://www.rt.com/ophttps://www.rt.com/op--ed/431128ed/431128--banabana--alabedalabed--bellingcatbellingcat--atlanticatlantic--councilcouncil EvaEva Bartlett,Bartlett, JuneJune 29,29, 2018.2018. platforms. For the purpose of this discussion, we make use of the term ‘open source’ as it is specifically used by the organizations discussed here – we acknowledge that ‘open source’ as a term is often used in problematic ways in place of what is simply extractable, publicly available data – the term open source refers to accessible and editable software source code and in this paper’s context the term often misleadingly refers to datasets that have come at a high cost to the organization that procured them. -
Jan F Qvigstad: on Transparency
Jan F Qvigstad: On transparency Speech by Mr Jan F Qvigstad, Deputy Governor of Norges Bank (Central Bank of Norway), at Det Norske Videnskaps-Akademi (The Norwegian Academy of Science and Letters), Oslo, 10 November 2009. Ida Wolden Bache, Amund Holmsen, Marie Norum Lerbak and Øistein Røisland provided valuable assistance in preparing this speech * * * Introduction Norges Bank’s Executive Board has decided that the key policy rate now should be 1.5 per cent. If economic developments are broadly in line with projections, the appropriate key policy rate will be 2.75 per cent around the end of next year. If I had made this statement ten years ago, it would have constituted a breach of confidentiality.1 Norges Bank considered this to be highly sensitive information. Had I been deputy chairman of the US Federal Reserve Board twenty years ago, I would not even have been entitled to reveal the latest interest rate decision.2 Today, this sounds rather odd. Transparency is now taken for granted among central banks and in other areas of society. In London in 1780, the Bank of England was put to a test. In Parliament, Lord Gorden attempted to stop a bill to restore civil rights to Catholics.3 He drew support from large numbers. Rioting led to the destruction of several public buildings. When an attack was launched against the Bank of England, the building was secured like a fortress and withstood the onslaught, hence the phrase “as safe as the Bank of England”. Through the years, the phrase has been simplified into “as safe as the bank”. -
ARTIC Report
UNCLASSIFIED//FOR OFFICIAL USE ONLY 7 Information Cutoff Date: 31 December 2019 Publication Date: April 2020 Table of Contents (U) Scope & Methodology .................................................................................................................................................... 2 (U) Army Policy on Extremist Organizations & Activities ................................................................................................. 3 (U) Executive Summary ........................................................................................................................................................ 3 (U) Army: Extremist Reporting 2017 – 2019 ....................................................................................................................... 4 (U) Marines: Extremist Reporting 2017 – 2019 ................................................................................................................... 6 (U) Airforce: Extremist Reporting 2017 – 2019................................................................................................................... 7 (U) Coastguard: Extremist Reporting 2017 – 2019 ............................................................................................................ 8 (U) Multibranch: Extremist Reporting 2017 – 2019 ............................................................................................................ 8 (U) Neo-Nazi / White Supremacist Organizations ............................................................................................................. -
Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002
Description of document: Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Case Log October 2000 - April 2002 Requested date: 2002 Release date: 2003 Posted date: 08-February-2021 Source of document: Information and Privacy Coordinator Central Intelligence Agency Washington, DC 20505 Fax: 703-613-3007 Filing a FOIA Records Request Online The governmentattic.org web site (“the site”) is a First Amendment free speech web site and is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. 1 O ct 2000_30 April 2002 Creation Date Requester Last Name Case Subject 36802.28679 STRANEY TECHNOLOGICAL GROWTH OF INDIA; HONG KONG; CHINA AND WTO 36802.2992 CRAWFORD EIGHT DIFFERENT REQUESTS FOR REPORTS REGARDING CIA EMPLOYEES OR AGENTS 36802.43927 MONTAN EDWARD GRADY PARTIN 36802.44378 TAVAKOLI-NOURI STEPHEN FLACK GUNTHER 36810.54721 BISHOP SCIENCE OF IDENTITY FOUNDATION 36810.55028 KHEMANEY TI LEAF PRODUCTIONS, LTD. -
A Practical Guide to Implementation Research on Health Systems
A Practical Guide to Implementation Research on Health Systems Henry Lucas and Merrick Zwarenstein A Practical Guide to Implementation Research on Health Systems Henry Lucas and Merrick Zwarenstein Cover photograph Participants in a collective analysis workshop undertake a causal mapping exercise (chapter 10). Photographer Danny Burns IDS Publishing Manager Alison Norwood Citation Lucas, Henry and Zwarenstein, Merrick (2016). A Practical Guide to Implementation Research on Health Systems. Brighton: IDS Editors Henry Lucas and Merrick Zwarenstein Published November 2016 DisclaimersThe Institute of Development Studies and Editors cannot be held responsible for errors or any consequences arising from the use of information contained in this book. The views and opinions expressed do not necessarily reflect those of the IDS and Editors. Copyright © Institute of Development Studies, 2016. This is an Open Access report distributed under the terms of the Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original authors and source are credited. http://creativecommons.org/licenses/by/4.0/legalcode Institute of Development Studies Brighton BN1 9RE UK www.ids.ac.uk IDS is a charitable company limited by guarantee and registered in England (No 877338). Acknowledgments This book was initially developed with funding from the European Union Seventh Framework Programme under grant agreement no 265970. Additional support was provided by the Future Health Systems Consortium, funded by the UK DFID. The initial stimulus for the book came from the involvement of one of the authors with the team undertaking the initial stages of the development of the TDR Implementation Research Toolkit. -
Son of the Fallen Afghan Man He Suspected of Being a Taliban Bomb-Maker
MILITARY NFL FACES Service members, families Ravens’ Jackson ‘Rise of Skywalker’ script among attendees of papal throws 5 TD passes leaked after actor left it Mass at Tokyo Dome in blowout of Rams under bed, director says Page 4 Back page Page 18 Trump’s actions in SEAL’s case raise questions about president’s role » Page 5 stripes.com Volume 78, No. 160 ©SS 2019 WEDNESDAY, NOVEMBER 27, 2019 50¢/Free to Deployed Areas Army major pardoned by Trump wants medal back BY NANCY MONTGOMERY Stars and Stripes First hailed a hero, then stripped of his Silver Star and charged with murder only to be pardoned by the president, Maj. Mathew Golsteyn now wants his medal and Special Forces tab restored. “We’re trying to get back what he had,” said Golsteyn’s lawyer, Phil- lip Stackhouse. “There’s a letter sit- ting with the secretary of the Army right now.” Golsteyn, a graduate of the U.S. Military Academy and former Green Beret, also wants the Silver Star he was awarded in Jake Spann visits the 2010 to be up- grave of his father, graded to the CIA officer Johnny Distinguished “Mike” Spann, at Service Cross, Arlington National the military’s Cemetery in July. second-highest honor. BILL O’LEARY The Washington Post The upgrade had been ap- proved but not Golsteyn awarded before an investigation into whether Golsteyn committed a crime in Afghanistan in killing an Son of the fallen Afghan man he suspected of being a Taliban bomb-maker. Whether Golsteyn regains his honors may depend on how involved He was a baby when his dad died in Afghanistan. -
Identitarian Movement
Identitarian movement The identitarian movement (otherwise known as Identitarianism) is a European and North American[2][3][4][5] white nationalist[5][6][7] movement originating in France. The identitarians began as a youth movement deriving from the French Nouvelle Droite (New Right) Génération Identitaire and the anti-Zionist and National Bolshevik Unité Radicale. Although initially the youth wing of the anti- immigration and nativist Bloc Identitaire, it has taken on its own identity and is largely classified as a separate entity altogether.[8] The movement is a part of the counter-jihad movement,[9] with many in it believing in the white genocide conspiracy theory.[10][11] It also supports the concept of a "Europe of 100 flags".[12] The movement has also been described as being a part of the global alt-right.[13][14][15] Lambda, the symbol of the Identitarian movement; intended to commemorate the Battle of Thermopylae[1] Contents Geography In Europe In North America Links to violence and neo-Nazism References Further reading External links Geography In Europe The main Identitarian youth movement is Génération identitaire in France, a youth wing of the Bloc identitaire party. In Sweden, identitarianism has been promoted by a now inactive organisation Nordiska förbundet which initiated the online encyclopedia Metapedia.[16] It then mobilised a number of "independent activist groups" similar to their French counterparts, among them Reaktion Östergötland and Identitet Väst, who performed a number of political actions, marked by a certain -
The Christchurch Attack Report: Key Takeaways on Tarrant’S Radicalization and Attack Planning
The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam i The Christchurch Attack Report: Key Takeaways on Tarrant’s Radicalization and Attack Planning Yannick Veilleux-Lepage, Chelsea Daymon and Amarnath Amarasingam ICCT Perspective December 2020 ii About ICCT The International Centre for Counter-Terrorism – The Hague (ICCT) is an independent think and do tank providing multidisciplinary policy advice and practical, solution- oriented implementation support on prevention and the rule of law, two vital pillars of effective counterterrorism. ICCT’s work focuses on themes at the intersection of countering violent extremism and criminal justice sector responses, as well as human rights-related aspects of counterterrorism. The major project areas concern countering violent extremism, rule of law, foreign fighters, country and regional analysis, rehabilitation, civil society engagement and victims’ voices. Functioning as a nucleus within the international counter-terrorism network, ICCT connects experts, policymakers, civil society actors and practitioners from different fields by providing a platform for productive collaboration, practical analysis, and exchange of experiences and expertise, with the ultimate aim of identifying innovative and comprehensive approaches to preventing and countering terrorism. Licensing and Distribution ICCT publications are published in open access format and distributed under the terms of the Creative Commons